Bilateral Cooperation Agreements Refers To

Chart 1. Growth of bilateral defence cooperation agreements, 1980-2010 As well as network cooperation, Austrian educational and training institutions are working closely with European and international organisations. Estimates for reciprocal degree and two paths are positive and extremely accurate and provide a first support for H1 and H2, the main network assumptions. Dyads who share DCA links with the same third k are more likely to sign DCAs themselves. As the centrality of i and J in the DCA network increases mutually, their likelihood of signing a DCA increases accordingly. The latter result suggests that cooperation most likely depends on military power and other covariates, provided that cooperation between mutually active countries where information is most important is the most important. To evaluate H5`s macrohistorical argument on the emergence of network flows, I separately calculated the marginal impact of network variables for the 1980-1989 and 1990-2010 periods. As shown in the right-hand tables in Figure 8, the first evolution of CAD in the 1980s had virtually no influence on networks; The models assessed separately show that, during this period, military power and bilateral trade were in fact the main determinants of defence cooperation. These results are consistent with the structural argument that network influence has only become important when traditional geopolitical concerns have dissiped, new threats have emerged and many states have needed bilateral defence partners. States respond not only to global threats, but also to threats that are shared with potential partners. For example, Brunei`s Grand Mufti argued for a DCA with Indonesia, addressing a sense of common destiny and stating that in the future, “we will probably face non-traditional threats that do not recognize national borders. It is therefore a must for two neighbouring countries to establish military cooperation.¬†Footnote 62 The Indonesian Defence Minister told Sweden that “our common enemy was terrorism.” Footnote 63 Although asymmetric threats receive disproportionate attention, political leaders remain concerned about traditional intergovernmental threats.