conf 345 dl2 syllabus spring 2017 wdavid
TRANSCRIPT
CONF 345 Section 2 Spring 2017
1
CONF 345, DL2 (Spring 2017) The Social Dynamics of Terrorism, Security, and Justice
Instructor: Dr. Will David Classroom: Blackboard 9.1 Email: [email protected] Week runs Monday-Sunday starting on 23 January
Course Description
The term terrorism has become a fixture within our security discourses. We fight a war on terrorism, identify foreign terrorist groups and state sponsors of terrorism, and worry about home-grown, domestic, lone wolf, and suicide terrorism. We even link the term to other security concerns as evidenced in cyber-terrorism and narco-terrorism. These discourses give rise to terrorism studies and responses that typically focus on security, preventive measures, laws and policies, intelligence, law enforcement, risk management, and military operations. While this course prepares students to interact with traditional security-centric approaches to terrorism, it also seeks to understand the social phenomenon of terrorism through a multidisciplinary set of lenses, including a critical framework situated within the field of conflict analysis and resolution. In the course, students will describe terrorism, thinking critically about the discourses that socially construct our understanding of the phenomenon. Students will also seek to understand and explain terrorism, examining contemporary and historical case studies to discern underlying causes and key social dynamics that beget extremism and terrorism. Finally, students will consider counterterrorism and anti-terrorism strategies, evaluating current approaches and reflecting on alternative prescriptions.
Course Overview
This course uses a distance learning format with Blackboard 9.1 as our primary meeting space. Though the delivery method is different, the course closely mirrors the traditional, in-class version and thus should take you about the same amount of time (6-8 hours each week less research and paper writing). We will cover one topic each week. In a typical week, you will: Read 50-100 pages of topic-specific material, watch 1-2 videos, watch short lectures, and
self-pace through two books that support other scheduled requirements. Participate with classmates and instructor via journal, blog, discussion board, and/or wiki. Work in groups to develop one presentation and to summarize material in a book. Work on written assignments to be submitted to Blackboard.
Syllabus and Learning Objectives
I view the syllabus as a contract. By enrolling in the course, you agree to fulfill the requirements presented in the syllabus. By the end of the course, you will have developed:
An understanding of the political, structural, social, and psychological sources of terrorism
A familiarity with various theoretical perspectives on terrorist motivations and behavior
Subject matter expertise in origins, evolution, ideologies, strategies, tactics, and dynamics of selected terrorist/extremist groups
CONF 345 Section 2 Spring 2017
2
Skills to analyze the social, psychological and political impacts of terrorism and anti-terrorism/counterterrorism strategies; and the ability to develop an intervention strategy
An appreciation for the narratives and discourses that influence our understanding of terrorism and shape our responses to it
Required Texts
Aboul-Enein, Youssef H. 2013. Militant Islamist Ideology. Annapolis: Naval Institute Press. Burrough, Bryan. 2015. Days of Rage: America’s Radical Underground, the FBI, and the Forgotten Age of Revolutionary Violence. New York: Penguin. Martin, Gus. 2015. Understanding Terrorism: Challenges, Perspectives, and Issues. Fifth Edition. Los Angeles: Sage. Other required readings/videos will be annotated on the course schedule as follows:
ER Electronic Reserve, found under the E-Reserve tab in Blackboard (BB) CC Course Content, found under the course content tab in BB EJ Electronic Journal, found online through GMU Libraries I Internet, found via the listed web address
Summary of Requirements Participation 45 pts FTO Wiki 10 pts 12, 19 Feb; 5, 26 Mar; 23 Apr FTO Presentation/Blog 10 pts Posted NLT 25 Apr, Blog interaction 26-30 Apr Journal (10 of 12) 10 pts 1, 8, 15, 22 Feb; 1, 8, 22, 29 Mar; 12, 19 Apr; 3 May Discussion Board (5 of 7) 10 pts 4, 17 Feb; 3, 24 Mar; 14, 21 Apr; 5 May Days of Rage Blog 5 pts Summary on Blog 4 Apr, Blog interaction 5-9 Apr Written Assignments 55 pts Essay #1 10 pts 23 Feb Essay #2 15 pts 30 Mar Term Paper 30 pts NLT 7 May (early submissions encouraged)
Participation This course closely mirrors the traditional classroom version of CONF 345, but replaces classroom sessions with recorded lectures and Blackboard’s interactive components (wikis, journal, blog, discussion boards). Your remarks should integrate course concepts and synthesize information from your experiences, courses, and research. Points are awarded based on the quality of your entries. Entries that do not evidence comprehension of the material or are purely composed of opinion will not earn points. As needed, I will provide personal feedback in your journal or by email. Foreign Terrorist Organization (FTO) Wiki and Presentation. You will be assigned to a team
that develops expertise on an FTO. Each team will have a BB wiki to which all team
CONF 345 Section 2 Spring 2017
3
members are expected to contribute in accordance with the due dates. Using Kaltura, each group will develop and post a presentation (with a voice track) on a blog worthy of presenting to an audience of security professionals. You will be required to comment on other group presentations and to respond to questions about your presentation. Peer assessments will help me to evaluate individual contributions to presentations.
Journal. Each student will have a journal shared only with the instructor, providing a forum
for checking your comprehension of course material. Journal entries must be accompanied by citations. You must complete 10 of 12 journal requirements, each worth 1 point.
Discussion Boards. Discussion boards provide a class forum for synthesizing information in
response to a writing prompt and to other students’ entries. Typically, you are required to provide a well-considered, well-written response to a prompt and then comment on two other student responses. There are 5 required discussions, each worth 2 points.
Domestic Terrorism (Days of Rage) Discussion. You will be assigned to a team focused on a
historical case study. Each group will briefly summarize its assigned terrorist group on a blog. Each student will read the summaries, respond to instructor prompts, and respond to at least two other student responses.
Written Assignments (see format requirements below in Expectations for Students) Essays. Essay questions require you to integrate material from the course into your
responses. Essay #1 requires a 3-page response to a question posed by a senior member of the U.S. national security enterprise. Essay #2 requires a 5-page response that draws on your knowledge of your assigned FTO and the text Militant Islamist Ideology. Assignments are provided at least two weeks before the due date.
Term Paper. This 15-page research paper will analyze an FTO or domestic
terrorist/extremist group using course concepts, propose objectives for contending with the group, and develop a counterterrorism/anti-terrorism strategy to achieve the proposed objectives. You will select your FTO/group from a list early in the course.
Grading Timeliness. Assignments are due by 11:59 pm on the due date as listed in the schedule. I do not accept late work without prior approval. Failure to submit either of the essays or the term paper earns an F for the course. Scale (points). A (95-100) B (85-89) C (75-79) D (65-69)
A-(90-94) B-(80-84) C-(70-74) F (0-64)
CONF 345 Section 2 Spring 2017
4
Schedule
Dates Requirements Assignments Part 1: Describe
Week 1 23-29 Jan 4 lectures 77 pages 2 videos
Thinking Critically about Terrorism & Historical Survey of Terrorism Lectures (CC)
Topic: Welcome and Instructor Introduction
Topic: Couse Overview
Topic: Critical Thinking
Topic: Historical Survey of Terrorism Readings
Syllabus (BB)
Martin 2015: Ch 1, 2-19 (text)
Stampnitzky, Lisa. 2013. “The Invention of Terrorism and the Rise of the Terrorism Expert.” In Disciplining Terror: How Experts Invented “Terrorism.” Cambridge University Press, 21-48. (ER)
Rapoport, D.C. 2002. “The Four Waves of Rebel Terror and September 11th.” Anthropoetics 8: 1-19. (EJ)
Holland, Jack and Lee Jarvis, 2014. “Night Fell on a Different World: Experiencing, Constructing, and Remembering 9/11.” Critical Studies on Terrorism 7:2, 187-199. (EJ)
Videos
Gilbert, Dan, 2005. “Why We Make Bad Decisions,” TED Talks (I) (33:38 min) http://www.ted.com/talks/dan_gilbert_researches_happiness
9/11 Attacks Videos. History. (I) (4:45) http://www.history.com/topics/9-11-attacks/videos/911-timeline
25 Jan: Journal #1 (1 pt) NLT 29 Jan: Personal introductions on Discussion Board (0 pts) -no prescribed format, but please let us know what name you prefer to be addressed by, your location (state or country), your academic major and expected graduation date, and any information about you that you think is relevant to our study of terrorism (e.g., previous/current employment, job interests, academic studies, research interests, life experiences)
Week 2 30 Jan-5 Feb 1 lecture 68 pages
Defining and Conceptualizing Terrorism Lecture (CC)
Topic: Defining and Conceptualizing Terrorism Readings Martin 2015: Ch 2, 22-43 (text) Ganor, Boaz. 2010. “Defining Terrorism—Is one Man’s Terrorist Another
Man’s Freedom Fighter?” International Institute for Counter-Terrorism. (I) http://www.ict.org.il/Article/1123/Defining-Terrorism-Is-One-Mans-Terrorist-Another-Mans-Freedom-Fighter
Richards, Anthony. 2014. “Conceptualizing Terrorism.” Studies in Conflict & Terrorism 37:3, 213-231. (EJ)
Matusitz, Jonathan. 2013. “Terrorism as a Communication Process: The Audience.” In Terrorism and Communication: A Critical Introduction. Los Angeles: Sage, 77-102. (ER)
Skim: Combating Terrorism Center at West Point (I) https://www.ctc.usma.edu/
[look at the topics in recent issues of the CTC Sentinel]
“Counterterrorism 2016 Calendar.” The National Counterterrorism Center (I) http://www.nctc.gov/site/index.html [look at the FTOs listed under the
groups-tab]
30 Jan: Submit rank ordered preferences for your FTO (contemporary case study) and domestic terrorist group (historical case study) from the posted list 1 Feb: Journal #2 (1 pt) 4 Feb: Discussion Board #1 (2 pts)
CONF 345 Section 2 Spring 2017
5
Part 2: Explain/Understand
Week 3 6-12 Feb 2 lectures 62 pages
Causes of Terrorism Lectures (CC)
Topic: The Explanatory Poles
Topic: Theoretical Lenses (Basic Human Needs, Social Identity Theory, Structural/Cultural Violence)
Readings
Martin 2015: Ch 3, 46-71 (text)
Crenshaw, Martha. 1998. “The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice.” In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich. Woodrow Wilson Center Press, 7-24. (ER)
Newman, Edward. 2006. “Exploring the ‘Root’ Causes of Terrorism.” Studies in Conflict & Terrorism 29, 749-772. (EJ)
Ehrlich, Paul R. and Jianguo Liu. 2002. “Some Roots of Terrorism.” Population and Environment 24: 2, 183-190. (EJ)
Sprinzak, Ehud. 1991. “The Process of Delegitimation: Toward a Linkage Theory of Political Terrorism.” Terrorism and Political Violence 3:1, 50-68. (CC)
6 Feb: Essay #1 assigned 8 Feb: Journal #3 (1 pt) 12 Feb: Wiki #1- Summary of the FTO (2 pts) -Origins/brief history -Significance of name and symbols -Key leaders and organization -Grievances -Areas of operation -Major recent activities
Week 4 13-19 Feb 2 lectures 90 pages 2 videos
Terrorism in/and the Media & Terrorist Tactics, Targets, and Measures of Effectiveness Lectures (CC) Topic: Terrorism in/and the Media Topic: The Elements of Terrorist Strategy
Readings Martin 2015: Ch 10, 266-299 and Ch 11, 303-324 (text) Hoffman, Bruce. 2006. “The New Media, Terrorism, and the Shaping of
Global Opinion.” In Inside Terrorism. New York: Columbia University Press, 197-228. (ER)
Videos Jihad TV: Terrorism and Mass Media. 2006. (47:11) (I/GMU Films on
Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=37557&loid=48164
Hamas to Kids: Shoot all the Jews. 2014. Al-Aqsa TV. Palestinian Media Watch. (1:28) (I) https://www.youtube.com/watch?v=0ORAM-usqhQ
15 Feb: Journal #4 (1 pt) 17 Feb: Discussion Board #2 (2 pts) 19 Feb: Wiki #2- Contextual Factors (2 pts) -geographic -social/cultural -demographic -economic -political
Week 5 20-26 Feb 1 lecture 55 pages 1 video
Dissident & Criminal Dissident Terrorism Lecture (CC) Topic: Dissident Terrorism Readings Martin 2015: Ch 5, 107-130 and Ch 9, 246-264 (text) Sanchez-Cuenca, Ignacio. 2007. “The Dynamics of Nationalist Terrorism: ETA
and the IRA.” Terrorism and Political Violence 19:3, 289-303. (EJ) Videos
In the Name of Liberation: Freedom by any Means. 2002. (48:51) (I/GMU Films on Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.asp
20 Feb: Submit your top three term paper topic preferences from the posted list of FTOs and domestic terrorist/extremist groups 22 Feb: Journal #5 (1 pt) 23 Feb: Essay #1 (10 pts)
CONF 345 Section 2 Spring 2017
6
x?wID=96306&xtid=31761 Week 6 27 Feb-5 Mar 1 lecture 53 pages 1 video
State Terrorism Lecture (CC) Topic: State Terrorism Readings Martin 2015: Ch 4, 76-105 (text) Collins, Stephen D. 2014. “State-Sponsored Terrorism: In Decline, Yet Still a
Potent Threat.” Politics & Policy 42:1, 131-155. (EJ) Videos In the Name of the State: When Might Makes Right. 2002. (48:02) (I/GMU
Films on Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=31764
1 Mar: Journal #6 (1 pt) 3 Mar: Discussion Board #3 (2 pts) 5 Mar: Wiki #3- FTO Strategy (2 pts) -Why resort to terrorism? -Goals/Objectives -Targets/Victims -Audiences (supporters/recruits) -Audiences (onlookers, analysts, decision makers) -Intended Message(s)
Week 7 6-12 Mar 1 lecture 42 pages 2 videos
Ideology and Terrorism Lecture (CC) Topic: Ideology and Terrorism Readings Martin 2015: Ch 7, 163-205 (text) Videos In the Name of Politics: Gun Barrel Politics. 2002. (48:27) (I/GMU Films on
Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=31762
Why We Fight—FARC-EP. (5:57) (I) https://www.youtube.com/watch?v=UpOW0XAppUY&list=UU_0s__EG%20M7SprOWwiO-mlyA
6 Mar: Essay #2 assigned 8 Mar: Journal #7 (1 pt)
Week 8 13-19 Mar
Spring Break
Week 9 20-26 Mar 1 lecture 57 pages 2 videos
Religion and Terrorism Lecture (CC) Topic: Religion and Terrorism Readings Martin 2015: Ch 6, 133-161 (text) Gregg, Heather S. 2014. “Defining and Distinguishing Secular and Religious
Terrorism.” Perspectives on Terrorism 8:2, 36-47. (EJ) Rudner, Martin. 2013. “Al Qaeda’s Twenty-Year Strategic Plan: The Current
Phase of Global Terror.” Studies in Conflict & Terrorism 36:12, 953-971. (EJ) Videos In the Name of God: Holy Word, Holy War. 2002. (48:16) (I/GMU Films on
Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=31763
Failed Suicide Bomber Interview. (27:24) (I) https://www.youtube.com/watch?v=OYSyoY4cRw4
22 Mar: Journal #8 (1 pt) 24 Mar: Discussion Board #4 (2 pts) 26 Mar: Wiki #4- FTO Operations (2 pts) -Use of Islamist ideology -Recruiting -Funding -Propaganda/Communication -Tactics
CONF 345 Section 2 Spring 2017
7
Week 10 27 Mar-2 Apr 1 lecture 76 pages 2 videos
Domestic Terrorism Lecture (CC) Topic: Domestic Terrorism Readings Martin 2015: Ch 8, 212-214 and Ch 12, 328-367 (text) Bjelopera, Jerome P. 2013. The Domestic Terrorist Threat: Background and
Issues for Congress. Washington, D.C.: Congressional Research Service, January 17, 2013, 1-34. (CC)
Video Democracy Now. 2015. “Does US. Ignore Right-Wing Terror? More Killed by
White Extremists than Jihadists Since 9/11,” (17:42) (I) https://www.youtube.com/watch?v=GxUK7o7_s0I
The Oklahoma Bomber: International Terrorism Since 1945. (26:14) (I/GMU Films on Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=57565
Skim: Southern Poverty Law Center. “Hate and Extremism.” (I)
http://www.splcenter.org/what-we-do/hate-and-extremism [look at the map and note the groups active in Virginia or other states of interest to you]
29 Mar: Journal #9 (1 pt) 30 Mar: Essay #2 (15 pts)
Week 11 3-9 Apr
Domestic Terrorism Seminar: Days of Rage Discussion Historical case studies: Weatherman, BLA, SLA, FALN, SMJJ Extremism in the U.S. and Responses to it Reflections on current U.S. domestic conditions
3 Apr: Finish reading Days of Rage 4 Apr: Domestic terrorism case study summary posted to Blog by each group 5, 7, and 9 Apr: Domestic Terrorism Seminar Blog (5 pts)
Part 3: Prescribe
Week 12 10-16 Apr 1 lecture 72 pages 2 videos
Responding to Terrorism I: U.S. National Security Lecture (CC) Topic: Fundamentals of US National Security Strategy
Readings Martin 2015: Ch 13, 374-408 (text) Abrahms, Max. 2014. “Deterring Terrorism: A New Strategy.” Perspectives on
Terrorism 8:3, 2-12. (EJ) Crelinsten, R.D. 2014. “Perspectives on Counterterrorism: From Stovepipes
to a Comprehensive Approach.” Perspectives on Terrorism 8:1, 2-12. (EJ) Maan, Ajit. 2015. “Narrative: The Critical Component of Counter-Terrorism
Strategy.” Small Wars Journal, June 14 (I) http://smallwarsjournal.com/jrnl/art/narrative-the-critical-component-of-counter-terrorism-strategy
Morehouse, Matthew. 2014. “It’s Easier to Decapitate a Snake than it is a Hydra: An Analysis of Colombia’s Targeted Killing Program.” Studies in Conflict & Terrorism 37:7, 541-556. (EJ)
Videos Are We Safer. 2011. PBS (21:25) (I)
http://www.pbs.org/wgbh/pages/frontline/are-we-safer/ Fighting Terror with Torture. 2015. (29:28) (I/GMU Films on Demand)
http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.asp
12 Apr: Journal #10 (1 pt) 14 Apr: Discussion Board #5 (2 pts)
CONF 345 Section 2 Spring 2017
8
x?wID=96306&xtid=115638
Skim: National Security Strategy of the United States 2015 (CC) U.S Department of State. 2016. “Chapter 6. Foreign Terrorist
Organizations.” Country Reports on Terrorism 2015, 349-404. (CC) Committee Study of the Central Intelligence Agency’s Detention and
Interrogation Program. Senate Select Committee on Intelligence. Updated for release April 3, 2014. (CC) [Focus on the 20 findings and conclusions]
Week 13 17-23 Apr 1 lecture 85 pages 1 video
Responding to Terrorism II: U.S. Homeland Security Lecture (CC) Topic: Counter-terrorism and Anti-Terrorism Approaches Readings Martin 2015: Ch 14, 413-439 (text) Brady, Patricia. 2004. “The Impact of the September 11, 2001 Terrorist
Attacks on Civil Liberties.” In Understanding Terrorism: Threats in an Uncertain World, Akorlie A. Nyatepe-Coo and Dorothy Zeisler-Vralsted, ed. New Jersey: Prentice Hall, 175-182. (ER)
“Preventing Terrorism.” Department of Homeland Security. (I) http://www.dhs.gov/preventing-terrorism (Read the page worth of material under each of the ten subordinate headings)
Jenkins, Brian M. 2014. “When Jihadis Come Marching Home.” Perspectives. RAND Corporation, 1-27. (I) http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE130-1/RAND_PE130-1.pdf
Schimmel, Kimberly S. 2012. “Protecting the NFL/Militarizing the Homeland.” International Review for the Sociology of Sport 47(3), 338-352. (EJ)
Video Krebs, Valdis. 2014. Ending Up on the Wrong Side of the Tracks. TEDx (15:55)
(I) https://www.youtube.com/watch?v=opPh67ImhfE&feature=iv&src_vid=R-y71DEMZHc&annotation_id=annotation_1597129955
Skim one of the following: Terrorism. Federal Bureau of Investigation. (I) http://www.fbi.gov/about-
us/investigate/terrorism Terrorism. National Institute of Justice. (I)
http://nij.gov/topics/crime/terrorism/pages/welcome.aspx “Terrorism and Homeland Security.” RAND. (I)
http://www.rand.org/topics/terrorism-and-homeland-security.html
19 Apr: Journal #11 (1 pt) 21 Apr: Discussion Board #6 (2 pts) 23 Apr: Wiki #5- Responding to the FTO (2 pts) -Strengths & vulnerabilities -CT/AT strategies used against the FTO to date -Effectiveness of strategies
Week 14 24-30 Apr
FTO Presentations and Q & A
FTO Presentation and Q &A (10 pts) 25 Apr: FTO Presentation posted to blog 27 Apr: Comments and questions posted on Blog 30 Apr: Follow up comments and replies to questions posted on Blog
CONF 345 Section 2 Spring 2017
9
Expectations of Students Effective Preparation. Student preparation and interaction in this upper level course are essential elements of the learning environment. You must complete all readings and videos and actively participate in the Blackboard environment. You must follow current affairs related to terrorism and you should use a variety of news sources to contrast their coverage of the same issues.
Blackboard Protocol. Blackboard is our classroom and thus you must visit it regularly to stay abreast of course updates, participate with your classmates, and complete requirements. I use Blackboard Announcements to provide guidance on upcoming readings/assignments, updates to the course, commentary on breaking events, and links to newly found articles and websites. You will interact with me and your classmates via journal, discussions, and wikis. Your contributions are expected to demonstrate comprehension of the assigned material and evidence synthesis as you draw on what you have learned in this course, other academic pursuits, research, and relevant life experiences. While opinion is sometimes welcomed, the preponderance of your contributions must reflect a scholarly approach to the subject matter. Accordingly, you must cite references in your entries as appropriate. Some material may be controversial and perhaps disturbing at times. Be mindful of the sensitivities of others when contributing to discussions; however, critical thinking and open dialogue are our goals.
Instructor-Student Communication. Please feel free to email me with questions or concerns. I will respond to emails within 48 hours and usually much sooner. Unless the email is of a personal nature, please check the following (available on Blackboard) prior to contacting me: syllabus, help forum, Blackboard videos on features, Blackboard Q&A, and Technology Requirements. Mason requires that Mason email be used for all courses. When you email me, be sure to include CONF 345 DL2 at the beginning of the subject heading to alert me that I have a message from one of my online students.
Week 15 1-7 May 1 lecture 35 pages 2 videos
How Terrorism Ends & Course Wrap Up Lecture (CC) Topic: Course Wrap Readings
Martin 2015: Ch 15, 443-463 (text) Rogers, Paul. 2013. “Lost Cause: Consequences and Implications of the War
on Terror.” Critical Studies on Terrorism 6:1, 13-27. (EJ) Videos Goodman, Marc. 2012. “A Vision of Crimes in the Future.” TED (19:22) (I)
http://www.ted.com/talks/marc_goodman_a_vision_of_crimes_in_the_future?language=en#t-1138285
McCue, Jason. 2012. “Terrorism is a Failed Brand.” TED (18:55) (I) https://www.ted.com/talks/jason_mccue_terrorism_is_a_failed_brand?language=en
1 May: FTO-group peer assessments 3 May: Journal #12 (1 pt) 5 May: Discussion Board #7 (2 pts) NLT 7 May: Term Paper (30 pts) 7 May: End of course evaluation
CONF 345 Section 2 Spring 2017
10
Written assignments. I expect well-written papers that adhere to the prescribed length and required format. Edit your papers carefully as spelling and grammatical errors will lower your score. Papers must comply with the following:
Typed and double-spaced, using Times New Roman 12-point font and one-inch paper margins. Requirement applies to all elements of the paper, including footnotes if used.
Body of the paper must be left justified. Do not manipulate margins or fonts to lengthen or shorten the paper.
Material/ideas from other sources must be properly cited, using a standard citation format (e.g., APA, MLA). Papers will be submitted through Safe Assign on Blackboard.
Pages must be numbered, beginning with the first page of your essay, excluding the title page. Endnotes, footnotes, works cited, bibliography, pictures/graphics, and title pages do not count towards the assigned paper length.
Paper must be the required length. The 3-page essay must be between 2 ½ to 3 ½ pages, the 5-page essay between 4 ½ to 5 ½ pages, and the 15-page term paper between 14 ½ to 15 ½ pages.
Page footers or headers must include CONF 345-DL2, the date turned in, and your name on a single line (i.e., CONF 345-DL2/19 February 2017/ (your name here).
Papers must be typed in black on a white background. Papers (digital copy) is due by midnight on the due date. Extensions will be arranged
only for documented personal illness or emergencies. Late papers will not be accepted.
Academic Integrity Students must be responsible for their own work, and students and faculty must take on the responsibility of dealing explicitly with violations. The tenet must be a foundation of our university culture. [See http://academicintegrity.gmu.edu]. Assignments for this course will be run through a SafeAssign module within Blackboard, which electronically checks for plagiarism.
Honor Code Students must adhere to the guidelines of the GMU Honor Code [See http://oai.edu/the-
mason-honor-code/]. You are expected to abide the Honor Code while preparing all work for this
class:
“To promote a stronger sense of mutual responsibility, respect, trust, and fairness among all members
of the George Mason University community and with the desire for greater academic and personal
achievement, we, the student members of the University Community, have set forth this: Student
members of the George Mason University community pledge not to cheat, plagiarize, steal, and/or lie
in matters related to academic work.”
"All George Mason University students have agreed to abide by the letter and the spirit of the Honor Code. You can find a copy of the Honor Code at academicintegrity.gmu.edu. All violations of the Honor Code will be reported to the Honor Committee for review. With specific regards to plagiarism, there are three fundamental principles to follow: (1) all work submitted be your own; (2) when using the work or ideas of others, including fellow students, give full credit through accurate citations; and (3) if you are
CONF 345 Section 2 Spring 2017
11
uncertain about the ground rules on an assignment, ask for clarification. If you have questions about when the contributions of others to your work must be acknowledged and appropriate ways to cite those contributions, please talk with the professor.” “S-CAR requires that all written work submitted in partial fulfillment of course or degree requirements must be available in electronic form so that it can be compared with electronic databases, as well as submitted to commercial services to which the School subscribes. Faculty may at any time submit a student's work without prior permission from the student. Individual instructors may require that written work be submitted in electronic as well as printed form. S-CAR's policy on plagiarism is supplementary to the George Mason University Honor Code; it is not intended to replace or substitute for it."
Patriot Pass
Once you sign up for your Patriot Pass, your passwords will be synchronized, and you will use
your Patriot Pass user name and password to log in to the following systems: Blackboard,
University Libraries, MasonLive, Patriot Web, and the Virtual Computing Lab.
University Policies
Students must follow university policies. [See http://universitypolicy.gmu.edu]
Responsible Use of Computing
Students must follow university policy. [See
http://universitypolicy.gmu.edu/policies/responsible-use-of-computing].
University Calendar
Details regarding the current Academic Calendar. [See
http://registrar.gmu.edu/calendars/index.html].
Student Services
Technical Support
If you have difficulty logging into Blackboard, contact the ITU support center at
[email protected] or 703-993-8870. If you have questions regarding Blackboard features or
other course materials, email [email protected].
University Libraries
University Libraries provides resources for distance students. [See
http://library.gmu.edu/distance and http://infoguides.gmu.edu/distance_students ].
CONF 345 Section 2 Spring 2017
12
Writing Center
The GMU Writing Center staff provides a variety of resources and services (e.g., tutoring,
workshops, writing guides, handbooks) intended to support students as they work to construct
and share knowledge through writing [See http://writingcenter.gmu.edu]. You can now sign up
for an Online Writing Lab (OWL) session just like you sign up for a face-to-face session in the
Center, which means you can set the time and date of your appointment.
Counseling and Psychological Services
The GMU Counseling and Psychological Services (CAPS) staff consists of professional counseling
and clinical psychologists, social workers, and counselors who offer a wide range of services
(e.g., individual and group counseling, workshops, and outreach programs) to enhance
students’ personal experience and academic performance [See http://caps.gmu.edu]
Disability Support Services
Students with disabilities who seek accommodations in a course must be registered with the
GMU Office of Disability Services (ODS) and inform their instructor, in writing, at the beginning
of the semester [See http://ods.gmu.edu].
Family Educational Rights and Privacy Act (FERPA) FERPA, also known as the “Buckley Amendment,” is a federal law that gives protection to student educational records and provides students with certain rights. [See http://registrar.gmu.edu/privacy]