hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Critical Theory and Welsh School of Security Studies Nikita Minin KMVES FSS MUNI hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Traditional vs. Critical Theory Max Horkheimer 1937 In IR: Problem-Solving vs. Critical Theories (Robert Cox, 1981) hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Critical Theory: Assumptions hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Critical Theory •General formula (Spegele 2002): I study international relations to emancipate [X] from structure or condition [Y] in order to achieve [Z] • •E.g.: I study IR to emancipate workers in sweatshops [X] from exploitative work conditions [Y] in order to achieve more just society [Z] • • Let’s watch something =) Deadly fashion: https://vimeo.com/143868534 Niger delta: http://veroniquedeviguerie.com/project/the-oil-war-niger-delta/#gallery/1940/441 hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Galtung’s Triangle of Violence hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Critical Security Studies (CSS) Welsh School Established at the University of Aberystwyth K. Booth R. Jones A. Linklater hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png Dimensions of CSS •Broadening •“Military questions will obviously continue to have an important part in the concerns of all students of international politics. However, it is doubtful whether they will be as central a preoccupation, except for some obvious regional conflicts. This is because the institution of inter-state war is in historic decline” (Booth, 1991:316). • •Extending •“Those entities called ‘states’ are obviously important features of world politics, but they are unreliable, illogical and too diverse in their character to use as the primary referent objects for a comprehensive theory of security” (Booth, 1991: 320). • •Methodological Individualism Interregnum: “The old is dying, and the new cannot be born” (Gramsci) hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png In a group of 2-3 people based on your own understanding discuss the following questions: Security vs. Emancipation hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png It calls for action => transformational potential The “real security” is provided by emancipation: holistic and non-statist approach Focusing: Security as Emancipation hashOverlay-FullResolve.png HD-ShadowLong.png HD-ShadowShort.png •“We can begin or continue pursuing emancipation in what we research, in how we teach, in what we put on conference agendas, in how much we support Greenpeace, Amnesty International, Oxfam and other groups … and in how we deal with each other and with students. •in pursuing emancipation, the bases of real security are being established.” (Booth 1991: 326) Emancipatory Realism