The Challenges of Indonesian Foreign and Security Policies towards the emergence of Asean Security Community (ASC)
Abstract
ASEAN has grown and developed into an established model of regional cooperation after the European Union. Ironically, this only lasted until 1997, because since the 1998 economic crisis hit various countries, ASEAN began to show its weaknesses. Internal conflicts in member countries occur, thus requiring efforts to consolidate and reinvigorate regional cooperation which will further ensure the return of joint commitments after more than decades.
On the other hand, when referring to the official ASEAN document in the Declaration of ASEAN Concord II (Bali Concord II), adopted from the 9th ASEAN Summit in October 2003, Indonesia, which first proposed the ASC (ASEAN Security Community) concept, has presented a concept paper entitled “Towards ASEAN Security Community”, which places a strong emphasis on democracy and the human rights agenda which are the two main substances in the construction of the ASEAN Security Community.
There are two types of challenges that are still being faced by ASEAN member countries. The first is traditional challenges such as border disputes, and the second is non-traditional challenges that are transnational in nature, such as terrorism, human rights and democracy enforcement, narcotics, piracy, human trafficking, money laundering, illegal logging and natural disasters. Based on this background, the formulation of the problem in this research is on how is Indonesia's foreign policy and security policy implementation in the process of transforming the ASEAN Security Community format into an ASEAN Political Security and Community (APSC). This research focused on the challenges of the implementation of Indonesian foreign and security policies towards the process of the transformation period.
Downloads
References
Acharya, A., The Association of Southeast Asian Nations:" Security Community" or" Defence Community"? Pacific Affairs, 1991: p. 159-178.DOI: https://doi.org/10.2307/2759957.
Hettne, B., The new regionalism revisited, in Theories of new regionalism. 2003, Springer. p. 22-42.DOI: https://doi.org/10.1057/9781403938794_2.
Hettne, B., Beyond the ‘new’regionalism, in Key debates in new political economy. 2006, Routledge. p. 136-168.DOI: https://doi.org/10.4324/9780203965450-14.
Mondelli, M.U., et al., Significance of the immune response to a major, conformational B-cell epitope on the hepatitis C virus NS3 region defined by a human monoclonal antibody. Journal of virology, 1994. 68(8): p. 4829-4836.DOI: https://doi.org/10.1128/jvi.68.8.4829-4836.1994.
Doloreux, D. and S. Parto, Regional innovation systems: Current discourse and unresolved issues.Technology in society, 2005. 27(2): p. 133-153.DOI: https://doi.org/10.1016/j.techsoc.2005.01.002.
Frazier, D. and R. Stewart-Ingersoll, Regional powers and security: A framework for understanding order within regional security complexes. European Journal of International Relations, 2010. 16(4): p. 731-753.DOI: https://doi.org/10.1177/1354066109359847.
Graham, B.A.T. and J.R. Tucker, The international political economy data resource. The Review of International Organizations, 2019. 14(1): p. 149-161.DOI: https://doi.org/10.1007/s11558-017-9285-0.
Agnew, J., The territorial trap: The geographical assumptions of international relations theory. Review of international political economy, 1994. 1(1): p. 53-80.DOI: https://doi.org/10.1080/09692299408434268.
Gaddis, J.L., The Cold War, the long peace, and the future. Diplomatic History, 1992. 16(2): p. 234- 246.DOI: https://doi.org/10.1111/j.1467-7709.1992.tb00499.x.
Krause, K., Critical Theory and Security Studies: The Research Programme ofCritical Security Studies'.Cooperation and conflict, 1998. 33(3): p. 298-333.DOI: https://doi.org/10.1177/0010836798033003004.
Booth, K., The Writing on the Wall. International Relations, 2007. 21(3): p. 360-366.DOI: https://doi.org/10.1177/0047117807080213.
Pallin, R., et al., The detection of enteroviruses in large volume concentrates of recreational waters by the polymerase chain reaction. Journal of virological methods, 1997. 67(1): p. 57-67.DOI: https://doi.org/10.1016/S0166-0934(97)00076-1.
Buzan, B., O. Waever, and J. De Wilde, Security analysis: conceptual apparatus. Security: a new framework for analysis, 1998: p. 21-50.
Alberth, J. and H. Carlsson, Critical Security Studies, Human Security and Peace. D-level paper, Political Science), Linköping University,1,47., 2009.
Wendt, A., Constructing international politics. International security, 1995. 20(1): p. 71-81.DOI: https://doi.org/10.2307/2539217.
Waltz, K.N., The emerging structure of international politics. International security, 1993. 18(2): p. 44- 79.DOI: https://doi.org/10.2307/2539097.
Flockhart, T., Understanding NATO through constructivist theorising, in Theorising NATO. 2015, Routledge. p. 140-160.DOI: https://doi.org/10.4324/9781315658001-7.
Pretorius, J., The security imaginary: Explaining military isomorphism. Security dialogue, 2008. 39(1): p. 99-120.DOI: https://doi.org/10.1177/0967010607086825.
Hurwitz, J., M. Peffley, and M.A. Seligson, Foreign policy belief systems in comparative perspective: The United States and Costa Rica. International Studies Quarterly, 1993. 37(3): p. 245-270.DOI: https://doi.org/10.2307/2600808.
Hurwitz, J. and M. Peffley, How are foreign policy attitudes structured? A hierarchical model. American Political Science Review, 1987. 81(4): p. 1099-1120.DOI: https://doi.org/10.2307/1962580.
C. Schneid, F., Vanya Eftimova Bellinger, Marie von Clausewitz: The Woman Behind the Making of On War. 2017, SAGE Publications Sage UK: London, England.
Buzan, B., A framework for regional security analysis, in South Asian Insecurity and the Great Powers. 1986, Springer. p. 3-33.DOI: https://doi.org/10.1007/978-1-349-07939-1_1.
Sherman, S., Foundations, frameworks, lenses: The role of theories in bioethics. Bioethics, 1999. 13(3‐ 4): p. 198-205.DOI: https://doi.org/10.1111/1467-8519.00147.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.