Abstract
Nontraditional security issues have steadily risen in significance since the 1990s, albeit more so in the European than in the Chinese context. Whether that rise results in greater prospects for EU-China security cooperation, particularly at the global governance level, requires further analysis of the notion of nontraditional security, of the degree to which the European Union (EU) and China have similar understandings of its meaning and applications, and of the extent to which EU-China cooperation on nontraditional security issues has taken place so far.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acharya, A. (2001). “Human Security: East versus West,” Internationaljournal, Vol. 56, No. 3, pp. 442–460.
ASEAN Regional Forum, ARE (2003). ASEANRegional Forum (ARF) Statement on Cooperative Counter-Terrorist Action on Border Security. Available at: http://bit. ly/lID7vFL (accessed May 15, 2014).
ASEAN Regional Forum, ARF. (2010). Hanoi Plan of Action to Implement the ASEAN Regional Forum Vision Statement. May 20, 2010, Vietnam. Available at: http://bit.ly/1FpMNEO (accessed May 15, 2014).
ARF. (2013). Chairman’s Statement of the 20th ASEAN Regional Forum: Bandar Seri Begawan, July 2. Available at: http://bit.ly/1DTWOnO (accessed May 15, 2014).
Asia Europe Meeting, ASEM. (2002). Declaration on Cooperation against International Terrorism. Available at: http://www.aseminfoboard.org/content/ documents/Declaration_on_Cooperation_against_International_Terrorism.pdf (accessed May 15, 2014).
Asia Europe Meeting. (2012). Chair’s Statement of the 9thASEMSummit. Vientiane. November 5–6, 2012. Available at: http://www.aseminfoboard.org/summitstatement.html (accessed May 30, 2014).
Bakowski, P. (2013). Library Briefing: The EUResponse to Organized Crime. Brussels: Library of the European Parliament. Available at: http://www.europarl.europa.eu/document/activities/cont/201309/20130912ATT71180/20130912ATT711 80EN.pdf (accessed May 15, 2014).
Bossong, R. (2014). “CounteringTerrorism and Organized Crime: EU Perspectives,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).
Bourne, M. (2013). Understanding Security. Basingstoke: Palgrave Macmillan.
Buzan, B., O. Waver, and J. de Wilde. (1998). Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner.
Cha, V. D. (2000). “Globalization and the Study of International Security, “Journal of Peace Research, Vol. 37, No. 3, pp. 391–403.
Chang, R. (2014). “China Moots Framework for Non-Traditional Security,” The Straits Times, April 11. Available at: http://www.asianewsnet.net/China-mootsframework-for-non-traditional-security-59111.html (accessed August 30, 2014).
Chanda, N. (2008). “Globalization and International Politics in Asia,” in D. Shambaugh and M. Yahuda (eds.), International Relations of Asia. Plymouth: Rowman & Littlefield.
Chinese Ministry of Foreign Affairs. (October 19, 2006). Available at: http://www. mfa.gov.cn/eng/wjb/zzjg/tyfls/tfsxw/t283051.htm (accessed June 29, 2013).
Chinese Government. (2003). “China’s EU Policy Paper,” Ministry of Foreign Affairs, 13, October 2003. Available at: http://www.fmprc.gov.cn/eng/topics/ ceupp/t27708.htm (accessed January 28, 2013).
Chou, M.-H. and E. Van Dongen. (2014). “The Non-Securitization of Immigration in China?” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).
Council of Europe, CoE. (2001). Convention on Cybercrime. Available at: http://conventions.coe.int/Treaty/en/Treaties/Htm1/185.htm (accessed August 3, 2014).
Council of Europe, CoE. (2014). Convention on Cybercrime. Status as of 4/8/2014. Available at: http://conventions.coe.int/Treaty/Commun/print/ChercheSig. asp?NT=185&CL=ENG (accessed August 3, 2014).
Christou. (2014). “The EU’s Approach to Cyber Security,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).
CyberCrime Law. (undated). The Shanghai Cooperation Organization (SCO). Available at: http://www.cybercrimelaw.net/SCO.html (accessed August 26, 2014).
European External Action Service, EEAS. (2013a). EU-China 2020 Strategic Agenda for Cooperation. Available at: http://eeas.europa.eu/china/docs/eu-china_2020_ strategic_agenda_en.pdf (accessed May 20, 2014).
European External Action Service, EEAS. (2013b). EU-China Dialogue on Mobility and Migration, 14 October 2013 Brussels. Joint Press Release. Available at: http://ec.europa.eu/dgs/home-affairs/what-is-new/news/news/docs/20131014_joint_press_release_eu-china_hld_en.pdf (accessed August 28, 2014).
European Commission. (2011). Summaries of EU Legislation: A Common Immigration Policy for Europe. Available at: http://europa.eu/legislation_summaries/justice_freedom_security/free_movement_of persons_asylum_immigration/j10001_en.htm (accessed August 28, 2014).
European Commission. (2008). Summaries of EU Legislation: European External Border Surveillance System (EUROSUR). Available at: http://europa.eu/legislation_summaries/justice_freedom_security/free_movement_of persons_asylum_immigration/l14579_en.htm (accessed August 28, 2014).
European Commission. (2014). Joint Statement: Deepening the EU-China Comprehensive Strategic Partnership forMutual Benefit. March 31, 2014, Brussels. Available at: http://europa.eu/rapid/press-release_STATEMENT-14–89_en.htm (accessed May 9, 2014).
European Commission. (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. Available at: http://eeas.europa.eu/policies/eucyber-security/cybsec_comm_en.pdf (accessed August 3, 2014).
European Union Agency for Network and Information Security, ENISA. (undated 1). Cyber Crisis Cooperation andExercises. Available at: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-cooperation (accessed August 10, 2014).
European Union Agency for Network and Information Security, ENISA. (undated 2). Incident Reporting and Security Regulation. Available at: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting (accessed August 10, 2014).
European Strategic Partnership Observatory, ESPO. (2013). Dialogues: EU-China. Available at: http://strategicpartnerships.eu/pays/eu-china (accessed April 4, 2014).
G20. (2014). Fighting Corruption: Anti-corruption Working Group. Available at: https://www.g20.org/g20_priorities/g20_2014_agenda/fighting_corruption (accessed August 10, 2014).
Garver, J. W. (2002). “Sino-American Relations in 2001: The Difficult Accommodation ofTwo Great Powers,” InternationalJournal, 57: 283–310.
Goldstein, A. (2000). “Great Expectations,” in M. E. Brown, O. R. Cote, Jr., S. M. Lynn-Jones, and S. E. Miller (eds.), The Rise of China. Cambridge, MA: MIT Press.
Grauman, B. (2012). Cyber-Security: The Vexed Question of Global Rules. An Independent Report on Cyber-Preparedness around the World. Security and Defence Agenda Report, February. Available at: http://bit.ly/1xXRgb7 (accessed August 28, 2014).
Heilmann, S. and D. Schmidt. (2014). China’s Foreign Political and Economic Relations: An Unconventional Global Power. Lanham, MD: Rowman & Littlefield.
Holmes, L. (2014). “Countering Terrorism and Organized Crime: Chinese Perspectives,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).
Huysmans, J. (2006). The Politics of Insecurity: Fear, Migration and Asylum in the EU. London and New York: Routledge.
Information Office of the State Council, PRC (China). White Paper on China’s Armed Forces: The Diversifxed Employment of China’s Armed Forces. Available at: http://www.nti.org/media/pdfs/China_Defense_White_Paper_2013.pdf (accessed May 4, 2014).
Kaiman, J. (2014). “China Reacts Furiously to US Cyber-Espionage Charges,” The Guardian, Beijing, May 20, 2014. Available at: http://www.theguardian.com/world/2014/may/20/china-reacts-furiously-us-cyber-espionage-charges (accessed August 25, 2014).
Kirchner, E. J. and J. Sperling. (2007). EU Security Governance. Manchester: Manchester University Press.
Koff, H. (2014). “The EU Migration-Security Nexus: The Reinforcement and Externalization of Borders from the Center,” EU-China Security Cooperation: Performance and Prospects. Online Policy Papers. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications.htm (accessed February 1, 2015).
Krahmann, E. (2005). “From State to Non-State Actors: The Emergence of Security Governance,” in E. Krahmann (ed.), New Threats andNewActors in International Security. Basingstoke: Palgrave Macmillan.
Makinda, S. M. (2001). “Security and Sovereignty in the Asia-Pacific,” Contemporary South-EastAsia, Vol. 23, No. 3, pp. 401–419.
Marquina, A. and M. Caballero-Anthony. (2008). “Human Security: European and Asian Approaches,” in A. Marquina (ed.), Energy Security: Visions from Asia and Europe. Basingstoke: Palgrave Macmillan.
Mearsheimer, J. (2001). The Tragedy of Great Power Politics. New York and London: Norton.
Nathan, A. and A. Scobell. (2012). China’s Search for Security. New York: Columbia University Press.
Pollack, J. D. (2003). “China and the United States Post-9/11,” Orbis, Vol. 47, No. 4, pp. 617–627.
President of Russia, Official Website Portal. (2009). Yekaterinburg Declaration of the Heads of the Member States of the Shanghai Cooperation Organization. Available at: http://archive.kremlin.ru/eng/text/docs/2009/06/217928.shtml (accessed August 28, 2014).
The Economic Times. (2014). Chinese PresidentXi jinping for “Zero Tolerance” against Terrorism. May 21. Available at: http://articles.economictimes.indiatimes.com/2014–05–21 /news/50002289_ 1—security-sustainable-development-cooperation (accessed May 7, 2014).
United Nations. (2013). Ad Hoc Committee Negotiating Comprehensive Anti-terrorism Convention Opens One Week Headquarters Session. Meetings Coverage. Available at: http://www.un.org/press/en/2013/13209.doc.htm (accessed May 15, 2014).
UNESCO. (undated). International Migration Convention. Available at: http://www.unesco.org/new/en/social-and-human-sciences/themes/internationalmigration/international-migration-convention/ (accessed August 28, 2014).
UN Office on Drugs and Crime, UNODC. (2013). Comprehensive Study on Cybercrime (Draft). Available at http://www.unodc.org/documents/organizedcrime/UNODC_CCPCJ_EG.4_2013 /CYB ERCRIME_STUDY_210213.pdf (accessed August 3, 2014).
UN Office on Drugs and Crime, UNODC. (undated). United Nations Convention against Transnational Organized Crime and the Protocols Thereto. Available at: http://www.unodc.org/unodc/treaties/CTOC/ (accessed August 3, 2014).
UN Treaty Collection. (2014a). Status of International Convention for the Suppression of Terrorist Bombings. Available at: https://treaties.un.org/Pages/ViewDetails. aspx?src=IND&mtdsg_no=XVIII-9&chapter=18&lang=en#EndDec (accessed May 7, 2104).
UN Treaty Collection. (2014b). Statusof InternationalConventionfortheSuppression of the Financing of Terrorism. Available at: https://treaties.un.org/Pages/ViewDetails. aspx?src=IND&mtdsg_no=XVIII-11&chapter=18&lang=en#EndDec (accessed May 7, 2014).
Upadhyay, D. (2013). “SCO Members to Cooperate in War on Cyber Terrorism,” Russia eâ’ India Report. April 2, 2013. Available at: http://in.rbth.com/world/2013/04/02/sco_members_to_cooperate_in_war_on_cyber_ terrorism_23429.html (accessed August 28, 2014).
U.S. Office of the Secretary of Defence. (2007). Report to the American Congress: Military Power of the PRC200.7 Available at: http://www.defense.gov/pubs/ pdfs/070523-china-military-power-final.pdf (accessed April 20, 2014).
Vogel, E. F. (2011). Deng Xiaoping and the Transformation of China. Cambridge, MA: Belknap Press of Harvard University Press.
Walters, W. and J. H. Haahr. (2005). Governing Europe: Discourse, Governmentality and European Integration. Abingdon: Routledge.
Whitley, B. L. (ed.). (2010). European Response to the Financial Crisis. E-book. Nova Science Publishers.
Wong, R. (forthcoming). Vulnerability and Realism: Chinese views of Military Security. Available at: http://privatewww.essex.ac.uk/-susyd/EUSC/publications. htm (accessed February 1, 2015).
World Bank. (2011). Migration and Remittances Factbook 2011, 2nd ed. Available at: http://siteresources.worldbank.org/INTLAC/Resources/Factbook2011-Ebook. pdf (accessed August 28, 2014).
Xia, L. (2009). “Stability in South Asia: A View from China,” in K. Lange (ed.), Security in SouthAsia.• Conventionaland UnconventionalFactors of Destabilization, Studies and Comments 9. Munich, Germany: Hanns Seidel Foundation.
Xuetong, Y. (2006). “The Rise of China and Its Power Status,” Chinese Journal of International Politics, Vol. 1, No. 1, pp. 5–33.
Editor information
Copyright information
© 2016 Evangelos Fanoulis and Emil Kirchner
About this chapter
Cite this chapter
Fanoulis, E., Kirchner, E. (2016). Nontraditional Security Issues. In: Wang, J., Song, W. (eds) China, the European Union, and the International Politics of Global Governance. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137514004_11
Download citation
DOI: https://doi.org/10.1057/9781137514004_11
Publisher Name: Palgrave Macmillan, New York
Print ISBN: 978-1-349-55589-5
Online ISBN: 978-1-137-51400-4
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)