The course aims to define and elaborate on the concept of military security as it developed after the Second World War. The time span is determined by the ineluctable revolution that the discovery and use of nuclear weapons ushered both in terms of military doctrine and of power politics. Starting with a reflection on the reasons of the early failure of collective security, the course will first focus on the crucial hallmarks of security in a bipolar international system, making a clear distinction between States included in, and excluded from, a multilateral alliance. It will then take into consideration the major challenges posed to military security by newly emerging threats as the former was consolidating after the end of the Cold War.
scheda docente
materiale didattico
Il corso è impartito in lingua inglese.
- Mary Kaldor and Iavor Rangelov (edited by), The Handbook of Global Security Policy, Wiley Blackwell, 2014 – excluding the following chapters: 4, 8, 9, 11, 12, 13, 15, 17, 19, 24, 26, 28.
- Mark Mazower, Governing the World. The History of an Idea, Penguin Books, 2012 – pp. 191-342 (this is a required reading for students without a sound knowledge of the international history between world war II and the late 1970s)
For the in-class discussions, students will have to read the following essays:
- Daniel Abrahams, “From discourse to policy: US policy communities’ perceptions of and approaches to climate change and security,” Conflict, Security & Development, Vol. 19, No. 4, (2019): 323–345.
- Fiona B. Adamson, “Crossing Borders: International Migration and National Security”, International Security, 31: 1 (Summer 2006), pp. 165-199.
- David A. Baldwin, “The Concept of Security”, Review of International Studies, Vol. 23, n. 1, (January 1997), pp. 5-26.
- Madeline Carr and F. Lesniewska, “Internet of Things, cybersecurity and governing wicked problems: learning from climate change governance,” International Relations, Vol. 34, No. 3 (2020), pp. 391–412.
- Excerpts of the Human Development Report 1994, Published for the United Nations Development Programme
- Michael MccGwire, “Deterrence: The Problem- Not the Solution”, International Affairs, Vol. 62, n. 1, (Winter, 1985-1986), pp. 55-70.
- Nick Ritchie, “A hegemonic nuclear order: Understanding the Ban Treaty and the power politics of nuclear weapons,” Contemporary Security Policy, Vol. 40, No. 4 (2019): pp. 409-434.
- Uri Tor, “‘Cumulative Deterrence’ as a New Paradigm for Cyber Deterrence,” Journal of Strategic Studies, Vol. 40, No. 1-2 (2017): pp. 92-117.
- Michael C. Williams, “Words, Images, Enemies: Securitization and International Politics,” International Studies Quarterly, Vol. 47, No. 4 (Dec. 2003), pp. 511-531.
Testi consigliati:
- Robert J. Art and Kenneth N. Waltz (edited by), The Use of Force. Military Power and International Politics, sixth edition, Rowman & Littlefield, 2004
- Madeline Carr, “Public-Private Partnerships in National Cybersecurity Strategies”, International Affairs, 92: I (2016), pp. 43-62
- Andrew Cottey, Security in 21st Century Europe, second edition, Palgrave, 2013
- Christopher Daase, “National, Societal, and Human Security: On the Transformation of Political Language”, Historical Social Research, Vol. 35, n. 4, (134), 2010, pp. 22-37
- Niall Ferguson, Charles S. Maier, Erez Manela, Daniel J. Sargent (editors), The Shock of the Global. The 1970s in Perspective, Belknap Press of Harvard University Press, 2010
- Avery Goldstein, “Discounting the Free Ride: Alliances and Security in the Postwar World”, International Organization, Vol. 49, n. 1, (Winter 1995), pp. 39-71
- Hilde Haaland Kramer and Steve A. Yetiv, “The UN Security Council Response’s to Terrorism: before and after September 11, 2001”, Political Science Quarterly, 122: 3 (Fall 2007), pp. 409-432
- Henry Kissinger, Diplomacy, New York, Simon & Schuster, 1994
- Geir Lundestad (edited by), International Relations Since the End of the Cold War. New and Old Dimensions, Oxford University Press, 2013
- Voitech Mastny and Zhu Liqun (edited by), The Legacy of the Cold War. Perspectives on Security, Cooperation, and Conflict, Lexington Books, 2014
- Paul Rosenzweig, Cyber Warfare. How Conflicts in Cyberspace Are Challenging America and Changing the World, Praeger, 2013
- Jan Ruzicka, “Behind the veil of good intentions: power analysis of the nuclear non-proliferation regime,” International Politics, Vol. 55 (2018): pp. 369–385
- Eric Taylor Woods, Robert Schertzer, Liah Greenfeld, Chris Hughes, Cynthia Miller-Idriss, “COVID-19, nationalism, and the politics of crisis: A scholarly exchange,” Nations and Nationalism, Vol. 26 (2020), pp. 807-825
- Scott M. Thomas, “A Globalized God. Religion’s Growing Influence in International Politics”, Foreign Affairs, Vol 89, n. 6, Nov-Dec 2010, pp. 93-101
- David S. Yost, “NATO’s Evolving Purposes and the Next Strategic Concept”, International Affairs, 86:2 (March 2010), pp. 489-522.
Programma
Il corso si concentra sugli aspetti più importanti che la sicurezza ha assunto nel sistema internazionale dalla fine della seconda guerra mondiale. Nell'adottare un approccio storico, il corso intende offrire agli studenti una panoramica e una disamina di un processo che è insieme effetto e propulsore di un paradigma di azione politica. La fine della seconda guerra mondiale è stata selezionata come il punto di partenza dell'analisi soprattutto perché essa costituisce l'avvio dell'era degli studi sulla sicurezza negli Stati uniti e nel mondo occidentale.Il corso è impartito in lingua inglese.
Testi Adottati
Testi per l'esame:- Mary Kaldor and Iavor Rangelov (edited by), The Handbook of Global Security Policy, Wiley Blackwell, 2014 – excluding the following chapters: 4, 8, 9, 11, 12, 13, 15, 17, 19, 24, 26, 28.
- Mark Mazower, Governing the World. The History of an Idea, Penguin Books, 2012 – pp. 191-342 (this is a required reading for students without a sound knowledge of the international history between world war II and the late 1970s)
For the in-class discussions, students will have to read the following essays:
- Daniel Abrahams, “From discourse to policy: US policy communities’ perceptions of and approaches to climate change and security,” Conflict, Security & Development, Vol. 19, No. 4, (2019): 323–345.
- Fiona B. Adamson, “Crossing Borders: International Migration and National Security”, International Security, 31: 1 (Summer 2006), pp. 165-199.
- David A. Baldwin, “The Concept of Security”, Review of International Studies, Vol. 23, n. 1, (January 1997), pp. 5-26.
- Madeline Carr and F. Lesniewska, “Internet of Things, cybersecurity and governing wicked problems: learning from climate change governance,” International Relations, Vol. 34, No. 3 (2020), pp. 391–412.
- Excerpts of the Human Development Report 1994, Published for the United Nations Development Programme
- Michael MccGwire, “Deterrence: The Problem- Not the Solution”, International Affairs, Vol. 62, n. 1, (Winter, 1985-1986), pp. 55-70.
- Nick Ritchie, “A hegemonic nuclear order: Understanding the Ban Treaty and the power politics of nuclear weapons,” Contemporary Security Policy, Vol. 40, No. 4 (2019): pp. 409-434.
- Uri Tor, “‘Cumulative Deterrence’ as a New Paradigm for Cyber Deterrence,” Journal of Strategic Studies, Vol. 40, No. 1-2 (2017): pp. 92-117.
- Michael C. Williams, “Words, Images, Enemies: Securitization and International Politics,” International Studies Quarterly, Vol. 47, No. 4 (Dec. 2003), pp. 511-531.
Testi consigliati:
- Robert J. Art and Kenneth N. Waltz (edited by), The Use of Force. Military Power and International Politics, sixth edition, Rowman & Littlefield, 2004
- Madeline Carr, “Public-Private Partnerships in National Cybersecurity Strategies”, International Affairs, 92: I (2016), pp. 43-62
- Andrew Cottey, Security in 21st Century Europe, second edition, Palgrave, 2013
- Christopher Daase, “National, Societal, and Human Security: On the Transformation of Political Language”, Historical Social Research, Vol. 35, n. 4, (134), 2010, pp. 22-37
- Niall Ferguson, Charles S. Maier, Erez Manela, Daniel J. Sargent (editors), The Shock of the Global. The 1970s in Perspective, Belknap Press of Harvard University Press, 2010
- Avery Goldstein, “Discounting the Free Ride: Alliances and Security in the Postwar World”, International Organization, Vol. 49, n. 1, (Winter 1995), pp. 39-71
- Hilde Haaland Kramer and Steve A. Yetiv, “The UN Security Council Response’s to Terrorism: before and after September 11, 2001”, Political Science Quarterly, 122: 3 (Fall 2007), pp. 409-432
- Henry Kissinger, Diplomacy, New York, Simon & Schuster, 1994
- Geir Lundestad (edited by), International Relations Since the End of the Cold War. New and Old Dimensions, Oxford University Press, 2013
- Voitech Mastny and Zhu Liqun (edited by), The Legacy of the Cold War. Perspectives on Security, Cooperation, and Conflict, Lexington Books, 2014
- Paul Rosenzweig, Cyber Warfare. How Conflicts in Cyberspace Are Challenging America and Changing the World, Praeger, 2013
- Jan Ruzicka, “Behind the veil of good intentions: power analysis of the nuclear non-proliferation regime,” International Politics, Vol. 55 (2018): pp. 369–385
- Eric Taylor Woods, Robert Schertzer, Liah Greenfeld, Chris Hughes, Cynthia Miller-Idriss, “COVID-19, nationalism, and the politics of crisis: A scholarly exchange,” Nations and Nationalism, Vol. 26 (2020), pp. 807-825
- Scott M. Thomas, “A Globalized God. Religion’s Growing Influence in International Politics”, Foreign Affairs, Vol 89, n. 6, Nov-Dec 2010, pp. 93-101
- David S. Yost, “NATO’s Evolving Purposes and the Next Strategic Concept”, International Affairs, 86:2 (March 2010), pp. 489-522.
Modalità Erogazione
Il corso prevede, oltre alle lezioni frontali, discussioni in classe sulle letture assegnate, presentazioni da parte degli studenti sulla base di brevi ricerche svolte, lezioni di ospiti esterni e proiezioni, quando possibileModalità Frequenza
La frequenza è obbligatoria, visto che la valutazione dell'apprendimento è fatto anche in itinereModalità Valutazione
La valutazione degli studenti sarà così formata: 25% partecipazione in classe; 25% esame scritto a metà corso; 20% presentazione in classe; 30% paper di ricerca