The US strategy of multidomain containment and China’s counter-responses in the Indo-Pacific (2019–2025)

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Type of the article: Research articleThe intensifying United States-China rivalry in the Indo-Pacific has gained acute relevance for global order as strategic competition extends across military, technological, economic, and cognitive domains. This paper examines the extent and modalities of the US multidimensional strategic encirclement of China in the Indo-Pacific and analyzes China’s multidomain responses, including the PLA’s intelligentization, technological sovereignty initiatives, and economic re-sovereignization, over the period 2019–2025. The study adopts a qualitative interpretivist methodology, drawing on scholarly and primary sources, including defense doctrines, alliance frameworks such as AUKUS and QUAD, legislative instruments, and multilingual Chinese perspectives. The analysis shows that the US employs layered alliance-building, technology governance through semiconductor and export-control regimes, triangulated partnerships with actors such as Israel and India, and selective interventions in regional states, including Pakistan and the Philippines, to constrain Chinese influence. China’s countermeasures are multidimensional: advancing AI-enabled military modernization, securing strategic port access at Gwadar, Hambantota, and Ream, and reinforcing economic insulation through its Dual Circulation Strategy and yuan-based energy agreements. Results indicate that encirclement is no longer limited to geography but increasingly embedded in digital infrastructure, economic flows, and cognitive influence. The study concludes that these dynamics are accelerating a shift toward bifurcated multipolarity, marked by competing techno-security ecosystems and divergent governance norms, with significant implications for alliance cohesion, technological sovereignty, and the management of strategic escalation.Acknowledgments I would like to express my sincere gratitude to my teachers and academic peers whose valuable insights, encouragement, and constructive discussions inspire me to enrich the quality of my work. I am especially indebted to my family – my wife and children – for their patience, understanding, and unwavering support during the long hours of research and writing. Their endurance and encouragement made this endeavor possible.

Similar Papers
  • Research Article
  • 10.25136/2409-7543.2023.4.69347
Technological sovereignty as the basis of the national security of the Russian Federation
  • Apr 1, 2023
  • Вопросы безопасности
  • Andrei Kirillovich Duben

The subject of the study forms a set of legal acts of the Russian Federation, international treaties (agreements) regulating public relations in the field of of technological sovereignty, law enforcement practice, as well as the provisions of theoretical interdisciplinary research in this area. The research is devoted to an urgent topic in legal science. Technological sovereignty is a concept that assumes the ability of a state to control its technology, data, and digital infrastructure. This issue is of concern in an era of globalization and increasing dependence on technology, as the State seeks to maintain its technological independence and protect its interests in the digital sphere. The article examines the concept of technological sovereignty and its importance in the modern world, with an emphasis on the need to control data. The methodological basis of this work is a system of modern general scientific and private law methods. The study of the formation, development, place and role of technological sovereignty was carried out using the following general scientific methods: analysis and synthesis, abstraction and modeling, observation, generalization, description, classification, etc. The work used special private law methods of cognition of comparative law, formal law. To achieve the goals and objectives of this study, the author provides a brief analysis of existing methodological approaches to technological sovereignty as a concept in the general knowledge system, and also formulates the author's definition of this category. The author concludes that ensuring technological sovereignty will guarantee the national security of the Russian Federation, thereby creating conditions for countering new challenges, threats and risks: internal and external information threats when using digital technologies; developing destructive processes aimed at the information space of the Russian Federation, violation of the rights and freedoms of citizens, public safety and the state, as well as the tasks of ensuring the socio-economic development of the country and domestic digital technologies, the technological sovereignty of the Russian Federation.

  • Research Article
  • Cite Count Icon 5
  • 10.2139/ssrn.3107272
What Does the Concept of 'Sovereignty' Mean in Digital, Network and Technological Sovereignty?
  • Jan 30, 2018
  • SSRN Electronic Journal
  • Sttphane Couture + 1 more

In this paper, we are interested in the notion of sovereignty as it is applied to “the digital.” Indeed, the notion of “sovereignty” has increasingly been used in recent years to describe various forms of independence, control and autonomy over digital infrastructures, technologies and contents. Although the notion of “sovereignty” seems to gain significance in digital discourses and associated scholarly literature, our preliminary analysis shows that while this notion is generally used to assert some form of collective control of digital content and/or infrastructures, the interpretation, subject, means and definition of sovereignty can significantly differ. See here for the published version: Couture, S., & Toupin, S. (2019). What does the notion of “sovereignty” mean when referring to the digital? New Media & Society, 21(10), 2305‑2322. https://doi.org/10.1177/1461444819865984

  • Research Article
  • 10.7256/2454-0706.2024.9.71241
The issue of technological sovereignty in the 21st century: the concept, peculiarity and experience of China
  • Sep 1, 2024
  • Право и политика
  • Menghan Lin

The subject of the study is technological sovereignty in the 21st century. The article provides a comparative historical analysis of the concept, features and experience of technological sovereignty from the point of view of representatives of socialist development with Chinese specifics. The research focuses on the main problems of technological sovereignty in the context of globalization of the XXI century. The study deeply examines the definition and significance of technological sovereignty and its unique characteristics in the modern world, including the impact of technological innovations on national competitiveness, security problems caused by technological dependence, as well as the maintenance of sovereignty in international technological cooperation and competition. In particular, the article considers China as a typical case for analyzing its practical experience, problems and coping strategies in building technological sovereignty. Historical, documentary, survey and comparative studies were chosen as the methods of study. The scope of the results and their novelty lies in the awareness of the value of accumulated political and trade experience to protect State security and prevent a new form of war against the background of prolonged globalization and technological revolution, thereby promoting international cooperation and positive rivalry. Conclusions and results. Technological sovereignty means that a country retains its sovereignty and independent status in political, economic, and other fields, independently mastering key technologies and innovative opportunities. It emphasizes the autonomy of the country and the rights of control in the technical field and is an extension and embodiment of national sovereignty in the technical field. The problem of China's technological sovereignty is characterized by distinctive features. On the one hand, China is committed to strengthening independent innovation and increasing technological self-sufficiency in order to get rid of external dependence and restrictions and ensure the security of technological sovereignty. On the other hand, China actively participates in the global governance of science and technology and promotes the creation of an open, cooperative and mutually beneficial international system of scientific and technical cooperation to maintain the balance and stability of the global technological ecosystem. The study of technological sovereignty has given new life to the theory of political science. This encourages political scientists to pay more attention to the impact of technological factors on the global political landscape and international relations, and also promotes interdisciplinary integration and innovation of political science theory.

  • Research Article
  • Cite Count Icon 4
  • 10.2196/71591
Insights Into the Current and Future State of AI Adoption Within Health Systems in Southeast Asia: Cross-Sectional Qualitative Study.
  • Jun 16, 2025
  • Journal of medical Internet research
  • Mochammad Fadjar Wibowo + 5 more

Artificial intelligence (AI) holds potential to enhance health systems worldwide. However, its implementation in health systems in Southeast Asia (SEA)-a region of diverse geopolitical and socioeconomic development-has been understudied. This study aims to gain insights into the current state and future prospects of AI technology from participants most directly involved in its adoption across health systems in SEA whose perspectives have received limited attention in research to date. We used a cross-sectional qualitative research design. Data were collected through 31 semistructured interviews with participants working in or significantly involved with the implementation of AI-enabled technologies within health systems across 7 SEA countries: Brunei Darussalam, Indonesia, Myanmar, Singapore, Thailand, Vietnam, and the Philippines. The participants represented the public, private, and nonprofit sectors. They included innovators, health care professionals using AI, professionals from nongovernmental and multilateral organizations, corporate professionals, academics, policy makers, regulators, and investors. All interviews were audio recorded and transcribed verbatim. The collected data were then analyzed using thematic analysis methodology to identify key themes. Of the 31 participants, 8 (26%) were from lower-middle-income countries, 16 (52%) from upper-middle-income countries, and 7 (22%) from high-income countries. Through thematic analysis, five major categories emerged: (1) AI technology acceptance, (2) disparities in digital transformation, (3) technology governance, (4) data governance, and (5) AI for health system transformation. Participants discussed the promise of AI technology for adoption and integration in the health sector. In lower-middle-income and upper-middle-income countries, disparities in digital transformation-such as infrastructure barriers, market access concerns, and limited investment-were viewed as critical impediments. Across all country income levels, technology and data governance were considered essential for the ethical integration of AI into health care systems. AI is perceived to have the potential to transform health systems, including population health management, service accessibility, operations management, health systems financing and health care payment, and personalized medicine. Our study provides novel perspectives and valuable insights into the current state and future prospects of AI adoption across health systems in SEA. By capturing the experiences and opinions of a broad range of professionals involved in health care and AI, this research provides a nuanced understanding of the opportunities and hurdles associated with health AI in the region. For the full potential of AI-enabled technologies to be successfully implemented and ultimately contribute to the transformation of health systems in the region, foundational investments are needed in digital infrastructure, technology governance, and data governance. These fundamental pillars are crucial for fostering an environment in which AI can be effectively and ethically leveraged to improve health outcomes and strengthen health care systems throughout SEA.

  • Research Article
  • 10.5210/spir.v2021i0.12153
SOVEREIGNTY IN THE CYBERSPACE: CONTESTATION OF CONCEPTS AND POLICIES
  • Sep 15, 2021
  • AoIR Selected Papers of Internet Research
  • Yik Chan Chin + 1 more

In recent years, various claims of cyberspace sovereignty, including 'data sovereignty', 'digital sovereignty' and 'technological sovereignty', have attracted widespread attention. In this research, we examine the various academic positions and governments’ policies on different "sovereignty" concepts in cyberspace, and to explore the controversies, evolution and future development of these concepts. Research questions are: 1) what are the definitions of the academic community on these concepts including ‘cyber’, 'digital', 'data' and 'technology’ sovereignty ; 2) what are the positions and claims of major governments on these sovereignties; and 3) what are the overlaps, differences and conflicts between those positions and the underlying reasons? Methodologically, this paper will use a historical documentary analysis approach. The types of documents used include two categories: (1) Primary sources: Initiatives, laws, regulations, drafts, ordinances and strategic proposals issued by governments on sovereignty in cyberspace; 2) secondary source: academic literatures related to various concepts of sovereignty in cyberspace, including journal papers, academic conference reports and books. In this paper, government policy documents from China, the EU and the US for the period 2010-2021 will be chosen as the main subjects of study. There has been a major conceptual and position differences among these countries/region on the "sovereignty " in cyberspace, they represent the focus of the debates.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 12
  • 10.1371/journal.pone.0197195
Inference comprehension in text reading: Performance of individuals with right- versus left-hemisphere lesions and the influence of cognitive functions
  • May 24, 2018
  • PLoS ONE
  • Marcela Lima Silagi + 4 more

BackgroundRight-hemisphere lesions (RHL) may impair inference comprehension. However, comparative studies between left-hemisphere lesions (LHL) and RHL are rare, especially regarding reading comprehension. Moreover, further knowledge of the influence of cognition on inferential processing in this task is needed.ObjectivesTo compare the performance of patients with RHL and LHL on an inference reading comprehension task. We also aimed to analyze the effects of lesion site and to verify correlations between cognitive functions and performance on the task.MethodsSeventy-five subjects were equally divided into the groups RHL, LHL, and control group (CG). The Implicit Management Test was used to evaluate inference comprehension. In this test, subjects read short written passages and subsequently answer five types of questions (explicit, logical, distractor, pragmatic, and other), which require different types of inferential reasoning. The cognitive functional domains of attention, memory, executive functions, language, and visuospatial abilities were assessed using the Cognitive Linguistic Quick Test (CLQT).ResultsThe LHL and RHL groups presented difficulties in inferential comprehension in comparison with the CG. However, the RHL group presented lower scores than the LHL group on logical, pragmatic and other questions. A covariance analysis did not show any effect of lesion site within the hemispheres. Overall, all cognitive domains were correlated with all the types of questions from the inference test (especially logical, pragmatic, and other). Attention and visuospatial abilities affected the scores of both the RHL and LHL groups, and only memory influenced the performance of the RHL group.ConclusionsLesions in either hemisphere may cause difficulties in making inferences during reading. However, processing more complex inferences was more difficult for patients with RHL than for those with LHL, which suggests that the right hemisphere plays an important role in tasks with higher comprehension demands. Cognition influences inferential processing during reading in brain-injured subjects.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 43
  • 10.1017/s0033291719002794
Influence of social cognition as a mediator between cognitive reserve and psychosocial functioning in patients with first episode psychosis.
  • Oct 22, 2019
  • Psychological Medicine
  • I González-Ortega + 48 more

Social cognition has been associated with functional outcome in patients with first episode psychosis (FEP). Social cognition has also been associated with neurocognition and cognitive reserve. Although cognitive reserve, neurocognitive functioning, social cognition, and functional outcome are related, the direction of their associations is not clear. Therefore, the main aim of this study was to analyze the influence of social cognition as a mediator between cognitive reserve and cognitive domains on functioning in FEP both at baseline and at 2 years. The sample of the study was composed of 282 FEP patients followed up for 2 years. To analyze whether social cognition mediates the influence of cognitive reserve and cognitive domains on functioning, a path analysis was performed. The statistical significance of any mediation effects was evaluated by bootstrap analysis. At baseline, as neither cognitive reserve nor the cognitive domains studied were related to functioning, the conditions for mediation were not satisfied. Nevertheless, at 2 years of follow-up, social cognition acted as a mediator between cognitive reserve and functioning. Likewise, social cognition was a mediator between verbal memory and functional outcome. The results of the bootstrap analysis confirmed these significant mediations (95% bootstrapped CI (-10.215 to -0.337) and (-4.731 to -0.605) respectively). Cognitive reserve and neurocognition are related to functioning, and social cognition mediates in this relationship.

  • Research Article
  • 10.30574/wjarr.2019.4.2.0151
Structural asymmetries in data ownership, access to information, and human rights enforcement across global digital governance regimes.
  • Dec 31, 2019
  • World Journal of Advanced Research and Reviews
  • Obioma Adesewa Okonkwo

The accelerating digital transformation of economies and societies has exposed deep structural asymmetries in data ownership, access to information, and human rights protection across global governance regimes. These asymmetries reflect unequal capacities between states, corporations, and individuals to control, interpret, and benefit from data the most valuable resource of the 21st century. From a broad perspective, disparities in digital infrastructure, legal maturity, and technological sovereignty have produced fragmented regimes where data-rich entities dominate decision-making and innovation, while data-poor nations and communities face exclusion and dependency. The concentration of control among major technology corporations further amplifies information inequalities, enabling opaque data extraction and algorithmic profiling practices that often escape meaningful accountability. At the governance level, divergent regulatory models exemplified by the European Union’s rights-based General Data Protection Regulation (GDPR), the United States’ market-driven framework, and China’s state-centric data sovereignty approach reveal competing philosophies on digital autonomy and human rights enforcement. These differences hinder global policy coherence, complicating efforts to establish equitable standards for cross-border data flows, privacy protection, and algorithmic transparency. Narrowing the focus, this paper critically examines how this governance asymmetries influence fundamental human rights, including the right to privacy, freedom of expression, and access to knowledge. It argues that bridging these divides requires developing a globally coordinated digital rights architecture grounded in fairness, inclusivity, and accountability. Such a framework would ensure that digital governance evolves not as a vehicle of domination or exclusion but as a platform for empowering all stakeholders within the interconnected global information ecosystem.

  • Book Chapter
  • 10.4018/979-8-3373-6002-7.ch002
Resilience of Critical Entities and Industrial Policy in the European Union
  • Jul 15, 2025
  • Manolis D Tzouvelekas + 3 more

This chapter investigates the nexus between the Critical Entities Resilience Directive and EU Industrial Policy. The EU is integrating a resilience framework into its industrial policy to secure its economic sovereignty and enhance its global competitiveness. Industrial resilience, in this context, refers to the capacity of industrial systems to anticipate, absorb, recover from, and adapt to disruptions, which includes dimensions such as supply chain security, technological sovereignty, sustainability, and the ability of public administration to respond to crises. Resilience in energy, transport, banking, financial market infrastructure, and digital infrastructure has become a strategic imperative in response to geopolitical tensions, financial stability challenges, climate risks, and technological vulnerabilities. The EU's evolving approach aims to build a more sustainable, secure, and autonomous economic landscape, ensuring that industrial development aligns with resilience goals while mitigating external risks. In the following pages we critically and constructively discuss this approach and we check its applicability in the case of Greece.

  • Research Article
  • 10.36683/2500-249x/2023-17/93-97
Технологический суверенитет как основа национальной безопасности
  • Jan 1, 2023
  • Education and Science without Limits Fundamental and Applied Researches
  • A N Afonin + 1 more

Technological sovereignty is a concept that involves the state's ability to control its technology, data and digital infrastructure. This problem is of growing concern in the era of globalization and increasing dependence on technology, as the state seeks to maintain its technological independence and protect its interests in digital domain. The article examines the concept of technological sovereignty and its importance in today's world with the focus on the necessity to control data.

  • Research Article
  • 10.71411/jassp.2025.8
PROTECTING MALAYSIA'S TECHNOLOGICAL AUTONOMY: INNOVATIVE GOVERNANCE FRAMEWORKS TO COUNTER DIGITAL HEGEMONIES
  • Mar 16, 2025
  • Journal of Asia Social Science Practice
  • Hongqiang Zhao + 2 more

This study investigates the manifestations and impacts of digital colonialism in Malaysia and proposes legal and regulatory reforms to safeguard the nation's digital sovereignty. Digital colonialism, characterized by the exploitation of data, digital infrastructure, and online platforms by powerful technology companies from the Global North, poses significant challenges to Malaysia's economic, social, cultural, and political fabric. Through a qualitative methodology combining theoretical analysis, case studies, and comparative policy research, the study finds that digital colonialism in Malaysia takes the form of economic domination by foreign technology giants, imperial control and surveillance capitalism, technological dependency, and the erosion of cultural identity in the digital sphere. The existing legal framework, including the Personal Data Protection Act 2010, Communications and Multimedia Act 1998, and Competition Act 2010, proves inadequate in addressing these challenges. Drawing lessons from the regulatory approaches of other Global South nations like India and Indonesia, the study recommends a comprehensive reform strategy encompassing the strengthening of data protection and privacy laws, regulating dominance in the digital market, promoting indigenous innovation capacities, fostering digital literacy, and forging strategic regional coalitions. By adopting a proactive and context-sensitive approach to digital governance, Malaysia can effectively assert its technological sovereignty and foster an inclusive digital economy that serves its national interests and citizenry.

  • Research Article
  • 10.30838/ep.207.34-41
DIGITAL INFRASTRUCTURE OF THE CIRCULAR ECONOMY IN THE EU: LESSONS FOR UKRAINE
  • Dec 5, 2025
  • Economic scope
  • Yuliia Orlovska + 1 more

This paper examines the evolution of the European Union’s circular economy policy through the prism of its digital infrastructure and argues that the current stage of the EU’s “circular transition” is essentially data-driven. The analysis shows that, starting with the 2015 Circular Economy Package (COM(2015)614) and continuing through the European Green Deal and the Circular Economy Action Plan 2020 (CEAP-2020), the circular economy has moved beyond waste management and recycling targets. It has become a strategic industrial policy tool linking resource efficiency, supply chain resilience and technological sovereignty. Central attention is given to emerging digital instruments such as the Digital Product Passport (DPP), building material tracking systems, and EU-level Data Spaces for the Circular Economy, which aim to create transparent, verifiable and interoperable information on materials, product lifecycles and repairability. Using case studies from the Netherlands, Finland, France and Germany, the article demonstrates how digital marketplaces for secondary materials, repair ecosystems and industrial symbiosis platforms generate new forms of competitiveness by keeping resources in circulation for longer and reducing dependence on primary raw materials. At the same time, the study identifies structural barriers that the EU itself acknowledges: fragmented data formats and responsibilities across sectors; high compliance and data-collection costs for SMEs; and persistent behavioural resistance from consumers who still prioritise convenience, novelty and low upfront price over durability, reuse or repair. The paper argues that digital circularity is not merely a technological add-on to “green policy”, but a socio-economic governance model in which data about materials becomes an economic asset. Finally, the article formulates lessons for Ukraine’s post-war reconstruction: rather than replicating EU instruments ex post, Ukraine should design interoperable material registries, reconstruction waste tracking systems and SME-oriented data services that are immediately compatible with the emerging EU data space of circular economy.

  • Research Article
  • Cite Count Icon 56
  • 10.1080/13501763.2023.2248204
Moving on to not fall behind? Technological sovereignty and the ‘geo-dirigiste’ turn in EU industrial policy
  • Aug 25, 2023
  • Journal of European Public Policy
  • Timo Seidl + 1 more

The fear of falling behind has been a driving force of European integration. Historically, Europe’s response to the looming angst of declining competitiveness has been more market-creation, not market-direction. Recently, however, Europe has – in the name of safeguarding Europe’s technological sovereignty – taken on a much more active role in directing economic activity towards sectors and technologies deemed geopolitically or geoeconomically important. In this paper, we attempt to explain this ‘geo-dirigiste’ turn. We reconstruct the evolution of EU industrial policy through the lens of Europe’s fear of falling behind, drawing not only on primary (including archival) and secondary sources, but also on original interviews and deep transfer learning applied to an original dataset of 66.548 documents. Focusing on Europe’s changing technological and geopolitical context, its coalitional underpinnings, and the role of ideational politics, we document and explain the historic shift away from market-creation and towards supranational market-direction in EU industrial policy.

  • Research Article
  • Cite Count Icon 1
  • 10.1142/s2377740020500244
Global Science and Technology Governance: Impetus, Challenges, and Prospects
  • Jan 1, 2021
  • China Quarterly of International Strategic Studies
  • Sun Haiyong

Security risks arising from accelerating technological advances have become increasingly evident as humanity now stands on the threshold of a new industrial revolution. Not only are technology-driven military reforms and technology races intensifying broader geopolitical competition among major powers, advancing frontiers of scientific inquiry such as cyberspace and outer space are also opening up new domains of potential conflict, making governance of the global commons an increasingly contentious issue. Promoting global science and technology governance to mitigate and reduce the potential security risks presented by the technological revolution has become an increasingly urgent task. However, today’s global efforts at risk control and prevention face significant challenges and constraints, including a fragmented governance architecture, an outdated power politics mentality, and inequitable distribution of technological power. To improve global science and technology governance, the international community should build an inclusive, resilient, and effective platform that is able to accommodate and reflect the interests and aspirations of both developed countries and developing nations, with a focus on addressing major risks accompanying emerging and foundational technologies like information and communications, artificial intelligence, and digital infrastructure.

  • PDF Download Icon
  • Research Article
  • 10.62097/falasifa.v14i1.1328
Authentic Evaluation in the Qur'anic Hadith Learning Students of Madrasah Tsanawiyah Nahdlatul Ulama 1 Sumberasri Banyuwangi
  • Jun 21, 2023
  • FALASIFA : Jurnal Studi Keislaman
  • Ahmad Izza Muttaqin + 1 more

This study focuses on describing the implementation of authentic evaluations in the cognitive, affective, and psychomotor domains of VII MTs NU Sumberasri students. This study uses a descriptive-qualitative approach. The subjects in this study were Al-Quran and Hadith teachers, students, and school principals. intake of research subjects or respondents using purposive sampling. The primary sources used in this study were interviews with the subject teachers of the Qur'an Hadith and students. The second primary source used by researchers is observations made in the study. Data collection instruments used include semi-structured interviews, direct observation, and documentation. The analysis technique used is qualitative data analysis, namely data reduction, data presentation, and conclusions. According to the findings of this study, the teacher evaluates the cognitive domain using written and oral tests. In the cognitive domain, the teacher conducts an assessment by observing and journaling. For the assessment of the psychomotor domain, the teacher carries out assessments with performance projects, assignments, and portfolios.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.