THE UNIVERSITY of EDINBURGH

DEGREE REGULATIONS & PROGRAMMES OF STUDY 2014/2015
Archive for reference only
THIS PAGE IS OUT OF DATE

University Homepage
DRPS Homepage
DRPS Search
DRPS Contact
DRPS : Course Catalogue : School of Social and Political Science : Postgrad (School of Social and Political Studies)

Postgraduate Course: Security Governance (PGSP11381)

Course Outline
SchoolSchool of Social and Political Science CollegeCollege of Humanities and Social Science
Credit level (Normal year taken)SCQF Level 11 (Postgraduate) AvailabilityNot available to visiting students
SCQF Credits15 ECTS Credits7.5
SummaryThis course is about how ¿security¿ works as a governmental activity. Security is no longer the ¿exception¿ to the ¿norm¿ of everyday government. Once the exclusive domain of a few secretive agencies and externally facing ministries, security governance now is practiced at local, national, regional and international levels of government; within public and private organisations; and through innovative governmental technologies.

In this course, students will learn about key concepts and practices in security governance. We will make little distinction between ¿domestic¿ and ¿international¿ governance. Students will explore the practical, political and ethical implications of security governance through selected academic literature and government documents. The course will feature input from a variety of security governance practitioners.
Course description Each lecture will be structured around three themes:

Practical: How is this particular topic practiced in security governance?

Political: How have governments adopted these measures? What have been the take-up processes, the political debates, and the degree of consensus/contention?

Ethical: We will look an ethical case study to humanise each topic, focusing on the implications of a type of security governance for a particular individual or group.

Topics covered may include, but are not limited to: intelligence, knowledge and uncertainty; surveillance and privacy; borders and mobility; terrorism; cyber security; contingency planning and resilience; oversight and legislation.
Entry Requirements (not applicable to Visiting Students)
Pre-requisites Co-requisites
Prohibited Combinations Other requirements None
Course Delivery Information
Academic year 2014/15, Not available to visiting students (SS1) Quota:  25
Course Start Semester 2
Timetable Timetable
Learning and Teaching activities (Further Info) Total Hours: 150 ( Seminar/Tutorial Hours 30, Programme Level Learning and Teaching Hours 3, Directed Learning and Independent Learning Hours 117 )
Assessment (Further Info) Written Exam 0 %, Coursework 100 %, Practical Exam 0 %
Additional Information (Assessment) 20%: 48-hour crisis response exercise
10%: Peer reviews of 48-hour crisis response exercise
70%: 2000 word policy brief.
Feedback Not entered
No Exam Information
Learning Outcomes
A critical understanding of the principal theories, concepts and principles of security governance.

Application of a range of standard and specialised research instruments and techniques of enquiry.

Critical analysis, evaluation and synthesis of key issues in security governance.

Ability to communicate, using appropriate methods, to a range of audiences with different levels of knowledge/expertise.

Use of a range of ICT applications to support and enhance work and adjust features to suit purpose.

Taking responsibility for own work and responsibility for the work of others.
Reading List
Indicative reading list:

HM Government. (2010) A Strong Britain in an Age of Uncertainty: The National Security Strategy.

Loader I and Walker N. (2007) Civilizing security, Cambridge: Cambridge University Press. pp 7-18, 195-233.

¿The Butler Report¿. (2004) Report of a Committee of Privy Counsellors, Review of intelligence on weapons of mass destruction, HC 898 London: House of Commons.

Hagmann J and Cavelty MD. (2012) National risk registers: Security scientism and the propagation of permanent insecurity. Security Dialogue 43: 79-96.

Haggerty KD and Ericson RV. (2000) The surveillant assemblage. The British Journal of Sociology 51: 605-622.

Huysmans J. (2006) The politics of insecurity: fear, migration and asylum in the EU, London: Routledge.

de Goede M. (2012) Fighting the network: a critique of the network as a security technology. Distinktion: Scandinavian Journal of Social Theory 13: 215-232.

Favarel-Garrigues G, Godefroy T and Lascoumes P. (2011) Reluctant partners?: Banks in the fight against money laundering and terrorism financing in France. Security Dialogue 42: 179-196.

de Goede M. (2012) Speculative Security: The Politics of Pursuing Terrorist Monies: University of Minnesota Press.

Betz DJ and Stevens T. (2013) Analogical reasoning and cyber security. Security Dialogue 44: 147-164.

Anderson B and Adey P. (2012) Governing events and life: 'Emergency' in UK Civil Contingencies. Political Geography 31: 24-33.

Walker J and Cooper M. (2011) Genealogies of resilience: From systems ecology to the political economy of crisis adaptation. Security Dialogue 42: 143-160.

Neal AW. (2012) Terrorism, lawmaking and democratic politics: legislators as security actors. Terrorism and Political Violence 24: 357-374.
Additional Information
Graduate Attributes and Skills Not entered
KeywordsSecurity, public policy, governance
Contacts
Course organiserDr Andrew Neal
Tel: (0131 6)50 4236
Email: Andrew.Neal@ed.ac.uk
Course secretaryMrs Lindsay Adams
Tel: (0131 6)50 3315
Email: Lindsay.Adams@ed.ac.uk
Navigation
Help & Information
Home
Introduction
Glossary
Search DPTs and Courses
Regulations
Regulations
Degree Programmes
Introduction
Browse DPTs
Courses
Introduction
Humanities and Social Science
Science and Engineering
Medicine and Veterinary Medicine
Other Information
Combined Course Timetable
Prospectuses
Important Information
 
© Copyright 2014 The University of Edinburgh - 12 January 2015 4:36 am