Complete required readings (choose any 2 assigned readings and 2 assigned multim

Complete required readings (choose any 2 assigned readings and 2 assigned multimedia sources)
In addition to the required readings, students will research on their own and post to the discussion board one article relevant to the topic discussed in the class from periodicals Washington Post, New York Times, Financial Times, or peer-review journals. 2 posts are required: 1 original post (at least 200 words), and 1 response to/comments (at least 100 words) on your classmates’ original post.
ARTICLES:
Roland Paris, “Human Security: Paradigm Shift or Hot Air?” International Security 26, no. 2 (2001): 87–102
https://learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com/blackboard.learn.xythos.prod/5a33ed4744755/9485455?X-Blackboard-S3-Bucket=blackboard.learn.xythos.prod&X-Blackboard-Expiration=1707253200000&X-Blackboard-Signature=g%2B3sYIQEb7tzM6VvES%2Bnw00IekUMKWnQvHONDscec%2FQ%3D&X-Blackboard-Client-Id=100501&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Paris.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPj%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIQC%2BCrl86BGWxU%2Bw6BtMi0G%2FtT1wvL5JL%2BAhl2U90e%2Ft1AIgb2qzE9KE6LGavwKD27lGFVqBLuZtJOV55pUKtwfgRM0qvAUIwf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw1NTY5MDM4NjEzNjEiDE7VORPUuZIExZW%2BcSqQBXfFUT9RTBsIFuNznAYrRsxM3XoVUEfSeWCHc7SB3THIhMz2rfHsgCoch5SeqULa8hMC3XAEoerxVaksYBBwQ%2Bt%2BRZOxC7MWbWzyNruz%2BTV6SAIs4orMdPxo464BJizg2I%2FQMSBjk7lnsDMVWWogZdHjASGPKf96w44WtOMxl856kydTgLRUoopcCbGtIiF6Brcaq%2F5mQ8oiQfJfabGQ78NQsgTtEuHJtic2CEKytbceCoIL2EUezODm58up%2FsY%2Fgrn84xPyLGgQtGSRGcUtqapFWxNkR7EEvSxhtSGd3VWmZgI4zYNqC6x5zJ3rywtpizCVD%2FMP7JyApYMVH7HDnnjPIAHtkdq806R4e6xOIC3rJT06My3TTlwvlooAOi%2FO7pGLMFtxZ0%2F%2FtFxEBGrGflJWIltbQlqZRePIgpCxJcN3hzAedI6VQq1SG2otpD69%2BUm3IDGiwS6N4i4JISHFBAPFwkaTicZmTKO%2FrXKJJoZVObIKGE9R9s1XmEzSUeeRUOJGpCw8q7nzBrwncExhcYdE78fYFDJjCaTNsZ3EIZnxzpECExBreHjag2%2BXjh3bnO6kObESpfm8ag6YoU%2BzkIMDcxCNFi6VUbmOVJB66GOcKlx2qSgPSUt2W2h9msEge9zjpm9BNdyA3XhQyyfw5wHlNPxaFbdHHnDYNIhDtTlt3cYaI3PDdjzCiYCSqGJ6s4%2B%2FfBK%2FGQEIEF3IJhCzfnINVJ0EcwbgBX92l0%2FzMNmp21rQR3g6GxzfBDiF7TJHfkz3BT0DVP9BMw1ZgIxR%2F4HSF4HG%2BsgrutJUKCvZ8DmQHh%2FrZbbdFlgKpZz3G3ePVRSTUFnZfjXum2loNVHLVUrtcMaDxlQrcUlZXZjmFTkpMO%2Beia4GOrEBndblI0vKqU3pvruQReO5diamMoYauYREy8LxUYT%2FQkPhG9iSsCYhlBNFuadIOgHhzSBXC2V%2FubVTcKlyzjmFcI%2Fyq%2FmnvUMGgFVXNZD%2FpM3VSTl3CdyRANNJfzKfCG9U2fo7LAspm9puRP6wuEWmz%2B4698RUzk3eGowQR%2Bd%2Fu95julnf9YuI5UBr1SUkDuqlkxLL3Ydi5xk9DXaeuVKhwBdsMGH2%2BKXnmVADPp6Hx%2BY8&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240206T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAYDKQORRYX2FKYFX3%2F20240206%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=208d231f05216089679ed9e84b4f995960317252107928204617327d1a993f99
SKIM “Human Security in Theory and Practice” https://learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com/blackboard.learn.xythos.prod/5a33ed4744755/9485456?X-Blackboard-S3-Bucket=blackboard.learn.xythos.prod&X-Blackboard-Expiration=1707253200000&X-Blackboard-Signature=U055A5ABtw2Luml6Nhl%2FXBt1t%2FrtVoEhUrJk%2B%2BCWPnQ%3D&X-Blackboard-Client-Id=100501&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Human%2520Security%2520in%2520Theory%2520and%2520Practice%2520English.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPj%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIQC%2BCrl86BGWxU%2Bw6BtMi0G%2FtT1wvL5JL%2BAhl2U90e%2Ft1AIgb2qzE9KE6LGavwKD27lGFVqBLuZtJOV55pUKtwfgRM0qvAUIwf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw1NTY5MDM4NjEzNjEiDE7VORPUuZIExZW%2BcSqQBXfFUT9RTBsIFuNznAYrRsxM3XoVUEfSeWCHc7SB3THIhMz2rfHsgCoch5SeqULa8hMC3XAEoerxVaksYBBwQ%2Bt%2BRZOxC7MWbWzyNruz%2BTV6SAIs4orMdPxo464BJizg2I%2FQMSBjk7lnsDMVWWogZdHjASGPKf96w44WtOMxl856kydTgLRUoopcCbGtIiF6Brcaq%2F5mQ8oiQfJfabGQ78NQsgTtEuHJtic2CEKytbceCoIL2EUezODm58up%2FsY%2Fgrn84xPyLGgQtGSRGcUtqapFWxNkR7EEvSxhtSGd3VWmZgI4zYNqC6x5zJ3rywtpizCVD%2FMP7JyApYMVH7HDnnjPIAHtkdq806R4e6xOIC3rJT06My3TTlwvlooAOi%2FO7pGLMFtxZ0%2F%2FtFxEBGrGflJWIltbQlqZRePIgpCxJcN3hzAedI6VQq1SG2otpD69%2BUm3IDGiwS6N4i4JISHFBAPFwkaTicZmTKO%2FrXKJJoZVObIKGE9R9s1XmEzSUeeRUOJGpCw8q7nzBrwncExhcYdE78fYFDJjCaTNsZ3EIZnxzpECExBreHjag2%2BXjh3bnO6kObESpfm8ag6YoU%2BzkIMDcxCNFi6VUbmOVJB66GOcKlx2qSgPSUt2W2h9msEge9zjpm9BNdyA3XhQyyfw5wHlNPxaFbdHHnDYNIhDtTlt3cYaI3PDdjzCiYCSqGJ6s4%2B%2FfBK%2FGQEIEF3IJhCzfnINVJ0EcwbgBX92l0%2FzMNmp21rQR3g6GxzfBDiF7TJHfkz3BT0DVP9BMw1ZgIxR%2F4HSF4HG%2BsgrutJUKCvZ8DmQHh%2FrZbbdFlgKpZz3G3ePVRSTUFnZfjXum2loNVHLVUrtcMaDxlQrcUlZXZjmFTkpMO%2Beia4GOrEBndblI0vKqU3pvruQReO5diamMoYauYREy8LxUYT%2FQkPhG9iSsCYhlBNFuadIOgHhzSBXC2V%2FubVTcKlyzjmFcI%2Fyq%2FmnvUMGgFVXNZD%2FpM3VSTl3CdyRANNJfzKfCG9U2fo7LAspm9puRP6wuEWmz%2B4698RUzk3eGowQR%2Bd%2Fu95julnf9YuI5UBr1SUkDuqlkxLL3Ydi5xk9DXaeuVKhwBdsMGH2%2BKXnmVADPp6Hx%2BY8&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240206T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAYDKQORRYX2FKYFX3%2F20240206%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=3dfcc69579832c167159e9074aa30f91f94065c9d71c81dfb10ed5986588ffae
MULTIMEDIA
Human Security and Agenda 2030 https://www.youtube.com/watch?v=ekJ48qp_OoA&feature=youtu.be&skip_registered_account_check=true
Jennifer Leaning: Keys to Human Security
Jer Thorp is a data artist in residence at the New York Times who explores the boundaries between science, data, art, and culture. His work has appeared in the Museum of Modern Art in Manhattan. “I come here today because I am excited about data, but also because I am terrified. I am terrified that we are having progress without culture in the world of data.”