Saturday, December 28, 2019

The Islamic State Of Iraq And Syria - 2064 Words

Just like any other religion it has goals and objectives. For example christianities goals are to get to heaven. How you do that is you must have a clean soul before you die. Just like catholicism Muslim has a variety of views about how to do things. ISIS’ goals are for everyone to become 100% muslim. The United States is uncertain on its position.The will that ISIS has is even more dangerous than anyone the world has seen. ISIS, or the Islamic State of Iraq and Syria has gotten famous for not only their beliefs but how they share them. ISIS has become famous for the many videos that have gone viral on social media websites and YouTube. They share videos of people being beheaded and executed, some executions came from being burned alive†¦show more content†¦There are billions of people using social media everyday, sites like facebook, twitter, and Instagram are big parts of spreading the beliefs of the Islamic State. When ISIS posts a video they will have the flag of the Islamic State show at the beginning and the end to let everyone know it was them. They like to showboat about how they killed someone by taking their head off. Also in some videos they will call out the United States and Barack Obama directly to make an even bigger impact on Americans. Barack Obama keeps trying to reason with ISIS but the leader Abu Bakr al-Baghdad does not want to reason he just wants what’s best for t he Islamic State. Barack Obama has referred to ISIS as the Islamic State of Iraq and Lebanon because of the involvement in Lebanon. As more and more views come in from the graphic content posted by ISIS the more and more known they get which is there as far as the US is concerned. ISIS also will execute people that are supposed spies. On December 2nd, 2015 a video was released of an ISIS member beheading an alleged Russian spy. The video was the member talking about how ISIS can find any spy any military sends in. Then in the end the alleged spy is beheaded with a simple army knife. By doing this it sends a message to everyone else that they should not spy on ISIS. Another video was posted of Yemen captives and the execution was the captives were shot an exploded by a missile. Also other uses of these executions are

Friday, December 20, 2019

In Cold Blood Literary Analysis - 765 Words

In the nonfiction novel, In Cold Blood, written by Truman Capote a family The Clutter Family’ is brutally murdered by, Perry Edward Smith and Richard Eugene Hickock, two killers in the small farming community of Holcomb, Kansas. Writer Truman Capote was born on September 30, 1924, in New Orleans, Louisiana. Capotes nonfiction novels are seen as literary masterpieces. In Cold Blood is a non-fiction novel it was first published in 1966 and it details the deaths of the Clutter family, in the small farming community of Holcomb Kansas. How does the Truman Capote create a mood of anxiety in the book? In the book, Capote often sets an intense tone and drag it out for as long as it can go. This puts the reader on the edge of his seat for two or†¦show more content†¦At this point, we have gotten to know Richard and Perry, and Capote gave the perception that Perry was just riding along with Richard and was a less violent one. We have learned how The Clutter family was killed. We learn a few details about Mr.Bell like a middle-aged traveling salesman and he was only a hundred miles from his destination, Omaha Nebraska, which was the headquarters of the large meat packing company for which he worked. After learning a little about Mr. Bell the reader is told that Mr. Bell, entirely unaware of his guests’ intentions, which included throttling him with a belt and leaving him, robbed of his car, his money, and his life (Capote 261) They planned to kill him and take his car. The reader getting to know that Richard and Perry are planning to kill Mr.Bell put the reader on edge. Throughout this chapter Parry is perceived as the aggressive and angry guy; this was completely different from what the reader has seen in the past. The feeling of anxiety intensified when Perry is reminded of his father, which was very abusive, and wanted to killer Mr.Bell fast. Just as Perry was about to smash him in the head, Mr. Bell slowed down to pick up another set of hitchh ikers. This chapter made the reader feel anxious because a crisis is presented in an instant, and the reader is forced to sit through and watch a character, Perry, who the reader felt bad for inShow MoreRelatedIn Cold Blood Literary Analysis1577 Words   |  7 PagesLiterary Analysis of In Cold Blood In Cold Blood, written by Truman Capote, is a book that encloses the true story of a family, the Clutters, whose lives were brutally ended by the barrel of a 12-gauge shotgun. The killers were 2 men, each with 2 different backgrounds and personalities, each with his own reasons to take part in such a harrowing deed. Capote illustrates the events leading up to the murder in sharp detail and describes its aftermath with such a perspective that one feels that he isRead MoreLiterary Analysis Of In Cold Blood By Truman Capote1080 Words   |  5 Pages Literary Analysis of In Cold Blood The nonfiction novel, In Cold Blood by Truman Capote takes place in the small and quiet town of Holcomb, Kansas. Capote takes the reader through the sequence of events that transpired before, during, and after the Clutter family was murdered on November 15, 1959. He describes in detail the background of each of the main characters. This helps to clarify the motives of Richard Hickock and Perry Smith as they murder the Clutters. He illustrates how a positive orRead MoreTruman Capote and Postmodernism1398 Words   |  6 Pagesas with penning great words, was a writer who became as well-known for his late-night talk show appearances as for his prose† (Patterson 1). Capote was a literary pop star at the height of his fame in 1966, after he had written such classic books as, Other Rooms, Other Voices, Breakfast at Tiffany’s, and In Cold Blood. Postmodernism was a literary period that began after the Second World War and was a rejection of traditional writing techniques. It u sed fragmented sentences and questionable narratorsRead MoreTruman Capote s The Cold Blood Essay1472 Words   |  6 PagesTruman Capote’s novel â€Å"In cold blood† was identified as a new form of non-fiction genre in which an objective approach was taken by the author, as his opinions and judgements were absent from the text, leaving only the truth for the reader to interpret. Capote’s narrative method allows the murders to be explained and rationalised within a framework of middle-class ideology and psychological analysis (Hollowell, 1997). Kazin (reference) conveys that the novel â€Å"In cold blood† creates a strong connectionRead MoreTruman Capotes In Cold Blood1591 Words   |  7 Pagesand in Truman Capote’s In Cold Blood, the idealistic dream is critically evaluated. In this paper, I will explain the context of the work, and then I will compare and contrast Dick any Perry (the murderers) with the Clutter family (the murdered) in relation t o the theme of the fragility of the American Dream. Capote wrote what he considered to be the first nonfiction novel. Simply defined a nonfiction novel is one in which an event is reported using traditional literary and rhetorical conventionsRead More Truman Capotes In Cold Blood: Novel vs Movie Essay1611 Words   |  7 Pages â€Å"In Cold Blood†, is a nonfiction story by Truman Capote. This book presents one of the worst murders in history. It was a best seller worldwide, and turned into a successful movie. As usual the movie does not stand up to the book. If you want more knowledge of the townspeople, victims and more insight into the trial, more background details of the murders, you should read the book. If you are interested in history and a good murder mystery all in the confines of a book cover, read In Cold BloodRead MoreMix of Journalism and Fiction in Truman Capotes In Cold Blood785 Words   |  4 PagesJohn Hollowells, critical analysis of Truman Capotes novel In Cold Blood focuses on the way Capote used journali sm and fiction to try and create a new form of writing (82-84). First, Capote involves his reader. This immediacy, this spellbinding you-are-there effect, comes less from the sensational facts (which are underplayed) than from the fictive techniques Capote employs (Hollowell 82). Capote takes historical facts and brings in scenes, dialogue, and point of view to help draw theRead MoreThe Murder Of The Clutter Family1135 Words   |  5 Pagesto research the killings. In the course of six years bringing this narrative together, Capote began taking drugs and drinking heavily due to the dark nature of the book. Truman Capote tells the true story of a family murdered in In Cold Blood, through character analysis and symbolism to prove nature is a stronger force than nature in shaping a person’s character. Capote expresses his idea of nature vs. nurture in Dick Hickock and Perry Smith and whether killers are born or made. With this in mindRead MoreCritical Analysis of Wilfred Owens poem Arms and the Boy1660 Words   |  7 PagesEng 432 Outline Critical Analysis of Wilfred Owens poem Arms and the Boy I. Introduction: 1. Introducing what is going to be discussed in the paper (analysis of Arms and the Boy , its relation to one of Owens poem). 2. Thesis Statement : Wilfred Owens poem Arms and the Boy can be discussed to represent the horror of war. II. Body: 1. Owen was a soldier and a modern poet who was known as anti-war poet. A. A summary of Owens poetry in general . B. His representation of the horror of war in hisRead MoreLiterary Analysis Of Cold Mountain 1298 Words   |  6 PagesLiterary Analysis Charles Frazier’s first novel, Cold Mountain, has earned him a great amount of notoriety. From having a film adaptation of his novel in 2003, to receiving a National Book Award in fiction in 1997. Cold Mountain opens with a quotation from a journal entry by Charles Darwin: â€Å"It is difficult to believe in the dreadful but quiet war of organic beings, going on in the peaceful woods and smiling fields.† And indeed, Frazier’s acclaimed novel describes a war of beings built of flesh

Thursday, December 12, 2019

In the summer of 1969, not everyone was at Woodsto Essay Example For Students

In the summer of 1969, not everyone was at Woodsto Essay ck. In laboratories on eitherside of the continent a small group of computer scientists were quietly changingthe future of communication. Their goal was to build a computer network thatwould enable researchers around the country to share ideas (Kantrowitz 56). TheInternet we make so much today the global Internet which has helped scholarsso much, where free speech is flourishing as never before in history theInternet was a cold war military project. It was designed for purposes of militarycommunication in a United States devastated by a Soviet nuclear strike. Originally, the Internet was a post-apocalypse command grid (Tappendorf 1). The threat of nuclear war was a tangible, and frightening, possibility during thecold war period. In the 1960s the Vietnam War was grabbing all of the headlines. The history books describe the decade as brimming with social unrest andchange. This decade also witnessed the birth of a military experiment that was toevolve into what we now call the Net (Net 1). The history of the Internet beginswith the research and development, RAND, group in 1966. Paul Baran wascommissioned by the United States Air Force to do a study on how it couldmaintain its command control over its missiles and bombers, after a nuclearattack. Barans finished document described several ways to accomplish thistask. What he finally proposes is a packet switched network (Tappendorf 2). Packet switching is a method of fragmenting messages into sub-parts calledpackets, routing them to their destinations and reassembling them. Packetizinginformation has several advantages. It facilitates allowing several users to sharethe same connection by breaking up the data into discrete units which can berouted separately. Because no transmission medium is 100% reliable, packetswitching allows one bad packet to be re-sent while other good packets areuninterrupted in their transmission (Hardy 6). Packets may carry informationabout themselves, where they have been and where they are going. In addition,packets may be compressed for speed and size advantages or encrypted forsecurity. Most packets carry some sort of internal check for consistency that helpsto weed out bad packets. Packetizing data has advantages in overcoming certaininherent bandwidth and speed constraints, particularly in older network andmodem based communication (Hardy 6). The early pioneers of AdvancedResearch Pro jects Agency network, ARPAnet, wanted to create a network thatwas robust, reliable, and did not have a single point of failure. A single point offailure would be a network designed with one device that was the master node,or controlling device, for the network. This leads to problems in that when themaster node goes down, the whole entire network is lost. These early pioneers ofARPAnet acknowledged this single point of failure concept, in turn, created anetwork that had no central controlling device; rather, it was made up ofindividual devices, or nodes that all worked together and participated on thenetwork. Although these first networks consisted of few machines, it laid thefoundation for things to come (Boyce 492). The reliable networking partinvolved dynamic rerouting. If one of the network links were to become disruptedby enemy attack, the traffic on it could automatically be rerouted to other links. Fortunately, the net rarely has come under enemy attack. But an errant backhoecutting a cable is just as much of a threat, so its important for the net to bebackhoe resistant (Levine 12). Starting with the ARPAnet the government beganresearching ways to exchange information among various government siteslocated in the United States. The research and implementation of ARPAnet led tothe early beginnings of the Internet. This network allowed government officials atvarious sites to exchange files, documents, and messages with one another, eventhough they were physically separated by many miles (Boyce 492). In 1969, whatwould later become the Internet was founded. It contrasts sharply with todaysInternet. The ARPAnet network had four machines on it, linked together with apacket switched network. Soon afterward other government agencies becameinterested in this new network; Department of Defense, NASA, National ScienceFoundation, and the Federal Reserve Board. Because of this new interest and thefact that ARPAnet was growing, now 24 nodes in 1972, Information ProcessingTechniques Office, IPTO, began to look to other ways to transmit data other thanthrough a wire. Two projects were launched to settle these needs. The first wasthe use of satellites for data transmission. IPTO quickly learned that it would bepossible to send data via satellite and went into negotiations with the board ofdirectors of International Telecommunications Satellite Organization. The secondproject was for radio transmitted data. It soon also became apparent that a packetswitched radio network for mobile computing would be possible. In 1976, thepacket satellite project went into practical use. Atlantic packet Satellite network,SATNET, was born. This network linked the United States with Europe. Thisnetwork was interesting in that it used commercial Intelsat satellites that wereowned by the International Telecommunications Satellite Organization asopposed to government military satellites (Tappen dorf 2). In the same year a mancalled Ray Tomlinson created an e-mail program that could send personalmessages across the network. Seems harmless enough, but this developmentplayed an important role in the nets evolution by helping it move further awayfrom its military roots. The academics with access to the system were using itpredominantly to communicate with colleagues, and their messages were notalways about research. Mailing lists on a variety of subjects proved to be verypopular (Net 2). In 1973, the United States Defense Advanced Research ProjectsAgency, DARPA, initiated a research program to investigate techniques andtechnologies for interlining packet networks of various kinds. The objective wasto develop communication protocols which would allow networked computers tocommunicate transparently across multiple, linked packet networks. This wascalled the Internetting Project and the system of networks which emerged fromthe research was known as the Internet. The system of pro tocols which wasdeveloped over the course of this research effort became known as the TCP/IPprotocol suite, after the two initial protocols developed: Transmission ControlProtocol, TCP, and Internet Protocol, IP (Liener 1). In 1976 the Department ofDefense, began to experiment with this new protocol and soon decided to requireit for use on ARPAnet. January 1983 was the date fixed as when every machineconnected to ARPAnet had to use this new protocol (Tappendorf 3). In additionto the selection of TCP/IP for the NSFNET program, Federal agencies made andimplemented several other policy decisions which shaped the Internet of today(Leiner 11). The creation of the TCP/IP protocol made possible the text basedNet communications systems so popular today, including electronic mail,discussion lists, file indexing, and hypertext. E-mail, of course, is the mostwidely used of the Net services, the most convenient and the most functional(Diamond 42). The backbone had made the transition from a net work built fromrouters out of the research community to commercial equipment. In its 8 1/2 yearlifetime, the backbone had grown from six nodes with 56 kbps links to 21 nodeswith multiple 45 Mbps links. It had seen the Internet grow over 50,000 networkson all seven continents and outer space, with approximately 29,000 networks inthe United States (Leiner 12). Widespread development of Lans, Pcs, andworkstations in the 1980s allowed the nascent Internet to flourish. Ethernettechnology, developed by Bob Metcalfe at Xerox PARC in 1973, is nowprobably the dominant network technology in the Internet, and Pcs andworkstations the dominate computers. This change from having a few networkswith a modest number of time- shared hosts, the original ARPAnet model, tohaving many networks has resulted in a number of new concepts and changes tothe underlying technology. First, it resulted in the definition of three networkclasses A, B, and C to accommodate the range of networks. Class A representedla rge national scale networks, a small number of networks with large number ofhosts; Class B represented regional scale networks; and Class C representedlocal area networks, a large number of networks with relatively few hosts(Leiner 8). Beginning around 1980, university computing was moving from asmall number of large time-sharing machines, each of which served hundreds ofsimultaneous users, to a large number of smaller desktop workstations forindividual users. Because users had gotten used to the advantages of time-sharingsystems, such as shared directories of files and e-mail, they wanted to keep thosesame facilities on their workstations (Levine 12). Workstation manufacturesbegan to include the necessary network hardware also, so all anyone had to do toget a working network was to string a cable to connect the workstations,something that universities could do inexpensively because they usually could getstudents to do it (Levine 13). In 1983, the ARPAnet was split into ARPAnet andM ILnet. The latter was integrated into the Defense Data Network created in1982. ARPAnet was taken out of service in 1990. ARPAnets role as networkbackbone was taken over by NSFNET which may in time be supplanted by theNational Research and Educational Network, NREN (Hardy 8). In 1988, in aconscious effort to test Federal policy on commercial use of Internet, thecorporation for National research Initiatives approached the Federal NetworkingCouncil for permission to experiment with the interconnection of MCI Mail withthe Internet. An experimental electronic mail relay was built and put intooperation in 1989, and shortly thereafter Compuserve, ATTMail, and Sprintmail,followed suit. Once again, a far-sighted experimental effort coupled with wisepolicy choice stimulated investment by industry and expansion of the nationsinfrastructure. In the past few years, commercial use of the Internet has exploded(Cerf 5). The Internet is experiencing exponential growth in the number ofnetworks, numbe r of hosts, and volume of traffic. NSFNET backbone traffic morethan doubled annually from a terabyte per month in March 1991 to 18 terabytes, aterabyte is a thousand bytes, a month in November 1994. The number of hostcomputers increased from 200 to 5,000,000 in the 12 years between 1983-1995 a factor of 25,000 (Cerf 5). In an extraordinary development, the NSFNETbackbone was retired at the end of April 1995, with almost no visible effortsfrom the point of view of users. This left all of the hard work to be handled by theInternet service providers. A fully commercial system of backbones has beenerected where a government sponsored system once existed. Indeed, the keynetworks that made the Internet possible are now gone but the Internet thrives(Cerf 6). In 1990, Hyper Text Markup Language, HTML, a hypertext Internetprotocol which would communicate the graphic info on the Internet, wasintroduced. Each individual could create graphic pages, a website, which thenbecame part of a huge, v irtual hypertext network called the World Wide Web. Goldsmith Bankers EssayAmerica On- Line, Netcom and small Internet service providers haveexperienced serious network crashes and extensive down times for theirservices. A full 30 percent of telephone calls to service providers get a busysignal. The rate of growth is a giant tsunami nearing the shores of ouraccessibility to unlimited information (Curtis 10). The Internet has changed muchin the two decades since it came into existence. It was conceived in the era oftime-sharing, but has survived into the era of personal computers, client- server,peer-to-peer computer, and the network computer. It was designed before LANsexisted, but has accommodated that new network technology. It was envisionedas supporting a range of functions from file sharing and remote login to resourcesharing and collaboration, and has spawned electronic mail and ,more recently,the World Wide Web. But most important, it started as the creation of a smallband of dedicated researchers, and has grown to be a comme rcial success withbillions of dollars of annual investment (Leiner 18). There is also now talk ofInternet2. With the promise of access and transfer rates of up to 1,000 times whatis possible with the Internet today, the Internet2 (I2) project is deserving of theattention it has received. But do not expect to be cruising at lightning speedanytime soon. Internet2 is currently confined to academia, government researchcenters, and non profit organizations (Krueger 302). It remains to be seenwhether Internet2 can accomplish its goals and then merge its findings andadvances with the commercial Internet in the time frame suggested. In the end,improved bandwidth and multimedia solutions that meet or exceed the goals ofthe Next Generation Internet, NGI, may be realized all by the year 2002deadline. Only time will tell. If I2 flies, however, we may soon hear thebuzzword Internet3 (Krueger 306). One should not conclude that the Internet hasnow finished changing. The Internet, although a netwo rk in name and geography,is a creature of the computer, not the traditional network of the telephone ortelevision industry. It will, indeed it must, continue to change and evolve at thespeed of the computer industry if it is to remain relevant. The most pressingquestion for the future of the Internet is not how the technology will change, buthow the process of change and evolution itself will be managed. If the Internetstumbles, it will not be because we lack for technology, vision, or motivation. Itwill be because we cannot set a direction and march collectively into the future(Leiner 18).

Wednesday, December 4, 2019

Intentional Teaching free essay sample

Teaching Heather Huerta Early Childhood Education as a Profession November 18, 2012 Mrs. Kirst Intentional Teaching I think that they activity shows that she understands child development at this age, because she knew what was going to interest the child. She came up with an age appropriate activity that holds the interest of the child, and challenges him to figure out how it works on his own. Hands on activities are always the best way to learn with children, and it is fun to watch them figure out how to do it on their own with the enthusiasm. The teacher shows that she know the child as an individual, because she answers him correctly and asks him questions to continue the conversation. She can carry on a conversation with him without him losing interest, and he looks to her for answers. She understands what he wants and what he is trying to do. We will write a custom essay sample on Intentional Teaching or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page She matches her tone of enthusiasm to his and knowing what he is communicating to her. He knows that she will help him, and guide him in the right direction with the activity. She thought out the activity because she understands how the activity works successfully, and how to keep the child interested. She knew what was needed to make the activity a success, and nailed every bit of the activity. She knew what would interest the child, and how to make it work with what she had. It was a very simple activity that need very few items, and it stimulates a child in a great way with learning cause and effect. I think that if the teach had a ball of her own as well and casually playing â€Å"hide and seek† with the light shining on the ball until he understands it. When he is looking around put the ball in the light, and when he looks to see where it is coming from hide it. I think at that point he will try to do the same. I think asking different questions to guide him in a way to succeed would work as well, â€Å"What if you put the ball in the light? † â€Å"What happens if you take the ball out of the light? † Asking him questions about what is happening can help him understand the activity and be able to explain it in his way. Having him explain it to you can help him with language and social skills.

Thursday, November 28, 2019

Closure of the Clyde oil refinery

Executive Summary The report seeks to analyse the shutdown of the Clyde oil refinery using economic concepts. Clyde oil refinery is the oldest oil refinery in Australia and as such, the report gives the viable economic factors that could have led to this shutdown. Several assumptions have been made.Advertising We will write a custom report sample on Closure of the Clyde oil refinery specifically for you for only $16.05 $11/page Learn More The findings of the report are that competition from Asian mega refineries was the major cause for the shutdown. It has also been assumed that the company had been operating under near-shutdown conditions for the last few years. The entry of other competitors in the oil industry brought about the strong competition, and hence another risk factor. Its size and the inability to adopt new technology is also another cause for its closure. The shut down would lead to increase in prices and hence abnormal profits. It would al so force the remaining companies to produce more in order to meet the industry demand. Introduction The announcement of the closure of Clyde oil refinery has brought different views. Shell Australia has been forced to shutdown Clyde oil refinery due to intense competition. This will leave the refining industry with a production deficit of 75,000 barrels daily. The move had been unexpected and the shell Australia believes that Asia mega refineries will replace the output. The report looks at the economic reasons that may have led to the shut down and the impact it may have on the competitors. Body (Analysis) The Clyde oil refinery shutdown was caused by high competition and increase in demand and supply in the region (Murphy 2011). 260 employees will be laid off, leaving only 50. In order to analyse the shutdown of the firm some assumptions have been made. The Clyde oil refinery had been operating under shutdown point for the last few years. A firm reaches a shutdown position when ou tput (revenue) is just adequate to cover the total variable cost of the firm. According to Wessels (2000, p.345), the shutdown of a firm or a company occurs when the total variable costs exceeds the total revenue. The rules of shutdown in the long run are that TRAdvertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Murphy (2011), the Clyde oil refinery vice-president Andrew Smith said that the shutdown was necessitated by â€Å"increased competition from mega-refineries in Asia, supply and demand in our region†2011). The vice president also added that because of its size it could no longer compete regionally and significant investment was required. This can be explained by costs and output in the long run. Firm industry The assumption is that all the firms operate under the same cost curve in the long run. Upon entry in the market the firm was making huge profits. This attr acted other key players in the industry. As time goes (long run) the demand increases to DD. The entry and competition pushes the prices down from B to C and the output increases from Q1 to Q2. At this point firms are making zero profits. Increased competition from companies that have high output capacity pushes the prices further down. This affects the weaker companies with high avoidable costs. When the industry is operating under a loss, this pushes some firms to shut down. This is the case with the Clyde oil Refinery where competition, demand, and technology pushed it until it had to shut down its operations.Advertising We will write a custom report sample on Closure of the Clyde oil refinery specifically for you for only $16.05 $11/page Learn More The shutdown has an impact on the remaining firms as well as the industry itself. Given that Clyde oil refinery produces 75,000 barrels per day (Edwards 2011), the output in the industry would be pushed d own further. This would force Asia refineries to produce more to fill the market demand of oil. The remaining firms in the industry would the have to raise their prices returning to p0 (Wessels 200, p.354). At this point, the supply is elastic than in the short run (LR-S). If the Asians producers cannot meet the market demand of oil in Australia, then there could be an oil crisis. When a commodity is scarce or in high demand prices go up and companies are more likely to make abnormal profits. Conclusion The shutdown of the Clyde oil refinery was as a result of high competition from Asian mega refineries. It may also have been caused by increase in demand in which it was not able to produce an output required by the industry. Reference List Edwards, M., 2011. Refinery closure cuts national fuel security. ABC Sydney, April 17 [online]. Available from  https://www.abc.net.au/news/2011-04-13/refinery-closure-cuts-national-fuel-security/2617164?site=sydney . Murphy, M., 2011. Shell she lves refining at Clyde. Sydney. Morning Herald, April 12. Web. Available from https://library.sydney.edu.au/about/library-projects/ .Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Mankiw, N. G., 2009, Principles of economics. Mason, OH: South-Western Cengage  Learning. Wessels, W. J., 2000,. Economics. Hauppauge, NY: Barron’s. This report on Closure of the Clyde oil refinery was written and submitted by user Myla Stein to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

12 Cause Effect Essay Topics on #8220;Living Downstream#8221; by Sandra Steingraber

12 Cause Effect Essay Topics on #8220;Living Downstream#8221; by Sandra Steingraber If you are tasked with writing a cause or effect essay on the book Living Downstream there are many potential topics from which to choose. Of course, no matter the topic you have selected, it is imperative that you back up any statement or claim you make with facts. In order to help you in that regard, below you will find a handful of facts which might prove useful in the course of your writing. In the book, agricultural and industrial pollution are mixed together with anecdotes in order to provide readers with medical literature assessments, scientific assessments, and the conclusions therein about the relationship between rising rates of cancers and environmental influences. There remains a serious imbalance between studies of which environmental factors influence or contribute to cancers and those studies which focus instead of genetic predispositions for cancers. This remains a serious concern given that many cancers are not genetically transferrable and the source must be derived from an outside factor, such as an environmental factor. The reason this need should be filled is that the cancers caused by genetics, meaning those which are inherited, cannot really be altered at present and nothing can be done to improve upon the situation. However, those cancers caused by various environmental factors can be changed immediately and all influences mitigated, especially carcinogens. Carcinogens are substances which are known to cause cancer inside of living tissue, and these carcinogens exist in a variety of environmental substances to which people are exposed regularly. Chemical pesticides are one striking example of carcinogens which make their way into the human body. Those workers who are exposed to high levels of many chemicals regularly face contamination that goes unchecked by local healthcare, and only with blood and urine samples can the changes to the body be tracked. In the state of Illinois alone 54 million pounds of synthetic pesticides had been used on farms, many of which were poison. In 1950 less than 10% of all fields were sprayed with any pesticides but by 1993 99% had been treated with chemicals. Americans today between the ages of 35 and 64 are likely to die from cancer above all other ailments. In fact, by 1950 only 25% of adults could expect to get cancer while today that rate is almost 50% for men and 40% for women. The rise in cancer has increased steadily with processed foods, changing production habits, and changes in manufacturing. The qualifying link between all of these changes is the introduction of different chemical contaminants to the environment. Tazewell County located in the state of Illinois has shown many cases of a rare bladder cancer, a cancer which was contracted by the author when she was only 20 years of age. The high rates of said cancer has been linked scientifically to the carcinogenic chemicals in the region. The evidence presented in the book revealed that there was a six fold increase in the rates of bladder cancer among the workers who were exposed to particular chemicals related to rubber before legal workplace limits were put into place. In addition, immigrants who came to the area started to exhibit signs of the cancers adopted in the new area, and not the cancers which were prevalent in the place where they had been born. The maps presented by the author indicate that there are more cancers prevalent in urban areas compared to rural areas. In these maps, there are more cancers in the rural counties where the use of pesticides took place heavily, compared to those rural areas where the use of pesticides was minimal. The various studies presented in the book indicate that cancer clusters are prevalent near polluted dump sites, polluted valleys, polluted rivers, and near chemical factories. The same studies revealed that the rate of cancer in children has increased. The lifestyles of children have remained much the same over the last fifty years, without changes to alcohol consumption, smoking, or stress-related work, and yet the rate of cancer among children has risen at steady rates. Research indicates that the rate of shellfish and fish living within polluted waters has directly influenced the increase in cancer rates. Today, North Americans are seeing an increase in liver tumors among 16 fish species located throughout 25 different locations both fresh water and salt water. Each of these locations has become chemically polluted over the last sixty years. This was contrasted to the fact that the rates of liver cancer among members of those same fish species which inhabit waters not polluted by chemicals is almost non-existent. The studies conducted and presented by the author have indicated that chemicals contained in polluted areas are damaging to the immune system as well as to the endocrine system. The damage which is done to these areas results in the promotion of cancers. Regardless of whether the carcinogens have been introduced into the environment deliberately or accidentally, many scientists are afraid to speak out toward improvement unless they can be 100% sure there is a serious link and no other possible influencers. However, the existence of such high chemicals, even with the near one hundred percent studies which have been published, now render these areas seriously dangerous to the people who live there with very little legislation being done to help or hinder. There remains a serious cancer epidemic brought about by the chemical residues and the pesticides which have been used among the environment. This first claim has only been substantiated by studies covered within the book, and few and far between beyond that scope. With these facts in mind, you can find a unique cause or effect on which to focus for your writing (we prepared for you 20 sample topics on â€Å"Living Downstream† by S. Steingraber as well). Remember, there are many more facts out there within the span of the book and this list is by no means comprehensive. However, it should serve as a useful guide when you are starting off your work. Along with this information feel free to read our writing tips on cause effects essays. References: Reus, J. AN ENVIRONMENTAL YARDSTICK FOR PESTICIDES: AN INSTRUMENT TO MEASURE THE ENVIRONMENTAL IMPACT OF PESTICIDES.  Acta Hortic.  347 (1993): 215-224. Web. Searle, Charles E.  Chemical Carcinogens. Washington: American Chemical Society, 1976. Print. Steingraber, Sandra.  Living Downstream. Reading, Mass.: Addison-Wesley Publishing, 1997. Print. Stich, H. F.  Carcinogens And Mutagens In The Environment. Boca Raton, Fla.: CRC Press, 1982. Print. Viroj Wiwanitkit.,.  Melamine And Other Problematic Food Carcinogens. New York: Nova Science Publishers, 2009. Print. Zahm, Shelia Hoar, and Susan S. Devesa. Childhood Cancer: Overview Of Incidence Trends And Environmental Carcinogens.  Environmental Health Perspectives  103 (1995): 177. Web.

Thursday, November 21, 2019

Emotional responds Assignment Example | Topics and Well Written Essays - 500 words

Emotional responds - Assignment Example It will make the customer inquisitive to understand the product on offer and if what the customer needed, is on offer. The website displays bags with names on them to allow the users learn the names of their favourite products. Since shopping online requires trust, EBags website like many sites has included its compliance to website securities. Unlike many websites, EBags has included the number of customer reviews in its archives, number of shoppers online, and the total of bags shipped to date to raise the confidence of shoppers. The plot in EBags website is designed in a way that the audience feels emotionally attached on opening the website. The user identifies with the savings, advanced travel design bags, the season’s best picks in the web. In disbelief, the user will browse through immediately to confirm the prices, the offers, and the products. From the number of good reviews from customers, the user will identify with the customers and make a sale. Additionally, the website has relevant information to a sale and the users have the right to manoeuvre the website with their own pace. This is an internet-based travel website based in the US, which books airline tickets, hotel reservations, car rentals, cruises, and vacation packages to various attraction sites. The main challenge that Expedia poses to its users is in finding a reward for their search. The customer has an option to earn double nectar points after selecting one of the hundreds deals for fall getaway. Additionally, a user has several options to select from the website, which can make him come back to evaluate the savings he would make. For instance, there is an option for a user to either book a flight, hotel, or cars separately, or book a combination of a hotel and a flight. A user who had previously booked flight and hotel separately would come back and try to make some savings on booking the two together. Like many other sites,

Wednesday, November 20, 2019

Literature by U.S. Women of Color Research Paper

Literature by U.S. Women of Color - Research Paper Example It is based on these stories that this research will focus on the difficulties women of color experience in different territories and how they respond to such challenges (Wang 12). Particular emphasis is placed on women faculty of color within a classroom environment dominated by white students. The paper majorly focuses on oppression among women faculty of color in institutions of higher learning such as universities and colleges. Information on the research is based on a comprehensive interview with women faculty of color in a large research institution that is dominated by whites (Aguirre 100). The study identifies how male students challenge the authority of female colored professors during classroom interactions. Research studies indicate that an oppressive environment in a classroom has the negative effect of impairing learning and academic performance. This is especially widespread among students who suffer from oppressed identities. Such research studies only reveal whether a n oppressive environment affects learning effectiveness but tends to ignore the faculty perceptions of their classrooms. A lot of literature material points out that women faculty of color spend different time periods teaching. However, the material does not concentrate much on the classroom experiences of the colored women. Sociologists provide adequate knowledge to students on how to examine racial disparities in different areas of society such as health care and religion. They offer real world examples that are used to illustrate the cultural and interpersonal social oppression that exists in the world that we are living. There has been a widespread use of the oppressive classroom environment in demonstrating different forms of racial disparities. Research studies indicate that fostering faculty diversity and effectiveness can be achieved through the support of faculty who are women of color rather than being hostile towards. This means that it is important that we understand and appreciate the perception of the classroom environment in retaining a diverse faculty (Bonilla-Silva 200). This research applies an intersectional oppression framework in exploring faculty perceptions towards colored women teachers. Oppression can be defined to as the obstacles and actions that maintain the privileges of a dominant group. Research studies indicate that there is widespread and cumulative oppression among women faculty of color. This is evidenced by the small number of recruitment or promotion of women of color in institutions of higher education. Racism based on gender is a unique kind of oppression that women of color experience (Morrison 120). This experience is based on their position in at the intersection of race and gender matrix of domination. On the basis of the above mentioned insight, this research study examines the perception of classroom experiences among women of color at the intersection of racial and gendered oppression. In this research study, the w omen of color have adequate knowledge that their experiences in the classroom are influenced by gendered racism, and that white male students have the tendency of undermining their authority because of their color. I will majorly concentrate on how structural inequality is evidenced during interpersonal interactions. This is because teaching is a major part of the lives of faculty women of color and that it is import

Sunday, November 17, 2019

Lesson plan Assignment Example | Topics and Well Written Essays - 500 words - 3

Lesson plan - Assignment Example This is generally to enable follow various instructions and give feedback either to peers or adults. This is done with support and practice to ensure the pattern persists. The supervisor should pay attention to the movement up and down the steps especially from one step to the next for the students. Very close attention to be accorded to Rosa since she has very low muscle tone and falls frequently which could prove fatal. Additionally Rosa’s fine motor skills are not fully developed hence supervisor should ensure that Rosa is supported either by her peers or the supervisor to do it in person. Communication during the process should be encourage to ensure that the peers help each other and learn to say the words The performance of Rosa during the activity will enable the supervisor to carry out the assessment. This information will be obtained during the practical session period and additional information from the knowledge obtained from peers as well as parents. The information is obtained and documented. The lesson bases just on Rosa’s motor skills. Since Rosa has low muscle tone and poorly developed motor skills there is need to improve these skills. The area of interest is the ability to coordinate movement so that she can move up and down steps without struggling. The activity is interesting so this will create a good understanding between the supervisor and Rosa. This will help develop fine motor skills which will be used in other areas of her life which include feeding. This will be done repeatedly but in stages to ensure Rosa can do it independently without much risk or problem. During the process some communication skills area also learned. How does this lesson engage students and help them achieve the goal of the lesson? How will you measure their engagement and time on task? How are you incorporating assistive technology into the lesson? How are you using

Friday, November 15, 2019

Strategies for Risk Management in Construction

Strategies for Risk Management in Construction 1.1 Introduction Risk management is one of the subfields on nine knowledge area in project management. Risk management is about managing uncertainty that inherent in most projects that require formal project management, using ‘uncertainty in the plain English ‘lack of certainty sense. Risk management also refer to a series of processes which are required for the identification, analysis, and reaction towards the projects risk in order to maximize the effects of positive uncertainty even and minimize the consequences of negative uncertainty even. Risk management also been organise in developed countries. This due to the risk management is better applied in the developed countries. Comparing with other countries with various situations, Malaysia is a developing country which the politic, economy, social and technology have mad specific risks especially related. Unfortunately, in Malaysia, the management of risk is not so systematic and requires more research and development. Malaysia seems to be developing countries because the demand for founding infrastructures is highly increasing. Currently, the government is enforcing the development plan. National economic will be burden if the plan is falling behind. This means that it is important to recognise the risks that endanger the plan. A lot of budget was spent on investment in the construction industry. The application of risk management will result in taking correct, regulated, and prompt decision through being informed about the environment despite the complication and changes in the construction industries. 1.2 Problem Statement Knowing the environment and be capable in decision making in a prompt and correct manner is the key to success in managing todays challenge and risk imminent. In case of not recognise both internal and external risks factor of the project, the managerial decision-making error will take place. Moreover, it will cause problems in time and cost assessment forecasting. Through risk management, it can identify the risk generating factor and control or remove such risk factors through analyzing and choosing the suitable action. As one of the subfields in the nine knowledge area of project management, risk management is still being paid less attention in Malaysia. In very few organisations, employers or contractors can be seen who have a proper insight into risk management. There are no any practical guidelines to be properly implemented for risk management in this industry. Furthermore, as a result of lack of binding regulations, current regulations cannot force construction parties to undertake risk management. So, by adopting scientific approach to risk management, introducing its process and eventually its compliance with existing realities in development plans, particularly in project are a necessity. The issue of risk management was for the first time raised in mid-1990s in the United States. Laws and regulations for applying risk management in projects have now been adopted. Since risk management is a new field, except for several seminars and universities research project, applied research has not taken place in risk management in Malaysia. 1.3 Research Questions i. What kind of risks occurs in the construction projects and what are their factors? ii. What are the strategies that been applied in dealing with risk? 1.4 Research Objectives i. To identify risk factors in construction industry. ii. To identify strategies of risk management applied in construction industry. 1.5 Scope of Study This research is focuses on the implementation of risk management in the Malaysia construction industry. Therefore, the scope of this study is only limited in Pahang where respondents have been chosen randomly out of this area. Moreover, the respondents comprised of contractors registering in Grade 7. The reasons for being such is that the categorization of the grade of contractors reflect, to a great extent, the size of project that being executed in the company and the size of the company. Grade 7 of contractors is regarded as big companies with large-size projects. Depending on their size of project and their company, the risk that they encounter will differ. As a result of this, to make sure the data obtained could be reliable, its necessary to limit the respondents based on the size of project and company. 1.6 Expected Findings This research will achieve some precious advantages. First is to enhance the consciousness of different key personnel of project resulting in performing the project reliably while considering issues like risk management in general management project. To accomplish this, its essential to implement theoretical concepts mentioned in numerous literatures in reality. This can guarantee a well project management through attempting to prevent from normal issues in projects like poor quality of products, cost overrun, and delays. CHAPTER 2 LITERATURE REVIEW 2.1 Introduction Risk will bring effect on the project cost, time, and scope. This chapter covers the construction project risks. All the risks will be recognised and categories into a number of group. Then, the current trend in risk management researches would be considered. In order to meet the first objective, identification and classification the strategies used by the project manager used to avoid the risk in their project. The second objective will be fulfilling through identification and classification of risk factor in construction projects. 2.2 Definitions 2.2.1 Risk Risk is an uncertain event or condition that, if it occurs, it can bring a positive or negative effect on a project objective (PMBOOK, 2000). Risk also can be defined as an uncertain event or set of circumstances if it occur, it will give effect on the achievement of the projects objectives (APM, 1997). This definition is widely use and gather welcoming upside and unwelcome downside effects. This definition works in theory but fails in practice. In this study, the effect of risk in construction project is through the way of integrated method, namely size of consequences and probabilities of happening have been measured. In the construction project, there is a lot of risk in every phase. This is the norm of any project not only in construction project. Construction firms want to have projects at international level. In every construction project, risks are present. Risks in international construction projects are more critical as compared to domestic projects especially when developin g countries are involved. That is the reason risk is desirable for international construction firms who want to do construction projects in foreign country, to identify the risks as early as possible, so that suitable strategies can be made for the penetration in to the foreign construction market and to manage these risks before the actual execution of projects on international level. Risk consequences in construction projects may reach an undesirable level because of inadequate resources and lack of advancements in technologies, therefore a thorough awareness and identification of risks is essential to prepare suitable strategies. International construction projects have many risks involved due to the nature of their structure. There are more parties involved and more phases are present in international construction projects than a conventional construction project. Each party has its different objectives. This difference in the objectives of parties leads to conflict of interest which is a root cause of risks in international construction projects. 2.2.2 Risk Factor Construction project is divided into separate phases. At the end of each phase, appraisal can be made and assessment of risk involved in proceeding with the project. The management of risk therefore a continue process and should span all the phases of the project. Since project risks are dynamic, a risk assessment must be carried out at the end of each phase prior to proceeding to the next phase. In fact, active management of risk must continue between the review points until the project is complete. Risk can also change during a phase. The result is a complete re-appraisal may need to be performed. There is a generic acknowledgement that human factors are the most important element that affects the project success. According to (Lynch, 2002), human factors bring affect to project success. A series of errors by a steel contractor lead to a near miss at Canary Wharf when a two-tonne pre-cast staircase fell from a crane and landed on the ground metres from a crowded side office. It was reported that the stairs fell when the left side eyebolt lifting pin of the staircase lifting gear came free. The load was transfer to the right-hand bolt, causing it ti shear. The report confirmed that the eyebolt was not correctly inserted. Independent testing agency Lloyds British examined key parts of the lifting equipment and concludes that the equipment would be sufficient had it been assembled correctly. Shortfalls in the firms arrangement at the site were criticised. No risk assessment or method statement had been drawn up specifically for the lifting operation and key decision were left to operators who were not trained to use eyebolt. All these shortcomings fall in sphere of human factors as defined earlier. 2.2.2 Risk Management Risk management is widely use by the companies or organizations to ensure the control of risk in the business process. In this research, the simplest possible approach to describe the risk management process is chosen due to the context of the construction sector. According to (Norman, 1993) risk management is a system use to identify and quantify all risk to a business or project that is exposed so that conscious decision can be taken on the way to manage the risk. Risk management also been mention in the PMBOOK as one of the nine areas of project management and has been illustrated as the process concerned with conducting risk management planning, identification, analysis, responses, and monitoring, and control on a project. 2.2.3 Fundamentals of Risk Management There are a lot of risks in the construction projects, and there is no standard method that can explain about the risk management. According to (Telford, 1998) risk in construction industry is the existence of real or possible chances or dangers affecting projects objective while commissioning or operating the project. According to (J. Walewski, 2002) , risks can be categories into two parts. The first part is pure risk when there is the possibility of financial gain. The second part is speculative risk that includes the possibility of both gains and losses. 2.3 Risk Management Process Project Risk Management involves procedure considering executing risk management planning, identification, analysis, response and monitoring, and control on a project. This procedure can update the majority of the project. Project risk management aims to enhance the possibility and effect of positive event, and reduce the possibility and effect of negative incident to the project. According to the Project Management Body of Knowledge, (PMBOOK, A guide to the project management body of knowledge, 2004), the Project Risk Management Process 2.3.1 Risk Identification Risk identification has two types which are prescriptive and creative. These two types of risk identification has their own function but they must be cautiously handled in order to make sure the process of identifying risk is economic. The result in the utilization of checklists of standard risk distinguished to appear in a special context when there is an attempt to modify the risk identification. Even though checklist is fast to make, but it is inclines to prepare the anticipations of the engaged, and the identification of risks going beyond the experience summarized in the list. The result of using the checklist method can be high, but if they are to have a function, it suggest that they better retained for examining the identification process, and make sure there is no familiar issues have been skipped or ignored. Brainstorming is another method that being hold in a group and it is the favoured method. This is a little more challenging for the participants compared to checklist method but the brainstorming seems more efficient. Brainstorming predict the identification process to gain inspiration from the wide capacity of the participants, due to decreasing the risk that is inadequate consideration will be given to new and more emergent issues, as can occur with the checklist method. 2.3.3 Risk Analysis The risk analysis is implement in each risk as significance rating structure that is considering any existent factors that might be occur which will function to check the risk. The risk analysis can be implementing with qualitative impact and likelihood scale and a matrix clarifying the significance of different composition of the risk. When risks are complicated by themselves that possibly includes various related impacts and events, some types of modelling might be essential. The significance of a risk is connected to a well explained event that will be a composition of the impact and likelihood of the risks. The significance of an unsure quantity will be a function of its three type of value which are the maximum, minimum, and most likely values. 2.3.4 Risk Evaluation Risk can be occurring in any situation. When there are just a lot of risks at the work, the evaluation phase may be proportionately simple and easy. On the other hand, it is a critical step for obtaining an accepted view of the proportionate of the recognized risks. Risk evaluation takes the primary analysis and examines the risks that occur towards the companys known preferences. Any risks which is too high or too low significance are adapted, with a record of the fact being hold for the purpose of tracking. 2.3.5 Risk Treatment Risk treatment comprises what should be done in order to give reaction to recognized risks. Any plans which were thought of before the risk management process commenced are enlarged with actions that been taken to manage the risks before they occur and providing contingency plans with which to get back if a risk happen. 2.3.6 Monitoring and Review In monitoring and review ingredient of the process, there are two levels of them. The other five steps must be remained under an examination as the time passes. Finding of better information may make the first evaluation out of date. It is now usually essential to start the whole process or repeat it once again when risks occurs, not until the change is especially deep, but those parts which are immediately influenced by changing occasions should be updated from time to time. The second step is the monitoring of the performance of the other five levels. The implementation of the risk management process attracts sources and should be administered in order to make sure that it is performed cost-effectively. 2.3.7 Communication and Consultation Communication and consultation is the key component of the risk management process and a major beneficial side effect. Risk management is success when it achieves a high level of creative input and involving all parties with a role to play in achieving a successful outcome for the project or business process being addressed. In both the planning and execution phase in the risk management process, it is prominent to make sure all those individuals who need to be involved are given adequate opportunity to do so and are kept informed of developments in the understanding of risks and the measurement taken to deal with them. 2.4 Tools and Techniques for Risk Response Planning In every project, the risks can raise when there are a lot of phases and tasks to be done in such a way that the least consideration is delivered to main issues of the project. According to (Bajaj, 2000), individual members of the project are usually focus only on the role that they have in the project risks and voluntarily or involuntarily try to pass these risks on to other project members. This means they do not want to take the responsibility to handle the risk by themselves. The crucial part of risk management is mitigating risk by minimize their effects. A systematic risk management strategy which is executed properly shall decrease the adverse effects. Risk mitigation that been properly planned and well managed is a replacement of uncertain and volatile events with a more predictable or controlled response ( (Chapman, 2002). A proper risk mitigation strategy is very important in order to reduce the likelihood of happening or possible influence and doubtfulness of a risk event. There are four types of risk management strategy which are: i. Risk avoidance which when a risk is not accepted and other lower risk choices are available from several alternatives; ii. Risk acceptance which when a conscious decision is made to accept the outcomes the event should occur; iii. Risk control which when a process of sequentially monitoring and improving the situation on the project is used. This process includes the development of a risk reduction plan and then pursuing the plan. This means that mitigation strategy is the most common risk management and handling technique; iv. Risk transfer which when the risk is shared with others. Sharing the risk with others involve contractual shifting, performance encouragement, insurance, warranties, bonds, and so on. 2.5 Classification of Risks in Construction The first stage in risk management is risk identification. Risk identification is recognising any risks that can be occur in the construction projects. Risk classification is one of the part in risk identification which is the trying to manage different risks that can give impact and influence a construction project. According to (Chapman, 2001), risk has four subcategories which are project, industry, client, and environment. From the other related literature, out of 58 risks recognized connected to construction joint ventures, (Shen, 2001) categorised them in 6 groups according to risks nature like financial, economy, technical, politic, and management. As a result, there are a lot of methods that can be use to categorizing risks that can affect to construction projects. According to other study by (Kalayjian, 2000), in the Third World of Construction classified that some of the most representative kinds of risks that are commonly use in todays global construction area are: i. Financial Risk is the economic feasibility in a project that relies on its capital organizing and capacity to draw dependable resources of financing at logical terms. Risks contain the owners power of acquiring enough budgets, deposit payment, receive tax incentives, and expect instability of currency exchange rates. ii. Design and Construction Risk which is in the construction project itself. To be success in construction projects, the managerial teams must have a power decision making. Risks that must be take care are an effective team selection process, obtaining permits and third party concurrence in timely fashion, procurement of adequate labour, materials and equipment, monitoring all changes in project scope, quality control assurance, and ensuring overall compliance with contractual obligations. iii. Weather and Environmental Risk is about the mother nature situation. In construction sites, there is vulnerable change in the weather and natural disaster like earthquakes, monsoons, and flood. Other risk can be reducing the other dangerous wastes and severe environmental legislation. iv. Economic and political risk is a risk which also can affect the construction project. The performance of economic in a country and political stability has a significant effect in construction activity and investment. Prominent risks consist of financial policy and governmental monetary responsibility, resources availability, development of infrastructures, internal stability, changes in managerial schedule, and political management. On the other research done by (Hassanein, 2007), there are several risk that has been identified which are: i. financial risks: the checklist mentioned about some financial risks which are related to the projects in this study. ii. Technical risks: the checklist show allowances for similar standards and codes. This is because the two projects studied were tendered internationally which causes contractors from different countries. iii. Risk related to change: the checklist addressed certain provisions concerning the simultaneous progress of design and construction phases on the two fast track project under study. iv. Consortium risk: in some contracts, contractors are requested to make partnership including foreign and local contractors as a necessity of tendering qualification. v. Owner obligation risks: the checklist embraced factors which should be stated in the contract to clarify owners responsibilities and to guarantee these responsibilities would be come up with on time. These include an obvious interpretation of these responsibilities, time frame for their execution and declaration of amendments if these responsibilities are not executed shall be contained in the contracts. vi. Risks regarding interface with other contractors: the checklist included specific items to mitigate risks related to interfaces with other contractors. vii. Risks regarding interface with other contractors: the checklist included specific items to mitigate risks related to interfaces with other contractors. According to (Tang, 2007), the most important risks in project are poor quality of work, premature failure of the facility, safety, financial, and incorrect design risk. 2.7 Barriers of Implementation of Risk Management According to (Liu, 2007), the most dominant risk in the construction industry is the unsupportive culture within the industry. As a result, the lack of proficiency and experience is the general reluctance for implementation of risk management in the Chinas construction industry. Lack of proficiency and experience causes contractors to be unable to identify the significance and advantages of risk management. To improve the low understanding towards risk is through changing the culture of enterprise. This is because it is essential for Chinese contractors to agree with the risk managements concept as well as execute risk management techniques. The professionals behaviour seems the most significant issue affecting the improvement of risk management in the Chinese construction industry. Organizational learning becomes the critical element of an incorporated risk management procedure which being the learning structure formed to assist Chinese contractors in developing their performance an d knowledge towards risk management. In fact, to transform the modern knowledge to their own knowledge using organizational learning seems become the critical issue for Chinese contractors in order to develop their ambitious. According to (Baloi, 2003), it appears that professionals have not completely understood the value of risk management. This is because there are advances in the methods of risk management and availability of the enormous body of knowledge of risk management. The professionals recognised language, implementation costs, and educational barriers and a fear of change to be the principal barriers of the efficient conformance. According to (Hlaing, 2008), Singapore construction contractors on construction risk identification asserted that the reason that preventing the implementation of risk management process is money but it is not the major constraint for implementing risk management program for the companies but the most important risk in the list is lack of time. This is same as stated by (Lyons, 2004), identified that time constraint is a main restriction. The activities of construction industry are really related to time when the manufacture of the construction is basically used just-in-time for the manufacture need of customer. 2.8 Risk Identification Methods In order to be successful in project management, it requires the ability to predict the risks that affecting the project scope, time, and cost. However, there are a lot of researches about risk identification, risk assessment, and management for executed facilities is focusing on types of projects or categories of risks aspects. It is related to the literature from (Howell, 2001) about the political risks that exist. Now a day, the construction industry still cannot identify the risks that occur in the project activities. According to (Walewski, 2002), the worth of systematic risk management of activities on project has not been identified. This is because the lack of common vision about risk and the parties that involved in construction industry such as owners, designers, investors, and contractors have different objectives and the relationship among them are prevalent contradict. All of the project parties not systematically make their efforts at organizing risk analysis management among themselves and this particularly correct between contractors and owners. (Fang, 2004) show a model for risk assessment. The model use for tendering project in Chinese building project based on assessment and identification of critical risks in the Chinese construction industry. As a result, the projects risk could be evaluated by analyzing the issues such as the competition for tendering and reasonableness of bid price, lack of cooperation between contractors and the owner. In other study done by (Hassanein, 2007), the marked lack of consistency in the contractors risk identification effort been identified as the risk in the power station projects on Egypt. The contractors who have more experience in Egypt were better to identify the relevant risk. Vice versa, the local Egyptian contractors who have vast experience in Egypt but limited project management experience were not really expert to properly identify risks and to take the appropriate exceptions. In fact, the bidders do not include in their proposals on their true lists of exceptions which represent genuine risks to them. CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction This chapter will cover how the research will conduct to achieve the objectives of this study. The methodology that will be use are questionnaire survey among the Pahang construction professionals, and preliminary interviews with experts will carry out. The steps are as follows: 3.2 Data Collection 3.2.1 Interview Interview is the effective procedure of data collection because the actuality of condition could be perceived specifically and comprehensively while conducting the interview. For the purpose of this study, as the scope of this study is limited to Pahang, the interview sessions will conduct through two main ways which are telephone interview as well as email interview through the internet. 3.2.2 Questionnaire Questionnaire survey is one of the others way of data collection carry out among selected construction practitioners involve in construction projects. This specialist will working in contractor construction companies. The questionnaire will be identified from interview with construction practitioners and through literature review. The survey questionnaire will administer through e-mail and fax, and postal questionnaire, and secondly through the distribution to selected contractors which are project managers, managing directors, chairman, and head of technical departments operating in the Pahang construction industry. 3.3 Data Analysis All returned questionnaire will be check from completeness and suitability for use in statistical analysis. Next, all the data collected from the questionnaire will be analyse with the assistance of statistical software program called Statistical Package for Social Science (SPSS). After putting the data in SPSS software program, some statistical method will be apply to the data through frequency analysis and mean index, risk analysis matrix, and single sample T-test. After putting questionnaire data into SPSS, some statistical method will be applied to the using frequency analysis and mean index, risk analysis matrix, and correlation test. 3.4 Measurement Most of the question will applied using five point of Likert scale, and other question will applied with multiple choice. The most common scale that will be use is 1 to 5. There are three sections in the questionnaire. Section A will cover about the level of risk in construction project. Participant will be given three choices of answer which is low, medium, and high to scale the risk level according to their perspective. In section B, the typical Likert scale take the following format: Risk level Rare Unlikely Possible Likely Almost certain Score 1 2 3 4 5 Table 3.1: Risk factors In section C, the respondent will be asked to choose the scale between 1 to 5. The scale 1 shows a condition which the probability of strategies been use is minor where scale 5 means the maximum probability of risk strategies usage. Strategies Not important Little important Average Important Very important Score 1 2 3 4 5 Strategies for Risk Management in Construction Strategies for Risk Management in Construction 1.1 Introduction Risk management is one of the subfields on nine knowledge area in project management. Risk management is about managing uncertainty that inherent in most projects that require formal project management, using ‘uncertainty in the plain English ‘lack of certainty sense. Risk management also refer to a series of processes which are required for the identification, analysis, and reaction towards the projects risk in order to maximize the effects of positive uncertainty even and minimize the consequences of negative uncertainty even. Risk management also been organise in developed countries. This due to the risk management is better applied in the developed countries. Comparing with other countries with various situations, Malaysia is a developing country which the politic, economy, social and technology have mad specific risks especially related. Unfortunately, in Malaysia, the management of risk is not so systematic and requires more research and development. Malaysia seems to be developing countries because the demand for founding infrastructures is highly increasing. Currently, the government is enforcing the development plan. National economic will be burden if the plan is falling behind. This means that it is important to recognise the risks that endanger the plan. A lot of budget was spent on investment in the construction industry. The application of risk management will result in taking correct, regulated, and prompt decision through being informed about the environment despite the complication and changes in the construction industries. 1.2 Problem Statement Knowing the environment and be capable in decision making in a prompt and correct manner is the key to success in managing todays challenge and risk imminent. In case of not recognise both internal and external risks factor of the project, the managerial decision-making error will take place. Moreover, it will cause problems in time and cost assessment forecasting. Through risk management, it can identify the risk generating factor and control or remove such risk factors through analyzing and choosing the suitable action. As one of the subfields in the nine knowledge area of project management, risk management is still being paid less attention in Malaysia. In very few organisations, employers or contractors can be seen who have a proper insight into risk management. There are no any practical guidelines to be properly implemented for risk management in this industry. Furthermore, as a result of lack of binding regulations, current regulations cannot force construction parties to undertake risk management. So, by adopting scientific approach to risk management, introducing its process and eventually its compliance with existing realities in development plans, particularly in project are a necessity. The issue of risk management was for the first time raised in mid-1990s in the United States. Laws and regulations for applying risk management in projects have now been adopted. Since risk management is a new field, except for several seminars and universities research project, applied research has not taken place in risk management in Malaysia. 1.3 Research Questions i. What kind of risks occurs in the construction projects and what are their factors? ii. What are the strategies that been applied in dealing with risk? 1.4 Research Objectives i. To identify risk factors in construction industry. ii. To identify strategies of risk management applied in construction industry. 1.5 Scope of Study This research is focuses on the implementation of risk management in the Malaysia construction industry. Therefore, the scope of this study is only limited in Pahang where respondents have been chosen randomly out of this area. Moreover, the respondents comprised of contractors registering in Grade 7. The reasons for being such is that the categorization of the grade of contractors reflect, to a great extent, the size of project that being executed in the company and the size of the company. Grade 7 of contractors is regarded as big companies with large-size projects. Depending on their size of project and their company, the risk that they encounter will differ. As a result of this, to make sure the data obtained could be reliable, its necessary to limit the respondents based on the size of project and company. 1.6 Expected Findings This research will achieve some precious advantages. First is to enhance the consciousness of different key personnel of project resulting in performing the project reliably while considering issues like risk management in general management project. To accomplish this, its essential to implement theoretical concepts mentioned in numerous literatures in reality. This can guarantee a well project management through attempting to prevent from normal issues in projects like poor quality of products, cost overrun, and delays. CHAPTER 2 LITERATURE REVIEW 2.1 Introduction Risk will bring effect on the project cost, time, and scope. This chapter covers the construction project risks. All the risks will be recognised and categories into a number of group. Then, the current trend in risk management researches would be considered. In order to meet the first objective, identification and classification the strategies used by the project manager used to avoid the risk in their project. The second objective will be fulfilling through identification and classification of risk factor in construction projects. 2.2 Definitions 2.2.1 Risk Risk is an uncertain event or condition that, if it occurs, it can bring a positive or negative effect on a project objective (PMBOOK, 2000). Risk also can be defined as an uncertain event or set of circumstances if it occur, it will give effect on the achievement of the projects objectives (APM, 1997). This definition is widely use and gather welcoming upside and unwelcome downside effects. This definition works in theory but fails in practice. In this study, the effect of risk in construction project is through the way of integrated method, namely size of consequences and probabilities of happening have been measured. In the construction project, there is a lot of risk in every phase. This is the norm of any project not only in construction project. Construction firms want to have projects at international level. In every construction project, risks are present. Risks in international construction projects are more critical as compared to domestic projects especially when developin g countries are involved. That is the reason risk is desirable for international construction firms who want to do construction projects in foreign country, to identify the risks as early as possible, so that suitable strategies can be made for the penetration in to the foreign construction market and to manage these risks before the actual execution of projects on international level. Risk consequences in construction projects may reach an undesirable level because of inadequate resources and lack of advancements in technologies, therefore a thorough awareness and identification of risks is essential to prepare suitable strategies. International construction projects have many risks involved due to the nature of their structure. There are more parties involved and more phases are present in international construction projects than a conventional construction project. Each party has its different objectives. This difference in the objectives of parties leads to conflict of interest which is a root cause of risks in international construction projects. 2.2.2 Risk Factor Construction project is divided into separate phases. At the end of each phase, appraisal can be made and assessment of risk involved in proceeding with the project. The management of risk therefore a continue process and should span all the phases of the project. Since project risks are dynamic, a risk assessment must be carried out at the end of each phase prior to proceeding to the next phase. In fact, active management of risk must continue between the review points until the project is complete. Risk can also change during a phase. The result is a complete re-appraisal may need to be performed. There is a generic acknowledgement that human factors are the most important element that affects the project success. According to (Lynch, 2002), human factors bring affect to project success. A series of errors by a steel contractor lead to a near miss at Canary Wharf when a two-tonne pre-cast staircase fell from a crane and landed on the ground metres from a crowded side office. It was reported that the stairs fell when the left side eyebolt lifting pin of the staircase lifting gear came free. The load was transfer to the right-hand bolt, causing it ti shear. The report confirmed that the eyebolt was not correctly inserted. Independent testing agency Lloyds British examined key parts of the lifting equipment and concludes that the equipment would be sufficient had it been assembled correctly. Shortfalls in the firms arrangement at the site were criticised. No risk assessment or method statement had been drawn up specifically for the lifting operation and key decision were left to operators who were not trained to use eyebolt. All these shortcomings fall in sphere of human factors as defined earlier. 2.2.2 Risk Management Risk management is widely use by the companies or organizations to ensure the control of risk in the business process. In this research, the simplest possible approach to describe the risk management process is chosen due to the context of the construction sector. According to (Norman, 1993) risk management is a system use to identify and quantify all risk to a business or project that is exposed so that conscious decision can be taken on the way to manage the risk. Risk management also been mention in the PMBOOK as one of the nine areas of project management and has been illustrated as the process concerned with conducting risk management planning, identification, analysis, responses, and monitoring, and control on a project. 2.2.3 Fundamentals of Risk Management There are a lot of risks in the construction projects, and there is no standard method that can explain about the risk management. According to (Telford, 1998) risk in construction industry is the existence of real or possible chances or dangers affecting projects objective while commissioning or operating the project. According to (J. Walewski, 2002) , risks can be categories into two parts. The first part is pure risk when there is the possibility of financial gain. The second part is speculative risk that includes the possibility of both gains and losses. 2.3 Risk Management Process Project Risk Management involves procedure considering executing risk management planning, identification, analysis, response and monitoring, and control on a project. This procedure can update the majority of the project. Project risk management aims to enhance the possibility and effect of positive event, and reduce the possibility and effect of negative incident to the project. According to the Project Management Body of Knowledge, (PMBOOK, A guide to the project management body of knowledge, 2004), the Project Risk Management Process 2.3.1 Risk Identification Risk identification has two types which are prescriptive and creative. These two types of risk identification has their own function but they must be cautiously handled in order to make sure the process of identifying risk is economic. The result in the utilization of checklists of standard risk distinguished to appear in a special context when there is an attempt to modify the risk identification. Even though checklist is fast to make, but it is inclines to prepare the anticipations of the engaged, and the identification of risks going beyond the experience summarized in the list. The result of using the checklist method can be high, but if they are to have a function, it suggest that they better retained for examining the identification process, and make sure there is no familiar issues have been skipped or ignored. Brainstorming is another method that being hold in a group and it is the favoured method. This is a little more challenging for the participants compared to checklist method but the brainstorming seems more efficient. Brainstorming predict the identification process to gain inspiration from the wide capacity of the participants, due to decreasing the risk that is inadequate consideration will be given to new and more emergent issues, as can occur with the checklist method. 2.3.3 Risk Analysis The risk analysis is implement in each risk as significance rating structure that is considering any existent factors that might be occur which will function to check the risk. The risk analysis can be implementing with qualitative impact and likelihood scale and a matrix clarifying the significance of different composition of the risk. When risks are complicated by themselves that possibly includes various related impacts and events, some types of modelling might be essential. The significance of a risk is connected to a well explained event that will be a composition of the impact and likelihood of the risks. The significance of an unsure quantity will be a function of its three type of value which are the maximum, minimum, and most likely values. 2.3.4 Risk Evaluation Risk can be occurring in any situation. When there are just a lot of risks at the work, the evaluation phase may be proportionately simple and easy. On the other hand, it is a critical step for obtaining an accepted view of the proportionate of the recognized risks. Risk evaluation takes the primary analysis and examines the risks that occur towards the companys known preferences. Any risks which is too high or too low significance are adapted, with a record of the fact being hold for the purpose of tracking. 2.3.5 Risk Treatment Risk treatment comprises what should be done in order to give reaction to recognized risks. Any plans which were thought of before the risk management process commenced are enlarged with actions that been taken to manage the risks before they occur and providing contingency plans with which to get back if a risk happen. 2.3.6 Monitoring and Review In monitoring and review ingredient of the process, there are two levels of them. The other five steps must be remained under an examination as the time passes. Finding of better information may make the first evaluation out of date. It is now usually essential to start the whole process or repeat it once again when risks occurs, not until the change is especially deep, but those parts which are immediately influenced by changing occasions should be updated from time to time. The second step is the monitoring of the performance of the other five levels. The implementation of the risk management process attracts sources and should be administered in order to make sure that it is performed cost-effectively. 2.3.7 Communication and Consultation Communication and consultation is the key component of the risk management process and a major beneficial side effect. Risk management is success when it achieves a high level of creative input and involving all parties with a role to play in achieving a successful outcome for the project or business process being addressed. In both the planning and execution phase in the risk management process, it is prominent to make sure all those individuals who need to be involved are given adequate opportunity to do so and are kept informed of developments in the understanding of risks and the measurement taken to deal with them. 2.4 Tools and Techniques for Risk Response Planning In every project, the risks can raise when there are a lot of phases and tasks to be done in such a way that the least consideration is delivered to main issues of the project. According to (Bajaj, 2000), individual members of the project are usually focus only on the role that they have in the project risks and voluntarily or involuntarily try to pass these risks on to other project members. This means they do not want to take the responsibility to handle the risk by themselves. The crucial part of risk management is mitigating risk by minimize their effects. A systematic risk management strategy which is executed properly shall decrease the adverse effects. Risk mitigation that been properly planned and well managed is a replacement of uncertain and volatile events with a more predictable or controlled response ( (Chapman, 2002). A proper risk mitigation strategy is very important in order to reduce the likelihood of happening or possible influence and doubtfulness of a risk event. There are four types of risk management strategy which are: i. Risk avoidance which when a risk is not accepted and other lower risk choices are available from several alternatives; ii. Risk acceptance which when a conscious decision is made to accept the outcomes the event should occur; iii. Risk control which when a process of sequentially monitoring and improving the situation on the project is used. This process includes the development of a risk reduction plan and then pursuing the plan. This means that mitigation strategy is the most common risk management and handling technique; iv. Risk transfer which when the risk is shared with others. Sharing the risk with others involve contractual shifting, performance encouragement, insurance, warranties, bonds, and so on. 2.5 Classification of Risks in Construction The first stage in risk management is risk identification. Risk identification is recognising any risks that can be occur in the construction projects. Risk classification is one of the part in risk identification which is the trying to manage different risks that can give impact and influence a construction project. According to (Chapman, 2001), risk has four subcategories which are project, industry, client, and environment. From the other related literature, out of 58 risks recognized connected to construction joint ventures, (Shen, 2001) categorised them in 6 groups according to risks nature like financial, economy, technical, politic, and management. As a result, there are a lot of methods that can be use to categorizing risks that can affect to construction projects. According to other study by (Kalayjian, 2000), in the Third World of Construction classified that some of the most representative kinds of risks that are commonly use in todays global construction area are: i. Financial Risk is the economic feasibility in a project that relies on its capital organizing and capacity to draw dependable resources of financing at logical terms. Risks contain the owners power of acquiring enough budgets, deposit payment, receive tax incentives, and expect instability of currency exchange rates. ii. Design and Construction Risk which is in the construction project itself. To be success in construction projects, the managerial teams must have a power decision making. Risks that must be take care are an effective team selection process, obtaining permits and third party concurrence in timely fashion, procurement of adequate labour, materials and equipment, monitoring all changes in project scope, quality control assurance, and ensuring overall compliance with contractual obligations. iii. Weather and Environmental Risk is about the mother nature situation. In construction sites, there is vulnerable change in the weather and natural disaster like earthquakes, monsoons, and flood. Other risk can be reducing the other dangerous wastes and severe environmental legislation. iv. Economic and political risk is a risk which also can affect the construction project. The performance of economic in a country and political stability has a significant effect in construction activity and investment. Prominent risks consist of financial policy and governmental monetary responsibility, resources availability, development of infrastructures, internal stability, changes in managerial schedule, and political management. On the other research done by (Hassanein, 2007), there are several risk that has been identified which are: i. financial risks: the checklist mentioned about some financial risks which are related to the projects in this study. ii. Technical risks: the checklist show allowances for similar standards and codes. This is because the two projects studied were tendered internationally which causes contractors from different countries. iii. Risk related to change: the checklist addressed certain provisions concerning the simultaneous progress of design and construction phases on the two fast track project under study. iv. Consortium risk: in some contracts, contractors are requested to make partnership including foreign and local contractors as a necessity of tendering qualification. v. Owner obligation risks: the checklist embraced factors which should be stated in the contract to clarify owners responsibilities and to guarantee these responsibilities would be come up with on time. These include an obvious interpretation of these responsibilities, time frame for their execution and declaration of amendments if these responsibilities are not executed shall be contained in the contracts. vi. Risks regarding interface with other contractors: the checklist included specific items to mitigate risks related to interfaces with other contractors. vii. Risks regarding interface with other contractors: the checklist included specific items to mitigate risks related to interfaces with other contractors. According to (Tang, 2007), the most important risks in project are poor quality of work, premature failure of the facility, safety, financial, and incorrect design risk. 2.7 Barriers of Implementation of Risk Management According to (Liu, 2007), the most dominant risk in the construction industry is the unsupportive culture within the industry. As a result, the lack of proficiency and experience is the general reluctance for implementation of risk management in the Chinas construction industry. Lack of proficiency and experience causes contractors to be unable to identify the significance and advantages of risk management. To improve the low understanding towards risk is through changing the culture of enterprise. This is because it is essential for Chinese contractors to agree with the risk managements concept as well as execute risk management techniques. The professionals behaviour seems the most significant issue affecting the improvement of risk management in the Chinese construction industry. Organizational learning becomes the critical element of an incorporated risk management procedure which being the learning structure formed to assist Chinese contractors in developing their performance an d knowledge towards risk management. In fact, to transform the modern knowledge to their own knowledge using organizational learning seems become the critical issue for Chinese contractors in order to develop their ambitious. According to (Baloi, 2003), it appears that professionals have not completely understood the value of risk management. This is because there are advances in the methods of risk management and availability of the enormous body of knowledge of risk management. The professionals recognised language, implementation costs, and educational barriers and a fear of change to be the principal barriers of the efficient conformance. According to (Hlaing, 2008), Singapore construction contractors on construction risk identification asserted that the reason that preventing the implementation of risk management process is money but it is not the major constraint for implementing risk management program for the companies but the most important risk in the list is lack of time. This is same as stated by (Lyons, 2004), identified that time constraint is a main restriction. The activities of construction industry are really related to time when the manufacture of the construction is basically used just-in-time for the manufacture need of customer. 2.8 Risk Identification Methods In order to be successful in project management, it requires the ability to predict the risks that affecting the project scope, time, and cost. However, there are a lot of researches about risk identification, risk assessment, and management for executed facilities is focusing on types of projects or categories of risks aspects. It is related to the literature from (Howell, 2001) about the political risks that exist. Now a day, the construction industry still cannot identify the risks that occur in the project activities. According to (Walewski, 2002), the worth of systematic risk management of activities on project has not been identified. This is because the lack of common vision about risk and the parties that involved in construction industry such as owners, designers, investors, and contractors have different objectives and the relationship among them are prevalent contradict. All of the project parties not systematically make their efforts at organizing risk analysis management among themselves and this particularly correct between contractors and owners. (Fang, 2004) show a model for risk assessment. The model use for tendering project in Chinese building project based on assessment and identification of critical risks in the Chinese construction industry. As a result, the projects risk could be evaluated by analyzing the issues such as the competition for tendering and reasonableness of bid price, lack of cooperation between contractors and the owner. In other study done by (Hassanein, 2007), the marked lack of consistency in the contractors risk identification effort been identified as the risk in the power station projects on Egypt. The contractors who have more experience in Egypt were better to identify the relevant risk. Vice versa, the local Egyptian contractors who have vast experience in Egypt but limited project management experience were not really expert to properly identify risks and to take the appropriate exceptions. In fact, the bidders do not include in their proposals on their true lists of exceptions which represent genuine risks to them. CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction This chapter will cover how the research will conduct to achieve the objectives of this study. The methodology that will be use are questionnaire survey among the Pahang construction professionals, and preliminary interviews with experts will carry out. The steps are as follows: 3.2 Data Collection 3.2.1 Interview Interview is the effective procedure of data collection because the actuality of condition could be perceived specifically and comprehensively while conducting the interview. For the purpose of this study, as the scope of this study is limited to Pahang, the interview sessions will conduct through two main ways which are telephone interview as well as email interview through the internet. 3.2.2 Questionnaire Questionnaire survey is one of the others way of data collection carry out among selected construction practitioners involve in construction projects. This specialist will working in contractor construction companies. The questionnaire will be identified from interview with construction practitioners and through literature review. The survey questionnaire will administer through e-mail and fax, and postal questionnaire, and secondly through the distribution to selected contractors which are project managers, managing directors, chairman, and head of technical departments operating in the Pahang construction industry. 3.3 Data Analysis All returned questionnaire will be check from completeness and suitability for use in statistical analysis. Next, all the data collected from the questionnaire will be analyse with the assistance of statistical software program called Statistical Package for Social Science (SPSS). After putting the data in SPSS software program, some statistical method will be apply to the data through frequency analysis and mean index, risk analysis matrix, and single sample T-test. After putting questionnaire data into SPSS, some statistical method will be applied to the using frequency analysis and mean index, risk analysis matrix, and correlation test. 3.4 Measurement Most of the question will applied using five point of Likert scale, and other question will applied with multiple choice. The most common scale that will be use is 1 to 5. There are three sections in the questionnaire. Section A will cover about the level of risk in construction project. Participant will be given three choices of answer which is low, medium, and high to scale the risk level according to their perspective. In section B, the typical Likert scale take the following format: Risk level Rare Unlikely Possible Likely Almost certain Score 1 2 3 4 5 Table 3.1: Risk factors In section C, the respondent will be asked to choose the scale between 1 to 5. The scale 1 shows a condition which the probability of strategies been use is minor where scale 5 means the maximum probability of risk strategies usage. Strategies Not important Little important Average Important Very important Score 1 2 3 4 5