POLS 3200 LECTURE NOTES Questions with complete solution
0 keer bekeken 0 keer verkocht
Vak
POLS 3200
Instelling
POLS 3200
POLS 3200 LECTURE NOTES Questions with complete solution
How does Stephen M. Walt define security studies? - correct answer Security studies may be defined as the study of the threat, use, and control of military force
How does the sub-field of international security (IS) differ from its w...
pols 3200 lecture notes questions with complete so
Geschreven voor
POLS 3200
POLS 3200
Verkoper
Volgen
Academia199
Ontvangen beoordelingen
Voorbeeld van de inhoud
POLS 3200 LECTURE NOTES Questions
with complete solution
How does Stephen M. Walt define security studies? - correct answer
✔Security studies may be defined as the study of the threat, use, and control
of military force
How does the sub-field of international security (IS) differ from its wider
subject, international relations (IR)? - correct answer ✔While IR is the study
of political interactions between international actors, IS is concerned with the
sub-set of those political interactions important for maintaining the security of
those actors
How did the perception of international security change before and after
WWII? - correct answer ✔Before WWII, security was a domain of
professional military and civilian contributions were discouraged. After WWII,
however, civilians were extensively involved in military planning as war was
considered "too important to be left to the generals" which set the stage for
the first wave of security studies
What is another name for the deepening approach towards IS? - correct
answer ✔the human security approach
Who is the referent object of security in the narrow/traditional approach? -
correct answer ✔the state
Why do proponents of the narrow approach refute any attempt to broaden the
concept of security? - correct answer ✔they believe it dilutes the important
task of analyzing military threats & interstate conflict
,What is the referent object of security in the widening approach? - correct
answer ✔the state
What is the difference between the traditional approach and the widening
approach of IS? - correct answer ✔While the traditional approach rejects
assessing non-military threats to national security, the widening approach
holds that non-military threats to security must be taken on board alongside
consideration of military threats from other states (military + non-military w/
ultimate concern being national security)
What is the referent object of security in the deepening approach? - correct
answer ✔the individual people of which states are comprised
Which school of though does the deepening approach belong to? - correct
answer ✔social constructivists
What is the difference between the deepening approach and the widening
approach? - correct answer ✔Although the widening approach accounts for
non-military threats, proponents of the deepening approach maintain that
security wideners did not go far enough. It still involves the "fetishization of the
state" or maintains state centrism where national security is still the foremost
goal
Why does the DA further oppose the WA? - correct answer ✔traditional
security agents of the state such as the military and police are often
inadequate for dealing with security problems that affect people. Moreover,
the state can be the source of threats rather than protection for individual
people
Why is the threat assessment of the WA subject to error? - correct answer
✔WA "still conceives of security largely from the heights of elite assessment."
,Elites cannot assess what constitutes a security threat better than individual
people who directly experience the threat to their individual security
How can the DA lead to cooperation? - correct answer ✔To protect human
security, it is critical that like-minded states and international govt. institutions,
businesses civili societies, etc. come together to secure human beings in the
way that they must be secured. In an interconnected world, our security is
increasingly indivisible from that of our neighbors at home & abroad. Threats
cross borders and, as such, should be met with cross-border solutions that
require cooperation
What role did the United Nations play in the conception of human security? -
correct answer ✔UN had been at the forefront of the deepening approach. In
a UNDP report, the UN urges that "the concept of security must change- from
an exclusive stress on national security to a much greater stress on people's
security..." This 1994 declaration became the formal debut of the human
security concept.
What were the two pillars mentioned in the UNDP report that are essential to
achieving people's security? - correct answer ✔(1) Freedom from fear and
(2) freedom from want
What is a common argument against states who have implemented human
security in their policy agenda like Canada, Norway, and Japan? - correct
answer ✔Opponents would argue that these states enjoy the necessary
freedom and flexibility to do so. Unlike other other states who cannot focus on
nonmilitary security issues.
What does Reveron & Mahoney-Norris say in defense of the DA? - correct
answer ✔(1) As traditional war is disappearing, human security issues are
increasingly relevant. This is supported by the dramatic decline in interstate
wars and rise in intrastate wars.
, (2) Traditional analyses focus on national security and threats from competitor
states miss significant security threats at subnational and transnational issues.
This, however, is neither aligned with the reality of these threats or the fact
that states are already responding to them
(3) National security does not help us understand or address threats without
borders
(4) Finally, national security cannot be achieved without human security
What are some critiques raised against the DA? - correct answer
✔According to Yuen Foong Khong...
(1) HS generates false hope and false priorities. False hope because not
everyone can be protected and false priorities because there are much
greater threats to nation-states than that of threats to an individual human
being. Moreover, when national threats are not prioritized accordingly this can
result in an even bigger threat to individual security
(2) HS is based on false causal assumptions as it assumes all people should
be protected and putting people first makes the world a safer place
(3) HS will not be able to command a consensus; states will resist
intrusiveness required to implement the HS agenda. Individuals should,
instead, cast their lot with their own state and government in order to achieve
security
Which scholars belong to the narrow or traditional security approach to IS? -
correct answer ✔Walt and Khong
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Academia199. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €17,33. Je zit daarna nergens aan vast.