International Security in an Era of Globalization
VerifiedAdded on 2023/06/04
|9
|2953
|341
AI Summary
This report discusses the strategies implemented by the US government to enhance international security in an era of globalization. It covers the measures taken to prevent, react and protect against terrorist threats, including the formation of a national home security department, anti-terrorism intelligence, deep surveillance of suspected groups or individuals, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
International Security in an Era of Globalization
Report
Student name
[Pick the date]
International Security in an Era of Globalization
Report
Student name
[Pick the date]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
1
Introduction
9/11 attack was one of the horrifying incidents that have happened in America in which
thousands of American citizen has lost their lives. As a result of this the frightened and horrified
public of America wanted something to be done on the security check of the nation in terms of
these kinds of future attacks (Coleman, 2009). After feeling emotional sentimental of the
American citizen, the Bush government ordered a throw-out investigation in order to understand
the loophole present in their security at that time and so that corrective action can be taken.
Government at that time believed that they are really in need of something on the base of which
they can answer to their citizens as a part of the responsibility to handle these terrorist threats.
Hence, the American launched a program named under home security.
President of America on 8 October 2001, ordered their White House employees to form an office
which will take care of national securities threats (Mabee, 2008). This office was handed over to
the first director Governor Tom Ridge and was also backed by full public support to take any
kind of action if needed.
Enhance Homeland security with various strategies
After analyzing the environmental risk, the president of America and the whole congress of
America proposed a plan to form a national home security department that will handle the issues
related to the national threats. There were around 170,000 employees in that department and the
budget was maintained around $ 40 billion. This was the world largest US federation in the
world which permitted the department to play their games (Fair, 2011).
The government has divided the security in to three segments, one is prevent, react and protect
because the government of America believed that the possibility of terrorism attach is not
eliminated completely after a lot of efforts and in somehow these radical groups are still
successful in motivating people to be part of such activities (Homolar, 2011). The government
has formed this department on the base of narratives that if their prevention somehow failed
while handling such incidents, they must be ready to reply in a much effective way on this attack
so that if they may be any change of hazard, it should be minimized. It can be said that the main
objective of this agency is to lower down the living hood of these terror group which are the real
1
Introduction
9/11 attack was one of the horrifying incidents that have happened in America in which
thousands of American citizen has lost their lives. As a result of this the frightened and horrified
public of America wanted something to be done on the security check of the nation in terms of
these kinds of future attacks (Coleman, 2009). After feeling emotional sentimental of the
American citizen, the Bush government ordered a throw-out investigation in order to understand
the loophole present in their security at that time and so that corrective action can be taken.
Government at that time believed that they are really in need of something on the base of which
they can answer to their citizens as a part of the responsibility to handle these terrorist threats.
Hence, the American launched a program named under home security.
President of America on 8 October 2001, ordered their White House employees to form an office
which will take care of national securities threats (Mabee, 2008). This office was handed over to
the first director Governor Tom Ridge and was also backed by full public support to take any
kind of action if needed.
Enhance Homeland security with various strategies
After analyzing the environmental risk, the president of America and the whole congress of
America proposed a plan to form a national home security department that will handle the issues
related to the national threats. There were around 170,000 employees in that department and the
budget was maintained around $ 40 billion. This was the world largest US federation in the
world which permitted the department to play their games (Fair, 2011).
The government has divided the security in to three segments, one is prevent, react and protect
because the government of America believed that the possibility of terrorism attach is not
eliminated completely after a lot of efforts and in somehow these radical groups are still
successful in motivating people to be part of such activities (Homolar, 2011). The government
has formed this department on the base of narratives that if their prevention somehow failed
while handling such incidents, they must be ready to reply in a much effective way on this attack
so that if they may be any change of hazard, it should be minimized. It can be said that the main
objective of this agency is to lower down the living hood of these terror group which are the real
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
2
enemies of the humanity on the global level and many countries are suffering from their bad
effect both developed as well as developing countries.
The standard operating procedure of these policies is to first identify the possible threats and the
people who are involved in such activities and then take proper action according to their
respected situation.
Enhance anti-terrorism intelligence
It is believed that it is the responsibility of the intelligence to prevent the occurrence of any kind
of attack. So, these agencies are working pro-actively in order to crack down the hidden agenda
of these group because these group usually keep their intentions hidden because of which
America had to face huge loss in 9/11 attack.
These agencies started collecting large amount of raw data related after 9/11 attack and try to
connect them in sequence to interpret the future possibilities in which the intelligence note down
the important communication which has been done or is going on national level in order to form
a necessary platform on which it can operate their strategy (Ismail, Singh, Dar and Mackill,
2013). In this operation, the agency or department also takes the help of other security agencies
like CIA and FBI and share all the related information with them in case of complex problems.
In many cases, it was found that there was ongoing competition between these agencies and
hence, the flow of information among them was not proper which has caused lot of damage in
such anti-terror missions. Hence the government has created a lot of pressure on these agencies
in order to work in coordination for the sake of country love and has motivated to focus more on
analytical parts by using high-level software which is operated by most brilliant minds of the
world (McDaniel and McLaughlin, 2009). They have motivated to map out high-level sensibility
along with huge responsibility to these agencies with the involvement of even defense
department if needed.
Deep surveillance of doubted groups or individuals
It has been found out that the person who was the mastermind of this attack was himself studied,
lived and traveled in all the part of the country and some were recognized as the suspected
figures within the country. This information has truly shaken the whole congress of the America
2
enemies of the humanity on the global level and many countries are suffering from their bad
effect both developed as well as developing countries.
The standard operating procedure of these policies is to first identify the possible threats and the
people who are involved in such activities and then take proper action according to their
respected situation.
Enhance anti-terrorism intelligence
It is believed that it is the responsibility of the intelligence to prevent the occurrence of any kind
of attack. So, these agencies are working pro-actively in order to crack down the hidden agenda
of these group because these group usually keep their intentions hidden because of which
America had to face huge loss in 9/11 attack.
These agencies started collecting large amount of raw data related after 9/11 attack and try to
connect them in sequence to interpret the future possibilities in which the intelligence note down
the important communication which has been done or is going on national level in order to form
a necessary platform on which it can operate their strategy (Ismail, Singh, Dar and Mackill,
2013). In this operation, the agency or department also takes the help of other security agencies
like CIA and FBI and share all the related information with them in case of complex problems.
In many cases, it was found that there was ongoing competition between these agencies and
hence, the flow of information among them was not proper which has caused lot of damage in
such anti-terror missions. Hence the government has created a lot of pressure on these agencies
in order to work in coordination for the sake of country love and has motivated to focus more on
analytical parts by using high-level software which is operated by most brilliant minds of the
world (McDaniel and McLaughlin, 2009). They have motivated to map out high-level sensibility
along with huge responsibility to these agencies with the involvement of even defense
department if needed.
Deep surveillance of doubted groups or individuals
It has been found out that the person who was the mastermind of this attack was himself studied,
lived and traveled in all the part of the country and some were recognized as the suspected
figures within the country. This information has truly shaken the whole congress of the America
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
3
and hence came on the conclusion that for the safety of the nation the citizen has to give up some
right which was given under American constitution like right to privacy and has overpowered
these government agencies to put any individual or group on surveillance in the case of any
doubt in more aggressive form (Ross, 2013). These agencies put close surveillance on every
visitor to America, foreign student who came in the United States of America for study purpose
and may get influenced by a hidden radical group and some infiltrate groups which can provoke
any kind of violence in the nation. In case of need, these agency is capable enough to make every
possible use of modern information technology to exploit, detect and even assess any kind of
relevant data from both prospects individually as well as group wise (Durac and Cavatorta,
2009). This agency believes that it is better to recognize the threat before it actually starts
working on the ground.
Enhance monitoring footprints of entry
The present world is the world of technological advance which results in the form of producing
lots of data. As the United States of America is known as one of the advanced technology
countries in the form and hence the amount of data produced on a daily base are in large
quantity. It has been found out they in the previous time, enter of terrorists has happened on the
base of legal US Visa due to various loophole present in that process. But now, US government
has tightened there rules with the Visa which has impacted a lot to these terror networks (Avant
and Sigelman, 2010). Each visitor is being matched with the profile which has been obtained
from the collection of these data. In many case the weapons are being transported by means of
commercial routes and so these agencies have bird eyes on the supply chain of every commercial
route. But due to globalization, the challenges related to these routes are increasing day by day
due to their large volume and to handle this situation government has to increase their security
check on all the shipping ports (Park, 2011). Each shipment is scanned with high-level
technology and even each vehicle passing from each border are checked through which will help
in controlling the flow of traffic. The main objective is to present the entry of weapon which can
be used in these activities.
Borders less porous
3
and hence came on the conclusion that for the safety of the nation the citizen has to give up some
right which was given under American constitution like right to privacy and has overpowered
these government agencies to put any individual or group on surveillance in the case of any
doubt in more aggressive form (Ross, 2013). These agencies put close surveillance on every
visitor to America, foreign student who came in the United States of America for study purpose
and may get influenced by a hidden radical group and some infiltrate groups which can provoke
any kind of violence in the nation. In case of need, these agency is capable enough to make every
possible use of modern information technology to exploit, detect and even assess any kind of
relevant data from both prospects individually as well as group wise (Durac and Cavatorta,
2009). This agency believes that it is better to recognize the threat before it actually starts
working on the ground.
Enhance monitoring footprints of entry
The present world is the world of technological advance which results in the form of producing
lots of data. As the United States of America is known as one of the advanced technology
countries in the form and hence the amount of data produced on a daily base are in large
quantity. It has been found out they in the previous time, enter of terrorists has happened on the
base of legal US Visa due to various loophole present in that process. But now, US government
has tightened there rules with the Visa which has impacted a lot to these terror networks (Avant
and Sigelman, 2010). Each visitor is being matched with the profile which has been obtained
from the collection of these data. In many case the weapons are being transported by means of
commercial routes and so these agencies have bird eyes on the supply chain of every commercial
route. But due to globalization, the challenges related to these routes are increasing day by day
due to their large volume and to handle this situation government has to increase their security
check on all the shipping ports (Park, 2011). Each shipment is scanned with high-level
technology and even each vehicle passing from each border are checked through which will help
in controlling the flow of traffic. The main objective is to present the entry of weapon which can
be used in these activities.
Borders less porous
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
4
It is believed that illegal entry of people are motivating illegal entry of weapons and it is very
difficult to control all the lines of the border to stop these activities and present programs of US
are making more complicated for easy entry and in some cases even risky to their lives
(Argomaniz, 2009). Presently US government has decided to seal complete US-Mexico border
but it is difficult to say in terms of success from these terror threats.
Improve transport security
In 9/11 case the attackers have used commercial plan which was beyond the imagination of any
country. This has actually given the government an impression that any vehicle which is carrying
any kind of fuel in their body can be converted into high-level explosives. Hence the government
decided to control their all transport means from security purposes (Lee, Palekar and Qualls,
2011). The government has involves high-level security sensors which actually detects all level
of threats from both chemicals as well as biological weapons through their air filter detectors
along with manufacturing of high-level weapons which has the capability of filter the air in case
of attack by these weapons. Everything cannot be protected but their occurrence can be stopped
by focusing on identifying these suspicious activities happening inside the city.
Providing security to infrastructure
Certain elements on the list of perilous infrastructure have fascinated specific attention for one
purpose or another – fears to community water provisions and to power grids, most possibly any
extremist attack that deprived of such fundamentals to large statistics of persons would cause
enormous dislocations. Singular captivation and anxiety appear to ascribe to situations
connecting which has been named “cyber terrorism,” which is a kind of electronic motivated
outbreaks on computer systems and infrastructures (Melgar-Quinonez, Nord, Perez-Escamilla,
and Segall-Correa, 2008). Defensive the “electronic arrangement” is allocated particular
importance in the US policy, on the lands that an effective cyber-attack might “waterfall across
subdivisions. There is a various question related to critical worries, but the public discussion
does not vintage clear inferences about how susceptible the internet is how big or permanent the
belongings of an attack would be. Accountable events in the US administration have
pronounced thoughtful worries.
Special weapon use
4
It is believed that illegal entry of people are motivating illegal entry of weapons and it is very
difficult to control all the lines of the border to stop these activities and present programs of US
are making more complicated for easy entry and in some cases even risky to their lives
(Argomaniz, 2009). Presently US government has decided to seal complete US-Mexico border
but it is difficult to say in terms of success from these terror threats.
Improve transport security
In 9/11 case the attackers have used commercial plan which was beyond the imagination of any
country. This has actually given the government an impression that any vehicle which is carrying
any kind of fuel in their body can be converted into high-level explosives. Hence the government
decided to control their all transport means from security purposes (Lee, Palekar and Qualls,
2011). The government has involves high-level security sensors which actually detects all level
of threats from both chemicals as well as biological weapons through their air filter detectors
along with manufacturing of high-level weapons which has the capability of filter the air in case
of attack by these weapons. Everything cannot be protected but their occurrence can be stopped
by focusing on identifying these suspicious activities happening inside the city.
Providing security to infrastructure
Certain elements on the list of perilous infrastructure have fascinated specific attention for one
purpose or another – fears to community water provisions and to power grids, most possibly any
extremist attack that deprived of such fundamentals to large statistics of persons would cause
enormous dislocations. Singular captivation and anxiety appear to ascribe to situations
connecting which has been named “cyber terrorism,” which is a kind of electronic motivated
outbreaks on computer systems and infrastructures (Melgar-Quinonez, Nord, Perez-Escamilla,
and Segall-Correa, 2008). Defensive the “electronic arrangement” is allocated particular
importance in the US policy, on the lands that an effective cyber-attack might “waterfall across
subdivisions. There is a various question related to critical worries, but the public discussion
does not vintage clear inferences about how susceptible the internet is how big or permanent the
belongings of an attack would be. Accountable events in the US administration have
pronounced thoughtful worries.
Special weapon use
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
5
It has been found out that the US government is in need of special weapons which will help them
in handling these situations in case of attack in order to avoid any kind of casualty on their side
because in various such attacks America has lots their various brave policeman and government
was not able to understand how to face relatives of these brave American citizens (Kienscherf,
2011). Hence, they have invested a large amount of financial support in their Weapon research
and development to extend their maximum capability and provide full protection to their citizens.
Educate the public
Us government has actually introduced a public health safety programs for their citizen to make
them about the symptoms and effect of the chemical and biological attack. They are also offering
various training programs in which the public are provided with the detail information in which
they can protect themselves from the impact of such attacks (Schweller and Pu, 2011). The
government has located great importance on creating the citizen health community more
conscious of the terrorist risk, refining its capability to reply to CBW attacks and creation
advance arrangements for providing alternative care in the occasion of disastrous violence. This
has been a rapid impression of the program of creativities and ambitions that fall below the
headline of motherland safeguard. But having an approach or a strategy is only the chief step in
creating the United States of America more protected in contradiction to the risk of terrorism.
Increased their reach
After analyzing violence situations around the world, US government has implemented to
increase their reach beyond their nation in order to secure their nation from any kind of possible
threats and in case are capable enough to share this information with their associate country
partners, so that an anti-terror environment can be spread all over the globe because the whole
world is suffering from this kind of problem (Avey and Desch, 2014).
5
It has been found out that the US government is in need of special weapons which will help them
in handling these situations in case of attack in order to avoid any kind of casualty on their side
because in various such attacks America has lots their various brave policeman and government
was not able to understand how to face relatives of these brave American citizens (Kienscherf,
2011). Hence, they have invested a large amount of financial support in their Weapon research
and development to extend their maximum capability and provide full protection to their citizens.
Educate the public
Us government has actually introduced a public health safety programs for their citizen to make
them about the symptoms and effect of the chemical and biological attack. They are also offering
various training programs in which the public are provided with the detail information in which
they can protect themselves from the impact of such attacks (Schweller and Pu, 2011). The
government has located great importance on creating the citizen health community more
conscious of the terrorist risk, refining its capability to reply to CBW attacks and creation
advance arrangements for providing alternative care in the occasion of disastrous violence. This
has been a rapid impression of the program of creativities and ambitions that fall below the
headline of motherland safeguard. But having an approach or a strategy is only the chief step in
creating the United States of America more protected in contradiction to the risk of terrorism.
Increased their reach
After analyzing violence situations around the world, US government has implemented to
increase their reach beyond their nation in order to secure their nation from any kind of possible
threats and in case are capable enough to share this information with their associate country
partners, so that an anti-terror environment can be spread all over the globe because the whole
world is suffering from this kind of problem (Avey and Desch, 2014).
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
6
Conclusion
9/11 attack has focused the American attention towards the difficult of national security. The US
Government has replied with an approach that is imposing, wide-ranging, refined, but it has
hardly made a commencement in identifying the terrorist danger. Each major statement so far –
whether from self-governing commands from CIA agency – has arbitrated that the US
government is becoming complex as susceptible nowadays from 9/11 attack. In some portion, it
is reflecting that the gauge of the national safety challenge had gone through the application of
various improvements. It is also reflecting the supremacy of the difficulties of operative nation
protection. Development has been completed, but there will be no surprise when the succeeding
big extremist attack happens on American land. It is extensively unspoken that this is motionless
conceivable, maybe even probable. It might be possible that the government of US comprehends
of the thoughtful complications of forming effective national security assistance to clarify the
President’s obsession with an aggressive reply in countries like Iraq and Afghanistan. Many
scholars proverb that the finest protection is a decent offense may be predominantly appropriate
to the novel fight against this terrorism.
6
Conclusion
9/11 attack has focused the American attention towards the difficult of national security. The US
Government has replied with an approach that is imposing, wide-ranging, refined, but it has
hardly made a commencement in identifying the terrorist danger. Each major statement so far –
whether from self-governing commands from CIA agency – has arbitrated that the US
government is becoming complex as susceptible nowadays from 9/11 attack. In some portion, it
is reflecting that the gauge of the national safety challenge had gone through the application of
various improvements. It is also reflecting the supremacy of the difficulties of operative nation
protection. Development has been completed, but there will be no surprise when the succeeding
big extremist attack happens on American land. It is extensively unspoken that this is motionless
conceivable, maybe even probable. It might be possible that the government of US comprehends
of the thoughtful complications of forming effective national security assistance to clarify the
President’s obsession with an aggressive reply in countries like Iraq and Afghanistan. Many
scholars proverb that the finest protection is a decent offense may be predominantly appropriate
to the novel fight against this terrorism.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
7
References
Argomaniz, J. (2009) When the EU is the ‘Norm‐taker’: The Passenger Name Records
Agreement and the EU’s Internalization of US Border Security Norms. European
integration, 31(1), pp.119-136.
Avant, D. and Sigelman, L. (2010) Private security and democracy: Lessons from the US in
Iraq. Security Studies, 19(2), pp.230-265.
Avey, P.C. and Desch, M.C. (2014) What do policymakers want from us? Results of a survey
of current and former senior national security decision makers. International Studies
Quarterly, 58(2), pp.227-246.
Coleman, M. (2009) What counts as the politics and practice of security, and where?
Devolution and immigrant insecurity after 9/11. Annals of the Association of American
Geographers, 99(5), pp.904-913.
Durac, V. and Cavatorta, F. (2009) Strengthening authoritarian rule through democracy
promotion? Examining the paradox of the US and EU security strategies: the case of Bin
Ali's Tunisia. British journal of Middle Eastern studies, 36(1), pp.3-19.
Fair, C.C. (2011) Under the shrinking US security umbrella: India's end game in
Afghanistan?. The Washington Quarterly, 34(2), pp.179-192.
Homolar, A. (2011) Rebels without a conscience: The evolution of the rogue states narrative
in US security policy. European Journal of International Relations, 17(4), pp.705-727.
Ismail, A.M., Singh, U.S., Singh, S., Dar, M.H. and Mackill, D.J. (2013) The contribution of
submergence-tolerant (Sub1) rice varieties to food security in flood-prone rainfed lowland
areas in Asia. Field Crops Research, 152, pp.83-93.
Kienscherf, M. (2011) A programme of global pacification: US counterinsurgency doctrine
and the biopolitics of human (in) security. Security Dialogue, 42(6), pp.517-535.
Lee, J., Palekar, U.S. and Qualls, W. (2011) Supply chain efficiency and security:
Coordination for collaborative investment in technology. European Journal of Operational
Research, 210(3), pp.568-578.
Mabee, B. (2008) Re-imagining the Borders of US Security after 9/11: Securitisation, Risk,
and the Creation of the Department of Homeland Security. Globalizations, 4(3), pp.385-397.
McDaniel, P. and McLaughlin, S. (2009) Security and privacy challenges in the smart
grid. IEEE Security & Privacy, 3, pp.75-77.
7
References
Argomaniz, J. (2009) When the EU is the ‘Norm‐taker’: The Passenger Name Records
Agreement and the EU’s Internalization of US Border Security Norms. European
integration, 31(1), pp.119-136.
Avant, D. and Sigelman, L. (2010) Private security and democracy: Lessons from the US in
Iraq. Security Studies, 19(2), pp.230-265.
Avey, P.C. and Desch, M.C. (2014) What do policymakers want from us? Results of a survey
of current and former senior national security decision makers. International Studies
Quarterly, 58(2), pp.227-246.
Coleman, M. (2009) What counts as the politics and practice of security, and where?
Devolution and immigrant insecurity after 9/11. Annals of the Association of American
Geographers, 99(5), pp.904-913.
Durac, V. and Cavatorta, F. (2009) Strengthening authoritarian rule through democracy
promotion? Examining the paradox of the US and EU security strategies: the case of Bin
Ali's Tunisia. British journal of Middle Eastern studies, 36(1), pp.3-19.
Fair, C.C. (2011) Under the shrinking US security umbrella: India's end game in
Afghanistan?. The Washington Quarterly, 34(2), pp.179-192.
Homolar, A. (2011) Rebels without a conscience: The evolution of the rogue states narrative
in US security policy. European Journal of International Relations, 17(4), pp.705-727.
Ismail, A.M., Singh, U.S., Singh, S., Dar, M.H. and Mackill, D.J. (2013) The contribution of
submergence-tolerant (Sub1) rice varieties to food security in flood-prone rainfed lowland
areas in Asia. Field Crops Research, 152, pp.83-93.
Kienscherf, M. (2011) A programme of global pacification: US counterinsurgency doctrine
and the biopolitics of human (in) security. Security Dialogue, 42(6), pp.517-535.
Lee, J., Palekar, U.S. and Qualls, W. (2011) Supply chain efficiency and security:
Coordination for collaborative investment in technology. European Journal of Operational
Research, 210(3), pp.568-578.
Mabee, B. (2008) Re-imagining the Borders of US Security after 9/11: Securitisation, Risk,
and the Creation of the Department of Homeland Security. Globalizations, 4(3), pp.385-397.
McDaniel, P. and McLaughlin, S. (2009) Security and privacy challenges in the smart
grid. IEEE Security & Privacy, 3, pp.75-77.
INTERNATIONAL SECURITY IN AN ERA OF GLOBALIZATION
8
Melgar-Quinonez, H.R., Nord, M., Perez-Escamilla, R. and Segall-Correa, A. (2008)
Psychometric properties of a modified US-household food security survey module in
Campinas, Brazil. European Journal of Clinical Nutrition, 62(5), p.665.
Park, J.J. (2011) The US-led alliances in the Asia-Pacific: hedge against potential threats or
an undesirable multilateral security order?. The Pacific Review, 24(2), pp.137-158.
Ross, R.S. (2013) US grand strategy, the rise of China, and US national security strategy for
East Asia. Strategic Studies Quarterly, 7(2), pp.20-40.
Schweller, R.L. and Pu, X. (2011) After unipolarity: China's visions of international order in
an era of US decline. International Security, 36(1), pp.41-72.
8
Melgar-Quinonez, H.R., Nord, M., Perez-Escamilla, R. and Segall-Correa, A. (2008)
Psychometric properties of a modified US-household food security survey module in
Campinas, Brazil. European Journal of Clinical Nutrition, 62(5), p.665.
Park, J.J. (2011) The US-led alliances in the Asia-Pacific: hedge against potential threats or
an undesirable multilateral security order?. The Pacific Review, 24(2), pp.137-158.
Ross, R.S. (2013) US grand strategy, the rise of China, and US national security strategy for
East Asia. Strategic Studies Quarterly, 7(2), pp.20-40.
Schweller, R.L. and Pu, X. (2011) After unipolarity: China's visions of international order in
an era of US decline. International Security, 36(1), pp.41-72.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.