writing service to Critically discuss the ways in which feminism may enhance our understanding of security dynamics with reference to contemporary empirical examples
Module title: Critical Security Studies
Essay counts for 50% of a module and 1/5th of my final year grade so VERY important!
Word limit: 3000 words
Aiming for: 90% or more
4 areas to focus on: Comprehension, Anaylsis, Critique, Presentation
COMPREHENSION: Demonstrates exemplary command of the subject matter including, where appropriate, methodological, technical and scholarship skills.
ANALYSIS: Presents a completely focused, relevant and well-structured answer with full and accurate development of concepts/theories, and excellent use of evidence.
CRITIQUE: Understands and evaluates relevant arguments, debates and/or interpretations in a manner that demonstrates an exceptional capacity for independent thought. This may amount to an extension of existing arguments, debates and/or interpretations.
PRESENTATION: Demonstrates complete command of techniques of academic writing with particular reference to structure, referencing/sourcing and spelling/grammar.
Critically discuss = Give your verdict as to what extent a statement or findings within a piece of research are true, or to what extent you agree with them. Provide evidence taken from a wide range of sources which both agree with and contradict an argument. Come to a final conclusion, basing your decision on what you judge to be the most important factors and justify how you have made your choice.
FOR THIS ESSAY: *Important to understand the distinction between ‘traditional’ approaches to security and Critical Security Studies (CSS – notice the capitals) otherwise known as the ‘Welsh School’ approach before going on to tackle this question relating to a specific approach in the field of critical security studies (css – notice the lowercase) which is feminist and gender approaches to security* Before doing any other reading, please read with care the introduction as well as chapters 1 and 2 of ‘Critical Security Studies: An Introduction’ (included in the reading list below) to understand what I’m talking about.
– Please familiarise yourself with the Marking Criteria before writing (please see attached document entitled ‘Marking Criteria’)
Please familiarise yourself with essay writing skills expectations (please see attached document entitled ‘Essay Writing Skills’)
Please familarise yourself with essay structure expectations (please see attached weblink: http://lib.oup.com.au/he/study_skills/turner2e_essentialacademic_essay.pdf) This structure serves as a minimum expectation. All the things mentioned in the right-hand column in the weblink i.e. general statement, background from literature, general statement / signposting of argument all are obviously expected and layout in sections that link together seamlessly obviously but just wanted to include this anyway.
Please read through four lecture slides (introduction, traditional security vs. CSS, feminist approaches, gender and conflict) attached.
We are not allowed to use wikipedia, or any other non-academic sources. Internet sources should be kept to 5 at most and even those should either be from news pages or other sources that seem professional.
There is background lectures (please see attached files), guiding / reading questions and assigned reading for this essay that I have copy pasted from the module website. I will include these below.
ENGENDERING SECURITY TOPIC
• Are traditional approaches to security gendered?
• How ‘gender-inclusive’ are critical approaches to security?
Essential Reading
• Tickner, J.A., ‘Feminist Responses to International Security Studies’, Peace Review 16(1):43-8.
• Hamber B. et al., ‘Discourses in Transition: Re-Imagining Women’s Security’, International Relations 28 (2006), 487-502.
• Hoogensen G. and Rottem S.V., ‘Gender, Identity and the Subject of Security’, Security Dialogue 35:2 (2004), 155-71.
• Hansen, L. ‘The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School’, Millennium: Journal of International Studies 29 (2000), 285-306.
Textbook Chapters
• Peoples, C. and Vaughan-Williams, N., ‘Feminist and Gender Approaches to Security’, in Critical Security Studies: An Introduction (Routledge 2010).
• Kennedy-Pipe, C., ‘Gender and Security’, in Collins (ed.), Contemporary Security Studies (Oxford UP, 2007).
• Whitworth, S., ‘Feminist Perspectives’, in Williams (ed.), Security Studies (Routledge, 2008).
• Sheehan, M., International Security (Lynne Rienner, 2005). Chapter 8.
Recommended Reading
• Hooper, C. ‘Masculinities in IR and the ‘Gender Variable’: A Cost-Benefit Analysis for (Sympathetic) Gender Sceptics’, Review of International Studies 25(3): 475-91.
• Hansen, L. and Olsson, L (eds.), ‘Gender and Security’, Special issue of Security Dialogue, 35:4 (2004). Read one of these contributions.
• Lee Koo, Katrina, ‘Security as Enslavement, Security as Emancipation’, in Burke and McDonald (eds.), Critical Security in the Asia-Pacific (Manchester UP, 2007).
• Sylvester, C., ‘Anatomy of a Footnote’, Security Dialogue, 38(4): 547-58.
• Tickner, J.A., ‘Revisioning Security’, in Booth and Smith (eds.), International Relations Theory Today (Polity, 1995).
• Steans, J., Gender and International Relations (Polity, 1998), ch. on security.
• Enloe, C., Maneuvers: The International Politics of Militarizing Women’s Lives (University of California Press, 2000).
• Enloe, C., The Morning After: Sexual Politics at the End of the Cold War, (University of California Press, 1993).
• Hudson, N.F., ‘Women, Peace, and Security’, in ibid, Gender, Human Security and the United Nations Security Language as a Political Framework for Women (Routledge, 2012), Chapter 1.
• Tickner, J.A., Gender in International Relations: Feminist Perspectives on Achieving Global Security (Columbia UP, 1992).
• Terriff, T. et al., ‘The Impact of Gender on Security’, in Security Studies Today (Polity, 1999).
Should try to use around 20 of these sources and come up with around 5 sources – either books or articles from academic journals – that are not included in the list above i.e. that are original.
You can contact me and ask for login information for my university module if you wish to have a look at the departmental page for this module, previous essay questions, or anything like that. And if for some reason you cannot access these sources then do let me know and I can try my best to download them and send them to you.
Is this the question you were looking for? If so, place your order here to get started!