The balance of threat across the Taiwan strait: A game theoretical analysis

被引:0
作者
Chengqiu Wu
机构
[1] State University,the School of Public and International Affairs at Virginia Polytechnic Institute
关键词
China; Taiwan; United States; Balance of threat; Game theory;
D O I
暂无
中图分类号
学科分类号
摘要
Based on Stephen Walt’s balance-of-threat theory, this article models the interactions among the United States, Taiwan, and mainland China in a three-stage sequential game of complete information, and the interactions between Taiwan and mainland China without the U.S. commitment to defend Taiwan in a two-stage sequential game of complete information, respectively. By comparing the equilibria of these two games, this article explores theoretically the U.S. role in constructing the balance of threat across the Taiwan Strait. Furthermore, based on the scenarios yielded by the three-stage sequential game, this article narrates the evolution of security situation across the Taiwan Strait and how the United States has been maintaining the balance of threat in that area. In conclusion, this article speculates on the future of cross-Strait relations.
引用
收藏
页码:43 / 76
页数:33
相关论文
共 50 条
[31]   Game Theoretical Analysis on Encrypted Cloud Data Deduplication [J].
Liang, Xueqin ;
Yan, Zheng ;
Chen, Xiaofeng ;
Yang, Laurence T. ;
Lou, Wenjing ;
Hou, Y. Thomas .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) :5778-5789
[32]   Enabling Game-Theoretical Analysis of Social Rules [J].
Montes, Nieves ;
Osman, Nardine ;
Sierra, Carles .
ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2021, 339 :90-99
[33]   A game theoretical analysis of sexually transmitted disease epidemics [J].
Schroeder, KD ;
Rojas, FG .
RATIONALITY AND SOCIETY, 2002, 14 (03) :353-383
[34]   Game Theoretical Analysis on System Adoption and Acceptance: A Review [J].
Liang, Xueqin ;
Yan, Zheng ;
Zhang, Peng .
SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 :155-167
[35]   Theoretical Analysis in the Green-credit Policy Game [J].
Duan, Jin ;
Wu, Bin .
2011 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SYSTEMS SCIENCE AND ENGINEERING (ICESSE 2011), VOL 3, 2011, :189-195
[36]   A study of insider threat in nuclear security analysis using game theoretic modeling [J].
Kim, Kyo-Nam ;
Yim, Man-Sung ;
Schneider, Erich .
ANNALS OF NUCLEAR ENERGY, 2017, 108 :301-309
[37]   A Game Theoretical Analysis of the Mating Sign Behavior in the Honey Bee [J].
Wilhelm, M. ;
Chhetri, M. ;
Rychtar, J. ;
Rueppell, O. .
BULLETIN OF MATHEMATICAL BIOLOGY, 2011, 73 (03) :626-638
[38]   Game theoretical analysis of buy-it-now price auctions [J].
Yu, Hai ;
Dang, Chuangyin ;
Wang, Shou-Yang .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2006, 5 (03) :557-581
[39]   Game theoretical analysis on efficiency improvement of international environmental cooperation [J].
Huang Huiping ;
Yang Ju .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INNOVATION & MANAGEMENT, VOLS I AND II, 2007, :2733-2737
[40]   CAPTCHA: Machine or Human Solvers? A Game-theoretical Analysis [J].
Li, Zhen ;
Liao, Qi .
2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, :18-23