prio
TRANSCRIPT
![Page 1: PRIO](https://reader036.vdocuments.us/reader036/viewer/2022081900/577ccf221a28ab9e788ef7ac/html5/thumbnails/1.jpg)
3/3/2014 PRIO
http://www.prio.no/Research-School-DEPRECATED/Activities/Methods-in-Critical-Security-Studies/ 1/3
PRIO Network PRIO | Cyprus Centre | Peace Research Endowment | Research School on Peace and Conflict | More . . .
| About PRIO | How To Find | Vacancies | Library | Contact | Intranet | FAQ |
Search
PhD Course: Research Methods in Critical SecurityStudies
Coordinators and primary lecturers: J. Peter Burgess (PRIO) and Mark B. Salter (University of Ottawa).
Guest lecturers: Claudia Aradau (King's College, London); Thierry Balzacq (University of Namur, Belgium);Xymena Kurowska (Central European University); Maria Stern (University of Gothenburgh).
Dates: 14-18 October 2013Venue: PRIO, Oslo, NorwayCredits: 5 ECTSContact and application: [email protected] of application: 15 September 2013.
T his course provides an introduction and overview to a rang e of research methods in crit ical securitystudies. Its aim is to provide tools and methods to students of crit ical security studies in support ofclear research desig n and rig orous scholarly methods.
Critical security studies can be understood as a scholarly approach that is attentive to the workings of powerand exclusion inherent in social phenomena. Though objects of research can vary considerably, a four basicprinciples shape the field of critical analysis:
1. Social and political life are interwoven without any one unifying principle or logic;2. Agency--the capacity to act--is not reserved to individual human beings, but rather is everywhere;3. Causality is emergent. In other words, critical analysis does not identify what necessarily happens, but
rather what the conditions of possibility of something happening are;4. Research, writing and public engagement are inherently political.
Lectures and discussions will emphasize reapplication of classical scientific research questions for the fieldof critical security studies: sufficient proof, critical position, and coherency of argument, reshaped andreapplied to these four principles.
Readings
The course will build primarily on Research Methods in Critical Security Studies: An Introduction. (Mark B.Salter and Can E. Mutlu, London: Routledge), supplemented by other readings. Lectures will be given byexternal scholars known for their work in the field of critical security studies. The 5-day course will combinemorning lectures with afternoon workshopping of relevant themes, articles, and student papers.
Requirements
One week prior to the course lectures, each student must submit a brief research proposal, related to acurrent or future project (approximately 500 words). The research proposal should relate to the readingsand contain 3 different research paths for achieving its goals.
In order to achieve 5 ECTS, an essay of 3-5000 words must be handed in by 20 November 2013. The essayquestion should be proposed by 22 October for approval by the organizers. The participants are invited torelate the essay to the methods chapter of their dissertation.
Admission
The deadline of application is 15 September 2013. Applicants should include details about their universityaffiliation and a paragraph on their doctoral research (except for members of the research school, who justregister). Please send your application by e-mail to the Research School Coordinator, Kristoffer Lidén [email protected].
Courses & Seminars
PhD Course –‘Qualitative Methods andthe Study of Civil War’
Course on Non-ViolentResistance
PhD Course - TheDynamics of Civil War
PhD Course: ResearchMethods in CriticalSecurity Studies
PhD Course: SocietalSecurity in Theory andPractice
PhD Course: Gender,Peace and Security
PhD Course: EmergingMilitary Technologies -New Ethical Challenges
HOME NEWS EVENTS RESEARCH PUBLICATIONS PROJECTS PEOPLE DATA EDUCATION JOURNALS PEACE ADDRESS
Home >> Research School DEPRECATED >> Courses & Seminars >> PhD Course: Research Methods in Critical Security Studies
![Page 2: PRIO](https://reader036.vdocuments.us/reader036/viewer/2022081900/577ccf221a28ab9e788ef7ac/html5/thumbnails/2.jpg)
3/3/2014 PRIO
http://www.prio.no/Research-School-DEPRECATED/Activities/Methods-in-Critical-Security-Studies/ 2/3
There is no participation fee, but the cost of travel and accommodation, if needed, must be covered by theparticipants. No financial assistance is available. Applicants will be notified about the outcome of theirapplication as quickly as possible after the deadline.
Lectures
Day 1 / 14 October: Introduction to critical security research methods and design
10.15-12.00 Lecture (Burgess & Salter). Readings:
Salter, ‘Research design: Introduction’Guillaume, ‘Criticality’Squire, ‘Attending to mess’c.a.s.e. collective, ‘Critical approaches to security in Europe’
13.15-15.00 Seminar
Day 2 / 15 October: Discourse and discursive approaches
10.15-12.00 Lecture (Thierry Balzacq). Readings:
Balzacq, ‘Enquiries into methods’Anaïs, ‘Objects of security’Lobo-Guerrero, ‘Archives’Neal, ‘Legislative practices’
13.15-15.00 Seminar
Day 3 / 16 October: The practical and the role of the observer
10.15-12.00 (Xymena Kurowska). Readings:
Hughs, ‘The practice of writing’Law, ‘After method: An introduction’Friedrichs and Kratochwil, ‘On acting and knowing’Kurowska and Tallis, ‘Chaismatic crossings’
13.15-15.00 Seminar
Day 4 / 17 October: The new materiality
10.15-12.00 (Claudia Aradau). Readings:
Aradau, ‘Infrastructure’Voelkner, ‘Tracing human security assemblages’Barad, ‘Posthumanist performativity: toward an understanding of how matter comes to matter’Adey and Anderson, ‘Anticipating emergencies’
13.15-15.00 Seminar
Day 5 / 18 October: Gender and the corporeal turn
10.15-12.00 (Maria Stern). Readings:
Wiebe, ‘Affective terrain: approaching the field in Aamjiwnaang’Shinko, ‘Theorizing the body in IR’Crane-Seeber, ‘Learning by feeling’Shinko, ‘Ethics after liberalism: Why (autonomous) bodies matter’.
13.15-15.00 Seminar
Bibliography
Adey, Peter and Ben Anderson (2012) ‘Anticipating Emergencies: Technologies of preparedness and thematter of security’ Security Dialogue 43(2): 99-117.
![Page 3: PRIO](https://reader036.vdocuments.us/reader036/viewer/2022081900/577ccf221a28ab9e788ef7ac/html5/thumbnails/3.jpg)
3/3/2014 PRIO
http://www.prio.no/Research-School-DEPRECATED/Activities/Methods-in-Critical-Security-Studies/ 3/3
Anaïs, Seantal (2013) ‘Objects of Security/objects of research: analyzing non-lethal weapons’ in Mark B.Salter and Can E. Mutlu (eds) Research Methods in Critical Security Studies, NY: Routledge: 195-198.
Aradau, Claudia (2013) ‘Infrastructure’ in Mark B. Salter and Can E. Mutlu (eds) Research Methods in CriticalSecurity Studies, NY: Routledge: 181-185.
Balzacq, Thierry (2011) ‘Enquiries into methods: a new framework for securitization analysis’ in ThierryBalzacq (ed) Securitization Theory: How security problems emerge and dissolve, NY: Routledge: 31-53.
Barad, Karen (2003) ‘Posthumanist performativity: toward an understanding of how matter comes tomatter’ Signs: Journal of Women in Culture and Society 28(3): 801-831.
c.a.s.e. collective (2006) ‘Critical Approaches to Security In Europe: A Networked Manifesto’, SecurityDialogue 37(4): 443-487.
Crane-Seeber, Jesse Paul (2013) ‘Learning by feeling’ in Mark B. Salter and Can E. Mutlu (eds) ResearchMethods in Critical Security Studies, NY: Routledge: 72-75.
Friedrich, Jörg and Friedrich Kratochwil (2009) ‘On Acting and Knowing: How pragmatism can advanceinternational relations research and knowing’ International Organization 63(4): 701-731.
Guillaume, Xavier (2013) ‘Criticality’ in Mark B. Salter and Can E. Mutlu (eds) Research Methods in CriticalSecurity Studies, NY: Routledge: 29-32.
Hughes, Hannah R. (2013) ‘The Practice of Writing’ in Mark B. Salter and Can E. Mutlu (eds) ResearchMethods in Critical Security Studies, NY: Routledge: 93-96.
Kurowska, Xymena and Benjamin C. Tallis (2013) ‘Chiasmatic crossings: a reflexive revisit of a researchencounter in European security’ Security Dialogue 44(1): 73-89.
Law, John (2004) ‘After Method: an introduction’ in After Method: Mess in Social Science Research. NY:Routledge: 1-17.
Lobo-Guerrero, Luis (2013) ‘Archives’ in Mark B. Salter and Can E. Mutlu (eds) Research Methods in CriticalSecurity Studies, NY: Routledge: 121-124.
Neal, Andrew W. (2013) ‘Legislative Practices’ in Mark B. Salter and Can E. Mutlu (eds) Research Methods inCritical Security Studies, NY: Routledge: 125-128.
Salter, Mark B. (2013) ‘Research Design: Introduction’ in Mark B. Salter and Can E. Mutlu (eds) ResearchMethods in Critical Security Studies, NY: Routledge:15-24.
Shinko, Rosemary E. (2010) ‘Ethics after Liberalism: Why (autonomous) bodies matter’ 38(3): 723-745.
Shinko, Rosemary E. (2013) ‘Theorizing the body in IR’ in Mark B. Salter and Can E. Mutlu (eds) ResearchMethods in Critical Security Studies, NY: Routledge: 162-164
Squire, Vicki (2013) ‘Attuning to mess’ in Mark B. Salter and Can E. Mutlu (eds) Research Methods in CriticalSecurity Studies, NY: Routledge: 37-41.
Voelkner, Nadine (2013) ‘Tracing human security assemblages’ in Mark B. Salter and Can E. Mutlu (eds)Research Methods in Critical Security Studies, NY: Routledge: 203-206.
Wiebe, Sarah Marie (2013) ‘Affective terrain: approaching the field in Aamjiwnaang’ in Mark B. Salter andCan E. Mutlu (eds) Research Methods in Critical Security Studies, NY: Routledge: 158-161.
Original design by SiteCreative modified by PRIO 2007