Community Health Assessment / Windshield Survey

Community Assessment

A community health assessment (sometimes called a CHA), also known as community health needs assessment (sometimes called a CHNA), refers to a state, tribal, local, or territorial health assessment that identifies key health needs and issues through systematic, comprehensive data collection and analysis. Community health assessments use such principles as

  • Multisector collaborations that support shared ownership of all phases of community health improvement, including assessment, planning, investment, implementation, and evaluation
  • Proactive, broad, and diverse community engagement to improve results
  • A definition of community that encompasses both a significant enough area to allow for population-wide interventions and measurable results, and includes a targeted focus to address disparities among subpopulations
  • Maximum transparency to improve community engagement and accountability
  • Use of evidence-based interventions and encouragement of innovative practices with a thorough evaluation
  • Evaluation to inform a continuous improvement process
  • Use of the highest quality data pooled from and shared among, diverse public and private sources

           (Retrieved from https://www.cdc.gov/publichealthgateway/cha/plan.html)

Windshield Survey:

“A  windshield survey is an informal method used by community health nurses to obtain basic knowledge about a given community. It provides a subjective view of the various physical characteristics of a communal area as observed while driving or walking through a neighborhood.

.”(Retrieved from; 

mynursingprofessionalportfolio.weebly.com/uploads/8/9/3/3/8933086/windshieldsurvey.docx).”

As stated in the syllabus please present your assignment in an APA format word document, Arial 12 font attached to the forum in the discussion board title  “Week 1 discussion questions”.  A minimum of 2 evidence-based references is required (not counting the class textbook) no older than 5 years. A minimum of 1000 words are required.  Make sure the assessment is based in the community where you live.  I don’t want community health assessment from other communities, once again it must be from the community you live.  Please mention the zip code of your community on the first page of the assignment.

Please follow the instructions given in the syllabus  Discussion Question (DQ) Participation Guidelines” and “Discussion Question (DQ) Submission Guidelines.  

Respectfully;

Prof. Cruz

Human service professionals are expected to meet and maintain certain standards of competence in the profession, often measured by education, training, supervision, and experience. After completing your Reading for this week, please respond to the following questions:

In your own words, create a definition of competence in the field of human services.

Use the Internet and the Library to investigate the minimum standards of competence for human service professionals in your state. Describe these requirements.

Consider the Case Example of Rasheed (ATTACHED) regarding multicultural competencies. Imagine you are a caseworker at a human service agency working with Steve. What is your reaction to this case? Does it raise personal issues for you? If you were in Rasheeds position, would you feel competent to work with Steve? What if Steve discovered that he harbored negative attitudes toward African Americans? Would that make a difference in your response to this scenario?

TEXT: Sommers-Flanagan, R., Sommers-Flanagan, J.(2015). Becoming an Ethical Helping Professional: Cultural and Philosophical Foundations, with Video Resource Center.

For this discussion, you will assess the use of various support decision tools and explain why outliers are sometimes called influential observations. Discuss what could happen to the slope of a regression of Y versus a single X when an outlier is included versus when it is not included. Will this necessarily happen when a point is an outlier? You are required to give at least two examples in your response.

Post a 2-paragraph response (of at least 350 words)

Provide an overview of a Magnet facility. Include an explanation of how Magnet status drives health care change in the institution. Develop and post cohesive paragraphs and use evidence to support your ideas. The practice of writing cohesive paragraphs is essential to good writing. Focus each paragraph on one main idea or goal.

APA style Refrences and citation

What different assumptions about the nature and purpose of religion do you see in the conflict over Mount Graham? Consider the perspectives put forward by members of the Western Apache community, and by representatives of the Roman Catholic Church. In your article, be sure to bring the article “Mount Graham: Science and Apache Religion” into conversation with at least one other reading or video from this module. (important at least one )

Read :http://nativeamericannetroots.net/diary/471

watch 1- :https://player.mediaamp.io/p/U8-EDC/qQivF4esrENw/embed/select/media/2zVLQF7ipVpd?form=html

2- https://player.mediaamp.io/p/U8-EDC/qQivF4esrENw/embed/select/media/zomzum7cgIY2?form=html

Grades will be based on:

-Depth of engagement with class materials (7/10 points)

-Writing quality (proper spelling, grammar, punctuation) (3/10 points)

Note: Please try to keep your responses down to the 200-word mark. While we will not necessarily take off points for posts that go OVER that length, the highest scores will be given to posts that demonstrate strong analytical depth while remaining close to the suggested word limit. 

Read requirements 

Can it be categorized?  

Can It Be Categorized?

In a 1-2 page paper, choose one of the fraud categories discussed in Chapter 3 and 4. With the opportunity perspective in mind, describe the objectives which act as motivators for this crime.  Chapter 3

 

Chapter Three Summary

  • To introduce students to the nature of crime in lower-class occupations, in this chapter, attention was given to the crimes occurring in the following systems: (1) employee theft in the retail system, (2) crimes in the entertainment service system, (3) fraud in the sales/ service system, and (4) insurance system.
  • Several different varieties of employee theft in retail settings occur. Here are some examples: overcharging, shortchanging, coupon stuffing, credits for nonexistent returns, theft of production supplies and raw materials, embezzlement, over-ordering supplies, theft of credit card information, theft of goods, theft of money from the cash register, and sweetheart deals.
  • Employee theft prevention strategies include (a) importation strategies, (b) internal strategies, (c) technological strategies, (d) (c) technological strategies, (d) organizational culture strategies, and (e) awareness strategies.
  • In considering crimes in the restaurant industry, two broad categories can be highlighted: crimes by the restaurant against consumers and crimes by workers against the restaurant.
  • The most common types of home repair fraud are believed to be roof repair, asphalt paving or driveway sealing fraud, house painting fraud, termite and pest control fraud, and tree pruning and landscaping fraud.
  • Auto repair fraud includes billing for services not provided, unnecessary repairs, airbag fraud, and insurance fraud.
  • Insurance crimes are rarely studied for two reasons: (1) They are hard to understand, and (2) people dont typically know when they have been victimized by insurance crimes (Ericson & Doyle, 2006).
  • Four different categories of insurance crimes by workers in the insurance system exist: (1) crimes by agents against the insurance company, (2) investment-focused crimes, (3) theft crimes against consumers, and (4) sales-directed crimes against consumers.
  • Estimates suggest that insurance fraud collectively raises the yearly cost of premiums by $ 300 for the average household (FBI, 2010b).
  •  For individuals victimized by these offenses, the consequences of insurance crimes can be particularly devastating.
  • Industry insiders attribute the insurance offenses to either rotten apple explanations or they engage in victim blaming (Ericson & Doyle, 2006).
  • Ericson and Doyle (2006) point out that insurance crimes are institutionalized in the industry by the practices and strategies encouraged among insurance employees.

References

Payne, B. K. (2013). White-collar crime: The essentials. Thousand Oaks, CA: SAGE Publications.

copyright Chapter 4                    

Chapter Four Summary

  • In general, categories of crimes committed by health care providers include fraud by doctors, fraud by pharmacists, drug use, unnecessary surgery, medication errors, sexual abuse, elder abuse, home health care fraud, and medical malpractice.
  • Sutherland implied that doctors were unlikely to engage in white-collar crime, and as a result, Sutherland gave only scant attention to doctors [and] maintained that physicians were probably more honest than other professionals (Wilson et al., 1986).
  • The most pervasive form of fraud committed by doctors entails the commission of Medicare and Medicaid fraud and abuse.
  • Fraud refers to intentionally criminal behaviors by physicians, whereas abuse focuses on unintentional misuse of program funds.
  • Several specific forms of fraud and abuse exist, including phantom treatment, substitute providers, upcoding, provision of unnecessary services, misrepresenting services, falsifying records, overcharging patients, unbundling, pingponging, ganging, kickbacks, co-pay waivers, and medical snowballing.
  • Briefly, mental health professionals often bill for time, whereas other professionals bill for more complicated medical procedures. For investigators, it is much easier to prove time violations than treatment violations.
  • Research shows that when females are accused of health care fraud, they tend to be accused along with other providers more than male offenders are (Payne, 1995). Explanations for fraud have focused on structural explanations, socialization factors, and enforcement dynamics.
  • It is estimated that 7.5 million unnecessary surgeries and medical procedures occur annually, and 12,000 Americans are killed each year from these unnecessary surgeries (Black, 2005).
  • At least six overlapping reasons help explain the pervasiveness of unnecessary surgeries: differing opinions, stigma, trust of health care, lack of trust of insurance companies, medicalized socialization, and conflict explanations.
  • Many severe consequences may arise from unnecessary surgeries.
  • Medication errors occur when health care providers deliver or prescribe the wrong medications to patients.
  • Public Citizen has identified 16 varieties of misconduct by physicians. The group believes that variations in sanctions for violations across states can be attributed to differences in the way state medical boards sanction offenders.
  • Eight types of prescription fraud are generic drug substitution, overbilling, double billing, billing for nonexistent prescriptions, short counting, mislabeling, delivery of a controlled substance, and illegally buying prescriptions.
  • The following types of elder abuse can be seen as white-collar crimes: (1) elder physical abuse, (2) elder financial abuse, (3) elder neglect, (4) elder sexual abuse, and (5) failure to report crimes.
  • Types of home health care fraud include providing unnecessary services, billing the system for services that were not provided to the client, overcharging, forgery, negative charting, substitute workers, double billing, and kickbacks.
  • Medical malpractice refers to situations where health care providers perform negligent care and/ or injure patients. Patients can seek recourse by filing medical malpractice insurance claims against the providers insurance company or by filing a lawsuit against the provider.

References

Payne, B. K. (2013). White-collar crime: The essentials. Thousand Oaks, CA: SAGE Publications.

     

Strategic planning within organizations provides a plethora of benefits to the organization, including meeting goals specified in the plan and contributing to the long-term success of an organization. Corporate-level strategy is informed through an organizations mission and vision statement. Portfolio management is driven by the mission, vision, and corporate-level strategy, and implemented at the Strategic Business Unit level. SBU-level strategies seek to develop resources and competencies. SBUs also have mission and vision statements to set the strategic direction of the entire unit. The strategic direction of the SBU is related to corporate-level strategy. The functional area may include the following, but possibly on a smaller scale: clinical operations (for example, within this area you could have radiology), marketing and promotion, human resources, information and clinical technologies, and finance department. Within the SBUs, these functional areas also have strategies.
Search for a strategic plan in a health care organization. After reviewing the strategic plan, select a business function or department within the selected health care organization to develop a business plan. The goal of the business plan is to help the organization implement the organizational mission and vision through setting a specific, measurable goal. Alignment between the organizational strategic plan and a business plan is key to successful implementation. The purpose of any department is to achieve the organizational mission and carry out various strategic initiatives that meet the mission and vision. In other words, the business plan intends to make the organization better in the specific direction the company wants to move in.
For this assignment, select either your own health care organization or one you know enough about to complete a business plan.

ASSIGNMENT :Please do a :
SWOT Analysis on a OPTOMETRY Practice
A SWOT analysis is part of strategy formulation that leads to goal setting and then progresses to the development of a business plan.
Complete a SWOT analysis using the “SWOT Analysis” template. Using the SWOT analysis results, develop at least one strategic goal. Submit both the completed SWOT analysis document and the strategic goal. Be sure to cite two or three sources.
While APA format is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide
SWOT anaylsis template is provided in uploaded material

1. Now that digital publishing is so accessible to everyone, how should a publishing business respond? Are there ways that existing publishing houses can take advantage of the easy access readers have to publish extensions of stories? What about in the fields of video or musichow might a business encourage the involvement of the fan base of a movie or a band by using the media-creation tools available? (Chapter 8)

2. After reading Chapter 9, you know you should have a good backup strategy in place for your key data. Consider the following:
How often do you back up critical data files such as homework files? What type of device do you use for backing up files? Where do you store the backups to ensure they wont be destroyed if a major disaster (such as a fire) destroys your computer? Do you use online sites for file backups?

Requirements:

1. Your assignment should be written in APA style format.

2. Each question should be answered not less than 250 words.

3. Double spaced with 12-point Times New Roman font and make sure to use headings.

4. Separate title and reference page (minimum of 2-3 references).

I started my outline since was due. Professor wants 5 pages and 5 reputable resources in APA .

My outline:

Identify Procedure
-Lobectomy- Prevent spreading of a disease or cancer

List diseases is it used for
-Tuberculosis (chronic) bacterial infection that often infects the lungs
-Emphysema

Explain Procedure
-Removal of one or two lobes
-Thoracotomy

Explain the pathophysiology of the disease and how this procedure will benefit the patient.
-TB—-
-Emphysema—

Long term care meds, testing, etc.
-PFTs
-Smoking cessation program
-Brochopulmonary rehab
-Antibiotics
-Self care

Prognosis
-FVC, TLC and FEV1 reduction after surgery
-Eliminates the medical problem or it slows their diseases progression/eases symptoms

One of the pillars of a national existence is the ability to defend itself from all forms of threats, whether internal or external. Countries across the world have continued to experience security challenges and therefore forced to come up with urgent security measures (Carter, 2016).  The main security threat in the 21st century across the world is terrorism, which has led to massive killing of people and destruction of properties (Medcalf, 2013). The internal security management of a country assumes enormous importance when issues of security are undertaken and addressed. This paper will address India’s current security problems and provide recommendations on how to enhance security policy.

India has remained focused on its security and the wellbeing of its citizens. The security apparatus are well-coordinated and structured in a manner that the National Security Structure and the National Security Advisor (NSA) are fundamental upon which the NSC system operates (Jaswant, 2016). The role of the NSA has, over time, been expanded to address security issues in the country. As India’s economic and military profile grows on the broader Indo-Pacific, it continues to face a range of intrastate and regional security challenges. These challenges are orchestrated by several issues like religion, technology, boundary disputes, politics and many others

                                                       Terrorism

Terrorism continues to be a security challenge, with the Pulwama terror attack being the biggest in recent years. An analysis by the government indicated that terrorist attacks were on the rise by 176 percent in Jammu and Kashmir between 2014 and 2018. India has witnessed scores of terror attacks and has learned from the shortcomings and mistakes. The national security agencies have done whatever is needed to prevent more such attacks.

Nevertheless, there still is no guarantee and no one is aware of what tactics the terrorists might come up with again.  From Jayaramu (2013) perspective, analysis of an open international database indicates that the maximum of several terrorist incidents that occurred in the year 2011 was 566 but the death toll was much lesser than the year 1992. The year 1992 witnessed round about 231 incidents but the death toll was highest of all time. It was around 1109 which is less than half of the death toll that occurred in the year 2011. This indicates significant strides in combating terrorism and related cases.

Terrorism has all along been propagated to cause division and hatred among the Hindu and Muslim in India. Countries like Pakistan continue to be the biggest beneficiaries of the religious differences in India, therefore, supplying arms that are of high economic value (Beri, 2016). India faces a very challenging strategic environment, with both neighbors possessing significant capabilities and militaries that are themselves modernizing rapidly.

China and Pakistan are quickly modernizing their militaries, and this keeps India worried and resolving to upgrade its security structures. Kasmir is one of the contested areas that is claimed by both Pakistan and India; the area possesses as a security threat with rebellion receiving material and financial support from Pakistan. Jihadists have increasingly taken to high profile suicide attacks against the Indian Security forces (Sachdeva, 2016). The Islamic States continue to make some landfalls in India. The attack that was made on Easter Sunday in Sri Lanka is a reason to have India review its security structure and operations. India continues to be among the susceptible states not only as a goal but as a center for sweeping leadership. 

 

 

Military Expenditure

It is essential to have the grasp and the nature of the transformation of India’s military in the assessment of the types of conflicts it faces (Cavelty, et.al2016). The upgrading of the Indian defense forces is a multifaceted course casing issues affecting the composure between workforce and arms as well as that concerning the acquirement of arms from indigenous sources and the significance of arms (Perlo-Freeman, et.al2013)  . India’s struggles to facelift and reorganize its soldierly in reply to security tests are branded by a mission to meet the needs of the three services without conceding clearness and honesty in the procurement of weapons.

With around 1, 2 million active personnel, India’s military is one of the most massive land forces in the world. The Indian army mostly consists of armored, infantry and armored infantry units. Most heavy equipment is from Russian or Soviet origin but has been upgraded or modified by India’s domestic defense industry. India roughly spends $50 Billion per year on defense, making it the fourth-largest spender in the world (Tian et al., 2017). For the first time after the Indian independence army has retaliated against cross border terrorism with surgical strikes

India’s military has always been a little bit in the shadow of the region’s giant, China. It has been often overlooked that India’s military is a very well structured and equipped military force (Ajay Sahni, 2018). What makes it unique is the enormous prestige the military has in society and the high motivation and formidable level of education of its soldiers. Some of its ground forces are equal to those of the best armies in the world. At the moment, India’s military is in a transition phase to fully modernize its forces for the future and annual defense spending is rising between 7 and 10%. India has a vast intelligence network both at home and across the border which helps it to monitor movements of terrorist camps and groups.(Das,et.al 2015) Not only people but India’s primary intelligence agency, the RAW, monitor’s movement of arms and ammunition and drugs, as these are potential financing weapons of terrorist organizations. Once they have the necessary information, they move swiftly and stealthily, and either take out the enemy without the world knowing about it or like they did in Myanmar, using all-out action.

 

India had changed its international strategy considerably, from those days of neutrality and non-alignment when it started the Non-Aligned Movement at the Bandung Conference in 1955, to the current bilateral and multilateral agreements being made with all the strategically important countries. The Prime Minister also is exhibiting diminished interest in the outdated NAM principles, as he did not attend the summit this year.  Security alignments can also be noted with countries like the USA, with the signing of the LEMOA agreement and increasing procurement of arms from the USA instead of Russia. The USA also recently announced India as one of its Major Defense Partners for upgrading the bilateral relationship to the next level. India has also started signing relevant Agreements with conflicting countries like Israel, Saudi Arabia and Iran in these security matters. The careful balancing of the Indian foreign policy juggling between these three triangularly ideologically different countries is a modern-day wonder indeed.

 

Cyber Attacks

Cyber-attack is another security challenge facing India, leading to it being among the most affected countries in the world. Cyber criminals have objectives, but they can expertise their ways to cause attack trajectories in order to accomplish the upshots they want. They may commit fraud, identity theft, steal money, and commit robbery against corporations, banks, nations, regions and even individuals (Goutam, 2015).They may try to blackmail them, too.

Cyber-criminals have modified progressive cyber-attack methods for their embattled end-users. Many corporate areas and geographical localities have faced recent cyber-attack in India, leading to downfall of financial institutions through the leakage of most sensitive information. As technology continues to advance promptly, India has failed to keep adjusting to these trends. Most of the time these well-organized attacks are made, leading to destabilization of the economy. It is worth noting that cyber-attacks pose far-reaching dangers to power grids.

Cosmos Bank Cyber-Attack in Pune 

The well-orchestrated cyber-attack in 2018 was organized on Cosmos Bank in Pune. This bold attack trembled the entire banking division of India when cyber hackers tapped off Rs.94.42 crore from Cosmos Cooperative Bank Ltd. in Pune (FIGHT, 2015). Hackers lacerated the bank’s ATM servers and got away with Customer’ details of many visas and rupee debit cardholders. There have been other cyber-attacks like the Canara bank attack and the SIM Swap scam done by the two Mumbai hackers.

                                    Socio-economic Conflicts

Over the years, India has been having a fast growth of the economy, which is another risk. The wealth gaps continue to deepen as the compact majority continues to languish in poverty and are excluded from economic flourishing. An area like the Eastern and northeastern peace and stability continues to worsen from 2010 being the goriest year in history owing to the Naxalite uprising (Singh, et.al 2017). Naxalite since then has been having a set of operations that have gone to more than 29 states. They have continued to operationalize in the poor and rural areas and habitually engaging in vicious activities against the government to extract money.

                                     The 5G Debate

India is about to steer the 5G debate that will have some economic repercussions and affect its national security.  Sooner or later, India will have to make choices on the 5G debate. 5G has the potential to transform India’s data economy, but also its defense arrangements. With the continued world unreliability, India will not have the opportunity to have its usual Jugaad (Gupta et al. 2015). The only option is India to either choose to follow China or go with the US. The 5G decision will, therefore, interfere with India’s Intelligence.
 The US-China trade wars cannot be taken lightly by India. China has, on different occasions, challenged India in the Indian Ocean via Pakistan route, and through which an economic perfect keeps India on the losing side in trade.

                                Political Instability

India has experienced political instability more so in times of elections or when there is a change of a regime. All political changes bring about new decisions, rules, and regulations that, most of the time, are faced with hostility. The 1990-1993 political instability was well experienced in India that saw the oust of three prime ministers. During the electioneering periods, aspiring candidates of the legislative assembly propagate violence and thrive on violence and propaganda that lead to political instability (Abdella et al. 2018). Kasmir area has been in the spotlight where militancy has been on the rise as ardent members of the public continue to support militants killed by security officers. In the Northeast, elections have been won on the fundamental promises of displaced persons who have been living in India for decades.

                                                                  Border issues

India has hosted the Heart of Asia Conference of the Istanbul Process many times to gather international support for the Afghans. Overall, there are no border skirmishes with Afghanistan as the people of this country respect India. The same applies to the relationship with Bhutan as well, where mutual respect and understanding is the prevalent predominant norm, as propounded by the I.K. Gujral’s Doctrine of India helping its friendly neighboring countries unilaterally, without expecting much in return. For every other strained border, including that of Sri Lanka, there are the Armed Forces which take care of the safety and security of the country

The issue with Bangladesh is more complicated, mainly due to the infiltration of unregulated refugees and migrants into the north-eastern states, which is changing the racial dynamics of these states, especially Assam.

A large migrant Bangladeshi and Pakistan population is creating a Law and order issue in the Assamese region mainly due to the xenophobia amongst the local populace and the illegal settlement and citizenship registration of these Bangladeshi immigrants (Ferdoush, et.al 2018). The Myanmar border is stained with the stronghold of various drug cartels, due to the presence of the famous Golden Triangle, the world’s drug manufacturing horde. This is combined with the internal insurgency issues of the North-Eastern states, the violent Naga ethnic problem, and an absence of economic development due to the inaccessibility of the seven sister states with mainland India.

 According to Sharma (2010), if things seemed complicated in the international scenario, they are no less in the internal scenario as well. The State Police, which takes care of the Law and order situation, reduction of crime rate, management of prisons, and other policing, is facing a tough situation indeed. With the rising drug-related problems, rapes, murders, and thefts, the local citizenry is facing many issues in their day-to-day problems that need to be solved by their locally available policemen (Tripathi, 2015). A Committee was set up under Justice Malimath to suggest recommendations in revamping the Criminal Justice system. It reiterated the need for D. K. Basu Guidelines that are to be followed by the policemen to adhere to the Procedure of Arrest.

The revamping of the existing police machinery to suit the needs of the current times is a must. With an enhanced citizen’s police interactional interface, what needs is an up-gradation in the maintenance of police records. This can be achieved through digitization of court records, official police documents and connecting the internal systems of all the police stations and courts with each other (Bell, et.al 2015). An online interface and an ability to lodge FIRs online should also be encouraged. Utilizing the internet for establishing e-Governance will help the common man in approaching the police easier. The increase in the usage of the internet through smartphones and laptops by today’s India is a testimony for this fact indeed.

                                                            Recommendations    

Along with conventional armies and conventional security strategies, India needs to learn to use unconventional means to win over the unconventional threats that she faces in contemporary times in order to survive. The country is a curious case where it has been successful in attracting all sorts of complications including terrorism, insurgency, Maoism, underworld gang wars, smuggling, theft, rapes, crime, and border infiltration. It has also created a viable organizational capacity to control each one of these intimidating activities.

Based on these recommendations, the Indian Army has recently announced the formation and formal establishment of the Army Design Bureau. It is aimed to act as an interface of the Indian Army that will provide high-tech defense products with the help of the collaboration between academics, various research organizations, and the industry. This original method will provide a better understanding of the Army’s requirements and would indigenize procurements and reduce the dependence on the massive imports. This will add an impetus to the ‘Make in India’ initiative of the Central Government.

Even the Navy is getting an upgrade with the approval of “Project 75”, where a series of advanced Scorpene submarines are being built, along with the induction of new naval attack ships INS Khanderi, INS Kalvari and others to the Indian Navy. In the same way, French Rafale fighter jets are being procured and are being inducted to the Indian Air Force. These will be on the lines of the Russian Sukhoi, which has helped the Air Force in innumerable ways.

This enhanced collaboration can already be seen in the annual inter-service military exercise called the Theatre Readiness Operational Exercise (TROPEX) involving the Army, the Navy, the Air Force and the Coast Guard which is designed to test the interoperability and combat readiness of these Forces. Not just the TROPEX, but inter-national and inter-country military exercises are being organized annually to ensure interoperability at a global scale, for example, the annual Malabar Trilateral Exercise between the naval forces of India, Japan and the United States. Even India and China have their own annual joint military exercise called Hand-in-Hand. This ensures increased cooperation and mutual understanding of various countries, which may subtly increase friendship and strengthen the relationship.

                                                           

 

Conclusion

For over seven decades since Independence, the young country has gained experience in tackling each threat with its focused strategy, with its viable plan and with its appropriate ideation. Learning from the historical tale of the aurochs, in the current cluttered international context, and the more chaotic internal context, India has learnt to take good care of herself. Much unlike the fabled extinct aurochs, to ensure her own survival, India has continuously strived to have a viable National Security Strategy, right from those days of the Cold War, to these times of the Code War. Considering a long-term approach, the report suggests that the Indian government needs to move ahead with its Integrated Theater Commands plan.

 The days of using only the Army are now over. India now needs to take a firm stand against terrorism and use all resources at its disposal. This can be achieved with the help of the many Ordnance Factories established in the country under the overall technical supervision of the Defense Research and Development Organization (DRDO). Unless the nation brings about massive reforms, it may not be able to play a defining combative role against terrorism. A strong will and proper military strategies are the needs of the hour.

 

 

 

 

                                                  

                                      

 

                                              Bibliography                                            

  Abdella, A. B., Naghavi, N., & Fah, B. C. Y. (2018). The effect of corruption, trade openness, and political stability on foreign direct investment: Empirical evidence from BRIC countries. International Journal of Advanced and Applied Sciences5(3), 32-38.

Ajay Sahni(November 22, 2018), “First responder most neglected part of counter-terrorism system,” Hindustan Times, New Delhi, p. 17.

Alan Dupont (2011), “New Dimensions of Security” in Denny Roy (ed.). The New Security Agenda in the Asia-Pacific Region, London, p.3 I

Bell, D., Holliday, R., Ormond, M., & Mainil, T. (2015). Transnational healthcare, cross-border perspectives. Social science & medicine124, 284-289.

Beri, R. (2016). India-Africa security engagement. India and Africa, 115.

Booth (2013), “Security and Emancipation,” Review of International Studies, 17, pp.313-26

Carter, A. (2016). The Rebalance and Asia-Pacific Security: Building a Principled Security Network. Foreign Aff.95, 65.

Das, R. C., Dinda, S., & Ray, K. (2015). Causal link between military expenditure and GDP-A study of selected countries. International journal of Development and Conflict5(2), 114-126.

Ferdoush, M. A., & Jones, R. (2018). The decision to move: Post-exchange experiences in the former Bangladesh-India border enclaves. Routledge Handbook of Asian Borderlands. London: Routledge, 255-265.

FIGHT, C. I. INTERNATIONAL COOPERATION IN FIGHT AGAINSTCYBER-CRIME.

Gambill, G. C. (1998) The Balance of Terror: War by Other Means in the Contemporary MiddleEast

Goutam, R. K. (2015). Importance of cyber security. International Journal of Computer Applications111(7).

Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging technologies. IEEE Access3, 1206-1232.

Husain Haqqani(2018), “India’s Islamist Groups,” Hudson Institute

Jaswant Singh, M. P. (2016). Defending India. Springer.

Mathews (2017), “The Environment and International Security,” in M. Klare eta/. (eds.), World Security: Trends and Challenges at Century’s End, New York, pp. 362-380.

Medcalf, R. (2013). The Indian Ocean region: Security, stability, and sustainability in the 21st century. Report of the Australia India Institute Task Force on Indian Ocean Security. The Indian Ocean region: Security, stability, and sustainability in the 21st century. Report of the Australia India Institute Task Force on Indian Ocean Security.

Mohammed Ayoob (2006), “The Security Problematic of the Third World,” World Politics, pp.257-83.

Neumann, P. R. &Smith, M. L. (2005) Strategic terrorism: The framework and its fallacies. Journal of Strategic Studies, 28(4), pp.571-595

P.S. Jayaramu (2013), India’s National Security and Foreign Policy, New Delhi, p.1

Perlo-Freeman, S., Solmirano, C., & Wilandh, H. (2013). Global developments in military expenditure. SIPRI yearbook 2013, 127-134.

Reddy, A. A., Rani, C. R., Cadman, T., Kumar, S. N., & Reddy, A. N. (2016). Towards sustainable indicators of food and nutritional outcomes in India. World Journal of Science, Technology and Sustainable Development13(2), 128-142. Routledge handbook of security studies. Routledge.

Reddy, A. A., Rani, C. R., Cadman, T., Kumar, S. N., & Reddy, A. N. (2016). Towards sustainable indicators of food and nutritional outcomes in India. World Journal of Science, Technology and Sustainable Development13(2), 128-142.

Sachdeva, G. (2016). India in a reconnecting Eurasia: Foreign economic and security interests. Rowman & Littlefield.

Sandeep Unnithan (2009), “Anti-terror grid in a deep freeze,”India Today, 25 November

Singh, T., Sharma, S., & Nagesh, S. (2017). Socio-economic status scales updated for 2017. Int J Res Med Sci5(7), 3264-7.

Singham AW (2015), “The National Security State and the End of the Cold War,” in Jasjit Singh (ed.), Security of the Third World Countries, NewDelhi, 1998, p. 5.

Tian et al. (2017) SIPRI Fact Sheet, TRENDS IN WORLD MILITARY EXPENDITURE, 2016. SIPRI

Tripathi, D. (2015). Interrogating linkages between borders, regions, and border studies. Journal of borderlands studies30(2), 189-201.

V.N. Sharma (2010), “India’s Security Environment,” US! .Journal, Oct-Dec., p.43