Conflict Resolution Methods Might Snow Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Contrasting this from a personal standpoint, only in the most emotionally charged and toxic personal situations are there feelings of this level, rejoicing in the failure of others. In personal relationships this is especially troublesome as the medium of exchange, unlike business using money, is emotion and what is left of trust in a relationship. That makes the wishing of failure in addition to winning the conflict especially toxic and even potentially dangerous. As one divorcee had on her license plate holder "Happiness is seeing your Ex-on a milk carton," the damaging aspects of this dynamic is dangerous in interpersonal relationships.

It is far more common in business where salaries, sales, and bonuses are seen as a direct reflection of the value of the managers involved, and the loss of these is seen as even greater victory for the person in the conflict.

Case: The Great Wall and the Firewall - 50 marks (2 to 4 pages)

On more than one occasion China has been accused of attempting to break into government computers in Australia, New Zealand and other countries. What is the source of the conflicts between China and other countries? Can the Chinese government be trusted? Why? How do you think that will these conflicts will be resolved?

China is unique in that its intelligence operations are relied on not only for defense-related information and analysis, but also for economic and industry-specific knowledge as well. The source of conflicts China has with Canada, Australia, New Zealand, the U.S., the United Kingdom and many other westernized nations who have significant trading relationships with them is the vision of Chinese government leaders to eventually dominate, not collaborate, in these trading relationships. Clearly the intention is to gain enough defense-related intelligence is the foundation of their efforts, as exhibited by the recent admission by U.S. Department of Defense officials that the Pentagons' computer systems show the Chinese military had attempted to hack into them (Financial Times 2007). In addition it is estimates that China's intelligence network relies heavily on businesses to act as intelligence-gathering fronts, with a Canadian Security Intelligence Service report in 2005 estimating 500 such businesses exist in Canada alone, and a few thousand throughout the U.S. The intentions of China on spying on the U.S. is clearly for military superiority, while the spying efforts in Canada are for both the stealing of both technological and trade secrets so China can gain the competitive advantage in trading relationships and defense. In the case of spying in Australia and New Zealand, the same holds true, with the latter country being of particular interest to the Chinese as it has become known as a world leader in software development. China is one of the laggards globally in that area, hence their interest. China is also looking for how to dominate industry-specific trade strategies with each of these companies as well.

Despite the Chinese governments' best efforts at public relations and putting on a front of being a benevolent trading and manufacturing giant, in fact the leadership of the country is still dominated by hard-line, anti-western communist party leaders who see all that the west symbolizes as evil. Their stance on one-child-per-family and the rigorous enforcement of this law, the lack of free speech and imprisonment of bloggers who speak out against them, and the lack of product safety standards in place despite the Chinese nation now being one of the most productive from a manufacturing standpoint in the world, all point to a strategy of duality that is not worthy of trust. On the one hand the Chinese government welcomes manufacturers who want to gain access to their cheap labor and in certain parts of the country, well-defined infrastructure (as is the case in Shanghai where broadband Internet access is widely available) and on the other, the concentration on tightly controlling the social-political systems and values of its people makes for a contradiction. Their rise as a global manufacturing leader and the heavy reliance on foreign direct investment (FDI) fuels this contradiction and leads to an even higher level of reliance on intelligence regarding both military and commercial strategies of entire nations they see as competitors is continually anteing up the race of information and competitive insight. China's espionage strategies span from the small business fronts used as "landing zones" in western nations for spies to both steal technology and trade secrets to the use of high technology hacking to gain access into military information. In short, China is one of the world's greatest threats to security outside of radical Islamic terrorism.

Just as the issue of China's use of espionage to attain their industrial, military, and technological goals has escalated over decades of conflict, there is no simple or elegant solution to the problem. The recognition that continued surveillance of all forms of China's sabotage, and the continual investment in research and development to development new technologies for detecting China's spying and espionage efforts are critical. There is no real resolution to this conflict, merely a continual need to be vigilant and stay at least at parity with the threat of the Chinese government using all forms of espionage in global commercial and military advantage.


Financial Times (2007) - Chinese Military hacked into Pentagon. Demetri Sevastopulo. Washington D.C. Published: September 3, 2007. Accessed from the Internet on September 19, 2007 from location:[continue]

Cite This Term Paper:

"Conflict Resolution Methods Might Snow" (2007, September 19) Retrieved December 9, 2016, from

"Conflict Resolution Methods Might Snow" 19 September 2007. Web.9 December. 2016. <>

"Conflict Resolution Methods Might Snow", 19 September 2007, Accessed.9 December. 2016,

Other Documents Pertaining To This Topic

  • Ernest Hemingway Exploring Life s Conflicts

    The conflict is real and it is too big for him to tackle on his own, so he shuts down and checks out emotionally. Another story that deals with inner conflict is "Now I Lay Me." This story is completely internal and it becomes the narrator's way to keep from losing his mind as he fights insomnia. He is suffering from shell shock. The conflict is the narrator's inability to

  • Prejudice in the Danish Legal System

    Smilla's Sense Of Snow: An icy reflection of the prejudice of the Danes against native Greenlanders The protagonist of Peter Hoeg's thriller Smilla's Sense of Snow is a product of a union between a native 'Greenlander' or indigenous person and a wealthy Danish doctor. Although the plot of the book is ostensibly a murder mystery it is just as much about Smilla's struggle for her identity. Smilla embarks upon her detective 'quest'

  • Medical Malpractice Players Attorney for

    However, Carol's use of the Internet for personal matters during the workday is also an example of how mixing work and personal matters can make it difficult for employees to get along. All workers should be reminded of the need to exercise good judgment and to keep work and personal matters separate. They should be referred to the relevant company policies in the employee handbook, if necessary. Bob in

  • Parenting Program for Women and

    There are many of these individuals, and it is time that this is changed. Parents often look away from these kinds of problems, or they spend their time in denial of the issue because they feel that their child will not be harmed by parental involvement with drugs or alcohol. Some parents have parents that were/are addicts themselves, and some are so busy with their lives that they do not

  • Beowulf as a Hero Lesson

    Your answer should be at least five sentences long. The Legend of Arthur Lesson 1 Journal Entry # 9 of 16 Journal Exercise 1.7A: Honor and Loyalty 1. Consider how Arthur's actions and personality agree with or challenge your definition of honor. Write a few sentences comparing your definition (from Journal 1.6A) with Arthur's actions and personality. 2. Write a brief paragraph explaining the importance or unimportance of loyalty in being honorable. Lesson 1 Journal

  • Accreditation Is 6 Months Away and Your

    Accreditation is 6 months away and your strategic planning documents will be shared. What will you do in the next 6 months to show that you are fixing the problems? I will emphasize our areas of expertise, i.e. The hospital's cancer activities and heart disease projects, releasing a flurry of reports about our studies and activities in this area. We will also center on our attraction to a non-traditional population,

  • Risk of Climate Change Implications for Architects and Engineers

    Risks of Climate Change THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS Climate Change Impacts on Engineering Infrastructure Key Impacts on Water and Resources Risk Management Analysis Coping Methods Possibility And Probability Theories Recommendations And Guidelines For The Vulnerability Of Climate Change Impacts Using Risk Management Methods And Analysis THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS This work examines climate change in relation to impacts upon infrastructure, utilities, and water in relation to the

Read Full Term Paper
Copyright 2016 . All Rights Reserved