IR304 Security Studies
IR304 Security Studies
Syllabus | International University of Sarajevo - Last Update on Apr 04, 2026
Political Science and International Relations
Joseph Jon Kaminski
Course Lecturer
Course Objectives
This course introduces students to Security Studies by first examining the field’s core theoretical approaches and comparing how each conceptualizes ‘security’. Students will then identify and analyze non-traditional security issues—including terrorism, human security, and energy security—and assess how they shape global security agendas and policy responses. Building on this foundation, the course evaluates how international institutions (such as the United Nations, regional alliances, and private security companies) address security challenges and enable—or impede—cooperation among states. Finally, students will apply these frameworks to contemporary cases, developing well-supported arguments about security strategies in contexts such as ethnic conflict, terrorism, and nuclear proliferation.
Learning Outcomes
After successful completion of the course, the student will be able to:
Course Materials
Required Textbook
Williams, P. and McDonald, M., eds. (2023). Security Studies: An Introduction (4th Edition). New York: Routledge
Additional Literature
No additional ReadingsTeaching Methods
Lecturing
In-class discussions
Group projects
Video material
Weekly Topics
| Week | Topic | Readings / References |
|---|---|---|
| 1 | [26.2] Introduction/Syllabus distribution and other formal business | None |
| 2 | [5.3] What is Security Studies? | Williams and McDonald, ed., Introduction |
| 3 | [12.3] Traditional Approaches: Realism(s), Liberalism, and Democratic Peace Theory | Williams and McDonald, ed., Ch. 1-2 |
| 4 | [19.3] Constructivism | Williams and McDonald, ed., Ch. 3 |
| 5 | [26.3] QUIZ 1 & Critical Approaches: Securitization, Critical Theory, Feminism, and Post-Structuralism | Williams and McDonald, ed., Chs. 4-8 |
|
Quiz will be conducted during the first 45 minutes of class.
|
||
| 6 | [2.4] Key Concepts: Uncertainty, Great Power Rivalry, Energy Security, and War | Williams and McDonald, ed., Chs. 9-10, 12 |
| 7 | [9.4] Key Concepts: Terrorism/Human Security and "The Responsibility to Protect" | Williams and McDonald, ed., Chs. 15-16 |
| 8 | Mid-Term Exam (Covering Weeks 1-7) | Study |
| 9 | [23.4] Institutions: Alliances and Regional Organizations, and the UN | Williams and McDonald, ed., Chs. 18-20 |
| 10 | [30.4] Institutions: Peace Ops, Nuclear Disarmament, and Private Security Companies | Williams and McDonald, ed., Chs. 21-23 |
| 11 | [7.5] Contemporary Issues: Genocide & Crimes Against Humanity and Ethnic Conflict | )Williams and McDonald, ed., Chs. 24-25 |
| 12 | [14.5] QUIZ 2 & Contemporary Issues: Migration and Refugees | Williams and McDonald, ed., Ch. 33 |
|
Quiz will be conducted during the first 45 minutes of class.
|
||
| 13 | [21.5] Contemporary Issues: Global Terrorism, Counterterrorism, and Counterinsurgency | Williams and McDonald, ed., Chs. 26-28 |
| 14 | [28.5] Eid al-Adha Holiday | No Class; Holiday |
| 15 | [4.6] Group Presentations | None |
Course Schedule (All Sections)
| Section | Type | Day 1 | Venue 1 | Day 2 | Venue 2 |
|---|---|---|---|---|---|
| IR304.1 | Course | Thursday 15:00 - 17:50 | B F2.6 | - | - |
Office Hours & Room
| Day | Time | Office | Notes |
|---|---|---|---|
| Monday | 12:00 - 14:00 | B F1.33 | |
| Tuesday | 14:00 - 17:00 | B F1.33 |
Assessment Methods and Criteria
Assessment Components
Final Exam
AI: Not AllowedAlignment with Learning Outcomes : 2 3 4
Quiz 1
AI: Not AllowedAlignment with Learning Outcomes : 1
Quiz 2
AI: Not AllowedAlignment with Learning Outcomes : 2 3
Midterm
AI: Not AllowedAlignment with Learning Outcomes : 1 4
Attendance
AI: Not AllowedAlignment with Learning Outcomes : 1 2 3 4
Presentations
AI: Consult InstructorAlignment with Learning Outcomes : 4
IUS Grading System
| Grading Scale | IUS Grading System | IUS Coeff. | Letter (B&H) | Numerical (B&H) |
|---|---|---|---|---|
| 0 - 44 | F | 0 | F | 5 |
| 45 - 54 | E | 1 | ||
| 55 - 64 | C | 2 | E | 6 |
| 65 - 69 | C+ | 2.3 | D | 7 |
| 70 -74 | B- | 2.7 | ||
| 75 - 79 | B | 3 | C | 8 |
| 80 - 84 | B+ | 3.3 | ||
| 85 - 94 | A- | 3.7 | B | 9 |
| 95 - 100 | A | 4 | A | 10 |
Late Work Policy
Information about late submission policies will be shared during class and posted in this section. Please check back for official guidelines.
ECTS Credit Calculation
📚 Student Workload
This 6 ECTS credit course corresponds to 150 hours of total student workload, distributed as follows:
Lecture Hours
39 hours ⏳ (13 week × 3 h)
Home study
75 hours ⏳ (15 week × 5 h)
Quizzes preparation
10 hours ⏳ (2 week × 5 h)
Midterm preparation
9 hours ⏳ (1 week × 9 h)
Final exam preparation
10 hours ⏳ (1 week × 10 h)
Presentation preparation
7 hours ⏳ (1 week × 7 h)
150 Total Workload Hours
6 ECTS Credits
Course Policies
Academic Integrity
All work submitted must be your own. Plagiarism, cheating, or any form of academic dishonesty will result in disciplinary action according to university policies. When in doubt about citation practices, consult the instructor.
Attendance Policy
Students are expected to adhere to the attendance requirements as outlined in the International University of Sarajevo Study Rules and Regulations. Excessive absences, whether excused or unexcused, may impact academic performance and eligibility for assessment. Mandatory sessions (e.g., labs, workshops) require attendance unless formally exempted. For detailed policies on absences, documentation, and penalties, please refer to the official university regulations.
Technology & AI Policy
Laptops/tablets may be used for note-taking only during lectures. Phones should be silenced and put away during all class sessions. Audio/video recording requires prior permission from the instructor.
Artificial Intelligence (AI) Usage: The use of AI tools (e.g., ChatGPT, Copilot, Gemini) varies by assessment component. Please refer to the AI usage indicator next to each assessment item in the Assessment Methods and Criteria section above. Submitting AI-generated content as your own work, where AI is not explicitly allowed, constitutes an academic integrity violation.
Communication Policy
All course-related communication should occur through official university channels (institutional email or SIS). Emails should include [IR304] in the subject line.
Academic Quality Assurance Policy
Course Academic Quality Assurance is achieved through Semester Student Survey. At the end of each academic year, the institution of higher education is obliged to evaluate work of the academic staff, or the success of realization of the curricula.
Learning Tips
Be prepared to contribute thoughtfully during class discussions, labs, or collaborative work. Active participation deepens understanding and encourages critical thinking.
Complete assigned readings or prep materials before class. Take notes, highlight key ideas, and jot down questions. Aim to grasp core concepts and their applications—not just facts.
Use course frameworks or methodologies to analyze problems, case studies, or projects. Begin early to allow time for reflection and refinement. Seek feedback to improve your work.
Don’t hesitate to reach out when something is unclear. Use office hours, discussion boards, or peer networks to clarify concepts and stay on track.
Syllabus Last Updated on Apr 04, 2026 | International University of Sarajevo
Print Syllabus
Referencing Curricula Print this page
| Course Code | Course Title | Weekly Hours* | ECTS | Weekly Class Schedule | ||||||
| T | P | |||||||||
| IR304 | Security Studies | 3 | 1 | 6 | TH 1500-1750/Room B F2.6 | |||||
| Prerequisite | IR101 | It is a prerequisite to | - | |||||||
| Lecturer | Joseph Jon Kaminski | Office Hours / Room / Phone | Monday: 12:00-14:00 Tuesday: 14:00-17:00 |
|||||||
| jkaminski@ius.edu.ba | ||||||||||
| Assistant | Assistant E-mail | |||||||||
| Course Objectives | This course introduces students to Security Studies by first examining the field’s core theoretical approaches and comparing how each conceptualizes ‘security’. Students will then identify and analyze non-traditional security issues—including terrorism, human security, and energy security—and assess how they shape global security agendas and policy responses. Building on this foundation, the course evaluates how international institutions (such as the United Nations, regional alliances, and private security companies) address security challenges and enable—or impede—cooperation among states. Finally, students will apply these frameworks to contemporary cases, developing well-supported arguments about security strategies in contexts such as ethnic conflict, terrorism, and nuclear proliferation. | |||||||||
| Textbook | Williams, P. and McDonald, M., eds. (2023). Security Studies: An Introduction (4th Edition). New York: Routledge | |||||||||
| Additional Literature |
|
|||||||||
| Learning Outcomes | After successful completion of the course, the student will be able to: | |||||||||
|
||||||||||
| Teaching Methods | Lecturing, in-class discussions, group projects, video material | |||||||||
| Teaching Method Delivery | Face-to-face | Teaching Method Delivery Notes | ||||||||
| WEEK | TOPIC | REFERENCE | ||||||||
| Week 1 | [26.2] Introduction/Syllabus distribution and other formal business | None | ||||||||
| Week 2 | [5.3] What is Security Studies? | Williams and McDonald, ed., Introduction | ||||||||
| Week 3 | [12.3] Traditional Approaches: Realism(s), Liberalism, and Democratic Peace Theory | Williams and McDonald, ed., Ch. 1-2 | ||||||||
| Week 4 | [19.3] Constructivism | Williams and McDonald, ed., Ch. 3 | ||||||||
| Week 5 | [26.3] QUIZ 1 & Critical Approaches: Securitization, Critical Theory, Feminism, and Post-Structuralism | Williams and McDonald, ed., Chs. 4-8 | ||||||||
| Week 6 | [2.4] Key Concepts: Uncertainty, Great Power Rivalry, Energy Security, and War | Williams and McDonald, ed., Chs. 9-10, 12 | ||||||||
| Week 7 | [9.4] Key Concepts: Terrorism/Human Security and "The Responsibility to Protect" | Williams and McDonald, ed., Chs. 15-16 | ||||||||
| Week 8 | Mid-Term Exam (Covering Weeks 1-7) | Study | ||||||||
| Week 9 | [23.4] Institutions: Alliances and Regional Organizations, and the UN | Williams and McDonald, ed., Chs. 18-20 | ||||||||
| Week 10 | [30.4] Institutions: Peace Ops, Nuclear Disarmament, and Private Security Companies | Williams and McDonald, ed., Chs. 21-23 | ||||||||
| Week 11 | [7.5] Contemporary Issues: Genocide & Crimes Against Humanity and Ethnic Conflict | )Williams and McDonald, ed., Chs. 24-25 | ||||||||
| Week 12 | [14.5] QUIZ 2 & Contemporary Issues: Migration and Refugees | Williams and McDonald, ed., Ch. 33 | ||||||||
| Week 13 | [21.5] Contemporary Issues: Global Terrorism, Counterterrorism, and Counterinsurgency | Williams and McDonald, ed., Chs. 26-28 | ||||||||
| Week 14 | [28.5] Eid al-Adha Holiday | No Class; Holiday | ||||||||
| Week 15 | [4.6] Group Presentations | None | ||||||||
| Assessment Methods and Criteria | Evaluation Tool | Quantity | Weight | Alignment with LOs | AI Usage |
| Final Exam | 1 | 30 | 2, 3, 4 | Not Allowed | |
| Semester Evaluation Components | |||||
| Quiz 1 | 1 | 10 | 1 | Not Allowed | |
| Quiz 2 | 1 | 10 | 2, 3 | Not Allowed | |
| Midterm | 1 | 25 | 1, 4 | Not Allowed | |
| Attendance | 1 | 5 | 1, 2, 3, 4 | Not Allowed | |
| Presentations | 1 | 20 | 4 | Consult Instructor | |
| *** ECTS Credit Calculation *** | |||||
| Activity | Hours | Weeks | Student Workload Hours | Activity | Hours | Weeks | Student Workload Hours | |||
| Lecture Hours | 3 | 13 | 39 | Home study | 5 | 15 | 75 | |||
| Quizzes preparation | 5 | 2 | 10 | Midterm preparation | 9 | 1 | 9 | |||
| Final exam preparation | 10 | 1 | 10 | Presentation preparation | 7 | 1 | 7 | |||
| Total Workload Hours = | 150 | |||||||||
| *T= Teaching, P= Practice | ECTS Credit = | 6 | ||||||||
| Course Academic Quality Assurance: Semester Student Survey | Last Update Date: 10/04/2026 | |||||||||
