SC561-7-SP-CO:
Global Security Challenges

The details
2020/21
Sociology
Colchester Campus
Spring
Postgraduate: Level 7
Current
Sunday 17 January 2021
Friday 26 March 2021
20
29 June 2020

 

Requisites for this module
(none)
(none)
(none)
(none)

 

(none)

Key module for

MSC MF9012 Organised Crime, Terrorism and Security

Module description

This module will critically assess current research, policies and practices related to current global security challenges, including those relating to human rights, climate change, migration, health, and the cybersphere

Module aims

The module will engage students with complex issues both systematically and creatively, with the fields of security studies, criminology, legal theory and philosophy. Topics will include the developing concept of security, cybercrime and cyber security, the surveillance industry, international policing, transnational crime and alternative security actors such as hacktivists and whistleblowers. The module is an opportunity to open up new thinking and to expand career opportunities within the security industry and the criminal justice sector, nationally and internationally.

Module learning outcomes

By the end of the course, students should:

a) Be able to show an understanding of the contemporary debates in global security.

b) Have developed a critical awareness of the broad social, cultural, economic and political aspects of global security challenges.

c) Be able to assess the intersections of different fields in researching global security challenges.

d) Be able to make sound judgements in the complexity of data related to global security challenges and communicate these ideas clearly.

Module information

Please note that assessment information is currently showing for 2019-20 and will be updated in September.

Learning and teaching methods

No information available.

Bibliography*

  • Yochai Benkler. (2014) 'A Public Accountability Defense for National Security Leakers and Whistleblowers', in Harvard Law and Policy Review. vol. 8, pp.281-326
  • Reveron, Derek S. (c2012) Cyberspace and national security: threats, opportunities, and power in a virtual world, Washington, DC: Georgetown University Press.
  • Made in China, Exported to the World: The Surveillance State - The New York Times, https://www.nytimes.com/2019/04/24/technology/ecuador-surveillance-cameras-police-government.html
  • Marta Poblet; Jonathan Kolieb. (2018) 'Responding to Human Rights Abuses in the Digital Era: New Tools, Old Challenges', in Stanford Journal of International Law. vol. 54 (2) , pp.259-283
  • VG exposed the largest child sexual abuse forum. It was run by the police., https://www.vg.no/spesial/2017/undercover-darkweb/?lang=en
  • Zedner, Lucia. (2009) Security, Abingdon: Routledge.
  • Bartlett, Jamie. (2014) The dark net: inside the digital underworld, London: William Heinemann.
  • Waldron, Jeremy. (2003-06) 'Security and Liberty: The Image of Balance*', in Journal of Political Philosophy. vol. 11 (2) , pp.191-210
  • Wall, David S. School of Applied Social Sciences, Durham University, Durham, United Kingdom, WilliamsM7@cf.ac.uk Williams, Matthew L., ORCID 0000-0003-2566-6063 . School of Social Sciences, Cardiff University, Cardiff, United Kingdom, d.s.wall@durham.ac.uk. (2013) 'Policing cybercrime: Networked and social media technologies and the challenges for policing.', in Policing & Society,. vol. 23 (4) , pp.409-412
  • Stefan Elbe. (2006) 'Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security', in International Studies. vol. 50 (1) , pp.119-144
  • Minárik, Tomáš; Osula, Anna-Maria. (2016-02) 'Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law', in Computer Law & Security Review. vol. 32 (1) , pp.111-127
  • Gardiner, Stephen Mark; EBSCOhost ebook collection. (2010) Climate ethics: essential readings, Oxford: Oxford University Press.
  • How China Uses High-Tech Surveillance to Subdue Minorities - The New York Times, https://www.nytimes.com/2019/05/22/world/asia/china-surveillance-xinjiang.html
  • KING, GARY; MURRAY, CHRISTOPHER J. L. (2001-12) 'Rethinking Human Security', in Political Science Quarterly. vol. 116 (4) , pp.585-610
  • Joh, Elizabeth E. (2017) 'The Undue Influence of Surveillance Technology Companies on Policing', in SSRN Electronic Journal.
  • Hawkesworth, M. E.; Kogan, Maurice. (2004) Encyclopedia of government and politics, London: Routledge.
  • Aradau, Claudia. (2004-03) 'The Perverse Politics of Four-Letter Words: Risk and Pity in the Securitisation of Human Trafficking', in Millennium: Journal of International Studies. vol. 33 (2) , pp.251-277

The above list is indicative of the essential reading for the course. The library makes provision for all reading list items, with digital provision where possible, and these resources are shared between students. Further reading can be obtained from this module's reading list.

Assessment items, weightings and deadlines

Coursework / exam Description Deadline Weighting
Coursework   Essay    100% 

Overall assessment

Coursework Exam
100% 0%

Reassessment

Coursework Exam
100% 0%
Module supervisor and teaching staff
Dr Katerina Hadjimatheou, email: k.hadjimatheou@essex.ac.uk.
Dr Katerina Hadjimatheou
Michele Hall, Graduate Administrator, Telephone 01206 873051, Email: socpgadm@essex.ac.uk

 

Availability
Yes
No
Yes

External examiner

No external examiner information available for this module.
Resources
Available via Moodle
Of 18 hours, 18 (100%) hours available to students:
0 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).

 

Further information
Sociology

* Please note: due to differing publication schedules, items marked with an asterisk (*) base their information upon the previous academic year.

Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements, industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules. The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.

The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.