教學大綱 Syllabus

科目名稱:東北亞安全關係

Course Name: Security Relations in Northeast Asia

修別:選

Type of Credit: Elective

3.0

學分數

Credit(s)

20

預收人數

Number of Students

課程資料Course Details

課程簡介Course Description

What are the factors determining the stability of Northeast Asia? What theoretical approaches can be applied for understanding and analyzing the security relations in Northeast Asia? This course consists of two sections: The first section introduces theories related to security studies in three international relations paradigms, realism, liberalism, and constructivism. The second section discusses how these security theories may apply on the security relations in Northeast Asia through students’ presentation and class discussion.  

核心能力分析圖 Core Competence Analysis Chart

能力項目說明


    課程目標與學習成效Course Objectives & Learning Outcomes

    The goal of this course is two-fold: to learn the theories of security studies and to learn how to apply these theories to enhance our understanding of Northeast Asia relations. This course will require students’ enthusiastic participations, including summarizing reading, preparing for presentations on specific security topics in Northeast Asia, and participating in discussion. This course encourages students to present their own research related to security studies, accordingly presentation and final reports may serve as great trainings for master thesis or dissertation. Presentation and participation in discussion help to equip students with capability in critical thinking and oral performance.   

    每周課程進度與作業要求 Course Schedule & Requirements

    教學週次Course Week 彈性補充教學週次Flexible Supplemental Instruction Week 彈性補充教學類別Flexible Supplemental Instruction Type

    Course Requirements and Evaluation Criteria

    I. Class participation (30 %)

    Class attendance is required. The success of this seminar, in terms of how much we can learn from each other, depends crucially on the active participation and input of everyone. Please read required reading carefully and come prepared for discussion.

     

    II. Presentation (30 %)

    1. For the first section, please summarize the required readings (10-15 minutes) via PPT or a print-out. Others are expected to prepare questions, discussion points related to readings to contribute to discussion.
    2. For the second section, please conduct empirical research and present on a security issue in Northeast Asia on the syllabus from week 10 to week17 (30 minutes). Please submit your PPT to me after presentation.
      1. If you would like to choose other security issues in Northeast Asia, please inform instructor and our class first and give us some time to get prepare for the topics. It would be even more helpful, if you can suggest some readings for us.
      2. Presentation is an important training, whether you decide to be a businessperson, a journalist, or a professor. It is important to equip yourself with capability to introduce one topic clearly and precisely. Take this opportunity and have fun with it.

     

    III. Research Paper (40%)

    1. Each student will write an 8-page double-spaced research paper (10 pages for doctoral students) on any subject pertaining to the subject matter of this course, due at the end of the semester. Please choose a security issues or case related to security affairs/policies in Northeast Asia and apply a particular theory to explain the case.  
    2. The paper should include: a clear research question, brief literature review, theoretical framework, and empirical case study.
    3. Please present your research topic, research question, literature review for a research article in Week 9 in the class.
    4. Paper is due in class in Week 18 and please email me an electronic copy. Please present your research with the class in the same week.
    5. Footnote reference should confirm to the Chicago Manual Style, 16th edition (www.chicagomanualofstyle.org/tools_citationguide.html), published by the University of Chicago Press.

     

    Weekly Schedule

    Week 1 Introduction

     

    Section I  Theories of Security Studies

    Week 2  Introduction of Theories of Security Studies

    The Routledge Handbook of Security Studies (RHSS), Ch1.

    Katzenstein, The Culture of National Security, Ch1.

     

    Week 3  Realism: Balance of Power

    Paul, T. V., James J. Wirtz and Michel Fortmann eds., Balance of PowerTheory and Practice in the 21stCentury (Stanford, CA: Stanford University Press, 2004), Intro, Ch1-3.

     

    Week 4  Realism: Theories of Alliance

    Stephen M. Walt, “Alliance Formation and the Balance of World Power,” International Security, Vol. 9, No. 4 (Spring 1985), pp. 3-41.

    Carlo Masala, “Alliances,” in RHSS, pp. 382-91.

     

    Week 5  Realism: Security Dilemma

    Robert Jervis, “Cooperation under the security dilemma,” World Politics 30 (1978), pp. 167-214.

    Glenn H. Snyder, “The Security Dilemma in Alliance Politics,” World Politics, Vol. 36, No. 4 (Jul., 1984), pp. 461-495.

     

    Week 6  Realism: Realism and security studies

    William C. Wohlforth, “Realism and security studies,” in RHSS, pp. 9-20.

     

    Week 7  Liberalism

    David L. Rousseau and Thomas C. Walker, “Liberalism,” in RHSS, pp. 21-34.

    Katzenstein, The Culture of National Security, Ch3.

     

    Week 8   Constructivism I: Basic Concepts of Constructivism, Culture of Anarchy

    Iver B. Neumann, “National security, culture and identity” in RHSS, pp. 95-104.

     

    Week 9   Constructivism II: Domestic Collective Identity and Culture Norms in Security Dimension (The Case of Japan)

    Katzenstein, Cultural Norms and National Security, Ch 3

     

    Week 10   Constructivism III: Security Culture Norms in International Society

    Katzenstein, The Culture of National Security, Ch2; Ch12.  

    Thierry Balzacq, “Constructivism and securitization studies,” in RHSS, pp. 56-72.

     

    Week 11  Your Own Research I

    Please present your research topic, research question, literature review on one article. Let’s discuss what theories may apply in your case.

     

    Section II  Security Issues in Northeast Asia

    From Week 12~Week 17, we will focus on presentations. Choose a security issues in Northeast Asia and let’s discuss it in the detail.

     

    Week 12  Why Japan launched War during the Second World War?

    Suggested reading:

    Jack SLevy and William RThompson, Causes of War (United Kingdom: John Wiley and Sons Ltd, 2010).

    加藤陽子『それでも、日本人は「戦争」を選んだ朝日出版社、2009年。中譯版:加藤陽子著,黃美蓉譯,《日本人為何選擇了戰爭》,台北市 : 廣場出版 ; 新北市 : 遠足文化發行,2016年。

     

    Week 13  The Korean peninsula

    Suggested reading:

    Scott Snyder, “The Korean peninsula: on the brink?” in RHSS, pp. 268-278.

    Bruce E. Bechtol Jr, “North Korea’s nuclear weaponization program: background, context, and trends for the future (ch3),” RHASS, pp. 38-49.

     

    Week 14  U.S.-Japan Alliance or Alliances in Northeast Asia

    Suggested reading:

    T. Inoguchi (Editor), G. John Ikenberry eds. The U.S.-Japan Security Alliance: Regional Multilateralism (Palgrave Macmillan, 2011).

    Peter Katzenstein, The Culture of National Security, Ch11 (“Identity and Alliances in the Middle East,” p. 400)

    J. J. Suh, “Chapter 4 Bound to Last? The U.S.-Korea Alliance and Analytical Eclecticism.” In Peter Katzenstein, Rethinking Security in East Asia: Identity, Power, and Efficiency, co-edited with J. J. Suh and Allen Carlson, (Stanford University Press, 2004).

     

    Week 15  Territorial Dispute

    Diaoyu vs Senkaku; Kakeshima vs Dokdo; Kuril Islands dispute

    Suggested reading:

    Suk Kyoon Kim, Maritime Disputes in Northeast Asia: Regional Challenges and Cooperation (Brill, 2017), ch. 5 for overview.

    Sheila A. Smith, “Sino-Japanese rivalry and its consequences for Asia (Ch2).” In Sumit Ganguly, Andrew Scobell, Joseph Chinyong Liow eds. The Routledge Handbook of Asian Security Studies (RHASS) (2nd Edition) (Routledge, 2017), pp. 21-37. 

     

    Week 16  Maritime Competition

    Suggested reading:

    Suk Kyoon Kim, Maritime Disputes in Northeast Asia: Regional Challenges and Cooperation (Brill, 2017).

    Ralf Emmers, Geopolitics and Maritime Territorial Disputes in East Asia (Routledge, 2010).

    Andrew S. Erickson, “China’s maritime ambitions (Ch8),” RHASS, pp. 100-114.

     

    Week 17  Rising China and Thucydides Trap?

    Suggested reading:

    Graham Allison, Destined For War: Can America and China escape Thucydides’s Trap (Houghton Mifflin Harcourt, 2017).

    Andrew Scobell, “Whither China’s 21st century trajectory?” (Ch1), RHASS, pp. 11-20.

    Jeffrey Reeves, “Origins, intentions, and security implications of Xi Jinping’s belt and road initiative (Ch5),” RHASS, pp. 61-73.

     

    Other potential Topics:

    1. International Law, Norms in Northeast Asia

    Suggested reading:

    Peter Katzenstein, The Culture of National Security

    Ch3 (“Status, Norms, and the Proliferation of Conventional Weapons,” p. 79)

    Ch4 (“Norms and Deterrence: The Nuclear and Chemical Weapons Taboos, p. 114);

    Ch10 (“Collective Identity in a Democratic Community: The Case of NATO,” p. 357)

     

    1. Korean War and its Impacts on Northeast Asia   

    Suggested reading:

    Bruce Cumings, The Korean War: A History (Modern Library, 2010). 中譯本: 林添貴譯,《朝鮮戰爭:你以為已經遺忘,其實從不曾了解的一段歷史》,左岸文化,2013年。

     

    Week 18  Your Own Research II

    Share your research results with us!

    授課方式Teaching Approach

    70%

    講述 Lecture

    20%

    討論 Discussion

    0%

    小組活動 Group activity

    0%

    數位學習 E-learning

    10%

    其他: Others: Presentations

    評量工具與策略、評分標準成效Evaluation Criteria

    I. Class participation (30 %)  

    II. Presentation (30 %)  

    III. Research Paper (40%)

    指定/參考書目Textbook & References

    For required readings, see weekly shcedules. 

    已申請之圖書館指定參考書目 圖書館指定參考書查詢 |相關處理要點

    書名 Book Title 作者 Author 出版年 Publish Year 出版者 Publisher ISBN 館藏來源* 備註 Note

    維護智慧財產權,務必使用正版書籍。 Respect Copyright.

    課程相關連結Course Related Links

    
                

    課程附件Course Attachments

    課程進行中,使用智慧型手機、平板等隨身設備 To Use Smart Devices During the Class

    需經教師同意始得使用 Approval

    列印