1.

Record Nr.

UNINA9910961443903321

Autore

Emmers Ralf <1974->

Titolo

Security strategies of middle powers in the Asia Pacific / / Ralf Emmers, Sarah Teo

Pubbl/distr/stampa

Carlton, Vic. : , : MUP Academic Digital, , 2018

ISBN

9780522871197

0522871194

Edizione

[1st ed.]

Descrizione fisica

1 online resource (vii, 228 pages) : illustrations

Collana

Defence studies (Carlton, Vic.)

Disciplina

327.5

Soggetti

National security - Indonesia

National security - Korea (South)

National security - Australia

National security - Malaysia

Strategic culture - Indonesia

Strategic culture - Korea (South)

Strategic culture - Australia

Strategic culture - Malaysia

Pacific Area Foreign relations

Pacific Area Politics and government

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Title -- Copyright -- Contents -- List Of Acronyms -- Acknowledgements -- Introduction -- 1 Conceptualising Middle Powers And Their Security Strategies -- 2 Indonesia's Middle Power Security Strategy -- 3 South Korea's Middle Power Security Strategy -- 4 Australia's Middle Power Security Strategy -- 5 Malaysia As An Incomplete Middle Power -- Conclusion -- Appendix -- Index.

Sommario/riassunto

Security Strategies of Middle Powers in the Asia Pacific examines what drives the different regional security strategies of four middle powers in the Asia Pacific: Australia, Indonesia, South Korea and Malaysia. Drawing on the extant middle power literature, the authors argue that the regional security strategies of middle powers could take two forms, namely, functional or normative. A functional strategy means that the



middle power targets its resources to address a specific problem that it has a high level of interest in, while a normative strategy refers to a focus on promoting general behavioural standards and confidence building at the multilateral level. This book argues that whether a middle power ultimately employs a more functional or normative regional security strategy depends on its resource availability and strategic environment.