Monday, September 30, 2019

Globalization and Perception on War

Globalization and International Organizations Assignment Submitted By A. S. M. Iqbal Bahar Rana. ID # 103-0007-085 MPPG Programme, North South University Date: 14. 11. 2011 Do you think the advent of information revolution has changed the way war is perceived by the West? If so, what are the implications of such changes for poorly-governed countries of the world? Introduction: The German philosopher Hegel held that revolutions are the locomotive of history. According to his theory, every social, political, and economic system builds up tensions and contradictions over time. Eventually these explode in revolution. One cannot create a revolution in the way that an architect designs a building. Nor is it possible to control revolutions like a conductor leads an orchestra. Revolutions are much too big and complex for that. Those who live in revolutionary times can only make a thousand small decisions and hope that they move history forward in the desired direction. Around the world today we see the growing sophistication and rapid international diffusion of powerful new information technologies, the mergers of huge communication empires, strategic alliances across borders, and the doubling of power and the halving of the price of computing every 18 months (Moore's Law). The Information Revolution, ethno-political conflicts, globalization — each of these three mega-trends is individually important for all nations' future; together, they are redefining the global context within which governments and citizens must make daily decisions in the years to come. Thus, their intersection should constitute a central concern of scholars, policy makers, and citizens. In an era of globalization, national security has a different meaning. Nation-states no longer have a monopoly on the means of coercion. Even if nuclear weapons had a deterrent value during the Cold War, today they have none as the causes of insecurity, more often than not, are economic collapse and internecine conflict, and not external aggression. The information age has revolutionized the instrument of soft power and the opportunities to apply them. The ability of a nation to project the appeal of its ideas, ideology, culture, economic model, and social and political institutions and to take advantage of its international business and telecommunications networks will leverage soft power. In simple terms, the information revolution is increasing inter-connectedness and escalating the pace of change in nearly every dimension of life. This, in turn, shapes the evolution of armed conflict. Whether in economics, politics, or war-fighting, those who are able to grasp the magnitude of this will be the best prepared to deal with it. The use of Information and Communication Technologies (ICTs) in warfare scenarios has been of central interest to governments, intelligence agencies, computer scientists and security experts for the past two decades (Arquilla and Ronfeldt 1997; Campen and Dearth 1998; Singer 2009). . ICTs gave rise to the latest revolution in military affairs (RMA) by providing new tools and processes of waging war – like network-centric warfare (NCW), and integrated command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR). This RMA concerns in the premise of military forces, as they have to deal with â€Å"the 5th dimension of warfare, information, in addition to land, sea, air and space†. Classical Perception of War: Clausewitz is under significant challenge. It is clearly alive and well in the military colleges of Western states but outside these corridors other philosophies are in the ascendancy. A debate continues to rage over the extent to which Clausewitzean thinking is still relevant to today’s wars. From today’s vantage point, several developments have eroded the appeal and power of the political philosophy of war. First, the concept of the battlefield, so central to the way in which Clausewitz understood warfare, has dissolved. The 9/11 attacks, for instance, demonstrated that today’s battlegrounds might be Western (or other) cities while the US-led ‘War on Terror’ – now rebranded as the ‘long war’ – conceives of the battlefield as literally spanning the entire globe. In the future, however, battles are unlikely to be confined to planet Earth as the US in particular will be forced to militarize space in an effort to protect the satellites upon which its communication and information systems depend (Hirst 2002). Second, as the speeches of both Osama bin Laden and US President George W. Bush make clear, the leadership cadres on both sides of the ‘War on Terror’ have often rejected political narratives of warfare. Instead, they have adopted eschatological philosophies in their respective rallying cries for a global jihad and a just war against evildoers where ideology played a significant role in waging war. A third problem for advocates of the political philosophy and one which Clausewitz obviously never encountered is war involving information technology. Information technology brings the Finally, when confronted by ‘revolutionary’ wars which cry out for counterrevolutionary responses, Clausewitz’s injunction to destroy the military forces of the adversary is problematic not just because such ‘military forces’ are often indistinguishable from the local populace but also because one can never be sure they have been eliminated ‘unless one is ready to destroy a large portion of the population’ (Rapoport 1968: 53; see also Chapter 26, this volume). As we have seen, it is fair to say, however, that the political philosophy has been the most prominent in the traditionally Anglo-American-dominated field of security studies (on the ethnocentric tendencies of security studies see Booth 1979, Barkawi and Laffey 2006). All that can be said in general terms is that whatever approach to understanding warfare one chooses to adopt will have consequences, leading the analysis in certain directions and forsaking others. Within International Relations and security studies warfare has commonly been defined in ways that highlight its cultural, legal and political dimensions. Information Revolution and information Warfare: ICTs are used in several combat activities, from cyber attacks to the deployment of robotic weapons and the management of communications among the fighting units. Such a wide spectrum of uses makes it difficult to identify the peculiarities of this phenomenon. Help in respect to this will come from considering in more detail the different uses of ICTs in warfare. An attack on the information system called smurf attack is an implementation of distributed denial of service (DDoS) attacks. A DDoS is a cyber attack whose aim is to disrupt the functionality of a computer, a network or a website. This form of attack was deployed in 2007 against institutional Estonian websites, and more recently similar attacks have been launched to block the Internet communication in Burma during the 2010 elections. The use of robotic weapons in the battlefield is another way to use ICTs in warfare. It is a growing phenomenon, coming to widespread public notice with US army, which deployed 150 robotic weapons in Iraq’s war in 2004, culminating in 12,000 robots by 2008. Nowadays, several armies around the world are developing and using tele-operated robotic weapons, they have been deployed in Iraq and Afghanistan, and more sophisticated machines are being used at the borders between Israel and Palestine in the so-called ‘automatic kill zone’. These robots are trusted to detect the presence of potential enemies and to mediate the action of the human soldiers and hence to fire on potential enemy’s targets when these are within the range patrolled by the robots. Several armies also invested their resources to deploy unmanned vehicles, like the MQ-1 predators, which have then been used to hit ground targets, and to develop unmanned combat air vehicles, which are designed to deliver weapons and can potentially act autonomously, like the EADS Barracuda, and the Northrop Grumman X-47B. One of the latest kinds of robotic weapon – SGR-A1 – has been deployed by South Korea to patrol the border with North Korea. This robot has low-light camera and pattern recognition software to distinguish humans from animals or other objects. It also has a color camera, which can locate a target up to 500 meters, and if necessary, can fire its built-in machine gun. Up until now, robotic weapons were tele-operated by militaries sitting miles away from the combat zone. Human were kept in the loop and were the ones who decided whether to shoot the target and to maneuver the robot on the battlefield. The case of SGR-A1 constitutes quite a novelty, as it has an automatic mode, in which it can open fire on the given target without waiting for the human soldier to validate the operation. Finally, the management of communication among the units of an army has been revolutionized radically by the use of ICTs. Communication is a very important aspect of warfare. It concerns the analysis of the enemy’s resources and strategy and the definition of an army’s own tactics on the battlefield. NCW and C4ISR represent a major revolution in this respect. An example of such revolution is the use of iPhone and Android devices. Today, the US army is testing the use of these devices to access intelligence data, display videos made by drones flying over the battlefields, constantly update maps and information on tactics and strategy, and, generally speaking, gather all the necessary information to overwhelm the enemy. Changing Nature of Conflict: States have been resilient in the face of technological change, and despite the increasingly rapid diffusion of information, states still shape the political space within which information flows (Keohane and Nye 1998; Herrera 2004). Yet state power has been diminished too. States have lost much of their control over monetary and fiscal policies, which are often dictated by global markets (Castells 1996, pp. 245, 254). The rapid movement of currency in and out of countries by currency speculators can extract a devastating cost on countries that do not have large currency reserves. States no longer monopolize scientific research. The Internet allows a global scientific community to exchange information on topics that can be easily exploited by terrorist organizations (Castells 1996, p. 125). The Internet has made it impossible for states, dictatorships as well as democracies, to monopolize the truth (Castells 1996, pp. 384, 486-487). Nor can they monopolize strategic information (Keohane and Nye 1998) – the information that confers great advantage only if competitors do not possess it – because states no longer control encryption technologies. Most critically, IT has made the most technologically advanced and powerful societies by traditional indices the most vulnerable to attack. A distinguishing hallmark of the information age is the â€Å"network,† which exploits the accessibility and availability of information, and computational and communicative speed, to organize and disseminate knowledge cheaply and efficiently (Harknett 2003). The strength of the network lies in its degree of connectivity. Connectivity can increase prosperity and military effectiveness, but it also creates vulnerabilities. Information-intensive military organizations are more vulnerable to information warfare because they are more information-dependent, while an adversary need not be information-dependent to disrupt the information lifeline of high-tech forces. Information-dependent societies are also more vulnerable to the infiltration of computer networks, databases, and the media, and to physical as well as cyber attacks on the very linkages upon which modern societies rely to function: communication, financial transaction, transportation, and energy resource networks. The same forces that have weakened states have empowered non-states. The information revolution has diffused and redistributed power to traditionally weaker actors. Terrorists have access to encryption technologies which increase their anonymity and make it difficult for states to disrupt and dismantle their operations. (Zanini and Edwards 2001, pp. 37-8) Global markets and the Internet make it possible to hire criminals, read about the design and dissemination of weapons of mass destruction, and coordinate international money laundering to finance nefarious activities (Kugler and Frost, eds. 001; Castells 2000, pp. 172, 180-182). Terrorists can now communicate with wider audiences and with each other over greater distances, recruit new members, and diffuse and control their operations more widely and from afar. Non-state actors also have increasing access to offensive information warfare capabilities because of their relative cheapness, accessibility and commercial origins (US GAO 1 996; Office of the Under Secretary for Defense for Acquisition and Technology 1996). Globalization, and the information technologies that undergird it, suggest that a small, well-organized group may be able to create the same havoc that was once the purview of states and large organizations with substantial amounts of resources. The availability off-the-shelf commercial technologies benefits smaller states and non-state actors, to be sure, but only the wealthiest and most powerful states will be able to leverage information technology to launch a â€Å"revolution in military affairs. The ability to gather, sort, process, transfer, and disseminate information over a wide geographic area to produce dominant battle space awareness will be a capability reserved for the most powerful (Keohane and Nye 1998). In this respect, information technology continues trends already underway in the evolution of combat that have enhanced the military effectiveness of states. IT makes conventional combat more accurate, thereby improving the efficiency of high explosive attacks. On the other hand, IT also continues trends in warfare that circumvent traditional military forces and which work in favor of weaker states and non-states. Like strategic bombing and counter-value nuclear targeting, efforts to destroy or punish an adversary by bypassing destruction of his armed forces and directly attacking his society, predate the information technology age. Techniques of information warfare provide attackers with a broader array of tools and an ability to target more precisely and by non-lethal means the lifelines upon which advanced societies rely: power grids, phone systems, transportation networks, and airplane guidance systems. Information is not only a means to boost the effectiveness of lethal technologies, but opens up the possibility of non-lethal attacks that can incapacitate, defeat, deter or coerce an adversary, attacks that can be launched by individuals and private groups in addition to professional militaries. Warfare is no longer an activity exclusively the province of the state. Information is something that states, organized for success in the industrial age, do not have a comparative advantage in exploiting. John Arquilla and David Ronfeldt argue that the information revolution is strengthening the network form of organization over hierarchical forms, that non-state actors can organize into networks more easily than traditional hierarchical state actors, and that the master of the network will gain major advantages over hierarchies because hierarchies have a difficult time fighting networks. (Arquilla and Ronfeldt 2001, pp. 1, 15. ) States are run by large hierarchical organizations with clearly delineated structures and functions. By contrast, a more efficient organizational structure for the knowledge economy is the network of operatives, or â€Å"knowledge workers† not bound by geographic location. This is precisely the type of organizational structure being adopted by terrorist groups as they adapt to the information age. There is evidence that adaptation is quicker in flat hierarchies or matrix organizations than it is in the steep pyramidal hierarchies that run the modern nation-state; that flatter networks have a much shorter learning curve than do hierarchically networked organizations (Areieli 2003). The higher the hierarchy, the faster it operates if it is doing something it has already foreseen and thus for which it is prepared. If, on the other hand, a scenario requires the development of new processes that were not foreseen, the flatter organization is better at learning. Matrix organizations are more creative and innovative. According to Castells, the performance of a network depends on two fundamental attributes: â€Å"its connectedness that is its structural ability to facilitate noise-free communication between its components; its onsistency, that is the extent to which there is sharing of interests between the network’s goals and the goals of its components† (Castells 1996, p. 171). On both criteria, large state bureaucracies suffer serious disadvantages. Informal war: Informal war is armed conflict where at least one of the antagonists is a non-state entity such as an insurgent army or ethnic militia. It is the descendent of what became known as low intens ity conflict in the 1980s. Like today, future informal war will be based on some combination of ethnicity, race, regionalism, economics, personality, and ideology. Often ambitious and unscrupulous leaders will use ethnicity, race, and religion to mobilize support for what is essentially a quest for personal power. The objectives in informal war may be autonomy, separation, outright control of the state, a change of policy, control of resources, or, â€Å"justice† as defined by those who use force. Informal war will grow from the culture of violence which has spread around the world in past decades, flowing from endemic conflict, crime, the drug trade, the proliferation of weapons, and the trivialization of violence through popular culture. In many parts of the world, violence has become routine. Whole generations now see it as normal. In this setting, informal war will remain common, in part because of the declining effectiveness of states. Traditionally, governments could preserve internal order by rewarding regions or groups of society which supported the government, punishing those which did not, and, with wise leadership, preempting conflict and violence through economic development. In a globalized economy, the ability of governments to control and manipulate the economy is diminished, thus taking away one of their prime tools for quelling dissent and rewarding support. In regions where the state was inherently weak, many nations have large areas of territory beyond the control of the government. And, as political, economic, and military factors constrain traditional cross border invasion, proxy aggression has become a more attractive strategic option. Regimes unwilling to suffer the sanctions and opprobrium that results from invading one’s neighbors find that supporting the enemies of one’s neighbors is often overlooked. This is not likely to change in coming decades. Finally, the combination of globalization and the Cold War have fueled the growth of an international arms market at the same time that the international drug traffic and the coalescence of international criminal networks have provided sources of income for insurgents, terrorists, and militias. With enough money, anyone can equip a powerful military force. With a willingness to use crime, nearly anyone can generate enough money. Informal war is not only more common than in the past, but also more strategically significant. This is true, in part, because of the rarity of formal war but also because of interconnectedness. What Martin Libicki calls â€Å"the globalization of perception†Ã¢â‚¬â€the ability of people to know what is happening everywhere—means that obscure conflicts can become headline news. There are no backwaters any more. As suffering is broadcast around the world, calls mount for intervention of one sort or the other. Groups engaged in informal war use personal and technological interconnectedness to publicize their cause, building bridges with a web of organizations and institutions. The Zapatista movement in southern Mexico is a model for this process. The Zapatistas, in conjunction with a plethora of left-leaning Latin Americanists and human rights organizations, used of the Internet to build international support with web pages housed on servers at places like the University of California, Swarthmore, and the University of Texas. This electronic coalition-building was so sophisticated that a group of researchers from the RAND Corporation labeled it â€Å"social netwar. Undoubtedly, more organizations will follow this path, blending the expertise of traditional political movements with the cutting-edge advertising and marketing techniques that the information revolution has spawned. A defining feature of the information revolution is that perception matters as much as tangible things. This will certainly hold for informal warfare. Future strategists will find that crafting an â€Å"image assessment† or â€Å"perception map† of a conflict will be a central part of their planning. In failed states, informal war may be symmetric as militias, brigand bands, and warlord armies fight each other. At other times, it may be asymmetric as state militaries, perhaps with outside assistance, fight against insurgents, militias, brigands, or warlord armies. Future insurgents would need to perform the same functions of defense, support, and the pursuit of victory, but will find new ways to do so. In terms of defense, dispersion is likely to be strategic as well as tactical. There will be few sanctuaries for insurgent headquarters in an era of global linkages, pervasive sensor webs, nd standoff weapons, so astute insurgents will spread their command and control apparatus around the world. Information technology will make this feasible. Right wing anti-government theorists in the United States have already developed a concept they call â€Å"leaderless resistance† in which disassociated terrorists work toward a common goal and become aware of each other’s action s through media publicity. The information revolution will provide the opportunity for â€Å"virtual leadership† of insurgencies which do not choose the anarchical path of â€Å"leaderless resistance. The top leadership might never be in the same physical location. The organization itself is likely to be highly decentralized with specialized nodes for key functions like combat operations, terrorism, fund raising, intelligence, and political warfare. In many cases, insurgent networks will themselves be part of a broader global network unified by opposition to the existing political and economic order. Informal war in the coming decades will not represent a total break with its current variants. It will still entail hands on combat, with noncombatants as pawns and victims. Insurgents, militias, and other organizations which use it will seek ways to raise the costs of conflict for state forces. Gray Area War: As the Cold War ended defense analysts like Max G. Manwaring noted the rising danger from â€Å"gray area phenomena† that combined elements of traditional war-fighting with those of organized crime. Gray area war is likely to increase in strategic significance in the early decades of the 21st century. To an extent, this is a return to historical normalcy after the abnormality of the Cold War. Today, gray area threats are increasing in strategic significance. Information technology, with its tendency to disperse information, shift advantages to flexible, networked organizations, and facilitate the creation of alliances or coalitions, has made gray area enemies more dangerous than in the past. For small or weak countries, the challenge is particularly dire. Not only are their security forces and intelligence communities less proficient, but the potential impact of gray area threats is amplified by the need to attract outside capital. In this era of globalization and interconnectedness, prosperity and stability within a state are contingent on capital inflows. Except in nations that possess one of the very rare high-payoff natural resources like petroleum, capital inflows require stability and security. In places like Colombia, South Africa, Central Asia, and the Caucuses, foreign investment is diminished by criminal activity and the insecurity it spawns. This makes gray area threats a serious security challenge. Gray area war involves an enemy or a network of enemies that seeks primarily profit, but which has political overtones and a substantially greater capability for strategic planning and the conduct of armed conflict than traditional criminal groups. Like future insurgents, future networked gray area enemies may have nodes that are purely political, some political elements that use informal war, and other components that are purely criminal. This greatly complicates the task of security forces that must deal with them. Because gray area enemies fall in between the realm of national security and law enforcement, the security forces that confront them must also be a â€Å"gray† blend of the military and the police. Like the military, security forces must have substantial fire power (both traditional and informational), and the ability to approach problems. But these security forces also must have characteristics of law enforcement, working within legal procedures and respecting legal rights. Even though the objective will be monetary rather than purely political, violence will be goal-oriented. Astrategic gray area war will consist primarily of turf battles between armed gangs or militias. It may be related to refugee movements, ethnic conflict, ecological degradation, or struggles for political power (as in Jamaica in the 1990s, where political parties used street gangs to augment their influence). When astrategic gray area war is linked to struggles for political power, the armed forces (such as they are) will be serving as mercenaries only partially controlled by their paymasters, rather than armed units under the actual command of political authorities. Strategic Information warfare: Formal, informal, and gray area war are all logical extensions of existing types. Technology, though, could force or allow more radical change in the conduct of armed conflict. For instance, information may become an actual weapon rather than simply a tool that supports traditional kinetic weapons. Future war may see attacks via computer viruses, worms, logic bombs, and trojan horses rather than bullets, bombs, and missiles. This is simply the latest version of an idea with recent antecedents in military history. Today strategic information warfare remains simply a concept or theory. The technology to wage it does not exist. Even if it did, strategists cannot be certain strategic information warfare would have the intended psychological effect. Would the destruction of a state’s infrastructure truly cause psychological collapse? Would the failure of banking, commercial, and transportation systems crush the will of a people or steel it? But until infrastructure warfare is proven ineffective, states and non-state actors which have the capacity to attempt it probably will, doing so because it appears potentially effective and less risky than other forms of armed conflict. Future infrastructure war could take two forms. In one version, strategic information attacks would be used to prepare for or support conventional military operations to weaken an enemy’s ability to mobilize or deploy force. The second possible form would be â€Å"stand alone† strategic information warfare. This might take the form of a sustained campaign designed for decisive victory or, more likely, as a series of raids designed to punish or coerce an enemy But should cyber-attacks, whether as part of strategic information warfare or as terrorism, become common, the traditional advantage large and rich states hold in armed conflict might erode. Cyber-attacks require much less expensive equipment than traditional ones. The necessary skills exist in the civilian information technology world. One of the things that made nation-states the most effective organizations for waging industrial age war was the expense of troops, equipment and supplies. Conventional industrial-age war was expensive and wasteful. Only organizations that could mobilize large amounts of money flesh, and material could succeed at it. But if it becomes possible to wage war using a handful of computers with internet connections, a vast array of organizations may choose to join the fray. Non-state organizations could be as effective as states. Private entities might be able to match state armed forces. While substantial movement is underway on the defense of national information infrastructure, offensive information warfare is more controversial. Following the 1999 air campaign against Serbia, there were reports that the United States had used offensive information warfare and thus â€Å"triggered a super-weapon that catapulted the country into a military era that could forever alter the ways of war and the march of history. According to this story, the U. S. military targeted Serbia’s command and control network and telephone system. The Future Battlefield: The information revolution is transforming warfare. No longer will massive dug-in Armies, armadas and Air Forces fight bloody attritional battles. Instead, small highly mobile forces, armed with real time information from satellites and terrestrially deployed battlefield sensors, will strike with lighteni ng speed at unexpected locations. On the battlefield of the future, enemy forces will be, located, tracked and targetted almost instantaneously through the use of: * Sensors and their fusion with a view to presenting an integrated highly reliable intelligence picture in real time. * Surveillance devices that unceasingly seek and shadow the enemy. * Data-links and computer-generated battle picture, task tables and â€Å"maps that change scale and overlay differing types of information in response to voice requests. † * Automated fire control, with first round kill probabilities approaching near certainty. Simulation, visualization and virtually in planning, and testing concepts and weapon effectiveness. This would balance out the need for large forces to overwhelm the opponent physically. Control function will be decentralized and shared at all levels of command. Combat will be in tandem to intelligence gathering. Non-lethal, soft-kill electronic weapons will assume as much importance as highly lethal, hard-kil l weapons. Intelligent command posts and paperless headquarters will be the form. A Commander will be of a different breed-priding more in his lap-top than his baton. He will be his own staff officer. Changing Perception of War and its implications on poorly governed country: The idea that weak states can compromise security — most obviously by providing havens for terrorists but also by incubating organized crime, spurring waves of migrants, and undermining global efforts to control environmental threats and disease — is no longer much contested. –Washington Post, June 9. 2004 A majority of states in the contemporary security environment can be classified as weak. These states exhibit a limited ability to control their own territories because, in part, they do not have a monopoly on the use of force within their borders. They also struggle to provide security or deliver major services to large segments of their populations. These vulnerabilities generate security predicaments that propel weak regimes—both democratic and authoritarian—to act in opportunistic ways. Because they lack conventional capabilities, out of necessity, weak states will have to be opportunistic in their use of the limited instruments they have available for security and survival. The threat of information warfare should be understood within a broad vision of global power that is based on an up-dated version of Mao Zedong’s theory of the ‘Three Worlds’. Just as Mao believed that the world was divided into three tiers of states, with the superpowers at the top, the developed states in the middle and the developing states at the bottom, in the information age is also supposed to be three types of state. At the top of the pile is the ‘information hegemony state’, asserting its control by dominating the telecommunications infrastructure, software development, and by reaping profits from the use of information and the Internet. After this comes the ‘information sovereign state’, exemplified by those European states that have accumulated sufficient know-how to exert independent control over their information resources and derive profits from them, and to protect themselves from information hegemony. At the bottom of the pile are the ‘information colonial and semi-colonial states’, which have no choice but to accept the information that is forced on them by other states. They are thus left vulnerable to exploitation because they lack the means to protect themselves from hegemonic power. In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. The significance of asymmetric warfare, in both civilian and military realms become such an important subject for study to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the West military superiority can be seriously undermined by asymmetric threats. Conclusion: It is said that nothing is permanent except change. This is particularly true in the information age. It is important to understand the nature of the new world information order in order to be effective in foreign policy initiatives and to conduct the international relations. The information revolution throws up various contradictory phenomena. It includes the strengthening of the forces of anarchy and control. The revolution empowers individuals and elites. It breaks down hierarchies and creates new power structures. It offers more choices and too many choices, greater insight and more fog. It reduces the risk to soldiers in warfare and vastly increases the cost of conflict. It can lead to supremacy of the possessors of information technologies while it leads to vulnerabilities to the same possessors from weaker nations. It cedes some state authority to markets, to transnational entities and to non-state actors and as a result produces political forces calling for the strengthening of the state. However, a mere look at some of the manifestations of the arrival of information technology in international relations, clearly brings out how the nature and exercise of power have been permanently altered. Benjamin Barber describes a world that is both coming together and falling apart in his book Jihad Against McWorld. He describes a world where the nation state is losing its influence and where the world is returning to tribalism, regionalism, and the ethnocentric warfare that characterized much of the earlier human history. This problem is most apparent in the developing world where we continue to see the spread of disease, continuing humanitarian crisis, political and economic instability, and ethnic, tribal, civil, and drug related war. There are several themes that are consistent across these global futures. The first is conflict. The negative effects of globalization will continue to promote regionalism, tribalism, and conflict in the developing world. Secondly, nations with uncontrollable population growth, a scarcity of natural resources, and poor government systems will fail to benefit from globalization regardless of its effects on the rest of the world. Thirdly, technology will continue to be exploited to benefit developed nations and illicit criminal/terrorist networks, and will have little affect on the developing world. In all scenarios the power of the state will weaken and the power of the non-state networked actor will continue to expand with the help of the tools of globalization. References: Paul D. Williams. (2008). War. In: Paul D. Williams Security Studies: An Introduction. New York: Routledge. p151-p171. Akshay Joshi. (2010). The Information Revolution and National Power:Political Aspects-II. Available: www. idsa. org. Last accessed 13rd November 2011. Alvin and Heidi Toffler, War and Anti-War: Survival at the Dawn of the 21st Century, Boston: Little, Brown and Company, 1993. Robert O. Keohane and Joseph S. Nye, Jr. , â€Å"Power and Interdependence in the Information Age,† Foreign Affairs, Vol. 77, No. 5, September/October 1998. Steven Metz. (2010). ARMED CONFLICT IN THE 21st CENTURY:. Strategic Studies Institute. 01 (1), 65-119. Arquilla, J. (1998). Can information warfare ever be just? Ethics and Information Technology, 1(3), 203-212. Floridi, L. (2009). The information Society and Its Philosophy. The Information Society, 25(3), 153-158. Steven, Doglous, 2002. Information Warfare: a Philosophical Perspective. 1. London: University of Hertfordshire. Robert O. Keohane and Joseph S. Nye, Jr.. (1998). Power and Interdependence in the Information Age. Foreign Affairs. v. 77 (5), 1-10 David J. Rothkopf, â€Å"Cyberpolitik: The Changing Nature of Power in the Information Age†, Journal of International Affairs, Spring 1998, p. 27. Akshay Joshi, â€Å"The Information Revolution and National Power: Political Aspects-I†, Strategic Analysis, August 1999. Jessica Mathews, â€Å"Powershift†, Foreign Affairs, January/February 1997, pp. 50-55. Carl von Clausewitz, On War, edited and translated by Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1976). The seminal discussion of the political philosophy of war. Emily O. Goldman and Leo J. Blanken, 2011, THE ECONOMIC FOUNDATIONS OF MILITARY POWER, California, University of California-Davis

Sunday, September 29, 2019

Different Departmentalization in Malaysia Essay

Introduction The search for competitive advantage, write management consultants and educators David Nadler and Michael Tushman, is â€Å"the defining goal of modern-day business. † Competing by Design: The Power of Organizational Architecture, is their guide to reaching that goal through total integration of corporate structure, workplace culture, and employee motivation. Bringing all such processes together into one unified organization, they contend, is as important to a company’s future as the architectural unity of the building that houses it. Organizational Design is gaining more importance in human resource management as organizations are rethinking their role in the marketplace, their position vis a vis competitors, and their long term strategy. A key strategy in aligning the workforce with business goals, Organizational Design seeks to maximize workforce effectiveness while minimizing or maintaining costs. Five basic organizational structures are used in Organizational Design and adapted to an organization’s needs Basic Organizational Designs Have Six Structure Elements. . Specialization-a process in which different individuals and units perform different task. 2. Chain Of Command-is the unbroken line of authority that extend from the top of the organizations to the lowest echelon and clarifies who reports whom.

Saturday, September 28, 2019

Didion’s on Morality Essay

What is it that forms and drives our â€Å"moral behaviors†? Are we born with a basic sense of morality or do we develop a set of moral â€Å"social codes† to keep society from falling into chaos and anarchy? In her essay â€Å"On Morality,† Joan Didion dissects what lies beneath the surface of humanity’s morality. By recounting several stories and historical events, she shows that morality at its basic â€Å"most primitive level† is nothing more than â€Å"our loyalties to the ones we love,† everything else is subjective. Didion’s first story points out our loyalty to family. She is in Death Valley writing an article about â€Å"morality,† â€Å"a word [she] distrust more every day.† She relates a story about a young man who was drunk, had a car accident, and died while driving to Death Valley. â€Å"His girl was found alive but bleeding internally, deep in shock,† Didion states. She talked to the nurse who had driven his girl 185 miles to the nearest doctor. The nurse’s husband had stayed with the body until the coroner could get there. The nurse said, â€Å"You just can’t leave a body on the highway, it’s immoral.† According to Didion this â€Å"was one instance in which [she] did not distrust the word, because [the nurse] meant something quite specific.† She argues we don’t desert a body for even a few minutes lest it be desecrated. Didion claims this is more than â€Å"only a sentimental consideration.† She claims that we promise each other to try and retrieve our casualties and not abandon our dead; it is more than a sentimental consideration. She stresses this point by saying that â€Å"if, in the simplest terms, our upbringing is good enough – we stay with the body, or have bad dreams.† Her point is that morality at its most â€Å"primary† level is a sense of â€Å"loyalty† to one another that we learned from our loved ones. She is saying that we stick with our loved ones no matter what, in sickness, in health, in bad times and good times; we don’t abandon our dead because we don’t want someone to abandon us. She is professing that morality is to do what we think is right; whatever is necessary to meet our â€Å"primary loyalties† to care for our loved ones, even if it means sacrificing ourselves. Didion emphatically states she is talking about a â€Å"wagon-train morality,† and â€Å"For better or for worse, we are what we learned as children.† She talks about her childhood and hearing â€Å"graphic litanies about the Donner-Reed party and the Jayhawkers. She maintains they â€Å"failed in their loyalties to each other,† and â€Å"deserted one another.† She says they â€Å"breached their primary loyalties,† or they would not have been in those situations. If we go against our â€Å"primary loyalties† we have failed, we regret it, and thus â€Å"have bad dreams.† Didion insist that â€Å"we have no way of knowing†¦what is ‘right’ and what is ‘wrong,’ what is ‘good and what is ‘evil’.† She sees politics, and public policy falsely assigned â€Å"aspects of morality.† She warns us not to delude ourselves into thinking that because we want or need something â€Å"that it is a moral imperative that we have it, then is when we join the fashionable madmen.† She is saying this will be our demise, and she may well be correct. Hitler’s idea that he had â€Å"a moral imperative† to â€Å"purify the Aryan race† serves as a poignant reminder of such a delusion. In 1939 Hitler’s Nazi army invaded Poland and started World War II. World War II came to an end in large part due to the United States dropping two atomic bombs. If the war had continued and escalated to the point of Hitler’s Nazis and the United States dropping more atomic bombs we could have destroyed most, if not all, of humanity, the ultimate act of â€Å"fashionable madmen.† We may believe our behaviors are just and righteous, but Didion’s essay makes us closely examine our motives and morals. She contends that madmen, murders, war criminals and religious icons throughout history have said â€Å"I followed my own conscience.† â€Å"I did what I thought was right.† â€Å"Maybe we have all said it and maybe we have been wrong.† She shows us that our â€Å"moral codes† are often subjective and fallacious, that we rationalize and justify our actions to suit our ulterior motives, and our only true morality is â€Å"our loyalty to those we love.† It is this â€Å"loyalty to those we love† that forms our families, then our cities, our states, our countries and ultimately our global community. Without these â€Å"moral codes,† social order would break down into chaos and anarchy.

Friday, September 27, 2019

Fruit Juices Marketing Essay Example | Topics and Well Written Essays - 750 words

Fruit Juices Marketing - Essay Example The product Fruit juices, in general, has a huge distribution channel and is easily available at any store or shop. The product is placed on a priority list by the vendors according to its popularity. The product uses mass marketing because the target market is not segmented. This is due to the popularity and attributes of the product. Places that have hot climate are ideal for placing fruit juices, as cold fruit juices are essential to re-establish the lost energy in hot and humid climates. The ideal placements of the product in a shop are the top shelves of the fridge so that the people coming in and going out can see the product easily. While studying the market and segment potential we realized that the middle and upper class had the most potential for our product because a fruit juice holding the qualities of both an energy drink and a fruit juice is currently not present in these segments of the market. The major decisions to be made in this phase are the marketing coverage tha t the product will have for example whether it would follow inclusive exclusive or selective distribution, transportation decisions would be made, Inventory management will involve all the aspects of the inventory, for example, a specific level of inventory that needs to be maintained. The vendors of the product also need to be decided. By inclusive coverage what we mean here is that the whole country would be covered to distribute the fruit juices to the vendors this is suitable when the product has a mass marketing strategy.... The concessions and discount offers are dependent on the factor that whether the company wants to capture the share of the market or whether they are just introducing the product or want to earn profits from the beginning. Place The product Fruit juices in general has a huge distribution channel and is easily available at any store or shop. The product is placed in a priority list by the vendors according to its popularity. The product uses mass marketing because the target market is not segmented. This is due to the popularity and attributes of the product. Places that have hot climate are ideal for placing fruit juices, as cold fruit juices are essential to re-establish the lost energy in hot and humid climates. The ideal placements of the product in a shop are the top shelves of the fridge so that the people coming in and going out can see the product easily. While studying the market and segment potential we realized that the middle and upper class had the most potential for our product because a fruit juice holding the qualities of both a energy drink and a fruit juice is currently not present in these segments of the market. The major decisions to be made in this phase are the marketing coverage that t he product will have for example whether it would follow inclusive exclusive or selective distribution, transportation decisions would be made, Inventory management will involve all the aspects of the inventory for example specific level of inventory that needs to be maintained. The vendors of the product also need to be decided. By inclusive coverage what we mean here is that the whole country would be covered to distribute the fruit juices to the vendors this is suitable when the product has a mass marketing strategy

Thursday, September 26, 2019

The affects of children raised by homosexual parents Research Paper

The affects of children raised by homosexual parents - Research Paper Example This is because many cultures do not view the homosexual lifestyle as ethical and thus feel that children who are adopted by homosexual parents are likely to be subjected to abuses of different kinds. The principle argument against gay parenting is focused on the assertion that marriage is principally a dual-gendered institution which has the ability to naturally procreate. Marriage is the sole institution that is tasked with producing human capital for the coming generations. Same-sex parents cannot naturally produce children. This is an obvious indication; according to many opponents of gay parenting those children who are adopted by same sex parents are likely to suffer emotionally and physically, in some cases. This will happen because gay parents do not have the skills necessary to bring up well adjusted children who will benefit humankind. Statistics According to Regnerus (2012) more same sex couples are able to adopt children today than was the case in the past Owing to the ra tification of laws, mainly in developed nations, which recognize the rights of same sex parents. In America alone, it is estimated that 65, 500 children have been adopted into same sex unions. California has the largest number of same sex couples (16, 000) who have adopted children. According to Brodzinsky and Evan B. Donaldson Adoption Institute (2011) foreign born adopted children are more likely to end up in same sex unions than American children. The Development of Children raised by Homosexual Parents Identity There are many studies that have been conducted on the issues and concerns that face children who are raised by homosexual parents. From these studies, it is evident that the most important factor has to do with identity. According to Wainright, Russell and Patterson (2004) children raised by homosexual parents, particularly if they were adopted and not the result of artificial insemination, tend to have more emotional challenges than those raised by heterosexual parents. While there are larger percentages of emotional disturbances among people with homosexual lifestyles, and this inadvertently affects any children they adopt, the main cause of turmoil in their children is likely to be Owing to identity issues, according to (Wainright, Russell and Patterson, 2004). Any adopted child requires a family with a mother and father more than children who were not adopted. The child will innately desire to identify with an institution that basically reflects the two people that gave him or her life. Being adopted by homosexual parents can result in more trauma other than that of abandonment because the child also has to deal with the incident of being in a family that is unlike that of his original parents. As far as the child can see, he or she has no has no biological chain. An adopted child already suffers from the wound of abandonment. Being put in a home with homosexual parents adds the responsibility of the child being forced to adapt to the affective life style choices of the adoptive parents. Any child who is given to national organizations for adoptive purposes has been separated from his or her primary caregiver- his mother. This, alone, could result in the incidence of attachment disorders. The attachment to a singular maternal individual in the first eight months of life is vital in the psychological development of any human being. Bringing up a

Mens Health Magazine Research Case Study Example | Topics and Well Written Essays - 1750 words

Mens Health Magazine Research - Case Study Example This cause may be based on observed phenomena that are directly or indirectly related to the deteriorating status of Americans' health. The next step is to establish a hypothesis to rationalize some feature of the observations (Hopper, K., 2008). Again, as far as hypothesis is concerned, the magazine's review has enough reason to speculate that children's overall health is parallel to the general lifestyle of its environment, either sanctioned by the government or common customs. The magazine has enough reasons to suspect that comparing cities' lifestyles would determine the status of children's health in these cities. The last step of the scientific method is to meticulously test the hypothesis (Hopper, K., 2008). Keep in mind that hypotheses cannot be proven (Samdahl, D. M., 1997). One can only fail to refute it. As early as now, one may actually say that Men's Health Magazine's review on the fittest and fattest cities for kids is a theory that is neither proven nor unproven. Facts about this statement will be discussed below. As a requirement, scientific method eliminates a hypothesis if tests constantly contradict the prediction. A hypothesis is only as valuable as its capacity to consistently forecast test outcomes no matter how great a hypothesis sounds. One should also remember that a hypothesis or prediction is not important if it is not testable and quantitative (Samdahl, D. M., 1997). Men's Health Magazine's theory is valid, quantitative, and testable. However, scientific method was not used quantifying and testing the publication's theory. The results are also not reliable and tend to change with a little addition or subtraction of the original data gathered. Men Health Magazine's review was based on these collected data: report by the Centers for Disease Control and Prevention, reports by the American Heart Association and the National Association for Sport and Physical Education, statistics of winners of the President's Challenge, statistics by the CDC and Claritas, statistics by Economic Census, and the magazine's survey on the amount of fast food consumed within a month (Colleti, J., 2007). All these were quantitative researches on adults' lifestyle --- their exercise habits and eating habits --- and percentage of overweight adult population. Other data collected were reports on the number of fast-food restaurants per capita and sports activities (Colleti, J., 2007) offered to each child. A quantitative type of research would have been sufficient for this review except for the fact that all data gathered were mostly reports on adults' lifestyle. It is like judging a building based on the engineer, without consideration to other essential factors such as the owner's budget for the construction, the timeframe given to finish the structure, etc. While it may be commonly agreed that corpulence is contagious and children have Research Methods 4 a tendency to mimic their adults (Snyder, C., 2007), focusing on this principle does not constitute a solid review. As far as health lifestyle is concerned, the

Wednesday, September 25, 2019

Discrimination and the Future of Marriage Coursework

Discrimination and the Future of Marriage - Coursework Example For instance, Miranda vs Arizona was something that proved to be in violation of fourth amendment. As far as the 14th amendment is concerned, In addition, the Fourteenth Amendment guarantees equal protection under the law while the Fifteenth Amendment declines racial discrimination during elections. However one must wonder, even with all the legislations enacted, discrimination continues to be the focal point in society. The first section is violated by DOMA because it induces â€Å"abridge the privileges of immunities of the citizens.† Since DOMA strictly confines a heterogeneous marriage, it goes against the fourteenth amendment. The fourteenth amendment allows individuals to have equal rights amendment, but the Supreme Court took this approach very subjectively. The 14th amendment is explicit that, â€Å"Congress shall have power to enforce, by appropriate legislation, the provisions of this article. At this point, the congress exercises its full power by ensuring that marriages are

Tuesday, September 24, 2019

Discuss how certain advertising strategies can be used to fool or Essay

Discuss how certain advertising strategies can be used to fool or manipulate consumers - Essay Example Some others try to attain the maximum attention through incessant talk. Such people are always the life of the party, where they catch the glimpse of all those around them. When a group of people is gathered in a room, the attention of all people is towards the one who talks more. There is nothing wrong with talking itself. However, utilizing â€Å"the gift of gab† alone is not enough to develop a pleasing personality. However, there are a lot of people who draw the attention of others not just by loose talking but informing, enlightening and persuading through their talk. There are some who are shy and reluctant to speak as they would make any mistake. Such people develop low-self esteem thinking that they do not have anything sufficient to contribute to the conversation. People who want to draw attention to themselves dress provocatively, exhibit incongruously seductive, and behave in a flirtatious manner. In order to get the maximum attention they shift their emotions rapid ly while interacting with another person. Moreover, while talking with somebody, such persons behave very dramatically as though presenting in front of an audience. However, they appear to have lack of genuineness. To be the center of attraction, they want continuous reassurance and support form others about each of their activity. And so, they are always overly concerned about their physical appearance and the way how others are looking at them. The most important weakness of such people is that they are easily influenced by others. They are highly sensitive to criticism and cannot withstand any disapproval from others. To obtain the attraction of all, they are ready to do anything and thus make rash decisions. They are always self-centered and seldom show concern for others. They are weak in maintaining a relationship and are bogus or shallow while dealing with others. Even further, they threaten or attempt to commit suicide to get the attention of the society. On the other hand, Histrionic Personality Disorder (HPD) is a condition referred as dramatic personality disorders. Such disorders are the negative impacts out of a person’s psychological imbalances. People who suffer from such disorder face with extreme and unsound emotions and distorted self-images. As Sperry points out, people having histrionic personality disorder depend on the comments of others and not believe their own feeling of self-worth (131). They always have an irresistible desire to be noticed, and often behave noticeably or inappropriately to grab the attention of others. The literal meaning of histrionic refers to dramatic or theatrical. The histrionic personality is commonly seen in women and in men, and the symptoms are evident by early adulthood. In almost all cases, the people with such disorder seem to have excellent social skills and talents; but they are more likely to use these skills to influence others in order that they could be the center of attention. They feel much uncomfortable unless they are noticed by all others. Even though the exact reason for Histrionic Personality Disorder is not found out, health care professionals suggest that both inherited and learned elements play vital roles in the development of such disorder. Besides environment, factors evolved with a child can create an atmosphere for the child to develop a disorder (Sperry, 131). Lack of sufficient criticism and punishment as a child, and other positive support elements are often an important factor

Monday, September 23, 2019

Paris Peace Conference 1919 Term Paper Example | Topics and Well Written Essays - 1500 words

Paris Peace Conference 1919 - Term Paper Example The mission to restore peace was proclaimed by President Wilson. All the documents present the authors’ quest for peace. This is portrayed with carefully chosen words that are used and the effect that these words have on the delegates that attended the conference. The Paris Peace Conference recorded an attendance of 27 countries with high-ranking representatives and aids who devised a Peace Treaty. The central power leaders who attended the conference included Prime Minister David Lloyd George of Great Britain, George Clemenceau of France, Italian Prime Minister Vittorio Orlando, and President Woodrow Wilson of the United States. During the Peace Conference, two themes were highly critical. The first theme was that each victorious ally from Europe had betrayed the diplomacy of the then president Wilson. Therefore, in so doing, they had deprived the post war international order of its moral justification1. The second theme was the Carthaginian settlement in which all the winning nations had virtually dismantled the country of Germany of all its economic and military power. Therefore, the main theme was that of restoring peace to the war torn nations while the secondary themes were of diplomacy and the Carthaginian settlement. These three themes each stand for itself and the three cannot be united as one theme. Key points of the speeches by the presidents of the four nations are evident. The then President of the United States, President Wilson, promised Poland free and secure access to the Baltic Sea. Wilson balanced antithetical considerations with his self-determination and patience2. France attended the conference with the aim of acquiring backup and security from the Germans. Therefore, the only way of achieving their goal was to ensure the Americans and the British take over. However, this was only possible if the two countries could give Germany such a punch that Germany could never rise again3. The Peace Conference Treaty which was

Sunday, September 22, 2019

Gautam Buddha Essay Example for Free

Gautam Buddha Essay Gautama Buddha, also known as Siddhartha Gautam, Shakyamuni, or simply the Buddha, was a spiritual teacher from ancient times and the founder of Buddhism. He is universally recognized by Buddhists as the Supreme Buddha (Sammasambuddha) of our age. Yet his exact date of birth and death is uncertain but a majority of historians date his lifetime from circa 623 B. C. to 543 B. C. He is one of the few luminaries in the history of humans who is such a wide and lasting influence to the people. There are countless stories of the Buddha each tradition, each culture, each time period has their own stories . It is believed that, immediately after his birth he took seven steps and on each step a lotus blossomed which represents the seven colours of rainbow. The tales say he was a son of a king raised in a palace with every imaginable luxury, he was called Siddhartha Gautama-a prince among a clan of warriors â€Å"When I was a child† he said â€Å"I was delicately brought up most delicately, a white sunshade was held over me day and night to protect me from cold, heat, dirt and dust. My father gave me three lotus’s ponds one where red lotuses bloomed, one where white lotuses bloomed, one where blue lotuses bloomed† Pali talkie Gautam Buddha is the key figure in Buddhism. Discourses, and monastic rules were summarized only after his death and memorized. Passed down by oral tradition, the Tripitak- the holy book of Buddhism is also written on pali language only after 400 years of his death which is divided into 3 parts 1st the rules that a Buddhist monk needs to follow, 2nd Buddha’s admonition and 3rd Accounts of Buddha’s life. Siddartha Gautam: Siddhartha Gautam was born in southern Nepal at the foot of the Himalayas on the famous gardens of Lumbini, which is located in the Terai plains of southern Nepal, testified by the inscription on the pillar erected by the Mauryan Emperor Asoka in 249 B. C. Siddhartha was a child with a contemplative bent of mind. He was inclined towards meditation and spiritual pursuits much against the wishes of his father. His father feared that Siddhartha might leave home, and so, kept tried to insulate him from the harsh realities of the world outside by keeping him inside the palace all the time. Sealed from pain and suffering Siddhartha indulged in a life of pure pleasure. Every whim satisfied every desire fulfilled. The Buddha once said â€Å"During the rainy season I stayed in my palace where I was entertained by musicians and dancing girls I never thought of leaving. † when he was sixteen his father draws him in tighter in to palace life, married him to his cousin which wasn’t long before they fell in love. But one day when he goes outside travelling through the kingdom, and he has the first of four encounters he sees an old man and he ask his attendants and attendants replied oh! That is the change, no human being could stay young everybody needs to grow old. Then on his next tour outside he sees a sick man and doesn’t quite understand what it is, again he ask his attendants then his attendants replied oh! That happens to all of us everybody gets sick and don’t think you are a prince and you don’t get sick your father, your mother everybody will become sick. Then he sees that it isn’t just a sick person in fact it’s the universal and something is stimulated inside of him so he keeps getting the chariot to take him out then he sees horror after horror. And on his third trip outside he meets a corps then he recognizes impermanence, suffering and death as a real state of things, the world that he has been protected, sealed or kept from seeing and he was shocked then he realized this is my fate too I will also become old I will also become sick and eventually I will also die, how do I deal with these things. And then on his fourth trip outside he sees the spiritual seeker someone who was decided to live a life completely other than his life in order to escape impermanence, sufferings and death. Soon after he left his family and Kingdom at the age of 29 and went into the forest in search of peace and truth. Siddhartha was alone in the world for the first time, on the bank of the nearby river he drew his sword â€Å"although my father and step mother were grieving with tears on their faces† Siddhartha said â€Å"I cut of my hair I put on the yellow robes and went forth from home into homelessness. I have been wounded by the enjoyment of the world and I had come out longing to obtained peace. † Then he wandered from place to place to gain knowledge. He met many cholars and saints but he was not satisfied. At last he started hard meditation bearing great physical suffering. Emaciated, exhausted Siddhartha tortures’ himself trying to destroy anything within himself that he sees it’s bad. It is said that Siddhartha had lived many life before this one as countless animals, innumerable human beings and even gods across four incalculable ages that secret text say and many eons experiencing life in all at different forms. The Buddha: Gautam Buddha seated under a pipal tree—now known as the Bodhi tree—in Bodh Gaya small town in north eastern India. For Buddhist there are hundreds of holy places but none more sacred than Bodh Gaya. It is the sacred point from which the buddhits faith radiates. It is their mecca or jeroselum or any other initiation forms of initiator. Then he vowed never to arise until he had found the truth so he sat down with his rags he was wearing under the shade of Bodhi tree at the bank of the river and began to meditate. It was spring time with a full moon on the sky at night, before the sun would rise Siddhartha’s long search would be over. Siddhartha now got transformed into Buddha or the enlightened one at the age of the thirty five. The pipal tree under which he got Enlightment came to be known as Bodhi Vriksha. Buddha saw nature of the people envy, jealousy and strong negative mental stage. He analyzed all the people in the world they are like the fishes riddling in the very shallow water. So Buddha he himself is afraid to teach the people. Then, the myth says the god BRAHMA himself comes to the Buddha kneeling down and asked Buddha to teach people what he had gains during all his life BRAHMA implies that is what every human needed to satisfied one’s life otherwise the human life would never be fulfilled. And then Buddha decided to give his teachings. For the remaining 45 years of his life, the Buddha devote his rest of his life bringing his teachings the â€Å"Dharma† the fundamental laws of all things into the world. He preached his first sermon in Sarnath, near Varanasi. He taught that the world is full of sorrows and people suffer on account of desire. Hence desires needed to be conquered by following Eightfold Path. Of these eight paths, the first three would ensure physical control, the next two ensures mental control, and the last two would ensure intellectual development. It is said that the Buddha traveled in the Gangetic Plain, in what is now Uttar Pradesh, Bihar and southern Nepal, teaching a diverse range of people: from nobles to outcaste street sweepers, murderers such as Angulimala, and cannibals such as Alavaka. Cast was irrelevant to the Buddha so his teachings focused within the universe. From the outset, Buddhism was equally open to all races and classes, and had no caste structure, as was the rule for most Hindus in the-then society. Bliss, nirvana the Buddha taught could be found in a freeing movement through the practice of meditation the Buddha showed to his followers how to come to the terms with their own roiling thoughts and desires by paying attention to them, by becoming aware becoming mindful. What Buddha realizes is that if we can get rid of this fundamental misunderstanding of the nature of itself based on egotism, we won’t screw up everything we do, because we are thinking about it in a wrong way. Once you stop centering your feelings about feelings on yourselves, what naturally arise are simple compassions, compassions for your own sufferings and others as well. For decades the Buddha shared his teachings all across north eastern India that all beings are happy, he taught weak or strong, great or small. He said let us cherish all creatures as a mother her only child. Bare foot in his robes he was still walking along the roads when he was eighty an old age was upon him his back hurt, his stomach was often in pain, â€Å"I am old worn out† he told to a trusted disciple â€Å"like a deflated craft held together within straps†, the world is so sweet he said that he could understands to wanting to live at least another century but he was fragile and exhausted he become ill at the village named Kushinagar near Nepal. Kushinagar is revered by the pilgrims where the Buddha finally left this world. It was in Kushinagar where he grew weak and has to laid on his side in a quite grove of Sal trees as near the end his disciples began to weep striking with grief. But the Buddha reassured them that all things change he said whatever is born is subject to decay. He was saying these is natural process he tells his disciples, use this time, use the energy here even this, for your own awakening , so he use even his own death and their sadness as a time to remind them of what they real task was. In short: Now, Buddhism is more than 2500 years old there are more than 350 million followers in the world who follows Buddhism. The gist is Buddhism arose as a result of Siddhartha Gautam’s quest for Enlightenment in around the 6th century BC. There is no belief in a personal God in Buddhism. It is not centered on the relationship between humanity and god. Buddhists believe that nothing is fixed or permanent- change is always possible. The two main Buddhist Sects are Theravada Buddhism and Mahayam Buddhism, but there are many more. There is not particular place where Buddhists can worships they can worships both at home or at a temple. The path to enlightenment is through the practice and development of morality, mediation and wisdom. â€Å"It may be that after I am gone that some of you will think that now we have no teacher but that is not how you should see it, let the dharma and the discipline that I have taught you be your teacher, all individual things pass away strive on untiringly† Buddha’s last words. The fundamental need for the peace is the peace in the individuals mind. We can give others only the values and idea that we possess. Only the happy and satisfied person, therefore, can provide the happiness and love to others and be able to unite people. The present world situation is the result of our way of thinking. World peace is possible only when all the people love each other. If everybody thinks about each other we would not have problems, but we are habitual in our thinking and define everything according to ourselves or group or community or country. If we steal from another, we steal from ourselves. Instead, we should learn to give and take care of things that belong to our family, to the school, or to the public. Proper conduct shows respect for oneself and others. Our bodies are gifts from our parents, so we should protect them from harm. Young people should especially keep their natures pure and develop their virtue. It is up to them to make the world a better place to live. Religion is religion only when it unites people and not if divides. We therefore, need conversation from leaders to masters, religious persons to spiritual persons to achieve a level of World Peace.

Saturday, September 21, 2019

How to Plan an Essay

How to Plan an Essay Writing the Draft Building Confidence The most important thing, when one starts writing the first draft is to start it with the confidence that it is not a difficult task. In order to start writing the good opening of the paper should not be an issue because these drafts have to be revised later and one can develop a better opening of paper. Writing the first draft of a paper, one should think that no grammar, perfect words or the structure of the writing matters and should only concentrate on presenting ideas only. It is important for writer to remember that the first draft that one writes is only for himself and nobody is going to read it, therefore, they should remain confident and should focus on the fact that the main purpose of the writing is to jot down the ideas. Drafting on Computer After doing the first draft on the computer, one should turn the computer off and again organize the thoughts and ideas on the paper and should think about the possible changes that they can make in the paper. After this task is finished, the writer should edit the first draft in accordance with it, but, should save all the revisions separately, to see later and to get encouragement that how far they have come and improved his writing skill. Multiple drafts should be saved with the name (like assignment 1 version 1, assignment 1 version 2 etc.) so that it becomes easier in future to access them easily and it is also important to highlight the changes that a writer has made in each draft. It becomes a reference for the future ad can assist the writer in improving it, although, before restarting the work, the last revised draft should be read, so that the writer gets the understanding that now which improvements their needs. Writing Rough Draft Before you start writing a rough draft, choose a quiet place where you have all the necessary equipment and material, this can help you in increasing your concentration. The writing seems easier, when we start with the easiest section and become successful in completing it because it can give the confidence that we have the ability to do this task efficiently. A good writing is one that engages maximum number of people and this can be done by using simple words and direct style. Imagining that we are talking to the reader can help the writer to write effectively and while giving instructions, one should visualize them performing in accordance with the instructions, this can help the writer to write instructions more clearly. It is important to keep on writing, until one section is complete because it helps in developing coherence and continuity in the section. Later the finished should be revised to make any possible changes. Keeping your Audience in Mind Writing from the reader’s perspective, keeping in mind the type of audience and using language in accordance with it, the level of understanding of the audience, diversity of audience and perspective of the audience are then important factors. We will discuss one by one, the factors that can help in writing a catering with the audience in an effective manner. Writing From the Audience’s Point of View No matter what the audience is, everyone wants to read the writing from his own perspective. When we write for a targeted audience; whether our colleagues, boss or the international community, we should keep in mind that we are choosing the point of view in accordance with it. If we are writing something for our boss, then we should keep in mind that we are explaining the problem and providing the information to the boss from his perspective. This thing can increase the affectivity of the writing and will assist in registering our point. It is important to know about the background of the reader because this can help to get the idea that which style can help in convincing the reader or providing the information to the reader in an efficient manner. If we have to write a report about a technical; part in manufacturing process and know about the level of expertise of the reader, we can use technical language in accordance with it. Accommodating Multiple Audiences When we write from multiple audiences, everyone has different background and this factor makes it difficult to adjust the writing in accordance with it. Since, audience with multiple background demands that all the people should be kept in mind and the level of the readers should be considered. For example, while writing instruction manual, one should write from the starters’ perspective because there are lot of people out there who might be using that particular equipment for the first time. Moreover, the diagrams can help the reader to grasp the point more easily and can make the writing reader friendly. Writing for international Audience While writing for the wide audience, one should keep in mind that there should not be culture bias and the style of the writing used is acceptable by lost of the people i.e. the writing style should not represent a specific region. Making the language simple and common can help the audience to relate with it and grasp the concept easily. Since there are different dialects of English in different region, then the writer should make his expression as common as possible. Persuading Your Audience If the writer has to persuade a targeted audience like management of the company; regarding flexibility in office hours, increasing bonuses for the staff; then one should enlist the advantages of taking that step and should mention the effects that it should have on the morale of the staff moreover, if the targeted audience is different than it is important to start the writing by initially explaining the benefits regarding the topic under discussion and later, writer should give examples from different fields and lastly the reference of the rules of the business. In precaution process, the mentioning of the rules of the business should be done in most soft manner because mentioning it in direct manner puts negative impression on audience. The ethics requires that the cons of the side that you have chosen should also be mentioned because the reader may not get any difficulty in ignorance and if all the process fails the blame might not fall on you. Establish Your Role and Voice as the Writer While writing, one should decide which role they have to take in order to be read and followed in a better way. It against depends on the type of the audience. The friendly writing style is always effective, but, a task is very critical and has to be done in time then the writer should explain the importance of the task and at the end should take an authoritative tone and order hat it needs o be completed in time. Sometimes, it is more effective if the subject of the writing adopts the authoritative tone and tells about the sensitivity of the situation. In normal circumstance, there is always audience which never reads a document, but, still wants to get that task done; in that situation it is important to give a title that can explain that hoe reading that document can help the audience. Development Strategies The strategies that are used to develop the ideas and the concept at the work place include: Explaining a Process Process of explaining deal with the idea of explaining to the reader working of an equipment, how a event or process took place or how to perform it. All these types demand a lot of concentration of the writer because, when explained in a proper sequence they can make it easier for reader to understand. While explaining the process, understanding the level of the audience is imortant. In the opening of the writing t is better to tell the importance of the process and then give the summary. Later when it is explained in detailed, it should be told how it is relevant or associated to a larger process. For example, if one explains the process of developing air brake system to the worker, then it should e done in detail and it should be mentioned that how much important it is for the working of the truck and how it will ensure safety in driving. This tells the reader about the sensitivity of the task and they try to do their job in a better way. Describing Information Describing the information means telling about the features and the appearance of the concepts and the objects that are to be used during the process. But, the description of the information varies from one field to another. In engineering terms it is important to give the specifications of the equipment in the technical term, to marketing professional it is important to tell about the significance and the usability of the product for the customers, most important features of a good description o that it is always clear and specific and covers all the issues in details. The length of the description may depend on the complexity of the process, but, no matter what the length of the writing is information should be described in a manner that it is understandable to the audience and is complete in all terms. In complex concepts, it is better explain stepwise. Defining Terms and Concepts Process of defining the terms is critical because it can give the actual concept of the term to the people related to your field and that of the other fields. Formal definition of the term, that has technical terms in it, can help the people of the related field to understand it more accurately, for example, torque is the cross product of distance vector and force vector. Informal definition that has both technical and simple forms makes it understandable to the people related to other fields for example torque is the cross product of distance vector (distance from knob to hinges) and force vector (force applied to open the door), whereas, extended definition comprises of multiple sentences to explain multiple concepts of the definition. For example torque is the cross product of distance vector and force vector. It means that if the knob is at the greater distance from the pivot (hinges), then greater torque will be produced and it will be easier to open the door. If the definite ar e assisted with figure, the written material become easier to understand. Explaining Cause and Effect It assists in providing information about why a thing happens and what consequences does it have. For example when we do not maintain our vehicle (cause) accidents might happen (effect) and due to these accidents we can have to bear the loss of finance or the life. it is better to provide evidence of your statement and that evidence should be relevant to the audience, has the power to persuade and can be explained by giving demonstrations. Writing an Opening The opening of the draft is really important to get the attention of the reader. The first sentence should be written in a way that it immediately attract reader to itself. Like on topic accidents due to drunk driving an effective sentence could be, do you know that 10,000 people lost their lives, his year in United States, due to drunk driving. The opening of the writing should have three features in it. Firstly, it should introduce the title effectively, secondly, should give some information about the writing and thirdly should focus the attention of the reader. Writing a Closing The closing of the paper or a draft should consider and should mention all the main points of the paper. No new concept should be introduced in the closing paragraph because it may confuse the reader. It is better to give information like email address at the end of the paper so that the reader may contact you if needed. It gives the impression that writer is responsible.

Friday, September 20, 2019

Notable Clauses In Icheme Contracts Construction Essay

Notable Clauses In Icheme Contracts Construction Essay A construction project can be have a good start. Owner according to their own actual situation choose Procurement Methods. And Then according to the time, quality, costs etc, choose the tendering methods. Finally according to their own construction project consider based on the main body of the building design select a standard form of contract. 2. Procurement Methods The procurement is a term used to describe the activities carried out by the client or employer is seeking to bring construction or renovation of buildings. It is a mechanism which provides a solution to the question: how do I get my project built? In most projects, the client (usually through their advisers or internal team) will start the procurement process by developing a project strategy. The strategy needs to weigh the benefits, risks, and budget constraints of a project to determine what is the most appropriate method, procurement contractual arrangements will be required. With every project, the clients concerns focus on time, cost and quality (or performance) in relation to both the design and construction of the building. Understanding of risk is very important, because although each procurement methods follow a comprehensive set of rules and procedures, there are risks associated with select any particular route. The JCT contract specifically for different procurement methods are used in the construction industry. There are three main procurement methods : Traditional system Client development projects of the business use cases, provide a brief, budget an designate a team of consultants to prepare a design, plus the tender document. Client appoints the construction contractor construction architect design, by the completion date of the contract and the agreed price. Usually much of the work is sub-contracted to specialist firms but the contractor remains liable. Consulting firm manage the contract on behalf of the client, and suggested that the relevant aspects of the design, progress and stage payments must be paid by the client. Separate contractors from design can mean lost opportunities for contractor or expert contractors to enter. This strategy is the choice of a low-risk client want to reduce their exposure to cost overruns, delays, or design failure. This is probably the most commonly used method of procurement and it is suitable for: all clients, including inexperienced clients complex projects and projects where functionality is a prime objective However, it is not suitable for fast track projects Figure 1: traditional procurement process Source: http://www.google.com.hk/imgres Design and build system The main contractor is responsible for both design and construction and will use either internal designers or employment consultants to perform design. Most of the construction work will be carried out by the experts or subcontractors. Design and build approach gives the client a single point of contact. However, the cost of construction costs submitted by the client, as well as an earlier design than the traditional method. While the risk transfer of the contractor, which is very important to the design of liability insurance is to keep it to cover the risk.Change by the client in the design can be expensive, because they affect the entire design and construction contract, not just the cost of the design team. This method of procurement involves the contractor being responsible for design as well as construction, it can be suitable for: all clients, including inexperienced clients and those requiring distance from the project. cost certainty faster track However, it is not suitable for: an uncertain or developing client brief complex buildings Figure 2: design and build procurement process Source: http://www.google.com.hk/imgres Management Contracting The client appoints designers and a contractor(management contractor) separately and pays the contractor a fee for managing the construction works. A feature is the early appointment of the contractor to work alongside the design team to develop a programme for construction and contribute to the design and costing of the works. The works are let competitively by the management contractor to subcontractors and specialists in appropriate works packages. This approach often means that design and the start on site overlap, with the design and tender packages becoming available just-in-time to suit the construction programme. Management contractor will not carry out construction work. This preserves the management independent contractors and strengthen a consulting firms relationship with its customers. Payment plus a consent fee based on the cost of works package to the management contractor. This is suitable for: fast track projects complex buildings a developing brief However, it is less suitable for: inexperienced clients cost certainty before starting construction clients wanting to pass risk to the contractor Figure 2: Management Contracting process Source: http://www.google.com.hk/imgres Tendering This offer the time needed to complete a project, money and other conditions related to contractual obligations to complete construction projects collectively form a tender. Management and business decisions to tender is called a tender, to do so is based on a variety of details, such as estimated. There are three types of tendering methods used in construction industry: 1. Open Tendering An open tender is a tender invitation sent to all interested contractors, so they can submit the tender. This process is considered to be one of the most fair way, even an unknown or new contractor can have the opportunity to get the contract. Advantage of the open tender To the high level of competition and contractors often give the best price and the other bidding methods. There is no limit bidders list, it does not allow favoritism. This is a very transparent process, to ensure that the contractors and the best price and meeting all the technical requirements to win the tender. This process is usually by procurement management board, its staff is trained to make this exercise and the Board to ensure that all procedures involved in the tender. The disadvantage of the public tender The low prices are usually damage the quality and often cause the client to get the low-quality work and night to complete the work. In view of its public tender, where the number does not limit the contractor bidding to become coarse, tender analysis and lengthy work often leads to delays and high cost. 2. Selective Tendering In this process, the selected contractors were invited to tender to tender. However, this approach leaves a lot of space prejudices. This process can reduce the competition for those invited to tender. The method has been applied to the case when building a little selective and requires high-tech and specialized expertise, skills and experience. Only those contractors to meet all these needs is to invite tenders. Advantage of selective tender An advertisement may produce several interested contractors and suitable Firms are selected to tender. The consultants may contact those they would wish to put on an ad-hoc list. Many local government and national institutions to maintain approved contractor list in certain categories, such as the type of work and cost range. Require the Contractor to include in the select list of bidders usually required to provide the information on their financial and technical performance, especially when you consider the type of work. National Joint Advisory Committee Building (NJCC) wrote a standard form of tender questionnaire Private so the contractor can be ready to answer related issues in advance. These problems are mainly processing projects in the past three years. Once the form has been completed, it can be used for a specific project or compile a list of the selected contractor 3. Negotiated Tendering. This process involves negotiations tender consulting client select contractors consultation contract, its terms and conditions. This process uses a special case. For example, usually in the case of an emergency, you need to complete a project in a very short period of time or complex contracts, financial and technical performance are difficult to identify. This proposed standard procedure for situations involving the safety of major national projects. STANDARD FORM OF CONTRACT A standard form contract (sometimes referred to as an adhesion or boilerplate contract) is a contract between the two parties, the terms and conditions of the contract party, the other is set on a either accept it or leave it stance with little or noability to negotiate terms that are more favorable to it. Example of the standard form of contract insurance (insurance companies decide what will and will not guarantee that the wording of the contract) and contracts with government agencies (in some terms must be included by law or regulation). There are many of the standard form of contract for international construction project. Such as FIDIC JCT IChemE etc. Standard Form Contracts: FIDIC FIDIC is International Federation of Consulting Engineers, the French acronym. It was founded in 1913, aims to promote the interests of engineering companies in the global consulting. It is best known for its range of standard contract conditions for the construction of plants and design industry. FIDIC form of contract is the most widely used form of the international community, including the World Bank, its projects. The the FIDIC rainbow kit new contract was published in 1999, including: Red Book: employer of construction conditions of contract for architectural and engineering design; Yellow book: Conditions of Contract for Plant and Design; Silver book: Conditions of Contract for EPC / Turnkey Engineering; Green book: a short form of the contract conditions. These new form of the first version and user-friendly design, with a standardized method to reduce the general conditions from the more than 60-year-old to 20 terms and conditions. Additional forms since 1999, including: Blue book: the contract dredging and reclamation; MDB / FIDIC Contract: FIDIC conditions included in the standard tender documents multilateral development banks; The White Paper: client / consultant model services agreement; Kims book: FIDIC design, construction and operation of the project. Red and yellow book has a similar structure, with 20 of the general conditions. Have guidance, assist in the preparation of the special conditions, and add specific conditions. The Red Book (construction contract for building and engineering employers) to work for the employer is responsible for the design. This is a re-contract, which means the employer and the contractor agreed to in the the contract rent type of work, and those interest rates will be applied to the amount of work, contractor implementation. Employers need a lot of risk is estimated to be more or less accurate, the contractor must ensure that the number of the unit price is enough. The yellow book (plants and design, construction contract) works designed for the use of contractors. This is a one-time contract, the Contractor undertakes to deliver the project, a fixed price. Contractors, therefore, requires a lot of risk. Standard form contracts: JCT JCT contract, in the form of the most common standard form of construction contract in the United Kingdom, accounting for about 70% of the UK project. The Joint Contracts Tribunal Joint Contracts Tribunal, composed of seven members represent a broad range of interests in the building and construction industry. It produces standard forms of contract, notes and other standard documentation used in industry. The JCTs intention, they represent a balance between the parties to allocate risk arising from contracts. The JCT suite of contracts The latest version is the 2011 package. Need to consider the to modify housing grants, construction and regeneration Act of 1996, thus affecting the payment. However, previous JCT is still in use. Main contract JCT suite (see the JCT Contract) listed below. This guide will focus on the following form: Standard construction contract (SBC); Design and build (DB). Format and structure A JCT contract in the standard format is: Articles of agreement; Contract matters: these contain specific information; Conditions of Contract; Timetable. The contract payments JCT flexible. They may allow pre-paid contractor from the employer, usually accompanied by payment of security such as bonds and / or invoice once the work is completed certification. Certification by an independent third party (such as architects, the employers agent or contract administrator). Usually paid by the temporary work progress. Design Build Contract D B is a popular form of contract in the JCT suite and is often used for large-scale, complex construction projects, such as stadiums, shopping centers and office buildings. It uses public and private sectors. The key characteristics contractor D B contract will design works to it by the employer based on demand (ie, employers hope from the building). The contractor will have a contractors proposal (set how the contractor will receive the needs of employers). Then, it will perform a total work (see the contractors proposal) Standard Building Contract Sometimes described as traditional contracting, the contractor will not be involved in any aspect of the design in a Southern Baptist. Works will be reference to the drawings and BOQ prepared by or on behalf of the employer to the contractor. BOQis actually a list of project construction cost (including a description of the number of projects and needs) and pay the foundation. Standard Form Contracts: IChemE The institution of Chemical Engineers (IChemE) is a global professional engineering organization, was founded in 1922. It creates two sets of forms of contract for international and UK projects in the process industries such as food production, chemical and pharmaceutical. These are turnkey contract for the project is transferred to the buyer in a ready-to-use condition. Each form of IChemE Contracts Manual contains a model form of agreement, general conditions and detailed guide pointed out to assist the user to prepare a contract. This guide provides a simple look at the three main IChemE forms of contract. The three major forms of contract IChemE contracts for the procurement process plants specialized machinery but can be used for other infrastructure projects. The three main forms of contract are color-coded according to the pricing mechanism. Red Book Lump sum, or fixed-price contract: A fixed price for the entire work; Contractor the risk of any additional costs exceed the fixed price; The contractor may still recover additional costs depending on the agreement. Green Book Repayment contract: Contractor may be required to recover the costs in the implementation; There is no pre-fixed price; The contractor will take fewer risks. Burgundy Book the target cost contract: Pricing mechanism is a variation in the terms of repayment; The costs can be claimed a fixed level (goal of); The final cost is higher or lower than this target, different gains or losses shared in an agreed proportion. The IChemE publication of the international form of red, green and Burgundy Books in 2007. Contract structure The contracts IChemE package follow the same basic structure: Agreement; contract conditions; generally; special: and other standard forms of contract, specific conditions are necessary and need to be drafted to meet the law applicable to the project. The other specific conditions may also be needed; specification; timetable. Notable clauses in IChemE contracts Extensive testing system: IChemE contracts contain a more comprehensive testing program for before and after the completion of, than some other standard forms of contract; Acquisition of tests and procedures: the IChemE detailed testing mechanism including separate tests when the project is completed, when the plant is in the employer receives. Analyses the contractors obligation against the design consultants liability during the design stage According to this project use the FIDIC(YELLOW BOOK) Contractors General Obligations The Contractor shall design, execution and completion of the works in accordance with the contract, shall remedy any defects in the works. Once completed, this work should be suitable for the purpose of work as defined in the contract. The Contractor shall provide plants and contractors in the file specified in the contract, and all contractor personnel, goods, supplies and other things and services, whether it is a temporary or permanent nature, requirements and the design, execution and completion of and repair defects.The Works shall include any work which is necessary to satisfy the Employers Requirements, The contractors proposal and timetable, or implied contract, and all the work (although not mentioned in the contract) is necessary, stable or complete, or safety, proper operation works. Appropriate, stability and security of the Contractor shall be responsible for all site all methods of operation, construction, and all the works. The Contractor shall, whenever required by the Engineer, submit a detailed arrangements and methods of using contractors for the execution of works. There was no significant change in these arrangements and methods should had informed the engineer. General Design Obligations Contractor shall implement responsible design works. Designers should be designed to prepare qualified engineers or other professionals to comply with the standards (if any) specified in the employers needs.Unless otherwise provided in the contract, the Contractor shall agree with the name of the matters and each designer and design subcontractors. The Contractor warrants that, he, his designers and subcontractors have the experience and capacity necessary for the design. Contractors, designers should be available to participate in the discussion of the engineers at any reasonable time, until the expiry date of the Defects Notification Period. Commencement of the works in the receipt of the notice under section 8.1 [Contractor shall carefully review the requirements of the employer (including design criteria and calculations, if any) and the items mentioned in paragraph 4.7 of the reference [set]. Within the time limit specified in the Appendix to Tender, calculated from the Commencement Date, the Contractor shall notify the Engineer of any error, error or other defect found a reference to the needs of employers, or these entries. After receiving this notice, the Engineer shall determine the terms of 13 years [variation and adjustment] applies, shall notify the Contractor accordingly.In a way, (taking into account the cost and time) an experienced contractor due diligence exercise will find the error, error or other defect when the inspection site and employer requirements before submission of tender, completion time may not be extended and the contract. The price shall not be adjusted. Conclusion First Based on this case study, the essay show us a Singaporean company proposes to build a 40-storey hotel with 2 levels of basements at City Square, Johor, facing the water front. And then the Singaporean company entered into a contract with Alpha Design Tech. Pvt.Ltd, a Singaporean design consultant. And Alpha Design Tech Pvt. Ltd is responsible for design and selection of contractor for the client. A Malaysian builder was awarded the project with condition that the Malaysia contractor company would enter into a contract with Alpha Design Tech Pvt. Ltd here on. So i think the most suitable procurement system is he novated design and build method. Because the client(Singaporean company ) want to use the design team(Alpha Design Tech. Pvt.Ltd) make plan so They reach the contract relationship. And design team to find think appropriate contractor, the contractor must be use the design teams drawing. Usually, this way is novated design and build method. Second in this case study The Singaporean company is concerned about other aspects, among others: facade lighting acoustic system mechanical engineering marine engineering fire engineering So this Singaporean company In order to find a more suitable for this project construction contractor, lists several requirements, This also reflects Singapore company chooses the selective tendering. finally the client is a Singaporean company, the design team Alpha Design Tech is a Singapore based multi-disciplinary consultant with architects and engineers from Singapore, Thailand, Philippines, and Hong Kong. The contractor is a Malaysia contractor company. So we should use the standard form of contract for international construction project. And FIDIC is the most Professional than others. According to the case study FIDIC(yellow book, Conditions of Contract for Plant and Design-Build ) the most suitable for this project. Through the case study. I to procurement, tendering, standard form of contract have more deep understanding.