Abstract
In this conference proceeding’s exploration of maritime sovereignty, this paper examines the case study of China’s global fishing operations. The illegal, obscure and misdirecting methods employed by the Chinese deep-water fleet succinctly reveal numerous ways in which both the notion and application of sovereignty in the maritime domain are challenged and exploited.
| Original language | English |
|---|---|
| Title of host publication | Rethinking Sovereignty and Security at the Maritime Frontier |
| Subtitle of host publication | Pirates, Proxies, Passwords and Pipelines |
| Place of Publication | Coventry |
| Publisher | Centre for Trust, Peace and Social Relations, Coventry University |
| Pages | 35-40 |
| Number of pages | 6 |
| Publication status | Published - 5 Feb 2024 |
Funding
This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No 101029232
| Funders | Funder number |
|---|---|
| Horizon Europe | 101029232 |
Fingerprint
Dive into the research topics of 'Slipping Through the Net: Chinese Illegal Fishing, Grey-Zone Tactics, Lawfare, and Maritime Sovereignty.'. Together they form a unique fingerprint.-
Maritime Security and Sovereignty
Chapsos, I., 5 Feb 2024, Rethinking Sovereignty and Security at the Maritime Frontier : Pirates, Proxies, Passwords and Pipelines. Coventry: Centre for Trust, Peace and Social Relations, Coventry University, p. 7-10 4 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › peer-review
Open AccessFile -
Rethinking Sovereignty and Security at the Maritime Frontier: Pirates, Proxies, Passwords and Pipelines
Fenton, A. J. (Editor), 5 Feb 2024, Coventry: Centre for Trust, Peace and Social Relations, Coventry University. 50 p.Research output: Book/Report › Other report › peer-review
Open AccessFile
Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS