0% found this document useful (0 votes)
15 views5 pages

Outline

The Global Security course (NUIRD31203) covers critical security issues beyond traditional state defense, including terrorism, cyber crime, and environmental changes. It aims to equip students with knowledge and skills to understand global peace and security challenges, analyze their causes, and develop effective responses. The course includes lectures, discussions, and assessments, with a focus on teamwork and communication skills, culminating in a final examination and coursework.

Uploaded by

hagyerimana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

Outline

The Global Security course (NUIRD31203) covers critical security issues beyond traditional state defense, including terrorism, cyber crime, and environmental changes. It aims to equip students with knowledge and skills to understand global peace and security challenges, analyze their causes, and develop effective responses. The course includes lectures, discussions, and assessments, with a focus on teamwork and communication skills, culminating in a final examination and coursework.

Uploaded by

hagyerimana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

COURSE: GLOBAL SECURITY

COURSE CODE: NUIRD31203

COURSE CREDITS: Credit Hours 60 Credit Units 4

LEVEL: DEGREE

Course Description:

It is not uncommon to think that the security agenda is only concerned with states and their
armed forces. A common misunderstanding however is to equate security with defense.
Indeed, the question of security is now much broader and includes questions of force and
military preparedness concerns and policies to do with human and minority rights. The
course is designed to introduce students to the current critical security issues such as;
terrorism, cyber crime, economic fraud and piracy, environmental changes among others. As
it provides an insight into the understanding of order between and within states.

Course Objectives:

The course will have the following objectives among others:


(1) Equipping students with knowledge and skills that will make them understand
and appreciate the challenges facing global peace and security, and to search for
effective responses to these challenges.
(2) Acquainting students with the knowledge required for examining different texts
that constitute candidates understanding of the salient and interlinked challenges
of peace and security in today's complex environment, within a framework of
human and state security.
(3) Exposing to examine global security in a national, regional and transnational
context.
(4) Enabling students understand the relevance of Global, Regional and National
Security in the modern world.

Expected Learning Outcomes

By the end of the course, students should be able to:

(1) Identify the main challenges in Global security and critically analyze their causes and
consequences.
(2) Understand and evaluate existing responses and articulate alternative and more
effective ones.
(3) Improve analytical and presentational skills and increase the ability to perform as a
policymaker, negotiator or decision-maker.
(4) Enhance development of teamwork and communication skills.
(5) Provide an open multinational forum that fosters understanding and respect for diverse
perspectives, opinions and cultures.
(6) To inform students about opportunities for internships and professional careers in the
private and public sectors concerned with national and global security.

Teaching Methods:
(i) Lectures
(ii) Essay Assignments/Involving Library/Desk Research
(iii) Question and answer sessions
(iv) Group Discussions

Course Assessment:
(a) 30% Coursework
(b) 70% Final Examination
( c) The total mark is 100%

The course will be graded out of maximum of 100 marks and assigned appropriate letter
grades and grade point averages as shown below:

% Mark Letter Grade Point (GP) Remarks Degree Class


80-100 A 5.0 Distinction First Class
75-79 B+ 4.5 Very good 2nd Class (Upper)
70-74 B 4.0 Good 2nd Class (Lower)
65-69 C+ 3.5 2nd Class (Lower)
60-64 C 3.0 2nd Class (Lower)
55-59 D+ 2.5 Fair/Satisfactory Third Class
(Pass)
50-54 D 2.0 Fair/Satisfactory Third Class
(Pass)
0-49 F 0 Fail (Repeat
subject)

NB: The pass mark for this course will be 50%

COURSE CONTENTS

Topic 1: The Theory of Global Security 8


Hrs
 What Global Security, Crime and Terrorism.
 Define; Global Security, Organised Crime and Terrorism in Modern world.
 Relevance of studying Global Security
 Understanding Global security
 Introduction to Global Security in the Region and National level.

Topic 2: Terrorism 10
Hrs
 This module provides students with the systematic theoretical and empirical
study of old and new types of terrorism and political violence
 The module commences with the analysis of theoretical and ideological
approaches towards terrorism and an investigation of the historical context,
causes and effects of old terrorism
 The module also covers types of new terrorism with a focus on terrorism in the
twenty-first century from national, regional and international perspectives
 Moreover, policy responses to terrorism and counter terrorism and their
relationship with human rights will form part of this module
 Developmental Approach Using continuously updated case-study material, the
final section of this module will enable students to theoretically contextualize
current terrorist incidents and equip them with a methodological
understanding of how to conduct research into terrorism.

Topic 3: International Security 8


Hrs

 The changing nature of security studies from origins in the study of military
strategy.
 War as policy and the importance of strategic theory.
 Different theories of deterrence and the nuclear age, political realism and
nuclear weapons and arms control.
 Peace Research as critique and alternative perspective.
 Post-cold war security.

Topic 4: Crimes Of The Powerful: Corporate, White Collar and Financial


Crime
15hrs
 Political and Economic Indicators of Development and Underdeveloped
Political Systems.
 Agents Responsible for Political Development.
 A comparative and transnational analysis of the historical development and
recent growth of corporate, white collar and financial crime.
 The conceptual context of 'white collar crime’ and globalization of criminal
activities of way they presents unique and unfamiliar problems.
 The contextual analysis of Corporate and financial crimes, the growth of
transnational legal and illegal business in the globalization of financial
markets via the internet.
 The main social actors, processes and interactions by which corporate, white
collar and financial crimes are perpetrated,
 Ways in which white collar and financial crimes are criminalized.
 The business ideologies which deny their criminality.
 The links between the 'underworld' and the 'over world' of business.
 The means by which corporate crimes are dealt with within national and
international law.
Topic 5: Crime against Humanity: State Crime, War Crimes and Transnational
Terrorism
10hrs
 A comparative and transnational analysis of the historical and recent
development of state crime, war crimes and transnational terrorism.
 Appreciate how crimes against humanity have been established from being
canon of criminology, but identified as an area of increasing importance.
 Understand how Corporate and state crime are crimes carried out by large and
powerful organizations.

Topic 6: Economic Environment


7hrs
 Economics of the environment
 Introduction to statistics in environmental science
 Physical science for environmental management
 The politics and practice of the environmental and resource policy

Discussion and wrap-up 2hrs


Total Hours 60hrs.

REFERENCE BOOKS
Bruce, H. (2006). Inside Terrorism. New York: Columbia University Press.
Crenshaw, M. (Ed.). (1985). Terrorism in Context. USA: Penn State Press.
Gérard, C. & Arnaud, B. (2007). The History of Terrorism: From Antiquity to Al-Qaeda.
Berkeley and Los Angeles: University of California Press.
Kavoori, A.P. & Fraley, T. (2006). Media, Terrorism, and Theory: A Reader. USA: Rowman
and Littlefield Publishers Inc.
Oche, O. (2006). The Phenomenon of Terrorism. Lagos: Fog Ventures.
Walter, R.(Ed.). (1998). Origins of Terrorism: Psychologies, Ideologies, Theologies, and
States of Mind. Baltimore, Maryland: The Johns Hopkins University Press.
Weinberg, L. (2009). Global Terrorism. New York: The Rosen Publishing Group.
Ganor, B. (2005). The Counter-Terrorism Puzzle: A Guide for Decision Makers. New
Brunswick: Transaction Publishers.
Frank Bolz, Jr., Kenneth J. D. & David, P. S. (2002). The Counterterrorism Handbook:
Tactics, Procedures, and Techniques. London: CRC Press.
Karmon, E. (2005). Coalitions between Terrorist Organisations: Revolutionaries, Nationalists
and Islamists. Leiden: Martinus Nijhoff Publishers.
Chari, P. R. (1990). ‘Etiology of Terrorism’. In: S.C. Tiwari (Ed). Terrorism in India. New
Delhi: South Asian.
Combs, C. C. (1997). Terrorism in the Twenty-First Century. Upper Saddle River, N.J.:
Prentice Hall.
Herman, E. S. & O’Sullivan, G. (1991). ‘Terrorism” as Ideology and Cultural Industry’,
George, A. (Ed.) Western State Terrorism. New York: Routledge, pp. 39–75.
Mahan, S. & Pamala, L. G. (2008). Terrorism in Perspective. Thousand Oaks, Calif: Sage
Publications.
Matthew, J. M. (2004). The Origins of the New Terrorism. Parameters, Spring 2004.
Paul, B.(2003). Terror and Liberalism. New York: W. W. Norton.
Clutterbuck, R. (1994). Terrorism in an Unstable World. London: Routledge.
Gardner, H. (2005). American Strategy and the War on Terrorism. Hampshire

Aradau, C. et al (2015). Critical Security Methods: New Frameworks for Analysis.


Abingdon: Routledge.
Booth, Ken (2005). Critical Security Studies and World Politics. London: Lynne Rienner.
Booth, Ken (2007). Theory of World Security, Cambridge: Cambridge University Press.
Bourne, M. (2013) Understanding Security. Basingstoke: Palgrave.
Burgess, J. (ed.) (2013) The Routledge Handbook of New Security Studies. Abingdon:
Routledge.
Buzan, Barry and Hansen, Lene (2009) The Evolution of International Security Studies.
Cambridge: Cambridge University Press.
Buzan, Barry et al (1998) Security: A New Framework for Analysis. London: Lynne Rienner.
Dannreuther, Roland (2007) International Security: the contemporary agenda, Cambridge:
Polity Press.
Kolodziej, Edward A. (2005), Security and International Relations, Cambridge: Cambridge
University Press.
Sheehan, Michael (2005), International Security, Boulder: Lynne Rienner.
Shepherd, Laura (ed.) (2013) Critical Approaches to Security: An Introduction to Theories
and Method. Abingdon: Routledge.
Smith, Michael (2010), International Security: Politics, Policy, Prospects, Basingstoke:
Palgrave Macmillan.
Williams, Paul (2013) Security Studies: An Introduction. Abingdon: Routledge (2nd edition).
Aradau, C. et al (2015). Critical Security Methods: New Frameworks for Analysis.
Abingdon: Routledge.
Booth, Ken (2005). Critical Security Studies and World Politics. London: Lynne Rienner.
Booth, Ken (2007). Theory of World Security, Cambridge: Cambridge University Press.
Bourne, M. (2013) Understanding Security. Basingstoke: Palgrave.
Burgess, J. (ed.) (2013) The Routledge Handbook of New Security Studies. Abingdon:
Routledge.
Buzan, Barry and Hansen, Lene (2009) The Evolution of International Security Studies.
Cambridge: Cambridge University Press.
Buzan, Barry et al (1998) Security: A New Framework for Analysis. London: Lynne Rienner.
Dannreuther, Roland (2007) International Security: the contemporary agenda, Cambridge:
Polity Press.
Kolodziej, Edward A. (2005), Security and International Relations, Cambridge: Cambridge
University Press.
Sheehan, Michael (2005), International Security, Boulder: Lynne Rienner.
Shepherd, Laura (ed.) (2013) Critical Approaches to Security: An Introduction to Theories
and Method. Abingdon: Routledge.
Smith, Michael (2010), International Security: Politics, Policy, Prospects, Basingstoke:
Palgrave Macmillan.
Williams, Paul (2013) Security Studies: An Introduction. Abingdon: Routledge (2nd edition

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy