International Security

3.33 / 5 rating2.44 / 5 difficulty5.56 hrs / week

Quick Facts and Resources

Something missing or incorrect? Tell us more.

Name
International Security
Listed As
INTA-6103
Credit Hours
3
Available to
CY students
Description
Examines traditional and nontraditional issues in international security, including the uses of military force, military strategy and policy, arms control, peacekeeping, the environment, and migration.
Syllabus
Syllabus not found.
Textbooks
No textbooks found.
  • cAG/XYpU07QHrYCqBe14zg==2023-11-28T17:01:53Zfall 2023

    I enjoyed the class. A lot of reading material is assigned for each module, but it can be done. The assignments are all written (reading reflections, discussion posts, midterm, and final) and are usually oriented around reading assignments. A word to the wise would be to make sure you give yourself plenty of time to do the lectures and reading assignments each week; otherwise, you will quickly find yourself getting behind in the class. If you have an interest in international relations, then this will be a very enjoyable class. This is an elective for the OMS Cybersecurity program, but there's less around cybersecurity than I would have expected. I found the information in class useful and made me think about how cyber would relate to the topics discussed (e.g., security dilemma, nuclear weaponry and deterrence, etc.). Don't let that be a deterrent (pun not intended but not withdrawn) to taking this class. It gives you an understanding of foreign policy and sets the table for how the cyber domain fits.

    Rating: 5 / 5Difficulty: 3 / 5Workload: 10 hours / week

  • FCD8FEhYJscmlLA0Ff1t7A==2023-08-22T21:09:19Zsummer 2023

    Regrettably, I must admit that my expectations were misguided by previous reviews regarding the course workload. I recognize that each student has their own approach to studying and comprehending the material. However, considering an average weekly reading load of 100 pages, it seems that those who manage to complete the requirements in just a few hours weekly must possess an exceptional proficiency in reading and a deep understanding of international relations.

    Regarding the course content itself, I find it lacking in development. The instructional materials consist of dry slide presentations, a compilation of reading materials from various schools of thought, and lecture scripts that appear to have not been proofread. Additionally, the scheduling of assignments lacks consideration, as does the responsiveness to student inquiries within the promised 24-hour timeframe. These are areas that require substantial improvement.

    In addition to addressing the aforementioned areas of improvement within the course team, I propose that future iterations of the course incorporate more objective quizzes. This would serve as an alternative to the current format of entirely subjective assignments, which place a considerable burden on students in terms of writing effort, as well as on instructors and teaching assistants in terms of grading efforts. Moreover, the grading consistency across students is not maintained.

    For individuals considering enrollment in this course in the future, I strongly advise seeking feedback from students who have already completed it before finalizing your decision to enroll.

    Rating: 2 / 5Difficulty: 3 / 5Workload: 20 hours / week

  • Georgia Tech Student2021-12-27T22:38:19Zfall 2021

    This course was both enjoyable and very, very pertinent to cybersecurity. I saw some other comments from students who said the course seemed to have very little with cybersecurity, but I know from experience this class was very good and should prove useful in the future for those students who plan to enlarge their career prospects.

    I've already worked in infosec for many years, and most of that time was overseas. As a practitioner, I've had to work both with foreign governments on policy and with the nitty-gritty details of reading log files or coding a script to solve some issue.

    If students think cybersecurity is just coding, then that's fine and you can work as a low-level analyst or network administrator. There's nothing wrong with that. But I've had to explain issues to visiting congressional delegations and to agencies of foreign governments in their own jargon and from their POV so they could understand the geopolitical ramifications. This is where this class comes in handy. It gives a VOCABULARY you can use and be aware of when -- at the managerial or executive level -- you need to frame a discussion in a certain way.

    And even if you are a threat analyst, appreciating the historical and geopolitical intricacies of a situation can illuminate (possibly) some things for you with attribution.

    Like many things in life, you get out of something what you put in. This class was a very welcome breath of fresh air and I can see wholeheartedly why it's part of the curriculum. If you cannot see how or why it's part of the course, then either trust me or drop the course.

    There are lots of readings. You get out of them what you put in. I've actually connected with some of the authors (those who are alive, because some of the readings are quite old) via LinkedIn when I've cited them in my writings, and I've found it very valuable for networking and for enlarging my own knowledge.

    As for the movies (someone commented on them previously), the movies are a great addition. They help focus on extracting meaning from another medium (besides the written word) and also to view issues surrounding war and peace from a cultural standpoint. Importantly, in at least the film I saw, even though the film was produced 58 years ago, it specifically focused on the same problems of deterrence we find with cyber -- how can deterrence take place when we want to keep our cyber strengths hidden from our enemy? This of course then impacts attribution and ways we struggle in cybersecurity with some of those issues. Again, you get out of it what you put in.

    One interesting thing: I was chatting with a friend who runs a global research institute during the semester and I mentioned I was in the Masters program and he asked me if I had ever read XYZ author. I told him that there were a couple assigned readings by that XYZ author. He said they were about to hire XYZ author for their cybersecurity department. So, again, you get out of it what you put in. This was a serendipitous occurrence and shows the web of relationships emanating from this class.

    Rating: 5 / 5Difficulty: 3 / 5Workload: 4 hours / week

  • Georgia Tech Student2021-12-20T19:31:44Zfall 2021

    This morning I realized I was out of axe deodorant and added it to my shopping list. Was planning on hitting the store on Wednesday. What does this have to do with a review? Nothing. It is the equivalent of this class having anything to do with cybersecurity.

    It is a VERY EASY A and yet I could not stand any of it. I'm probably the only person infuriated by such an experience. Normally when I'm in a masters program I expect the curriculum to actually match the degree subject. Normally when I'm enrolled at a top university I expect something beyond the basics. The professors do not do a good job tying in cybersecurity because they know very little about it. They do not even know how to use Canvas correctly. Even if they are passionate about the subject, it is just a rehash of political science theory taught in undergrad. A broad overview. How about applying it to cyberspace. Fifteen modules and only one directly broaches the subject? What? This is not interesting, not practical.

    If you need padding or a light course to pair with a more difficult one, this course is perfect. Perfect. Very little work and some weeks have no deliverables. If you prefer to actually learn anything related to the degree, wait for 8803 Geopolitics of Cyber.

    Also keep this in mind if you wind up in this class: do not try to critically think. Reading memos are just copy and paste quotes between what this author said and what that author said. Never mind that some of these ideas may have been discredited. Don't try to question the material. Discussion boards are hideous essays, not real discussions. And get that initial post right or points are deducted. Pathetic. Looks like these assignments flew in from 2005 when higher ed was just getting the hang of online. One student even used 37 references for a discussion board. Posts are supposed to be between 250 to 500-words! This is shorter than the average blog. How is it possible to have that many references unless every other word is cited. What is the point?

    And no, I do not want to watch movies like we are in high school. Does anyone really think this is academic? I did go in to this class with an open mind, hoping against hope that finally we will cover cyber in what is apparently a half-baked program. Because next semester I take the capstone and have no clue as to what to do. Maybe I will propose to review films about the Cold War.

    Rating: 1 / 5Difficulty: 1 / 5Workload: 1 hours / week

  • Georgia Tech Student2021-12-16T22:47:24Zfall 2021

    I really enjoyed this class and glad I took it. I do agree with some of the other reviews that it is a political science course. The instructors did a good job to align the coursework to cybersecurity and there were a few modules towards the end of the course that dealt directly with cyber ops, although I would have liked to have seen more cyber topics in the course. I feel like an open mind is helpful, especially in the earlier parts of the course, to understand the "why" perspective of nation states or terrorist organizations as threat actors in the cyber realm.

    The assignments were all writing based and included 3 reading memos, 4 discussions, a midterm and final. Reading memos were 3 pages and meant to identify an argument within a set of readings and discuss consistencies/inconsistencies and provide policy implications. The discussions included an initial 500 word post and 2 follow-ups. The midterm was 6-8 pages based on a movie of your choice from a listing of three. The final was 10 pages based on two essay questions of your choice from a listing.

    Overall, fantastic course and learned quite a bit. I put in about 4 hours a week on average with some weeks being much less. If you enjoy political science with a cyber twist here and there, I would definitely recommend.

    Rating: 5 / 5Difficulty: 2 / 5Workload: 4 hours / week

  • Georgia Tech Student2021-12-14T23:14:10Zfall 2021

    FUCK YOU FOR PUTTING THIS BEHIND A PAYWALL. I have removed my review.

    Rating: 1 / 5Difficulty: 3 / 5Workload: 1 hours / week

  • Georgia Tech Student2021-12-09T18:12:06Zfall 2021

    This class was good for a political science course. If you enjoy history and geopolitics, you will enjoy this class. They tried to tie some of the material to cyber, which was useful. I truly believe this class would be more beneficial to the cyber program if all papers and discussions were applying cyber related use cases to the international security theories.

    Overall, the class averaged about 3 hours of work a week. I spent about 2 hours on each discussion post or reading memo. 8 hours for the midterm and 8 hours for the final. If you did all the reading assigned, I assume it would be closer to 15 hours a week. The discussions were probably more align with an actual graduate level discussion. It felt like a paper more than a discussion. The reading memos were straight forward, they were looking for you to discuss theories in each. The midterm and final are longer papers with more freedom to pick a topic.

    The instructors are very passionate and responded quickly. I did enjoy listening to the lectures. In the end, I did learn some concepts that will be beneficial in strategy purposes in industry. This class can be easily paired with another course.

    Rating: 3 / 5Difficulty: 2 / 5Workload: 3 hours / week

  • Georgia Tech Student2021-12-02T21:34:24Zfall 2021

    This class is very fair and the material was interesting to me. Both instructors and TAs are very responsive on piazza and provide good feedback on assignments. There are 4 Discussions (1 initial 200-500 word post & 2 reponses), 3 Essays on the readings (3 page max paper) and an essay for the Mid-Term and Final Exam which you have a week to complete. There is a lot of assigned reading however you can skim and get a general idea of what the debate is. You can definitely pair this course with another. I would enjoy this class even more if I wasn't taking it with CS6035 which takes up majority of my time.

    Rating: 4 / 5Difficulty: 2 / 5Workload: 4 hours / week

  • Georgia Tech Student2021-10-07T15:51:45Zfall 2021

    We're about halfway through the semester but I thought I'd write a review since this is the first time this class is being offered online. The class assignments are 4 discussions, 3 memos, 1 mid-term essay, and 1 final essay. The course content includes lectures and probably 150-200 pages of reading a week. Don't freak out at that amount of reading--you definitely don't have to read every word of every page assigned. I've been skimming and copy + pasting important quotes and page numbers from the texts into a document that I can reference for writing assignments. The content of this course is really interesting, but not super relevant specifically to cybersecurity. It has been way more fun than some of the telecom/information management classes though. I am pairing the class with INTA6742 and have had no issues balancing the workload plus a full time job.

    Rating: 4 / 5Difficulty: 3 / 5Workload: 3 hours / week