Tuesday, April 20, 2010

Kids and the Internet

clip_image001

Introduction

The internet has transformed how businesses, consumers and individuals communicate in the 21st century. The internet user has access to an unprecedented amount of information and can communicate with more people than ever before. This medium is fast, cheap and readily accessible to people at work, home and school.

This paper will examine the negative aspects of internet usage by minors and explore what solutions are available to parents, guardians and educators.

Inappropriate Content

The proliferation of the home computers and easy access to the internet has led to the publication of a smorgasbord of content. Most content is harmless but some categories are generally accepted to be inappropriate and potentially harmful to children. Pornography is obviously not acceptable, but parents may also want to screen their children from sites promoting gambling or hate.

Undesirable content can be filtered using hardware, software or even by an Internet Service Provider (ISP). Obviously no system is perfect, content filters may inadvertently block valid material or permit objectionable material.

Naturally, if there is a system to block content, then there is probably a counter-measure and someone willing to use it.

Sexual Predators

A predator is an adult that attempts to communicate with minors through the internet. Predators employ a number of techniques such as prowling chat rooms and social networking web sites. Ultimately the predator will attempt to engineer a face to face meeting.

If a minor is permitted to visit chat rooms and social network website, it is almost impossible to discern a predator from a non-predator.

Probably the only affective solution to combat predators is with direct adult supervision. Adults have the social skills to discern normal behavior from that which is questionable.

Cyber bulling

The past few years has seen an explosion of social networking sites. These sites offer the internet user a convenient way to post content on personalized pages. But unfortunately these sites can also be the venue for people to post hateful or abusive comments about an individual.

Because hateful contributions are written and read outside the class room, some schools may not see a need to address this problem. It is important to note that unlike a school yard accusation, cyber bulling is normally anonymous with an audience of thousands.

The concern is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most research and enforcement efforts focus on bullying in school classrooms, locker rooms, hallways and bathrooms. But given that 80 percent of adolescents use cell phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chat room,” write Kirk R. Williams and Nancy G. Guerra, researchers at the University of California, Riverside and co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.”
(Parker-Pope, 2007)

It is likely that legislation may be need to be considered to protect individuals and allow state and federal prosecutors to charge perpetrators.

Internet Overuse

One criticism of the internet is that children are spending more time inside behind a screen than outside. This issue is not specifically focused on the internet but on gaming and computing in general. It is natural that children (like adults) would choose the path of least resistance, that is, browsing the internet is just an entertaining as playing soccer but requires significantly less exertion.

The issue of internet overuse is can be alleviated with parent education. I suspect that as the adolescent obesity epidemic worsens, health officials will be forced to undertake a campaign to educate parents.

Parental Guidance

During class discussions on 9/15/2008, a few of my colleagues discribed techniques they employ with their children at home. SF commented that in his household, his children are only permitted to use the internet whilst supervised in their family’s living room. RW imposed a somewhat stricter rule, her step children must let her examine a website before they exit or log out.

Conclusion

I must admit, when researching this article I was skeptical about the perceived threat from sexual predators. Well, that changes when I read the following.

In case you are wondering whether any of this is necessary, consider this. According to US-based research, one in seven teenagers has met, face-to-face, total strangers they met online, 54 per cent have communicated with a stranger online, and 47 per cent have received pornographic e-mail.
(Taylor, 2006)

As stated above, it is dangerous to rely on software to guard our children from objectionable material or dangerous individuals. Parents and guardians must take an active role in supervising children whilst permitting a limited amount of autonomy. Below is a list of useful recommendations.

…keep the computer in a shared living area; supervise children's online activities; encourage children to discuss any unsavoury content they have found; warn children about the potential dangers of chatrooms; use parental control software but do not over rely on it; change your parental control access password regularly.
(Parental control software, 2005)

Lastly, the power of the internet has changed the way we work and play. But the internet need not change the way we think.

References

  • Parker-Pope, T. (2007, November 27). More Teens Victimized by Cyber-Bullies. In New York Times. Retrieved 9/18/2009 from
    http://well.blogs.nytimes.com/2007/11/27/more-teens-victimized-by-cyber-bullies/?scp=3&sq=cyberbulling%20&st=cse
  • Taylor P. (2006, November 11). Need a cybernanny? TECHNICALLY SPEAKING: Paul Taylor recommends software for parentswho are looking toprotect their childrenfrom online hazards :[LONDON 1ST EDITION]. Financial Times,p. 10.  Retrieved September 19, 2008, from ABI/INFORM Global database. (Document ID: 1160632511).
  • Parental control software is not enough to protect children - claim. (2005, August). Telecomworldwire,1.  Retrieved September 19, 2008, from ABI/INFORM Trade & Industry database. (Document ID: 888601501).

Monday, April 19, 2010

The General Public License

File:Heckert GNU white.svg

The article was first published on 6/2/2008.

In the twenty first century, people in developed countries interact with computers on a daily basis. The interaction could be with a personal computer or a computer embedded into a device such as a television or microwave. Regardless, all computers rely on a set of instructions that describe how the hardware should operate. These instructions are collectively called software.

Software is normally developed in human readable text and then compiled into a machine readable binary file. Whilst binary files are normally distributed with hardware or sold separately, the human readable text (or source code) is not. This is mainly because distribution of source code is unnecessary plus doing so would comprise the software developer’s competitive advantage.

When a consumer purchases software, the software may be duplicated on a hard drive and in the random access memory (RAM) for routine use. In 1980, the legislature introduced section 117(a)(1) into the Copyright Act to specifically permit this type of software duplication. This amendment may have contributed to the software industry’s reluctance to distribute source code even though it may have hindered innovation.

Open source is essentially a counter to proprietary (or closed source) software. The philosophy was first introduced in the early 1980’s by Richard Stallman when he started working on the GNU project. Stallman’s intent was to make software source code available to the public with relaxed (or non-existent) copyright.

In the late 1990’s, Microsoft and Netscape battled for supremely in the legendary “browser wars”. The early dominance of Netscape’s Navigator was eventually overtaken by Microsoft’s Internet Explorer. In 1998, Netscape conceded defeat but also brought “open source” to the public’s attention by releasing Navigator’s source code under an open source license, specifically the GNU General Public License (or GPL).

The GPL is one of many licenses approved by the Free Software Foundation and the Open Source Initiative but it is by far the most popular. GPL is used by more than half of the projects hosted on freemeat.net and sourceforge.net, the two most popular open source websites.

Richard Stallman, an open source pioneer, founded the Free Software Foundation in 1985 but also wrote the GPL. The popularity of GPL could be explained by the fact that contributors to a GPL project felt assured that their contributions would benefit all and not be exploited by software companies.

The GPL was first released in 1989. The key clauses in the license are as follow:

  1. The licensee has permission to modify, copy, redistribute the original or derived work.
  2. The pre-compiled binaries must be accompanied by the source code or a mechanism to access it.
  3. The distributor of the derived work is compelled to use the GPL.
  4. The distributor can charge a fee. However, this is somewhat muted with full disclosure of the source code.
  5. The distributor cannot impose restrictions that contradict the GPL. For example, a distributor cannot distribute software under a non-disclosure agreement.
  6. The GPL is designed to be interpreted as a license rather than a contract. In common law jurisdictions like the United States this means that the GPL is enforced by copyright laws.

As stated in (6), a person can choose to disagree with the license and continue to use it legally. However that person is not permitted to distribute the software.

Commercial software companies generally avoid using GPLed software because the software is usually unsupported, changes rapidly or has an uncertain roadmap. But the most important consideration is the “viral” nature of GPL software as stated in (3), that is, derived software must adopt the GPL. Whilst GPL software may be low cost (or free) it does present a significant risk to organizations that wish to keep their source code proprietary.

A prominent issue today in the open source community is whether dynamic linking to GPL libraries is considered a “derived work”. The community is split on the question but Determann (2006) concludes:

…dynamic linking to GPLed programs would not normally trigger the application of the GPL to the linking program, even if both programs are distributed together.

Now consider Mozilla Firefox, a popular web browser licensed under GPL. Could a hypothetical software developer distribute a proprietary add-on? Determann (2006) says yes:

…contrary to the views expressed by the Free Software Foundation, distributors can separately distribute add-on products intended for combination with GPLed code without fear of incurring contributory liability.

In Wallace v. International Business Machines Corp. et al. 467 F.3d 1104 the plaintiff alleged the defendants IBM, Red Hat and Novell used the GPL to illegally stifle competition. Chief Judge Easterbrook in the seventh court of appeals ruled that the GPL did not contravene federal antitrust laws. Fayle (2006) states:

Chief Judge Easterbrook, writing for the court, dismissed these arguments and reassured free software advocates that “[t]he GPL and open-source software have nothing to fear from the antitrust laws.”… …The GPL actually results in increased output and the lowest possible prices, this antitrust law has no interest in breaking up the GPL’s “conspiracy”.

In 2006, a German court ruled that DLink Germany Gmbh infringed copyright by using parts of the Linux operating system in its Network Attached Storage (NAS) device. This was the first time that a court had judged that the GPL was enforceable.

The following statement by Carver (2003) still holds true today:

Historically, the GPL has been primarily enforced through private negotiation and settlement agreements. This process has been successful thus far because most alleged violators have apparently been eager to correct any defects in their compliance. These extra-judicial resolutions have generally satisfied the goals of the copyright holders enforcing the GPL, but left questions of the GPL’s enforceability in court largely unanswered.

From 2007, there have been four cases that have centered on a small Linux utility called BusyBox. The BusyBox software was published under a GPL license but was found to be used in the firmware of Monsoon Multimedia Inc., Xterasys, High-Gain Antennas and most recently Verizon Communications. All four cases resulted in the hardware manufactures agreeing to pay the plaintiff’s legal costs and publishing their “derived” works.

References

Sunday, March 14, 2010

CAPSIM Tips and Tricks

Earlier this year I completed my Masters of Business Administration at the University of Redlands with a course that included participation in a business simulation from CAPSIM.  What follows is an exert from our team’s final report regarding our strategy and lessons learnt.  Hopefully the information below that allowed us to decimate our human competitors will also help you.

Animated chart showing how each team positioned their products with respect to the the “ideal market” colored with a large light purple circle.  The red dots represent products from our team, whereas the black and blue dots are products from our two human competitors.  Lastly, the greens dots represent products from our nemesis, the computer opponent.

Introduction

In the CAPSIM simulation, five generalized customer sectors are defined: low-end, traditional, size, performance and high-end. For each sector and for every year the simulation tells us the total number of customer, the ideal product specifications and customer preferences. For example, in 2018, the final year of the simulation, there will be 14,477 customers that can be associated with the low-end sector. The ideal product for low-end customers will be a unit with a performance of performance and size of 5.7 and 14.3 respectively. And lastly, low-end customers primarily use product age and price to differentiate between competing products.

Sector Growth

After a few rounds (aka years) it was evident that customer demand in each sector was grew constantly. We established that the five sectors had the following growth rates.

Sector

Growth

Trad

9.2%

Low

11.7%

High

16.2%

Perf

19.8%

Size

18.3%

Even though the Size and Performance sectors had the strongest growth rates, it is the Low-end sector that balloons to almost 15,000 units in the final year of simulation.

Sector

2010

2018

Trad

   4,925.00

     9,958.35

Low

   5,974.00

   14,477.40

High

   1,702.00

     5,657.29

Perf

   1,277.00

     5,418.08

Size

   1,322.00

     5,071.18

During the last few rounds, the market was unable to satisfy customer demand due to insufficient plant capacity of all firms. This, in our opinion, was a lost opportunity for easy sales especially when Chester, our arch-rival, vacated this sector. In retrospect, bulking up on low-end capacity during early round would have been an advantageous strategy in anticipation of sector growth.

Sector Drift

Over time, technological advances allow chip manufacturers to offer smaller and faster units. Market competition and customer expectation result in a “drift” in the ideal specification for each generalized sector. The CAPSIM online documentation states the following drift rates for each sector.

Segment

Performance

Size

Traditional

0.7

-0.7

Low End

0.5

-0.5

High End

0.9

-0.9

Performance

1.0

-0.7

Size

0.7

-1.0

When these drift rates are applied to the initial positions of each sector’s “ideal position” we see the following trend.

image

From the graph were able to ascertain the follow key factors:

  1. The size and performance sectors are diverging. This is significant because a product launched into these sectors will not be able to be repositioned into other sectors.
  2. The low-end, traditional and high-end sectors overlap. For example, an ideal high-end product in year 2010 is equivalent to an ideal traditional product in 5½. Andrews used this strategy to cease R&D on Adam in 2013 so that it could be a traditional product in 2016.
  3. The rate of drift in low-end sector is considerably less than the high-end sector.

The Automation Pitfall

In the simulation, automation refers to an investment to improve the efficiently of assembly line machinery. The investment results in a reduced labor cost and a substantial improvement in product contribution margins. Automation is not without adverse effects, as automation increases the cost of additional plant capacity becomes increasingly more expensive. However, in our opinion, the most damaging effect of high automation is the increased length of time to reposition sensors.

In a few instances we may have automated too much too early. This stifled the responsiveness of some products to annual drift corrections. This dampening effect on R&D resulted in less time in the “ideal position” for each sector, for the high-end sector this is critical for attracting customers.

During later years, the effects of high automation were mitigated when the introduction of the TQM module in the simulation. By funding TQM’s “concurrently engineering” we were able to reduce, to a small degree, the time to reposition products.

The Value of Leverage

Financial leverage takes the form of a loan or other borrowings, the proceeds of which are invested with the intent to earn a greater rate of return than the cost of interest. In the case of our firm, our primary form of capital resulted from issuing debt (both long and short term) and the sale of stock. Leverage allows greater potential returns for a firm that would not have been available. The potential for loss is greater because if the investment becomes worthless then the loan principal and accrued interest on the loan still need to be repaid. Our firm learned this firsthand because we had to take several emergency loans.

The chart below illustrates several important financial ratios: Return on Sales (ROS), Return on Assets (ROA), and Return on Equity (ROE). When you compare our firm’s performance over the course of the simulation relative to the percentage of borrowings as a function of our firm’s total liabilities and owner’s equity, there is no consistent correlation between these performance indicators as evidenced below:

However, what this data does show is the effect of leverage on our long-term success. Notice the significant disparity between the ROS, ROA, and ROE in 2013 versus 2016. Both years our firm borrowed significantly. However, in 2016 the money we borrowed was spent on plant improvements to the tune of over $15 Million, whereas in 2013 our firm actually sold plant capacity and turned a profit from the sales. In other words, early in the competition our firm made the mistake of not (re)investing the money we borrowed to finance our long-term capital goals. This is what resulted in the collapse from years 2014 – 2016 because the money we borrowed wasn’t properly invested in the firm. Consequently our firm’s performance in 2013 is an representation of pseudo-positive performance, when in reality our firm actually suffered from not reinvesting this money back into the firm’s manufacturing business.

Strategy of Competition

In the Capsim simulation we implemented a strategy of broad cost leader with focus on product lifecycle. We continuously updated our products so that they had competitive ages. In addition, we made sure our products fit into the ideal market. As we progressed through the years we changed our strategy to maintain our existing SIZE product and launch a new one, since two of our competitors exited this market. This did not result in immediate profits, as one of our products had to be re-engineered. In addition, we launched several high end products and soon after Chester copied our strategy of launching high end products. Again, we had to re-engineer some of our high end products to compete with two competitors. It is important to have a consistent strategy, but you must respond to competitor actions, otherwise you run the risk of losing out of market share or carrying inventory, both of which will hurt short and long term profit.

Impact of Inventory

Toyota is credited for the invention of Just in time inventory. Under ideal conditions, a company would purchase, produce, and ship product to meet the inventor for one day or one week. As the name states, “just in time” mean that raw materials are received just in time to go into production, manufactured, completed and shipped to customers. Just in time emphasizes producing exactly what is needed, as opposed to keeping everyone busy.

Carrying costs are definitely a lesson that the CAPSIM simulation demonstrated. Over production generally resulted in an emergency loan. When a company overproduces, they generally pay additional production costs, warehouse costs, and potentially product obsolescence. In addition, inventory that does not sell takes up valuable production space that could have been used for other purposes. While inventories act as buffers against unforeseen events, they have a cost. In addition to the money tied up in inventory, the presence of inventories encourages sloppy, inefficient work that may result in defects that dramatically increases total production time.

Good Luck!

Thursday, March 4, 2010

Malaysia & Indonesia – A Comparison

Petronas Towers

(image from Wikipedia)

[Article original published August 2008.]

INTRODUCTION

Malaysia and Indonesia share similarities in geography, culture and cuisine.  However the politics of both countries differ quite significantly.The Federation of Malaya gained independent from the United Kingdom in 1953.  The federation was renamed to Malaysia when the states of Sabah and Sarawak joined in 1963.  The independence from the United Kingdom was amicable but delayed since Second World War until after the communist insurgency was suppressed.

Indonesia declared independence shortly after the Japanese surrendered in 1945.  But unlike Malaysia, Indonesia’s former colonial rules fought unsuccessfully for four years to regain control.  Indonesia’s first leader, Sukarno, maintained tenuous control and relied on support from the Military and the Communist Party of Indonesia (PKI).

MAHATHIR AND SUHARTO

Two politicians stand out for their role in transforming their respective countries into modern emerging economies, former Malaysian Prime Minister Mahathir bin Mohamad and former Indonesian President Suharto.

Mahathir ruled Malaysia for 22 years from 1981 and is credited with the country’s phenomenal economic growth during the late 1980’s and 1990’s.  Mahathir is best known internationally for the large scale projects such as the planned capital city of Putrajaya, the Bakun Dam and the iconic Petronas Towers.  Mahathir believed in the Keynesian economic theory that growth can be achieved in a mixed economy through infrastructure investment.

Suharto, a former military leader, became Indonesia’s second President after purging the country of communist.  Suharto ruled Indonesia for 32 years with the economic and diplomatic support from the West.  Suharto encouraged foreign investment which led to dramatic economic growth.  However the Suharto regime (referred to as the “New Order”) is also synonymous with corruption and anti-Chinese legislation that attempted to suppress Chinese culture and reduce Chinese economic control.

Anti-Chinese policies were not restricted to Indonesia.  In 1971, Malaysia launched the New Economy Policy (NEP) whose goal was to redistribute Malaysia’s wealth from non-Malay, such as Chinese, to Malay.  The policy mandated that all initial public offerings (IPO) reserve 30% share for Malay investors.  Other provisions include quotas at educational institutions and discounted housing.  The policies of the NEP continue today as the National Development Policy (NDP) even though the success of the program is questionable.

The domination of these two regimes took a major blow when the Asian financial crisis occurred in 1997.  It is interesting to compare how Malaysia and Indonesia were affected (and handled) the crisis.  Prior to the crisis Malaysia was progressing towards its vision of achieving developed nation status by 2020.  However this nationalist vision took a step back when the country plunged into a recession following the Asian financial crisis.  In less than a year the ringgit and stock exchange had lost half of its value.  In opposition to the international community and his own finance minister, Mahathir refused IMF aid and instead choose to impose capital controls and fix the ringgit against the US dollar.  This strategy proved successful, by 2005 Malaysia had a budget surplus of US$14 billion however asset values are still to return to the pre-crisis level.

Prior to the crisis, Indonesia had a trade surplus, large foreign exchange reserves and a strong currency.  Following the crisis, the rupiah’s value dropped dramatically and Indonesia was forced to accept economic reforms in exchange for IMF aid.  The rupiah continues to decline from a pre-crisis value of RP 2,400/dollar to RP 17,000/dollar in 1998.  Indonesia’s inflation and the removal of subsidies for food and education caused widespread public unrest.  In May of 1998, protests turned to riots, with Chinese-owned businesses being the target for many looters.  On May 21, Suharto resigned due to public pressure.  Incidentally, there is strong evidence that the protests and riots were engineered by the military to persuade Suharto to resignation.

Many different parties reportedly were involved, including local hoodlums, mass organizations, and elements of the armed forces. The team criticized the armed forces for failing to take preventive action or steps to stop the riots once they began.
(U.S. Department of State, 1999)

POST MAHATHIR AND SUHARTO

In 2003, Mahathir retired from politics and was succeed by his deputy, Abdullah Ahmad bin Badawi.  Abdullah’s commitment to eliminate corruption in government may have contributed to the Barisan Nasional coalition’s landslide victory in 2004.  The Barisan Nasional coalition has led the government since Malaysia’s independence in 1957.

In recent years, the Malaysian opposition parties have gained public support in their campaign for free and fairer elections.  Specific demands include access to government controlled media and reforms to the electoral system which is prone to tampering.  The campaign culminated in the 2007 Bersih rally in which 100,000 protesters demanded reform in the nation’s capital.

Abdullah’s Barisan Nasional coalition won a narrow victory in the 2008 general election.  The Berish rally and resistance to the NEP’s affirmation action policy is thought to have contributed to the opposition’s success.

A disturbing and somewhat distasteful chapter in Malaysian politics is the treatment of Mahathir’s former protégé, Anwar Ibrahim.  Anwar served as Mahathir’s deputy and finance minister but was sacked in 1998 over a disagreement on how to handle the Asian financial crisis.  Following the dismissal, Anwar became a vocal critic of Mahathir and the coalition government.  In 1999, he was convicted and sentenced to 15 years in prison on questionable charges but was released in 2004 after the federal court dismissed one of the changes.  In August 2008, Anwar was admitted as a member of parliament after winning a seat in the constituency of Permatang Pauh.  It is envisioned that Anwar will play a more prominent role in Malaysian politics in the years to come.

Indonesia has experienced considerable political reform following Suharto’s resignation in 1998.  Suharto’s successor and former Vice President, Jusuf Habibie, introduced legislation in 1999 that gave greater freedom to political parties.  In a surprisingly move, Habibie allowed the people of East Timor to vote for their independence from Indonesia.  This decision was very unpopular in Indonesia and ultimately led to his political demise.  Abdurrahman Wahid became Indonesia’s first elected president following Suharto’s departure.  Abdurrahman’s time as president is notable for his amicable resolution of the separatist movements in Aceh and Papua (formerly “Irian Jaya”).  Megawati Sukarnoputri, daughter of the first Indonesian president, replaced Abdurrahman in 2001 for the remainder of the 1999-2004 presidential term.  Megawati continued to implement political reform but her poor public profile ultimately led to her defeat in the 2004 general elections.

In 2004, the constitution was amended so that the President and Vice President could only be elected by popular vote and would be restricted to two five year terms.  Additionally, the House of Representatives would no longer have seats reserved for candidates selected by the armed forces (TNI).

The term of the current president, Susilo Bambang Yudhoyono, has been be plagued with disasters.  The first of which (and most devastating) was 2004 tsunami that killed more than 130,000 people.  In 2006 and 2007 Indonesia experienced volcanic eruptions, mudflows, bird flu and terrorist bombings.

Country Comparison Fact Sheet

 

Malaysia

Indonesia

Type

Constitutional Monarchy

Republic

Legal System

Based on English common law

based on Roman-Dutch law

Head of State

Paramount Ruler Sulltan MIZAN Zainal Abidin
(since 12/13/2006)

Nine of the thirteen Malaysia states have hereditary rulers (or Sultans).  The head of state is chosen by (and from) the Sultans for 5 year term.

President Susilo Bambang YUDHOYONO
(since 20 October 2004)

The President is both head of state and head of government.  Elections are held every 5 years.

Head of Government

Prime Minister ABDULLAH bin Ahmad Badawi
(since 31 October 2003)

The prime minister is selected by MPs of the ruling party.

Executive Branch

Paramount Ruler, Prime Minister and the Cabinet (members of parliament selected by PM)

President and Cabinet (members are selected by the president).

Legislative Branch

Senate
70 seats
(44 appointed by paramount ruler, 26 elected by state legislatures for three year term)

House of Representatives
222 seats
(members selected by popular vote for five year term)

House of Representatives
550 seats
(members are elected by popular vote every 5 years)

Judicial Branch

Civil Courts at Federal and State level.

Sharia Courts deal with religious and family matter for Muslim people.

Supreme Court

Justices are selected by the house of representatives and approved by the president.

Independence

8/31/1957 (from UK)

8/17/1945 (from The Netherlands)

International organization participation

ADB, APEC, APT, ARF, ASEAN, BIS, C, CP, EAS, FAO, G-15, G-77, IAEA, IBRD, ICAO, ICC, ICRM, IDA, IDB, IFAD, IFC, IFRCS, IHO, ILO, IMF, IMO, IMSO, Interpol, IOC, IPU, ISO, ITSO, ITU, ITUC, MIGA, MINURSO, MONUC, NAM, OIC, OPCW, PCA, PIF (partner), UN, UNAMID, UNCTAD, UNESCO, UNIDO, UNIFIL, UNMEE, UNMIL, UNMIS, UNMIT, UNWTO, UPU, WCL, WCO, WFTU, WHO, WIPO, WMO, WTO

ADB, APEC, APT, ARF, ASEAN, BIS, CP, EAS, FAO, G-15, G-77, IAEA, IBRD, ICAO, ICC, ICRM, IDA, IDB, IFAD, IFC, IFRCS, IHO, ILO, IMF, IMO, IMSO, Interpol, IOC, IOM (observer), IPU, ISO, ITSO, ITU, ITUC, MIGA, MONUC, NAM, OIC, OPCW, OPEC, PIF (partner), UN, UN Security Council (temporary), UNCTAD, UNESCO, UNIDO, UNIFIL, UNMIL, UNMIS, UNOMIG, UNWTO, UPU, WCL, WCO, WFTU, WHO, WIPO, WMO, WTO

(CIA, 2008)

REFERENCES