The Political Economy of the US-China Cybersecurity Relations and Trade War Under the Trump Administration
DOI:
https://doi.org/10.18196/jiwp.v6i2.15971Keywords:
Trump administration, cybersecurity, trade warAbstract
This article examines the cybersecurity relations between China and the US under the Trump administration. It explores the changes in the US cybersecurity policy in 2019, where the US government took a protectionist approach to ban the operation of China’s software and hardware in the US, and how such a decision predisposes the trade war between the two countries, which President Trump previously started. Appling the political economy approach of the cybersecurity concept, this research argues that the protectionist cybersecurity policy by the Trump administration was driven by the US business interest followed by security concern to lead the global technological transformation, balance the international economy, and preserve the US citizen’s big data. Such policy, nevertheless, has intensified the trade war between the US and China, specifically in the technology and big data sectors. This study contributes to the broader literature on cybersecurity that has been much discussed in recent years.
References
Bibliography
Book / Report
Capri, A. (2020). Semiconductors at the heart of the US-China tech war. In Hinrich Foundation (Issue January). research.hinrichfoundation.com. https://hinrichfoundation.com/trade-research/global-trade-research/thought-leadership/semiconductors-at-the-heart-of-the-us-china-tech-war/
Dupont, A. (2020). Mitigating the New Cold War: Managing US-China trade, tech and geopolitical conflict (Issue May).
Ikenson, D. (2017). Cybersecurity or Protectionism: Defusing the Most Volatile Issue in the U.S.-China Relationship. In Cato Institute (Issue 815). https://www.cato.org/policy-analysis/cybersecurity-or-protectionism-defusing-most-volatile-issue-us-china-relationship#:~:text=Defusing the Most Volatile Issue in the U.S.–China Relationship,-July 13%2C 2017&text=For several years%2C Chinese information,t
Ghernaouti, S. (2013). Cyber Power: Crime, Conflict and Security in Cyberspace. In Cyber Power: Crime, Conflict and Security in Cyberspace. EPFL Press.
Journal
Arežina, S. (2019). U.S.-China Relations Under the Trump Administration: Changes and Challenges. China Quarterly of International Strategic Studies, 05(03), 289–315. https://doi.org/10.1142/S2377740019500210
Ashbee, E., & Hurst, S. (2021). The Trump administration and China: policy continuity or transformation? Policy Studies, 42(5–6), 720–737. https://doi.org/10.1080/01442872.2021.1919299
Barrinha, A., & Renard, T. (2017). Cyber - diplomacy: the making of an international society in the digital age. Global Affairs, 3(4–5), 353–364. https://doi.org/10.1080/23340460.2017.1414924
Chong, T. T. L., & Li, X. (2019). Understanding the China–US trade war: causes, economic impact, and the worst-case scenario. Economic and Political Studies, 7(2), 185–202. https://doi.org/10.1080/20954816.2019.1595328
Chotimah, H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara. Politica, 10(2), 113–128. https://doi.org/https://doi.org/10.22212/ jp.v10i1.1447
Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR)relevant Theory? International Political Science Review, 27(3), 221–244. https://doi.org/10.1177/0192512106064462
Hansen, L., & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. http://www.jstor.org/stable/27735139
Jr, J. S. N. (2011). Nuclear Lessons for Cyber Security ? Strategic Studies Quarterly, 5(4), 18–38. https://www.jstor.org/stable/10.2307/26270536
Kusnanto, A. (2003). KEAMANAN NASIONAL, PERTAHANAN NEGARA, DAN KETERTIBAN UMUM. Seminar Pembangunan Hukum Nasional VllI Diselenggarakan Oleh Badan Pembinaan Hukum Nasional, Departemen Kehakiman Dan HAM RI, 1–10.
Lacy, M., & Prince, D. (2018). Securitization and the global politics of cybersecurity. Global Discourse, 8(1), 100–115. https://doi.org/10.1080/23269995.2017.1415082
Liu, T., & Woo, W. T. (2018). Understanding the U.S.-China Trade War. China Economic Journal, 11(3), 319–340. https://doi.org/10.1080/17538963.2018.1516256
Naughton, J. (2016). The evolution of the Internet: from military experiment to General Purpose Technology. Journal of Cyber Policy, 1(1), 5–28. https://doi.org/10.1080/23738871.2016.1157619
Qiu, L. D., Zhan, C., & Wei, X. (2019). An analysis of the China–US trade war through the lens of the trade literature. Economic and Political Studies, 7(2), 148–168. https://doi.org/10.1080/20954816.2019.1595329
Segal, A. M. (2014). Cyberspace: The New Strategic Realm in US–China Relations. Strategic Analysis, 38(4), 577–581. https://doi.org/10.1080/09700161.2014.918447
Shively, J. (2021). Cybersecurity policy and the Trump administration. Policy Studies, 42(5–6), 738–754. https://doi.org/10.1080/01442872.2021.1947482
Sun, H. (2019). US-China Tech War: Impacts and Prospects. China Quarterly of International Strategic Studies. https://doi.org/10.1142/S237774001950012X
Valeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. In C. Brown & R. Eckersley (Eds.), The Oxford Handbook of International Political Theory (Issue June, pp. 258–272). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780198746928.013.19
Vlados, C. (2020). The Dynamics of the Current Global Restructuring and Contemporary Framework of the US–China Trade War. Global Journal of Emerging Market Economies, 12(1), 4–23. https://doi.org/10.1177/0974910119896636
Zwitter, A. (2015). Big Data and International Relations. Ethics & International Affairs, 29(4), 377–389. https://doi.org/10.1017/S0892679415000362
Website
Financial Time. (2020). Why TikTok and WeChat are the new front line in the US-China tech war | FT. Financial Time Youtube Channel. https://www.youtube.com/watch?v=499RsH8HgJo
M. Mutter, K. (2021). U.S.-China Trade Relations (Issue February 2021). https://crsreports.congress.gov/product/pdf/IF/IF11284
McCain, J., & Reed, J. (2019). National Defence Authorization Act for Fiscal Year 2019. https://www.armed-services.senate.gov/imo/media/doc/FY19 NDAA Executive Summary FINAL.pdf
Resources, S. (n.d.). A Brief History of the Internet. University System of Georgia. https://www.usg.edu/galileo/skills/unit07/internet07_02.phtml
Sukri, A. (2020). From trade to TikTok: How US-China decoupling affects everyone. Www.Aljazeera.Com. https://www.aljazeera.com/economy/2020/8/4/from-trade-to-tiktok-how-us-china-decoupling-affects-everyone
The White House. (2020). Executive Order on Addressing the Threat Posed by TikTok. Whitehouse.Org. https://www.whitehouse.gov/presidential-actions/executive-order-addressing-threat-posed-tiktok/
Trend J., B., Balassa, B., Allais, M., Robinson, R., & Wonnacot, P. (2020). international trade. Encyclopedia Britannica. https://www.britannica.com/topic/international-trade
Williams, R. D. (2020). Beyond Huawei and TikTok: Untangling US concerns over Chinese tech companies and digital security.
Downloads
Published
Issue
Section
License
License
Journal of Islamic World and Politics is licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license. You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially. This license is acceptable for Free Cultural Works.
The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Copyright
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).