Abstract Conflict between returning refugees and nonmigrant populations is a pervasive yet frequently overlooked security issue in post-conflict societies. Although scholars have demonstrated how out-migration can regionalize, prolong, and intensify civil war, the security consequences of return migration are undertheorized. An analysis of refugee return to Burundi after the country's 1993–2005 civil war corroborates a new theory of return migration and conflict: return migration creates new identity divisions based on whether and where individuals were displaced during wartime. These cleavages become new sources of conflict in the countries of origin when local institutions, such as land codes, citizenship regimes, or language laws, yield differential outcomes for individuals based on where they lived during the war. Ethnographic evidence gathered in Burundi and Tanzania from 2014 to 2016 shows how the return of refugees created violent rivalries between returnees and nonmigrants. Consequently, when Burundi faced a national-level political crisis in 2015, prior experiences of return shaped both the character and timing of out-migration from Burundi. Illuminating the role of reverse population movements in shaping future conflict extends theories of political violence and demonstrates why breaking the cycle of return and repeat displacement is essential to the prevention of conflict.
{"title":"Home, Again: Refugee Return and Post-Conflict Violence in Burundi","authors":"S. Schwartz","doi":"10.1162/isec_a_00362","DOIUrl":"https://doi.org/10.1162/isec_a_00362","url":null,"abstract":"Abstract Conflict between returning refugees and nonmigrant populations is a pervasive yet frequently overlooked security issue in post-conflict societies. Although scholars have demonstrated how out-migration can regionalize, prolong, and intensify civil war, the security consequences of return migration are undertheorized. An analysis of refugee return to Burundi after the country's 1993–2005 civil war corroborates a new theory of return migration and conflict: return migration creates new identity divisions based on whether and where individuals were displaced during wartime. These cleavages become new sources of conflict in the countries of origin when local institutions, such as land codes, citizenship regimes, or language laws, yield differential outcomes for individuals based on where they lived during the war. Ethnographic evidence gathered in Burundi and Tanzania from 2014 to 2016 shows how the return of refugees created violent rivalries between returnees and nonmigrants. Consequently, when Burundi faced a national-level political crisis in 2015, prior experiences of return shaped both the character and timing of out-migration from Burundi. Illuminating the role of reverse population movements in shaping future conflict extends theories of political violence and demonstrates why breaking the cycle of return and repeat displacement is essential to the prevention of conflict.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89491158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Many scholars and policymakers in the United States accept the narrative that China is a revisionist state challenging the U.S.-dominated international liberal order. The narrative assumes that there is a singular liberal order and that it is obvious what constitutes a challenge to it. The concepts of order and challenge are, however, poorly operationalized. There are at least four plausible operationalizations of order, three of which are explicitly or implicitly embodied in the dominant narrative. These tend to assume, ahistorically, that U.S. interests and the content of the liberal order are almost identical. The fourth operationalization views order as an emergent property of the interaction of multiple state, substate, nonstate, and international actors. As a result, there are at least eight “issue-specific orders” (e.g., military, trade, information, and political development). Some of these China accepts; some it rejects; and some it is willing to live with. Given these multiple orders and varying levels of challenge, the narrative of a U.S.-dominated liberal international order being challenged by a revisionist China makes little conceptual or empirical sense. The findings point to the need to develop more generalizable ways of observing orders and compliance.
{"title":"China in a World of Orders: Rethinking Compliance and Challenge in Beijing's International Relations","authors":"A. Johnston","doi":"10.1162/isec_a_00360","DOIUrl":"https://doi.org/10.1162/isec_a_00360","url":null,"abstract":"Abstract Many scholars and policymakers in the United States accept the narrative that China is a revisionist state challenging the U.S.-dominated international liberal order. The narrative assumes that there is a singular liberal order and that it is obvious what constitutes a challenge to it. The concepts of order and challenge are, however, poorly operationalized. There are at least four plausible operationalizations of order, three of which are explicitly or implicitly embodied in the dominant narrative. These tend to assume, ahistorically, that U.S. interests and the content of the liberal order are almost identical. The fourth operationalization views order as an emergent property of the interaction of multiple state, substate, nonstate, and international actors. As a result, there are at least eight “issue-specific orders” (e.g., military, trade, information, and political development). Some of these China accepts; some it rejects; and some it is willing to live with. Given these multiple orders and varying levels of challenge, the narrative of a U.S.-dominated liberal international order being challenged by a revisionist China makes little conceptual or empirical sense. The findings point to the need to develop more generalizable ways of observing orders and compliance.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85859960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Chinese views of nuclear escalation are key to assessing the potential for nuclear escalation in a crisis or armed conflict between the United States and China, but they have not been examined systematically. A review of original Chinese-language sources and interviews with members of China's strategic community suggest that China is skeptical that nuclear escalation could be controlled once nuclear weapons are used and, thus, leaders would be restrained from pursuing even limited use. These views are reflected in China's nuclear operational doctrine (which outlines plans for retaliatory strikes only and lacks any clear plans for limited nuclear use) and its force structure (which lacks tactical nuclear weapons). The long-standing decoupling of Chinese nuclear and conventional strategy, organizational biases within China's strategic community, and the availability of space, cyber, and conventional missile weapons as alternative sources of strategic leverage best explain Chinese views toward nuclear escalation. China's confidence that a U.S.-China conflict would not escalate to the use of nuclear weapons may hamper its ability to identify nuclear escalation risks in such a scenario. Meanwhile, U.S. scholars and policymakers emphasize the risk of inadvertent escalation in a conflict with China, but they are more confident than their Chinese counterparts that the use of nuclear weapons could remain limited. When combined, these contrasting views could create pressure for a U.S.-China conflict to escalate rapidly into an unlimited nuclear war.
{"title":"Dangerous Confidence? Chinese Views on Nuclear Escalation","authors":"Fiona S. Cunningham, M. T. Fravel","doi":"10.1162/isec_a_00359","DOIUrl":"https://doi.org/10.1162/isec_a_00359","url":null,"abstract":"Abstract Chinese views of nuclear escalation are key to assessing the potential for nuclear escalation in a crisis or armed conflict between the United States and China, but they have not been examined systematically. A review of original Chinese-language sources and interviews with members of China's strategic community suggest that China is skeptical that nuclear escalation could be controlled once nuclear weapons are used and, thus, leaders would be restrained from pursuing even limited use. These views are reflected in China's nuclear operational doctrine (which outlines plans for retaliatory strikes only and lacks any clear plans for limited nuclear use) and its force structure (which lacks tactical nuclear weapons). The long-standing decoupling of Chinese nuclear and conventional strategy, organizational biases within China's strategic community, and the availability of space, cyber, and conventional missile weapons as alternative sources of strategic leverage best explain Chinese views toward nuclear escalation. China's confidence that a U.S.-China conflict would not escalate to the use of nuclear weapons may hamper its ability to identify nuclear escalation risks in such a scenario. Meanwhile, U.S. scholars and policymakers emphasize the risk of inadvertent escalation in a conflict with China, but they are more confident than their Chinese counterparts that the use of nuclear weapons could remain limited. When combined, these contrasting views could create pressure for a U.S.-China conflict to escalate rapidly into an unlimited nuclear war.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80407913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract In recent years, jihadists across the world have transformed their gendered violence, shocking the world by breaking from prior taboos and even celebrating abuses that they had previously prohibited. This behavior is surprising because jihadists represent a class of insurgents that are deeply bound by rules and norms. For jihadists, deviating from established Islamist doctrines is no easy feat. What then explains these sudden transformations in the rules and norms governing jihadist violence? An inductive investigation of contemporary jihadist violence in Pakistan and Nigeria reveals a new theory of jihadist normative evolution. Data from these cases show that dramatic changes in jihadist violence occur when an external trigger creates an expanded political space for jihadist entrepreneurs to do away with normative constraints on socially prohibited types of violence. As these jihadist leaders capitalize on the triggers, they are able to encourage a re-socialization process within their ranks, resulting in the erosion of previously held taboos, the adoption of proscribed behaviors, and the emergence of toxic new norms.
{"title":"“We Have Captured Your Women”: Explaining Jihadist Norm Change","authors":"Aisha Ahmad","doi":"10.1162/isec_a_00350","DOIUrl":"https://doi.org/10.1162/isec_a_00350","url":null,"abstract":"Abstract In recent years, jihadists across the world have transformed their gendered violence, shocking the world by breaking from prior taboos and even celebrating abuses that they had previously prohibited. This behavior is surprising because jihadists represent a class of insurgents that are deeply bound by rules and norms. For jihadists, deviating from established Islamist doctrines is no easy feat. What then explains these sudden transformations in the rules and norms governing jihadist violence? An inductive investigation of contemporary jihadist violence in Pakistan and Nigeria reveals a new theory of jihadist normative evolution. Data from these cases show that dramatic changes in jihadist violence occur when an external trigger creates an expanded political space for jihadist entrepreneurs to do away with normative constraints on socially prohibited types of violence. As these jihadist leaders capitalize on the triggers, they are able to encourage a re-socialization process within their ranks, resulting in the erosion of previously held taboos, the adoption of proscribed behaviors, and the emergence of toxic new norms.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74592452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correspondence: Measuring Power in International Relations","authors":"Caleb Pomeroy, Michael Beckley","doi":"10.1162/isec_c_00355","DOIUrl":"https://doi.org/10.1162/isec_c_00355","url":null,"abstract":"","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91006193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Max Abrahms, J. Acton, K. Adams, Fiona Adamson, Prakash Adhikari, Mansoor Ahmed, Holger Albrecht, Khalid Almezaini, Dan Altman, Nicholas Anderson, C. Anzalone, E. Araral, Aaron Arnold, R. Art, Tricia Bacon, Kristin Bakke, B. Balmer, Navin A. Bapat, Corinne Bara, Michael Beckley, Paul Welch, Davis Brown, Sarah, D. Byman, Austin Carson, Seth Carus, Jonathan D. Caverley, Michael Chase, J. I. Chong, Thomas Christensen, Tiffany Chu, A. Chubb, David Clark, D. Cohen, C. Coker, Ken Conca, Z. Cooper, Ethan Corbin, P. Cotta-Ramusino, M. Crenshaw, J. Crisp, P. Cronin, Kate Cronin-Furman, Fiona S. Cunningham, G. Dabelko, Toby F. Dalton, Erica De Bruin
manuscripts. International Security relies heavily on the evaluations and advice of external reviewers in making its editorial decisions. The editors thank the reviewers listed below for their invaluable assistance. As in previous years, we are recognizing outstanding reviewers for the exceptional quality, quantity, and timeliness of their reviews. Outstanding reviewers are denoted with an asterisk (*). Reviewers for Volume 43
{"title":"Reviewers for Volume 43","authors":"Max Abrahms, J. Acton, K. Adams, Fiona Adamson, Prakash Adhikari, Mansoor Ahmed, Holger Albrecht, Khalid Almezaini, Dan Altman, Nicholas Anderson, C. Anzalone, E. Araral, Aaron Arnold, R. Art, Tricia Bacon, Kristin Bakke, B. Balmer, Navin A. Bapat, Corinne Bara, Michael Beckley, Paul Welch, Davis Brown, Sarah, D. Byman, Austin Carson, Seth Carus, Jonathan D. Caverley, Michael Chase, J. I. Chong, Thomas Christensen, Tiffany Chu, A. Chubb, David Clark, D. Cohen, C. Coker, Ken Conca, Z. Cooper, Ethan Corbin, P. Cotta-Ramusino, M. Crenshaw, J. Crisp, P. Cronin, Kate Cronin-Furman, Fiona S. Cunningham, G. Dabelko, Toby F. Dalton, Erica De Bruin","doi":"10.1162/isec_x_00357","DOIUrl":"https://doi.org/10.1162/isec_x_00357","url":null,"abstract":"manuscripts. International Security relies heavily on the evaluations and advice of external reviewers in making its editorial decisions. The editors thank the reviewers listed below for their invaluable assistance. As in previous years, we are recognizing outstanding reviewers for the exceptional quality, quantity, and timeliness of their reviews. Outstanding reviewers are denoted with an asterisk (*). Reviewers for Volume 43","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86600018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Newly available sources show how the 1993–95 debate over the best means of expanding the North Atlantic Treaty Organization unfolded inside the Clinton administration. This evidence comes from documents recently declassified by the Clinton Presidential Library, the Defense Department, and the State Department because of appeals by the author. As President Bill Clinton repeatedly remarked, the two key questions about enlargement were when and how. The sources make apparent that, during a critical decisionmaking period twenty-five years ago, supporters of a relatively swift conferral of full membership to a narrow range of countries outmaneuvered proponents of a slower, phased conferral of limited membership to a wide range of states. Pleas from Central and Eastern European leaders, missteps by Russian President Boris Yeltsin, and victory by the pro-expansion Republican Party in the 1994 U.S. congressional election all helped advocates of full-membership enlargement to win. The documents also reveal the surprising impact of Ukrainian politics on this debate and the complex roles played by both Strobe Talbott, a U.S. ambassador and later deputy secretary of state, and Andrei Kozyrev, the Russian foreign minister. Finally, the sources suggest ways in which the debate's outcome remains significant for transatlantic and U.S.-Russian relations today.
{"title":"How to Enlarge NATO: The Debate inside the Clinton Administration, 1993–95","authors":"M. Sarotte","doi":"10.1162/isec_a_00353","DOIUrl":"https://doi.org/10.1162/isec_a_00353","url":null,"abstract":"Abstract Newly available sources show how the 1993–95 debate over the best means of expanding the North Atlantic Treaty Organization unfolded inside the Clinton administration. This evidence comes from documents recently declassified by the Clinton Presidential Library, the Defense Department, and the State Department because of appeals by the author. As President Bill Clinton repeatedly remarked, the two key questions about enlargement were when and how. The sources make apparent that, during a critical decisionmaking period twenty-five years ago, supporters of a relatively swift conferral of full membership to a narrow range of countries outmaneuvered proponents of a slower, phased conferral of limited membership to a wide range of states. Pleas from Central and Eastern European leaders, missteps by Russian President Boris Yeltsin, and victory by the pro-expansion Republican Party in the 1994 U.S. congressional election all helped advocates of full-membership enlargement to win. The documents also reveal the surprising impact of Ukrainian politics on this debate and the complex roles played by both Strobe Talbott, a U.S. ambassador and later deputy secretary of state, and Andrei Kozyrev, the Russian foreign minister. Finally, the sources suggest ways in which the debate's outcome remains significant for transatlantic and U.S.-Russian relations today.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88602867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Liberals claim that globalization has led to fragmentation and decentralized networks of power relations. This does not explain how states increasingly “weaponize interdependence” by leveraging global networks of informational and financial exchange for strategic advantage. The theoretical literature on network topography shows how standard models predict that many networks grow asymmetrically so that some nodes are far more connected than others. This model nicely describes several key global economic networks, centering on the United States and a few other states. Highly asymmetric networks allow states with (1) effective jurisdiction over the central economic nodes and (2) appropriate domestic institutions and norms to weaponize these structural advantages for coercive ends. In particular, two mechanisms can be identified. First, states can employ the “panopticon effect” to gather strategically valuable information. Second, they can employ the “chokepoint effect” to deny network access to adversaries. Tests of the plausibility of these arguments across two extended case studies that provide variation both in the extent of U.S. jurisdiction and in the presence of domestic institutions—the SWIFT financial messaging system and the internet—confirm the framework's expectations. A better understanding of the policy implications of the use and potential overuse of these tools, as well as the response strategies of targeted states, will recast scholarly debates on the relationship between economic globalization and state coercion.
{"title":"Weaponized Interdependence: How Global Economic Networks Shape State Coercion","authors":"H. Farrell, Abraham L. Newman","doi":"10.1162/isec_a_00351","DOIUrl":"https://doi.org/10.1162/isec_a_00351","url":null,"abstract":"Abstract Liberals claim that globalization has led to fragmentation and decentralized networks of power relations. This does not explain how states increasingly “weaponize interdependence” by leveraging global networks of informational and financial exchange for strategic advantage. The theoretical literature on network topography shows how standard models predict that many networks grow asymmetrically so that some nodes are far more connected than others. This model nicely describes several key global economic networks, centering on the United States and a few other states. Highly asymmetric networks allow states with (1) effective jurisdiction over the central economic nodes and (2) appropriate domestic institutions and norms to weaponize these structural advantages for coercive ends. In particular, two mechanisms can be identified. First, states can employ the “panopticon effect” to gather strategically valuable information. Second, they can employ the “chokepoint effect” to deny network access to adversaries. Tests of the plausibility of these arguments across two extended case studies that provide variation both in the extent of U.S. jurisdiction and in the presence of domestic institutions—the SWIFT financial messaging system and the internet—confirm the framework's expectations. A better understanding of the policy implications of the use and potential overuse of these tools, as well as the response strategies of targeted states, will recast scholarly debates on the relationship between economic globalization and state coercion.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77256377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Since 1990, China has used coercion in its maritime territorial disputes in the South China Sea, despite adverse implications for its image. China is curiously selective in its timing, targets, and tools of coercion: China rarely employs military coercion, and it does not coerce all countries that pose similar threats. An examination of newly available primary documents and hundreds of hours of interviews with Chinese officials to trace the decisionmaking processes behind China's use and nonuse of coercion reveals a new theory of when, why, and how China employs coercion against other states, especially in the South China Sea. Contrary to conventional wisdom, the findings show that China is a cautious bully that does not use coercion frequently. In addition, when China becomes stronger, it tends to use military coercion less often, choosing instead nonmilitary tools. Moreover, concerns with its reputation for resolve and with economic cost are critical elements of Chinese decisionmaking regarding the costs and benefits of coercing its neighbors. China often coerces one target to deter others—“killing the chicken to scare the monkey.” These findings have important implications for how scholars understand states' coercive strategies and the future of Chinese behavior in the region and beyond.
{"title":"Cautious Bully: Reputation, Resolve, and Beijing's Use of Coercion in the South China Sea","authors":"Ketian Zhang","doi":"10.1162/isec_a_00354","DOIUrl":"https://doi.org/10.1162/isec_a_00354","url":null,"abstract":"Abstract Since 1990, China has used coercion in its maritime territorial disputes in the South China Sea, despite adverse implications for its image. China is curiously selective in its timing, targets, and tools of coercion: China rarely employs military coercion, and it does not coerce all countries that pose similar threats. An examination of newly available primary documents and hundreds of hours of interviews with Chinese officials to trace the decisionmaking processes behind China's use and nonuse of coercion reveals a new theory of when, why, and how China employs coercion against other states, especially in the South China Sea. Contrary to conventional wisdom, the findings show that China is a cautious bully that does not use coercion frequently. In addition, when China becomes stronger, it tends to use military coercion less often, choosing instead nonmilitary tools. Moreover, concerns with its reputation for resolve and with economic cost are critical elements of Chinese decisionmaking regarding the costs and benefits of coercing its neighbors. China often coerces one target to deter others—“killing the chicken to scare the monkey.” These findings have important implications for how scholars understand states' coercive strategies and the future of Chinese behavior in the region and beyond.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84302059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Permanent world peace is beginning to emerge. States with developed market-oriented economies have foremost interests in the principle of self-determination of all states as the foundation for a robust global marketplace. War among these states, even making preparations for war, is not possible, because they are in a natural alliance to preserve and protect the global order. Among other states, weaker powers, fearing those that are stronger, tend to bandwagon with the relatively benign market-oriented powers. The result is a powerful liberal global hierarchy that is unwittingly, but systematically, buttressing states' embrace of market norms and values, moving the world toward perpetual peace. Analysis of voting preferences of members of the United Nations General Assembly from 1946 to 2010 corroborates the influence of the liberal global hierarchy: states with weak internal markets tend to disagree with the foreign policy preferences of the largest market power (i.e., the United States), but more so if they have stronger rather than weaker military and economic capabilities. Market-oriented states, in contrast, align with the market leader regardless of their capabilities. Barring some dark force that brings about the collapse of the global economy (such as climate change), the world is now in the endgame of a five-century-long trajectory toward permanent peace and prosperity.
{"title":"The End of War: How a Robust Marketplace and Liberal Hegemony Are Leading to Perpetual World Peace","authors":"M. Mousseau","doi":"10.1162/isec_a_00352","DOIUrl":"https://doi.org/10.1162/isec_a_00352","url":null,"abstract":"Abstract Permanent world peace is beginning to emerge. States with developed market-oriented economies have foremost interests in the principle of self-determination of all states as the foundation for a robust global marketplace. War among these states, even making preparations for war, is not possible, because they are in a natural alliance to preserve and protect the global order. Among other states, weaker powers, fearing those that are stronger, tend to bandwagon with the relatively benign market-oriented powers. The result is a powerful liberal global hierarchy that is unwittingly, but systematically, buttressing states' embrace of market norms and values, moving the world toward perpetual peace. Analysis of voting preferences of members of the United Nations General Assembly from 1946 to 2010 corroborates the influence of the liberal global hierarchy: states with weak internal markets tend to disagree with the foreign policy preferences of the largest market power (i.e., the United States), but more so if they have stronger rather than weaker military and economic capabilities. Market-oriented states, in contrast, align with the market leader regardless of their capabilities. Barring some dark force that brings about the collapse of the global economy (such as climate change), the world is now in the endgame of a five-century-long trajectory toward permanent peace and prosperity.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85591113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}