Downloaded by [University of Defence] at 20:55 07 June 2016 Chinese Foreign Relations with Weak Peripheral States

Downloaded by [University of Defence] at 20:55 07 June 2016 Chinese Foreign Relations with Weak Peripheral States

Downloaded by [University of Defence] at 20:55 07 June 2016 Chinese Foreign Relations with Weak Peripheral States This book examines China’s relations with its weak peripheral states through the theoretical lens of structural power and structural violence. China’s foreign policy concepts toward its weak neighbouring states, such as the ‘One Belt, One Road’ strategy, are premised on the assumption that eco- nomic exchange and a commitment to common development are the most effec- tive means of ensuring stability on its borders. This book, however, argues that China’s over-reliance on economic exchange as the basis for its bilateral relations contains inherently self-defeating qualities that have contributed and can further contribute to instability and insecurity within China’s periphery. Unequal eco- nomic exchange between China and its weak neighbours results in Chinese influ- ence over the state’s domestic institutions, what this book refers to as ‘structural power’. Chinese structural power, in turn, can undermine the state’s development, contribute to social unrest, and exacerbate existing state/society tensions – what this book refers to as ‘structural violence’. For China, such outcomes lead to instability within its peripheral environment and raise its vulnerability to security threats stemming from nationalism, separatism, terrorism, transnational organ- ised crime, and drug trafficking, among others. This book explores the causality between China’s economically-reliant foreign policy and insecurity in its weak peripheral states and considers the implications for China’s security environment and foreign policy. This book will be of much interest to students of Chinese politics, Asian secu- rity studies, international political economy, and IR in general. Jeffrey Reeves is Associate Professor at the Asia-Pacific Center for Secu- Downloaded by [University of Defence] at 20:55 07 June 2016 rity Studies, Honolulu, Hawaii, USA, and has a PhD in International Relations from the London School of Economics and Political Science. He is co-author of Non-traditional Security in East Asia: A Regime Approach (2015, with Ramon Pacheco-Pardo). Asian Security Studies Series Editors: Sumit Ganguly, Indiana University, Bloomington, Andrew Scobell, Research and Development (RAND) Corporation, Santa Monica, and Joseph Chinyong Liow, Nanyang Technological University, Singapore. Few regions of the world are fraught with as many security questions as Asia. Within this region it is possible to study great power rivalries, irredentist conflicts, nuclear and ballistic missile proliferation, secessionist movements, ethnoreligious conflicts, and interstate wars. This book series publishes the best possible schol- arship on the security issues affecting the region and includes detailed empirical studies, theoretically oriented case studies, and policy-relevant analyses as well as more general works. China and International Institutions Alternate paths to global power Marc Lanteigne China’s Rising Sea Power The PLA Navy’s submarine challenge Peter Howarth If China Attacks Taiwan Military strategy, politics and economics Edited by Steve Tsang Chinese Civil-Military Relations The transformation of the People’s Liberation Army Edited by Nan Li Downloaded by [University of Defence] at 20:55 07 June 2016 The Chinese Army Today Tradition and transformation for the 21st century Dennis J. Blasko Taiwan’s Security History and prospects Bernard D. Cole Religion and Conflict in South and Southeast Asia Disrupting violence Edited by Linell E. Cady and Sheldon W. Simon Political Islam and Violence in Indonesia Zachary Abuza US-Indian Strategic Cooperation into the 21st Century More than words Edited by Sumit Ganguly, Brian Shoup, and Andrew Scobell India, Pakistan and the Secret Jihad The covert war in Kashmir, 1947–2004 Praveen Swami China’s Strategic Culture and Foreign Policy Decision-Making Confucianism, leadership and war Huiyun Feng Chinese Military Strategy in the Third Indochina War The last Maoist war Edward C. O’Dowd Asia-Pacific Security US, Australia and Japan and the new security triangle Edited by William T. Tow, Mark J. Thomson, Yoshinobu Yamamoto, and Satu P. Limaye China, the United States, and Southeast Asia Contending perspectives on politics, security, and economics Edited by Evelyn Goh and Sheldon W. Simon Conflict and Cooperation in Multi-Ethnic States Institutional incentives, myths, and counter-balancing Brian Shoup China’s War on Terrorism Counter-insurgency, politics and internal security Martin I. Wayne Downloaded by [University of Defence] at 20:55 07 June 2016 US Taiwan Policy Constructing the triangle Øystein Tunsjø Conflict Management, Security and Intervention in East Asia Third-party mediation in regional conflict Edited by Jacob Bercovitch, Kwei-Bo Huang, and Chung-Chian Teng South Asia’s Cold War Nuclear weapons and conflict in comparative perspective Rajesh M. Basrur The Rise of China and International Security America and Asia Respond Edited by Kevin J. Cooney and Yoichiro Sato Nuclear Proliferation in South Asia Crisis behaviour and the bomb Edited by Sumit Ganguly and S. Paul Kapur Nuclear Weapons and Conflict Transformation The case of India-Pakistan Saira Khan Managing the China Challenge Global perspectives Edited by Quansheng Zhao and Guoli Liu India and Counterinsurgency Lessons learned Edited by Sumit Ganguly and David P. Fidler Cooperative Security in the Asia-Pacific The ASEAN Regional Forum Edited by Jürgen Haacke and Noel M. Morada US–China–EU Relations Managing the new world order Edited by Robert S. Ross, Øystein Tunsjø and Zhang Tuosheng China, Europe and International Security Interests, roles and prospects Edited by Frans-Paul van der Putten and Chu Shulong Crime-Terror Nexus in South Asia States, security and non-state actors Ryan Clarke Downloaded by [University of Defence] at 20:55 07 June 2016 US-Japan-North Korean Security Relations Irrepressible interests Anthony DiFilippo Pakistan’s War on Terrorism Strategies for combating Jihadist armed groups since 9/11 Samir Puri Indian Foreign and Security Policy in South Asia Regional power strategies Sandra Destradi Sri Lanka and the Responsibility to Protect Politics, ethnicity and genocide Damien Kingsbury The Chinese Army Today, Second Edition Tradition and transformation for the 21st century Second edition Dennis J. Blasko Understanding Security Practices in South Asia Securitization theory and the role of non-state actors Monika Barthwal-Datta Autonomy and Ethnic Conflict in South and South-East Asia Edited by Rajat Ganguly Chinese Industrial Espionage Technology acquisition and military modernisation William C. Hannas, James Mulvenon, and Anna B. Puglisi Power Transition and International Order in Asia Issues and challenges Edited by Peter Shearman Afghanistan, Pakistan and Strategic Change Adjusting Western regional policy Edited by Joachim Krause and Charles King Mallory, IV The Arms Race in Asia Trends, causes and implications Andrew T. H. Tan Downloaded by [University of Defence] at 20:55 07 June 2016 Globalization and Security Relations across the Taiwan Strait In the shadow of China Edited by Ming-chin Monique Chu and Scott L. Kastner Multilateral Asian Security Architecture Non-ASEAN stakeholders See Seng Tan Chinese Foreign Relations with Weak Peripheral States Asymmetrical economic power and insecurity Jeffrey Reeves Democratic Transition and Security in Pakistan Edited by Shaun Gregory Downloaded by [University of Defence] at 20:55 07 June 2016 Chinese Foreign Relations with Weak Peripheral States Asymmetrical economic power and insecurity Jeffrey Reeves Downloaded by [University of Defence] at 20:55 07 June 2016 First published 2016 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN and by Routledge 711 Third Avenue, New York, NY 10017 Routledge is an imprint of the Taylor & Francis Group, an Informa business © 2016 Jeffrey Reeves The right of Jeffrey Reeves to be identified as author of this work has been asserted by him in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data Reeves, Jeffrey (Writer on Asian security issues), author. Chinese foreign relations with weak peripheral states : asymmetrical economic power and insecurity / Jeffrey Reeves. pages cm. — (Asian security studies) Includes bibliographical references and index. 1. China—Foreign economic relations—21st century. 2. China— Economic policy—21st century. 3. Asia, Central—Foreign economic relations—China. 4. China—Foreign economic relations—Asia, Central. 5. South Asia—Foreign economic relations—China. 6. China—Foreign economic relations—South Asia. 7. Southeast Asia—Foreign economic relations—China. 8. China—Foreign economic relations—Southeast Asia. I. Title. HF1604.R44 2016 327.5105—dc23 2015019472 ISBN: 978-1-138-89150-0 (hbk) ISBN: 978-1-315-70962-8 (ebk) Typeset in Times by

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    258 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us