English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109951/140892 (78%)
Visitors : 46217451      Online Users : 1001
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/94355


    Title: 波蘭後冷戰時期的認同轉變與安全政策
    Other Titles: Identity Transformation and Policy Shifts-Poland`s Security Environment after the End of Cold War
    Authors: 楊三億
    Yang, San-Yi
    Keywords: 安全認同;認知學習;安全環境;安全政策
    Security Identity;Cognitive Learning;Security Environment;Security Policies
    Date: 2004-06
    Issue Date: 2016-05-06 16:25:28 (UTC+8)
    Abstract: 安全政策的擬定是波蘭自一九八九年「民主化」與「非共化」以後最重要的外交政策支柱,此一支柱突顯了波蘭國內政治發展與向外尋求安全的特色,並同時表現在波蘭追求安全環境時所展現的決心。從要素分析面向來看,波蘭安全政策的擬定受到以下諸面向的影響:包括關於傳統歷史文化、物質因素限制、地緣政治與經濟利益等考量。這些要素共同構成了影響波蘭安全認同的內外要項,並且經由波蘭特有的認知方式加以解讀,以及做出反應。過去關於中東歐地區安全的研究文獻多半集中在權力平衡的分析方式,本文則嘗試從波蘭安全研究的動機面向出發,企圖藉理解波蘭人對認同轉變與安全概念的變化來了解波蘭安全政策的變遷,並試圖解釋波蘭在面對環境發生變動時採取的因應之道,以及預測未來的可能發展。本文擇波蘭於一九八九年至一九九二年安全認同的轉變、加入歐盟與美歐分裂等三大主軸進行分析。本文發現,因認同轉變導致政策變遷的過程發生在波蘭民主化的轉形期與加入歐盟的過程中,但面臨「盟友間的分裂」,波蘭政府卻被迫必須在二擇一的情況下表明立場,此一「非此即彼」的政策選擇導致波蘭政府的安全政策重新向「高政治」、「硬安全」的面向擺盪,先前因為安全認同轉變所凝聚的共識暫時受到擱置,本文企望藉由觀照現實主義分析面向之餘,同時還能提供另一種新的分析方式。
    The political development of the ”democratization” and ”de-communism” processes in Poland is hallmarked by the post-Cold War collapse of East-West confrontation. For the majority of the Polish population`s collective memory, Poland is still preoccupied with survival, power, and security; moreover, the traditional security approach tied in with balance-of-power theory has its clout on post-Cold War security environment. Nevertheless, recent international security theory has tended toward multi-dimensional interpretations: including internal historical-cultural constraints, external geopolitical and cost/benefit calculation constraints, and social-psychological interpretations on security identity. These interpretations-whether they were termed extrovert and introvert security analyses--are sometimes necessitated by external circumstances, but may also be the result of endogenous factors. The author argues that security identity transformation is the primary tool for an explanation of the dynamics of Poland`s security policies after the end of Cold War. Adjustments of ends rather than means and adoption of higher-order goals characterizes complex cognitive learning, as opposed to tactical learning, which adopts more efficient means to reach the same unchanging goals. With recourse to three events: the security identity transformation from 1989 to 1992, Poland`s road to the EU and the trans-Atlantic split, the author tries to underscore the importance of Poland`s security identity.
    Relation: 問題與研究, 43(3), 49-75
    Issues & studies
    Data Type: article
    Appears in Collections:[問題與研究 TSSCI] 期刊論文

    Files in This Item:

    File Description SizeFormat
    43349.pdf1481KbAdobe PDF2339View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback