The Political Economy of the US-China Cybersecurity Relations and Trade War Under the Trump Administration

Miftahul Huda, Faris Al - Fadhat

Abstract


This article examines the cybersecurity relations between China and the US under the Trump administration. It explores the changes in the US cybersecurity policy in 2019, where the US government took a protectionist approach to ban the operation of China’s software and hardware in the US, and how such a decision predisposes the trade war between the two countries, which President Trump previously started. Appling the political economy approach of the cybersecurity concept, this research argues that the protectionist cybersecurity policy by the Trump administration was driven by the US business interest followed by security concern to lead the global technological transformation, balance the international economy, and preserve the US citizen’s big data.  Such policy, nevertheless, has intensified the trade war between the US and China, specifically in the technology and big data sectors. This study contributes to the broader literature on cybersecurity that has been much discussed in recent years.


Keywords


Trump administration, cybersecurity, trade war

Full Text:

PDF

References


Bibliography

Book / Report

Capri, A. (2020). Semiconductors at the heart of the US-China tech war. In Hinrich Foundation (Issue January). research.hinrichfoundation.com. https://hinrichfoundation.com/trade-research/global-trade-research/thought-leadership/semiconductors-at-the-heart-of-the-us-china-tech-war/

Dupont, A. (2020). Mitigating the New Cold War: Managing US-China trade, tech and geopolitical conflict (Issue May).

Ikenson, D. (2017). Cybersecurity or Protectionism: Defusing the Most Volatile Issue in the U.S.-China Relationship. In Cato Institute (Issue 815). https://www.cato.org/policy-analysis/cybersecurity-or-protectionism-defusing-most-volatile-issue-us-china-relationship#:~:text=Defusing the Most Volatile Issue in the U.S.–China Relationship,-July 13%2C 2017&text=For several years%2C Chinese information,t

Ghernaouti, S. (2013). Cyber Power: Crime, Conflict and Security in Cyberspace. In Cyber Power: Crime, Conflict and Security in Cyberspace. EPFL Press.

Journal

Arežina, S. (2019). U.S.-China Relations Under the Trump Administration: Changes and Challenges. China Quarterly of International Strategic Studies, 05(03), 289–315. https://doi.org/10.1142/S2377740019500210

Ashbee, E., & Hurst, S. (2021). The Trump administration and China: policy continuity or transformation? Policy Studies, 42(5–6), 720–737. https://doi.org/10.1080/01442872.2021.1919299

Barrinha, A., & Renard, T. (2017). Cyber - diplomacy: the making of an international society in the digital age. Global Affairs, 3(4–5), 353–364. https://doi.org/10.1080/23340460.2017.1414924

Chong, T. T. L., & Li, X. (2019). Understanding the China–US trade war: causes, economic impact, and the worst-case scenario. Economic and Political Studies, 7(2), 185–202. https://doi.org/10.1080/20954816.2019.1595328

Chotimah, H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara. Politica, 10(2), 113–128. https://doi.org/https://doi.org/10.22212/ jp.v10i1.1447

Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR)relevant Theory? International Political Science Review, 27(3), 221–244. https://doi.org/10.1177/0192512106064462

Hansen, L., & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. http://www.jstor.org/stable/27735139

Jr, J. S. N. (2011). Nuclear Lessons for Cyber Security ? Strategic Studies Quarterly, 5(4), 18–38. https://www.jstor.org/stable/10.2307/26270536

Kusnanto, A. (2003). KEAMANAN NASIONAL, PERTAHANAN NEGARA, DAN KETERTIBAN UMUM. Seminar Pembangunan Hukum Nasional VllI Diselenggarakan Oleh Badan Pembinaan Hukum Nasional, Departemen Kehakiman Dan HAM RI, 1–10.

Lacy, M., & Prince, D. (2018). Securitization and the global politics of cybersecurity. Global Discourse, 8(1), 100–115. https://doi.org/10.1080/23269995.2017.1415082

Liu, T., & Woo, W. T. (2018). Understanding the U.S.-China Trade War. China Economic Journal, 11(3), 319–340. https://doi.org/10.1080/17538963.2018.1516256

Naughton, J. (2016). The evolution of the Internet: from military experiment to General Purpose Technology. Journal of Cyber Policy, 1(1), 5–28. https://doi.org/10.1080/23738871.2016.1157619

Qiu, L. D., Zhan, C., & Wei, X. (2019). An analysis of the China–US trade war through the lens of the trade literature. Economic and Political Studies, 7(2), 148–168. https://doi.org/10.1080/20954816.2019.1595329

Segal, A. M. (2014). Cyberspace: The New Strategic Realm in US–China Relations. Strategic Analysis, 38(4), 577–581. https://doi.org/10.1080/09700161.2014.918447

Shively, J. (2021). Cybersecurity policy and the Trump administration. Policy Studies, 42(5–6), 738–754. https://doi.org/10.1080/01442872.2021.1947482

Sun, H. (2019). US-China Tech War: Impacts and Prospects. China Quarterly of International Strategic Studies. https://doi.org/10.1142/S237774001950012X

Valeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. In C. Brown & R. Eckersley (Eds.), The Oxford Handbook of International Political Theory (Issue June, pp. 258–272). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780198746928.013.19

Vlados, C. (2020). The Dynamics of the Current Global Restructuring and Contemporary Framework of the US–China Trade War. Global Journal of Emerging Market Economies, 12(1), 4–23. https://doi.org/10.1177/0974910119896636

Zwitter, A. (2015). Big Data and International Relations. Ethics & International Affairs, 29(4), 377–389. https://doi.org/10.1017/S0892679415000362

Website

Financial Time. (2020). Why TikTok and WeChat are the new front line in the US-China tech war | FT. Financial Time Youtube Channel. https://www.youtube.com/watch?v=499RsH8HgJo

M. Mutter, K. (2021). U.S.-China Trade Relations (Issue February 2021). https://crsreports.congress.gov/product/pdf/IF/IF11284

McCain, J., & Reed, J. (2019). National Defence Authorization Act for Fiscal Year 2019. https://www.armed-services.senate.gov/imo/media/doc/FY19 NDAA Executive Summary FINAL.pdf

Resources, S. (n.d.). A Brief History of the Internet. University System of Georgia. https://www.usg.edu/galileo/skills/unit07/internet07_02.phtml

Sukri, A. (2020). From trade to TikTok: How US-China decoupling affects everyone. Www.Aljazeera.Com. https://www.aljazeera.com/economy/2020/8/4/from-trade-to-tiktok-how-us-china-decoupling-affects-everyone

The White House. (2020). Executive Order on Addressing the Threat Posed by TikTok. Whitehouse.Org. https://www.whitehouse.gov/presidential-actions/executive-order-addressing-threat-posed-tiktok/

Trend J., B., Balassa, B., Allais, M., Robinson, R., & Wonnacot, P. (2020). international trade. Encyclopedia Britannica. https://www.britannica.com/topic/international-trade

Williams, R. D. (2020). Beyond Huawei and TikTok: Untangling US concerns over Chinese tech companies and digital security.




DOI: https://doi.org/10.18196/jiwp.v6i2.15971

Refbacks



Journal JIWP Indexed by:

       

 

Office:

Journal of Islamic World and Politics, Magister Hubungan Internasional Universitas Muhammadiyah Yogyakarta, Jl. Brawijaya (Lingkar Selatan), Tamantirto, Kasihan, Bantul, Daerah Istimewa Yogyakarta. Whatsapp: +62823-2679-6566 Email: jiwp@umy.university

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.