APP下载

Abstract

2020-03-11

国际安全研究 2020年1期
关键词:英文

Abstract

National Security Governance in the Era of Artificial Intelligence: Application Paradigm, Risk Identification and Path Selection

QUE Tianshu and ZHANG Jiteng

[Abstract] As the core driving force of a new round of scientific and technological revolution and industrial transformation, the development and application of artificial intelligence (AI) has exerted serious and far-reaching impact on national security governance while giving greater impetus to social development. The intrinsic interactions between the AI technology and national security have become prominent on the structural level. On the one hand, based on the practical application of evolutionary empowerment, the AI technology can provide more effective mechanisms for safeguarding national security in the fields of traditional security, non-traditional security and their overlapping areas. On the other hand, the application of the AI technology may render greater possibilities than previously thought. Therefore, the application of the AI technology in national security governance has a strong tendency to lead to contradictions between “boundary” and “effectiveness”, between “efficiency” and “reliability”, and between “competition” and “stability”. Any AI-caused imbalance of power and deteriorating security situation could comprehensively damage national security, leaving national competitiveness; social order and technological application exposed to shocks. It should be noted that the national security risks brought about by the AI technology have gradually begun to emerge, and a comprehensive assessment of the existing opportunities and challenges will be the key to solving the security issues related to the AI technology. To this end, China should not only facilitate the development of its AI technology but also strengthen the research and prevention of the potential risks of this technology so as to safeguard China’s national security and people’s interests.

[Keywords] artificial intelligence, national security, application paradigm, security paradox, path selection

[Authors] QUE Tianshu, Deputy Director and Professor, Center for Rule of Law Strategy Studies, East China University of Political Science and Law (Shanghai, 200042); ZHANG Jiteng, Postgraduate of East China University of Political Science and Law (Shanghai, 200042).

Weaponization of Space and Construction of China’s Space Security

HE Qisong

[Abstract] Space technology was a product of the Cold War armament race between the USA and the USSR. The moment the world’s first satellite was launched into its orbit, space has become closely associated with militarization, followed by the weaponization of space. In the post-Cold War era, in order to ensure space hegemony and maintain its supremacy as the only superpower, the United States would pay any price to resume its policy of space weaponization, which has triggered counter actions from other countries. The escalating threats and challenges brought about by the weaponization of space plays a central role in the establishment of anti-missile systems around the world and arms race in space, increasing the risk of nuclear war, hindering the process of global nuclear disarmament and limiting the commercial development of space and the Space 2030 Agenda. All of these have exerted great impact on international strategic balance and stability. The weaponization of space is seriously threatening China’s space security, putting China’s space rights and assets in jeopardy. What’s more, China’s strategic places will be threatened by reconnaissance activities and strikes from other countries’ space systems. Hence, it is quite important for China to consolidate the construction of its space deterrence forces and space security system in order to grapple well with the threats and challenges posed by space weaponization.

[Keywords] space weaponization, space security, space governance, China’s space security system, strategic construction

[Author] HE Qisong, Professor, School of Political Science and Public Administration, East China University of Political Science and Law (Shanghai, 200042).

Rethinking the Co-Ethnicity Advantages in Counter-Insurgency: A Case Study on India’s Handling of Sikh Insurgency

XIE Chao

[Abstract] This paper argues that all parties in ethnic minority-related insurgency movements and counter-insurgency (COIN) operations can stand an equal chance to take co-ethnicity advantages, making full use of local environments, human intelligence and public mobilization. In order to undermine, neutralize or prevail over insurgent groups, the government should opt for a counter-insurgency strategy that gives full play to the moderate factions. The working mechanism lies in developing better control over the local population and winning the hearts and minds of the local people. When the government is able to control a large proportion of the local people, it becomes difficult for the insurgent groups to recruit enough people to replenish their member losses in COIN. While winning the local hearts and minds doesn’t necessarily lead to the demise of insurgent groups, the counter-insurgency operations are doomed to fail without the support from the locals. This paper identifies four COIN strategies based on whether the local moderates have a leadership position in COIN operations and whether they can take full advantage of their position of strength vis-à-vis insurgent groups, and thus establishes a framework to explore and evaluate their effectiveness in using co-ethnicity advantages. With a case study on the Sikh insurgency movement around the 1980s, the paper intends to demonstrate how the Indian government, moderate factions and insurgent groups adjusted their strategies at different stages and the impacts and outcomes of these adjustments.

[Keywords] ethnic conflicts, co-ethnicity advantages, moderates, Sikh insurgency

[Author] XIE Chao, Assistant Research Fellow, Institute for International and Area Studies, Tsinghua University (Beijing, 100084).

The Logic in Choice of Means in Maintaining Energy Security: From the Perspective of Property Rights System

SONG Yiming

[Abstract] In tackling the same or a similar energy crisis, countries with similar economic size, energy endowment and external energy dependency often adopt diametrically different measures. Countries represented by the United States mainly rely on administrative or diplomatic means while other countries represented by China are more inclined to apply a combined approach based on both administrative and commercial means. In order to explain such differences, this article intends to go beyond the traditional geopolitical and supply-demand perspectives in energy security researches and take advantage of the property rights system to examine the boundary of rights and responsibilities between the government and enterprises as well as the possibility and cost of the government’s leveraging of corporate capacities to maintain energy security. Based on empirical studies of the US response to the 1973 oil crisis and China’s response to the 2017 natural gas shortage, along with the complementary analyses about Britain and France’s responses to the 1973 oil crisis, this article finds out that the property rights system determines enterprises’ autonomy and the government’s disposal costs. Findings also demonstrate that under the system of private property rights, both the autonomy of energy companies and the disposal costs of the government stay on a high level, as a result of which the government can hardly turn to energy companies for help to cope with the energy crisis and have no other alternatives but to adopt administrative or diplomatic means to safeguard its energy security. However, under the system of public property rights, with both the autonomy of energy companies and the disposal costs of the government being much lower, the government is more likely to tackle the energy crisis with the help of energy companies. Under such circumstances, both parties can jointly assume the responsibility of maintaining energy security through an integrative approach based on both administrative and commercial means.

[Keywords] property rights system, energy security, energy companies, oil crisis, corporate autonomy

[Author] SONG Yiming, Ph. D. Student, School of International Studies, Renmin University of China (Beijing, 100872).

Non-Traditional Security Issues in China’s Cross-border Regions: Challenges and Countermeasures

XIE Guiping

[Abstract] China’s frontier regions have an abundance of neighboring countries and diverse ethnic groups and cultures, forming a complex geopolitical environment. In a globalization era, economic and security interdependence is on the rise. Along with China’s deepened reforms and greater openness as well as the Belt and Road Initiative, the cross-border non-traditional issues are becoming increasingly complex and more interwoven in China’s frontier regions, involving politics, economy, culture, ecology and public health. These issues also cover such security fields as geopolitics, identity, interests and cyber which have been integrated into peripheral security, international security and human security. With the recent developments in the political and security situation, a new series of issues and challenges may arise concerning non-traditional security and governance in the cross-border regions. Only under the guidance of the overall national security concept can the Chinese government maintain national security in a comprehensive way through the collaboration and cooperation between relevant parties at home and abroad. The multi-layered systematic governance of cross-border non-traditional security can contribute much to the governance of security as a whole.

[Keywords] frontier regions, cross-border non-traditional security, non-traditional security governance, overall national security

[Author] XIE Guiping, Ph. D. and Professor, Collaborative Innovation Center for Security and Development of Western Frontier China, Sichuan University (Chengdu, 610064).

(本期英文编辑:张国帅 高静)

猜你喜欢

英文
英文摘要
英文摘要
英文摘要
英文摘要
英文摘要
英文摘要
英文摘要
英文摘要
英文摘要
英文摘要