POLS 7210: European Security Issues

advertisement
POLS 7210: European Security Issues
Spring 2014
University of North Georgia
DR. CRAIG B GREATHOUSE
craig.greathouse@ung.edu
Hansford Hall 318
706 867-3504
CLASS DESCRIPTION
The purpose of this course will examine the environment and emerging security
structures within Europe. It will examine the changing nature of the European security
environment since creation of NATO, the fall of the Soviet Union, and the development
of a separate EU structure. This course will look at the institutional structures along with
the internal and external influences which drive European security issues.
COURSE OBJECTIVES
To understand the history of European security issues since the end of World War II
Understand the different actors and their influence on European security issues
Explain the linkages between the major actors in European security
Students will sharpen writing and analytical skills through module assignments and the
completion of an analytical paper
CONTACT ISSUES
Within the first four days of the class each student must send me an email from an active
and valid email account. The email you will send to is craig.greathouse@ung.edu.
Students who do not comply with this requirement will be dropped from the course. I
will then respond to each email that is sent to ensure that my emails get through to you.
If you do not get a response to your email within 48 hours, contact me either in person or
by telephone. Within the email you must include your full name and a little background
about why you are taking this course and this degree. During the course of the semester
email me through the ung.edu. Expect to receive a response from me, at the latest, in 2448 hours, normally the response will be soon.
YOU ARE ONLY TO USE MY UNG EMAIL IN CONTACTING ME REGARDING
THIS CLASS. Do not use the email in D2L to contact me as it is not as effective. I will
not respond to the D2L email
CODE OF CONDUCT
For this course the code of conduct that is articulated in the student handbook serves as
the rules for this class.
Violations will be dealt with by the instructor and may be elevated to the Departmental
Chair and or Dean of Students for additional action. All options remain open to the
instructor up too and including an administrative withdrawal from this class are possible
ATTENDANCE POLICY:
Since this is a web-based course, there is no attendance that is required for this class.
You work on your own time and focus on getting the assignments in on time.
Academic Integrity Policy
The honor code, “On my honor, I will not lie, cheat, steal, plagiarize, evade the truth
or tolerate those who do,” reflects UNG’s commitment to academic integrity.
The policies and procedures regarding academic integrity at UNG are included in the
Student Handbook under Student Code of Conduct. The absence of an integrity code
statement on an assignment, the absence of a written honor pledge on an assignment, or
the absence of a student’s signature in no way releases the student from the responsibility
to know, understand, and follow the university’s honor policy.
Suspected violations of the Academic Integrity policy will be referred by students
to the instructor. If the instructor concludes that a violation of the Academic Integrity
policy has occurred, the instructor will penalize the student and file an incident report. If
an incident report is filed by the instructor, the instructor will review the completed report
with the student and will request that the student sign the report as an indication that the
student is aware of the contents of the report.
PLAGIARISM
IF YOU ARE CAUGHT PLAGARISING IN THIS COURSE, YOU WILL RECEIVE
AN F FOR THE COURSE. YOU WILL THEN BE FORWARDED TO THE
ACADEMIC INTEGRITY COUNCIL FOR FURTHER ACTION. I DO NOT
TOLERATE PLAGARISM IN ANY WAY SHAPE OR FORM.
PLAGIARISM DEFINED - is using others' ideas and words without clearly
acknowledging the source of that information. Plagiarism is offering someone else's work
as your own, whether one sentence or whole paragraphs, and whether from an internet
source, book, periodical, or the writing of other students. . It also includes turning in
work submitted for another class, in full or in part, without the expressed permission of
the course instructor.
Intent is not germane in my determination of plagiarism. If you use the ideas or words
of others without citing you are guilty of plagiarism.
If you are not sure whether to cite something or not cite it to protect yourself. It is better
to over cite then not to cite enough. If you have questions ask me.
Turnitin Statement
Students agree that by taking this course all required papers may be subject to submission
for textual similarity review to Turnitin.com for the detection of plagiarism. All
submitted papers will be included as source documents in the Turnitin.com reference
database solely for the purpose of detecting plagiarism of such papers. Use of the
Turnitin.com service is subject to the Terms and Conditions of Use posted on the
Turnitin.com site.
You will be submitting all of your assignments to Turnitin for a plagiarism check. More
information will be provide on how access turnitin for this course in D2L. In addition
the instructor may use other approaches such as Google searches in addressing suspected
plagiarism.
METHODS OF INSTRUCTION
This course will be conducted online using a combination of written assignments along
with discussion on the discussion boards. Students are expected to be fully involved in
the discussion sections and in submitting their written work. This course is reading
intensive. The readings you have been assigned are important texts in the field.
Reading and understanding them is the basis of learning in this course. You be asked, at
the end of each module, to answer a synthesis question where you will then synthesize
the readings and show your understanding of them. You will also be asked to participate
in discussions on the discussion board over that sections assignment. Questions about
the readings and discussion of the reading will occur on the discussion board.
TESTING AND GRADING
SPECIFICS ABOUT HOW TO SUBMIT ASSIGNMENTS
You are to use Microsoft word (doc or docx files) or PDF’s for all projects that will be
turned in for this course. The answers for each assignment are to be in one document.
ALL PAPERS MUST BE UPLOADED TO
TURNITIN.COM OR THEY WILL NOT BE
GRADED. ALL UPLOADS MUST OCCUR
BY NOON ON THE DATE THE
ASSIGMENTS ARE DUE. FAILURE TO
UPLOAD ON TIME WILL RESULT IN
YOUR ASSIGNMENT NOT BEING GRADED
TECHNICAL GLITCHES ARE NOT THE FAULT OF THE INSTRUCTOR AND
WILL NOT BE CONSIDERED A VALID REASON WHY THE ASSIGNMENT WAS
NOT UPLOADED. STUDENTS ARE RESPONSIBLE FOR ENSURING THAT
THAT THEY UPLOAD THE CORRECT VERSION OF THEIR PAPER.
These assignments should be fully spell checked and I would also recommend using
grammar check. Poorly edited answers will have deductions due to spelling or
grammatical errors. You MUST then also submit your document to turnitin.com by
NOON on the day the assignment is due.
At the top of the first page of your assignment you are to include your full name and the
question for the assignment.
NO LATE TERM PAPERS OR OTHER
ASSIGNMENTS WILL BE ACCEPTED!!!!!
I will be grading you based on the rubric which you can find in D2L under the additional
information folder. All grading will be done within turnitin.com using the grademark
element of the website. You will be able to see the comments to your papers posted in
turnitin.com.
MISSED ASSIGNMENTS
Due to the nature of an online course, I will not be accepting missed, past due, or late
assignments unless there is a significant reason. Going to the doctors is not going to be
an acceptable excuse. Being in the hospital would qualify but only if there is
documentation for the hospital stay. Given the fact that you do not have to be in class at
a particular time and can do your work at any time the responsibility falls on the student
to make sure the assignment gets turned in. Going out of town would not qualify
without significant extenuating circumstances.
TECHNOLOGY ISSUES
It is the student’s responsibility to make sure that the assignments get to me.
Computer
problems and technology failures must be addressed by the students themselves.
One thing you do need to watch for when working with D2L is pop up blockers. Make
sure that when you are in D2L that your pop up blocker is turned off.
GRADING
NO LATE TERM PAPERS OR OTHER MAJOR ASSIGNMENTS WILL BE
ACCEPTED!!!!!
Grading in the course will be based on the university’s grade distribution.
A’s = 90-100% - exceptional work
B’s = 80-89% – good work
C’s = 70-79% – average work
D’s = 60-69% – below average
F’s = 59% and below – failing
Your final grade in the course is determined by an average of all work done during the
semester. The percentage is figured by adding the total points a student earned divided
by the total points in the class. At times an assignment or grading element may have a
greater or lesser weight than other work done during the semester. If this is the case you
will be informed and the grade will be calculated with that in mind. Quizzes may not be
specifically scheduled in a syllabus but I retain the right to quiz students at any time I see
fit.
I consider cheating on tests or papers to be a major violation of the academic integrity
policy. Therefore, if you are caught cheating you will be given an F for the semester and
your case referred to for further action.
The grades for this class will be determined by the following criteria this semester.
There will be 6 modules focusing on different issues related to American national
security policy. For each of these modules the student will be expected to be a
contributor to the discussion boards about the topic. For each module a student can earn
up to 30 points for active and competent participation on the discussion boards. If there is
one discussion topic it will be worth 30 points if there are two discussion topics they will
each be worth 15 points. You must have your initial posting for EACH thread is due
normally the first Monday after the module starts. However there may be an exception so
check the schedule for specific dates. You then must respond to two other student’s
initial postings in each thread during the rest of the module as well as respond to
questions or issues raised on your initial postings. More detailed information can be
found in the criteria for discussion boards document found in the additional information
folder. For this class there will be a total of 180 points possible from the discussion
boards.
At the end of each module each student will answer one question which will synthesize
the information within the module and one question and look at issues of application.
Each question will be worth 50 points per module. There will be a total of 300 points
possible for synthesis and application question. IF you do not synthesize the different
sources used within the context of the module you will be marked down heavily. I expect
each source to be used in answering the question posed. Remember this is synthesis I do
not want to see just an overview of ideas or themes. You have to point out where
connections or disagreements between the different authors exist. Each of these
synthesis papers is to be between 4-6 pages of content. By content I mean actually
answering the question, title pages and bibliographies do not count for this page limit.
You may only exceed the content limit by up to two pages. If I get an answer which is
longer than 8 pages I stop reading and you are graded on what I have read. You may
bring in outside sources but they must be relevant and academic in nature. The due dates
for each synthesis assignment are shown in the schedule they are due by NOON on the
posted day.
You will have one shorter paper which will be due by March 10, 2014. This paper will
be 6-8 pages of content. You will use one of the chapters listed below from the Snyder
book to as the basis for this paper. You will examine one of these topics in relation to
European security. You must use 10 academic sources outside of any of those listed in
this class. You may NOT use the topic you use for this paper as the same topic for your
larger paper.
Environmental Security
Human Security
Security Implications of the Arms Trade
The Causes of War
Military Strategy and the New World Order
The Transformation of War
Nuclear Strategy
Challenges and Opportunities for the Nuclear Non-Proliferation Regime
Terrorism and Insurgency
Intervention: The Utility of Force in International Politics
Great Powers and the International System: Between Unilateralism and Multilateralism
Your final project will be worth 150 points. This will be a research paper of between 2025 pages addressing one of the topics from the class in terms of European security. You
will select a topic, which must be approved by the instructor, and apply the topic to a
situation or event in the world. You are going to apply what you have learned to fully
explaining the topic and then offering suggestions about how the event could have been
avoided and future options for the event.
There will be 705 points available in this course.
180 discussion boards
300 module answers
75 first paper
150 research paper
Technical Requirements which students will need to understand in order to effectively
participate in this class. If you have issues or problems with any of these elements please
contact me via email at craig.greathouse@ung.edu.
1. Ability to use email and attachments
2. The ability to use and submit materials via Microsoft word or in PDF format
3. Ability to sign into D2L
TURNITIN.COM INFORMATION
Class ID = 7441964
Class password = europe
Prerequisites for POLS 7230
There are no prerequisites once a student is accepted into the MAIA
REQUIRED BOOKS
Snyder, Craig A. 2012. Contemporary Security and Strategy 3rd Edition. Palgrave
Tardy, Thierry. 2009. European Security in a Global Context. Routledge.
MODULE # 1: Concepts and Definitions of Security
MODULE # 1 Start 1-13-14..ends 1-27-14
Required Readings
Walt, Stephen.(1991). The Renaissance of Security Studies. International Studies
Quarterly, Vol. 35, No. 2. pp. 211-239.
Kolodziej, Edward. (1992) The Renaissance of Security Studies: Caveat Lector.
International Security Studies. 36 pp. 421-438.
Mathews, J. (1989). REDEFINING SECURITY. Foreign Affairs, 68(2), 162-177.
Williams, M. C. (2003). Words, Images, Enemies: Securitization and International
Politics. International Studies Quarterly, 47(4), 511
Snyder Chapter 1 ( recommend 2 and 3 as well)
DISCUSSION QUESTIONS
Initial posting by 1-20-14
All responses by 1-27-14
SYNTHESIS QUESTION – due by 1-27-14 at noon
Security questions within the European region have been an essential concern in the
international system for hundreds of years. The transition into the post-Cold War period
of security for the European region has caused some commentators to assert that
European security concerns are not as important as other regional areas. Using either a
“broad” or “narrow” definition of security make an argument about whether European
matters to the level of other regions in the system? You must defend your notion of
security either broad or narrow. In making this argument you must also define what
Europe incorporates and show how that definition affects European Security.
MODULE # 2: History of European Security
Starts 1-27-14
Ends 2-10-14
REQUIRED READINGS
Greathouse power points and essay
Hettne, Bjorn. 1991. Security and Peace in the Post Cold War Europe. Journal of Peace
Research. 28(3) 279-294
Roter, Petra and Zlatko Sabic. 2004. New and Old Europe in the Context of the Iraq War
and its implication for European Security. Perspectives on European Politics and
Society. 53: 517-542.
Treverton, G. F. (1991). Elements of a new European security order. Journal Of
International Affairs, 45(1), 91.
Trofimenko, H. (1991). Pan-European security: A Soviet scholar's view. Journal Of
International Affairs, 45(1), 113
DISCUSSION QUESTIONS
Initial posting by 2-3-14
All responses by 2-10-14
SYNTHESIS QUESTION – due 2-10-14 at noon in turnitin.com
The historical issues of European security (since the end of World War II) have been
affected by the Cold War, fall of the Berlin Wall, the breakup of Yugoslavia, and role of
NATO. Of these four different elements which would you argue is the most important
in the current element of European security?
MODULE # 3: NATO
Module 3 starts 2-10-14
Ends 2-24-14
Required Reading
NATO in Focus: An Introduction to the Transatlantic Alliance
NATO: A Short History
Berlin Plus Agreements
Berdal, M., & Ucko, D. (2009). NATO at 60. Survival (00396338), 51(2), 55-76.
Together for Security: An Introduction to NATO
NATO/EU Consultation
Mattelaer, A. (2011). How Afghanistan has Strengthened NATO. Survival (00396338),
53(6), 127-140.
Tardy Ch 2
DISCUSSION QUESTIONS
Initial posting by 2-17-14
All responses by 2-24-14
SYNTHESIS QUESTION – due 2-24-14 at noon in turnitin.com
Does NATO still matter for European security? Why or why not?
MODULE # 4: European Union
MODULE 4 – start 2-24-14 ends 3-10-14
Required readings
Greathouse essay on strategic culture
CSDP: Between internal constraints and external challenges (structure overview / skim)
ESDP the first 10 years (structures/skim)
ESDP the first 5 years (background skim)
ESS: European Security Strategy 2003
European Council Conclusions CSDP 2013
Helsinki European Council Conclusions
Implementing ESS 2008 update
Menon, A. (2011). European Defence Policy from Lisbon to Libya. Survival (00396338),
53(3), 75-90.
St. Malo Declaration 1998
Mathiopoulos M, Gyarmati I. Saint Malo and beyond: Toward European defense.
Washington Quarterly [serial online]. September 1999;22(4):65
Winn, N. (2003). Towards a Common European Security and Defence Policy? The
Debate on NATO, the European Army and Transatlantic Security. Geopolitics, 8(2), 4768.
Treaty on European Union (TEU) provisions on Common Foreign and Security Policy
Tardy Ch 1 and 4
DISCUSSION QUESTIONS
Initial posting by 3-3-14
All responses by 3-10-14
SYNTHESIS QUESTIONS: due 3-10-14 at noon in turnitin.com
The notion of a unified European security actor, in the form of the EU, is something that
has been sought since the end of World War II. The question is can the EU become an
effective security actor without holding complete sovereignty in terms of defense and
security policy given the wide diversity of members and their views on security?
Term paper one due March 10, 2014 by NOON in
turnitin.com
MODULE # 5 Russia
Starts 3-10-2014
Ends 3-31-2014
Required Readings
Antonenko, O. (2009). Towards a comprehensive regional security framework in the
Black Sea region after the Russia-Georgia war. Journal Of Southeast European & Black
Sea Studies, 9(3), 259-269.
Sherr, J. (2011). Hard power in the Black Sea region: a dreaded but crippled instrument.
Journal Of Southeast European & Black Sea Studies, 11(3), 279-298
Makarychev, A., & Morozov, V. (2011). Multilateralism, Multipolarity, and Beyond: A
Menu of Russia's Policy Strategies. Global Governance, 17(3), 353-373.
Antonenko, O., & Giegerich, B. (2009). Rebooting NATO-Russia Relations. Survival
(00396338), 51(2), 13-21.
Rumer, E., & Stent, A. (2009). Russia and the West. Survival (00396338), 51(2), 91-104.
Larrabee, F. (2010). RUSSIA, UKRAINE, AND CENTRAL EUROPE: THE RETURN
OF GEOPOLITICS. Journal Of International Affairs, 63(2), 33-52.
Renz, B., & Thornton, R. (2012). Russian Military Modernization. Problems Of PostCommunism, 59(1), 44-54
Igumnova, L. (2011). Russia's Strategic Culture Between American and European
Worldviews. Journal Of Slavic Military Studies, 24(2), 253-273.
Snetkov, A. (2012). When the Internal and External Collide: A Social Constructivist
Reading of Russia's Security Policy. Europe-Asia Studies, 64(3), 521-542.
Tardy Ch 5
DISCUSSION QUESTIONS
Initial posting by 3-24-14
All responses by 3-31-14
SYNTHESIS QUESTIONS: due by 3-31-14 at noon in turnitin.com
Russia is clearly a major security actor in the international system, however the question
becomes how much influence and where is that influence in terms of the European
region? How is Russia positioned to achieve its security outcomes versus the EU and
NATO and how much of a sphere of influence will they be able to maintain in face
western influence?
MODULE # 6 Cases
MODULE 6 – starts 3-31-14 Ends 4-14-14
Required Reading
Arbatova, N. (2001). European Security after the Kosovo Crisis: The Role of Russia.
Journal Of Southeast European & Black Sea Studies, 1(2), 64.
European Contributions to Operation Allied Force…Rand pdf.
SHEPHERD, A. K. (2009). ‘A milestone in the history of the EU’: Kosovo and the EU's
international role. International Affairs, 85(3), 513-530
COTTEY, A. (2009). The Kosovo war in perspective. International Affairs, 85(3), 593608.
Lessons from Bosnia….Rand pdf
Barry, B. (2011). Libya's Lessons. Survival (00396338), 53(5), 5-14
HALLAMS, E., & SCHREER, B. (2012). Towards a 'post-American' alliance? NATO
burden-sharing after Libya. International Affairs, 88(2), 313-327
NURUZZAMAN, M. (2013). The "Responsibility to Protect" Doctrine: Revived in
Libya, Buried in Syria. Insight Turkey, 15(2), 57-66.
DISCUSSION QUESTIONS
Initial posting by 4-7-14
All responses by 4-14-14
SYNTHESIS QUESTION due 4-14-14 at noon in turnitin.com
Of the security actions related to Kosovo and to Libya by the European states which
gives us the best lessons for European security going forward?
April 25, 2014 – TERM PAPER DUE at NOON
STUDENTS WITH DISABILITIES
University of North Georgia is committed to equal access to its programs, services,
and activities, and welcomes otherwise qualified students with disabilities. Students
who require accommodations and services must register with Disability Services and
submit supporting documentation. Disability Services provides accommodation
memos for eligible students to give to their instructors. Students are responsible for
making arrangements with instructors, and must give reasonable prior notice of the
need for accommodation.
Contact Information for Disability Services:
§ Gainesville Campus: Carolyn Swindle, Assistant Director,
carolyn.swindle@ung.edu, Dunlap-Mathis Building, Room 107, 678-717-3855
§ Dahlonega Campus: Thomas McCoy, Assistant Director,
thomas.mccoy@ung.edu, Stewart Student Success Center, Room 313, 706-8672782
§ Oconee Campus: Erin Williams, Assistant Director, erin.williams@ung.edu,
Administration Building, Room 112, 706-310-6202
§ Cumming Instructional Site: Nicola Dovey, Director nicola.dovery@ung.edu
or Beth Bellamy, Test Facilitator, beth.bellamy@ung.edu 678-717-3855. (For
on-site assistance, contact Rebecca Rose, Head Librarian,
rebecca.rose@ung.edu, Library University Center 400, 470239-3119.
ACADEMIC INTEGRITY POLICY
Student Code of Conduct: Please review the Student Code of Conduct located on
the Dean of Students website.
Plagiarism and Turnitin.com: Students agree that by taking this course all required
papers may be subject to submission for textual similarity review to Turnitin.com for
the detection of plagiarism. All submitted papers will be included as source
documents in the Turnitin.com reference database solely for the purpose of detecting
plagiarism of such papers. Use of the Turnitin.com service is subject to the Terms
and Conditions of Use posted on the Turnitin.com site.
Copyright: Both Federal and State laws forbid the unlawful duplication of
copyrighted computer software or other reproductions of copyrighted material. In
accordance with these policies, University of North Georgia expressly forbids the
copying of such materials supplied by or used in the College. Unlawful duplication
of copyrighted materials by a user may result in disciplinary action by the College
under the Student Code of Conduct (Non-Academic Infractions--Prohibitions,
Theft), and/or possible criminal action by the owner of the copyright.
DISRUPTIVE BEHAVIOR POLICY
Students who exhibit behaviors that are considered to obstruct or disrupt the class or
its learning activities are subject to sanctions under the Board of Regents Policy on
Disruptive Behavior. Behaviors which may be considered inappropriate in the
classroom includes, but is not limited to, sleeping, coming in late, talking out of turn,
inappropriate use of laptops or mobile devices, verbal behavior that is disrespectful
of other students or the faculty member, or other behaviors that may be disruptive.
Students who exhibit such behavior may be temporarily dismissed from the class by
the instructor and will be subject to disciplinary procedures outlined in the Student
Handbook.
Download