334
Views
0
CrossRef citations to date
0
Altmetric
History

Untangling threat perception in international relations: an empirical analysis of threats posed by China and their implications for security discourse

, &
Article: 2335766 | Received 26 Jun 2023, Accepted 23 Mar 2024, Published online: 12 May 2024

Abstract

In international relations, the concept of ‘threat perception’ is the key focus in research on war, deterrence, coercion, alliances and conflict. Although detecting and measuring the concept of threat is challenging, this field of study has become increasingly critical. To represent the intangible ‘threat notion’ more tangibly, this article selects ‘China Threat’ as the security reference object, merging constructivist and Copenhagen School principles of ‘Identity,’ ‘Power,’ and ‘Intention.’ This forms the basis for constructing questionnaires. An experimental observation and questionnaire survey was conducted on master’s and doctoral students from the Republic of China (Taiwan) who had previously taken part in a large-scale decision-making simulation. The research applies a ‘quasi-experimental approach’ and ‘non-participant observation.’ The regression analysis reveals that the perception of the difference in ‘power’ and the perception of ‘harmful intent’ are relatively correlated and predictive of threat perception. In other words, when China’s military power and harmful intention become more assertive, the group’s threat perception increases. These correlation findings serve as an effective indicator for future research and measurement of ‘perceived strength of enemy threat,’ strengthening awareness of enemy threats within the group by addressing textual issues and the establishing the logic of securitization discourse.

Questions about security cannot be separated from the most fundamental questions of political theory.

- Walker (Citation1997, p. 3)

Introduction

The two World Wars of the twentieth century inflicted permanent global scars on many countries and people. To avoid such conflicts and losses, academics in the discipline of International Relations began to focus on how nations responded to external and internal threats, developing a study of global security after the war. During the Cold War, Security Studies were primarily concerned with national security and threats from outside the country at a military level. Conflicts and wars are the topics at hand. What are these threats? What is security exactly? Who determines or releases them, and where do they originate?

Realism concerns itself with power, and especially this striving for power-political advantage, put states at odds with each other, and the power struggle is a significant source of conflict in and of itself (Trachtenberg, Citation2003, p. 156); classical realists, such as Carr, and Morgenthau and offensive realists share the assumption that states seek to maximize power – that states are relentless seekers of power and influence (Zakaria, Citation1998, p. 19). For offensive realists, states maximize military power, influence, and wealth to become more secure in a world of anarchy, and the best way for a state to increase its odds of survival is to become the most potent state; their primary focus is on the causes of threats and how to respond to them (Lobell, Citation2017, p. 2). Neo-realism and neo-liberalism have traditionally focused on the security of state Centrism (Chatterjee, Citation2003, pp. 125–126). Regarding International Relations, they highlighted that countries would protect themselves at any cost if national security or interests were challenged. Therefore, it was difficult for them to move away from their own power and military methods. Most studies have concentrated on effective deterrence, weapons control and strategic relations between nations within the International System (Booth, Citation2007, p. 96).

Following the Cold War, the international community transitioned to a multipolar structure. The Copenhagen School broadened the origins and targets of threats, while also including regional security analyses. The Speech Act Theory in linguistic theory was used in the Epistemology and Methodology. The core of security analysis uses discourse to develop and place threat problems on the political agenda for acceptance by key political players. Consequently, rather than being an objective phrase, security is a subjective, self-referential behavior of the elite (Booth, Citation2007, p. 108). Furthermore, the Securitization method of viewing situations as threats from a specific group differs from the threat analysis of the Copenhagen School. It provides a distinct analytical framework for securitization issues (Buzan & Hansen, Citation2009, p. 36). This approach is commonly used to study health, cross-national crimes and international institutions. Considering the Copenhagen School’s Securitization Theory is founded on Austin’s speech-act theory, the primary emphasis is on the function of language.

Speech-act theory is not limited to the creation of linguistic structures. It considers non-verbal communicative situations, but Austin focuses on the relationship between language and actions (concerning words as ‘performatives’), where certain statements can describe a given fact and some practical actions. According to Ole Waver, actors can grasp the social situation in which they find themselves through speech and, more crucially, demonstrate an intentional attitude toward existing systems. Hence, language plays an integral role in the securitization process, and the effectiveness of securitization depends on the persuasiveness of the discourse (Collins, Citation2016a, Citation2016b, p. 172). Floyd defined securitization theory as follows: Securitization equals Security Measures (Discourse and Action) and Security Practices (Emergency Measures; Lo, Citation2015, p. 63).

Moreover, survival is a concern of security studies in the conventional subject of International Relations because of the ‘existential danger’ posed to the addressee – a threat whose uniqueness allows nations to use security as a pretext to justify using force. Consequently, security is a tool for transcending political rules and systems. Securitization is an extreme kind of ‘politicization.’ Special abilities and opportunities are accessible when securitization utilizes the rhetoric of existential danger. Consequently, the presence of existential danger justifies securitization to obtain control and possibilities by violating traditional standards. This implies that when an event occurs, actors’ views shift from ‘issue-based to politicized to securitized,’ depending on the many underlying components.

In recent years, the People’s Liberation Army (PLA) has dispatched military aircraft and warships to circumnavigate the Taiwan Strait, conducting military exercises against Taiwan on many occasions. However, members within Taiwan hold different views on this ‘existential threat.’ According to the survey on ‘Taiwan Public Opinion in the Cross-Strait Military Crisis’ conducted by the Taiwan Public Opinion Foundation in November 2021, only 28.1% of the respondents agreed that ‘China will attack Taiwan with force sooner or later.’ This indicates that the majority of the people do not believe that China will attack Taiwan with force. Despite China frequently taking alarming military actions against Taiwan, many people still believe that there will be no conflict or war between the two sides of the Taiwan Strait (Taiwanese Public Opinion Foundation, Citation2021). These results illustrate that different groups harbor varying perceptions of external threats, explaining the ambiguity and unpredictability of security content.

As security status is directly tied to threat perception, Rousseau discovered that elements such as Shared Identity and Power have varying effects on Threat-perception (Rousseau & Garcia Retamero, Citation2007, p. 744). Threat perception is also affected by an opponent’s intention. Singer presented a quasi-numerical threat assessment model in which threat perception = capacity × intention (Salmon & Imber, Citation2000, p. 55). This model stresses the relationship between a possible adversary’s weapon system and military-level capabilities, and their proclivity to utilize these capabilities to affect us. Some researchers claim that ‘Culture’ is essential in forming ‘Identity’ and has a solid instrumental tendency – various cultures project ideals to the outside world (Ding-Guo, Citation2004, pp. 140–141). For example, David L. Rousseau deconstructed the link between institutional structures and political norms in international debates using statistical analyses, historical case studies and laboratory research (Rousseau & Garcia Retamero, 2007, p. 766).

The Copenhagen School focuses on a regional level of analysis and explores the security generated by state interactions. Simultaneously, Securitization Theory emphasizes that the formation of security issues depends on how they are presented and the degree to which they are accepted. Therefore, securitization focuses on the discourse of ‘existential threats’ and the formation of substantive policies through political discourse, also known as the ‘speech-act’ securitization move.

In recent years, owing to the rapid growth of China’s national power, the ‘China threat theory’ has become an issue of global concern and has gradually influenced the foreign policy direction of countries around the world toward China. In Taiwan, since China has never announced that it would give up military aggression against Taiwan, one can often read newspaper headlines, such as ‘China military drills pose a serious threat to Taiwan’s national security,’ ‘China hegemony threatens Taiwan’s security,’ and ‘China’s disinformation attempts to undermine the core values of democracy,’ etc. However, whether or not these ‘existential threats’ constructed by discourses can effectively persuade the public or the political elites of different political parties or factions is related to the issue of ‘Threat perception,’ which is an unmentioned part of the ‘Securitization Theory.’ This part is not mentioned in the ‘Securitization Theory’ and has not been analyzed in domestic studies; therefore, it needs to be further discussed.

Hence, this study captures the perspectives of constructivism and realism on the source of threats through theoretical exploration and conducts empirical analyses using questionnaire surveys and experimental methods to understand the level of threat perception of China among audiences, with the hope of grasping the key factors affecting threat perception. This will not only fill in the limits and deficiencies of individual theories but also provide a cross-theoretical dialogue in the field of security research. In addition to compensating for the limitations and deficiencies of individual theories and providing a cross-theoretical dialogue in the field of security studies, the findings of this study will serve as a reference for security actors to apply to security referent objects in terms of the topic level, use of language, strength of wording and choice of policies to enhance the persuasive power of the securitization discourse.

The connotation and definition of the concept of threat

In the social sciences, security refers to the national capacity to protect a country’s internal values and keep it safe from threats. Humans require security in order to survive. It is vital to be free of harm, including unseen threats, intimidation and violence (Heywood, Citation2018, p. 298). However, it is evident that the abstract concept of security needs to be revised and contentious, and that it is impossible to define it objectively in political science (Smith, Citation2005, pp. 27–28). It is also true for the relative nature of ‘threat.’ To that end, we investigate the four dimensions of ‘security research and threat definition,’ ‘threat construct analysis,’ ‘threat construction perspective in security theory,’ and ‘the influences of Identity, Power, and Intention on Threat perception.’

Security research and threat definition

Security and threats are two distinct, opposing ideas. Individuals’ emotions and deeply ingrained ideals are reflected in their sense of security (Kolodziej, Citation2018, p. 7). Any survival issue was considered a security issue. Collins presented classic scholarly definitions of ‘security’ in Contemporary Security Studies (Collins, Citation2016a, Citation2016b, p. 3).

For national security, a threat is an act or series of events that first threatens lives drastically and degrade people’s quality of life in a brief period. Second, it is a substantial threat forcing a national government or a domestic private, nongovernmental entity (individual, group, or corporation) to narrow their choices of policies. (Ullman, Citation1983, p. 133)

Dr. Mo argued that security was initially undefined. Scholars define security as a goal, objective or protection against external threats and objective values (Da-Hua, Citation1998, pp. 20–22). Dr. Chen also thinks most security experts viewed it as ‘being free from threats (Chen, Citation2009, p.103).’ Thus, it can be found that security research focuses on ‘threats’ and the ability to respond to and recognize threats.

Dimensional analysis of threats

In security studies, a threat is both a component and an indicator of security. What are its components? ‘Security dilemma’ studies have focused on military challenges faced by governments (Collins, Citation2016a, Citation2016b, p. 225). After the Cold War, the total country power, military development, equipment and GDP did not apply to all threats. Thus, the threat interpretation is biased. Buzan notes that no political event, material force or academic theory explains the evolution of security studies (Buzan & Hansen, Citation2011, p. 6). Hence, this study attempts to obtain different and feasible complementary perspectives from various theories as essential indicators for measuring threats.

Threat construction from a realist perspective

International Relations Theories often evaluate a country’s ‘power’ by population and geographical size, resources, economic capacity, military strength and political stability; however, different Schools of Realism view power differently. Classical Realists view a nation’s power struggles as a human nature. They argue that power is both a means and an end for the nation and that a balance of power is essential to the international order (Morgenthau & Thompson, Citation1985, p. 187). Unlike traditional realism, neo-realism (or Structural Realism) maintains that foreign and domestic systems fundamentally differ. The domestic political systems are hierarchical. Unit equivalence underpins international politics. Thus, international regulatory power is limited to national domains (Waltz, Citation1979, pp. 81–93). The threat is ‘the ability or intention of one actor or group to impose any negative situation on another actor or group.’ Both classical and structural realists argue that the perception of threat by a group depends on the asymmetric power function between actors (Garcia-Retamero et al., Citation2012, pp. 179–180).

Threats occur when an individual or group negatively impacts another person. Classical and structural realist theorists have stated that power asymmetry affects group danger. In an international system, the weaker party fears being exploited and the stronger party fears being intimidated by subsequent powers and in fringing on its interests. Such a theoretical proposition is the first possible explanation for the ‘threat perception’ in this study.

Constructivist perspectives on threat construction

The Soviet Union imploded unexpectedly during the early 1990s. People have questioned the inadequacy of standard theories in foreseeing the Cold War’s evolution after 40 years. Since then, it has steadily evolved into a prominent research avenue in International Relations theory and politics (Da-Hua, Citation2003, p. 72). Constructivism holds that our knowledge of the universe is not objective and is built only on our shared understanding from a specific perspective (Collins, Citation2016a, Citation2016b, p. 131). According to Alexander Wendt, the three points of ‘enter the constructive relationship between agents and structures,’ are essential positions of Constructivism, making it a realistic approach to studying International Relations and security. This applies the concept of constructive thinking to the supplied concept of rationalism (Wendt, Citation1987, pp. 355–361).

In defining ‘identity,’ the subject understands and affirms oneself, and the interaction between actors and systems creates collective self-interest. As a result, the ‘collective societal identity’ emerges. In summary, constructivism offers a nonmaterialistic explanation for establishing the identity and origins of threat perceptions.

Threat construction of instrumentalization orientation

War, deterrence, coercion, alliances and conflicts in international relations revolve around threat perception and military capabilities. When intention is proposed as a military threat, detecting signals and verifying intent are the biggest issues in threat assessment and analysis (Huddy et al., Citation2013, p. 2). States’ early threat assessments conceal their objectives from their opponents out of self-interest (Rosato, Citation2015, p. 48). Constructivism, like Realism, academically, recognizes that states are unable to grasp the possible intentions of the opponent (Schuurman & Eijkman, Citation2015, p. 215).

However, constructivism fosters shared perceptions and behavioral practices, arguing that knowing the intents of others in actor interactions can lead to a greater understanding of each other, minimizing ambiguity and altering threat perceptions. Intentions are a part of unfinished actions; therefore, defining aggressive or offensive intent is difficult. Researchers use ‘Indicators’ to clarify words, behaviors and signs to improve prediction. Markers of aggressive goals may explain competing threat perceptions.

Hybrid analysis framework

The new realism paradigm, famed for its nuclear deterrence and defense–offense balance, was steadily questioned after the Cold War (Dannreuther, Citation2013, p. 43). The Constructivist movement challenged concepts, such as anarchy, sovereignty and the inability of war. According to Wendt, anarchy is a subjective status established by countries via interaction, mutual perception and understanding, allowing the field of security studies in International Relations to shift gradually (Wendt, Citation1992, p. 391).

International relations have a branch called ‘security studies.’ The changes brought about by the Cold War caused security studies to transcend existing traditions, giving rise to new ideas and views. The Copenhagen School, which includes European scholars, such as Ole Waever and Jaap de Wilde, and the Copenhagen Peace Research Institute (COPRI) have proposed the concepts of ‘Securitization’ and ‘De-securitization,’ arguing that the existence of the security issue is the result of policymakers’ escalation and expansion of ‘threats’ (Chang-Ching, Citation2019, p. 32). Politicization that functions in a ‘Speech-Act’ paradigm is described as securitization. Declaring ‘existential threats,’ taking ‘emergency action,’ and ‘disrupting established threats’ constitute successful securitization. Three steps are required for successful securitization: ‘declaring existential threats,’ ‘performing emergency action,’ and ‘breaking the established norms to influence the relationship of internal units’ that allow ‘Threats’ to be accepted or understood through discourse (Buzan et al., Citation1998, pp. 23–31).

Furthermore, to understand how threat perceptions are formed and influence policy actions, this study draws on constructivism’s emphasis on identity and philosophy, which may generate varying levels of threat perceptions and hostility toward external groups when differentiating themselves from others. The emphasis on group threat perceptions in realism is based on ‘power asymmetry functions.’ International security and conflict studies identify adversaries’ or foes’ aggressive intentions using indicators. We investigated the relationship between security discourse and identity, power inequalities, and goals through experimental and observational studies of the content of each linguistic aspect of the text by merging the views above into a ‘complex analytical framework.’

Hypothesis: identity, power and intention influence threat perception

The concept of threat is often utilized in numerous disciplines or levels of description. Although it appears impartial and objective, it is not convincing when we dig further into the concept. Therefore, this study explores the process and context of its formation. Second, after the unexpected collapse of the Soviet Union, International Relations shifted from forecasting to describing the status quo. However, the rise of constructivism brought a new viewpoint to many issues in International Relations, especially security studies, after the Cold War (Da-Hua, Citation2002, pp. 303–323).

In particular, constructivism places a premium on interpretive relationships. It investigates the role of human consciousness in international relations, given that awareness shapes the words and acts of both human and government actors. Understanding and analyzing their relationships might reveal the motivations underlying their words and behaviors (Da-Hua, Citation2006, pp. 74). The primary focus of this research is the extent to which actors perceive threats as a result of ‘identity/similarity,’ ‘power difference degree,’ and ‘harmful Intention-Perception degree.’

In March 2019, Chinese warplanes crossed the centerline of the Taiwan Strait for the first time in 20 years. In May 2021, the British magazine The Economist described Taiwan as The Most Dangerous Place on Earth (The Economist, Citation2021), and since 2020 the PLA has increased the scale and frequency of military aircraft and warships harassing Taiwan. In addition, the Chinese Communist Party (CCP) launched military exercises around Taiwan in August 2022 in retaliation for the visit of the U.S. Speaker of the House of Representatives Nancy Pelosi to Taiwan, leading to the outbreak of the so-called ‘Fourth Taiwan Strait Crisis’ and in recent years, with the continuous increase of China’s military operations and gray-zone conflict attacks on Taiwan.

How do Taiwanese people perceive China as a looming threat? How do Taiwanese people perceive the looming threat from China, and how do they react to military threats from China? The design of this study centers on Taiwan’s current dilemma of being threatened by ‘China’ and uses four analytic categories: identity level, power perception, intention perception and threat perception. ‘Perception’ and ‘Threat- Perception’ assume that they are linear relationships for analysis; after the literature and theoretical discussions, the research hypotheses were further developed ().

Figure 1. Conceptual diagram of the developing. Source: Author.

Figure 1. Conceptual diagram of the developing. Source: Author.

Many previous studies have confirmed that ‘identification’ is an essential component of group formation; the people concerned share a perception of the same external ‘others’ as threats (Matonytė & Morkevičius, Citation2013, p. 53), and that a positive intergroup encounter improves intergroup attitudes and behaviors (Bagci et al., Citation2018, p. 3); since Taiwan and China have similar historical backgrounds and cultural traditions, but now belong to different political systems (democracy and authoritarianism), do the related identity differences affect Taiwanese people’s perceived threat from China? This study hypothesizes that the difference between the two systems will affect the threat perception of Taiwanese people toward China. Therefore, Hypothesis 1 was that the higher the identification of Taiwanese people toward China, the lower the threat perception toward China and vice versa.

Second, a country’s Power Index is often measured by a variety of criteria, such as the number of military units, workforce, resources and financial situation, and is often seen as an essential tool for achieving national political and diplomatic objectives (Slantchev, Citation2011, p. 65), and of course, as a specific indicator of threat. After China rolled out its military reform plan in 2015, it began conducting frequent military drills around Taiwan, including live drills, such as joint beachhead exercises, joint air and sea drills and large-scale joint military exercises. The Presidential Office of the Republic of China (Taiwan) has stated that the China has never renounced the use of force against Taiwan and that it is the greatest security threat to democratic Taiwan (Lu, Citation2023), but whether the official threat definition of the China also affects the threat perceptions of the public in general remains to be seen, hence, this study aimed to investigate whether the ‘public’s perception of the threat from China’ is affected by other variables, with the second assumption being that the ‘power perceptions’ of the respondents are changed. The second hypothesis is that by changing the ‘power perception’ of the respondents, the ‘threat perception’ can be changed.

Finally, threat perception is central to the theories of war, deterrence, alliances and conflict resolution. The serious consideration of intention as a source of threat independent of military capabilities (Stein, Citation2013, p. 1) and the rapid growth of China’s national power in recent years, the modernization of its military and the rate of increase in its armaments have prompted the U.S. to file key official reports over the years on its military capabilities. It has also prompted the United States to define China in major official reports over the years as ‘the only competitor with both the intent to reshape the international order and, increasingly, the economic, diplomatic, military, and technological power of the United States.’ ‘Diplomatic, military, and technological power to advance that objective’ (Liptak, Citation2021) and the CCP’s aggressive intentions toward Taiwan are clearly revealed in many official documents, therefore this study assumes that the ‘enemy’s intention to attack,’ also affects the level of threat perception, while ‘identity level,’ ‘power perception,’ ‘intention perception,’ and ‘threat perception’ are the most important. Therefore, the final hypothesis of this study states that there is a correlation between ‘identity level,’ ‘power perception,’ ‘intention perception’ and ‘threat perception’ ().

Figure 2. A research framework. Source: Author.

Figure 2. A research framework. Source: Author.

In summary, the hypotheses of the study are based on the effects of the developed experimental text on the subjects’ danger perceptions under the categories of ‘external structural environment’ and ‘internal factors.’ As a result, three major hypotheses are proposed: (as shown in ).

  • Hypothesis 1 (H1): The numerous factors of ‘threat perception’ vary significantly across respondents from different backgrounds

  • Hypothesis 1–1 (H1-1): Local respondents experience danger perception factors more strongly than international respondents.

  • Hypothesis 1–2 (H1-2): Military personnel have a stronger perception of threat than other respondents.

  • Hypothesis 2 (H2): Participants’ danger perceptions are influenced by their reading of the experimental text (Quantitative/Qualitative analysis)

  • Hypothesis 3 (H3): There are correlations between identity level, power perception, intention perception and threat perception

  • Hypothesis 3–1(H3-1): Positive correlations exist among identity level, power perception, intention perception and threat perception.

  • Hypothesis 3–2(H3-2): Threat perception can be predicted by identity level, power and intention.

Research limitation and suggestion

This study focused on the sources of threats from different theories. It incorporated the analytical framework of securitization theory, integrating quantitative and implementation research methods better to understand the nature and components of ‘existential threats.’ However, owing to the researcher’s resources and time, the following limitations were encountered:

Limitation and suggestion #1: Problems of sampling method and inference

In this study, 80 master’s and doctoral students from the politics and international relations departments were invited to participate in the decision-making activities. However, this sampling method limits the scope of inference of the results. However, this sampling method may also limit the scope of the inferences. In the future, provided that there are sufficient funds for the study, it is suggested that future researchers commission a large-scale telephone or internet survey to improve the accuracy and reliability of the study and gradually improve the inferences.

Limitation and suggestion #2: the experimental environment is characterized by several interfering factors

Through a questionnaire survey and thesis analysis, this study explored the key factors that may affect threat perception and simulated how political elites may secure the threat and take corresponding foreign policy actions during the decision-making process. However, there are still many interfering factors in the actual experimental environment, which invalidates some of the research hypotheses. Based on this study, future researchers can further revise the research hypotheses, exclude other possible interfering factors, differentiate between political elites and the general public, measure sources of threat perceptions, and revise the model to make the study more convincing.

Research methods and implementation

A quasi-experimental method and non-participant observation were used to measure and explore the interrelationships between threat perception concept formation and identity, power differences and intentions to determine whether the securitization framework influenced actors to transform their perceptions of China into threat perceptions.

Experimental method

Experimentation measures the causal relationships between variables by manipulating one or more variables and controlling for the research environment. Therefore, the participants must be homogeneous to ensure accuracy and precision of the research. Therefore, this study was conducted in cooperation with the National Defense University (Taiwan). Therefore, in order to coordinate with the annual ‘Cross-National Decision-Making Simulation Training’ academic activity of the National Defense University, this study invited a total of 80 master’s degree and doctoral degree students from Taiwan and other countries who are studying in Taiwan in the fields of international relations and strategic studies to participate in the experiment using intention sampling. Eighty graduate students were randomly and proportionally divided into eight groups, using a matching method. This sampling strategy ensured that each group of participants had similar origins, backgrounds and ages, thereby eliminating the possibility of systematic bias. According to the research design, these eight groups were separated into two parts, the ‘control group’ and the ‘experimental group.’ The control group comprises Group-China, Group-International, Group 3-Republic of China (Taiwan) #3 and Group 5-Republic of China (Taiwan) #5. The experimental group consists of Group-USA, Group 1-Republic of China (Taiwan) #1, Group 2-Republic of China (Taiwan) #2 and Group 4-Republic of China (Taiwan) #4.

Furthermore, variables were changed during the experiment in a ‘Between-subject design,’ allowing different participants to receive alternative experimental arrangements to eliminate the maturation effect, instrumental effect and other external interfering variables. The questionnaire was designed using a model constructed by Rousseau, an international relations scholar, in a 2006 study and was further developed using four dimensions, including ‘identity, power perception, intention, and threat perception.’ Participants were asked to rate the content of the questionnaire on a scale of 1 (strongly disagree) to 5 (strongly agree).

To ensure the reliability and validity of the questionnaire, after the design was completed, ten people were selected by intentional sampling to implement the ‘pretest,’ and the ‘method of internal consistency reliability’ was used to implement the item analysis as the basis for the formal questionnaire development. In , only the t-values of ‘A4,’ ‘A11’ and ‘A18’ did not reach the significant level (p < 0.05) and were deleted, while all other questions reached the significant level. The ‘t-value’ of ‘A4,’ ‘A11’ and ‘A18’ did not satisfy the significance level (p < 0.05) after assessing the pretest results, so these three questions were deleted. All other questions were significant. For the design of the "post-test" questionnaire, the methodology employed mirrored that of the initial testing phase. Upon completion of a comprehensive analysis involving all participants, the t-values for each of the 20 items were found to be statistically significant (p < .05). Consequently, all items were retained in the "post-test" questionnaire, as detailed in .

Table 1. Pre-test summary of threat-perception.

This study’s questions were divided into two categories: ‘Categorization Questions’ and ‘Sequential Questions.’ The background variables of the participants are the Category Questions, and the Sequential Questions are the questions of ‘identity level, power perception, intention perception, and threat perception.’ The five-point Likert scoring method was used. Cronbach’s alpha was used to ensure the legitimacy and trustworthiness of the questions. According to Guilford, it is extremely trustworthy when > 0.7, medium credible when between 0.7 and 0.35, and acceptable when greater than 0.3 (Guilford, Citation1965, pp. 3–8).

As a result, a validity analysis was performed on the ten returned pretest questionnaires, and the overall value was 0.955. A closer look at the values of each dimension revealed that the identity level was 0.878, power perception was 0.838, intention perception was 0.897 and threat perception was 0.855. As shown in , the credibility of these queries is very high.

Table 2. Post-test summary of threat-perception.

Table 3. Cronbach’s α coefficients of the pre-test for threat-perception.

Second, the Kaiser–Meyer–Olkin (KMO) and Bartlett Test of Sphericity were conducted. KMO is an index for comparing the simple and partial correlation coefficients among the variables; the larger the KMO value, the more common the factors are among the variables, and the more suitable it is to carry out factor analysis. Bartlett Test of Sphericity was performed using the chi-squared test. If significant, there is a significant correlation between the variables, and factor analysis can be conducted. After analysis, the KMO of the pretest questionnaires was 0.846 which proved that the analysis was feasible, and the value of Bartlett’s Test of Sphericity was 2100.262, with significance = 0.000 = 0.01, which showed that the questionnaire data of the pretest questionnaires were suitable for factor analysis and passed validation.

Each dimension’s variance was 69.37% for ‘approval level,’ 73.25% for ‘power-perception,’ 74.69% for ‘intention- perception’ and 70.36% for ‘threat-perception’ (see ). Following the validity test, the pretest and posttest questionnaires were finalized with 27 and 20 questions, respectively, to constitute the official questionnaire.

Each element was investigated using a quasi-experimental grouping method. Following the first round of questions, two major groups (four experimental and four control groups) began the simulation. The experimental groups were given one of three predesigned contextual texts. The test was performed prior to the conclusion of the simulation activity to examine the change in threat perceptions of the different groups. The experimental design is shown in . Following administration of the questionnaire, the data were coded and analyzed using SPSS statistical analysis software. The hypotheses were examined using descriptive statistics, Test of Independence, t-test, one-way ANOVA, Pearson’s correlation and ANCOVA.

Table 4. Quasi-experimental design table.

Observational method

Another important validation method used in this study was nonparticipant observation. We assigned scorers to function as ‘observers.’ Without participating in the training group, we collected data on subjects’ threat perception alterations and decision-making behaviors under various experimental scenarios. These data were examined to see if there were any changes in the dimensions of ‘identity level,’ ‘power perception,’ ‘intention perception’ and ‘threat perception’ following the experimental arrangement (reading the text), and if so, whether these changes resulted in variations in their simulated foreign policy decisions.

This scenario is predicated on the fact that countries in the Indo-Pacific region confront strategic competition from the United States and China. This competition impacted diplomacy, military affairs, the economy, and trade to varying degrees. As the United States and China entered a period of strategic competition, the United States’ stance toward China rapidly shifted, marking the most profound and far-reaching shift in the international environment since the Cold War. During the preparatory stage, experts and scholars in the domains of International Relations and military affairs were invited to examine the event’s processes, issues and design to develop the six scenarios for this study.

The reading materials were obtained from trustworthy Chinese and international media and periodicals. They were correctly revised based on news facts without changing the location of the reports’ content, implying explicit signals, such as ‘different political systems (autocracy/democracy),’ ‘power differences (military development)’ and ‘intentions (military exercises).’ The first piece was an excerpt from BBC NEWS titled ‘Different Political Systems.’ This shows how China is increasing its grip on speech and is eventually controlling people’s beliefs and behaviors through various auditing procedures. The second piece, ‘Differences Between Powers,’ was published in November 2020 and based on the United States’ ‘China’s Military Power Report.’ This indicates that China’s PLA currently boasts of the world’s largest naval fleet and has surpassed the United States in terms of land-based missiles and integrated air defense systems. The final piece, ‘Differences Between Powers,’ is taken from BBC NEWS and focuses on the ‘most dangerous period’ for the PLA to attack Taiwan from 2020 to 2030 (see Annexes 1–3).

Participants in the simulated decision-making activity were considered as the observation group. Participants in this exercise replicated the decision-making and discourse-releasing processes by role-playing as top national security decision-makers. This simulation represents the interaction and reaction between countries. The World Event Interaction Survey (WEIS) produced by McClelland and the WEIS-Goldstein Scale developed by Goldstein (Citation1992, pp. 369–385) were used to study the semantic conflict and cooperation of decision-making groups.

Each group observed the decision-making strategy, discussion substance, decision-making process and practicality of the plans. Following the observation, they assigned the ‘Conflict/Cooperation Index’ based on the WEIS-Goldstein Scale in order to undertake a further qualitative analysis of ‘threat-perception’ versus ‘decision-making.’ The observers received basic training one week before the simulation activity to consistently analyze the observed indicators collected by the observers and collect qualitative data objectively from the simulation activity. The training emphasizes stimulating activity management, procedures, reading materials, surveys and observational records.

Statistical validation of the China threat-perception questionnaire

After reviewing the obtained questions, invalid questionnaires, such as those with missing items, were filtered out, leaving 66 valid questionnaires. The vast majority of responses (63.6%) were from men. Most respondents (92.4%) held master’s degrees. Most respondents (69.7%) had yet to gain managerial experience. None (including students) accounted for 60.6% of all occupations. contains the pertinent information.

Table 5. Basic data of research subjects (n = 66).

Analysis of the current situation of the threat-perception questionnaire

Significant differences were observed in the various components of threat perception among subjects with different backgrounds.

t-Test for each element in threat-perception: locals versus foreigners

In this study, the construct of ‘threat perception’ can be divided into three dimensions: level of identity, power perception and intention perception. A five-point scale was used in the survey, with one indicating ‘strongly disagree’ and five indicating ‘‘strongly agree.’ The mean and standard deviation are used to illustrate the general situation of the three dimensions of perceived threat: level of identification, perception of power and perception of intention. t-Tests were conducted on the three threat perception facets separately, and the results showed that the ‘power perception’ of native speakers was much higher than that of foreigners. In contrast, there is no significant difference in ‘identity level’ and ‘intention perception.’ The results are summarized in .

Table 6. Independent variable t-tests for each dimension of developing threats: Taiwanese versus foreigners (n = 66).

Independent t-test for each component in threat-perception: Military personnel versus others

The t-test was used to analyze the differences in the three dimensions of threat perception, that is ‘identity level,’ ‘power perception’ and ‘intention perception,’ between military personnel and other respondents from different occupational groups. The study found that there is a difference in the construct of ‘power perception’ between the local and the foreign respondents who reached a significant level, the scales of domestic respondents were significantly higher than that of the foreigners. presents the results of the study.

Table 7. Independent variables t-tests for each dimension of developing threat – Military Personnel versus others (n = 66).

Threat-perception of subject is influenced after reading securitization reading text

The first phase of this hypothesis was to assess the effects of reading the text on threat perception using a dependent t-test. Identity, power perception and intention perception pre- and post-test scores were independent variables. The pre-test and post-test danger perception ratings were the dependent variables. Second, to rule out variations in the pre- test between the two groups, as well as influences on the post-test, a one-way ANOVA was used to compare the two groups in terms of altering dimensions. The independent variable was the group, the covariate was the pre-test score, and the dependent variable was the post-test score.

t-Test: pre-test and post-test of the experimental and controlled groups

The experimental group’s pre-test and post-test scores differed significantly (t = −3.18, df = 35, p = 0.003.01), and the pre-test scores (3.21) differed from the post-test scores (3.43). Significant variations were also identified between the pre- and post-test scores of the control group (t = −4.34, df = 29, p = 0.000.001) and the pre-test (3.34) differed from the post-test (3.59). The preceding data revealed that after the simulation, the difference between the pre- and post-test scores was significant. presents the results of the study.

Table 8. Paired samples t-test after accepting experimental inputs (n = 66).

The identity level and intention perception pre-test and post-test scores showed significant variations. Identity: t = −2.66, df = 35, p = 0.012.05, t = −2.07, df = 35, p = 0.046.05, intention perception t = −2.07, df = 35, p = 0.046.05. There were no significant differences between the experimental group’s pre-test (identity level: 1.84 and intention perception: 3.85) and post-test (identity level: 2.08 and intention perception: 4.22). The difference in power perception ratings between the pre-test and post-test was not significant (t = −0.48, df = 35, p = 0.637 > 0.05), and the pre-test score (3.93) differed from the post-test score (3.97). The results demonstrate that variations in identity level and intention perception were substantial but that for power perception was not.

The differences in the identity level and intention perception scores between the pre-test and post-test for the control group were also significant (Identity Level: t = −3.82, df = 29, p =.001.001; intention perception: t = −2.35, df = 29, p = 0.026.05). The pre-test (identity level: 1.90 and intention perception: 3.83) and post-test (identity level: 2.19, intention perception: 4.20) scores differed. Power perception pre-test and post-test scores did not differ significantly (t = −0.81, df = 29, p = 0.423 > 0.05), and the difference between the pre-test and post-test scores (4.31) was modest. The aforementioned findings reveal that variations in identity level and intention perception were substantial but that for power perception was not. presents the results of the study.

Table 9. Paired samples t-test after accepting experimental inputs – three dimension (n = 66).

One-way ANCOVA

Descriptive statistics – experimental and control groups

The questionnaire contained 27 questions, including 11 on identity level, four on power perception and 12 on intention perception. Threat perception was graded on a 5-point scale: Serious Threat, Threat, No Opinion, No Threat and Completely No Threat, with scores ranging from 5 to 1. shows that the experimental group’s average pre-test score was lower than that of the control group (1.84 1.90). The experimental group’s average pre-test score on power perception was lower than that of the control group (3.93 4.31). The experimental group’s average pre-test score in intention perception was higher than that of the control group’s (3.85 > 3.83). The experimental group’s total average pre-test score was lower than that of the control group (3.21 3.34). The average post-test scores of both the experimental and control groups were higher than the average pre-test scores, indicating an improvement in both groups’ perceptions across all dimensions. The questionnaire was subjected to a covariate analysis to determine whether the differences were due to the securitization text.

Table 10. Descriptive statistics analysis–pre-test and post-test of the questionnaires for each dimension versus developing threats (n = 66).

Homogeneity test – internal regression analysis

demonstrates that the Levene test of variances yields p = 0.389 > 0.05 for identity, p = 0.114 > 0.05 for power perception and p = 0.656 > 0.05 for intention perception. These figures indicate no statistically significant differences. As the Levene’s test results demonstrate the homogeneity of these dimensions, a regression analysis within the group may be used.

Table 11. Levene test: the questionnaires for each dimension versus developing threat (n = 66).

shows the homogeneity test findings for the regression coefficients (group pre-test) F = 0.001, p = 0.978 > 0.05 for the experimental and control groups’ pre-test and post-test on identity level. For power perception, the homogeneity test for the regression coefficients (group pre-test) was F = 0.150, p = 0.700 > 0.05. The homogeneity test for the regression coefficients of intention perception (group pre-test) was F = 0.234, p = 0.630 > 0.05.

Table 12. Intra-group homogeneity test: the questionnaires for each dimension versus developing threat (n = 66).

The intragroup homogeneity test (group pre-test) yielded F = 0.234, p = 0.630 > 0.05. The three aforementioned dimensions showed significant differences, indicating that there was no significant interaction between the two groups’ pre-test and post-test data. The experimental and control groups satisfied the hypothesis of intragroup homogeneity of the regression coefficients and were able to continue with the covariate analysis.

One-way ANCOVA

A homogeneity test of group regression coefficients was conducted. Results were p > 0.05, indicating that there were no significant differences. These results were consistent with intragroup regression coefficient homogeneity, implying that meeting the basic requirements of covariate analysis and executing covariate analysis were achievable. As a result, the groups were employed as independent variables and pre-test outcomes as covariates. The results are summarized in .

Table 13. ANCOVA: the questionnaires of controlled groups for each dimension versus developing threat (n = 66).

The F-value between identity level groups was 0.311 (p = 0.579 > 0.05) indicating that the difference was inconsequential, as shown in . The F-value between the power perception groups was 1.163 (p = 0.285 > 0.05), indicating that the difference was insignificant. The F-value difference between the intention and perception groups was 0.002 (p = 0.968 > 0.05), indicating that the difference was negligible. Likewise, the whole scale F-value is 0.492 (p = 0.486 > 0.05) likewise demonstrated insignificant differences. After controlling for the effects of the pre-test, no significant difference in the subjects’ post-test results was detected, despite the fact that they had read the securitization material. shows that the effect sizes for all dimensions and the total scale were less than 0.1, indicating that the experiment had a minor effect (a small effect).

Table 14. The original and adjusted mean: the questionnaires for each dimension versus developing threat (n = 66).

Table 15. Product moment correlation between identity level, power perception, intention perception and threat perception (n = 66).

To eliminate differences in the pre-tests, the pre-test scores were included as covariates alongside the original average post-test scores and the modified total average scores. The experimental and control groups’ scores changed from (3.43, 3.59) to (3.47, 3.53). This demonstrates that the experimental group’s average post-test score was comparable to that of the control group’s average post-test score. The results are presented in .

Identity level, power perception, intention perception and threat perception are related

Correlation analysis between threat perception and other dimensions

This section explains the connections between threat perception, identity level, power perception and intention perception. Pearson’s product-moment correlation coefficient was used to investigate the relationships between two variables. The correlation coefficient was used to calculate the degree of correlation between variables. The assessment criteria are as follows: r < 0.40 is deemed low correlated; 0.40 ≦ r ≦ 0.70 is considered moderately correlated; and r > 0.70 is considered highly correlated.

In this study, the correlation coefficients of the four variables – identity level, power perception, intention perception and threat perception were examined individually. shows that there is a certain degree of correlation between threat perception and intention perception (r = 0.547); second, according to the high and low values, it can be seen that the r value of 0.547 represents a ‘moderate positive correlation’ between intention perception and threat perception. The correlation coefficient between threat perception and ‘identity level’ and ‘power perception’ does not reach a significant degree. The correlation coefficients between ‘threat perception’ and ‘identity perception’ were not significant.

Table 16. Product moment correlation-power-perception versus intention-perception (n = 66).

Table 17. Actions taken by all groups in Scenario 1.

Analysis of the predictive power of ‘identity level, power perception, and intention perception’ on threat perception

In this study, the mean threat perception score was summed as the dependent variable, and stepwise regression analyses were conducted to investigate the predictive power of the three dimensions of identification, power perception and intention perception. The correlation coefficients of the three dimensions, as shown in , in descending order, were ‘perception of intention’ (0.547), ‘perception of power’ (0.051) and ‘degree of identification’ (−0.118).

After putting the items into a multiple regression analysis in the above order, the results showed two predictive variables for threat perception: power perception (F = 6.515**) and intention perception (F = 4.417**), whereas identity level was insignificant. presents the results of the study.

The content of the tested personnel’s decision-making observation analysis

In addition to the quantitative data gathered from the experimental questionnaire, this study incorporated the concept of the China threat into the designed reading text by using the observer’s notes to collect respondents’ attitudes and responses after reading the text to test the decision-making and threat perception hypothesis. The study’s hypothesis investigates the notion that the higher China’s threat perception, the more conflicted the decision making.

Except for the participants in the China team of the control group, the semantics of the relevant decision content of each group were categorized and weighted using McClelland’s ‘WEIS Classification Criteria’ and Goldstein’s ‘Goldstein Scale for WEIS.’ They were not included in the WEIS because their role-playing matched Scenarios 1–6. The following section describes the unique implementation process. Participants in each group were invited to function as decision makers in a simulated national security meeting during the actual decision presentation segment. Within each scenario, a simulated scenario was released, allowing members to discuss and propose actions for the group.

Scenario 1 analysis

This Scenario was ‘Peking University builds Taiwan Strait Strategic Awareness Program Website providing real-time and dynamic reports to the Scenario of the waters surrounding Taiwan; additionally, the Chinese Ministry of Foreign Affairs announced that importing all illegal weapons to Taiwan is prohibited under the National Security Law.’

This scenario also represents the initial phase of threats, assuming that the groups’ threat perceptions of China are equal; hence, the response is less likely to be significantly contentious. The groups replied as expected in Scenario 1, and the answer communications from the control and experimental groups tended to state the viewpoint and attitude of the group’s representative country without harsher diplomatic vocabulary ).

Analysis of Scenario 2 and 3

Scenario 2: ‘An aerial image of a US ship loaded with weapons sold to Taiwan is displayed on the Taiwan Strait Strategic Awareness Program Website.’ Scenario 3: ‘The Indo-Pacific Command invites Taiwan to participate as an observer in military exercises.’ According to the Chinese media, the Military Affairs Commission holds closed-door sessions with theater commanders to improve battle preparation. Assuming that reading the text increases threat perception in the experimental group, the group will respond to the message more forcefully than the control group.

The replies of the control group were largely similar to those of the preceding condition, and the reactions involved conveying positions, explanations and appeals. In contrast, the experimental group’s reactions became stronger with wording, primarily denial and emphasis (see ).

Table 18. Actions taken by all groups in Scenario 2.

In Scenario 3, the responses of the control group were more substantial than in the previous two circumstances, and the wording of the responses began to express military reflexes and appeals. In contrast, the experimental group’s replies maintained higher perceptions of the prior condition to make matching decisions against China’s military threats, whereas the reactions of the US group and teams 1 and 4 of the R.O.C. group displayed expressions of caution (as shown in ).

Table 19. Actions taken by all groups in Scenario 3.

Analysis of Scenario 4 and 5

Scenario 4: ‘The CCP announced armed exercises in Taiwan’s southeastern waters, and all vessels were barred from entering.’ An aerial image on the Website shows that ‘US ships arrived in Hawaii and Guam, and US and Japanese fleets appeared in Bashi Channel.’ Scenario 5: ‘By messaging Taiwan’s Ministry of National Defense, the CCP’s Eastern Theater Command invites the Chief of General Staff (CGS) to their ship next to the Pinnacle Islands’ (MND). They hope to establish communication channels to avert unintentional disputes that could lead to war. At this point, the experimental group was given the second reading text, ‘CCP’s Intention Maximum Possibility of Attacking Taiwan Before publishing Scenario 4, the experimental group read the text.’ We anticipated that reading the second text would increase the experimental group’s perception of China’s threats. The control group’s answers indicated a general warming trend and were stated sensibly. The experimental group’s replies in this scenario were more muscular, with greater caution and threats in phrasing and semantics. Team 1 of the ROC group used expanded military exercises to respond (see ).

Table 20. Actions taken by all groups in Scenario 4.

The control groups continued the exercise, and all three groups agreed with China’s proposal for Cross-Strait Military Dialog. The experimental groups, in contrast, finally rejected CCP’s plan. The United States group issued warnings. Groups 2 and 4 of the ROC rejected uneven discussions, whereas Group 1 took the most aggressive countermeasures by withdrawing the diaspora from China ().

Table 21. Actions taken by all groups in Scenario 5.

Analysis of Scenario 6

Scenario 6: ‘In Bashi Channel, CCP’s KJ-500 Air Early Warning (AEW), a KJ-200 Anti-submarine Aircraft, and a 052 C Destroyer (Haikou-171) with a Z-9 Anti-submarine Helicopters conduct a Cruising Mission.’ Before publishing Scenario 6, the experimental group was given a third reading text: ‘Power Threat – China’s Military Development Report 2020 demonstrates that the capabilities of the CCP’s Navy and Nuclear Weapons surpass the United States.’

Nonetheless, the control group’s answer was sensible, with China promising to stop its military cruise. In this Scenario, the experimental group maintained a strong attitude and the words and semantics of the answers were primarily forceful denunciations and criticisms. The ROC Group-1 reaction was still strong, and the accompanying action was ‘conducting an inventory check of combat resources and funding and condemning the war’ ().

Table 22. Actions taken by all groups in Scenario 6.

Therefore, after assigning WEIS weights, the conflict weights for both groups were clearly visible in the succeeding table. An analysis of the data disclosed significant disparities in the fluctuations of values. The conflict weights for the experimental group were considerably higher than those seen in the control group, as indicated in .

Synthesis and summaries

Following the aforementioned study, the hypotheses were validated to determine the impact of threat perceptions. summarizes the variance and association between the variables, validation of the hypotheses and findings.

Table 23. WEIS values in different scenarios.

Table 24. Research hypotheses results and analysis.

Hypothesis 1 is grounded in the constructivism theory’s concept of ‘identity.’ It assumes that the more similar the ‘identity’ is, the lower the perceived threat will be (H1-1). Moreover, perceived threat varies among different occupational groups (military and general) (H1-2). Upon examination, a significant difference (t-test 0.32*) was identified in the three dimensions of ‘power perception,’ ‘Identity’ and ‘Intention’ between domestic and foreign respondents. This indicates that domestic respondents possess a more robust perception of China’s development of comprehensive national power and military expansion compared to foreign respondents.

Second, military personnel and other occupations were analyzed by independent sample t-tests across three dimensions of ‘Identity,’ ‘power perception’ and ‘intention.’ No significant differences were found between military personnel and the other subjects. However, the overall mean score for the ‘perceived threat from China’ questionnaire was 3.94 (with a minimum of 1 and a maximum of 5). The mean score for this item was 4.10, which remained higher than the other subjects. In comparison, the mean score of this item for military personnel was 4.10, still surpassing that of other respondents.

As for the questionnaire on ‘identification with China,’ the overall mean score of identification with China is 1.825 (with a minimum of 1 mark and a maximum of 5 marks). The mean score of this item for military personnel is 1.76, indicating a lower level than that of other occupations. This result shows that, despite military personnel being responsible for national security duties for a long time and frequently dealing with conflicts in the gray areas against China, they still exhibit a higher level of ‘threat perception’ and a lower level of ‘identity’ with China.

Summarizing the above analysis, in the test section of H1-1: The dimensions of threat perception were more strongly perceived by local respondents than by foreign respondents; among the three dimensions, ‘perception of power’ reaches a significant level, while the rest of ‘perception of power’ and ‘level of identification’ are not significant, so the hypothesis is partially supported. H1-2: Military personnel perceive the threat perception dimensions more strongly than other respondents and is classified as ‘Rejected.’

Hypothesis 2 (H2): ‘Subjects receiving securitized reading text will experience threat perception.’ This part is based on the Copenhagen School of Securitization Theory, which emphasizes the use of ‘words’ and the design of the threat text to enhance the measurement of China’s threat perception, and to observe whether the experimental group will describe the threat through words, and respond to the threat with a corresponding intensity of foreign policy actions.

In the design, news events were rewritten to include topics, such as ‘strict censorship of information in communist countries,’ ‘China’s significant military growth,’ and ‘the PLA’s continuous training in Taiwan,’ and the texts were further distributed to the experimental group to test whether subjects would affect threat perception and take higher levels of conflictive actions in the decision-making process after reading differently oriented ‘securitized’ messages.

In addition to t-test, variance analysis, and covariance analysis, a qualitative observation method was adopted. The semantics of the corresponding decision contents of the experimental/control groups were classified and weighted through observers, following McClelland’s ‘Classification Criteria for WEIS’ and Goldstein’s ‘Goldstein’s Scale for WEIS.’ The semantics were then probed, and numerical values were assigned to compare the differences between the two groups.

Regarding quantitative analysis, it was found that although the covariate analyses of ‘degree of identification’ and ‘perceived intention’ of the two groups were not significant after the release of the experimental text, a comparison of the pre-test scores with the post-test scores revealed that the post-test means of the experimental group increased in all dimensions. This indicated that the threat perception of the subjects increased in all dimensions.

Second, qualitative observation of the analysis revealed that the experimental group began to show significant differences in the values of diplomatic decision-making actions after reading the text inputs. The ‘conflicting values’ of the experimental group toward China were significantly higher than those of the control group, and the test group generally took more assertive action in the situation. The wording and semantics of the responses had a stronger warning and threatening connotation, suggesting that the higher the perceived threat level of China, the more conflicted the decision making. This finding is consistent with the results of the literature review on the realism, indicating that ‘power differentials affect threat perceptions’ (see above).

Figure 3. Average WEIS values in different Scenarios. Source: Author.

Figure 3. Average WEIS values in different Scenarios. Source: Author.

Therefore, in Hypothesis H2, participants’ reading of the experimental text was expected to affect their threat perceptions (quantitative/qualitative analysis). The quantitative statistics did not hold, but the qualitative analysis did; thus, partially supporting the hypotheses of this study.

Hypothesis 3 uses the ‘threat perception’ paradigm to examine the effects of identity, power and intention on threat perception. Intent and fear of risk were positively linked, and threats increased with intent. Power- and motivation-predicted risks, while group danger increased with power differences and malice. This test may help to identify correlations, and this is partially supported by the evidence. With the growth of China’s comprehensive national strength, China has changed its foreign policy from ‘keep a low profile and concentrate on self-improvement (韜光養晦)’ to ‘Wolf warrior diplomacy.’ In recent years, China’s military expenditure has continued to rise, with a total amount reaching 17 times that of Taiwan’s defense budget. Internationally, in addition to intimidating Taiwan by force, the CCP has continued to expand the ‘grey zone conflict’ toward Taiwan, such as information attacks, ‘paramilitary’ actions, and military aircraft and warships harassing Taiwan. Regarding infiltration into Taiwan, China uses funds, political orders, red media, unification gangsters and political agents to oppress Taiwan’s free and democratic politics in an all-around way. Some groups in Taiwan have been wooed. These ‘expansion and intimidation of military power’ and ‘intended infringement of the territory of other countries’ have significantly increased the Taiwanese’s perception of the China threat.

Hypothesis 3: Identity Level, Power Perception, Intention Perception and Threat Perception are correlated. The correlation between the variables is examined based on the threat perception model, and the most significant impacts are identified. The predictive effects of these three variables on threat perception were also investigated.

After using the cumulative correlation and multiple stepwise regression analysis, it is found that the correlation between ‘intention perception’ and threat perception is the most significant part, which is moderately positive, that is, the greater the intention perception of others, the more pronounced the threat perception is;

Second, in terms of predictive power, it is revealed that the two components of ‘power perception’ and ‘intention perception’ have predictive power on threat. In other words, when the power difference is more significant, and the intention to harm is more robust, the threat perception of the group will increase accordingly.

Since the study found no association between ‘identity’ and threat, this part differs from Rousseau’s (2007) finding that ‘shared identity reduces threat perception.’ The concept of ‘identity’ varies with different life experiences and political-social environments. In Taiwan, due to its pluralistic democratic values, generational replacement and the ‘threat from China,’ Taiwanese people’s identity with China has declined dramatically (Wang et al., Citation2023, p. 8). However, ‘identity’ is not significantly related to threat in this study because of factors, such as the methodology and the small sample size. The respondents’ mean score on this dimension was 1.94 (with one being the lowest and five the highest), indicating that most respondents still perceive similarity with China as very low.

Therefore, the hypothesis test results of H3: Identity level, power perception, intention perception and threat perception are correlated; H3-1 is ‘partially supported’; and H3-2 is also ‘partially supported.’

Conclusion

In security studies, threat perception is a fundamental concept, because it pertains to people’s cognition and evaluation of the security environment, influencing their security behaviors and decisions. Research on measuring threat perception holds both essential theoretical and practical value for improving people’s security awareness and capabilities, thereby improving the overall security level of society. Constructivism, which is the primary approach to security research in international relations, focuses on the interactive construction of concepts, identities, agents and structures. Identity as an overarching concept, integrates these three elements and stands as the core of constructivism. One of the concepts it provides is a non-material explanation of the source of the sense of threat − that is, where the threat originates – and it targets various types of threats, such as ‘cognitive warfare’ and ‘grey zone conflicts,’ which are challenging to perceive and evaluate accurately. This approach provides a method for measuring threat perception.

Therefore, it is necessary to explore deeply the impact of relevant variables on threat perception, and identify which variables are key to effective intervention in securitization during the process of threat perception. This study uses a cross-domain integrated research framework that incorporates the Copenhagen School Securitization Theory. Additionally, a composite analysis framework was adopted to capture perspectives from both realism and constructivism on different potential sources of threats. The concept of securitization was then employed to establish a more comprehensive analysis framework.

In terms of research design, we utilized designed materials to conduct group experimental observations, and the ‘WEIS-Conflict/Cooperation Index’ was used to measure the discourse usage, wording intensity and policy choices of security actors (different decision-makers in each group). Differences enable the analysis of the source of threats to move away from a purely materialistic orientation (realism believes that the source of group threat is based on ‘power asymmetry’). Hypothesis 1 is mainly aimed at verifying the primary variables of the population, while Hypothesis 2 and Hypothesis 3 conduct experimental methods and statistical regression analysis one by one to understand the impact of variables, such as ‘identity level,’ ‘power perception’ and ‘intention perception’ on ‘threat’ ‘Perception,’ the study found that ‘power perception and intention perception’ can indeed predict ‘threat perception.’

The main contribution of this study is to connect the realist concept of threat with the concept of ‘speech-action’ in the Copenhagen School’s securitization theory, emphasizing how to strengthen the connection between ‘language and threat perception.’ It uses the experimental method, designing the experimental materials to manipulate verbal expressions to observe whether there is a change in the audiences’ threat perception of China. Simultaneously, it combines linguistic and psychological methods to analyze the possible sources of threat perception and the role of speech in threat perception: specific impact mechanisms and the relationship between externally expressed responses and policy actions.

With the growth of China’s comprehensive national strength, it has changed its foreign policy from ‘keep a low profile and concentrate on self-improvement (韜光養晦)’ to ‘Wolf warrior diplomacy.’ In recent years, China’s military expenditure has continued to rise, reaching 17 times that of Taiwan’s defense budget. Internationally, in addition to intimidating Taiwan by force, the CCP has continued to expand the ‘grey zone conflict’ toward Taiwan through information attacks, ‘paramilitary’ actions and military aircraft and warships harassing Taiwan.

In the future, relevant government departments can refer to the results of this study and further strengthen awareness of enemy threats within the group by setting text topics and establishing security argument logic. The relevant suggestions are as follows.

  1. Establishment of security argument logic: Faced with threats from China’s frequent military exercises, gray zone conflicts, and united front infiltration against Taiwan, the government should formulate a clear security argument logic to strengthen the ‘power difference’ and China’s intention to invade. It poses a substantial threat to Taiwan’s security.

  2. Strengthen threat awareness and national identity within the group: Taiwan should actively promote its national identity in education, culture, communication and public psychology and increase media literacy education so that the public can empower the capacity to interpret false information – the ability to enhance psychological defense and security resilience in all dimensions.

‘Questions about security cannot be separated from the most fundamental questions of political theory.’ Understanding the source of threats can not only reduce the fear of the unknown but also allow us to examine our own weaknesses and shortcomings, strengthen the national psychological defense, and ensure national security.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Chang-Ching Tu

Chang-Ching Tu is an associate professor at the Graduate Institute of Strategic Studies, College of International Security and National Defense Affairs, ROC National Defense University (Taiwan). He received his Ph.D. from the National Defense University (Taiwan) and has been teaching the International Conflict and Crisis Management course since 2017.

Han-Ping Tien

Han-Ping Tien was graduated from ROC National Defense University(Taiwan), where he worked as a research assistant at the Graduate Institute of Strategic Studies. He currently serves in the Army as a full Colonel.

Ji-Jen Hwang

Ji-Jen Hwang is an Associate Professor at Rabdan Academy in U.A.E. A native of Taiwan, he holds a Ph.D. in politics from the University of Newcastle upon Tyne in the U.K., as well as a Masters in Library Science & Information Studies from the University of North Carolina in U.S.A.

References

  • Bagci, S. C., Piyale, Z. E., & Ebcim, E. (2018). Imagined contact in high conflict settings: The role of ethnic group identification and the perspective of minority group members. Journal of Applied Social Psychology, 48(1), 1–26. https://doi.org/10.1111/jasp.12485
  • Booth, K. (2007). The theory of world security. Cambridge University Press.
  • Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge University Press.
  • Buzan, B., & Hansen, L. (2011). Evolution of international security studies (Y. Xiaofeng, Trans.). Zhejiang University Press. [in Chinese]
  • Buzan, B., Wæver, O., & Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
  • Chang-Ching, T. (2019). Confrontation or dialogue: Challenges and opportunities for the future AI’s development. Review of Global Politics, 66, 32.
  • Chatterjee, S. (2003). Neo-realism, neo-liberalism, and security. International Studies, 40(2), 125–144. https://doi.org/10.1177/002088170304000202
  • Chen, M. (2009). International security theory: Power, sovereignty, and threat. Wunan Press. [in Chinese]
  • Collins, A. (2016a). Contemporary security studies (4th ed.). Oxford University Press.
  • Collins, A. (Ed.) (2016b). Contemporary security studies (G. Wanglai & W. Rong, Trans.). World Knowledge Press. [in Chinese]
  • Da-Hua, M. (1998). A review of the security studies debate. Issues and Studies, 37(8), 20–22. [in Chinese]
  • Da-Hua, M. (2002). A constructivist approach to security studies: A comparative study of the Copenhagen school and the critical security studies school. Fu Hsing Kang Academic Journal, 74, 303–323. [in Chinese]
  • Da-Hua, M. (2003). Constructivist theory of international relations and security studies. Shi-Ying Press. [in Chinese]
  • Da-Hua, M. (2006). Bridge-building project within constructivist theory of international relations - dialogue and synthesis of epistemology. Fu Hsing Kang Academic Journal, 87, 221–249.
  • Dannreuther, R. (2013). International security: The contemporary agenda (2nd ed.). Polity.
  • Ding-Guo, Y. (2004). Culture, identity, and national security. The Prospect Foundation, 5(1), 140–141. [in Chinese]
  • Garcia-Retamero, R., Müller, S. M., & Rousseau, D. L. (2012). The impact of value similarity and power on the perception of threat: Value similarity, power, and threat. Political Psychology, 33(2), 179–193. https://doi.org/10.1111/j.1467-9221.2012.00869.x
  • Goldstein, J. S. (1992). A conflict-cooperation scale for WEIS events data. Journal of Conflict Resolution, 36(2), 369–385. https://doi.org/10.1177/0022002792036002007
  • Guilford, J. P. (1965). The minimal phi coefficient and the maximal phi. Educational and Psychological Measurement, 25(1), 3–8. https://doi.org/10.1177/001316446502500101
  • Heywood, A. (2018). Concepts in politics and international relations (Y. Lin, S. Su, & Z. S. Key, Trans.). Wunan Press. [in Chinese]
  • Huddy, L., Sears, D. O., & Levy, J. S. (Eds.) (2013). The Oxford handbook of political psychology (2nd ed.). Oxford University Press.
  • Kolodziej, E. A. (2018). Security and international relations (Y. Lin, Trans.). World Knowledge Press. [in Chinese]
  • Liptak, K. (2021). Biden’s first formal national security strategy identifies China as America’s most consequential geopolitical challenge. CNN. https://edition.cnn.com/2022/10/12/politics/national-security-strategy-joe-biden/index.html.
  • Lo, C. Y. P. (2015). HIV/AIDS in China and India: Governing health security. Palgrave Macmillan Press.
  • Lobell, S. (2017). Structural realism/offensive and defensive realism. Oxford Research Encyclopedia of International Studies. https://doi.org/10.1093/acrefore/9780190846626.013.304.
  • Lu, S M. (2023). The Chinese Communist Party suddenly announced military exercises around the Taiwan Strait, and the Democratic Progressive Party choked: The Chinese Communist Party has become the biggest threat to democratic Taiwan. SETN News. https://tw.news.yahoo.com/%E4%B8%AD%E5%85%B1%E7%AA%81%E5%AE%A3%E5%B8%83%E5%9C%A8%E5%8F%B0%E6%B5%B7%E5%91%A8%E9%82%8A%E8%BB%8D%E6%BC%94-%E6%B0%91%E9%80%B2%E9%BB%A8%E5%97%86-%E4%B8%AD%E5%85%B1%E5%B7%B2%E6%88%90%E7%82%BA%E6%B0%91%E4%B8%BB%E5%8F%B0%E7%81%A3%E7%9A%84%E6%9C%80%E5%A4%A7%E5%A8%81%E8%84%85-084508706.html (accessed May 8, 2022). [in Chinese]
  • Matonytė, I., & Morkevičius, V. (2013). Threat perception and European identity building: The case of elites in Belgium, Germany, Lithuania and Poland. Perceptions of the European union in new member states (pp. 53–71). Routledge.
  • Morgenthau, H. J., & Thompson, K. W. (1985). Politics among nations: the struggle for power and peace. Knopf.
  • Rosato, S. (2015). The inscrutable intentions of great powers. International Security, 39(3), 48–88. https://doi.org/10.1162/ISEC_a_00190
  • Rousseau, D. L., & Garcia-Retamero, R. (2007). Identity, power, and threat perception: A cross-national experimental study. Journal of Conflict Resolution, 51(5), 744–771. https://doi.org/10.1177/0022002707304813
  • Salmon, T. C., & Imber, M. F. (2000). Issues in international relations. Routledge Press.
  • Schuurman, B., & Eijkman, Q. (2015). Indicators of terrorist intent and capability: Tools for threat assessment. Dynamics of Asymmetric Conflict, 8(3), 215–231. https://doi.org/10.1080/17467586.2015.1040426
  • Slantchev, B. L. (2011). Military threats: The costs of coercion and the price of peace. Cambridge University Press.
  • Smith, S. (2005). The contested concept of security: Critical security studies in world politics. Lynne Rienner.
  • Stein, J. G. (2013). Threat perception in international relations. In L. Huddy, D. O. Sears, & J. S. Levy (Eds.), The Oxford handbook of political psychology (2nd ed.). Oxford University Press. p. 364–394. https://doi.org/10.1093/oxfordhb/9780199760107.013.0012
  • Taiwanese Public Opinion Foundation. (2021). Taiwan public opinion under the cross-strait military crisis. https://www.tpof.org/%e5%9c%96%e8%a1%a8%e5%88%86%e6%9e%90/%e5%85%a9%e5%b2%b8%e8%bb%8d%e4%ba%8b%e5%8d%b1%e6%a9%9f%e4%b8%8b%e7%9a%84%e5%8f%b0%e7%81%a3%e6%b0%91%e6%84%8f%ef%bc%882021%e5%b9%b411%e6%9c% 882%e6% 97%a5%ef%bc%89/ (accessed March 18, 2022). [in Chinese]
  • The Economist. (2021, May 20). The most dangerous place on Earth. The Economist. https://www.economist.com/leaders/2021/05/01/the-most-dangerous-place-on-earth
  • Trachtenberg, M. (2003). The question of realism. Security Studies, 13(1), 156–194. https://doi.org/10.1080/09636410490493877
  • Ullman, Richard H. (1983). Redefining Security. International Security, 129–153.
  • Walker, R. (1997). Critical security studies: Concepts and cases. University of Minnesota Press.
  • Waltz, K. N. (1979). Theory of international politics. Random House.
  • Wang, A. H. E., Yeh, Y. Y., Wu, C. K. S., & Chen, F. Y. (2023). Why does Taiwan identity decline? Journal of Asian and African Studies. https://doi.org/10.1177/00219096231168068
  • Wendt, A. (1992). Anarchy is what states make of it: The social construction of power politics. International Organization, 46(2), 391–425. https://doi.org/10.1017/S0020818300027764
  • Wendt, A. E. (1987). The agent-structure problem in international relations theory. International Organization, 41(3), 335–370. https://doi.org/10.1017/S002081830002751X
  • Zakaria, F. (1998). From wealth to power: The unusual origins of America’s world role. Princeton University Press.

Annexes 1

Annexes 2

Annexes 3