.

Saturday, December 28, 2019

Correlation Between Parietal And Adolescent Drug Abuse

Sarah Tischbein Gd3423 Psych Extra Credit Ye In Oh Correlation Between Parietal and Adolescent Drug Abuse In today s society substance abuse is a common problem throughout the United States of America. The objective of the experiment is to show the correlation between substance use behaviors of parents and their children’s substance use initiation and other risky behaviors. The experiment is focused on the role of mothers and fathers as a separate study. The surveys that take place through a series of interviews include two people from a selected household, one parent and one child. This topic was of interest to me because I grew up with an alcoholic father. Alcoholism has affected my family in many ways, and I am interested in seeing the correlation between my behavior and my fathers. The methodology used for the experiment was multi-stage sampling, arranged in a state based design, used through a sequence of face to face interviews conducted by the National Survey on Drug Use and Health (NSDUH). The experiment included 67,500 total interviews and was conducted annually. NSDUH organized cross-sectional surveys that were represented by the Substance Abuse and Mental Health Services Administration. The goal of the interviews was to collect the data of the measure of the prevalence and correlation of substance abuse and substance abuse disorders. This study included people who were non-institutionalized, and older than 12 years of age. The interviews took place at eachShow MoreRelatedDepth Look At Autism Spectrum Disorder3112 Words   |  13 Pageson the classic form of autistic disorder, as well as the predisposing or risk factors, signs and symptoms associated with the disorder, how is autism diagnosed, treatment options, as well as complications and prognosis. Nursing implications during drug treatment, and application to nursing will be addressed as well. Description of Autism Spectrum Disorder Autism Spectrum Disorder is a lifelong developmental disorder, which affects a growing group nationwide. The word spectrum, refers to the wideRead MoreTrait Theory4213 Words   |  17 Pagesstudy of traits, which he sometimes referred to as dispositions. In his approach, central traits are basic to an individual s personality, whereas secondary traits are more peripheral. Common traits are those recognized within a culture and may vary between cultures. Cardinal traits are those by which an individual may be strongly recognized. Since Allport s time, trait theorists have focused more on group statistics than on single individuals. Allport called these two emphases nomothetic and idiographic

Thursday, December 19, 2019

The Collaborative Leadership And Decision Making Essay

The fourth topic was the collaborative leadership and decision making. The topic showed that people make wrong decisions because they do not have enough choices to consider and sometimes, people are not carefully analyzed. People choose decisions based on inquiry and advocacy. An inquiry decision is a decision that is chosen when people have enough information, and have evidence to support and to prove the information. For example, when I made the decision to study in Canada, before I chose Canada. I found much information from many agencies about other countries, but I chose here because after I graduate, I can receive the work permit to work here for three years. This is an opportunity which other countries do not have. For an advocacy decision, people choose a decision because their prefer solutions. The ways to transfer from advocacy decisions to inquiry decisions by 3C’s; a conflict, a consideration and a closure. For a conflict, it helps to focus on cognitive thinking mo re than emotional thinking. The cognitive thinking helps people have to think, to analyze and to eliminate emotion when make decisions. When people have emotion to select decisions, most results are not the best decisions. The consideration, a leader should have an active listening, open mind; listen other viewpoints and have an ability to share a logic information. The last is closure, a leader needs to know when he or she should close a communication. If a leader does not know how to end aShow MoreRelatedCollaborative Leadership Essays1378 Words   |  6 PagesCollaborative Leadership Leadership can take many different forms, depending on the person and the situation in which it is needed. Collaborative leadership is a leadership style in which a leader brings together a large group of people, with a variety of backgrounds, to make a productive decision and act upon it. According to Chrislip and Larson (1994): †¦they are the ones who have the credibility to get the right people together to create visions, solve problems, and reach agreements about implementableRead MoreAddressing Power And Political Struggles On Organizational Culture1628 Words   |  7 PagesAddressing Power Political Issues in the Collaborative Structure through Empowerment A healthy organizational culture paves the way for cohesiveness and productivity. At times, companies will face the reality of power and political struggles due to competing individual interests. These struggles can create unhealthy organizational culture that prevents a business from being efficient and effective and thwart creativity. This is detrimental to businesses that thrive on creativity and innovationRead MoreImproved Effectiveness Through Collaboration : Collaborative Leadership976 Words   |  4 PagesImproved Effectiveness through Collaboration Collaborative leadership begins with trust upon which stories of a shared governance tower is built. Migliore (2012) pictures the ground level of the tower as being a Perception of Trust that includes personality, motivation, reliability, competence, and intuition. The next story is Culture of Trust built on leadership and system learning. The third story steps up to Open Communication with customer focus strategy and organizational learning. Above thatRead MoreLeadership And The Development Collaboration1146 Words   |  5 PagesLeadership and the Development Collaboration In any collaborative environment, an open-line of communication is a critical factor. Communication is a two way interaction of listening and speaking in turn. One speaks while the other listens for true comprehension is a key factor. One must get an understanding before the vision can be implemented within any leadership role. The presence of collaboration in schools are the result of principals, educators, parents, and administrative leadership in workingRead MorePlanned Change Of Maternal Child Health1590 Words   |  7 Pagescomplained that they lack a platform to voice their opinions towards the units operations. A Collaborative Care Committee (CCC) would be useful to the MCH unit at this organization, as it would promote staff and leadership relationship, shared-decision making, and enforce the elements of shared governance. In the next few paragraphs we will discuss Kotter’s 8 step change model to help describe how leadership will influence this delivery system on the unit and what role each participant will play inRead MoreThe Statement Of Administrative Philosophy1227 Words   |  5 Pagesbehind.† (Carter G. Center for Education). Therefore, It is upon this strong belief that I stand unwavering in experiences, leadership, management style and values. Specifically, the genesis of my statement of administrative philosophy is derived from my gratitude to my elders and ancestors that paved the way for access to equal education. The impact of their courage and leadership has created a legacy that lives forever. At the center of my philosophy is the belief that it is my altruistic calling asRead MoreCarl E. Jr. Katz And Frank M. J. Lafasto827 Words   |  4 PagesIntroduction Leadership in its earliest definitions referred to notions such as â€Å"centralization of power,† â€Å"influence of one individual on its followers† and even â€Å"leader and follower.† However, in the twenty-first century, it is not uncommon to see organizations utilizing teams to lead and embracing leadership of those teams through processes. Many organizations have adopted the team leadership approach in order to meet the constantly changes and complex demands of their clientele. Now more thanRead MorePROJ 220 week 21237 Words   |  5 Pagesresponse proposing leadership styles you would recommend for the Denver Airport Project. Please choose a combination (two or three) of the eight leadership styles presented in the Thompson textbook (Chapter 11: Leadership: Managing the Paradox). Please note that you are to also use three other sources from the internet or the DeVry online library. All sources must be cited. (Points : 30) Based on the reading it is hard to give a single leadership style or even a combination of leadership styles becauseRead MoreEssay on Harley-Davidson Circle Organization1314 Words   |  6 Pagessecured by the environment developed at Harley-Davidson through the organizational changes led by former CEO Rich Teerlink. Mr. Teerlink fundamentally changed the structure of Harley-Davidson from a command and control, top down leadership company to one of collaborative organizational design (Teerlink Ozley, 2000). This paper will describe the organizational structure at Harley-Davidson, how the organizational structure evolved, evaluate how the structure responds to environmental factors, andRead MoreManagement Case Analysis - Blue Sky. Blue Sky Is A Software1662 Words   |  7 Pageshealth payment software and each division has the Vice President as its head. The company is experiencing several management issues ranging from leadership to decision-making. In this light, the company has undergone leadership change from Max’s autocratic leadership style to collaborative, changes in employee motivation, strategic planning, and decision making as well as design and control problems. Management issues are the common problem Blue Sky face. The company does not have a strategic planning

Wednesday, December 11, 2019

Business Law Medicare and Medicaid Program

Question: Describe about the Business Law for Medicare and Medicaid Program. Answer: Introduction: Meaningful use is a Medicare and Medicaid program issued by CMS which gives incentives which is financial in nature for using Electronic health records technology (EHRs) which is certified to improve the health of patient. For getting the incentives related to EHR, providers need to show that certified EHR technology is meaningfully used by them, and they are also meeting the certain requirements such as recording the information of patients as data which is structured to exchanging summary care records. These requirements are set up by CMS for eligible hospitals, professionals and critical access hospitals. This EHR Medicare and Medicaid program is divided into three stages (HealthIT.gov, n.d.). In this paper, we discuss the background of meaningful use, and also state the requirements of meaningful use. The next topic contains effect on healthcare organizations if they are meeting or not meeting the requirements of meaningful use. We also discuss problems faced by healthcare organizations in fulfilling the requirements of meaningful use and also their possible solutions, and there is a brief discussion which includes why some organizations choosing not to meet the requirements and just bear the resultant penalties. Meaningful use: Background of meaningful use: Meaningful use defines as using the certified HER technology for the following purposes: For improving quality, safety, efficiency, and reducing disparities related to health. For increasing the engagement of patients and their families. For improving the public health, care coordination, and population. Maintain the confidentiality of health information of patient. It was assumed that this program will result in number of benefits such as better clinical outcomes; outcomes related to professional health will be improved; this will increase the efficiency and transparency of transaction, empower the individuals, and give access to the health system research data which is more accurate (HealthIT.gov, n.d.). If any eligible patients and hospitals adopt, upgrade, and demonstrate how to use certified EHR technology in a meaningful manner then financial incentives are awarded to that eligible patients and hospitals by Medicare and Medicaid EHR incentive program. Demonstration of meaningful use program requires time and resources, and this is the reason that CMS provide financial support to EPs and EHs for the demonstration of this program. EPs can qualify for this program up to $44000 from Medicare EHR Incentive Program and $63750 from Medicaid EHR Incentive Program, and eligible hospitals including CAHs can qualify up to $2 million or more (HealthIT.gov, n.d.). The three main components of meaningful use are stated and defined by Recovery Act: It is necessary that EP or hospitals use the certified EHR technology in manner which is meaningful. This technology is used to exchange the health information through electronic mode to improve the healthcare quality. This technology is used to submit the clinical quality measures and some other specified measures also, and these measures are selected by secretary (CMS, 2010). Following is the conceptual approach for meaningful use, and we also called the three stages of meaningful use: Capture and share the data Advanced clinical processes Improved outcome Requirements of meaningful use: This meaningful use program is conducted in three stages that are stage 1 which was initiated in 2010 and it main purpose is promoting the adoption of EHR technology, stage 2 was finalized in last of 2012 and this stage introduce more clinical decision support, care coordination requirements, and Stage 3 will focus on accurate exchange of information related to health and also other guidelines also which are introduced in earlier stages (Techtarget, n.d.). Following are the overview of three stages: Stage 1: following are the requirements of stage 1: 90 days is specified as reporting period for 1st year in this stage and also for 1 year subsequently. Reporting in this period must be done through attestation. EP and EH must achieve defined objectives and clinical quality measures. It is necessary to meet objectives and CQM that at least 80% patients have their records in certified EHR technology (HITEC/LA, n.d.). Stage 2: On 23rd August 2012, the Centers for Medicare Medicaid Services published a rule that is known as final rule, and that rule states the criteria for stage 2 that eligible professional and hospitals and CAHs must meet the objectives stated in stage 2 so that they can participate in the Medicare Medicaid Electronic Health Record Incentive Programs. Core objectives and also the menu structure for those core objectives are specified in Stage 1 and these objectives must be achieved by the providers for demonstrate meaningful use. Stage 2 keep these core objectives and menu structure specified by stage 1for use them in meaningful manner. There are number of stage 1 objectives which become core objectives for stage 2 (HRSA, n.d.). For demonstrating the meaningful use under stage 2 it is necessary that: In case of EPs it is necessary that they meet at least 17 objectives that are core objectives and they are selected from the list of 6 core objectives or from list of 20 core objectives. In case of EHs and CAHs, they must meet at least 16 core objectives and at least 3 menu objectives which are selected from the list of 6 core objectives or from list of 19 core objectives (CMS, 2012). Stage 3: Third level of stage of meaningful use mainly focus on following objectives: This part of the stage mainly focuses on improving the quality, safety and efficiency which result in good health outcomes. Support is provided by this level of stage to national high priority conditions. Patients can easily access to tools which help in promoting self management. It helps in improving the health of population. Access to data of patient which is comprehensive through the patient-centered HIE. Rule which is known as final rule is issued by CMS and ONC, and this rule is related to Medicare and Medicaid EHR Incentive Programs and the 2015 Edition Health IT Certification Criteria respectively on 6th October 2015 (Himms, 2015). Effect of meaningful use on health organizations: Research conducted by RAND shows strong evidence related to health IT improves patient outcomes. A large number of healthcare providers are using and adopting the information technology tools related to health such as certified EHRs which are mention in the Health Information Technology for Economic and Clinical Health (HITECH) Act in 2009. This act provides number of incentives if EPs and EHs meaningfully use certifies EHR technology which result in better care, health improvement, and lower costs. This program not only effect providers but to patients also such as: Many requirements of meaningful use program directly affect the patients by providing them easy access to the information related to their health, enhanced the engagement of patients and collaboration of patients with their providers. These requirements take care of many things such as whether patients get electronic reminder for their appointment, or they easily accessed the copy of information related to their health. Therefore now patients are experiencing positive changes in the health care system, and the reason behind this is health care technology. EPs send almost 190 million electronic prescriptions to their patients. Almost 13 million patients or more who aged up to 65 or more and under 5 years received reminders for their appointments. 33 million or more patients are now easily access the information through electronic mode related to their health (CMS, n.d.). Problems faced by health organizations: following are the problems faced by health organizations in meeting the requirement of meaningful use: There are large numbers of providers who have existing systems that are already performing functions related to HIE/EHR, and there are some other systems also which provide information related to lab results which are required to integrate into EHRs information to attain the requirements of meaningful use. It is the problem for providers to move data between these systems, and this will also bit expensive for providers especially for the medium size providers who do not have large IT stuff. The other problem for providers is that stage 3 criteria is not clearly defined till now, and those organizations which make investment in HER/HIE systems face uncertainty. Evaluating the current system against the standards issued by CMS will become the difficult challenge for the providers, especially for those providers who are looking to make new investment in this technology (Reich, n.d.; Backers, n.d.). Therefore, there are number of organizations which are ready to face penalty but did not meet the requirements of meaningful use. Conclusion: This report contains the background and definition of meaningful use, and also the three stages of meaning full use which are stage 1 Capture and share the data, stage 2 that is advanced clinical processes, and stage 3 improved outcomes. After this it contains the effect of meaningful use on providers and patients which state that both patients and providers get number of benefits from the meaningful use. Later we discuss the problems faced by providers in implementing the requirements of meaningful use such as problem for providers to move data between different systems, and stage 3 criteria is not clearly defined till now, and those organizations which make investment in HER/HIE systems face uncertainty. At last, we conclude the report with brief conclusion which state that meaningful use is beneficial for providers and patients but is also cause number of difficulties to providers in implementing the certified EHR program. References: HealthIT.gov. Meaningful Use Regulations. Retrieved on 8th December 2016 from: https://www.healthit.gov/policy-researchers-implementers/meaningful-use-regulations. HealthIT.gov. Meaningful Use Definition Objectives. Retrieved on 8th December 2016 from: https://www.healthit.gov/providers-professionals/meaningful-use-definition-objectives. HealthIT.gov. EHR Incentive Programs. Retrieved on 8th December 2016 from: https://www.healthit.gov/providers-professionals/ehr-incentive-programs. Techtarget. meaningful use. Retrieved on 8th December 2016 from: https://searchhealthit.techtarget.com/definition/meaningful-use. CMS, (2010). Medicare Medicaid EHR Incentive Program. Retrieved on 8th December 2016 from: https://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/downloads/MU_Stage1_ReqOverview.pdf. HITCHLA. STAGE 1 MEANINGFUL USE CHECKLIST. Retrieved on 8th December 2016 from: https://www.hitecla.org/sites/default/files/HITEC-LA%20Stage%201%20MU%20Checklist_2011%200613.pdf. HRSA. Meaningful Use Stage 2. Retrieved on 8th December 2016 from: https://www.hrsa.gov/healthit/meaningfuluse/stage2/. CMS, (2012). Stage 2 Overview Tipsheet. Retrieved on 8th December 2016 from: https://www.cms.gov/regulations-and-guidance/legislation/ehrincentiveprograms/downloads/stage2overview_tipsheet.pdf. Himms, (2015). Meaningful Use 2015-2017 Modifications, Stage 3 Final Rules 2015 Certification Criteria. Retrieved on 8th December 2016 from: https://www.himss.org/library/meaningful-use/stage-3-final-rules. CMS. The Real World Impact of Meaningful Use. Retrieved on 8th December 2016 from: https://www.cms.gov/eHealth/ListServ_RealWorldImpact_MeaningfulUse.html. Reich, M. The technical challenges of attaining meaningful use. Retrieved on 8th December 2016 from: https://www.seabourneconsulting.com/the-technical-challenges-of-attaining-meaningful-use/index.html. Backers. 8 Problems Surrounding Meaningful Use. Retrieved on 8th December 2016 from: https://www.beckershospitalreview.com/healthcare-information-technology/8-problems-surrounding-meaningful-use.html.

Wednesday, December 4, 2019

Terrorist Modus Operandi The Mumbai Attack 26/11 †Free Samples

Question: Discuss about the Terrorist Modus Operandi The Mumbai Attack: 26/11. Answer: Introduction The event of 26th November 2008 Mumbai attack has been selected in order to discuss the attack and the justice carried out. This report describes the 26/11 Mumbai attack that took place in India in the year 2008. The attack was launched on 26th November and continued till 29th November resulting in loss of many lives of police force and civilians. The problems with navy force and the lack of training to Mumbai police were the reasons that this attack happened with such a severe impact. The government of India took the steps to provide required aid to police by affiliating them with the advanced technology and weapons (Times of India, 2017). In the context developed above, this report has been prepared to discuss the 26/11 attack and perpetrators of the attack. Further, the discussion extends to the targeting tactics used by the perpetrators in conducting the attack. The impact of this attack on the country has also been analysed. Event Map It has been nine long years when the Mumbai attack took place in Hotel Taj and since then but the image of that event in the mind of people still persists. The Mumbai attack is popularly known as 26/11 attack that took place on 26th November 2008, Wednesday at midnight. The terrorists came in India through the water ways by hijacking the boat and the one with whom they came was also the Indian. It was Kasabs first operation as per his confession. There were two terrorists who blasted themselves at Jewish community center situated at Nariman house at Colaba, Mumbai. There were around 8 planned attacks that happened in India in Mumbai city in which total 171 people lost their lives and around 250 people were badly wounded. The identification of terrorist was made and 2 attackers, Nasir alias Abu Umar, who belongs to Faisalabad (Pakistan) and another person was Babar Imran alias Abu Akasha who was from Multan (Pakistan). The assaulter kidnapped many people out of which one was a hostage couple and other 4 were the visitors (Start.umd.edu, 2017). The child hostage along with the nanny rushed out of the place wisely to get an escape and help their members in a possible manner. The responsibility of this attack was taken by Deccan Mujahideen which was not so popular terrorist group before this attack. But yet the conformity was not gained; only estimates were made that these people and the group belong to Pakistan and the actual le ader or group behind this massive attack was Lashkar-e-Tayyaba (LeT). On investigating the person of Lashkar gave the statement that they were not responsible for these attacks. One of the assaulters was caught namely Ajmal Kasab who admitted that they were planning for this attack from last 6 months and came into Mumbai through waterways and resided in Mumbai to know about the places and locality, selecting the area with a high population so that maximum devastation could take place. The idea was to kill about 5,000 people in this attack and the basic target were foreigners visiting India (Maps of India, 2017). Kasab visited Mumbai as the student and evaluated the entire area and the best place has been selected where huge crowd gathers, the entire screening has been made to implement the planning and decreases the chances of failure and by carefully handling the situation (Debu, 2017). Kasab, at last, confessed that he was the member of Lashkar-e-Tayyaba from the suicide squad. Also in trials, Kasab openly talked about the mastermind that was involved in this attack and some other assaults that took place in the previously. In the year 2010, Kasab was sentenced to death for killing innocent people thereby being the major part of the mass destruction. The attack type was armed assault and kidnapping of people. The status of attack was successful and the target was Chabad-Lubavitch center, Hotel Taj, and the main location was Nariman point. There were total 6 hostages out of whom no one was from the US and they were kidnapped for 2 days of which some hostages were killed. The loss to the pro perty was less than $1 million but the life destruction was major that left the imprint in the history and many commandoes sacrificed their lives as well and every year this date is remembered and people mourn for the departed souls (India TV news, 2017). Date Hotel Taj Palace The Oberoi-Trident Nariman House Chhatrapati Shivaji Terminus 26th November 2008 The attack started around 9:43pm. The hostages were kidnapped and bombing started. The tandoor chef was shot dead on the spot by the terrorist. Gun firing took place at the Oberoi and the gatekeeper was killed on the spot. In the lobby the grenade explosion took place. The attack happened was on the Chabad House which was the Jews community centre, it was located in Colaba and the hostages and many other Jew people were trapped over there. Many out of them were the visitors from around the world. 2 commandos went to the railway station and there were 4 terrorists involved in the firing at the place. Among the four there were two terrorists that were caught out of which Ajmal Kasab who was the one who was the only which were captured alive and the justice has been drawn out. The firing end up at 10:45 pm IST and it was found that 52 people were dead and 100 people were heavily injured. 27th November 2008 Group of 200 commandoes headed to Mumbai from Delhi. The arms have arrived by now and rescue operation had started. People were praying for the safety of their loved ones. The hotel started to vacant and around 31 people were rescued by the time. The fire explosion took place at 4th floor. Commandoes came for the rescue but the terrorists were well planned and they destroyed all the entry points to create more difficulty for the commandoes to enter into the building. 28th November 2008 The explosion of ten grenades took place within the premises of Hotel Taj Palace. The rescue program was concluded by now and the 2 terrorists that were involved have been killed. Around nine hostages were killed and the NSG team landed on the terrace through the air drops. The explosion and heavy firing took place. 29th November 2008 The Hotel was vacated and the savage was made. At NSG and JJ hospitals the beds and wards were full and constant body bags were arriving. Perpetrators The brief description of the Perpetrators and masterminds behind the Mumbai attack has been quoted underneath: Mohammed Ajmal Amir Kasab There was the only one attacker caught alive by commandos and it was Kasab, aged only 21-years. The only picture that supported the involvement of Kasab was the one in which he was walking at the CST station with AK-47 which gave the recognition and helped the army to catch him. He was basically from Faridkot village which is situated in Dipalpur taluka at Okara district within Pakistans Punjab province. Kasab was initially a small thief before joining Lashkar-e-Tayyaba. For the operation of 26/11, the code was assigned to Kasab so that identity does not get revealed in case if the police is able to catch him. In May 2010 Ajmal Kasab was sentenced to death and on November 21, 2012, he was hanged till death (India today, 2012). Hafiz Mohammed Saeed Saeed was an escape from the 26/11 attack and played a major role in programming the entire attack. He was one of the trainer and member of Lashkar. Along with Saeed, there were 2 more Pakistani professors namely Zafar Iqbal Abdul Rehman Makki. He was also involved in many Anti-India insurgencies that happened in Kashmir (India) or any other attack that took place in India leaving people fiercely. Hafiz Saeed was the chief conspirator to plan the Mumbai attack and he also took part in providing training to 10 terrorists who were involved in the 26/11 (Indian Express, 2017). Zarar Shah Shah was another leader that provided training to the terrorists in context of Mumbai attack. He constantly monitored the training session and even he continued to be in touch with the group at the time of the attack. The Anti-Terror Squad recorded the calls of Zarar with that of the terrorists. He got arrested after the scenario of 26/11 along with companion Zaki-ur-Rehman Lakhvi. The report states that while in custody Shah confessed regarding his role in the 26/11 attack (Mumbai Mirror, 2017). Abu Kahfa Abu Kahfa was anescape from 26/11 case and he played the lead role in planning the destruction of Mumbai 26/11 Attack. He was the mentor of Ajmal Kasab along with the remaining 9 accused. He monitored the training program and made terrorist learn the crucial points in the context of the attack. Kahfa's name was first released when the team was figured out by the Anti-Terrorism Squad in relation to the Mumbai attack. He was just not physically present on the attack site but he was constantly passing on information to the terrorists over their phones (Chaturvedi Sen, 2017). Along with these attackers, there were certainly more muggers involved. Analysing the situation the defect of attack could be clearly understood and it could be estimated form this that behind such havoc a big team was involved and many people played various and crucial role in incorporating the fearful event of destruction. Some of the other people related to the 26/11 attack were Javed Iqbal, Abu Al Qama, Abu Hamza, Yusuf Alias Muzammil and Colonel R. Saadat Ullah (The Indian Express, 2017). Tactics Rationale The tactical rationale analysis has been implemented to examine the actual issue and all the tactics which have been used to synthesize the information related to the battle and bloodshed that took place (Pawar, 2017). The analysis has been conducted with the assistance of OODA loop. This loop is based on military cycle which is used to win the battle. OODA stands for Observation, Orientation, Decision and Action (Close quarter combat, 2017). Stage 1: Observation The observation argues that the power of Indian intelligence service lies in the fact that the network of police must be aware of the scene and should monitor the suspicious entry of terrorists. Analysing and reviewing the present case, it could be quoted that in the present scenario wherein several technologies have been developed and intelligence machines have been developed. There has been forecast that LeT will cross the borders and it has been identified that some fishy things are going to take place; therefore, it was necessary that Indian intelligence makes pre-preparation to safeguard the country. Due to certain slips and ignorance, Indian navy was not able to predict the arrival of terrorist in the nation. The situation could have been controlled if Indian army and Mumbai police were more aware about the signals. Thirty-five new sim cards were purchased; however, the police took the actions later after getting the information. It could be depicted that LeT have been well-prepared than the Indian army. As a result, such an event took place successfully and caused disasters in the lives of people as well broke down the economy of the country (Machold, 2017). Stage 2: Orientation When the attack took place, the police was needed to take the responsibility and should have performed the immediate actions. However, contrary to it, the police denied the occurrence of such an event. Later, the inspector responsible for the action was suspended and the responsibility was handed over to police housing. In comparison to the tension in the situation, the police was not much trained as well as they were not having efficient and advanced artillery. When the commandoes from the military came and took over the charge then only the situation became under control. The attack was made is in the military style and the training was provided to the ten people which was also high class (Sen Dutta, 2017). Stage 3: Decision The decisions are the best suitable solutions to resolve the issue and solving the scenario. The entire planning has to be made and the optimum solution needs to be identified for every operation. The best decision has to be taken under the challenging situation. There was a lot of political pressure on the police and military because important people were staying in Hotel Taj and a number of lives were at risk. In Oberoi, around 31 soldiers got injured though they had the best training. The decision has to be taken by the commander; therefore, police should have undergone the detection process. Also the observation was not very specific to reach the good decisions (The Hindu, 2009). Stage 4: Action After the decision making has taken place, the final implementation of actions done. The results should be estimated in such a manner which matches the understanding of the rivals. The police were not able to obtain the information and figure out the plan that is to be carried out. The police and the intelligence officers could have acted well if appropriate training has been provided to the police (Menon, 2016). The police should have been more aware and they should have figured the attack earlier using advanced technology. The Indian navy must have caught the suspects and spotted them when they crossed the borders. The terrorists were not well-trained and planned an advanced attack. The commandoes handled the situation and wisely construed a plan to stay a step ahead of the terrorists. They were well trained and fought the situation in an extremely wise manner. Due to this incident, the economy faced ample amount of fall which affected the GDP of country to the great extent (Khan, Estrada Yusof, 2016) Impact Assessment The fear of terrorism has been increasing all over the world and has become a huge threat. The terrorist attacks are frequent in the world. Most of these activities are carried by Lashkar-e-Tayyaba (LeT). The 26/11 attack which took place in Mumbai was fierce and scary and destroyed a large number of innocent lives. The attack started on 26th November 2017 and ended on 29th November 2017 (Acharya, 2017). Sixty crucial hours were spent in terrific situations threatening the life of people in Mumbai. The ten attackers were well trained and had advanced technology and weapons. Around 260 people were killed who belonged to 10 different countries (Morakabati Beavis, 2017). The modus operandi of the attack has been explained in detail and an investigation report has been made by Indian Government which has been shared with the Government of Pakistan. The terrorism is represented as network activity which used the technique commonly stated as Social Network Analysis (SNA). It studies the s ocial relationships represented by the nodes and the ties. Upon researching, it was found that the terrorist and the members of the terrorist group are known as the nodes and the healthy flourishing relationship between these members are referred to be ties among these nodes. After the attack of 9/11 in the World Trade Centre, the study of SNA has increased and research in the counter terrorist activities has increased. The capability of SNA is evaluated to elucidate the activities of the group, selecting the target and deciding the motives that behind these attack (Azad Gupta, 2017). Conclusion The report argues over the terrorist attack which took place in India destroying the amenities and breaking down the value of money along with destructing the economic condition of the country. Initially, the event map has been discussed by giving the blueprint of the popular event 26/11 Mumbai attack in India. Thereafter, the study was made over perpetrators who were involved in the Mumbai attack and investigation was made which states regarding the terrorist activities. The assessment has been conducted and the target was identified. Tactics rationale is thoroughly described in stages and the conclusion has been drawn out of it. Lastly, the impact of the assessment has been made which describes the damages caused and injuries which have occurred. The attack was massive loss to humanity and the threat towards the country also increased, it even affected the tourism for long period of time. The lack of police efforts and less provision of weapons and other facilities were noticed. Be tter training to police should be provided along with better invigilation at the borders and navy areas to avoid the suspects to enter and destroy the country. References Acharya, A., 2017. Fighting Terrorism and Crime.Non-Traditional Security Challenges in Asia: Approaches and Responses, p.220. Azad.S., Gupta.A., 2017, A quantitative assessment on 26/11 Mumbai attack using social network analysis, viewed on 8th November 2017, https://jtr.st-andrews.ac.uk/articles/10.15664/jtr.187/. Close quarters combat, 2017, Tactical analysis of the 2008 terror attacks on Mumbai, viewed on 8th November 2017, https://www.closequarterscombat.net/tactical-analysis-terror-attacks-mumbai-2008/. Debu, 2017, Mumbai Terror Attack: no lessons learnt from 26/11, viewed on 8th November 2017, https://www.mapsofindia.com/my-india/government/revisiting-mumbai-terror-attack-no-lessons-learnt-from-2611. India today, 2012, Ajmal Kasab hanged: he swore to God that he would never commit 26/11-type mistake, viewed on 8th November 2017, https://indiatoday.intoday.in/story/ajmal-kasab-hanged-his-last-word-mumbai-terror-attack/1/230206.html. India TV news, 2017, Facts to know about 26/11 Mumbai attacks, viewed on 8th November 2017, https://www.indiatvnews.com/news/india/facts-to-know-about-26-11-mumbai-attacks-44584.html. Indian Express, 2017, Mumbai terror attack mastermind Hafiz Saeed under house arrest: Reports, viewed on 8th November 2017, https://indianexpress.com/article/india/mumbai-26-11-mastermind-hafiz-muhammad-saeed-under-house-arrest-in-pakistan-reports-4499599/. Khan, A., Estrada, M.A.R. and Yusof, Z., 2016. Terrorism and India: an economic perspective.Quality Quantity,50(4), pp.1833-1844. Machold, R., 2017. Militarising Mumbai? The Politics of Response. Mumbai Must be Secured. Now!.ContextoInternacional,39(3), pp.477-498. Maps of India, 2017, Mumbai terror attacks, viewed on 8th November 2017, https://www.mapsofindia.com/mumbai/mumbai-terror-attacks.html. Menon. S., 2016, Why India didnt attack Pakistan after 26/11 Mumbai attack, viewed on 8th November 2017, https://www.livemint.com/Leisure/29lXP57cHDAloqUf2uJOHM/Why-India-didnt-attack-Pakistan-after-2611-Mumbai-attacks.html. Morakabati, Y. and Beavis, J., 2017. Do Terrorist Attacks Leave an Identifiable Fingerprinton International Tourist Arrival Data?.International Journal of Tourism Research,19(2), pp.179-190. Mumbai Mirror, 2017, Ties with Zarar Shah tighten Headley's link with 26/11 case, viewed on 8th November 2017, https://mumbaimirror.indiatimes.com/mumbai/other/Ties-with-Zarar-Shah-tighten-Headleys-link-with-26/11-case/articleshow/15970605.cms. Pawar, O.S., 2017. Terrorist Attacks on Mumbai and Role of Pakistan. Rediff, 2016, LeT#2 Abu Kahfa instructed 26/11 terrorists over thephone: Headley, viewed on 8th November 2017, https://news.rediff.com/commentary/2016/feb/11/let-2-abu-khafa-instructed-2611-terrorists-over-phone-headley/22754310842495ba8fa0a2709764ddb9. Sen, S. and Dutta, U., 2017. They Came by Boat: The 2008 Terrorist Attack on Mumbai.Culture and Crisis Communication: Transboundary Cases from Nonwestern Perspectives, p.119. Start.umd.edu, 2017, Global terrorism database, viewed on 8th November 2017, https://www.start.umd.edu/gtd/search/IncidentSummary.aspx?gtdid=200811260001. The Hindu, 2009, Police decision to enter Cana was sudden: 26/11 probe, viewed on 8th November 2017, https://www.thehindu.com/news/national/Police-decision-to-enter-Cama-was-sudden-2611-probe/article16854736.ece. The Indian Express, 2017, Perpetrators and masterminds of the 26/11 Mumbai terror attacks, viewed on 8th November 2017, https://indianexpress.com/article/26-11/timeline/perpetrators-and-masterminds-of-the-2611-mumbai-terror-attacks/. Times of India, 2017, What happened on 26/11? 10 key points, viewed on 8th November 2017, https://timesofindia.indiatimes.com/what-happened-on-26/11-10-key-points/listshow/55631763.cms. Bibliography Acharya, A., 2017. Fighting Terrorism and Crime.Non-Traditional Security Challenges in Asia: Approaches and Responses, p.220. Azad.S., Gupta.A., 2017, A quantitative assessment on 26/11 Mumbai attack using social network analysis, viewed on 8th November 2017, https://jtr.st-andrews.ac.uk/articles/10.15664/jtr.187/. Boston, 2017, The big picture, viewed on 8th November 2017, https://archive.boston.com/bigpicture/2008/11/mumbai_under_attack.html. Close quarters combat, 2017, Tactical analysis of the 2008 terror attacks on Mumbai, viewed on 8th November 2017, https://www.closequarterscombat.net/tactical-analysis-terror-attacks-mumbai-2008/. Debu, 2017, Mumbai Terror Attack: no lessons learnt from 26/11, viewed on 8th November 2017, https://www.mapsofindia.com/my-india/government/revisiting-mumbai-terror-attack-no-lessons-learnt-from-2611. Hindustan Times, 2009, Timeline: Mumbai 26/11 attacks, viewed on 8th November 2017, https://www.hindustantimes.com/india/timeline-mumbai-26-11-attacks/story-2u70QNcCy5uHlbiWTSvSNI.html. India today, 2012, Ajmal Kasab hanged: he swore to God that he would never commit 26/11-type mistake, viewed on 8th November 2017, https://indiatoday.intoday.in/story/ajmal-kasab-hanged-his-last-word-mumbai-terror-attack/1/230206.html. India TV news, 2017, Facts to know about 26/11 Mumbai attacks, viewed on 8th November 2017, https://www.indiatvnews.com/news/india/facts-to-know-about-26-11-mumbai-attacks-44584.html. Indian Express, 2017, Mumbai terror attack mastermind Hafiz Saeed under house arrest: Reports, viewed on 8th November 2017, https://indianexpress.com/article/india/mumbai-26-11-mastermind-hafiz-muhammad-saeed-under-house-arrest-in-pakistan-reports-4499599/. Khan, A., Estrada, M.A.R. and Yusof, Z., 2016. Terrorism and India: an economic perspective.Quality Quantity,50(4), pp.1833-1844. Machold, R., 2017. Militarising Mumbai? The Politics of Response. Mumbai Must be Secured. Now!.ContextoInternacional,39(3), pp.477-498. Maps of India, 2017, Mumbai terror attacks, viewed on 8th November 2017, https://www.mapsofindia.com/mumbai/mumbai-terror-attacks.html. Menon. S., 2016, Why India didnt attack Pakistan after 26/11 Mumbai attack, viewed on 8th November 2017, https://www.livemint.com/Leisure/29lXP57cHDAloqUf2uJOHM/Why-India-didnt-attack-Pakistan-after-2611-Mumbai-attacks.html. Morakabati, Y. and Beavis, J., 2017. Do Terrorist Attacks Leave an Identifiable Fingerprinton International Tourist Arrival Data?.International Journal of Tourism Research,19(2), pp.179-190. Mumbai Mirror, 2017, Ties with Zarar Shah tighten Headley's link with 26/11 case, viewed on 8th November 2017, https://mumbaimirror.indiatimes.com/mumbai/other/Ties-with-Zarar-Shah-tighten-Headleys-link-with-26/11-case/articleshow/15970605.cms. Pawar, O.S., 2017. Terrorist Attacks on Mumbai and Role of Pakistan. Rediff, 2016, LeT#2 Abu Kahfa instructed 26/11 terrorists over thephone: Headley, viewed on 8th November 2017, https://news.rediff.com/commentary/2016/feb/11/let-2-abu-khafa-instructed-2611-terrorists-over-phone-headley/22754310842495ba8fa0a2709764ddb9. Rediff, 2017, Many more questions about the terror attack, viewed on 8th November 2017, https://www.rediff.com/news/2008/dec/01mumterror-some-questions-about-the-terror-attacks.htm. Sen, S. and Dutta, U., 2017. They Came by Boat: The 2008 Terrorist Attack on Mumbai.Culture and Crisis Communication: Transboundary Cases from Nonwestern Perspectives, p.119. Start.umd.edu, 2017, Global terrorism database, viewed on 8th November 2017, https://www.start.umd.edu/gtd/search/IncidentSummary.aspx?gtdid=200811260001. The Economic Times a, 2017, 26/11 Mumbai attack trial, viewed on 8th November 2017, https://economictimes.indiatimes.com/topic/26-11-Mumbai-attack-trial. The Economic Times b, 2017, India reluctant to send 24 witnesses to Pak in 26/11 Mumbai attack vase: Pakistan, viewed on 8th November 2017, https://economictimes.indiatimes.com/news/defence/india-reluctant-to-send-24-witnesses-to-pak-in-26/11-mumbai-attack-case-pakistan/articleshow/57652968.cms. The Hindu, 2009, Police decision to enter Cana was sudden: 26/11 probe, viewed on 8th November 2017, https://www.thehindu.com/news/national/Police-decision-to-enter-Cama-was-sudden-2611-probe/article16854736.ece. The Indian Express, 2017, Perpetrators and masterminds of the 26/11 Mumbai terror attacks, viewed on 8th November 2017, https://indianexpress.com/article/26-11/timeline/perpetrators-and-masterminds-of-the-2611-mumbai-terror-attacks/. Times of India, 2017, What happened on 26/11? 10 key points, viewed on 8th November 2017, https://timesofindia.indiatimes.com/what-happened-on-26/11-10-key-points/listshow/55631763.cms.