Complete required readings (choose any 2 assigned readings and 2 assigned multim
Complete required readings (choose any 2 assigned readings and 2 assigned multimedia sources)
In addition to the required readings, students will research on their own and post to the discussion board one article relevant to the topic discussed in the class from periodicals Washington Post, New York Times, Financial Times, or peer-review journals. 2 posts are required: 1 original post (at least 200 words), and 1 response to/comments (at least 100 words) on your classmates’ original post.
ARTICLES:
Roland Paris, “Human Security: Paradigm Shift or Hot Air?” International Security 26, no. 2 (2001): 87–102
https://learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com/blackboard.learn.xythos.prod/5a33ed4744755/9485455?X-Blackboard-S3-Bucket=blackboard.learn.xythos.prod&X-Blackboard-Expiration=1707253200000&X-Blackboard-Signature=g%2B3sYIQEb7tzM6VvES%2Bnw00IekUMKWnQvHONDscec%2FQ%3D&X-Blackboard-Client-Id=100501&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Paris.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPj%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIQC%2BCrl86BGWxU%2Bw6BtMi0G%2FtT1wvL5JL%2BAhl2U90e%2Ft1AIgb2qzE9KE6LGavwKD27lGFVqBLuZtJOV55pUKtwfgRM0qvAUIwf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw1NTY5MDM4NjEzNjEiDE7VORPUuZIExZW%2BcSqQBXfFUT9RTBsIFuNznAYrRsxM3XoVUEfSeWCHc7SB3THIhMz2rfHsgCoch5SeqULa8hMC3XAEoerxVaksYBBwQ%2Bt%2BRZOxC7MWbWzyNruz%2BTV6SAIs4orMdPxo464BJizg2I%2FQMSBjk7lnsDMVWWogZdHjASGPKf96w44WtOMxl856kydTgLRUoopcCbGtIiF6Brcaq%2F5mQ8oiQfJfabGQ78NQsgTtEuHJtic2CEKytbceCoIL2EUezODm58up%2FsY%2Fgrn84xPyLGgQtGSRGcUtqapFWxNkR7EEvSxhtSGd3VWmZgI4zYNqC6x5zJ3rywtpizCVD%2FMP7JyApYMVH7HDnnjPIAHtkdq806R4e6xOIC3rJT06My3TTlwvlooAOi%2FO7pGLMFtxZ0%2F%2FtFxEBGrGflJWIltbQlqZRePIgpCxJcN3hzAedI6VQq1SG2otpD69%2BUm3IDGiwS6N4i4JISHFBAPFwkaTicZmTKO%2FrXKJJoZVObIKGE9R9s1XmEzSUeeRUOJGpCw8q7nzBrwncExhcYdE78fYFDJjCaTNsZ3EIZnxzpECExBreHjag2%2BXjh3bnO6kObESpfm8ag6YoU%2BzkIMDcxCNFi6VUbmOVJB66GOcKlx2qSgPSUt2W2h9msEge9zjpm9BNdyA3XhQyyfw5wHlNPxaFbdHHnDYNIhDtTlt3cYaI3PDdjzCiYCSqGJ6s4%2B%2FfBK%2FGQEIEF3IJhCzfnINVJ0EcwbgBX92l0%2FzMNmp21rQR3g6GxzfBDiF7TJHfkz3BT0DVP9BMw1ZgIxR%2F4HSF4HG%2BsgrutJUKCvZ8DmQHh%2FrZbbdFlgKpZz3G3ePVRSTUFnZfjXum2loNVHLVUrtcMaDxlQrcUlZXZjmFTkpMO%2Beia4GOrEBndblI0vKqU3pvruQReO5diamMoYauYREy8LxUYT%2FQkPhG9iSsCYhlBNFuadIOgHhzSBXC2V%2FubVTcKlyzjmFcI%2Fyq%2FmnvUMGgFVXNZD%2FpM3VSTl3CdyRANNJfzKfCG9U2fo7LAspm9puRP6wuEWmz%2B4698RUzk3eGowQR%2Bd%2Fu95julnf9YuI5UBr1SUkDuqlkxLL3Ydi5xk9DXaeuVKhwBdsMGH2%2BKXnmVADPp6Hx%2BY8&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240206T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAYDKQORRYX2FKYFX3%2F20240206%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=208d231f05216089679ed9e84b4f995960317252107928204617327d1a993f99
SKIM “Human Security in Theory and Practice”
https://learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com/blackboard.learn.xythos.prod/5a33ed4744755/9485456?X-Blackboard-S3-Bucket=blackboard.learn.xythos.prod&X-Blackboard-Expiration=1707253200000&X-Blackboard-Signature=U055A5ABtw2Luml6Nhl%2FXBt1t%2FrtVoEhUrJk%2B%2BCWPnQ%3D&X-Blackboard-Client-Id=100501&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Human%2520Security%2520in%2520Theory%2520and%2520Practice%2520English.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPj%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIQC%2BCrl86BGWxU%2Bw6BtMi0G%2FtT1wvL5JL%2BAhl2U90e%2Ft1AIgb2qzE9KE6LGavwKD27lGFVqBLuZtJOV55pUKtwfgRM0qvAUIwf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw1NTY5MDM4NjEzNjEiDE7VORPUuZIExZW%2BcSqQBXfFUT9RTBsIFuNznAYrRsxM3XoVUEfSeWCHc7SB3THIhMz2rfHsgCoch5SeqULa8hMC3XAEoerxVaksYBBwQ%2Bt%2BRZOxC7MWbWzyNruz%2BTV6SAIs4orMdPxo464BJizg2I%2FQMSBjk7lnsDMVWWogZdHjASGPKf96w44WtOMxl856kydTgLRUoopcCbGtIiF6Brcaq%2F5mQ8oiQfJfabGQ78NQsgTtEuHJtic2CEKytbceCoIL2EUezODm58up%2FsY%2Fgrn84xPyLGgQtGSRGcUtqapFWxNkR7EEvSxhtSGd3VWmZgI4zYNqC6x5zJ3rywtpizCVD%2FMP7JyApYMVH7HDnnjPIAHtkdq806R4e6xOIC3rJT06My3TTlwvlooAOi%2FO7pGLMFtxZ0%2F%2FtFxEBGrGflJWIltbQlqZRePIgpCxJcN3hzAedI6VQq1SG2otpD69%2BUm3IDGiwS6N4i4JISHFBAPFwkaTicZmTKO%2FrXKJJoZVObIKGE9R9s1XmEzSUeeRUOJGpCw8q7nzBrwncExhcYdE78fYFDJjCaTNsZ3EIZnxzpECExBreHjag2%2BXjh3bnO6kObESpfm8ag6YoU%2BzkIMDcxCNFi6VUbmOVJB66GOcKlx2qSgPSUt2W2h9msEge9zjpm9BNdyA3XhQyyfw5wHlNPxaFbdHHnDYNIhDtTlt3cYaI3PDdjzCiYCSqGJ6s4%2B%2FfBK%2FGQEIEF3IJhCzfnINVJ0EcwbgBX92l0%2FzMNmp21rQR3g6GxzfBDiF7TJHfkz3BT0DVP9BMw1ZgIxR%2F4HSF4HG%2BsgrutJUKCvZ8DmQHh%2FrZbbdFlgKpZz3G3ePVRSTUFnZfjXum2loNVHLVUrtcMaDxlQrcUlZXZjmFTkpMO%2Beia4GOrEBndblI0vKqU3pvruQReO5diamMoYauYREy8LxUYT%2FQkPhG9iSsCYhlBNFuadIOgHhzSBXC2V%2FubVTcKlyzjmFcI%2Fyq%2FmnvUMGgFVXNZD%2FpM3VSTl3CdyRANNJfzKfCG9U2fo7LAspm9puRP6wuEWmz%2B4698RUzk3eGowQR%2Bd%2Fu95julnf9YuI5UBr1SUkDuqlkxLL3Ydi5xk9DXaeuVKhwBdsMGH2%2BKXnmVADPp6Hx%2BY8&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240206T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAYDKQORRYX2FKYFX3%2F20240206%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=3dfcc69579832c167159e9074aa30f91f94065c9d71c81dfb10ed5986588ffae
MULTIMEDIA
Human Security and Agenda 2030
Jennifer Leaning: Keys to Human Security
Jer Thorp is a data artist in residence at the New York Times who explores the boundaries between science, data, art, and culture. His work has appeared in the Museum of Modern Art in Manhattan. “I come here today because I am excited about data, but also because I am terrified. I am terrified that we are having progress without culture in the world of data.”
View Time: 20:34 minutes
UNSSC Human Security Approach
RESPONSE :
Inter American Institute on Human Rights “What is Human Security?
Hama, Hawre Hasan. “State security, societal security, and human security.” Jadavpur Journal of International Relations 21, no. 1 (2017): 1-19
Multimedia:
Human Security and Agenda 2030
Jennifer Learning: Keys to Human Security
The article chosen: Human rights in patient care: A theoretical and practical framework.
In this article, the author discusses a wide range of human rights violations that occur within healthcare settings, with a specific focus on civil and political rights in relation to patient care. The author highlights that patient care, being an integral component of the right to health, has been greatly impacted by various abuses that not only violate human dignity, but also has a negative influence on health outcomes.
Furthermore, the article sheds light on the challenges faced by healthcare providers, including unsafe working conditions, limitations on freedom of association, and the denial of due process when addressing complaints. The author argues that these issues contribute to a negative environment within healthcare settings as well.
The author emphasizes the importance of acknowledging the impact of discrimination and social exclusion, particularly in the abuse experienced by marginalized groups such as people living with HIV, ethnic minorities, and individuals with disabilities. The pervasive nature of discrimination within the healthcare system leads to inaccurate diagnoses and a breakdown of trust between patients and their healthcare providers.
As a potential solution, the author suggests addressing healthcare abuses, advocating for systemic change, and demanding accountability from the government. This approach aims to rectify the current issues and promote a healthcare system that upholds human rights standards, ensuring the well-being of both patients and healthcare providers.