аннотация (1169517)
Текст из файла
AbstractThis dissertation takes a hybrid theoretical approach to security analysis,combining both neo-realistic material view and the constructivst ideational viewsimultaneously at multi-level security analysis i.e., domestic level, inter-state level,inter-regional level on Central Asian security complex (Kazakhstan, Kyrgyzstan,Tajikistan, Turkmenistan, Uzbekistan).The second chapter analyzes "the degree of sociopolitical coherence" atdomestic level to examine the degree of "weakness" of each state.
The analysistakes both quantitative and qualitative methods and proves that Central Asiansecurity complex is mostly constituted by weak states that are vulnerable tointernal/external shock and contain possibility to be challenged by sub-stators,providing unfavorable conditions for regional security environment. The thirdchapter analyzes "amity-enmity pattern" at inter-state level with application ofcontent analysis, examining more than 30,000 news articles based on concept ofsecuritization. The third chapter of analysis proves that the central asiansubcomplex shares "competitive lockean culture", representing "thin/thick securityregimes". This result implies that the Central Asian subcomplex is not yet asecurity community with collective identity nor a conflictive hostile regional blockbut a security regime of competitors who can use violence to protect their interests.The fourth chapter reflects both the material/objective power relations (balance ofpower, polarity) and ideational/inter-subjective perception between the CentralAsian subcomplex and the great powers.
The analysis of material penetration to theregion and the result of content analysis (news articles more than 50,000) onintentions and reactions between the great powers and Central Asian states provesthat former uni-polar Russia centered Central Asian subcomplex is turning intocompetitive multi-polared complex without critical discord of conflicting values.Keywords: Central Asia, security complex, regional security,securitization, great powers , amity-enmity pattern, regional security complextheoryAHHOTaQUH,Z:(aHHa5I .n;HCCepTaUJI5I HCllOJIh3yeT rH6pH.n;HhIH TeOpeTW:leCKHH IlO.n;XO.n; .n;JI5IaHaJIH3a6e3011aCHOCTHBI(eHTpaJIhHO-a3HaTCKOMKOMllJIeKCe6e3011aCHOCTHBKJIIOLIaIO~HM B ce65I TaKHe CTpaHhI KaK Ka3aXCTaH , KHprH3H5I, Ta.n;)KHKHCTaH,TypKMeHHCTaHHY36eKHCTaH.3TOT rH6pH.n;HhIHIlO.n;XO.n; OIlHpaeTC5IKaKnaHeOpeaJIHCTHLIecKylO MaTepHaJIhHyIO, TaK H na KOHCTpyKTHBHCTCKyIO H.n;eHHylOTOLIKy3peHH5InpaaHaJIH3e6e3011aCHOCTHnaBHyTpHrocy.n;apCTBeHHOM,Me)Krocy.n;apCTBeHHOM H Me)KperHOHaJIhHOM ypOBH5IX.BoBTOPOHIlOJIHTHLIeCKOH.n;HCCepTaII;HHCllJIOLIeHHOCTH»IlOMO~hIOllpOBO.n;HTC5I Cerornasepe3YJIhTaThInaaHaJIH3HpyeTC5I«creneasBHyTpHrocy.n;apCTBeHHOMCOII;HaJIhHO-yposae.AHaJIH3KaK KOJIHLIeCTBeHHhIX, TaK H KaLIeCTBeHHhIX MeTO.n;OB HIlOKa3hIBaIOTLITOI(eHTpaJIbHO-a3HaTCKHMKOMllJIeKC6e3011aCHOCTH COCTOHT B OCHOBHOM H3 CJIa6hIX rocyziapcrs, Y5I3BHMhIXnepeztBHyTpeHHHMH / BHeII1HHMH II10KaMH LITO C03.n;aeT He6JIarOllpH5ITHhle yCJIOBH5I .n;JI5IperHOHaJIhHOH6e3011aCHOCTH..n;py)KeCTBeHHOCTHBrperseiiBpa)K.n;e6HOCTH»rnaseaHaJIH3HpyeTC5Iolly6JIHKOBaHHhlxI(eHTpaJIhHOHa3HaTCKOMA3HH.BcpencrsaxPe3YJIhTaThIcy6-KOMllJIeKCe03HaLIaeT,LITOcy6KOMllJIeKCMaccoBoHaHaJIH3anpeofinanaerCOOTBeTCTBYIO~a5I «CJIa6oMyyposne, AHaJIH330,000 HOBOCTHhIXna Me)Krocy.n;apCTBeHHOMllPOH3BO.n;HTC5I C IlOMO~blO xrerona KOHTeHT-aHaJIH3a 60JIeeCTaTeH«rrarrepnHJIHHHcPopMaII;HHIlOKa3hIBaIOT,LITO«KOHKypeHTHa5ICHJIhHOMYI(eHTpaJIhHOHpeacavyA3HHHeBcrpaaI(eHTpaJIhHO-xyrrsrypaJIoKKa»,6e3011aCHOCTH».5IBJI5I5ICh3TOKOHcPJIHKTHOMcPopMaII;HeH nee erne He CTaJI coo6~eCTBOM 6e3011aCHOCTH C 06~eH KOJIJIeKTHBHOMH.n;eHTHLIHOCThIO.BLIeTBepTOMrnasennccepranaaaHaJIH3HpyeTC5IMaTepHaJIbHhIM / 06'heKTHBHhIM 6aJIaHC CHJI BeJIHKHX nepacas B cy6KOMllJIeKCe HH.n;eHHoe/cyfrsexraaaoeB3aHMHoeBOCllpH5ITHecy6KOMllJIeKCa HBeJIHKHMH .n;ep)KaBaMH.
Pe3YJIhTaThIllpOHHKHOBeHH5IBpernonHpe3YJIhTaThIzrpyrztpyraCTpaHaMHaHaJIH3a MaTepHaJIhHOrOKOHTeHT-aHaJIH3a60JIee50,000HOBOCTHbIX crareii 0 HaMepeHH5IX BeJIHKHX nepacas H peaKII;H5IX co CTOpOHhI crpanpernona na BMeII1aTeJIhCTBO BeJIHKHXnepxaspanee O.n;HOllOJI5IPHhIM II;eHTpHpOBaHHbIHB ztena peraoaa IlOKa3hIBaIOT LITOnoxpyr POCCHH I(eHTpaJIbHO-a3HaTCKHMcy6KOMllJIeKC rrpespamaerca B KOHKypeHTHhIM MHOrOllOJI5IpHhIM KOMllJIeKC 6e3KpHTHLIeCKoro KOH<pJIHKTa llpOTHBopeLIHBhIX II;eHHOCTeH.KJIIOQeBbIe CJIOBa: I(eHTpaJIhHa5I A3H5I, perHOHaJIhHa5I 6e3011aCHOCTh, TepOH5IperHOHaJIhHOrOKOMllJIeKCa 6e3011aCHOCTH,rocynapcraeunaanarrepn .n;pY)KeCTBeHHOCTH-Bpa)K.n;e6HOCTH, ceKhIOpHTH3aII;H5I.COCT05ITeJIhHOCTh,.
Характеристики
Тип файла PDF
PDF-формат наиболее широко используется для просмотра любого типа файлов на любом устройстве. В него можно сохранить документ, таблицы, презентацию, текст, чертежи, вычисления, графики и всё остальное, что можно показать на экране любого устройства. Именно его лучше всего использовать для печати.
Например, если Вам нужно распечатать чертёж из автокада, Вы сохраните чертёж на флешку, но будет ли автокад в пункте печати? А если будет, то нужная версия с нужными библиотеками? Именно для этого и нужен формат PDF - в нём точно будет показано верно вне зависимости от того, в какой программе создали PDF-файл и есть ли нужная программа для его просмотра.