首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Although it has been the major states of China, the former Soviet Union and especially the United States that have made the major contributions to shaping the security architecture of the Asia-Pacific region since 1945, the UN system has played a useful, adjunct role. This is especially the case in the post-Cold War era when its principal bodies, together with its various specialized agencies, have provided vital support in moving warring societies into a period of relative peace and stability. The UN peace-building operations in Cambodia and East Timor were some of the most demanding ever undertaken by this universal institution. But beyond these particular examples, the United Nations has been influential in the region in other, more indirect, ways. It has set standards, its charter has been a powerful source of ideas when it comes to composing parallel documents at the state or regional levels, and it has helped with the negotiation of global arms control treaties, making up to some degree for the absence of such arrangements at the regional level. The UN has also had a legitimating function, providing an arena where Asia-Pacific states can publicize their grievances, and receive approval or reprimand for their behaviour. It has played a valuable role, too, as third-party mediator. However, the UN's political structure constrains the contribution it can make to the security order since it is reliant on major state agreement before it can act. Veto power - not its actual use but simply its anticipated use - gives China, Russia and the United States a controlling function with respect to a potential UN role in the management of conflict. Beijing and Washington would work, and have worked, to exclude the United Nations from major involvement in conflicts in which they have direct security interests: the Taiwan and Korean issues being the two most obvious in this regard. Thus, the United Nations is a useful buttress but not a central pillar of the region's security architecture.  相似文献   

2.
3.
4.
5.
Abstract. On the basis of data on the Dutch peace movement, we study the relationship between traditional organizations of political intermediation such as parties, unions and churches with a new social movement on the local level. After having argued for the relevance of the institutional context, the general structure of new social movements and the particular structure of the movement under consideration with regard to this relationship, we first present evidence confirming our claims that we are dealing with new social movement. Then we show that the relationships in question are quite elaborate confirming the hypothesis that political activity within traditional organizations and new social movements is to some extent cumulative. More generally, the results imply that the development of the peace movement and other new social movements in the Netherlands is not indicating a diminishing legitimacy of the Dutch political parties.  相似文献   

6.
Abstract

This paper analyses the evolution of Sino-Japanese rivalry in the security sphere concentrating on the Chinese perspective, and placing it within the wider context of complex interstate rivalry between China, Japan and the United States. From a theoretical viewpoint, this research contributes to the literature on interstate rivalry from multiparty perspective, which has been overlooked in existing research. China–Japan–US complex interstate rivalry includes elements of positional, spatial and ideological rivalry simultaneously. When rivalries mix two or more rivalry types, they become more difficult to resolve. The two broad trends of China’s military build-up and deepening US–Japan alliance evolve in tandem intensifying rivalry dynamics and increasing positional elements of rivalry. There are many indications on various levels that for China, controlling Japan’s international ambitions has become less important and more attention is paid to ways in which Japan helps the United States in reaching its objectives in Asia through their alliance agreement. The cases analysed to display complex interstate rivalry include the Taiwan question, territorial disputes in the East and South China Seas, and the North Korean nuclear issue.  相似文献   

7.
8.
The Internet of Things (IoT) is a disruptive innovation known for its socio-economic potential, but also for generating unprecedented vulnerabilities and threats. As a dynamic sociotechnical system, the IoT comprises well-known cybersecurity risks and endemic uncertainties that arise as IoT adoption increases and the system evolves. We highlight the impact of these challenges by analyzing how insecure IoT devices pose threats to both consumer protection and the Internet's infrastructure. While recent regulatory responses are starting to target IoT security risks, crucial deficiencies – especially related to the feedback necessary to keep pace with emerging risks and uncertainties – must be addressed. We propose a model of adaptive regulatory governance that integrates the benefits of centralized risk regulatory frameworks with the operational knowledge and mitigation mechanisms developed by epistemic communities that manage day-to-day Internet security. Rather than focusing on the choice of regulatory instruments, this model builds on the “planned adaptive regulation” literature to highlight the need to systematically plan for a knowledge-sharing interface in regulatory governance design for disruptive technologies, facilitating the feedback necessary to address evolving IoT security risks.  相似文献   

9.
In the 1990s doors have been closing in the Western world against refugee claimants. Although there are multiple causes for declining generosity towards refugees, arguments that refugees pose security problems to host nations have been particularly prominent. An historical analysis reveals that the so‐called ‘golden age’ of postwar refugee settlement from the 1940s to the mid‐1970s was a by‐product of Cold War security and propaganda considerations. The end of the Cold War and the pressures of refugee movements generated by Third World and former Communist bloc conflicts has restructured Western refugee discourse. Refugees now tend to be seen as importers of external political conflicts into the West. At the same time growing European and North American resentment of ‘foreigners’ competing for declining job opportunities and reduced social services have encouraged anti‐immigrant political movements. By tightening barriers and controls over refugees on security grounds, Western governments are able to respond in part to these pressures. The Cold War policing and security alliance in Europe has been retooled to form the basis of a new post‐Cold War cooperation over immigration and refugee security, without the necessity of creating a new framework of supranational institutions.  相似文献   

10.
11.
Supplemental Security Income (SSI), a federal assistance program for the needy aged, blind and disabled, replaced the old federal-state welfare programs in January 1974. The enactment of this income floor, following a decade of revolutionary growth in aid to these three groups, may precipitate further program reform. First, the VA pension program aiding a beneficiary group similar to that of SSI, could be merged with SSI into a single federal program. Second, SSI may mark a turning point in the development of the social security system. A federally-administered income floor for the poor who are elderly or disabled can relieve social security of the welfare elements built into that system in an earlier period, allowing its original function of wage-replacement to be improved. A reorientation of social security vis-à-vis SSI would also allow a more equitable treatment of persons covered under one or both programs.  相似文献   

12.
13.
14.
15.
16.
The strong military defense posture is perhaps the most well-known attribute of the Swedish security policy. A military-industrial policy of self-sufficiency is often described as a necessary condition for the peace-time credibility of Sweden's nonaligned position and will to stay neutral in war. What is not so well known are the underlying premises, costs involved and the alternatives rejected. This article analyzes national and international developments with important implications for the future. When the suit of the traditional Swedish security policy becomes too small, the margins of security become apparent.  相似文献   

17.
This paper examines discriminatory membership in the European Union from a game-theoretical perspective. I argue that discriminatory membership enables the enlargement of international organizations with heterogenous member states. EU members impose discriminatory measures on new members to redistribute enlargement gains from new members to particularly negatively affected EU members as to render expansion pareto-efficient. The empirical findings of a probit analysis on the EU accession negotiations and outcomes of all five EU enlargement rounds support the theoretical claim. The EU grants acceding states restricted membership rights if distributional conflicts emerge. Moreover, the candidate’s bargaining power and the possibility of alternative compensation schemes influence the enlargement outcomes.  相似文献   

18.
Journal of Chinese Political Science - This essay reviews methodological advances in Internet studies in Chinese politics. First, automated text analysis reduces the time and cost of examining...  相似文献   

19.
20.
As regions become more institutionalized, they are characterized by two competing trends. First, key regional institutions can become hub institutions that act as transmitters of a comprehensive set of norms. Second, as regional institutions increase in number, regions themselves are liable to become more fragmented. How these trends have played out is explored in two key regions, the Americas and the Asia-Pacific. It is concluded that regions are not static entities but are ever-changing structural arrangements. Hub institutions can be challenged and the consequences can be significant as regions gain in importance on the international stage.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号