Insegnamento a.a. 2024-2025

30610 - CURRENT POLITICAL PHENOMENA

Department of Social and Political Sciences

Course taught in English

Student consultation hours
Class timetable
Exam timetable
Go to class group/s: 31
CLEAM (6 credits - I sem. - OP  |  SPS/04) - CLEF (6 credits - I sem. - OP  |  SPS/04) - CLEACC (6 credits - I sem. - OP  |  SPS/04) - BESS-CLES (6 credits - I sem. - OP  |  SPS/04) - WBB (6 credits - I sem. - OP  |  SPS/04) - BIEF (6 credits - I sem. - OP  |  SPS/04) - BIEM (6 credits - I sem. - OP  |  SPS/04) - BIG (6 credits - I sem. - OBS  |  SPS/04) - BEMACS (6 credits - I sem. - OP  |  SPS/04) - BAI (6 credits - I sem. - OP  |  SPS/04)
Course Director:
CAMILLA PAGANI

Classes: 31 (I sem.)
Instructors:
Class 31: CAMILLA PAGANI


Suggested background knowledge

Basic knowledge of political theory, international relations and current events. Curiosity and critical thinking are welcome.

Mission & Content Summary

MISSION

This 48-hours course is divided in two modules conducted by two professors. Module Prof. Camilla Pagani "Discussing Security across Sectors" The course will focus in its first part on the concept of security applied to different sectors and case studies. Human security, food security, migration, health security, environmental security and the protection of cultural heritage in conflict zones will be analysed through the prism of political theory and critical security studies, based on contemporary case studies. The main objective of this module is to enable students to develop analytical and critical skills in the field of security studies. Module Prof. Valerio Vignoli In the second part, the course will focus on exploring key phenomena of cooperation and conflict among and within states and their determinants, such as inter and intra-state wars, terrorism, military alliances, and military coups, adopting a strictly quantitative perspective.

CONTENT SUMMARY

Module Prof. Camilla Pagani "Discussing Security across Sectors"
Security is a fundamental topic in IR theories, but its meanings and uses are much broader and overlap with many other disciplines. This preliminary module intends to explore the concept of "security" by analysing it from a critical perspective and through contemporary case studies. The architecture of European security, human security, health security, the protection of cultural heritage in conflict zones, food security and environmental security will be examined with regard to warfare, migration, human rights, and climate change.

 

Module Prof. Valerio Vignoli

How to define war? How many wars have occurred in contemporary history? What are their causes? Operationalizing and measuring a phenomenon, describing the variation in its occurrences, and then finding the determinants to explain such variation are efforts that lie at the core of political science research. International Relations scholarship has embarked in such efforts to understand fundamental events of global politics, across and within states, making an increasing use of quantitative data and to be analyzed through incrementally sophisticated statistical techniques. The aim of this second module of the course is offering students a quick overview of quantitative  research in IR, employing the most established and validated datasets to show empirical patterns in international politics and some of their origins.

 

Module Prof. Pagani

 

SESSION 1, 2 - Origins of security: from ancient Greece to social contract theories

These introductory sessions will discuss the origins of 'security' in ancient Greece to the theories of social contract, by focusing on its relation to the individual and the state.

Oral group presentations will be organised.

 

SESSION 3 - Security and warfare: discussing security dilemmas from the Westphalian paradigm to the war in Ukraine and in the Middle East

Security has been and is still used today as a political tool to justify war. From the Westphalian paradigm to contemporary wars, what are the meanings, the uses and the abuses of security?

Case study

The many challenges of European security after the war in Ukraine.

 

SESSION 4 - The protection of cultural heritage in conflict zones - what stakes and foreign policy strategies?

This session will analyse the securitization of cultural heritage, by focusing on conflict and post-conflict areas.

Case study

Comparing different strategies in the protection of cultural heritage

 

SESSION 5 - Security and/or liberty? Surveillance and biosecurity

From 9/11 the perception of insecurity caused by terrorism globally has led to illiberal practices of surveillance in both autocratic and liberal states. Technology and AI are increasingly used in order to control, screen and predict suspicious individuals. What is at stake is a loss of basic rights for the safeguard of the 'freedom to be secure'. What is the balance between security and liberty? How has security turned into biosecurity?

Case study

 - Analysis of French 'global security' law.

 

SESSION 6 - Security and development

This lecture will analyse the category of 'human security', investigating the link between security and development.

 

SESSION 7 - Food security and its political implications

Food security is a fundamental condition for states' political and economic stability. This session will examine food security with regard to international stakes and development.

 

SESSION 8 - The securitization theory explained

Within the post-Cold war framework the rise of human crises worldwide has called for a multidimensional and diversified interpretation of security outside its traditional military dimension. Over the last three decades the securitization theory has played a key role in analysing this phenomenon as a sub-field of critical security studies highlighting the temporal, relational and context-related dimensions of security.

 

SESSION 9 - The securitization of migration

This lecture will focus on the securitization of migration, through contemporary case studies in Europe, North America and Russia.

Case study

- Analysis of the The Belarus–Lithuania border

 

SESSION 10 - Health security: a new global order?

This lecture will focus on the securitization of health at national and international level in light of the COVID-19 pandemic.

Case study

- The Zero-Covid policy in China: stakes and impacts

 

SESSION 11 - The securitization of environment

This session applies the securitization theory to environment and climate change.

 

SESSION 12 - Concluding session

This concluding session will discuss and compare different schools of security studies.

 

Module Prof. Vignoli

 

Class I : Inter-state disputes and rivalries

 

Mandatory readings

 

Bremer, S. A. (1992). Dangerous dyads: Conditions affecting the likelihood of interstate war, 1816-1965. Journal of Conflict Resolution36(2), 309-341.

 

Suggested readings

 

Jones, D. M., Bremer, S. A., & Singer, J. D. (1996). Militarized interstate disputes, 1816–1992: Rationale, coding rules, and empirical patterns. Conflict Management and Peace Science15(2), 163-213.

 

Diehl, P. F., Goertz, G., & Gallegos, Y. (2021). Peace data: Concept, measurement, patterns, and research agenda. Conflict Management and Peace Science38(5), 605-624.

 

Class II: Civil and ethnic wars

 

Mandatory readings

 

Fearon, J. D., & Laitin, D. D. (2003). Ethnicity, insurgency, and civil war. American political science review97(1), 75-90.

 

Suggested readings

 

Gleditsch, N. P., Wallensteen, P., Eriksson, M., Sollenberg, M., & Strand, H. (2002). Armed conflict 1946-2001: A new dataset. Journal of peace research39(5), 615-637.

 

Pettersson, T., & Wallensteen, P. (2015). Armed conflicts, 1946–2014. Journal of peace research52(4), 536-550.

 

Class III: Terrorism and violence against civilians

 

Mandatory readings

 

Fortna, V. P. (2015). Do terrorists win? Rebels' use of terrorism and civil war outcomes. International Organization69(3), 519-556.

 

Suggested readings

LaFree, G., & Dugan, L. (2007). Introducing the global terrorism database. Terrorism and political violence19(2), 181-204.

 

Eck, K., & Hultman, L. (2007). One-sided violence against civilians in war: Insights from new fatality data. Journal of Peace Research44(2), 233-246.

 

Class IV: Human Rights

 

Mandatory readings

 

Poe, S. C., Tate, C. N., & Keith, L. C. (1999). Repression of the human right to personal integrity revisited: A global cross-national study covering the years 1976–1993. International studies quarterly43(2), 291-313.

 

Suggested readings

 

Cingranelli, D. L., & Richards, D. L. (1999). Respect for human rights after the end of the cold war. Journal of peace research36(5), 511-534.

 

Fariss, C. J. (2014). Respect for human rights has improved over time: Modeling the changing standard of accountability. American Political Science Review108(2), 297-318.

 

Class V: Military interventions

 

Mandatory readings

 

Hultman, L., Kathman, J., & Shannon, M. (2013). United Nations peacekeeping and civilian protection in civil war. American Journal of Political Science57(4), 875-891.

 

Suggested readings

 

Pickering, J., & Kisangani, E. F. (2009). The International Military Intervention dataset: An updated resource for conflict scholars. Journal of peace research46(4), 589-599.

 

Kathman, J. D. (2013). United Nations peacekeeping personnel commitments, 1990–2011. Conflict Management and Peace Science30(5), 532-549.

 

Class VI: Military spending

 

Mandatory readings

 

Nikolaidou, E. (2008). The demand for military expenditure: Evidence from the EU15 (1961–2005). Defence and Peace Economics19(4), 273-292.

 

Suggested readings

 

Omitoogun, W., & Skons, E. (2006). Military expenditure data: a 40-year overview. Stockholm International Peace Research Institute, SIPRI Yearbook.

 

Class VII: Military coups

 

Mandatory readings

 

Powell, J. (2012). Determinants of the Attempting and Outcome of Coups d’état. Journal of Conflict resolution56(6), 1017-1040.

 

Suggested readings

 

Powell, J. M., & Thyne, C. L. (2011). Global instances of coups from 1950 to 2010: A new dataset. Journal of Peace Research48(2), 249-259.

 

Class VIII: Military alliances 

 

Mandatory readings

 

Leeds, B. A. (2003). Do alliances deter aggression? The influence of military alliances on the initiation of militarized interstate disputes. American Journal of Political Science47(3), 427-439.

 

Suggested readings

 

Leeds, B., Ritter, J., Mitchell, S., & Long, A. (2002). Alliance treaty obligations and provisions, 1815-1944. International Interactions28(3), 237-260.

 

 

Class IX: Intergovernmental Organizations

 

Mandatory readings

 

Pevehouse, J. C. (2002). Democracy from the outside-in? International organizations and democratization. International organization56(3), 515-549.

 

Suggested readings

 

Pevehouse, J. C., Nordstrom, T., McManus, R. W., & Jamison, A. S. (2020). Tracking organizations in the world: The Correlates of War IGO Version 3.0 datasets. Journal of Peace Research57(3), 492-503.

 

Class X: International treaties

 

Mandatory readings

 

Bernauer, T., Kalbhenn, A., Koubi, V., & Spilker, G. (2010). A comparison of international and domestic sources of global governance dynamics. British Journal of Political Science40(3), 509-538.

 

Suggested readings

 

Elsig, M., Milewicz, K., & Stürchler, N. (2011). Who is in love with multilateralism? Treaty commitment in the post-Cold War era. European Union Politics12(4), 529-550.

 

Koremenos, B. (2013). The continent of international law. Journal of Conflict Resolution57(4), 653-681.

 

Class XI: Trade

 

Mandatory readings

 

Oneal, J. R., & Russett, B. (1999). Assessing the liberal peace with alternative specifications: Trade still reduces conflict. Journal of Peace Research36(4), 423-442.

 

Suggested readings

 

Gleditsch, K. S. (2002). Expanded trade and GDP data. Journal of Conflict Resolution46(5), 712-724.

 

Class XII: Sanctions

 

Mandatory readings

 

Peksen, D. (2009). Better or worse? The effect of economic sanctions on human rights. Journal of Peace Research46(1), 59-77.

 

Suggested readings

 

Morgan, T. C., Bapat, N., & Kobayashi, Y. (2014). Threat and imposition of economic sanctions 1945–2005: Updating the TIES dataset. Conflict Management and Peace Science31(5), 541-558.

 


Intended Learning Outcomes (ILO)

KNOWLEDGE AND UNDERSTANDING

At the end of the course student will be able to...
  • Become familiar with the concept of "security" and the discipline of security studies from a theoretical and critical perspective;
  • Identify the main theoretical and practical fields to which security can be applied;
  • Analyse academic articles from journals of political theory and international relations as well as policy briefs and international reports with regard to the topic of security;
  • Evaluate and compare different theories and case studies within the field of security.
  • Analyse data in the field of security and IR

 

APPLYING KNOWLEDGE AND UNDERSTANDING

At the end of the course student will be able to...
  • Develop analytical written communication skills in the field of security studies;
  • Present and discuss a case study in the field of security studies both in-group and individually through in-class presentations;
  • Analyse and interpret data in the field of IR

Teaching methods

  • Lectures
  • Individual works / Assignments
  • Collaborative Works / Assignments
  • Interaction/Gamification

DETAILS

Individual assignments will enable students to improve research and written skills.

 

Case studies and interactive class debates will enable students to develop crtical analysis and interaction.

 

Collaborative works will permit to improve teamwork and oral communicaton skills.


Assessment methods

  Continuous assessment Partial exams General exam
  • Written individual exam (traditional/online)
    x
  • Individual Works/ Assignment (report, exercise, presentation, project work etc.)
x    
  • Collaborative Works / Assignment (report, exercise, presentation, project work etc.)
x    
  • Active class participation (virtual, attendance)
x    

ATTENDING STUDENTS

Module Prof. Pagani (50% of the final grade)

  • With the purpose of measuring the acquisition of the above-mentioned learning outcomes, the students’ assessment is based on: 

    • Active participation to class debates (10%)
    • An in-class presentation (30%) aimed to asses the students’ skills to present and discuss a case study or an article related to the topic of security
    • A written exam (60%) aimed to test the students’ ability to critically analyse a topic of the course, on the basis of all sessions and reading materials.

 

Module Prof. Vignoli (50% of the final grade)

  • Active participation to class debates (10%)
  • A group essay (30%) aimed to asses the students’ skills to present and discuss a case study or an article related to the topic of IR
  • A written exam (60%) aimed to test the students’ ability to critically analyse a topic of the course, on the basis of all sessions and reading materials.

NOT ATTENDING STUDENTS

The assessment will be based on an a written exam that covers the entire content of the lectures for 100% of the grade.


Teaching materials


ATTENDING AND NOT ATTENDING STUDENTS

The course materials will consist of journal articles, media articles, and book chapters, all of which will be provided online. 

Last change 26/05/2024 11:29