The Chinese University of Hong Kong Master of Social Science in Global Political Economy Programme

Similar documents
Introduction to Terrorism POLSCI Fall 2014

PSC/IR 273 The Politics of Terrorism Fall :40am-10:55am, Dewey Alexander Lee

INTL 4410: Terrorism

Hoffman, Bruce Inside Terrorism: Revised and Expanded Edition. Columbia University Press. ISBN:

INTL 4410: Terrorism

General Course Information

Introduction: What is New About Research on Terrorism

INR 3084 Spring 2011

INTL 4410: Terrorism

Advanced Research in Terrorism

Insurgency, Terrorism, and Civil War

Politics 160A The War on Global Terrorism Fall 2016, Thursday, 5:00-7:50pm

Terrorism and Asymmetric Warfare Course Syllabus

Critical Approaches to Terrorism Studies Christina Tallungan, Director of Debate at Notre Dame High School (Sherman Oaks, CA)

POLS 5179 Terrorism: A Comparative Politics Perspective

1 SF Pratt 24/09/2014

PO/IR 265 TERRORISM: STRATEGIES OF DESTRUCTION IES Abroad Rome

Martha Crenshaw. Senior Fellow at the Freeman Spogli Institute for International Studies. Bio BIO ACADEMIC APPOINTMENTS HONORS AND AWARDS

GOVT 315 Terrorism and Insurgency Department of Government Georgetown University

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0

Colloquium on Political Violence and Terrorism Political Science BC 3055 Spring 2012 Mondays 2:10-4:00pm

David Mares Tu,Th 11-12:20 SSB 366 Peterson Office Hours: T 2-3 & by app t

Terrorism and Anti-terrorism Spring Credits Stockholm Major disciplines: International Relations, Political Science

James Anthony Piazza

INTL 4410: Terrorism and Insurgency Tuesday/Thursday 9:30 to 10:45 am Park Hall 0139

Course Description. Required Readings

Terror From Within: The Political Determinants of Domestic Terrorism 1

GVPT 409P: Seminar in International Relations and World Politics: Conflict in the International System

Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate

Scholars of terrorism have been studying the connections between democracy and terrorism for decades. Religion, Democracy and Terrorism

Political Violence Course Description Course Aims Learning Outcomes

GVPT 409P: Seminar in International Relations and World Politics: Conflict in the International System

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

Threatening retaliation against third-party enablers can help prevent terrorist organizations from obtaining needed resources.

Toward an Anthropology of Terrorism. As noted in Chapter 10 of Introducing Anthropology of Religion, terrorism (or any other form of violence)

San José State University Justice Studies JS 270 A-80, Global Terrorism (Online), Summer, 2018

Terrorist Group and Government Interaction: Progress in Empirical Research

NOREF Expert Analysis

Terrorism, Insurgency, and Civil War Fall 2010 (Public Policy 38730)

Politics of Terror. David A. Siegel. Course Description. Readings

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

INTERNATIONAL RELATIONS LAB VI

GOVT International Security. Fall George Mason University. Time: Monday 4:30pm Office: Robinson A 219

M.A. Program in Peace and Conflict Management Studies Faculty of Social Sciences

When Insurgents Go Terrorist: The Role of Foreign Support in the Adoption of Terrorism

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

Researching Democracy and Terrorism: How Political Access Affects Militant Activity

WEB APPENDIX. to accompany. Veto Players and Terror. Journal of Peace Research 47(1): Joseph K. Young 1. Southern Illinois University.

Journal Publications. Asal, Victor, Michael Findley, James A. Piazza, and James Igoe Walsh. Forthcoming. Political

Potential for radicalization amongst Syrian refugees in Jordan and Lebanon: Risks, factors, and implications

Nonstate Actors and the Diffusion of Innovations: The Case of Suicide Terrorism

Required Texts: Optional Texts:

Conceptualising International Terrorism. Fernando Reinares

GOVT International Security. Spring George Mason University. Time: Wednesday 7:20pm Office: Robinson A 219

Tactical Diversity in Militant Violence. October 2015

Masters in Terrorism and Political Violence - Full time programme

DRAFT EXPLANATORY MEMORANDUM

Terrorism, Democracy, and Credible Commitments 1

Pol486/Pol2205. The Changing Face of War: From Interstate War to Asymmetric Warfare Fall/Winter Session 2013/2014

Why Choose Terrorism? Rebels and Terrorists

Susanne Martin. Assistant Professor (2011 Present) Department of Political Science University of Nevada, Reno

International Relations: Theories and Approaches GOV 761 Spring Professor Matthew Kroenig Georgetown University

Draft Syllabus. International Relations (Govt ) June 04-July 06, Meeting Location: ICC 104 A. Farid Tookhy

Promise and Pitfalls of Terrorism Research

790:322- Strategies of International Relations

University of Colorado at Denver. School of Public Affairs. CJ 6600, International Terrorism

DRAFT 5 October 2012 (NOTE: This draft will be refined and updated closer to the start of the Spring term.)

INTERNATIONAL TERRORISM AND COUNTERTERRORISM. Spring Political Science MWF , Maybank 316. Dr. Mary Desjeans

University of Rochester IR 214 Fall 2011 Tuesdays/Thursdays 3:25-4:40 Dewey 2110D. Political Violence in Comparative Perspective

DEMOCRACY IN DIVIDED SOCIETIES. Central European University MA Course, Winter Semester 2015

The Importance of Territory: Probing the Nature and Effectiveness of Terrorism

Politics of Terror. David A. Siegel. Course Description

RINT 505/RPOS 582 Global Security Class Meeting Time and Location: Monday, 5:45-9:25p, Milne 215 Office Hours and Location: 3:30-5:30p, Milne 220

NAVAL POSTGRADUATE SCHOOL THESIS

Course ID Number: DCC5440 Course Title: International Conflict Resolution. No. of Credits: 2

From Chechnya to Israel: Social Movement Analyses of Opposition Groups; Strategic Insights, v. 7 issue 2 (April 2008)

THE CAUSES, CONSEQUENCES, AND MANAGEMENT OF CIVIL WARS 030:178, Section 1

MIAMI UNIVERSITY. The Graduate School. Certificate for Approving the Dissertation. We hereby approve the Dissertation of. Katherine Wynn Mitakides

Psychosocial processes and intervention strategies behind Islamic deradicalization: a scoping review

Diaspora Politics and Transnational Political Violence

A rationalist explanation of terrorist targeting

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

DIPL 6000: Section AA International Relations Theory

Datum Entry requirements and specific admission requirements: Admission to the Master s programme in politics and war.

Contents. Violence in Global Politics... 2 Methods and Organization of the Class... 2 Assignment and Grading... 3 References... 4

Poli 140C: International Crisis Diplomacy

Conceptualizing Terrorist Violence and Suicide Bombing

Global Studies Seminar A

POLI/PWAD 457: International Conflict Processes Fall 2015 University of North Carolina at Chapel Hill

Chapter 8: The Use of Force

SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW?

Adaptive Tactics: Terrorist Targeting and Regime Type

Emma Leonard Boyle The Pennsylvania State University

The Impact of Networks on the Adoption of Tactical Nonviolence 1

Benjamin Acosta, From Bombs to Ballots: When Militant Organizations Transition to Political Parties, The Journal of Politics (2014)

Syllabus International Security

Regime Types and Terrorism Revisited: The Institutional Determinants of Terrorism

The Terror OCTOBER 18, 2001

Trends in Modern International Terrorism

Lee Jarvis List of Publications (September 2014)

Transcription:

The Chinese University of Hong Kong Master of Social Science in Global Political Economy Programme GPEC 5421 Terrorism and Counterterrorism Period 4, 2014 Course Outline Instructor: Seanon Wong Email: seanonwo@usc.edu Tuesday 6:45 9:30pm WMY 405 Consultation hours: by appointment Course Description This course is designed for students interested in the subject of terrorism and counterterrorism. Students learn primarily through reading, analyzing and critiquing some of the most cutting-edge publications in the literature. The course begins by asking two basic yet all-important questions: what is terrorism, and how do we study it? Then, in Part I, we explore the causes of terrorism through six conceptually distinct approaches: 1) strategic; 2) socio-organizational; 3) ideological and cultural; 4) international and societal; 5) psychological; and 6) critical. Understanding these approaches is crucial because they often imply rather different (and sometimes contradictory) policies for counterterrorism. In Part II, we engage in some of the most heated debates among policymakers and scholars. These debates range from the normative (e.g. can terrorism ever be justified?) to the empirical (e.g. is the threat of terrorism being overstated?). Course Assessment 40% Participation: To take advantage of the small class size (and since this is a postgraduate-level course), students are expected to learn from each other through lively discussions, debates and critiques of the readings, and the ideas of the instructor and other students (in a respectful manner, of course). Remember: mere presence in class is not participation. 30% Literature review and discussion leadership: Students will each prepare one literature review in preparation for class discussion (on Mar 25, Apr 8 and 15). Assignment of dates will be made in the first and second meetings of the course. A review should be no longer than 1,500 words. It should contain a brief summary of the week s required readings, how they speak and relate to each other, followed by a critique of their arguments, and 2-3 questions. These questions should be analytical and critical (e.g. Author X argues that poverty is the root cause of terrorism. But how can we account for the fact that most of the perpetrators on 9/11 were relatively well-to-do? ), not factual (e.g. When was Osama bin Laden killed? ). The review 1

should be circulated through elearning at least 24 hours before class (i.e. Mon 6:45pm). This is to ensure that the instructor and other students have sufficient time to read, digest and prepare their responses. In class, students should explain the content of their review (in no more than 10 minutes), and facilitate discussion along with the instructor. 30% Debate presentation: In Part II (Apr 22 and 29), students will each present one of the following debates in Stuart Gottlieb (ed.). 2014. Debating Terrorism and Counterterrorism: Conflicting Perspectives on Causes, Contexts, and Responses. CQ Press. 2 nd ed. Can terrorism ever be justified? (Ch. 3) Is suicide terrorism and effective tactic? (Ch. 5) Is nuclear terrorism a real threat? (Ch. 6) Do we need bombs over bridges? (Ch. 7) Can spreading democracy help defeat terrorism? (Ch. 8) Can international organizations make a difference in fighting terrorism? (Ch. 9) Is an outright ban the best way to eliminate or constrain torture? (Ch. 10) Does providing security require a trade-off with civil liberties? (Ch. 11) Is the threat of terrorism being overstated? (Ch. 12) Presentations should detail the arguments put forth by both sides of the debate. Students are expected to take a stance, and more importantly, explain their underlying reasons and provide supporting evidence. They are strongly encouraged to conduct additional bibliographic research to bolster their argument. Presentations should not exceed 30 minutes, followed by 5-10 minutes of Q&A. The use of PowerPoint is optional. Students should email the instructor their top three preferences of debates by Apr 1 (Tues). Topics will be assigned on a first-come-first-served basis. Course Schedule and Readings Those marked with a * are required readings, while the rest are recommended only. Students are expected to complete all required readings before class. They are available for download on elearning. Mar 11 Introduction and overview Mar 18 What is terrorism? * Hoffman, Bruce. 2006. Defining Terrorism. In Inside Terrorism, 1 41. Columbia University Press. 2

Weinberg, Leonard, Ami Pedahzur, and Sivan Hirsh-Hoefler. 2004. The Challenges of Conceptualizing Terrorism. Terrorism and Political Violence 16 (4): 777 794. Hutchinson, Martha Crenshaw. 1972. The Concept of Revolutionary Terrorism. The Journal of Conflict Resolution 16 (3): 383 396. Jaggar, Alison M. 2005. What Is Terrorism, Why Is It Wrong, and Could It Ever Be Morally Permissible? Journal of Social Philosophy 36 (2). 202-217. Schmid, Alex P., and A.J. Jongman. 2005. Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature. 2 nd ed. Transaction Publishers. Wilkinson, Paul. 1981. Can A State Be Terrorist? International Affairs 57 (3). 467-472. How do we study it? * Crenshaw, Martha. 1981. The Causes of Terrorism. Comparative Politics 13 (4): 379-399. Crenshaw, Martha, ed. 1995. Thoughts on Relating Terrorism to Historical Contexts. In Terrorism in Context, 3 24. Pennsylvania State University Press. Chomsky, Noam. 2001. The United States Is a Leading Terrorist State: An Interview with Noam Chomsky by David Barsamian. Monthly Review 53, No. 6. Young, Joseph K., and Michael G. Findley. 2011. Promise and Pitfalls of Terrorism Research. International Studies Review 13 (3): 411 431. Sandler, Todd, and Walter Enders. 2007. Applying Analytical Methods to Study Terrorism. International Studies Perspectives 8 (3): 287 302. LaFree, Gary, and Laura Dugan. 2007. Introducing the Global Terrorism Database. Terrorism and Political Violence 19 (2): 181 204. Sandler, Todd. 2009. The Past and Future of Terrorism Research, Revista de Economía Aplicada 17 (50). 5-25. Mar 25 Strategic PART I: CAUSES OF TERRORISM * Kydd, Andrew H., and Barbara F. Walter. 2006. The Strategies of Terrorism. International Security 31 (1): 49 80. * Crenshaw, Martha. 1998. The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice. In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich, 7 24. Woodrow Wilson Center Press. Pape, Robert A. 2003. The Strategic Logic of Suicide Terrorism. The American Political Science Review 97 (3): 343 361. Abrahms, Max. 2006. Why Terrorism Does Not Work. International Security 31 (2): 42 78. Rose, William, Rysia Murphy, and Max Abrahms. 2007. Does Terrorism Ever Work? The 2004 Madrid Train Bombings. International Security 32 (1): 185 192. 3

Lake, David A. 2002. Rational Extremism: Understanding Terrorism in the Twenty- First Century. Dialogue IO 1 (1): 15 29. O Rourke, Lindsey A. 2009. What s Special About Female Suicide Terrorism? Security Studies 18 (4): 681 718. Crenshaw, Martha. 2007. Explaining Suicide Terrorism: A Review Essay. Security Studies 16 (1): 133 162. Clauset, Aaron, Lindsay Heger, Maxwell Young, and Kristian Skrede Gleditsch. 2010. The Strategic Calculus of Terrorism: Substitution and Competition in the Israel-Palestine Conflict. Cooperation and Conflict 45 (1). 6 33. Gaibulloev, Khusrav, and Todd Sandler. 2009. Hostage Taking; Determinants of Terrorist Logistical and Negotiation Success. Journal of Peace Research 46 (6). 739-756. Socio-organizational * Crenshaw, Martha. 2001. Theories of Terrorism: Instrumental and Organizational Approaches. In Inside Terrorist Organizations, ed. David C. Rapoport, 13 31. 2nd ed. Routledge. * Abrahms, Max. 2008. What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy. International Security 32 (4): 78 105. Pearlman, Wendy. 2008. Spoiling Inside and Out: Internal Political Contestation and the Middle East Peace Process. International Security 33 (3): 79 109. Bloom, Mia M. 2004. Palestinian Suicide Bombing: Public Support, Market Share, and Outbidding. Political Science Quarterly 119 (1): 61-88. Crenshaw, Martha. 1985. An Organizational Approach to the Analysis of Political Terrorism." Orbis 29 (3). 465-89. Asal, Victor, and R. Karl Rethemeyer. 2008. The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks. Journal of Politics 70 (2): 437-449. Chenoweth, Erica, Nicholas Miller, Elizabeth McClellan, Hillel Frisch, Paul Staniland, and Max Abrahms. 2009. What Makes Terrorists Tick. International Security 33 (4): 180 202. McCormick, Gordon. 2003. Terrorist Decision Making. Annual Review of Political Science 6. 473-507. Apr 1 No class Apr 8 Ideological and cultural * Gottlieb, Stuart. 2009. Debating Terrorism and Counterterrorism: Conflicting Perspectives on Causes, Contexts, and Responses. CQ Press. Ch. 4. 4

* Moghadam, Assaf. 2009. Motives for Martyrdom: Al-Qaida, Salafi Jihad, and the Spread of Suicide Attacks. International Security 33 (3): 46 78. Piazza, James A. 2009. Is Islamist Terrorism More Dangerous?: An Empirical Study of Group Ideology, Organization, and Goal Structure. Terrorism and Political Violence 21 (1): 62 88. Ron, James. 2001. Ideology in Context: Explaining Sendero Luminoso s Tactical Escalation. Journal of Peace Research 38 (5): 569 592. Gottlieb, Stuart. 2009. Debating Terrorism and Counterterrorism: Conflicting Perspectives on Causes, Contexts, and Responses. CQ Press. Ch. 1. Hafez, Mohammed. 2006. Rationality, Culture, and Structure in the Making of Suicide Bombers: A Preliminary Theoretical Synthesis and Illustrative Case Study. Studies in Conflict and Terrorism 29 (2): 165 185. Iannaccone, Laurence R., and Eli Berman. 2006. Religious Extremism: The Good, the Bad, and the Deadly. Public Choice 128. 109 129. Abrahms, Max. 2006. Al Qaeda s Scorecard: A Progress Report on Al Qaeda s Objectives. Studies in Conflict and Terrorism 29. 509-529. Sageman, Marc. 2008. The Next Generation of Terror. Foreign Policy, February 19. Hoffman, Bruce. 2010. American Jihad. The National Interest, June. Byman, Daniel, and Christine Fair. 2010. The Case for Calling Them Nitwits. The Atlantic Monthly. August. Kaufman, Stuart J. 2009. Narratives and Symbols in Violent Mobilization: The Palestinian-Israeli Case. Security Studies 18. 400-434. Kaufman, Stuart J. 2006. Symbolic Politics or Rational Choice? Testing Theories of Extreme Ethnic Violence. International Security 30 (4). 45 86. Stern, Jessica. 2003. Terror in the Name of God: Why Religious Militants Kill. New York: Harper Collins. Juergensmeyer, Mark. 2003. Terror in the Mind of God: The Global Rise of Religious Violence. 2 nd ed. Berkeley: University of California Press. Rapoport, David C. 1984. Fear and Trembling: Terrorism in Three Religious Traditions. American Political Science Review 78 (3). 658-677. International and societal * Gottlieb, Stuart. 2009. Debating Terrorism and Counterterrorism: Conflicting Perspectives on Causes, Contexts, and Responses. CQ Press. Ch. 2 * Thayer, Bradley A., and Valerie M. Hudson. 2010. Sex and the Shaheed: Insights from the Life Sciences on Islamic Suicide Terrorism. International Security 34 (4): 37 62. Ross, Jeffrey Ian. 1993. Structural Causes of Oppositional Political Terrorism: Towards a Causal Model. Journal of Peace Research 30 (3): 317 329. Piazza, James A. 2008. Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism? International Studies Quarterly 52 (3): 469 488. 5

Horowitz, Michael C. 2010. Nonstate Actors and the Diffusion of Innovations: The Case of Suicide Terrorism. International Organization 64 (1): 33 64. Piazza, James A. 2008. A Supply-Side View of Suicide Terrorism: A Cross-National Study. The Journal of Politics 70 (1): 28 39. Wade, Sara Jackson, and Dan Reiter. 2007. Does Democracy Matter? Regime Type and Suicide Terrorism. The Journal of Conflict Resolution 51 (2): 329 348. Li, Quan. 2005. Does Democracy Promote or Reduce Transnational Terrorist Incidents? Journal of Conflict Resolution 49 (2): 1 20. Shughart, William F. II. 2006. An Analytical History Terrorism. Public Choice 128: 7 39. Sobek, David, and Alex Braithwaite. 2005. Victim of Success: American Dominance and Terrorism. Conflict Management and Peace Science 22 (2): 135 148. Mousseau, Michael. 2002. Market Civilization and its Clash with Terror. International Security 27 (3). 5-29. Abadie, Alberto. 2006. Poverty, Political Freedom, and the Roots of Terrorism. American Economic Review 96. 50-56. Piazza, James A. 2006. Rooted in Poverty? Terrorism, Poor Economic Development, and Social Cleavages. Terrorism and Political Violence 18. 159-177. Newman, Edward. 2006. Exploring the Root Causes of Terrorism. Studies in Conflict and Terrorism 29. 749-772. Burgoon, Brian. 2006. On Welfare and Terror: Social Welfare Policies and Political- Economic Roots of Terrorism. Journal of Conflict Resolution 50 (2). 176-203. Wade, Sara Jackson, and Dan Reiter. 2007. Does Democracy Matter? Regime Type and Suicide Terrorism. The Journal of Conflict Resolution 51 (2): 329 348. Apr 15 Psychological * Post, Jerrold M. 1998. Terrorist Psycho-logic: Terrorist Behavior as a Product of Psychological Forces. In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich, 25 40. Woodrow Wilson Center Press. * Bandura, Albert. 1998. Mechanisms of Moral Disengagement. In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich, 161 191. Woodrow Wilson Center Press. Victoroff, Jeff. 2005. The Mind of the Terrorist: A Review and Critique of Psychological Approaches. Journal of Conflict Resolution 49 (1): 3 42. Kruglanski, Arie W., Xiaoyan Chen, Mark Dechesne, Shira Fishman, and Edward Orehek. 2009. Fully Committed: Suicide Bombers Motivation and the Quest for Personal Significance. Political Psychology 30 (3): 331 357. Smith, Allison G. 2008. The Implicit Motives of Terrorist Groups: How the Needs for Affiliation and Power Translate into Death and Destruction. Political Psychology 29 (1). 55-75. 6

Crenshaw, Martha. 2000. The Psychology of Terrorism: An Agenda for the Twenty First Century. Political Psychology 20 (2). 405-420. Horgan, John. 2005. The Psychology of Terrorism. London: Frank Cass. Post, Jerrold M. 2010. When Hatred is Bred in the Bone : The Social Psychology of Terrorism. Annals of the New York Academy of Sciences 1208. 15-23. Argo, Nichole. 2009. Why Fight? Examining Self-Interested versus Communally- Oriented Motivations in Palestinian Resistance and Rebellion. Security Studies 18 (4). 651-680. Critical * Jackson, Richard. 2007. Introduction: the Case for Critical Terrorism Studies. European Political Science: European Political Science 6 (3): 225 227. * Jackson, Richard. 2007. The Core Commitments of Critical Terrorism Studies. European Political Science 6 (3): 244 251. * Jackson, Richard. 2007. Constructing Enemies: Islamic Terrorism in Political and Academic Discourse. Government and Opposition 42 (3): 394 426. Gunning, Jeroen. 2007. Babies and Bathwaters: Reflecting on the Pitfalls of Critical Terrorism Studies. European Political Science 6 (3): 236 243. Blakeley, Ruth. 2007. Bringing the State Back into Terrorism Studies. European Political Science 6 (3): 228 235. Gunning, Joroen. 2007. A Case for Critical Terrorism Studies? Government and Opposition 42 (3). 363-393. Horgan, John, and Michael Boyle. 2008. The Case Against Critical Terrorism Studies. Critical Studies on Terrorism 1 (1). 51-64. Smyth, Marie Breen. 2007. A Critical Research Agenda for the Study of Political Terror. European Political Science 6 (3). 260-268. Apr 22 Debate presentations #1 PART II: MAJOR DEBATES ON TERRORISM Apr 29 Debate presentations #2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ University Policy and Regulations on Honesty in Academic Work Attention is drawn to University policy and regulations on honesty in academic work, and 7

to the disciplinary guidelines and procedures applicable to breaches of such policy and regulations. Details may be found at http://www.cuhk.edu.hk/policy/academichonesty/. With each assignment, students will be required to submit a signed declaration that they are aware of these policies, regulations, guidelines and procedures. For group projects, all students of the same group should be asked to sign on the declaration. For assignments in the form of a computer-generated document that is principally textbased and submitted via VeriGuide, the statement, in the form of a receipt, will be issued by the system upon students' uploading of the soft copy of the assignment. Assignments without the receipt will not be graded by teachers. Only the final version of the assignment should be submitted via VeriGuide. 8