Monday, August 12, 2019

A Freedom Fighter or Terrorist Essay Example | Topics and Well Written Essays - 2000 words

A Freedom Fighter or Terrorist - Essay Example His step-father was a known sheep thief and he taught the young Saddam his trade however this turned tragic when Saddam was caught in the act and forced to leave and stay with a far away uncle, Khayrallah Tulfah. His uncle enrolled him in school and tried to do the same in the military but the young Saddam was turned away due to bad grades. Out of anger and rage, he joined the radical faction Ba’ath. One of the Ba’ath’s objectives as a radical faction was to topple the existing regime of King Faisal II and form a Unitary Arabic State. In 1958 after a failed assassination attempt of General Abdul Qassim by the young Saddam Hussein, Saddam fled to Egypt where he enrolled in school to pursue a degree in law. After a short stay in Egypt, back in Iraq the Ba’ath faction managed to have in their control the city of Baghdad in 1963 and General Qassim was publicly tortured and eventually put to death. The group called Saddam back home and gave him the position of head torturer at the â€Å"Palace of the End.† However this did not last for long because the Nationalist soldiers deposed the Ba’ath and arrested several of its members in 1964, one of them was Saddam Hussein. A General Ahmad Hassan al-Bakr, Saddam’s cousin, advocated for Saddam and had him released. He later on endorsed Saddam to the post of assistant secretary general of the Ba’ath Party and saw to it that he formed and made effective an unknown police force, Jihaz Haneen. In 1968 while Saddam was chief of internal security as well as the head of the Revolutionary Command Council, he participated heavily in the coup led by his cousin and he was an undercover agent always secretly searching for those opposing his cousin and intimidating them or even at times killing them. He became highly feared and popular for the next ten years always playing the position of the right hand man of his cousin. In 1978 he swayed his now aging cousin to step down as ruler of Iraq citing poor health and later on had the party heads choose an heir to the throne of Iraq. He outwitted everyone by having them choose him as the heir to the throne. During the first conference of the Revolutionary Command Council in 1979, Saddam’s first order of business was to have all the people he thought might pose a threat to his rule executed. These included judges, military men, legal representatives, bankers, reporters, religious leaders, his fellow party members as well as scholars. In a span of one month he had ordered the putting to death of about 450 people he claimed were foes of his regime (Arnold, 2008). These became known as the Pyramid of Skulls and to create more intimidation and fear among those who opposed him, he had some of these executions done in public and recorded then later on have these recordings delivered to rulers of the other Arab States. The Kurds who were a marginalized group had been calling for their sovereignty for as long as Iraq existed and they faced a lot of oppression and persecution under the reign of Saddam. 1987 saw the total demolish of their villages and killing of many of their own. It is reported that between 1983 and 1988, about 180,000 Kurds were killed by Saddam. These mainly took place in their oil rich province of Kirkuk because Saddam wanted the region to be owned by another tribe and not the Kurds who had been in that place for decades. Saddam had a lot of his people under his mercy because of external enemies like Iran who were always ready to strike. He assured them of their safety under his rule and used this strategy to control them while at the same time oppressing them. He increased his influence over his people by always making himself and his image a constant sign of intimidation. It is said that his portrait appeared in every learning institution, learning text

Sunday, August 11, 2019

Profile, incorporate, and compare the health information Essay

Profile, incorporate, and compare the health information - Essay Example It allows the electronic sharing of health information between different health information systems while maintaining the integrity of the information being passed across. HIEs connect healthcare providers such as hospitals, pharmacies, labs, ER physicians to access patient information in a resourceful manner to improve the quality of care. HIE also refers to those organizations that facilitate the electronic sharing of health information across systems and organizations. HIE organizations manage and provide support for the commercial and legal issues that can arise during the exchange of information. These organizations come in several forms and may be private, national or state firms; information can thus be shared only with a single hospital network, across many hospitals in one region or across the state. Another difference between the different HIE organizations is seen in what information is shared e.g. some may share only lab results, or only emergency room records. HIE organi zations are key to facilitating the implementation of health information technology to provide quality patient care. In the United States, a number of such organizations exist that perform several important functions. In this discourse, we will examine the Indiana Health Information Exchange. By exploring the profile of this HIE organization; the author aims to show the core capabilities of this technology, the importance of electronic information systems and the necessity of understanding that technology. Indiana HIE The Indiana Health Information Exchange (IHIE) is one of the largest HIE in the United States, and also the oldest. It is a non-for-profit organization that connects more than 80 hospitals and over 19,000 doctors in Indiana, including long-term care facilities and rehabilitation centres to share health information on more than 10 million patients as and when needed (Finn, 2011; Biever, 2013). The organization administrates the Indiana Network for Patient Care (INPC), w hich is a protected network that shares electronic health records to involved physicians and other healthcare providers. Launched by the Regenstrief Institute (which specializes in medical informatics research), local hospitals and other partners, IHIE provides useful health information technologies and tools to patients in Indiana as it aims to mitigate the high costs of quality healthcare. For instance, if a patient is admitted to a hospital, the INPC presents a clinical abstract of the patient’s medical history-provided the patient had ever visited a networked hospital- even if the patient has never received treatment from that hospital before. This saves time in treatment and avoids duplicate testing thus saving costs. The INPC contains records of more than 80% instances of medical care provided within participating hospitals. Additionally, it also holds radiology images, discharge summaries, operative notes, pathology reports and medication records. This wide range of in formation enables doctors to make informed and accurate medical decisions, especially during critical times. Figures 1.1 and 1.2 below show how IHIE improved information flow. Figure 1.1: Former system which fragmented patient information and created redundant, inefficient efforts Source: Indiana Health Information Exchange Figure 1.2: HIE system that consolidates information

Shopper scam Essay Example | Topics and Well Written Essays - 250 words

Shopper scam - Essay Example Self was to evaluate the cashier on customer service cards after buying the cards and email the numbers on the Green Dot cards to a person listed ‘Timothy Duncan’ as his point of contact with the mystery shopping evaluation team. Self had doubts since the deal seemed too good to be true. His conscience was right. He had almost fallen victim to a major scam. Kathleen Calligan with the Better Business Bureau stated that Green Dot money cards are mainly used for illegal business because they work like like cash and cannot be traced. Therefore, the scammer gets away with the money but the cashed check remains the responsibility of the victim. She also noted that probably in less than one week, the deposited check will return in the form as an overdraft on the victims account. The Better Business Bureau warn that the legitimate Mystery Shopping Providers Association would never pay before services have been

Saturday, August 10, 2019

Bait-ul-Maal. Creation, Functions and Resources of Bait-ul-Maal Essay

Bait-ul-Maal. Creation, Functions and Resources of Bait-ul-Maal - Essay Example The Islamic financial system is among the most autonomous and righteous systems in our society. The Holy Qur'an states this truth in Surah al-Hashr [59:7], "In order that it may not (merely) make a circuit between the wealthy among you." For that reason, the Islamic society focuses on the required circulation of wealth among all citizens and not just those who are affluent, as this may carets humiliation to the Muslim society and raise social class culture (Tamer, p. 102, 2005). Definition of Bait-ul-Maal Bait-ul-Maal is an Arabic expression, which means ‘House of wealth’ or ‘House of money’ (Ayub, pp. 23-25, 2008). Traditionally, it was a financial institution in charge for the management of taxes in Islamic nations, mainly during the early Islamic Caliphate. It provided as a noble reserve for the Caliphs and Sultans, controlling personal finances as well as government expenses. Additionally, it managed circulations of Zakat revenues for community efforts. Contemporary Islamic economists believe the institutional structure suitable for modern Islamic nations (USA International Business Publications, p. 187, 2009). Creation of Bait-ul-Maal The Muslims began establishing Bayt al-Mal from the time of Prophet Muhammad (PBUH). He (PBUH) is accustomed to choose the administrators as well as the commanders for the different areas. Each commander was in charge for gathering Zakah, Jizyah in addition to the fifths of the booty and Kharaj. Every now and then, the Prophet Muhammad (peace be upon him) inured to employ somebody in charge just for the financial dealings to gather the owing cash for the State together with, Kharaj, Jizyah, Tenths (Zakat on lands, assets and the fruits) and donations and give them to Bait-ul-Maal (Ayub, pp. 31-37, 2008). The Prophet Muhammad (peace be upon him) did the same with Mu`adh ibn Jabal (may Allah be pleased with him) when he sent him to Yemen to gather the funds of Zakat from its representatives and with `U baydah ibn al-Jarrah (may Allah be pleased with him) (Kettell, pp. 56-60, 2010) when he sent him to al-Bahrain to gather the Jizyah. The beginning of Bayt al-Mal from the time of Prophet Muhammad’s (PBUH) reign is an obvious proof on the accuracy of the Islamic financial structures since this early time. As a result, it is usual that Bayt al-Mal extends in accordance with the different ages (USA International Business Publications, p. 76, 2009). Functions of Bait-ul-Maal The authority of Bait-ul-Maal consists of the wealth due for Muslims as a group not possessed by one of them and the wealth used for the gain of Muslims. For that reason, Bait-ul-Maal is among the key establishments of the Islamic society as it is the single power entitled to paying money on the different Muslim benefit. It has the influence of a Ministry of Finance and a Central Bank during the present days (Tamer, p. 76, 2005).   Divisions in other Countries of Bait-ul-Maal During the reign of the Umayyad Caliphate, finances get better. The sum of money was very big without doubt, as it came from just one Muslim state, that is Egypt, let alone other finances that made their way to the Bayt al-Mal from other Islamic states (Kettell, pp. 56-60, 2010). There is no uncertainty that such enormous sum of funds accentuated the significance of the Bait-ul-Maal during the period of the Umayyads, and consequently the prominence of this caliphate. It is obvious from the report of Ibn `Abdul-Hakam that there was a middle management for the Bait-ul-Maal in the Islamic caliphate's centre of Damascus as well as sub-managements in every state independently. The

Friday, August 9, 2019

Free trade and mercantilist Essay Example | Topics and Well Written Essays - 1000 words

Free trade and mercantilist - Essay Example So, while free trade is beneficent in its purest form, modern policymakers have hijacked the concept to serve the interests of select private businesses at the cost of smaller business enterprises and the majority of the electorate. (Dunkley, 2004, p.53) The rest of this essay will look into how free trade, despite strong arguments in its favor, has not always been adopted in economic policy making. It was by the start of 1970s that currents of change were detected in the global economic order, with nationalism and protectionism being replaced by neo-liberalism and free flow of capital. But there were also concerns that this new economic paradigm can lead to excesses and decadence. For example, the unsavory side-effects of free trade in this period includes â€Å"the appearance of a nearly feral form of entrepreneurship in which black marketers, drug barons, arms merchants, rackets bosses, Mafiosi, and other profiteers were emerging as the economic and political leaders of the social transformations underway in their respective societies.† (Buchanan, 2000, p.1) These developments acted as a disincentive for a few governments to draw up free trade policies. Another reason why free trade practices are not uniformly accepted is due to the effect it has on workers and consumers. Some believe that under this system, workers become helpless pawns of their capitalist masters, compelled to sell their labor power at sub-optimal costs. The only theoretical alternative they have to evading this exploitation is to become destitute, which is a far greater misery. Multi-national corporations (MNCs), which are the facade of free trade, are perceived as coercing citizens to unwillingly participate in the capitalist market system, while also leaving consumers with no choice but to buy their products. (List, 1997, p.51) In the book titled Telling the Truth about History, author Joyce Appleby traces how MNCs came to be

Thursday, August 8, 2019

Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 words

Routing Protocol Security OSPFv2 - Dissertation Example Using MD5 method to make a comparison between the security measures often associated with the use of OSPF v2 Routing protocol, it worked quite well to implement a network structure, which made it possible to evaluate and assess the Project background research on OSPF v2 authentication security alongside highlighting the solution that was deemed reliable for the OSPF v2 authentication. Through the use of the Quagga software, a network was implemented, which helped in testing, as well as evaluating OSPF v2 authentication. This project clearly demonstrated that OSPF as an interior gateway protocol, can route the Internet Protocol into a single routing domain. It showed that OSPF can gather a link-state information from routers and be able to construct a network of topology maps, which are more often than not used for determining routing table that is often presented in the internet layer. It was also shown that OSPF was designed in such a way that it can support the variable length subn et masking, and it is also capable of detecting any change within a topology such as any link failure and be able to converge onto a loop-free routing structure within seconds. This project also demonstrated that the OSPF network might be subdivided into various routing areas for purposes of simplifying administration and optimization of traffic and for resource utilization. It also showed that OSPF does not make use of the TCP/IP transport protocol. It is instead encapsulated in the IP datagram. This contrasts with other related routing protocols such as the Border Gateway protocol and the Routing Information protocol. It also became apparent that Router within the same broadcast domain often link from adjacencies whenever they need to detect each other. Such a detection takes place whenever a Router gets to identify itself within the hello OSPF protocol packet. This is often referred to as the two-way state. this project, as well indicted that the OSPF makes use of the multicast, as well as the unicast in sending the link state updates and the hello packets. Recommendations for Future Research The current research demonstrated clearly that it is possible OSPF V2 Routing protocol can be used as an internet security measure. Given the focus of this study and previous studies on OSPF V2 Routing protocol and other earlier versions, it is worth recommending that there is need to migrate to IPv6 considering that the solution to the existing problem which is OSPFv2 routing is to transfer to OSPFv3 and use IPsec Protocol between sites (WAN. It has been indicated that OSPF protocol when operated on other versions such as on IPv4, it operates more securely between routers. This provides an option to use varied authentication methods to give allowance to routers that are trusted to participate in routing. Although it has been noted that OSPFv3, when running on IPv6, does not any more support the protocol-internal authentication, it relies on the IPv6 protocol security (Tanenbaum, 2003). As often is the case, the OSPF version 3 would help introduce some modifications to the given IPv4 protocol implementation. Other than the virtual links, virtually all neighbor exchanges often exclusively make use of the IPv6 link-local addressing (Cisco Systems Inc, 2009). It is widely known that the IPv6 protocol always do run per link, and not based upon the subnet. It is worth contenting that all the IP prefix information has

Wednesday, August 7, 2019

Just Culture Model and its Impact on Patient Safety as Part of the Research Paper

Just Culture Model and its Impact on Patient Safety as Part of the Roles of Clinic Nurse Specialist - Research Paper Example For nurses, they may also expand their knowledge by studying further and advance their career into clinical nurse specialists which may give them the chance to work at the management level in the clinical setting. They would have the knowledge on the healthcare systems and find ways on how to improve the efficiency of the healthcare organization through policies and culture that caters the growth and learning of the staff nurses. To improve the competencies of the clinical nurse specialists, just culture model may be used as framework. It gives importance to patient safety and increase in accountability among members of the healthcare organization. Just Culture Model and its Impact on Patient Safety as part of the Roles of Clinical Nurse Specialist Introduction The healthcare sector has been growing as the demands for health assistance is increasing. It is the sector that will never die out as people need the basic services or even the sophisticated care in that area for survival and to prolong life. People need health assistance when they are sick, injured or weakened. The need for healthcare has also been growing due to its primary importance to human survival. Whenever people get sick, they visit the hospital to get solutions for their health problems. Care is also provided in the hospital for patients with aggravated situations and helps them to recover. When people are sick, they are very fragile as their bodies are weakened. They need the support to totally bring back their healthy bodies. In the search for health assistance, various health staffs are prepared to assist the patients with their specific needs. From food intake to drug administration, the healthcare staffs are there to assist them. The professionals that assist the patients usually require long and intense training and license before they can perform their tasks to care for the patients. One of those health professionals is the nurse. Nurses have been important as they assist the doctors in the medical field to provide health assistance to patients in hospitals, at home or in the community. They are entrusted to help in the health restoration of the patients from their current weak condition to a healthy one. Nurses then may work on their own as they specialize on various roles or take part in a group in planning and evaluating the health care performance. They also attend trainings to further enhance their knowledge and skills to better support the health needs of the patients (Smith, 2004, p. 3). They are also updated with the current breakthroughs in their field of career through scholarly journals. Nurses may opt to specialize further through studies and further trainings to become clinical nurse specialists. As clinical nurse specialists (CNS), they must have more than the undergraduate degree in nursing and the education must be provided by accredited CNS institutions (Callara, 2008, p. 57). They are highly specialized to cater the specific needs of the patients that may depend upon the kind of diseases or illnesses the patients have. The CNS may also work on hospitals, houses, communities or specific units of the hospital such as emergency room and operating room. They also assist in surgeries or clinical procedures (Dreher et al., 2011, p. 78). In general, there are five duties each CNS may do like hospital work, management, education and instruction, research and