Security Strategies of Middle Powers in the Asia Pacific

Security Strategies of Middle Powers in the Asia Pacific

English | February 5th, 2018 | ISBN: 0522871186 | 277 Pages | EPUB | 1.37 MB

Security Strategies of Middle Powers in the Asia Pacific examines what drives the different regional security strategies of four middle powers in the Asia Pacific: Australia, Indonesia, South Korea and Malaysia. Drawing on the extant middle power literature, the authors argue that the regional security strategies of middle powers could take two forms, namely, functional or normative.

A functional strategy means that the middle power targets its resources to address a specific problem that it has a high level of interest in, while a normative strategy refers to a focus on promoting general behavioural standards and confidence building at the multilateral level. This book argues that whether a middle power ultimately employs a more functional or normative regional security strategy depends on its resource availability and strategic environment.

Download:

http://longfiles.com/5nkcpzhwhzwa/Security_Strategies_of_Middle_Powers_in_the_Asia_Pacific.epub.html

[Fast Download] Security Strategies of Middle Powers in the Asia Pacific


Ebooks related to "Security Strategies of Middle Powers in the Asia Pacific" :
Information Security Management Systems
National Technology and Industrial Base Integration : How to Overcome Barriers and Capitalize on Coo
Data Quality and Record Linkage Techniques
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS
Cyber Security for Home Users
Information Security: 16th International Conference, ISC 2013, Dallas, Texas
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Cri
CCNA Cybersecurity Operations Companion Guide
Seven Deadliest Social Network Attacks
Cliffstestprep: Police Officer Examination
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.