Conflict Resolution Methods Might Snow Term Paper

Length: 9 pages Sources: 1+ Subject: Military Type: Term Paper Paper: #50245491 Related Topics: Conflict Resolution, Espionage, Conflict Of Interest, Conflict
Excerpt from Term Paper :

Contrasting this from a personal standpoint, only in the most emotionally charged and toxic personal situations are there feelings of this level, rejoicing in the failure of others. In personal relationships this is especially troublesome as the medium of exchange, unlike business using money, is emotion and what is left of trust in a relationship. That makes the wishing of failure in addition to winning the conflict especially toxic and even potentially dangerous. As one divorcee had on her license plate holder "Happiness is seeing your Ex-on a milk carton," the damaging aspects of this dynamic is dangerous in interpersonal relationships.

It is far more common in business where salaries, sales, and bonuses are seen as a direct reflection of the value of the managers involved, and the loss of these is seen as even greater victory for the person in the conflict.

Case: The Great Wall and the Firewall - 50 marks (2 to 4 pages)

On more than one occasion China has been accused of attempting to break into government computers in Australia, New Zealand and other countries. What is the source of the conflicts between China and other countries? Can the Chinese government be trusted? Why? How do you think that will these conflicts will be resolved?

China is unique in that its intelligence operations are relied on not only for defense-related information and analysis, but also for economic and industry-specific knowledge as well. The source of conflicts China has with Canada, Australia, New Zealand, the U.S., the United Kingdom and many other westernized nations who have significant trading relationships with them is the vision of Chinese government leaders to eventually dominate, not collaborate, in these trading relationships. Clearly the intention is to gain enough defense-related intelligence is the foundation of their efforts, as exhibited by the recent admission by U.S. Department of Defense officials that the Pentagons' computer systems show the Chinese military had attempted to hack into them (Financial Times 2007). In addition it is estimates that China's intelligence network relies heavily on businesses to act as intelligence-gathering fronts, with a Canadian Security Intelligence Service report in 2005 estimating 500 such businesses exist in Canada alone, and a few thousand throughout the U.S. The intentions of China on spying on the U.S. is clearly for military superiority, while the spying efforts in Canada are for both the stealing of both technological and trade secrets so China can gain the competitive advantage in trading relationships and defense. In the case of spying in Australia and New Zealand, the same holds true, with the latter country being of particular interest to the Chinese as it has become known as a world leader in software development. China is one of the laggards globally in that area, hence their interest. China is also looking for how to dominate industry-specific trade strategies with each of these


Their stance on one-child-per-family and the rigorous enforcement of this law, the lack of free speech and imprisonment of bloggers who speak out against them, and the lack of product safety standards in place despite the Chinese nation now being one of the most productive from a manufacturing standpoint in the world, all point to a strategy of duality that is not worthy of trust. On the one hand the Chinese government welcomes manufacturers who want to gain access to their cheap labor and in certain parts of the country, well-defined infrastructure (as is the case in Shanghai where broadband Internet access is widely available) and on the other, the concentration on tightly controlling the social-political systems and values of its people makes for a contradiction. Their rise as a global manufacturing leader and the heavy reliance on foreign direct investment (FDI) fuels this contradiction and leads to an even higher level of reliance on intelligence regarding both military and commercial strategies of entire nations they see as competitors is continually anteing up the race of information and competitive insight. China's espionage strategies span from the small business fronts used as "landing zones" in western nations for spies to both steal technology and trade secrets to the use of high technology hacking to gain access into military information. In short, China is one of the world's greatest threats to security outside of radical Islamic terrorism.

Just as the issue of China's use of espionage to attain their industrial, military, and technological goals has escalated over decades of conflict, there is no simple or elegant solution to the problem. The recognition that continued surveillance of all forms of China's sabotage, and the continual investment in research and development to development new technologies for detecting China's spying and espionage efforts are critical. There is no real resolution to this conflict, merely a continual need to be vigilant and stay at least at parity with the threat of the Chinese government using all forms of espionage in global commercial and military advantage.


Financial Times (2007) - Chinese Military hacked into Pentagon. Demetri Sevastopulo. Washington D.C. Published: September 3, 2007. Accessed from the Internet on September 19, 2007 from location:

Sources Used in Documents:


Financial Times (2007) - Chinese Military hacked into Pentagon. Demetri Sevastopulo. Washington D.C. Published: September 3, 2007. Accessed from the Internet on September 19, 2007 from location:

Cite this Document:

"Conflict Resolution Methods Might Snow" (2007, September 19) Retrieved October 24, 2021, from

"Conflict Resolution Methods Might Snow" 19 September 2007. Web.24 October. 2021. <>

"Conflict Resolution Methods Might Snow", 19 September 2007, Accessed.24 October. 2021,

Related Documents
Prejudice in the Danish Legal System
Words: 1886 Length: 6 Pages Topic: Business - Law Paper #: 80862999

Smilla's Sense Of Snow: An icy reflection of the prejudice of the Danes against native Greenlanders The protagonist of Peter Hoeg's thriller Smilla's Sense of Snow is a product of a union between a native 'Greenlander' or indigenous person and a wealthy Danish doctor. Although the plot of the book is ostensibly a murder mystery it is just as much about Smilla's struggle for her identity. Smilla embarks upon her detective 'quest'

Parenting Program for Women and
Words: 41621 Length: 150 Pages Topic: Children Paper #: 12171638

There are many of these individuals, and it is time that this is changed. Parents often look away from these kinds of problems, or they spend their time in denial of the issue because they feel that their child will not be harmed by parental involvement with drugs or alcohol. Some parents have parents that were/are addicts themselves, and some are so busy with their lives that they do not

Beowulf As a Hero Lesson
Words: 8817 Length: 19 Pages Topic: Literature Paper #: 81934961

Your answer should be at least five sentences long. The Legend of Arthur Lesson 1 Journal Entry # 9 of 16 Journal Exercise 1.7A: Honor and Loyalty 1. Consider how Arthur's actions and personality agree with or challenge your definition of honor. Write a few sentences comparing your definition (from Journal 1.6A) with Arthur's actions and personality. 2. Write a brief paragraph explaining the importance or unimportance of loyalty in being honorable. Lesson 1 Journal

Risk of Climate Change Implications for Architects and Engineers
Words: 6494 Length: 25 Pages Topic: Weather Paper #: 63054256

Risks of Climate Change THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS Climate Change Impacts on Engineering Infrastructure Key Impacts on Water and Resources Risk Management Analysis Coping Methods Possibility And Probability Theories Recommendations And Guidelines For The Vulnerability Of Climate Change Impacts Using Risk Management Methods And Analysis THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS This work examines climate change in relation to impacts upon infrastructure, utilities, and water in relation to the

Shareholder and Stakeholder Values It
Words: 8113 Length: 30 Pages Topic: Business Paper #: 31668522

In other respects, however, the evidence does not readily conform to theoretical predictions. For example, if gross job turnover is taken as a rough proxy for labor market flexibility -- and since stringent EPL reduces both hiring and firing -- it is quite surprising to find that job turnover rates are very loosely related to EPL rankings. Most remarkably, not only are the estimates for Italy and France, at

Mao Zedong Born on December
Words: 1913 Length: 5 Pages Topic: Government Paper #: 13182393

Moreover, in the wake of the Shanghai massacre, the more radical idea that Chinese communism should actually pursue its own independent path began to take root. For example, while Mao continued to favor the creation of soviets (councils) and the land redistribution policy, he began to militarize the dialogue by highlighting the need to arm the masses and accelerate the process of change through the creation of a wave-like