Module POL2057 for 2022/3
- Overview
- Aims and Learning Outcomes
- Module Content
- Indicative Reading List
- Assessment
Undergraduate Module Descriptor
POL2057: Security Studies
This module descriptor refers to the 2022/3 academic year.
Module Aims
On the completion of this module you will be familiar with (conceptualisation of) key security threats which impact contemporary societies at all levels. Moreover, you will be cognizant about contributions and limitations of IR theories in interpreting contemporary security threats, as well as have the ability to critically analyze strengths and drawbacks of various theoretical interpretations. The module will provide you with a solid understanding of use of force as a tool of inter/national politics both generally and in the setting of carefully selected case studies. You will be able to apply key theory claims to your interpretations of several aspects of political violence and security threats, and draw generalizations that may support or contest hegemonic assumptions in the field.
On successfully completing the programme you will be able to: | |
---|---|
Module-Specific Skills | 1. demonstrate IR grounded knowledge of political violence as an instrument of policy in the context of war and contemporary cases of armed conflicts; 2. be familiar with key concepts used to interpret contemporary security threats and to analyze violent conflicts; 3. establish correlations between theory and praxis of recent and ongoing violent conflicts which have presented serious security challenges at all levels of analysis. |
Discipline-Specific Skills | 4. critically analyse primary and secondary source material; 5. understand and use key concepts and IR theory relevant to the understanding and explanation of security challenges and threats; 6. construct well-structured and rigorous scholarly arguments. |
Personal and Key Skills | 7. communicate effectively in speech and writing; 8. work independently and in collaboration with peers to achieve common goals; 9. demonstrate competence to use the Internet and other IT resources. |