Tow, William and Brendan Taylor. "What is Asian security architecture?" Review of International Studies 36 (2010): 95-116.
This article examines the definition of the term 'security architecture' particularly in the Asian context. It argues that there is no current clear definition and that in order for progress to be made in terms of regional stability and economic performance, there needs to be a clearer understanding of the region's security objectives. After examining current theory and definitions, the article uses the US and Asia as case studies to explore current thinking around security architecture in Asia. The authors propose an alternative perspective using seven characteristics which refer broadly to design, function and structure. In general they argue that any Asian security architecture should be geographically defined, it should be unifying, designed from the "bottom-up" and focused not just on institutions and security. The article gives a comprehensive and clear idea of the current understanding of security architecture in Asia and other regions, however the article was written in 2010 so the region has been influenced by more recent events. The seven point plan is useful for exploring a potential new way of understanding security architecture but the authors do not point out the limitations that these might have in terms of acceptance from key stakeholders. Notwithstanding these weaknesses, this article will be useful in my own research as I develop a clear theoretical framework for security in East Asia and possible ways of framing security architecture for the future.
In the article above, the annotation writer gave a clear summary of the content that was applicable to their research. It was clearly written, and enough details were given on each point so that any reader could grasp what the writer's argument is focused on. Further down, the writer comments on the applicability of the journal due to its date and what might've changed since then. Yet, the writer goes on to elaborate how the article is still applicable to his argument.
source:http://www.anu.edu.au/students/learning-development/writing-assessment/annotated-bibliography/sample-annotations
No comments:
Post a Comment