Security Strategies of Middle Powers in the Asia Pacific by Ralf Emmers & Sarah Teo
Author:Ralf Emmers & Sarah Teo
Language: eng
Format: epub
ISBN: 9780522871180
Publisher: Melbourne University Publishing
Conclusion
Since the early 1990s, South Korea has identified itself as a middle power and its resources have attested to its regional and global status. As a middle power, South Korea has employed both functional and normative regional security strategies but, due to its relatively high level of resource availability and high-threat strategic environment, has relied more on a functional one. It has focused its security strategy on the existential threat posed by North Korea and, consequently, maintaining US hegemony in the region. While the North Korean challenge is now an issue of concern for South Korea and for the international community as a whole, Seoul is arguably most directly affected by Pyongyang’s actions. This accounts for South Korea’s regional security strategy being specifically targeted at easing peninsular tensions.
South Korea’s functional strategy has been reflected through Nordpolitik, the Four and Six-Party Talks, the Sunshine Policy, the second Nuclear Security Summit, and the trust-building process on the Korean peninsula. Its resources have also been utilised in its offers of economic and humanitarian assistance to North Korea, as well as its contributions towards US overseas missions that demonstrate its commitment to the alliance and helps maintain US military presence in the region. Where it has participated in normative regional initiatives, they have in part been guided by its preoccupation with North Korea—thus rendering them ultimately part of a functional strategy. The only exception is perhaps the EAVG and its contribution towards regional community building, but even so South Korea’s role was relatively short-lived. By examining South Korea’s regional security strategy through the functional and normative approaches, we have highlighted the middle power’s instrumental role in the North Korean issue, and also as a consequence its part in supporting the US security presence in the region.
Notes
1 Ministry of National Defense, Republic of Korea (MND ROK), ‘2014 Defense White Paper’, 31 December 2014, http://www.mnd.go.kr/cop/pblictn/selectPublicationUser.do?siteId=mnd_eng&componentId=51&categoryId=0&publicationSeq=689&pageIndex=1&id=mnd_eng_021400000000, accessed 4 January 2016, pp. 36–8.
2 G John Ikenberry and Jongryn Mo, The Rise of Korean Leadership: Emerging Powers and Liberal International Order (New York: Palgrave Macmillan, 2013), p. 12.
3 In March 2017, South Korea’s Constitutional Court ousted Park from office, following allegations of corruption and abuse of power. At the time of writing, South Korea had yet to set a date to elect the next President.
4 Amitav Acharya, ‘Will Asia’s Past be its Future?’, International Security, vol. 28, no. 3 (2003/2004), pp. 159–61; Kai He, ‘Does ASEAN Matter? International Relations Theories, Institutional Realism, and ASEAN’, Asian Security, vol. 2, no. 3 (2006), pp. 189–214.
5 Sarah Teo, Bhubhindar Singh, and See Seng Tan, ‘Southeast Asian Perspectives on South Korea’s Middle Power Engagement Initiatives’, Asian Survey, vol. 56, no. 3 (2016), p. 558.
6 World Bank, ‘GDP at Market Prices (Current US$)’, 2016, http://data.worldbank.org/indicator/NY.GDP.MKTP.CD, accessed 25 October 2016.
7 OECD, ‘DAC Member Profile: Korea’, 2016, http://www.oecd.org/dac/korea.htm, accessed 10 March 2016.
8 Dong-min Shin, ‘The Concept of Middle Power and the Case of the ROK: A Review’, in Rüdiger Frank, James E. Hoare, Patrick Köllner, and Susan Pares (eds.), Korea 2012: Politics, Economy and Society (Leiden: Koninklijke Brill NV, 2012), pp.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26957)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20855)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20611)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20536)
The Fifty Shades Trilogy & Grey by E L James(19456)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19378)
Shot Through the Heart by Mercy Celeste(19241)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17386)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17353)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17184)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17097)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16713)
The Subtle Art of Not Giving a F*ck by Mark Manson(14825)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14442)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14216)
Cozy crochet hats: 7 Stylish and Beginner-Friendly Patterns from Baby Beanies to Trendy Bucket Hats by Vanilla Lazy(13500)
Scorched Earth by Nick Kyme(13096)
Reichel W. Numerical methods for Electrical Engineering, Meteorology,...2022 by Unknown(12976)
Drei Generationen auf dem Jakobsweg by Stein Pia(11258)