Skip to main content

Abstract

Nontraditional security issues have steadily risen in significance since the 1990s, albeit more so in the European than in the Chinese context. Whether that rise results in greater prospects for EU-China security cooperation, particularly at the global governance level, requires further analysis of the notion of nontraditional security, of the degree to which the European Union (EU) and China have similar understandings of its meaning and applications, and of the extent to which EU-China cooperation on nontraditional security issues has taken place so far.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Acharya, A. (2001). “Human Security: East versus West,” Internationaljournal, Vol. 56, No. 3, pp. 442–460.

    Google Scholar 

  • ASEAN Regional Forum, ARE (2003). ASEANRegional Forum (ARF) Statement on Cooperative Counter-Terrorist Action on Border Security. Available at: http://bit. ly/lID7vFL (accessed May 15, 2014).

    Google Scholar 

  • ASEAN Regional Forum, ARF. (2010). Hanoi Plan of Action to Implement the ASEAN Regional Forum Vision Statement. May 20, 2010, Vietnam. Available at: http://bit.ly/1FpMNEO (accessed May 15, 2014).

    Google Scholar 

  • ARF. (2013). Chairman’s Statement of the 20th ASEAN Regional Forum: Bandar Seri Begawan, July 2. Available at: http://bit.ly/1DTWOnO (accessed May 15, 2014).

    Google Scholar 

  • Asia Europe Meeting, ASEM. (2002). Declaration on Cooperation against International Terrorism. Available at: http://www.aseminfoboard.org/content/ documents/Declaration_on_Cooperation_against_International_Terrorism.pdf (accessed May 15, 2014).

    Google Scholar 

  • Asia Europe Meeting. (2012). Chair’s Statement of the 9thASEMSummit. Vientiane. November 5–6, 2012. Available at: http://www.aseminfoboard.org/summitstatement.html (accessed May 30, 2014).

    Google Scholar 

  • Bakowski, P. (2013). Library Briefing: The EUResponse to Organized Crime. Brussels: Library of the European Parliament. Available at: http://www.europarl.europa.eu/document/activities/cont/201309/20130912ATT71180/20130912ATT711 80EN.pdf (accessed May 15, 2014).

    Google Scholar 

  • Bossong, R. (2014). “CounteringTerrorism and Organized Crime: EU Perspectives,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).

    Google Scholar 

  • Bourne, M. (2013). Understanding Security. Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Buzan, B., O. Waver, and J. de Wilde. (1998). Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Cha, V. D. (2000). “Globalization and the Study of International Security, “Journal of Peace Research, Vol. 37, No. 3, pp. 391–403.

    Google Scholar 

  • Chang, R. (2014). “China Moots Framework for Non-Traditional Security,” The Straits Times, April 11. Available at: http://www.asianewsnet.net/China-mootsframework-for-non-traditional-security-59111.html (accessed August 30, 2014).

    Google Scholar 

  • Chanda, N. (2008). “Globalization and International Politics in Asia,” in D. Shambaugh and M. Yahuda (eds.), International Relations of Asia. Plymouth: Rowman & Littlefield.

    Google Scholar 

  • Chinese Ministry of Foreign Affairs. (October 19, 2006). Available at: http://www. mfa.gov.cn/eng/wjb/zzjg/tyfls/tfsxw/t283051.htm (accessed June 29, 2013).

    Google Scholar 

  • Chinese Government. (2003). “China’s EU Policy Paper,” Ministry of Foreign Affairs, 13, October 2003. Available at: http://www.fmprc.gov.cn/eng/topics/ ceupp/t27708.htm (accessed January 28, 2013).

    Google Scholar 

  • Chou, M.-H. and E. Van Dongen. (2014). “The Non-Securitization of Immigration in China?” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).

    Google Scholar 

  • Council of Europe, CoE. (2001). Convention on Cybercrime. Available at: http://conventions.coe.int/Treaty/en/Treaties/Htm1/185.htm (accessed August 3, 2014).

    Google Scholar 

  • Council of Europe, CoE. (2014). Convention on Cybercrime. Status as of 4/8/2014. Available at: http://conventions.coe.int/Treaty/Commun/print/ChercheSig. asp?NT=185&CL=ENG (accessed August 3, 2014).

    Google Scholar 

  • Christou. (2014). “The EU’s Approach to Cyber Security,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).

    Google Scholar 

  • CyberCrime Law. (undated). The Shanghai Cooperation Organization (SCO). Available at: http://www.cybercrimelaw.net/SCO.html (accessed August 26, 2014).

    Google Scholar 

  • European External Action Service, EEAS. (2013a). EU-China 2020 Strategic Agenda for Cooperation. Available at: http://eeas.europa.eu/china/docs/eu-china_2020_ strategic_agenda_en.pdf (accessed May 20, 2014).

    Google Scholar 

  • European External Action Service, EEAS. (2013b). EU-China Dialogue on Mobility and Migration, 14 October 2013 Brussels. Joint Press Release. Available at: http://ec.europa.eu/dgs/home-affairs/what-is-new/news/news/docs/20131014_joint_press_release_eu-china_hld_en.pdf (accessed August 28, 2014).

    Google Scholar 

  • European Commission. (2011). Summaries of EU Legislation: A Common Immigration Policy for Europe. Available at: http://europa.eu/legislation_summaries/justice_freedom_security/free_movement_of persons_asylum_immigration/j10001_en.htm (accessed August 28, 2014).

    Google Scholar 

  • European Commission. (2008). Summaries of EU Legislation: European External Border Surveillance System (EUROSUR). Available at: http://europa.eu/legislation_summaries/justice_freedom_security/free_movement_of persons_asylum_immigration/l14579_en.htm (accessed August 28, 2014).

    Google Scholar 

  • European Commission. (2014). Joint Statement: Deepening the EU-China Comprehensive Strategic Partnership forMutual Benefit. March 31, 2014, Brussels. Available at: http://europa.eu/rapid/press-release_STATEMENT-14–89_en.htm (accessed May 9, 2014).

    Google Scholar 

  • European Commission. (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. Available at: http://eeas.europa.eu/policies/eucyber-security/cybsec_comm_en.pdf (accessed August 3, 2014).

    Google Scholar 

  • European Union Agency for Network and Information Security, ENISA. (undated 1). Cyber Crisis Cooperation andExercises. Available at: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-cooperation (accessed August 10, 2014).

  • European Union Agency for Network and Information Security, ENISA. (undated 2). Incident Reporting and Security Regulation. Available at: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting (accessed August 10, 2014).

  • European Strategic Partnership Observatory, ESPO. (2013). Dialogues: EU-China. Available at: http://strategicpartnerships.eu/pays/eu-china (accessed April 4, 2014).

    Google Scholar 

  • G20. (2014). Fighting Corruption: Anti-corruption Working Group. Available at: https://www.g20.org/g20_priorities/g20_2014_agenda/fighting_corruption (accessed August 10, 2014).

    Google Scholar 

  • Garver, J. W. (2002). “Sino-American Relations in 2001: The Difficult Accommodation ofTwo Great Powers,” InternationalJournal, 57: 283–310.

    Google Scholar 

  • Goldstein, A. (2000). “Great Expectations,” in M. E. Brown, O. R. Cote, Jr., S. M. Lynn-Jones, and S. E. Miller (eds.), The Rise of China. Cambridge, MA: MIT Press.

    Google Scholar 

  • Grauman, B. (2012). Cyber-Security: The Vexed Question of Global Rules. An Independent Report on Cyber-Preparedness around the World. Security and Defence Agenda Report, February. Available at: http://bit.ly/1xXRgb7 (accessed August 28, 2014).

    Google Scholar 

  • Heilmann, S. and D. Schmidt. (2014). China’s Foreign Political and Economic Relations: An Unconventional Global Power. Lanham, MD: Rowman & Littlefield.

    Google Scholar 

  • Holmes, L. (2014). “Countering Terrorism and Organized Crime: Chinese Perspectives,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).

    Google Scholar 

  • Huysmans, J. (2006). The Politics of Insecurity: Fear, Migration and Asylum in the EU. London and New York: Routledge.

    Google Scholar 

  • Information Office of the State Council, PRC (China). White Paper on China’s Armed Forces: The Diversifxed Employment of China’s Armed Forces. Available at: http://www.nti.org/media/pdfs/China_Defense_White_Paper_2013.pdf (accessed May 4, 2014).

    Google Scholar 

  • Kaiman, J. (2014). “China Reacts Furiously to US Cyber-Espionage Charges,” The Guardian, Beijing, May 20, 2014. Available at: http://www.theguardian.com/world/2014/may/20/china-reacts-furiously-us-cyber-espionage-charges (accessed August 25, 2014).

    Google Scholar 

  • Kirchner, E. J. and J. Sperling. (2007). EU Security Governance. Manchester: Manchester University Press.

    Google Scholar 

  • Koff, H. (2014). “The EU Migration-Security Nexus: The Reinforcement and Externalization of Borders from the Center,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).

    Google Scholar 

  • Krahmann, E. (2005). “From State to Non-State Actors: The Emergence of Security Governance,” in E. Krahmann (ed.), New Threats andNewActors in International Security. Basingstoke: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Makinda, S. M. (2001). “Security and Sovereignty in the Asia-Pacific,” Contemporary South-EastAsia, Vol. 23, No. 3, pp. 401–419.

    Article  Google Scholar 

  • Marquina, A. and M. Caballero-Anthony. (2008). “Human Security: European and Asian Approaches,” in A. Marquina (ed.), Energy Security: Visions from Asia and Europe. Basingstoke: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Mearsheimer, J. (2001). The Tragedy of Great Power Politics. New York and London: Norton.

    Google Scholar 

  • Nathan, A. and A. Scobell. (2012). China’s Search for Security. New York: Columbia University Press.

    Google Scholar 

  • Pollack, J. D. (2003). “China and the United States Post-9/11,” Orbis, Vol. 47, No. 4, pp. 617–627.

    Article  Google Scholar 

  • President of Russia, Official Website Portal. (2009). Yekaterinburg Declaration of the Heads of the Member States of the Shanghai Cooperation Organization. Available at: http://archive.kremlin.ru/eng/text/docs/2009/06/217928.shtml (accessed August 28, 2014).

    Google Scholar 

  • The Economic Times. (2014). Chinese PresidentXi jinping forZero Toleranceagainst Terrorism. May 21. Available at: http://articles.economictimes.indiatimes.com/2014–05–21 /news/50002289_ 1—security-sustainable-development-cooperation (accessed May 7, 2014).

    Google Scholar 

  • United Nations. (2013). Ad Hoc Committee Negotiating Comprehensive Anti-terrorism Convention Opens One Week Headquarters Session. Meetings Coverage. Available at: http://www.un.org/press/en/2013/13209.doc.htm (accessed May 15, 2014).

    Google Scholar 

  • UNESCO. (undated). International Migration Convention. Available at: http://www.unesco.org/new/en/social-and-human-sciences/themes/internationalmigration/international-migration-convention/ (accessed August 28, 2014).

    Google Scholar 

  • UN Office on Drugs and Crime, UNODC. (2013). Comprehensive Study on Cybercrime (Draft). Available at http://www.unodc.org/documents/organizedcrime/UNODC_CCPCJ_EG.4_2013 /CYB ERCRIME_STUDY_210213.pdf (accessed August 3, 2014).

    Google Scholar 

  • UN Office on Drugs and Crime, UNODC. (undated). United Nations Convention against Transnational Organized Crime and the Protocols Thereto. Available at: http://www.unodc.org/unodc/treaties/CTOC/ (accessed August 3, 2014).

    Google Scholar 

  • UN Treaty Collection. (2014a). Status of International Convention for the Suppression of Terrorist Bombings. Available at: https://treaties.un.org/Pages/ViewDetails. aspx?src=IND&mtdsg_no=XVIII-9&chapter=18&lang=en#EndDec (accessed May 7, 2104).

    Google Scholar 

  • UN Treaty Collection. (2014b). Statusof InternationalConventionfortheSuppression of the Financing of Terrorism. Available at: https://treaties.un.org/Pages/ViewDetails. aspx?src=IND&mtdsg_no=XVIII-11&chapter=18&lang=en#EndDec (accessed May 7, 2014).

    Google Scholar 

  • Upadhyay, D. (2013). “SCO Members to Cooperate in War on Cyber Terrorism,” Russia eâIndia Report. April 2, 2013. Available at: http://in.rbth.com/world/2013/04/02/sco_members_to_cooperate_in_war_on_cyber_ terrorism_23429.html (accessed August 28, 2014).

    Google Scholar 

  • U.S. Office of the Secretary of Defence. (2007). Report to the American Congress: Military Power of the PRC200.7 Available at: http://www.defense.gov/pubs/ pdfs/070523-china-military-power-final.pdf (accessed April 20, 2014).

    Google Scholar 

  • Vogel, E. F. (2011). Deng Xiaoping and the Transformation of China. Cambridge, MA: Belknap Press of Harvard University Press.

    Book  Google Scholar 

  • Walters, W. and J. H. Haahr. (2005). Governing Europe: Discourse, Governmentality and European Integration. Abingdon: Routledge.

    Book  Google Scholar 

  • Whitley, B. L. (ed.). (2010). European Response to the Financial Crisis. E-book. Nova Science Publishers.

    Google Scholar 

  • Wong, R. (forthcoming). Vulnerability and Realism: Chinese views of Military Security. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications. htm (accessed February 1, 2015).

    Google Scholar 

  • World Bank. (2011). Migration and Remittances Factbook 2011, 2nd ed. Available at: http://siteresources.worldbank.org/INTLAC/Resources/Factbook2011-Ebook. pdf (accessed August 28, 2014).

    Google Scholar 

  • Xia, L. (2009). “Stability in South Asia: A View from China,” in K. Lange (ed.), Security in SouthAsia.• Conventionaland UnconventionalFactors of Destabilization, Studies and Comments 9. Munich, Germany: Hanns Seidel Foundation.

    Google Scholar 

  • Xuetong, Y. (2006). “The Rise of China and Its Power Status,” Chinese Journal of International Politics, Vol. 1, No. 1, pp. 5–33.

    Article  Google Scholar 

Download references

Authors

Editor information

Jianwei Wang Weiqing Song

Copyright information

© 2016 Evangelos Fanoulis and Emil Kirchner

About this chapter

Cite this chapter

Fanoulis, E., Kirchner, E. (2016). Nontraditional Security Issues. In: Wang, J., Song, W. (eds) China, the European Union, and the International Politics of Global Governance. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137514004_11

Download citation

Publish with us

Policies and ethics