POLS 3200 LECTURE NOTES Questions with complete solution
0 view 0 purchase
Module
POLS 3200
Institution
POLS 3200
POLS 3200 LECTURE NOTES Questions with complete solution
How does Stephen M. Walt define security studies? - correct answer Security studies may be defined as the study of the threat, use, and control of military force
How does the sub-field of international security (IS) differ from its w...
pols 3200 lecture notes questions with complete so
Written for
POLS 3200
POLS 3200
Seller
Follow
Academia199
Reviews received
Content preview
POLS 3200 LECTURE NOTES Questions
with complete solution
How does Stephen M. Walt define security studies? - correct answer
✔Security studies may be defined as the study of the threat, use, and control
of military force
How does the sub-field of international security (IS) differ from its wider
subject, international relations (IR)? - correct answer ✔While IR is the study
of political interactions between international actors, IS is concerned with the
sub-set of those political interactions important for maintaining the security of
those actors
How did the perception of international security change before and after
WWII? - correct answer ✔Before WWII, security was a domain of
professional military and civilian contributions were discouraged. After WWII,
however, civilians were extensively involved in military planning as war was
considered "too important to be left to the generals" which set the stage for
the first wave of security studies
What is another name for the deepening approach towards IS? - correct
answer ✔the human security approach
Who is the referent object of security in the narrow/traditional approach? -
correct answer ✔the state
Why do proponents of the narrow approach refute any attempt to broaden the
concept of security? - correct answer ✔they believe it dilutes the important
task of analyzing military threats & interstate conflict
,What is the referent object of security in the widening approach? - correct
answer ✔the state
What is the difference between the traditional approach and the widening
approach of IS? - correct answer ✔While the traditional approach rejects
assessing non-military threats to national security, the widening approach
holds that non-military threats to security must be taken on board alongside
consideration of military threats from other states (military + non-military w/
ultimate concern being national security)
What is the referent object of security in the deepening approach? - correct
answer ✔the individual people of which states are comprised
Which school of though does the deepening approach belong to? - correct
answer ✔social constructivists
What is the difference between the deepening approach and the widening
approach? - correct answer ✔Although the widening approach accounts for
non-military threats, proponents of the deepening approach maintain that
security wideners did not go far enough. It still involves the "fetishization of the
state" or maintains state centrism where national security is still the foremost
goal
Why does the DA further oppose the WA? - correct answer ✔traditional
security agents of the state such as the military and police are often
inadequate for dealing with security problems that affect people. Moreover,
the state can be the source of threats rather than protection for individual
people
Why is the threat assessment of the WA subject to error? - correct answer
✔WA "still conceives of security largely from the heights of elite assessment."
,Elites cannot assess what constitutes a security threat better than individual
people who directly experience the threat to their individual security
How can the DA lead to cooperation? - correct answer ✔To protect human
security, it is critical that like-minded states and international govt. institutions,
businesses civili societies, etc. come together to secure human beings in the
way that they must be secured. In an interconnected world, our security is
increasingly indivisible from that of our neighbors at home & abroad. Threats
cross borders and, as such, should be met with cross-border solutions that
require cooperation
What role did the United Nations play in the conception of human security? -
correct answer ✔UN had been at the forefront of the deepening approach. In
a UNDP report, the UN urges that "the concept of security must change- from
an exclusive stress on national security to a much greater stress on people's
security..." This 1994 declaration became the formal debut of the human
security concept.
What were the two pillars mentioned in the UNDP report that are essential to
achieving people's security? - correct answer ✔(1) Freedom from fear and
(2) freedom from want
What is a common argument against states who have implemented human
security in their policy agenda like Canada, Norway, and Japan? - correct
answer ✔Opponents would argue that these states enjoy the necessary
freedom and flexibility to do so. Unlike other other states who cannot focus on
nonmilitary security issues.
What does Reveron & Mahoney-Norris say in defense of the DA? - correct
answer ✔(1) As traditional war is disappearing, human security issues are
increasingly relevant. This is supported by the dramatic decline in interstate
wars and rise in intrastate wars.
, (2) Traditional analyses focus on national security and threats from competitor
states miss significant security threats at subnational and transnational issues.
This, however, is neither aligned with the reality of these threats or the fact
that states are already responding to them
(3) National security does not help us understand or address threats without
borders
(4) Finally, national security cannot be achieved without human security
What are some critiques raised against the DA? - correct answer
✔According to Yuen Foong Khong...
(1) HS generates false hope and false priorities. False hope because not
everyone can be protected and false priorities because there are much
greater threats to nation-states than that of threats to an individual human
being. Moreover, when national threats are not prioritized accordingly this can
result in an even bigger threat to individual security
(2) HS is based on false causal assumptions as it assumes all people should
be protected and putting people first makes the world a safer place
(3) HS will not be able to command a consensus; states will resist
intrusiveness required to implement the HS agenda. Individuals should,
instead, cast their lot with their own state and government in order to achieve
security
Which scholars belong to the narrow or traditional security approach to IS? -
correct answer ✔Walt and Khong
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Academia199. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £14.32. You're not tied to anything after your purchase.