13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      China in a World of Orders: Rethinking Compliance and Challenge in Beijing's International Relations

      International Security
      MIT Press - Journals

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Many scholars and policymakers in the United States accept the narrative that China is a revisionist state challenging the U.S.-dominated international liberal order. The narrative assumes that there is a singular liberal order and that it is obvious what constitutes a challenge to it. The concepts of order and challenge are, however, poorly operationalized. There are at least four plausible operationalizations of order, three of which are explicitly or implicitly embodied in the dominant narrative. These tend to assume, ahistorically, that U.S. interests and the content of the liberal order are almost identical. The fourth operationalization views order as an emergent property of the interaction of multiple state, substate, nonstate, and international actors. As a result, there are at least eight “issue-specific orders” (e.g., military, trade, information, and political development). Some of these China accepts; some it rejects; and some it is willing to live with. Given these multiple orders and varying levels of challenge, the narrative of a U.S.-dominated liberal international order being challenged by a revisionist China makes little conceptual or empirical sense. The findings point to the need to develop more generalizable ways of observing orders and compliance.

          Related collections

          Most cited references44

          • Record: found
          • Abstract: found
          • Article: not found

          How Censorship in China Allows Government Criticism but Silences Collective Expression

          We offer the first large scale, multiple source analysis of the outcome of what may be the most extensive effort to selectively censor human expression ever implemented. To do this, we have devised a system to locate, download, and analyze the content of millions of social media posts originating from nearly 1,400 different social media services all over China before the Chinese government is able to find, evaluate, and censor (i.e., remove from the Internet) the subset they deem objectionable. Using modern computer-assisted text analytic methods that we adapt to and validate in the Chinese language, we compare the substantive content of posts censored to those not censored over time in each of 85 topic areas. Contrary to previous understandings, posts with negative, even vitriolic, criticism of the state, its leaders, and its policies are not more likely to be censored. Instead, we show that the censorship program is aimed at curtailing collective action by silencing comments that represent, reinforce, or spur social mobilization, regardless of content. Censorship is oriented toward attempting to forestall collective activities that are occurring now or may occur in the future—and, as such, seem to clearly expose government intent.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The logic of habit in International Relations

            Ted Hopf (2010)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              China's Strategic Censorship

                Bookmark

                Author and article information

                Journal
                International Security
                International Security
                MIT Press - Journals
                0162-2889
                1531-4804
                October 2019
                October 2019
                : 44
                : 2
                : 9-60
                Article
                10.1162/isec_a_00360
                13ea5567-653e-4386-8395-f0a61ee2b4cb
                © 2019
                History

                Comments

                Comment on this article