THE INTERNATIONAL BUSINESS FELLOWS PROGRAM SPRING 2011 Instructor: D. Michael Dodd Office: CBA 7.202 Office Hours: By Appointment Phone: 472-1520 E-Mail: dmichaeldodd@sbcglobal.net Teaching Assistants: None Course Number IB 395 Unique Number 04835 ANS 391 32025 LAS 381 40770 MES 380 42194 REE 380 45270 PA 62025 388K Time: Thursday 5:00 - 8:00 p.m. Place: UTC 1.116 Pre-requisite: Graduate Standing Classroom UTC 1.116 Course Objectives The overall purpose of the seminar is to help prepare students to be leaders in their respective professions over the course of their careers. To do that, the seminar will bring together students and faculty from across disciplinary lines to explore the reasons for and the implications of the changing global landscape. The seminar will include lectures, readings and discussions on: (i) international economics, finance, and business; (ii) international political and military affairs; (iii) cultural, historical, and religious factors bringing together and dividing peoples, countries and civilizations around the world; and (iv) demographic developments, environmental challenges, and other risks and challenges putting pressure on world systems and structures at this point of the 21st century. Leadership and this Course The Texas MBA program is designed to develop influential business leaders. The MBA Program has identified four fundamental and broad pillars of leadership: knowledge and understanding, communication and collaboration, responsibility and integrity, and a worldview of business and society. While all four of those pillars are interwoven, this course is designed specifically to focus on the fourth pillar: The worldview of business and society. 1 Materials Required The required reading materials are referenced in the course packet. Additional readings may be provided by guest speakers. Recommended You should read national and international newspapers/magazines/periodicals on a weekly basis. Course Requirements and Grading Your grade in the course will be determined as follows: In-Class Contribution Written Weekly Responses Group Project and Presentation Total Points 33 33 34 100 Historically, most students have received As or A-s; however, students have received Bs and B-s, and one student has failed. Description of Requirements Weekly Readings For each class session, you are to read the material referenced in the Reading Packet for the topic(s) covered that week. You also should read one or more articles taken from the press relevant to the topic that week. You may come across articles relevant to the topics we are studying as you read the Economist, the Financial Times, the New York Times, the Wall Street Journal and other periodicals. I encourage you to bring them to our attention. Active Weekly Participation Each student will be expected on a weekly basis to engage the speaker with both questions and comments. The intent is for there to be dialog and discussion to go into depth with the speaker on the subject of the week. 2 Written Weekly Responses Each student is to prepare a written response to the speaker’s presentation and readings for the week. The response need be only 1-2 pages, however, it can be longer should you so desire. The purpose is to engage the readings and discussion while it is fresh on your mind, and to provide your ideas in response. THE PAPER MUST BE SUBMITTED NO LATER THAN TWO WEEKS AFTER THE SESSION. PAPERS MUST BE SUBMITTED EVEN IF THE STUDENT IS UNABLE TO ATTEND THE SEESION. Group Project and Presentation Each student is to form a Small group (4-5 persons) to develop and present either: (i) a business strategic vision for a company operating internationally or planning to go international or (ii) a public policy proposal for a governmental entity or international NGO. The company or organization can be hypothetical or real. The group is to take into account the following factors, among others which you may determine to be important: (A) three outlooks of the future (blue skies/neutral/falling skies) taking into account (i) political structures, (ii) economic trends and (iii) geopolitical developments and prospective outlooks; (B) ethical dimensions and other valuational priorities implicit and explicit in the structures of the chosen country (e.g., role of women and men in the culture; social equity issues; understandings of right and wrong in different cultures; relative freedom of the individual vis-a-vis rights of the collective; security vs freedom; democratic vs authoritarian values; religious and philosophical sensitivities, beliefs, and values among and between countries and cultures; religious freedom; human rights; military v. civilian authority; stakeholder rights; property rights, and rule of law; (C) structural issues such as educational levels; population and demographic developments; health risks; energy requirements; labor issues; environmental issues; (D) tensions and attractions of and between structures and ideas such as "democracy" and "capitalism," free markets vs protectionism, strategic and security developments, democratic vs authoritarian forms of government, among others, (E) the role of business, civil institutions and organizations, governments, economic systems, families and individuals as you pursue what is important to you and what you hope to accomplish in your career in the 21st Century. 3 As part of the project, the group will be required to interview senior executives of corporations with transnational operations or other senior persons of organizations with international operations or activities. Ideally, that person will act as a mentor to direct and guide you as you develop your project. To the extent feasible, given the makeup of the class, groups must be cross-disciplinary with regard to the area of study of members of the group. Each student in the group will be required to make part of the oral presentation to the class. McCombs Classroom Professionalism Policy The highest professional standards are expected of all members of the McCombs community. The collective class reputation and the value of the Texas MBA experience hinges on this. Faculty are expected to be professional and prepared to deliver value for each and every class session. Students are expected to be professional in all respects. The Texas MBA classroom experience is enhanced when: Students arrive on time. On time arrival ensures that classes are able to start and finish at the scheduled time. On time arrival shows respect for both fellow students and faculty and it enhances learning by reducing avoidable distractions. Students display their name cards. This permits fellow students and faculty to learn names, enhancing opportunities for community building and evaluation of in-class contributions. Students minimize unscheduled personal breaks. The learning environment improves when disruptions are limited. Students are fully prepared for each class. Much of the learning in the Texas MBA program takes place during classroom discussions. When students are not prepared they cannot contribute to the overall learning process. This affects not only the individual, but their peers who count on them, as well. Students attend the class section to which they are registered. Learning is enhanced when class sizes are optimized. Limits are set to ensure a quality experience. When section hopping takes place some classes become too large and it becomes difficult to contribute. When they are too small, the breadth of experience and opinion suffers. Students respect the views and opinions of their colleagues. Disagreement and debate are encouraged. Intolerance for the views of others is unacceptable. Laptops are closed and put away. When students are surfing the web, responding to e-mail, instant messaging each other, and otherwise not devoting their full attention to the topic at hand they are doing themselves and their peers a major disservice. Those around them face additional distraction. Fellow students cannot benefit from the insights of the students who are not engaged. Faculty office hours are spent going over class material with students who chose not to pay attention, rather than truly adding value by helping students who want a better understanding of the material or want to explore the issues in more depth. Students with real needs may not be able to obtain adequate help if faculty time is spent repeating what was said in class. There are often cases where learning is enhanced by the use of laptops in class. Faculty will let you know when it is appropriate to use them. In such cases, professional behavior is exhibited when misuse does not take place. Phones and wireless devices are turned off. We’ve all heard the annoying ringing in the middle of a meeting. Not only is it not professional, it cuts off the flow of discussion when the search for the offender begins. When a true need to communicate with someone outside of class exists (e.g., for some medical need) please inform the professor prior to class. 4 Remember, you are competing for the best faculty McCombs has to offer. Your professionalism and activity in class contributes to your success in attracting the best faculty to this program. Academic Dishonesty I have no tolerance for acts of academic dishonesty. Such acts damage the reputation of the school and the degree and demean the honest efforts of the majority of students. The minimum penalty for an act of academic dishonesty will be a zero for that assignment or exam. The responsibilities for both students and faculty with regard to the Honor System are described on http://mba.mccombs.utexas.edu/students/academics/honor/index.asp and on the final pages of this syllabus. As the instructor for this course, I agree to observe all the faculty responsibilities described therein. During Orientation, you signed the Honor Code Pledge. In doing so, you agreed to observe all of the student responsibilities of the Honor Code. If the application of the Honor System to this class and its assignments is unclear in any way, it is your responsibility to ask me for clarification. Students with Disabilities Students with disabilities may request appropriate academic accommodation from the Division of Diversity and Community Engagement, Services for Students with Disabilities, 471-6259. Upon request, the University of Texas at Austin provides appropriate academic accommodations for qualified students with disabilities. Services for Students with Disabilities (SSD) is housed in the Office of the Dean of Students, located on the fourth floor of the Student Services Building. Information on how to register, downloadable forms, including guidelines for documentation, accommodation request letters, and releases of information are available online at http://deanofstudents.utexas.edu/ssd/index.php. Please do not hesitate to contact SSD at (512) 471-6259, VP: (512) 232-2937 or via e-mail if you have any questions. Honor Code Purpose Academic honor, trust and integrity are fundamental to The University of Texas at Austin McCombs School of Business community. They contribute directly to the quality of your education and reach far beyond the campus to your overall standing within the business community. The University of Texas at Austin McCombs School of Business Honor System promotes academic honor, trust and integrity throughout the Graduate School of Business. The Honor System relies upon The University of Texas Student Standards of Conduct (Chapter 11 of the Institutional Rules on Student Service and Activities) for enforcement, but promotes ideals that are higher than merely enforceable standards. Every student is responsible for understanding and abiding by the provisions of the Honor System and the University of Texas Student Standards of Conduct. The University expects all students to obey the law, show respect for other members of the university community, perform contractual obligations, maintain absolute integrity and the highest standard of individual honor in scholastic work, and observe the highest standards of conduct. Ignorance of the Honor System or The University of Texas Student Standards of Conduct is not an acceptable excuse for violations under any circumstances. The effectiveness of the Honor System results solely from the wholehearted and uncompromising support of each member of the Graduate School of Business community. Each member must abide by the Honor System and must be intolerant of any violations. The system is only as effective as you make it. 5 Faculty Involvement in the Honor System The University of Texas at Austin McCombs School of Business Faculty's commitment to the Honor System is critical to its success. It is imperative that faculty make their expectations clear to all students. They must also respond to accusations of cheating or other misconduct by students in a timely, discrete and fair manner. We urge faculty members to promote awareness of the importance of integrity through in-class discussions and assignments throughout the semester. Expectations under the Honor System Standards If a student is uncertain about the standards of conduct in a particular setting, he or she should ask the relevant faculty member for clarification to ensure his or her conduct falls within the expected scope of honor, trust and integrity as promoted by the Honor System. This applies to all tests, papers and group and individual work. Questions about appropriate behavior during the job search should be addressed to a professional member of the Career Services Office. Below are some of the specific examples of violations of the Honor System. Lying Lying is any deliberate attempt to deceive another by stating an untruth, or by any direct form of communication to include the telling of a partial truth. Lying includes the use or omission of any information with the intent to deceive or mislead. Examples of lying include, but are not limited to, providing a false excuse for why a test was missed or presenting false information to a recruiter. Stealing Stealing is wrongfully taking, obtaining, withholding, defacing or destroying any person's money, personal property, article or service, under any circumstances. Examples of stealing include, but are not limited to, removing course material from the library or hiding it from others, removing material from another person's mail folder, securing for one's self unattended items such as calculators, books, book bags or other personal property. Another form of stealing is the duplication of copyrighted material beyond the reasonable bounds of "fair use." Defacing (e.g., "marking up" or highlighting) library books is also considered stealing, because, through a willful act, the value of another's property is decreased. (See the appendix for a detailed explanation of "fair use.") Cheating Cheating is wrongfully and unfairly acting out of self-interest for personal gain by seeking or accepting an unauthorized advantage over one's peers. Examples include, but are not limited to, obtaining questions or answers to tests or quizzes, and getting assistance on case write-ups or other projects beyond what is authorized by the assigning instructor. It is also cheating to accept the benefit(s) of another person's theft(s) even if not actively sought. For instance, if one continues to be attentive to an overhead conversation about a test or case write-up even if initial exposure to such information was accidental and beyond the control of the student in question, one is also cheating. If a student overhears a conversation or any information that any faculty member might reasonably wish to withhold 6 from the student, the student should inform the faculty member(s) of the information and circumstance under which it was overheard. Actions Required for Responding to Suspected and Known Violations As stated, everyone must abide by the Honor System and be intolerant of violations. If you suspect a violation has occurred, you should first speak to the suspected violator in an attempt to determine if an infraction has taken place. If, after doing so, you still believe that a violation has occurred, you must tell the suspected violator that he or she must report himself or herself to the course professor or Associate Dean of the Graduate School of Business. If the individual fails to report himself or herself within 48 hours, it then becomes your obligation to report the infraction to the course professor or the Associate Dean of the Graduate School of Business. Remember that although you are not required by regulation to take any action, our Honor System is only as effective as you make it. If you remain silent when you suspect or know of a violation, you are approving of such dishonorable conduct as the community standard. You are thereby precipitating a repetition of such violations. The Honor Pledge The University of Texas at Austin McCombs School of Business requires each enrolled student to adopt the Honor System. The Honor Pledge best describes the conduct promoted by the Honor System. It is as follows: "I affirm that I belong to the honorable community of The University of Texas at Austin Graduate School of Business. I will not lie, cheat or steal, nor will I tolerate those who do." "I pledge my full support to the Honor System. I agree to be bound at all times by the Honor System and understand that any violation may result in my dismissal from the Graduate School of Business." The following pages provide specific guidance about the Standard of Academic Integrity at the University of Texas at Austin. Please read it carefully and feel free to ask me any questions you might have. 7 Excerpts from the University of Texas at Austin Office of the Dean of Students website (http://deanofstudents.utexas.edu/sjs/acint_student.php) The Standard of Academic Integrity A fundamental principle for any educational institution, academic integrity is highly valued and seriously regarded at The University of Texas at Austin, as emphasized in the standards of conduct. More specifically, you and other students are expected to "maintain absolute integrity and a high standard of individual honor in scholastic work" undertaken at the University (Sec. 11-801, Institutional Rules on Student Services and Activities). This is a very basic expectation that is further reinforced by the University's Honor Code. At a minimum, you should complete any assignments, exams, and other scholastic endeavors with the utmost honesty, which requires you to: acknowledge the contributions of other sources to your scholastic efforts; complete your assignments independently unless expressly authorized to seek or obtain assistance in preparing them; follow instructions for assignments and exams, and observe the standards of your academic discipline; and avoid engaging in any form of academic dishonesty on behalf of yourself or another student. For the official policies on academic integrity and scholastic dishonesty, please refer to Chapter 11 of the Institutional Rules on Student Services and Activities. What is Scholastic Dishonesty? In promoting a high standard of academic integrity, the University broadly defines scholastic dishonesty—basically, all conduct that violates this standard, including any act designed to give an unfair or undeserved academic advantage, such as: Cheating Plagiarism Unauthorized Collaboration Collusion Falsifying Academic Records Misrepresenting Facts (e.g., providing false information to postpone an exam, obtain an extended deadline for an assignment, or even gain an unearned financial benefit) Any other acts (or attempted acts) that violate the basic standard of academic integrity (e.g., multiple submissions—submitting essentially the same written assignment for two courses without authorization to do so) Several types of scholastic dishonesty—unauthorized collaboration, plagiarism, and multiple submissions—are discussed in more detail on this Web site to correct common misperceptions about these particular offenses and suggest ways to avoid committing them. For the University's official definition of scholastic dishonesty, see Section 11-802, Institutional Rules on Student Services and Activities. Unauthorized Collaboration If you work with another person on an assignment for credit without the instructor's permission to do so, you are engaging in unauthorized collaboration. 8 This common form of academic dishonesty can occur with all types of scholastic work—papers, homework, tests (take-home or in-class), lab reports, computer programming projects, or any other assignments to be submitted for credit. For the University's official definitions of unauthorized collaboration and the related offense of collusion, see Sections 11-802(c)(6) & 11-802(e), Institutional Rules on Student Services and Activities. Some students mistakenly assume that they can work together on an assignment as long as the instructor has not expressly prohibited collaborative efforts. Actually, students are expected to complete assignments independently unless the course instructor indicates otherwise. So working together on assignments is not permitted unless the instructor specifically approves of any such collaboration. Unfortunately, students who engage in unauthorized collaboration tend to justify doing so through various rationalizations. For example, some argue that they contributed to the work, and others maintain that working together on an assignment "helped them learn better." The instructor—not the student—determines the purpose of a particular assignment and the acceptable method for completing it. Unless working together on an assignment has been specifically authorized, always assume it is not allowed. Many educators do value group assignments and other collaborative efforts, recognizing their potential for developing and enhancing specific learning skills. And course requirements in some classes do consist primarily of group assignments. But the expectation of individual work is the prevailing norm in many classes, consistent with the presumption of original work that remains a fundamental tenet of scholarship in the American educational system. Some students incorrectly assume that the degree of any permissible collaboration is basically the same for all classes. The extent of any permissible collaboration can vary widely from one class to the next, even from one project to the next within the same class. Be sure to distinguish between collaboration that is authorized for a particular assignment and unauthorized collaboration that is undertaken for the sake of expedience or convenience to benefit you and/or another student. By failing to make this key distinction, you are much more likely to engage in unauthorized collaboration. To avoid any such outcome, always seek clarification from the instructor. Unauthorized collaboration can also occur in conjunction with group projects. How so? If the degree or type of collaboration exceeds the parameters expressly approved by the instructor. An instructor may allow (or even expect) students to work together on one stage of a group project but require independent work on other phases. Any such distinctions should be strictly observed. Providing another student unauthorized assistance on an assignment is also a violation, even without the prospect of benefiting yourself. If an instructor did not authorize students to work together on a particular assignment and you help a student complete that assignment, you are providing unauthorized assistance and, in effect, facilitating an act of academic dishonesty. Equally important, you can be held accountable for doing so. For similar reasons, you should not allow another student access to your drafted or completed assignments unless the instructor has permitted those materials to be shared in that manner. 9 Plagiarism Plagiarism is another serious violation of academic integrity. In simplest terms, this occurs if you represent as your own work any material that was obtained from another source, regardless how or where you acquired it. Plagiarism can occur with all types of media—scholarly or non-academic, published or unpublished—written publications, Internet sources, oral presentations, illustrations, computer code, scientific data or analyses, music, art, and other forms of expression. (See Section 11-802(d) of the Institutional Rules on Student Services and Activities for the University's official definition of plagiarism.) Borrowed material from written works can include entire papers, one or more paragraphs, single phrases, or any other excerpts from a variety of sources such as books, journal articles, magazines, downloaded Internet documents, purchased papers from commercial writing services, papers obtained from other students (including homework assignments), etc. As a general rule, the use of any borrowed material results in plagiarism if the original source is not properly acknowledged. So you can be held accountable for plagiarizing material in either a final submission of an assignment or a draft that is being submitted to an instructor for review, comments, and/or approval. Using verbatim material (e.g., exact words) without proper attribution (or credit) constitutes the most blatant form of plagiarism. However, other types of material can be plagiarized as well, such as ideas drawn from an original source or even its structure (e.g., sentence construction or line of argument). Improper or insufficient paraphrasing often accounts for this type of plagiarism. (See additional information on paraphrasing.) Plagiarism can be committed intentionally or unintentionally. Strictly speaking, any use of material from another source without proper attribution constitutes plagiarism, regardless why that occurred, and any such conduct violates accepted standards of academic integrity. Some students deliberately plagiarize, often rationalizing this misconduct with a variety of excuses: falling behind and succumbing to the pressures of meeting deadlines; feeling overworked and wishing to reduce their workloads; compensating for actual (or perceived) academic or language deficiencies; and/or justifying plagiarism on other grounds. But some students commit plagiarism without intending to do so, often stumbling into negligent plagiarism as a result of sloppy notetaking, insufficient paraphrasing, and/or ineffective proofreading. Those problems, however, neither justify nor excuse this breach of academic standards. By misunderstanding the meaning of plagiarism and/or failing to cite sources accurately, you are much more likely to commit this violation. Avoiding that outcome requires, at a minimum, a clear understanding of plagiarism and the appropriate techniques for scholarly attribution. (See related information on paraphrasing; notetaking and proofreading; and acknowledging and citing sources.) By merely changing a few words or rearranging several words or sentences, you are not paraphrasing. Making minor revisions to borrowed text amounts to plagiarism. Even if properly cited, a "paraphrase" that is too similar to the original source's wording and/or structure is, in fact, plagiarized. (See additional information on paraphrasing.) Remember, your instructors should be able to clearly identify which materials (e.g., words and ideas) are your own and which originated with other sources. That cannot be accomplished without proper attribution. You must give credit where it is due, acknowledging the sources of any borrowed passages, ideas, or other types of materials, and enclosing any verbatim excerpts with quotation marks (using block indentation for longer passages). 10 Plagiarism & Unauthorized Collaboration Plagiarism and unauthorized collaboration are often committed jointly. By submitting as your own work any unattributed material that you obtained from other sources (including the contributions of another student who assisted you in preparing a homework assignment), you have committed plagiarism. And if the instructor did not authorize students to work together on the assignment, you have also engaged in unauthorized collaboration. Both violations contribute to the same fundamental deception—representing material obtained from another source as your own work. Group efforts that extend beyond the limits approved by an instructor frequently involve plagiarism in addition to unauthorized collaboration. For example, an instructor may allow students to work together while researching a subject, but require each student to write a separate report. If the students collaborate while writing their reports and then submit the products of those joint efforts as individual works, they are guilty of unauthorized collaboration as well as plagiarism. In other words, the students collaborated on the written assignment without authorization to do so, and also failed to acknowledge the other students' contributions to their own individual reports. Multiple Submissions Submitting the same paper (or other type of assignment) for two courses without prior approval represents another form of academic dishonesty. You may not submit a substantially similar paper or project for credit in two (or more) courses unless expressly authorized to do so by your instructor(s). (See Section 11-802(b) of the Institutional Rules on Student Services and Activities for the University's official definition of scholastic dishonesty.) You may, however, re-work or supplement previous work on a topic with the instructor's approval. Some students mistakenly assume that they are entitled to submit the same paper (or other assignment) for two (or more) classes simply because they authored the original work. Unfortunately, students with this viewpoint tend to overlook the relevant ethical and academic issues, focusing instead on their own "authorship" of the original material and personal interest in receiving essentially double credit for a single effort. Unauthorized multiple submissions are inherently deceptive. After all, an instructor reasonably assumes that any completed assignments being submitted for credit were actually prepared for that course. Mindful of that assumption, students who "recycle" their own papers from one course to another make an effort to convey that impression. For instance, a student may revise the original title page or imply through some other means that he or she wrote the paper for that particular course, sometimes to the extent of discussing a "proposed" paper topic with the instructor or presenting a "draft" of the paper before submitting the "recycled" work for credit. The issue of plagiarism is also relevant. If, for example, you previously prepared a paper for one course and then submit it for credit in another course without citing the initial work, you are committing plagiarism—essentially "selfplagiarism"—the term used by some institutions. Recall the broad scope of plagiarism: all types of materials can be plagiarized, including unpublished works, even papers you previously wrote. Another problem concerns the resulting "unfair academic advantage" that is specifically referenced in the University's definition of scholastic dishonesty. If you submit a paper for one course that you prepared and submitted for another class, you are simply better situated to devote more time and energy toward fulfilling other requirements for the subsequent course than would be available to classmates who are completing all course requirements during that semester. In effect, you would be gaining an unfair academic advantage, which constitutes academic dishonesty as it is defined on this campus. 11 Some students, of course, do recognize one or more of these ethical issues, but still refrain from citing their authorship of prior papers to avoid earning reduced (or zero) credit for the same works in other classes. That underlying motivation further illustrates the deceptive nature of unauthorized multiple submissions. An additional issue concerns the problematic minimal efforts involved in "recycling" papers (or other prepared assignments). Exerting minimal effort basically undercuts the curricular objectives associated with a particular assignment and the course itself. Likewise, the practice of "recycling" papers subverts important learning goals for individual degree programs and higher education in general, such as the mastery of specific skills that students should acquire and develop in preparing written assignments. This demanding but necessary process is somewhat analogous to the required regimen of athletes, like the numerous laps and other repetitive training exercises that runners must successfully complete to prepare adequately for a marathon. 12 Schedule Assignments and Seminars Seminar 1: January 20, 2011: Introduction and Overview -Introductions of Fellows and Faculty -Overview of Class Requirements and Case Study Projects -Introductory Overview of the Issues To Be Discussed Seminar 2: January 27, 2010: Case Study: Mexico on the Brink – Implications for Business and the United States Speaker: Fred Burton, Stratfor Global Intelligence Readings in the Packet: “Mexican Drug Wars: Bloodiest Year to Date,” Stratfor Global Intelligence, December 20, 2010 Seminar 3: February 3, 2011: The State of the World: Regional Perspectives: East Asia Speakers: 1. 2. Website: Dr. Patricia Maclachlan, Center for East Asian Studies, The University of Texas at Austin Dr. Robert Oppenheim, Center for East Asian Studies, The University of Texas at Austin The website for the National Bureau of Asian Research (or "NBR"): www.nbr.org. Map of Asia [Source: Current History September 2010] 13 Readings: 1. General a. Joshua Kublantzick, “The Asian Century? Not Quite Yet,” Current History, January 2011, pp. 26-31. b. David Pilling, “Asia: Poised for a Shift,” Financial Times, November 22, 2010,[not in packet; see link] http://www.ft.com/cms/s/0/682dccb6-f66e-11df-846a00144feab49a.html#axzz19RuIB6Mm c. Stephen Roach, “The New Lesson for Resilient Asia,” Financial Times, June 9, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/6db3b66a-733c-11df-ae7300144feabdc0.html#axzz19RwyVVfM 2. Japan a. Mure Dickie, “Japan to shift focus of defence to China,” Financial Times, December 14, 2010, p. 6 [not in packet; see link] http://www.ft.com/cms/s/0/cac4bfec-05d7-11e0-976b00144feabdc0.html#axzz19S3RelMc b. David Pilling, “Why China and Japan are Oceans Apart,” Financial Times, November 11, 2010, p. 11 [not in packet; see link] http://www.ft.com/cms/s/0/6e1b773c-ed03-11df-991200144feab49a.html#axzz19S5E8JUJ c. Martin Fackler, “Japan Goes From Dyanmic to Disheartened,” The New York Times, October 16, 2010 [not in packet; see link] http://www.nytimes.com/2010/10/17/world/asia/17japan.html? d. “Briefing: Japan’s Changing Demography: Cloud or Silver Linings?” The Economist, July 28, 2007, p. 24 - 26. 3. The Koreas a. Jon M. Van Dyke, Mark J. Valencia, Jenny Miller Garmendia, “The North/South Korea Boundary Dispute in the Yellow (West) Sea,” Marine Policy 27 (2003) 143-18. 14 b. Siegfried, S. Hecker, “Lessons learned from the North Korean nuclear crises,” Dadalus Winter 2010 (© 2010 The American Academy of Arts & Sciences), pp. 44-56. c. Siegfried S. Hecker, “A Return Trip to North Korea’s Yonbyon Nuclear Complex,” Center for International Security and Cooperation, Stanford University, November 20, 2010, pp. 1-8. d. Christoph Bluth, “North Korea: How Will It End?” Current History, September 2010, pp. 237-243 e. David E. Sanger, “In Korea, Five Ways to War,” The New York Times, May 30, 2010 wk 1. f. “History of provocation, Financial Times November 24, 2010,, p. 6; “A history of troubles along the border,” Financial Times, May 27, 2010, p.2; “Brothers with arms,” Financial Times, July 7, 2010, p. 5; “The theories,” Financial Times, November 24, 2010, p. 6. g. “Peninsula tensions: how the militaries compare,” Financial Times, May 28, 2010, p. 4. h. Zbigniew Brzezinski, “America’s and China’s first big test,” Financial Times, November 23, 2010 [not in packet; see link] http://www.ft.com/cms/s/0/a7d6c130-f73e-11df-9b0600144feab49a.html#axzz19WBpEaIy i. Robert Kaplan, “Attacks that may signal a Pyongyang implosion,” Financial Times, November 24, 2010, p. 11 not in packet; see link http://www.ft.com/cms/s/0/6959a9a0-f73d-11df-9b0600144feab49a.html#axzz19WEVJmG7 j. David Archer, “Letters: North Korea attack exposes a masterful political move,” Financial Times, November 25, 2010 [not in packet; see link] http://www.ft.com/cms/s/0/3d5518f4-f822-11df-887500144feab49a.html#axzz19WBnZEix k. Chin-Tai Kim and Yeomin Yoon, Letters: “China and Japan Favor a Korean Status Quo,” Financial Times, November 30, 2010, p. 12 [not in packet; see link] http://www.ft.com/cms/s/0/da53acce-fc0a11df-b675-00144feab49a.html#axzz19S8tl79g l. Geoff Dyer, “Beijing anxious to avoid instability,” Financial Times, September 29, 2010, p. 4 [not in packet; see link] http://www.ft.com/cms/s/0/141e6c78-cb1e-11df-95c000144feab49a.html#axzz19WHVLKE1 m. David Pilling, “South has few cards to play as North Korea ups the ante,” Financial times, November 24, 2010, p. 6 ,[not in packet; see 15 n. o. p. q. r. 4. link] http://www.ft.com/cms/s/0/f3b01a5a-f709-11df-8feb00144feab49a.html#axzz19WAiiJR0 Aidan Foster-Carter, “Only China can now save North Korea from itself,” Financial Times, September 29, 2010, p. 11, Victor Cha, “America must show resolve over North Korea,” Financial Times, May 21, 2010, p. 9 not in packet; see link] http://www.ft.com/cms/s/0/51cc0ef4-6444-11df-861800144feab49a.html#axzz19WKDmNWl “Not waving, perhaps drowning,” The Economist, May 29th, 2010, pp. 23ff. Andrei Lankov, “Changing North Korea,” Foreign Affairs, November/December 2009, pp. 95-105. Bruce Cumings, “The North Korea Problem: Dealing with Irrationality,” Current History September 2009, pp. 284-290 China See readings under Seminar 8 5. The U.S. in East Asia a. Katrin Hille and Tim Johnston, “US Ventures into Troubled Asian Waters,” Financial Times, August 4, 2010, p. 2, ,[not in packet; see link] http://www.ft.com/cms/s/0/ac00b990-9f24-11df-873200144feabdc0.html#axzz19S0YJcSp b. See readings under Seminar 8 and Seminar 12 Topic 2 Seminar 4: February 10, 2011: Climate Change, Energy and Environmental Policy Panel: Dr. Michael Evan Webber, Assistant Professor and Associate Director, Department of Mechanical Engineering and Center for International Energy and Environmental Policy, The University of Texas at Austin and others to be announced 16 Readings: 1. Energy a. David Victor and Linda Yueh, “The New Energy Order: Managing Insecurities in the Twenty-first Century,” Foreign Affairs, January/February 2010, pp. 61-73. b. Oil: The Long Goodbye”, a selection of articles in Foreign Policy September/October 2009: “It’s Still the One,” Daniel Yergin, pp. 88-95; “The Strait Dope,” Eugene Gholz, p. 105; “The Coming Supply Crunch,” Faith Birol, p. 105; “What Comes Next,” p. 129; “Seven Myths About Alternative Oil,” Michael Grumwald, pp. 130133; “Is a Green World a Safer World?”vid J. Rthkopf, pp. 134-137; “Want to Know More,” p. 138. 2. Climate/Environmental Issues a. Climate Change, The New York Times, see articles and other materials (including “Global Warming Updated: Dec. 13, 2010 which is in the packet but the other materials are not) at http://topics.nytimes.com/top/news/science/topics/globalwarming/in dex.html?scp=2&sq=To%20fight%20climate%20change%20clear% 20the%20air&st=cse b. “2010 in the top three warmest years, 2001-2010 warmest 10-year period,” World Meteorological Organization Press Release No. 904 [not in packet; see link] http://www.wmo.int/pages/mediacentre/press_releases/pr_904_en. html c. Judah Cohen, “Bundle Up, Its Global Warming,” The New York Times, December 25, 2010 [not in packet; see link] http://www.nytimes.com/2010/12/26/opinion/26cohen.html?ref=glob alwarming&pagewanted=print d. Veerabhadran Ramanathan and David G. Victor, “To Fight Climate Change, Clear the Air,” The New York Times,” November 28, 2010 wk 9. 17 e. Bettina Wassener, “Concern Over the Environment Rises in Asia,” The New York Times, November 7, 2010 [not in packet; see link] http://www.nytimes.com/2010/11/08/business/energyenvironment/08green.html?ref=globalwarming&pagewanted=print f. Stephen Peake, “Turbulence in the Climate Regime,” Current History, November 2010, pp. 349-353. g. “Is it worth it?”; “Good policy, bad policy”, from “Getting warmer: A Special Report on Climate Change and the Carbon Economy,” The Economist, December 5, 2009. Seminar 5: February 17, 2011: Nuclear Proliferation Speaker: Dr. Shelton Williams, Founder, The Osgood Center, Washington, D.C. Readings: General 1. 2. Gregory L. Schulte, “Stopping Proliferation Before It Starts, Foreign Affairs, January/February 2011, pp. 85-95 Graham Allison, “Nuclear Disorder: Surveying Atomic Threats,” Foreign Affaris, January/February 2010, pp. 74-85. Iran 3. 4. 5. Eric S. Edelman, Andrew F. Krepinevich, and Evan Braden Montgomery, “The Dangers of a Nuclear Iran,” Foreign Affairs, January/February 2011, pp. 67-81 “The Containment Conundrum: How Dangerous is a Nuclear Iran: “Overkill” by Barry R. Posen; “The Right Kind of Containment,” by Barry Rubin; Lindsay and Takeyh Reply,” Foreign Affairs, July/August 2010, pp. 160-168 Alan Kuperman, “There’s Only One Way to Stop Iran,” The New York Times, December 24, 2009, p. A-19, http://www.nytimes.com/2009/12/24/opinion/24kuperman.html?scp =1&sq=Alan%20Kuperman&st=cse 18 6. 7. Michael O’Hanlon and Bruce Riedel, “Do not even think about bombing Iran,” Financial Times, March 1, 2010, p. 11, http://www.ft.com/cms/s/0/5426be44-24d2-11df-8be000144feab49a.html#axzz19X1LKmVU David E. Sanger, “Imagining an Israeli Strike on Iran,” The New York Times, March 27, 2010, wk 3, http://www.nytimes.com/2010/03/28/weekinreview/28sangerintro.h tml?scp=1&sq=The%20what%20if%20of%20an%20Israeli%20atta ck&st=cse North Korea, Pakistan, and India See materials under those respective seminars Seminar 6 February 24, 2011: The State of the World Economy: Speakers: 1. 2. Dr. James Galbraith, Lloyd M. Bentsen, Jr. Chair in Governmental Business Relations, The Lyndon B. Johnson School of Public Affairs, The University of Texas at Austin Dr. Lewis J. Spellman, Professor of Finance and Interdisciplinary Professor of Law, The University of Texas at Austin See: 1. See Dr. Spellman’s website: LewSpellman.com. See in particular the second lecture from Summer 2009 entitled “Why Economists and Wall Street Missed the Biggest Economic and Financial Disintegration Since the Great Depression” 2. James Galbraith, The Predator State (Free Press, 2009) [not in packet]. 19 Readings: 1. 2. 3. 4. 5. 6. 7. 8. Martin Wolf, “In the grip of a great convergence,” Financial Times, January 5, 2011, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/072c87e6-1841-11e0-88c900144feab49a.html?ftcamp=rss&ftcamp=crm/email/201115/nbe/Co mment/product#axzz1AAqodrqr Lucien Crowder, “Gazing Across the Divides,” Current History, January 2011, pp. 6-8. Uri Dadush, “Global Rebalancin: The Dangerous Obsession,” Current History, pp. 14-19 The big question: Is globalization on the retreat in 2011: a series of comments in Fnancial Times January 3, 2011 p. 11, including: Gideon Rachman; Peter Mandelson, “Politics: a good genie, already out of its bottle;” Joseph Stiglitz, “Economics: We face a marked global reversal;” Nandan Nilekani, “Asia: Eastern billions can still join the world;” Eric Schmidt, “Technology: Only closed systems can hold us back,” [not in packet, see link] to the series] http://www.ft.com/cms/s/0/ecb63ce0-172d-11e0-badd00144feabdc0.html#axzz1AAu0xGHX Richard Milne, Financial Times January 3, 2011 p. 8 [not in packet; see link] http://www.ft.com/cms/s/0/251574be-175d-11e0badd-00144feabdc0.html#axzz1AAs2pb51 Jamil Anderlini, “Nations search for a new world order,” Financial Times, September 13, 2010 [not in packet; see link] http://www.ft.com/cms/s/0/64bde654-bec6-11df-a75500144feab49a.html#axzz19XXUXfdy Martin Wolf, “Three years on, fault lines threaten the world economy,” Financial Times, July 14, 2010, p. 7 [not in packet; see link] http://www.ft.com/cms/s/0/39c67712-8eb1-11df-8a6700144feab49a.html#axzz19XUk3rKC Carmen Reinhart and Vincent Reinhart, “Beware those who think the worst is past,” Financial Times, August 31, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/7b9bbc72-b460-11df8208-00144feabdc0.html#axzz19Xdel6mZ 20 9. 10. 11. 12. 13. 14. 15. 16. 17. Nouriel Roubini and Ian Bremmer, “Sagging global growth requires us all to act,” Financial Times, July 13, 2010, p. 11 [not in packet; see link] http://www.ft.com/cms/s/0/eaf81fbe-8de3-11df-915300144feab49a.html#axzz19Xe8wJ8U Olivier Blanchard and Carlo Cottarelli, “The great false choice, stimulus or austerity,” Financial Times, August 12, 2010, p. 7 [not in packet; see link] http://www.ft.com/cms/s/0/ea8e8acc-a57b-11dfa5b7-00144feabdc0.html#axzz19Xej4oKv “The austerity debate: FT Series on the fierce argument between deficit-cutting and stimulus, [not in packet; see link for at length discussion between economists and others] http://www.ft.com/cms/s/0/dc3ac844-9010-11df-91b600144feab49a.html#axzz19Y4bhB3q Chris Giles, “Global Economy: That elusive spark,” Financial Times, October 6, 2010, p. 11 2010 [not in packet; see link] http://www.ft.com/cms/s/0/4d6fd6be-d0b0-11df-866700144feabdc0.html#axzz19Xfc9aTc Martin Wolf, “Why it is right for central banks to keep printing,” Financial Times, June 23, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/969c17c6-7e2b-11df-94a800144feabdc0.html#axzz19Xgz6akP Nouriel Roubini and Arnab Das, “Solutions for a crisis in its sovereign stage,” Financial Times, June 1, 2010, p. 11 [not in packet; see link] http://www.ft.com/cms/s/0/8eda2c3e-6cde-11df91c8-00144feab49a.html#axzz19XqOuaGd Mohamed El-Erian, “How to handle the sovereign debt explosion,” Financial Times, March 11, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/9d3f6378-2cad-11df-8abb00144feabdc0.html#axzz1A6ukA6vo Alan Beattie,”Imbalances cloud 20/20 vision,” Financial Times, November 10, 2010, p. 9 [not in packet; see link: it has important charts, maps and statistics]; http://www.ft.com/cms/s/0/32a3c85aec39-11df-9e11-00144feab49a.html#axzz19XxnacjU Alan Beattie, “Going head to head,” Financial Times, October 8, 2010, p. 9 [not in packet, see link] http://www.ft.com/cms/s/0/d63bf800-d241-11df-8fbe00144feabdc0.html#axzz19XzNWJuB 21 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. John Plender, “History Lessons for a world out of balance,” Financial Times, November 11, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/75561136-edd2-11df-961200144feab49a.html#axzz19Xv51Azs Martin Wolf, “The grasshoppers and the ants – a contemporary fable,” Financial Times, May 26, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/202ed286-6832-11df-a52f00144feab49a.html#axzz19Y0rVYlm Martin Wolf, “The grasshoppers and the ants – elucidating the fable,” Financial Times, June 2, 2010, p. 11 9 [not in packet; see link] http://www.ft.com/cms/s/0/fc22c66c-6ddc-11df-b5c900144feabdc0.html#axzz19Y1Z6NAn Gillian Tett, “How Japan illustrates the conundrum of deflation,” Financial Times, October 15, 2010, p. 24 [not in packet; see link] http://www.ft.com/cms/s/0/8d87c9a4-d7af-11df-b47800144feabdc0.html#axzz19XrJiiKl Geoff Dyer, “State Capitalism: China’s ‘market’Leninism’ has yet to face biggest test,” Financial Times, September 13, 2010 9 [not in packet; see link] http://www.ft.com/cms/s/0/439ccee0-bec6-11dfa755-00144feab49a,dwp_uuid=9bee261a-bec7-11df-a75500144feab49a.html#axzz19XYZOPLH Martin Wolf, “Is there the will to save the Eurozone?” Financial Times, December 8, 2010, p. 12, [not in packet; see link] http://www.ft.com/cms/s/0/0c382c9c-0237-11e0-aa4000144feabdc0.html#axzz19c2HWz1X Paul Krugman, “The Making of a Euromess,” The New York Times, February 15, 2010, p. A19 Paul Krugman, “The Euro Trap,” The New York Times, April 30, 2010, p. A21 Kenneth Rogoff, “Europe finds that the old rules still apply,” Financial Times, May 6, 2010 [not in packet; see link] http://www.ft.com/cms/s/0/be41b758-58a7-11df-a0c900144feab49a.html#axzz19cHcVdDa Martin Wolf, “Why the Irish crisis is a huge test for the Eurozone,” Financial Times, December 1, 2010, p. 13 [not in packet; see link] http://www.ft.com/cms/s/0/259c645e-fcbb-11df-bfdd00144feab49a.html#axzz19cI3LUYi 22 28. 29.. Samuel Brittan, “The futile attempt to save the Eurozone,” Financial Times, November 5, 2010, p. 13 [not in packet; see link] http://www.ft.com/cms/s/0/def42cae-e84b-11df-899500144feab49a.html#axzz19cIXAp5n Steven Erlanger, “European Fear Crisis Threatens Liberal Benefits of European Life, The New York Times, May 30, 2010, p. A-1 [not in packet; see link] http://www.nytimes.com/2010/05/23/world/europe/23europe.html?_ r=1&scp=1&sq=Steven%20Erlanger%20Crisis%20threatens%20lib eral%20benefits%20of%20european%20life&st=cse Seminar 7 March 3, 2011: The State of the World: Regional Perspectives: Latin America; Russia Eastern Europe and Eurasia Speakers: 1. 2. Dr. Charles R. Hale, Chair for Western Hemispheric Trade Studies; Director, Teresa Lozano Long Institute for Latin American Studies, The University of Texas at Austin Thomas J. Garza, Associate Professor of Slavic Languages & Literature, The University of Texas at Austin Maps Latin America [Source: Current History, February 2010] Russia [Source: Current History, October 2010] Readings for Latin America: 1. 2. 3. Oscar Arias, “Culture Matters: The Real Obstacles to Latin American Development,” Foreign Affairs, January/February 2011, pp. 2-6. Theodore J. Piccone, “Perilous Times for Latin America,” Current History February 2010, pp. 81-83 Abraham F. Lowenthal, “Obama and the America’s,” Foreign Affairs, July/August 2010, pp. 110-124. 23 4. 5. 6. 7. 8. 9. 10. 11. 16. Julia E. Sweig, “A New Global Player,” Foreign Affairs, November/December 2010, pp. 173-184. John Paul Rathbone and Jonathan Wheatley, Brazil: Great Expectations, Financial Times, September 29, 2010, p. p [not in packet; see link] http://www.ft.com/cms/s/0/77a6ac84-cb36-11df95c0-00144feab49a.html#axzz19cbraZF4 John Paul Rathbone, “Latin America’s tumble puts decoupling thesis to test, Financial Times, November 18, 2010 [not in packet; see link] http://www.ft.com/cms/s/0/342ee07e-f33c-11df-a4fa00144feab49a.html#axzz19cctvAvK John Paul Rathbone, “Latin America: No longer the man with a moustache and a guitar,” Financial Times, November 22, 2010 [not in packet; see link – NOTE see “More in this Section at end of article for further readings on Latin America] http://www.ft.com/cms/s/2/43677f8c-f658-11df-846a00144feab49a.html#axzz19cdfSVZN Brazil: Special Report: Financial Times November 15, 2010 [not in packet; see link [ NOTE: see “More in this section” at bottom of article for links to other articles on Brazil] http://www.ft.com/cms/s/0/8d90d386-edfe-11df-861600144feab49a.html#axzz19cfGsrtY Peru: Special Report, Financial Times September 22, 2010 [not in packet; see link] http://www.ft.com/reports/peru-2010 Matthew Garrahan, “Interview: Hugo Chavez, President of Venezuela and with Rafael Correa, President of Ecuador, Financial Times June 19, 2010 [not in packet; see link to video] http://video.ft.com/v/96393765001/Jun-19-On-the-road-in-SouthAmerica-with-Oliver-Stone Francis Fukuyama, Book Essay: “A Quiet Revolution: Latin America’s Unheralded Progress”, a review of Michael Reid, Forgotten Continent: The Battle for Latin America’s Soul, Foreign Affairs, November - December 2007, pp. 177 - 182 Paulo Sergio Pinheiro, “Youth, Violence, and Democracy”, Current History, February 2007, pp. 64 - 69. 24 Readings on Russia: 1. 2. 3. 4. 5. 6. 7. 8. 9. Leon Aron, “The Russian Masterpiece You’ve Never Heard Of,” Foreign Policy , November 2010, pp. 96-103 Anatol Lieven, “How the rule of law may come eventually to Russia,” Financial Timex, December 6, 2010, p. 11 Andrei Shleifer and Daniel Treisman, “Why Moscow Says No,” Foreign Affairs, January/February 2011, pp. 122-138. Dmitri Trenin, “How to Bury the Cold War,” Current History, October 2010, pp. 308-309 Walter Laqqueur, “Moscow’s Modernization Dilemma,” Foreign Affairs, November/December 2010, pp. 153-160. Nicholas Eberstadt, “The Enigma of Russian Mortality,” Current History, October 2010, pp. 288-294. Andrei Soldatov and Irina Borogan, “Russia’s New Nobility,” Foreign Affairs, September/October 2010, pp. 80-96. Charles King and Rajan Menon, “Prisoners of the Caucasus,” Foreign Affairs, July/August 2010, pp. 20-34. Investing in Russia: Special Report, Financial Times, October 1, 2010 [not in packet] Seminar 8 Speaker: March 10, 2011: The State of the World: Regional Perspectives: China Dr. William Hurst, Department of Government, College of Liberal Arts, The University of Texas at Austin Map [See Map of Asia under Seminar 2] Readings: 1. Robert D. Kaplan, “The Geography of Chinese Power,” Foreign Affairs, May/June 2010, pp. 22-41. 2. Elizabeth C. Economy, “The Game Changer: Coping with China’s Foreign Policy Revolution,” Foreign Affairs, November/December 2010, pp. 142-152. 3. Ken Miller, “Coping with China’s Financial Power,” Foreign Affairs, July/August 2010, pp. 96-109. 25 4. Wang Feng, “China’s Population Destiny: The Looming Crisis,” September 2010, pp. 244-251. 5. Simon Tay, “Review Essay: Interdependence Theory: China, India, and the West,” Foreign Affairs, September/October 2010, pp. 138-143 6. Shalendra D. Sharma, “The Uncertain Fate of ‘Chindia’.” Current History, September 2010, pp. 252-257. 7. Joseph Nye, “China’s century is not yet upon us,” Financial Times, May 19, 2010, p. 11 [not in packet; see link] http://www.ft.com/cms/s/0/dc1a5b64-62dd-11df-b1d100144feab49a.html#axzz19dCveTdu 8. Niall Ferguson, “The decade the world tilted east,” Financial Times, December 29, 2009, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/35596712-f351-11de-a88800144feab49a.html#axzz19dDIOs61 9. David Shambaugh, “The Chinese tiger shows its claws,” Financial Times, February 17, 2010, p. 11 [not in packet; see link] http://www.ft.com/cms/s/0/d55d5578-1b62-11df-838f00144feab49a.html#axzz19dDqQTgh 10. David Pilling, “Time to be wary of China’s new swagger,” Financial Times, September 30, 2010, p. 9,[[also titled A recipe for trouble in China’s backyard” at link] [not in packet; see link] http://www.ft.com/cms/s/0/8dda2188-cbf5-11df-bd2800144feab49a.html#axzz19dENne4R 11. Jonathan Fenby, “Political reform is China’s fatal flaw,” Financial Times, October 15, 2010, p. 11, [also titled “Political stasis is China’s Achilles Heel” in link] [not in packet; see link] http://www.ft.com/cms/s/0/e39d0f22-d77b-11df-858200144feabdc0.html#axzz19dFmufNY 12. Martin Wolf, “How China must change if it is to sustain its ascent,” Financial Times, September 22, 2010, p. 11 [titled “Wen is right to worry about China’s growth” at link] [ not in packet; see link] http://www.ft.com/cms/s/0/a1df57c0-c5b5-11df-ab4800144feab49a.html#axzz19dGs6QbG 13 Kevin Brown, “China heading for slowdown, says ADB,” Financial Times, September 29, 2010, p.4, [titlec ADB warns of China’s long-term growth” in link] [not in packet; see link] http://www.ft.com/cms/s/0/7d660492-cad4-11df-bf3600144feab49a.html#axzz19dHwXUfa 26 14. Ethan Devine, “The Japan Syndrome,” Foreign Policy September 30, 2010 [not in packet; see link] http://www.foreignpolicy.com/articles/2010/09/30/the_japan_syndrome 16. David Piling, “The Chinese Way,” Review of four books on China, Financial Times, July 3 2010, [not in packet; see link] http://www.ft.com/cms/s/2/8b95460e-8560-11df-aa2e00144feabdc0.html#axzz19dJPnsNi 17. Geoff Dyer, “World Economy: The China Cycle,” Financial Times, September 13, 2010, p. 9 [not in packet; see link] http://www.ft.com/cms/s/0/57f55ab0-be99-11df-a75500144feab49a.html#axzz19dKHZ01B 18. Alan Beattie, Global Economy: Trading Blows,” Financial Times, July 6, 2010, p. 8 [not in packet; see link] http://www.ft.com/cms/s/0/7eebef048865-11df-aade-00144feabdc0.html#axzz19dKqXCkp 19. James Kynge, China and the West: Full Circle, Financial Times, January16/17, 2010, p. 8 [not in packet; see link] http://www.ft.com/cms/s/0/dc906ade-0225-11df-8b5600144feabdc0.html#axzz19dLPQhjW March 17, 2011 SPRING BREAK Seminar 9 March 24, 2011: World Speaker: National Security Issues in a Changing Prof. (Admiral (Ret.)) Bobby Inman, LBJ Centennial Chair in National Policy, LBJ School of Public Affairs, The University of Texas at Austin Readings: 1. Intelligence and Security a. National Security Strategy, May 2010 [not in packet; see link] http://www.whitehouse.gov/sites/default/files/rss_viewer/national_s ecurity_strategy.pdf b. Bobby R. Inman, “Spying for a Long, Hot War”, The New York Times, October 9, 2001, p. A-35 27 c. Bates Gill, “Diffuse Threats, Frail Institutions: Managing Security in the New Era,” Current History, November 2010, pp. 329335. d. Paul Godwin, “Asia’s Dangerous Security Dilemma,” Current History, September 2010, pp. 264-266 e. Robert Gates, “Helping Others Defend Themselves: The Future of U.S. Security Assistance,” Foreign Affairs, May/June 2010, pp. 2-6 f. Daniel Dombey, “US Intelligence: Tribal Warfare,” Financial Times, March 11, 2010, p. 6 [not in packet; see link] http://www.ft.com/cms/s/0/0a252d6e-2c6e-11df-be4500144feabdc0.html#axzz19dTdBK8S 2. Failed States “The Failed States Index 2010", Foreign Policy, July - August 2010, pp. 76-79 3. Pandemic Robin Cook, “Plague,” Foreign Policy, November 2009, pp. 63-67.S 4. Terrorism a. “The FP Survey: Terrorism,” Foreign Policy , January/February 2011, p. 96 b. “The Almanec of Al Qaeda”, Foreign Policy, May/June 2010, pp 68-71. 5. Cyber War a. Wikileaks cables, [not in packet; see link] http://query.nytimes.com/search/sitesearch?query=wikileaks%20ca bles b. Bruce Schneier, “It will soon be too late to stop the cyberwars,” Financial Times, December 3, 2010, p. 9 http://www.ft.com/cms/s/0/f863fb4c-fe53-11df-abac00144feab49a.html#axzz19ddcR0fU 28 c. William F. Lynn III, “Defending a new Domain: The Pentagon’s Cyberstrategy,” Foreign Affairs, September/October 2010, pp. 97- 108. 6. Oil Chip Cummins, “Choke Points: As Threats to Oil Supply Grow, A General Says U.S. Isn’t Ready”, The Wall Street Journal, December 19, 2006, p. A1. 7. Global Warming Michael T. Klare, “Global Warming Battlefields: How Climate Change Threatens Security,” Current History November 2007, pp. 355-361. 8. Power Shift a. Erik Gartzke, “Power Shuffle: Will the Coming Transition Be Peaceful?” Current History November 2009, pp. 374-380. b. See, materials under Seminar 12, Topic 2 9. Changing Demographics Neil Howe and Richard Jackson, “Global Aging and the Crisis of the 2020s,” Current History, January 2011, pp. 20-25. 10. Regional and Country Analysis See Readings from other sessions. Seminar 10 March 31, 2011: Speaker: Globalization and Labor Issues Dr. Christopher T. King, Director, Ray Marshall Center for The Study of Human Resources, LBJ School of Public Affairs, The University of Texas at Austin 29 Readings: 1. 2. OECD , Employment Outlook, 2010 Edition See:, http://www.oecd.org/document/46/0,3343,en_2649_34747_40401454_1_1 _1_37457,00.html#press_material Other materials to be announced Seminar 11 April 7, 2011 The State of the World: Regional Perspectives: India Speaker: Dr. Jennifer Bussell, The LBJ School of Public Affairs, The University of Texas at Austin Map [See Map of Asia in Seminar 3] Readings: 1 2. 3. 4. 5. 6. 7. Rahul Mukherji, “A Tiger Despite the Chains: The State of Reform in India,” Current History, April 2010, pp. 144-150 See. Shalendra D. Sharma, “The Uncertain Fate of ‘Chindia’.” Current History, September 2010, pp. 252-257, under Seminar 8. Aaron L. Friedberg, “The New Great Game,” Book Review of Robert D. Kaplan’s Monsoon, The New New York Times Book Review, November 21, 2010, p. 21 Sumit Ganguly, “What if Pakistanis Strike India Again?” Current History, April 2010, pp. 170-172. Robert D. Kaplan, “Center Stage for the Twenty-first Century,” Foreign Affairs, March/April 2009, pp. 16-32. Martin Wolf, How India must change if it is to be an advanced Economy, Financial times July 8, 2009 [not in packet; see link] http://www.ft.com/cms/s/0/2739f53e-6b57-11de-861d00144feabdc0.html#axzz19dGTowpq Edward Luce, In Spite of the Gods (Doubleday 2007) pp. 257-356 Seminar 12 April 14, 2011 1. 2. The State of the World: Regional Perspectives: Africa The Changing Nature of the International Political System and the Role of the United States in World Affairs: A Second Look 30 1. Dr. Vijay Mahajan, John B. Harbin Centennial Chair in Business, McCombs School of Business, The University of Texas at Austin 2. Dr. Francis Gavin, Director, The Robert Strauss Center for International Law and Security, The LBJ School of Public Affairs, The University of Texas at Austin Map of Africa [Source: Current History, May 2010] Readings for Topic 1: Vijay Mahajan, Africa Rising: How 900 Million African Consumers Offer More Than You Think (Wharton School Publishing, 2008) Readings for Topic 2: 1. Traditional Approaches to International Relations a. David P. Calleo, “How to Govern a Multipolar World,” Current History, November 2009, pp. 361-367. b. Stephen M. Walt, “International Relations: One World, Many Theories,” Foreign Policy, Spring 1998, pp. 299-46. 2. Geographic Approaches to International Relations a. Robert D. Kaplan, “The Revenge of Geography,” Foreign Policy, May/June 2009, pp. 96-105; 3. Into the 21st Century a. b. Stephen F. Szabo, “Welcome to the Post-Western World,” Current History, January 2011, pp. 9-13 William W. Finan, Jr., Book Review: “Set Your Alarm Clocks for 2103,” a review of Ian Morris’ Why the West Rules – For Now: The Patterns of History and What They Reveal About the Future, Current Affairs, January 2011, pp. 38-39. 31 c. Philip Stephens, “National Interests collide in the new world disorder,” Financial Times, September 17, 2010, p. 9, http://www.ft.com/cms/s/0/9b2a8d70-c1c6-11df-9d9000144feab49a,s01=1.html#axzz19jAHTPex d. G. John Ikenberry, “A Crisis of Global Governance?” Current History, November 2010, pp. 315-321. Joseph S. Nye, Jr., “The Future of American Power,” Foreign Affairs, November/December 2010, pp. 2-12 David Shambaugh, “A New China Requires a new US Strategy,” Current History, September 2010, pp. 219-226. Michael Mandelbaum, “Overpowered?” Book Review Essay of several books on the US and International Relations, Foreign Affairs, May/June 2010, pp. 114-119 See, readings under Seminar 3, 5, 8, and 9 e. f. g. h. Seminar 13 April 21, 2011 International Trade, Finance and Economics Speaker: Dr. Michael Brandl, McCombs School of Business, The University of Texas at Austin Readings: TBA Seminar 14: April 28, 2011: Seminar 15: May 5, 2011: Presentations Presentations 32