8
Views
0
CrossRef citations to date
0
Altmetric
Articles

East Asian Security Issues: A Summary Review

Pages 81-111 | Published online: 25 Mar 2009

  • Kyung-won Kim, “Korea-US Relationship in Post-Cold War World,” Korea Focus (April 1994), p. 10.
  • The US Department of Defense, A Strategic Framework for the Asian Pacific Rim: Report to Congress, July 1992, p. 14.
  • Ibid., p. 31.
  • The US Department of Defense, United States Security Strategy far the East Asia-Pacific, Region, February 27, 1995.
  • Jonathan D. Pollack, “The United States in East Asia: Holding the Ring,” Adelphi Paper, No. 275 (March 1993), p. 69.
  • James A. Gregor, “The Clinton Administration's Policy in East Asia,” Global Affairs (Fall 1993), p. 66.
  • Melvin Gurtov, “The Future of China's Rise,” Asian Perspective, Vol. 18, No. 1 (Spring-Summer 1994), p. 110.
  • Korea Times, October 22, 1994.
  • Pye , Lucian W. 1971 . “Identity and the Political Culture,” . In Crises und Sequences in Political Development Edited by: Leonard , Binder . 110 Princeton, New Jersey : Princeton University Press .
  • Typical of this was Kim Jong Il's address, “Our Own Socialism Centered on People Is Bound to Win a Victory,” delivered to the Central Committee of the Korean Workers Party on May 27, 1991.
  • Hankook Ilbo, September 1994.
  • S. N. Eisenstadt, “The Breakdown of Communist Regimes and the Vicissitudes of Modernity,” Daedalus (Spring 1992), pp. 28–29. The second and third contradictions are from Eisenstadt.
  • Suh , Dae-Sook and Il Sung , Kim . 1988 . The North Korean Leader 60 New York, NY : Columbia University Press . (p. Kim even claimed that he returned to Korea in 1945 triumphantly waging a joint operation of his revolutionary army with the Soviet forces to defeat the fleeing Japanese imperialist army.
  • Yon Hyong-muk, the keynote speech at the fourth round of the inter-Korean prime ministers' talks, October 24, 1991, p. 9.
  • Yeong-moo Yeo, “Testimony of Defector Ko Yong-hwan, a former North Korean Diplomat,” Shin Dong-A, November 1991, p. 397.
  • See, for example, Andrew Mack, “North Korea and the Bomb,” Foreign Policy, No. 83 (Summer 1991), pp. 99; William Epstein, “Nuclear Security for the Korean Peninsula,” Korean Journal of Defense Analysis, Vol. IV, No. 2 (Winter 1992), pp. 56–57; and Darryl Howlett, “Nuclearization or Denuclearization on the Korean Peninsula,” Contemporary Security Policy, Vol. 15, No. 2 (Aug. 1994), p. 184.
  • Kim Il Sung, “Ten-point Program of Great Unity of the Whole Nation for Reunification of the Country,” Rodong Shinmun, April 7, 1993.
  • Chosun Ilbo, May 3, 1994.
  • Hayes , Peter . 1990 . Pacific Powderkeg 212 Lexington, MA : Lexington Books . Some scholars misleadingly argue that due to the North's deteriorating international and domestic military and political position relative to that of South Korea, North Korea may have been highly motivated to obtain its own nuclear weapons. See, for example, (p.
  • For a discussion of some of issues related to North Korea's nuclear program see James Cotton, “North Korea's Nuclear Ambitions,” Adelphi Paper, No. 275 (March 1993), pp. 94–106. See also Paul Bracken, “Nuclear Weapons and State Survival in North Korea,” Survival, Vol. 35, No. 3 (Autumn 1993), pp. 137–53. Though Bracken provides very illuminating insight into North Korea's military and economy, as well as policy recommendations for the North's nuclear problem, he does not give a full analysis of North Korea's motivation for its nuclear program.
  • Les Aspin, US Secretary of Defense, Annual Report to the President and the Congress, January 1994, p. 9.
  • Ezra F. Vogel, “Japanese-American Relations after the Cold War,” Daedalus (Fall 1992), p. 38.
  • Bernard Herber, Modern Public Finance (Howewood, IL: Richard D. Irwin, Inc., 1967), p. 24.
  • Zhengyuan Fu, “Continuities of Chinese Political Tradition,” Studies of Comparative Communism, Vol. XXIV. No. 3 (September 1991), p. 262.
  • Gerald Segal, “As China Grows Strong,” International Affairs, Vol. 64, No. 2 (Spring 1988), p. 231. Segal, however, presents more relaxed views later. See his recent essay, “China's Changing Shape,” Foreign Affairs, Vol. 73, No. 3 (May/June 1994), pp. 43–58. See also, James R. Lilley, “American Security in Asia,” Global Affairs (Fall 1993), p. 75; Monte R. Bullard, “US-China Relations: The Strategic Calculus,” Parameter (Summer 1993), p. 93; Huang Yasheng, “China's Economic Development: Implications for Its Political and Security Roles,” Adelphi Paper (March 1993), p. 57; James A. Gregor, “The Clinton Administration's Policy in East Asia,” op. cit., pp. 63–65; Melvin Gurtov, “The Future of China's Rise,” Asian Perspective, Vol. 18, No. 1 (Spring-Summer 1994), pp. 124–26; Richard Mansbach, “The New Order in Northeast Asia: A Theoretical Overview,” Asian Perspective, Vol. 17, No. 1 (Spring-Summer 1993), pp. 11–13; Harry Harding, “China at the Crossroads: Conservatism, Reform or Decay?” Adelphi Paper, No. 275 (March 1993), p. 48; and Denny Roy, “Hegemon on the Horizon? China's Threat to East Asian Security,” International Security, Vol. 19, No. 1 (Summer 1994), pp. 149–50. For a very insightful but somewhat high-handed discussion of Chinese historical memories and East Asian security issues see Barry Buzan and Gerald Segal, “Rethinking East Asian Security,” Survival, Vol. 36, No. 2 (Summer 1994), pp. 4–7. For an opposing view that China's threat to East Asia is largely unfounded, see Michael G. Gallagher, “China's Illusory Threat to the South China Sea,” International Security, Vol. 19, No. 1 (Summer 1994), pp. 169–94.
  • Hideo Sato, “Japan's Role in the Post-Cold War World,” Current History, Vol. 90, No. 555 (April 1991), p. 145.
  • Ibid., pp. 147–48.
  • Peter J. Katzenstein and Nobuo Okawara, “Japan's National Security,” International Security, Vol. 17, No. 4 (Spring 1993), p. 86.
  • Hideo Sato, p. 146.
  • US News & World Report, August 22, 1994, p. 48.
  • See, for example, Geoffrey Wiseman, “Common Security in the Asia-Pacific Region,” Pacific Review, Vol. 5, No. 1, 1992, pp. 45–48. For a similar pessimistic conclusion that was reached from different dimensions, see Barry Buzan and Gerald Segal, op. cit., pp. 18–20.
  • Ezra F. Vogel, p. 45
  • Stuart Harris, “The Economic Aspects of Pacific Security,” Adelphi Paper, No. 275 (March 1993), pp. 18–19.
  • Ibid., p. 21.
  • Far Eastern Economic Review, May 28, 1992, p. 23.
  • Kyung-Hyang Shinmun, July 4, 1992, p. 5.
  • Ckosun Ilbo, March 22, 1994, p. 8.
  • Carl W. Ford, Jr., “Key Strategic and Security Issues in East Asia: the China Factor,” a paper presented at the Conference on the Clinton Administration's Policy toward the PRC and Taiwan, sponsored by the Center for East Asian Studies, the Pennsylvania State University, and the Taiwan Institute for Political, Economic and Strategic Studies, held at the Gaston Sigur Center, George Washington University, February 5, 1994, p. 13.
  • United Nations, Report of the International Narcotics Control Board for 1993, pp. 39–40; Far Eastern Economic Review, January 20, 1994, pp. 22–24.
  • International drug traffickers who formerly used Thailand as the prime conduit for heroin produced in Burma's Golden Triangle are now reported to route their shipments further east through Laos and Cambodia. See Far Eastern Economic Review, March 18, 1993, pp. 24–25.
  • Hunkook Ilbo, August 6, 1994.
  • Hankook Ilbo, January 10, 1994.
  • Hankook Ilbo, March 23, 1992, p. 10.
  • Segye Ilbo, January 12, 1994, p. 23.
  • For a pioneering study on conditions for forming a security regime see Robert Jervis, “Security Regimes,” International Organization, Vol. 36, No. 2 (Spring 1982), pp. 360–62.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.