- Many works on the subject have been written and a lively debate is still taking place. For example, see Jian Chen, “Will China's Development Threaten Asia-Pacific Security?,” Security Dialogue, Vol. 24, No. 2 (June 1993); Denny Roy, “Hegemon on the Horizon'? China's Threat to East Asian Security,” International Security, Vol. 19, No. 1 (Summer 1994); Karly W. Elkenberry, “Does China Threaten Asia-Pacific Regional Stability?,” Parameters, Vol. 25, No. 1 (Spring 1995); and Herbert S. Yee, “Beijing's Policies Toward Southeast Asia and the Spratly Islands in the Post-Cold War Era,” Issues arid Studies, Vol. 31, No. 7 (July 1995).
- Najib Tun Razak , Mohd . 1995 . Asia-Pacific Strategic Outlook: The Shifting of Paradigms 5 – 9 . Petaling Jaya : Pelanduk Publications .
- Song Baoxian, “China's Policy Toward the Asia-Pacific Cooperative Security,” paper delivered at the First Annual Conference of the Asia-Pacific Center for Security Studies, Honolulu, Hawaii, September 3–6, 1995.
- Cited in Mahathir Mohammad, “Asia Can Determine Its Own Future,” New Straits Times, May 20, 1995.
- See Harlan W. Jeneks, “The PRC's Military and Security Policy in the Post-Cold War Era,” Issues und Studies, Vol. 30, No. 11 (November 1994).
- For details, see Tony O'Grady, “China's Post-Deng Leadership,” Current Affairs Bulletin, April-May 1995, pp. 14–19; “China: Parliament Power,” Asiaweek, April 7, 1995, pp. 22–27; and “China: Jiang Takes Charge,” ibid., May 26, 1995, pp. 24–38.
- Cited in Denny Roy, op. cit., p. 155.
- “Clash of Titans,” Asiaweek, July 21, 1995, pp. 24–26.
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.