Saturday, August 31, 2019

Speech-Language Pathologists

School Speech-Language Pathologists Hayley K. Mason Ball State University School Speech-Language Psychologists Speech-language pathologists began their impact in schools in 1910 in the Chicago public school systems. These programs commenced due to educators acknowledging how speech and hearing problems affected performance in the classroom. Today, 55% of all speech-language pathologists (SLPs) work in the school systems, 95. 5% of those being females (Plante & Beeson, 2008). They are required to perform a vast array of important tasks.They determine, diagnose, treat, and assist in preventing disorders related to speech, communication, language, and fluency. According to a study done by Plante and Beeson (2008), their caseloads may accommodate multiple handicapped children or those with distinguishing speech and language hindrances. Their work is in-depth and very meticulous. School speech-language pathologists administer distinctive diagnostic tests to help recognize the particul ar area of complications a child encounters. The child may face problems with stuttering, fluency, swallowing, articulation of words, or many other serious cases.Once the impairment of a student is recognized, they write an individualized education plan (IEP). This is comprised of a set of simple goals and objectives for each of their students throughout the duration of the school year. They may work with the students individually, in a small group, or with an entire classroom to accomplish these goals (Plante & Beeson, 2008). Each school day has a fixed number of allotted time slots for a school SLP. It must be filled with activities mandated by the state, federal laws, or local education problems and procedures (â€Å"Executive summary: A,† 2003).If needed, they may work with other professionals to help treat children. Classroom teachers can aid in sharing with the speech-language pathologist what the child’s struggles with in the classroom. Audiologists and scho ol speech-language pathologists work side-by-side in many cases determining the problems and best treatment fort he child. Occupational therapists, physical therapists, child psychologists, and special education teachers also work together to evaluate a student. Joint evaluation of a child speeds up the process and allows for a diagnosis and treatment methods to be put in place sooner.It is also a benefit because all of these professionals have experience working with this particular population (Plante & Beeson, 2008). Caseloads, not to be confused with workloads, are typically defined as the number of students with IEPs that school SLPs serve directly and/or indirectly. However, in some school districts it might also include those students whom do not have identified disabilities but still receive assistance (â€Å"Executive summary: A,† 2003). By ASHA’s recommendation, the maximum caseload for a school SLP should be no more than 40 students.However, the results f rom the study completed by Katz, Maag, Fallon, Blenkarn, and Smith (2010) suggest that it is typical for a caseload to fluctuate between 45 and 59 students. Too many caseloads can put too much added pressure on a school SLP, causing them to become less satisfied with their job. Job satisfaction is characterized as an attitudinal variable estimating the degree to which employees are pleased by their jobs and the miscellaneous aspects of their jobs (Edgar & Rosa-Lugo, 2007). Speech-language pathologists exceeding 40 caseloads expressed significantly less satisfaction with their career choice.They felt pressured by lack of time in completing assessments compared to those with fewer caseloads (Katz, Maag, Fallon, Blenkarn & Smith, 2010). Most employees’ voice that having reliable coworkers, enough time to get work done, and a friendly supervisor all contribute to higher job satisfaction. This in turn correlates to their likelihood to remain in the profession (Katz et al, 2010). Those who have been in the profession for a greater number of years have a higher job satisfaction than those who are just starting out.Although, they are often unsatisfied with their opportunity for promotion or advancement in the field, fellow coworkers, pay and pay rises, and their primary supervisor (Edgar & Rosa-Lugo, 2007). Despite some downfalls, school speech-language pathology is a fast growing career. Numerous states across the United States have undergone a significant net gain in population. Immigration levels are on the rise in states such as New York, Florida, Minnesota, California, and Texas. Thus, increasing the number of speech-language pathologists needed in school districts (Edgar & Rosa-Lugo, 2007). There will be a larger demand for speech-language athologists that specialize with certain age groups, especially school-age children. Currently, there are approximately 54,120 speech-language pathologists working in private and public school systems. B y 2020, that number is expected to increase by more than 12,000 employed school speech-language pathologists (U. S. Bureau of Labor Statistics, 2012). There are countless benefits that are enticing more people into the field. Mothers (and sometimes fathers) of school-age children enjoy that their working hours are very similar to their children’s schedules. They can work full-time and still get their child off the school bus everyday.Majority of school SLPs (93%) only work 9-10 months out of the year, allowing them to have the summers off to spend with their families but still be paid on an annual basis (Brook, 2012). Generous benefit packages are usually offered, including health, dental, and vision insurance programs and maternity leave. Furthermore, the salary of a school speech-language pathologist also definitely has its advantages. Salary fluctuates depending on years of experience, geographic location, and type of school system. According to the results of a study done by Brook (2012), the median earning of a school speech-language pathologist was around $58,000.Those who work in the Northeast region have a higher median income those who work in alternative regions of the country, especially the South and Midwest. By working in a suburban or metropolitan area, school SLPs are likely to make about $10,000 more than those working in rural areas. Secondary and elementary school speech-language pathologists generally have a higher income than those who work with in preschools. Those with 28 years of experience or more made up to $25,000 more than those first starting out in the profession (Brook, 2012). A range fluctuating between 88% and 94% of school SLPs were paid on an annual basis. .

Friday, August 30, 2019

Graffiti’s impact on society Essay

Who is responsible for the pervasion of this so called â€Å"artcrime† in today’s society The word â€Å"graffiti† is derived from the Latin term â€Å"graphium† which means â€Å"to write†. Graffiti evolved during ancient times but first impacted on modern society in the late 1960’s, when political activists used it as a medium of revolt against governing powers. Thereafter, individual artists began to gain recognition. TAKI 183 was the first known artist to write tags, starting in central New York subways. After seeing the regular appearance of TAKI 183’s tags, new artists began to flourish throughout New York City, establishing personal tags visible to almost everyone. The artists’ goal was to be the most prolific and visible, leaving tags on subways, buses, trains and walls around the city. Graffiti later developed into an â€Å"art form†, where the writer with the most unique style and conspicuous presence was deemed the best. While the competition between artists in New York reached boiling point at this time, the rest of the world began to experience the first of these so called â€Å"artcrimes†. †¦Ã¢â‚¬ Graffiti is just another form of art, and art is all self expression, legally or illegally†Ã¢â‚¬ ¦ Inevitably, laws were introduced aiming to control the outbreak of graffiti artists. This provoked a race amongst artists to paint as many trains and subways as possible, before the law caught them. The recognition of style and technique gained more appreciation by fellow writers as the use of vivid colours and seemingly cryptic language developed. The original style of tagging progressively became an artform. Today there is a definite distinction between â€Å"tagging† to deface and  Ã¢â‚¬Å"street art†. Graffiti has developed over time to create a complex social framework, involving breakdancing, DJing, MCing and graffiti to form a popular youth culture referred to as â€Å"The urban Hip-Hop culture†. These arts arose from New York, where gangs used these various methods as a way of self expression and often in other ways to settle arguments. Recently, legal â€Å"street art† has been used by local government and youth centres to discourage the tagging and vandalism which regularly occurs in their area, to present to the upcoming youth a form of self expression without involving illegalities. But unfortunately, official attempts are often in vain. The reason these artists enjoy painting walls results from â€Å"the adrenaline rush involved in expressing yourself illegally, which in our case just happens to be via graffiti. To me graffiti is just another form of art, and art is all self expression, legal or illegal† states local Perth artist Dave K. Dave goes on to say, â€Å"The ultimate rush comes from painting in a more difficult place, especially trains. There are plenty of new kids to the scene who just tag for a â€Å"kick† but don’t understand the deeper meaning of graffiti as an artform and it’s those people who give us a bad name.† Yet the continuation of youth projects such as that at the Claremont Showgrounds show a positive effect on the community, lighting up the walls and reducing vandalism in the area. †¦ â€Å"A surfer travels the world for the perfect wave, writers travel the world for the perfect train yard†Ã¢â‚¬ ¦ Senior policeman, Constable, Nick Steele, has become a full time youth advisor, and organises legal graffiti for the kids of Perth. He says, â€Å"We use it as a gateway for the kids, to discourage the unartistic forms of graffiti like tagging and scratching, and encourage youth to get involved in projects such as the Claremont Showgrounds wall. To me these projects have positive effects on the kids and the community.† We can expect more legal graffiti to be organised in the near future. The graffiti explosion has touched over 75% of the world, creating a worldwide network where writers from Australia may travel in Europe to paint trains†¦ â€Å"Graffiti is similar to surfing, as a surfer travels the world for the perfect wave, writers travel the world for the perfect train yard,† says renowned artist CES of New York. The complexity of today’s youth culture continues to grow. Today’s graffiti problem is commonly considered a burden on society, as the regular removal of graffiti costs an enormous amount of money. An estimated $15 billion (US) worldwide each year is spent on the consistent removal of sprayed, marked and scratched surfaces. If, as Constable Steele suggests, the artistic form of graffiti as street art can override the more defacing form of tagging & scratching, the graffiti culture may yet prove an asset to society by minimising graffiti done as vandalism.

Colonial Unity

Jayla Reese 1 September 2012 3 Essay 2: Colonial Unity (1755-1774) Beginning in 1754, the evolution of colonial unity experienced its jump start with the event of the French and Indian War in America. In entering this war, the French were doing fairly well; they’d just ensured the surrendering of George Washington and Virginian troops as well as the Native Americans that were helping them. The French and Indian had also begun attacking the settlements of Pennsylvania, North Carolina, and South Carolina.After a breakdown in French leadership, however, the tables suddenly turned in favor of the Americans, with the help of the British, who successfully claimed victory in 1763. The great victory and power of the British Empire led to conflicts that would ultimately ruin the relationship between the British and the American colonists shortly after. As a result of the incapability to administer the colonies and territories of North America, the British began enforcing harsh restrict ions and taxes, which directly affected the colonists.The Stamp Act was a major one of many, passed in 1765, that taxed the colonists for legal documents including newspapers and publications. This sparked outrage in the colonists, and also acts that would ultimately begin to strengthen the colonies. Referring back to the French and Indian war, the Albany Congress was configured during the same year, June of 1754. Seven representatives, one from each colony, met in Albany, New York, with the intent to discuss the Albany Plan of Union.The purpose of this plan, created by Benjamin Franklin, was to discuss persuading the Iroquois to aid them in fighting the French, and to also group the colonies into one alliance. Unfortunately, the plan failed due to the rejection in which none of the legislatures present during the meeting decided to ratify it. Although the Albany Congress proved to be unsuccessful in unifying the American colonies, future attempts were made by the Stamp Act Congress , and the First Continental Congress as the British and American colonies ontinued to debate the issue of taxes. The Stamp Act Congress, which included delegates of nine colonies, met in October of 1765 in regards to the Stamp Act. The Stamp Act Congress was not an immediate success, but in the end, all but one legislature approved the plan known as the Stamp Act Resolves. The famous saying â€Å"No taxation without representation! † has been known to have derived from this action. Events following this colonial effort would later include American boycotts and movements against the British rule.The Boston Massacre, occurring on March 5, 1770, which resulted in the death of five men, and also the Boston Tea Party on December 16, 1773 in which Bostonians destroyed a shipload of tea, were two major occurrences that showed the strong American resistance to the British. Another meeting, held by twelve colonies, would establish the committees of correspondence due to the threats ma de my British to trial Americans in England, and would further show the growth of unity building among the colonies.Pleased with the decisions and organization shown during the meeting of the Stamp Act Congress, the colonies decided to meet again from September 5 to October 26 in 1774 sending their delegates to Philadelphia. The First Continental Congress, as they were called, met in response to the Coercive Acts passed in favor of British authority. All colonies except Georgia were present, and the delegates all strongly agreed that Coercive Acts were unconstitutional. However, the representatives still thought only in ways to benefit their individual colonies.This led to the division of the colonies and eventually some of the colonists were against boycotting British trade (Continental Association) and other colonies agreed with this gesture. Although the colonies essentially worked together as a whole for some matters, the unity displayed between them wasn’t the greatest. The colonies would later, during 1774 and 1775, split into the Whigs and Tories, in which the Whigs were anti-British rule, and the Tories supported the British. However, the British were primarily the main purpose for the colonies to take a stance, thus causing the colonists to bond together despite their differences.

Thursday, August 29, 2019

Course assignment Coursework Example | Topics and Well Written Essays - 750 words

Course assignment - Coursework Example aware of different technological tools and techniques and they can use their knowledge and skills in their work (Creating a Successful Performance Compensation System for Educators, 2007). Therefore, we can say that the knowledge base of some of the potential employees is the actual factor to implement the performance based compensation. Because these employees can work better as com-pare to others just because of their capabilities (Creating a Successful Performance Compensation System for Educators, 2007). The implementation of performance based pay or compensation packages is important in order to reward or appreciate the hard working employees and in order to punish the lazy employees too. It can be negative or positive reinforcement for the employees so that they can work hard in the future or at least they can try to maximize their efforts. Positive reinforcement can be in the form of prizes while the negative reinforcement can be in the form of punishments or highlighting the bad performance in the meetings. In other words we can say that in this knowledge worker type environment, the best and the most appreciated compensation style will be the evaluation based on the performance appraisal. Employees can get immediate feedback in the form of rewrads or punishments for their performances. This performance based compensation can also help to reduce the likelihood of nay priority or biasness towards any specific employee. If we talk about the major forms of performance based pay styles then usually companies adopt these four major forms of these pay packages. That includes gain sharing, profit sharing, performance bonuses and the other is the skill based rewards (Jonathan, 2010). The details of all the three forms of performance based pay is given below; These Performance based bonuses are very widespread, because they are almost basic type of performance-based pay. In order to award such bonuses to the employees, a company manager may assess the

Wednesday, August 28, 2019

History of Darfur Essay Example | Topics and Well Written Essays - 750 words

History of Darfur - Essay Example The crisis was also caused by the use of the military to oppress the people, as these soldiers were sent to the area that overtook the people and denied them their rights to life and to dignity, in which case they started violating the women, and even started targeting civilians (Jibril 2010, 5). The attack on civilians was a major contributor to the conflict as it was the only soldiers who were armed, and the people suffering were the innocent as their alleged crime was being of the wrong religion and being of a different race from that which they were expected to be. The escalation of the conflict occurred with the presence of the military, which displaced the civilians from the Darfur region, and the people were forced to retaliate, which inspired the killings perpetrated by the military officers. In the Darfur conflict, china played a key role, which is embarrassing to the Chinese government as it was part of the parties that fuelled and waged war in the region. This is because, Sudan has faced sanctions for a long time, which have seen the country’s economy face a sump and in some cases come to a complete halt. However, since china is a major consumer of oil, it turned to Sudan as a source of oil, in which case it funded the Khartoum government and even built infrastructure (Danby 2007, 2). However, this was not the end of the Chinese affair with Sudan as it acted as the main supplier of arms to the country, in which case it is the same weapons and arms that were used in the Darfur crisis. Therefore, china waged war through the government, where the Sudanese government failed to meet the grievances of the people and the Chinese provided armaments that the soldiers used to kill people in Darfur so that the Chinese could get access to oil. This was a violation of the international sanctions placed on Sudan, including the arms embargo that still stands, where it supplied weapons and benefitted grandly from the conflict. The United Nations African Missi on in Darfur was a joint mission authorized in 2007 to contain the conflict in the Darfur region, where it was charged with the mandate to stop the killings, rape and enforce a ceasefire. Despite the huge amount of human resources directed towards the region to bring the whole conflict to a stop, little success can be seen as the forces face equally enormous challenges in protecting the civilians in the area due to the lack of political will to create a stable condition that will facilitate political negotiations. As a result, the UNAMID forces have not managed to bring the entire region to a stable condition and provide all the required humanitarian services that they were charge with the authority to deliver. In addition, the UNAMID forces intervention faces other challenges that include the insecure conditions with many hostilities from both sides of the warring factions. Interventions towards ensuring that the region resumes its stable condition include the use of the internatio nal criminal court to prosecute the president Omar al-Bashir. This is because with al-Bashir as the president and the leader of the government at the time of the conflict did not take responsibility of the people’s grievances, but instead opted to quell the uprising through force (BBC News, 2010). This was a genocidal situation in which many lost their lives warranting the ICC to issue arrest warrants against him, as it is his soldiers that committed crimes

Tuesday, August 27, 2019

Global Financial Crisis Research Paper Essay Example | Topics and Well Written Essays - 1250 words

Global Financial Crisis Research Paper - Essay Example This paper will analyze the actions taken by Samsung’s leadership following the world financial crisis of the year 2007-2008. The experience of Samsung Company in the year 2008 was quite different from the Asia financial crisis of 1997. The pre-global crisis of the year 2007 to 2008 offered varying opportunities from the one that was experienced ten years before. The company was at a different level compared to 1977 and 1987 when the company was at its infancy. As it was realized later, even before the crisis of 2007 the company faced varying tension as it role in the Korean market continued to change. The company had not yet learned from the previous crisis and was unprepared when the global crisis struck. The company’s leadership was divided though dialogues, disagreement and arguments as a result of one group wanting the company to remain as original as possible while the other group wanted to challenge everything that was being experienced in the company. Both sides were however shaken by the global financial crisis of 2007-2008 (Lee, 4). Political issues led to the chairman of the company resigning in 2008, a slowdown in the drivers of business was registered 2007 and the triumph of the Korean voice that led to the resignation of Yun as well as the onset of the global economic crisis that hit the country at around October 2008 were among the challenges that were faced by the company. Since the world economic crisis that was experienced by the company in 2008, Samsung Company has proceeded on the path of becoming one of the globe’s leading organizations in terms of progressive entrepreneurship and creative innovations (Necker and Ziegelmeyer, 20). As the United States financial crisis deepened the world’s economic downturn in 2008, the leadership of the company experienced challenges that were quite different from the ones that they had

Monday, August 26, 2019

Questions to solve belongs control and instrumentation Coursework

Questions to solve belongs control and instrumentation - Coursework Example . The characteristic equation will be  The critical gain of the system indicates the stability of a closed loop system developed by applying unit feedback to (Klee & Allen, 2011). The gain margin represents the increase or decrease needed to make the loop gain where the frequency is -180 degrees. Discreet time systems are characterized by difference equations. Examples of these are economic systems where the system behavior is recognized at discrete points of periods (Liu & Wang, 2012). Conversely in the system, some of the signals are continuous while others are discreet. Some discreet time signal arises from the continuous signals via sampling. Digital computers accept signals on discreet points of period so that samplers transforms continuous time signal into discreet time signal. i) The derivative control increases the damping of the system. The derivative term also increases the present noise which can easily cause instability. Assuming the functions of closed transfer are outlined as shown, The integral affects the gain of low frequency and alters the frequency where proportional factor becomes more effective. It would be best to raise KI, but when it gets higher a more negative stage is introduces in the range at a place where the servo bandwidth results. This lowers the phase margin of servo, causing ringing and overshoots. As shown below Ziegler Nichols and Modified Ziegler Nichols are tuning methods for PID. Ziegler Nichols uses the procedures of selecting proportional controls alone, increases the proportional gain until instability is attained. In addition, it measures the oscillation period to come up with critical time constant. For certain control loops the oscillation measure, offered by  ¼ decay ratios and their large overshoots for point alterations are not desired therefore, the modified Z-N is used (Olsson, 2002). The Z-N method does not give the final solution when compared to the

Sunday, August 25, 2019

Outdoor Adventure Activities Essay Example | Topics and Well Written Essays - 1250 words

Outdoor Adventure Activities - Essay Example (Leeuwen, 1996, P. 65) Caving is the act of visiting caves. Cave can be described as natural physical environment in which the rocks are arranged in a way that they appear like houses. Caves have been known as the home of traditional men when they were not civilized enough to construct houses. Caves have become one of the most attractive outdoor activities not only for leisure but also as a way of learning geography of a place and also the history of the people. They are important sites for archaeologist as they try to dig deep into the history of the people. Caves are important place to learn civilization as people go to explore the arts of painting on these caves which tell moir about the civilization of these people. However those who go for caving do so for leisure activity in the sense that they want to have an experience of those gone days. They want to feel link those old people felt when they stayed in the caves. Other just wants to have a relaxing atmosphere where they can relax in quietness with out disturbance in the unusual environment. On the other hand canoeing is a water based activity which involves travelling on the water in a canoe. This activity may be carried out for leisure or for the purpose of travelling. If used for leisure individuals will be c engaging in the activity for fun or for exploring water geography. (Rivkin, 1995, P. 21) Both of the above mentioned activities will have several environmental impacts. This arise form the fact that both outdoor activities involve a form of interaction with the environment. Let us look at each of the issue. Environmental effect of caving During caving there are various instances at which individuals are likely to interfere with the set up of the environment. First many of the caves are located secluded areas which are not always visited by people as a result as people go to these caves they interfere with the natural environmental set up. Fore example if the cave is located in deep forest as is the case with many caves individual are likely to interfere with the set up of natural environment. This may involve clearing of the forest in order to pave way for their entrant into these caves. Therefore tone of the environmental effect that caving may have is that it may lead to clearance of the environment in order to pave way for entrance into these caves. Caves also hold their own economical habitats. Apart from home of flying mammal like bats, they are also home to a variety of insects and other small rodents. Therefore as individuals go caving, there are likely to interfere with the natural life of these animals. This may have an effect of making the animal relocate to other areas which leads to loss to their natural ecology and therefore disruption of the food chain. For those who go caving they are likely to carry foods and other items. If there is no proper disposal of the wastes, it may lead to pollution of the environment. In many cases, some of these wastes may be poisonous to the animals and as they consume tem they may dies. Therefore one of the most serious problems that may be associated with caving is pollution of the environment. There should be a proper waste disposal mechanism should ensure that poisonous materials like

Saturday, August 24, 2019

Does The World We Have Offer Practical Ways to Protect the Earths Essay

Does The World We Have Offer Practical Ways to Protect the Earths Environment - Essay Example As a means of integrating understanding of this reality, as well as seeking to provide a handful of prescriptions for how this waste can be lessened, the following analysis will integrate with the issue itself, the global trends that are implemented within the current world, and a review of several key recycling programs that can be utilized not only as a means of reducing the solid waste that builds up throughout the nation’s landfills but also providing monetary incentives that are cost positive for inducing recycling. By such an analysis, the reader can come to the understanding of the profound importance that this has and the relevance to the fate of the environment. Even a cursory analysis of the issue promotes the understanding that the nature of the current world has created a situation through which the overall level of trade in the overall level of domestic and international shipping between great partners and individual consumers is unlikely to decrease anywhere in the near future. Conversely, it is reasonable to expect that within the near future trade and international shipping will only increase. As a result of this reality, it is neither realistic, nor profitable to the economy or the individual consumer, to place a level of restrictions upon the overall volume of trade it takes place from one part of the world/one part of the country to another. However, with this being said, placing certain restrictions upon the way in which packing material is represented throughout the market is a reasonable and viable approach. For instance, in the drive to reduce the amount of landfill mass that shipping packaging generates, one effective approac h that could be engaged would be to require any and all shipping operations that integrate with the economy of the world to initiate levels of standardization with regards to the type and content shipping containers/packaging that are utilized

Friday, August 23, 2019

HR Strategy Essay Example | Topics and Well Written Essays - 2000 words

HR Strategy - Essay Example The King Faisal Medical City is just one of the elements in the plan of the Saudi government to structure world-class healthcare institutions all through the kingdom. PESTEL Analysis The King Faisal Medical City has hospitals that specialize in neurology, cardiology, rehabilitation, oncology, and ophthalmology. These hospitals have a capacity of more than 1000 beds. The city also has other social institutions like mosques, retail outlets, apartments and a hotel within the King Faisal Medical City. The main aim for concentrating such modern healthcare facilities in one region was to try and facilitate for the de-institutionalization of healthcare by availing family and patient-centred healthcare delivery options to the public. The King Faisal Medical City, which is based in Saudi Arabia’s Southern Province, is a 262,836-square-meter medical city. There are different external factors that affect the manner in which operations within it take place. Political Review Even though it is a recognized fact that the Middle East is an area that tends to be politically unstable, the nation of Saudi Arabia does not usually have many incidents of political instability because of its authoritarian government. The nation also holds approximately 25% of the world’s total supply of oil reserves. This means that not only is the nation well able to structure and plan for modern medical facilities for its population, the existence of its reserves in oil also encourages other nations to push for stability in the nation even when many of its neighbours are embroiled in conflicts. Saudi Arabia’s political stability has encouraged health-related organizations in developed nations to invest in it. Economic Competitive Review Saudi Arabia’s economy, propelled forward by its oil reserves, has been instrumental in the transformation of all of the nation’s different sectors- among which is the healthcare sector. Today, Saudi Arabia’s economy is rank ed as one of the most competitive ones in the international arena (AlFaris, Abdulgader, and Alkhenizan, 431). It pharmaceutical market has been witnessing double digit growth on an annual basis since half a decade ago (Al Juhani and Kishk, 167). This is quite an impressive and attractive platform for foreign health-based corporations which are looking to invest in a vibrant market. According to Almalki, Fitzgerald, and Clark, Saudi Arabia, along with other nations such as Russia, China, Brazil, and India, present the best markets for health based companies (Almalki, Fitzgerald, and Clark, 1481). Socio-Cultural Review The Saudi Arabian healthcare sector is mostly reliant on expatriate medical personnel to fill vacancies for medical practitioners such as nurses, doctors, and pharmacists. Being probably the most conservative culture in the world, Saudi Arabia’s nationals may not be able to take over many of these vacancies because of existing cultural prohibitions that bar them from engaging in some medical practices. The reality of foreign workers taking over the majority of jobs in Saudi Arabia’s medical sector means that the overall culture is constantly being exposed to different changes from foreigners. Technological review The majority of local Saudi firms do not have the technology required to create products such as are required to effect

Thursday, August 22, 2019

Nursing capstone phase 2 Assignment Example | Topics and Well Written Essays - 250 words

Nursing capstone phase 2 - Assignment Example They concluded that whole blood therapy should be avoided and that only appropriate blood components should be transfused. Informatics systems, such as electronic health records, can be used in identifying patients who have already had blood transfusions for health-care staff and anesthetists, while also providing a blood tracking system for hematologists and health-care staff. Azizi et al (2014) set out to study the prevalence of complications in blood transfusion among patients at an Iranian hospital in a 2-year period. They find that there was a 0.4% incidence rate for acute transfusion reactions, especially related to restlessness, dyspnea, rigors, fever, chest pain, nausea, and palpitation. They conclude that that there should be a well-structure program to monitor blood transfusion-associated adverse reactions. In this case, the hospital should use appropriate visualization and statistical applications that will alert healthcare staff to health event aberrations to manage them as soon as possible. Execution of informatics implementation strategies will enable health-care staff to track adverse blood transfusion reactions, as well as track blood type and age and prior patient history, all of which will aid in either managing or preventing blood transfusion reactions. Gwaram, B. A., Borodo, M. M., Dutse, A. I., & Kuliya-Gwarzo, A. (January 01, 2012). Pattern of acute blood transfusion reactions in Kano, North-Western Nigeria. Nigerian Journal of Basic and Clinical Sciences, 9, 1,

Health and Safety Essay Example for Free

Health and Safety Essay The health and safety act consists of various principles, these are implemented to ensure employees are safe whilst at work, this doesnt just apply those those who are employed by a company it applies to any one who enters the building including professional bodies I.e district nurses, And general practitioners the legislation is made up of COSHH,RIDDOR,The manual handling operations regulations, the health and safety first aid regulations and management of health and safety at work regulations, I will identify and write a brief description on how these legislations relate to my job role and work environment. *Reporting any incidents or occurrences puts a duty on an employer o report serious workplace accidents ,occupational diseases and any near misses* this comes under RIDDOR, reporting of injuries,diseases and dangerous occurrences regulations 1995 ( amended 2008 ),it is a legal requirement to report any accidents and occournences. In my work setting if and accident or dangerous occournence,for example a trip slip or fall, I will report this an accident report book no matter how minor. It is a legal requirement for my employer to have this procedure in place to keep a record of accidents and occournences, and my work establishment complies with wi the requirements of the DATA PROTECTION ACT 1988, by having tear o out pages that are filed and not accessible to unauthorised persons. Another regulation is the *health and safety first aid regulation1981* And in the event of injury or sudden illness failier to provide the correct practice could have fatal results.The health and safety first aid regulations require that an employer provide correct equipment, facilities and personnel to ensure their employees or clients, receive immediate attention if they are taken ill or injured at work the regulation applies to all work settings including mine,adequate provisions will consist of first aid boxes, and first aid rooms at my work setting their is always a trained first aider on site including nightshifts. The COSHH legislation is put in place,this ensures the employer does a risk assessment on any any substance hazardous to health I.e medication,cleaning products and many more, if not used correctly the employer will asses the risks and make a decision on what precautions will be needed to ensure a safety.Relating to my work setting medication is COSHH issue. And only a senior carer who has had full medication training and has been assessed and found to be compitant can administer medication.medication is stored in a trolly which is then stored in a medication cupboard which is locked at all times unless in use and is only accessible to authorised users, again my seniro will have completed a risk assessment for this situation to ensure the correct action is taken and the health and safety is correct and all employees are informed on the situation I follow my work establishments policies and procedures the policies and procedures folder can be found in the nurses station and an additional copy in the mangers office, their are a number of different policies that are to be followed some of which include ââ€" ªCare of dying policy ââ€" ªEqual opportunities policy ââ€" ªLocking door in home policy ââ€" ªEvacuation of the home policy The folder consists of 422 policys and is required that once the policy has been read and understood e employees or manager are required to date and sign. Whilst at work I ensure that I support others to understand and follow safe and good hygenie practices i.e frequent hand washing and glove changes.i also ensure that myself and others are were correct ppe, and use the equipment required, and also risk asses any situation I may be in. I also monitor and report potentiometers health and safety risks by checking all equipment prior to use for e.g hoist slings and wheelchairs.if I find any problems or concerns I will report this to my manager and make sure all staff are aware that it is out of use, however something minor I.e a dirty wheelchair or frame is something I can take care of myself and ensure it is cleaned correctly. Risk assessments are put in place to ensure the safety of an individuals needs , these assessments vary as different people have different needs these asesments can range from mobility to mental capacity, eating and drinking to personal care. In my work setting their are clients who need help with their personal care, and their others who only need assistance with bathing or showering and can do their own personal care. Prior to arrival to my home a client will have been assessed by a senior Carer, and the information will be put into a care plan which I and my colleagues will then read so we no all information about a client. I practice minimising potential risks by following all of my work place policies and procedures and carrying out and using risk asesments, wearing correct ppe at all times and practicing good hand hygiene and making sure the work place is always clean and tidy and their are no hazardous substances accessible to clients I also practice minimising risks by making sure the building is secure by closing doors and keeping external doors locked. There are many different accidents that may occour in a home some of which are trips,slips and falls from wet or worn carpets, dioreah or vomit etc In the event of someone falling in the work setting different procedures will take. Place, for example if a staff member falls they may get up and feel fine it is essential that it is documented in the accident report book, on the other hand if a client falls carers will not move them until professional help has arrived the client will be made to feel comfortable and depending on e situation may be put into he recovery persition,this again will be documented into the accident report book. I support colleagues to follow practices that reduce the spread of infection by ensuring that we always where correct ppe, and practice good hand hygiene and using alcohol rubs but not as an equivalent to hand washing. I also support by ensuring my colleague and I dispose of hazardous substances in the correct way. Ways that I ensure my own health and hygenie do no pose a risk to others I always have clean uniform when attending work, to ensure I do not bring any airborn viruses I.e MRSA I also notify my manger if I pick up and virus like DV and will not return to work until I am clear of the virus for 48 hours on arrival back to work I will fill in a return to work form. The manual handlings operations 1992 regulations, requires employers to avoid all manual handling where their is risk of injury.the legislation also states that a risk assessment must take place and followed correctly to minimise any potential risks. If I want any additional support or information I ask my manager, senior carers, or fellow colleagues. I can also access any information I am not sure about in my policies and procedures folder. At my work establishment their are two folders in the nurses station that are acessable to any staff member that are unsure on a certain subject some of these are ââ€" ªMeeting clients nutritional needs ââ€" ªCleanliness and infection control These folders are built up of useful information and policies that are relevant to each subject. Ways in which I help practice to prevent fires from starting and spreading , are ensuring that I know my work setting fire safety policy attend all fire safety training,I also make that I make sure that I know where my fire assembly point is. I also make sure that there are no waste paper baskets overflowing or anything else that could help a fire to spread or start, my working setting also had a no smoking policy,so I also ensure I smoke in the designated smoking are.if a fire was to start , emergency services would be contacted and the building evacuated , and go straight to the fire assembly point.i also ask any visitors to sign in and out and tell them were the fire safety point is. The signing in book will determined how Many people are in the building on arival of the emergency services. Procedures are as followed at my work establishment and many others ââ€" ªNever let any one in the building in without signing in.and professional bodies will have Id on show always check is ââ€" ªIf I am unsure about a persons identity for e.g a visitor depending on the mental capacity of the person, ask if this person remembers this visitor if this is not possible phone a next of Kin. Personal information is vital in my work setting, all residents Care plans inlcude daily food and fluid intake, mental capacity and all relevant information on an individual is kept in folders in a locked cupboard that is not accessible to any unauthorised persons. I protect y,mown security and of others by making sure I have the correct ppe on at all times and do not have any jewerly on whilst at work, and make sure all external doors are shut, and gates at the top and bottom of stairs are shut and locked. I also ensure others no of my whereabouts whilst at work, to ensure that a fellow carer is their to support the floor, even if I am assisting someone to go the toilet I make someone aware I am of the floor. Comon signs of stress can be very easy to spot some of these include ââ€" ªadgitation ââ€" ªBeing emotional and short tempered ââ€" ªNot completing jobs properly ââ€" ªWeight loss or weight gain ââ€" ªSmoking more ââ€" ªAlcohol binging My self indication for stress is ââ€" ªConstant worrying ââ€" ªWeight gain ââ€" ªBeing over emotional and snappy ââ€" ªFeeling very low and under the weather My own stress levels are triggered by unstructured situations, e.g understaffing at work have caused me to feel stressed and when I am unsure of a situation cause me to feel slightly stressed. My strategies for managing my own stress levels are having a written plan of what My main tasks are that shift, for e.g a morning shift my main task is to ensure all residents and clean and have eaten by. Reasonable time. Some may find it easier to take it task as it comes how ever I would rather focus on the main tasks and making sure these are completed correctly.

Wednesday, August 21, 2019

International Operation Strategy of Eucerin: SWOT

International Operation Strategy of Eucerin: SWOT Chapter 1 Introduction 1.1 Research Background The use of cosmetics was over thousands of years. The earliest archaeological evidence can be traced back to some royalty in Ancient Egypt times, where the Ancient Egyptians mixed perfume, sandalwood incense and aromatherapy products with oil applied to human bodies for pilgrimages or as an antiseptic. The Ancient Greeks and Romans also used cosmetics containing often lead and mercury. In the West, the popularization of cosmetics usage began in the 17th century and was originally intended to cover face scars of female patients healed from smallpox. In the19th Century, Queen Victoria once declared publicly that the use of makeup was â€Å"improper, vulgar, and acceptable only for use by actors†. Nevertheless, by the Second World War, cosmetics have been widely used in the West (except Nazi Germany). Today, the worldwide market size for Beauty and Personal Care Industry (BPC Industry) has increased 36% during 2005-2010 and reached USD 382.3 billion last year.Despite the significant influence of global economic recession in the year of 2009, BPC industry still showed stable and continuous growth in certain regions with emerging markets, particularly in Asia Pacific and Latin America. It is forecasted that these two dynamic regions will drive the BPC future global sales and become equally the joint largest market (with Western Europe) by 2014. Figure 1 and 2 below shows the global and regional market value of BPC industry during 2005 to 2010. Cosmetics industry, also called Personal Care Products Industry, Cosmetics and Toiletries Industry, Health and Beauty Industry, or Beauty and Personal Care Industry in this paper, in which companies manufacture and/or market personal care products such as creams, lotions, perfumes or makeup, covers a fully 13 key sub-sectors (Fig. 3). Recent reports show that Skin Care is the largest sector in the BPC industry (Fig. 4). It is predicted that in 2014, Skin Care, together with Hair Care, Colour Cosmetics and Fragrances sector will become the principle contributors to global BPC sales value growth due to the booming market in Asia Pacific. In Asia Pacific region, China represents today one of the most important and attractive BPC markets in the world due to its huge population, the increasing purchasing power of consumer and a better awareness of fashion among the younger generation. According to National Bureau of Statistics of China, the retail value of Chinese BPC products reached RMB 133.24 billion (proximately USD 20.51 billion) in 2010 with a 11.4% nominal growth compared to 2009. The total Chinese BPC market value is expected to reach as much as RMB 206 billion (proximately USD 31.7 billion) by 2014. However, in spite of this rising trend, industry players talked about that the increasing costs such as rental, labour, logistic and advertisement has given heavy pressure on cosmetics companies particularly those who had poorer brand equity were losing their profit margin. 1.2 Research Motivation Funded by Dr. Lifschà ¼tz in 1900, Eucerin ® is now Germanys largest and worlds 4th leading dermo-cosmetics brand in pharmacy segment in Skin Care industry. Belonging to famous German Group Beiersdorf AG, Eucerin sees itself as a â€Å"dermatologist-recommended skin care brand† that provides reliable, high quality and effective dermo-cosmetic products and expertise. Currently, Eucerin provides skin care products that are catalogued in 4 major lines: Face Care, Sensitive Skin Care, Dry Skin Care (medical products) and Sun Protection. Each line contains quite a few sub-lines that are assorted either by skin types / products functions (pure, dry, very dry, problematic, sensitive skin, etc.) or by products application places of the skin (face, body, deodorant, hair, etc.). While Eucerin firstly entered into Asian BPC markets in 1991 and quickly built its brand awareness and popularity among the world of pharmacy skin care products in Thailand, Vietnam, Singapore and Malaysia, in China, however, it has being constantly a big â€Å"missing piece† to complete its global share of market. As Chinas BPC market size is currently rated in the 3rd position after the US and Japan and is still possessing enormous growth potential (12% market growth is expected during 2011 to 2014), and the Skin Care segment is the primary driver for BPC market, it is for Eucerins greatest interest and challenge how to exceed existing international and local skin care competitors to complete its global entire territory. 1.3 Research Scope and Objectives The purpose of this study is therefore attempting to assess and analyse the international operation strategy of Eucerin. Through the SWOT analysis, identify and highlight the key internal and external factors of corporate ongoing strategic planning, gaining an in-depth understanding of the companys strategic operational issues, critical success factors, emerging market opportunities and future marketing challenges and trends. The research scope covers issues including the study of BPC and dermo-cosmetics industry: market sales, market share, Chinese cosmetic market regulations, marketing strategy of Eucerin: marketing segmentations, positioning, and Chinese consumer behaviours. 1.4 Research Process and Chapter Structure The process of this research is approximately composed eight stages summarized as figure 6 underneath. By the case study of Eucerin a Beiersdorf owned dermo-cosmetics brand of BPC Industry, through the literature review, SWOT and critical success factors analysis, attempting to analyse, assess and obtain an embedded understanding of the companys strategic operational issues and its future marketing challenges and trends in Chinese BPC market. Chapter 2 Literature Review 2.1 Beauty and Personal Care Industry The global Beauty and Personal Care market (BPC market), also called Cosmetics and Toiletries market has generated total revenues of US$ 382.3 billion in 2010, representing a compound annual growth rate (CAGR) of 36% for the period 2005-2010. By comparison, markets of Asia Pacific, Western Europe and North America brought out 70% of global BPC market in 2010 (Fig. 8). Most interestingly, both Western Europe and North Americas BPC markets has witnessed the economic recession, showed a negative growth in 2009 and decelerated performance afterward, while markets in Asia Pacific and Latin America, sales growth continue and for the first time the BPC market of Asia Pacific region (mainly referable to China) overtook the first position of global BPC market (Fig. 9). 2.1.1 Market Segmentation and Differentiations BPC products cover all daily personal care cosmetics such as makeup, nail polishes, hair sprays, hair colours, creams, lotions, perfumes, deodorants, shower and bath gel, bath salts, and lots of other product types. The market can be sorted into a completed 13 key sub-sectors scope as we have mentioned earlier (Fig. 10). Skin Care segment is the leading category that generates 22% of worldwide BPC market due to Asia Pacifics booming sales, the rising demand of anti-age products also conducts the segment as the key contributors to global BPC market over the forecast period. Global skin care brands can be also sorted by their marketing positioning into six classes: professional brands, luxury/premium, pharmacy/dermo-cosmetics (cosmeceuticals), organic/natural brands, direct-selling and mass market products. Each segment targets different consumers according to their purchasing power, quality requests or specific needs, etc. Key competitors of each class are listed below: Professional skin care brands (distributed mainly by beauty salons, spas): Sothys Paris, Lexli, RVB, Sparitual, Lotusdream, etc. Premium skin care brands(distributed mainly by department stores, perfumeries), : Shiseido, Està ©e Lauder, Lancà ´me (LOrà ©al Group), Clinique (Està ©e Lauder Group), Kanebo (Kao Group), Chanel, Christian Dior (LVMH Group), SK-II (PG Group), Yves Saint Laurent (LOrà ©al Group), etc. Pharmacy/dermo-cosmetics brands(distributed mainly by pharmacies, drugstores or via dermatologists recommendations): Vichy (LOrà ©al Group), La Roche-Posay (LOrà ©al Group), Boots, Eucerin (Beiersdorf Group), Johnsons, Avà ¨ne (Pierre Fabre SA), Caudalie, Lierac, ROC (Johnson Johnson), Nuxe, Galenic, etc. Organic/natural brands(distributed mainly by speciality stores, natural food stores): Yves Rocher, The Body Shop (LOrà ©al Group), LOccitane Direct-selling brands: Avon (USA), Natura (Brazil), Mary Kay (USA), Oriflame (Luxembourg), Artistry (Amway corp. USA), DHC (Japan), Nu Skin (USA) Mass market brands(distributed mainly by supermarkets, hypermarkets): LOrà ©al Paris, Nivea (Beiersdorf Group), Garnier (LOrà ©al Group), Olay (PG Group), Neutrogena (Johnson Johnson), Ponds (Unilever Group), Vaseline (Unilever Group) Eucerin ® is catalogued in the pharmacy/dermo-cosmetics brand of skin care industry as its products can be only purchased in pharmacies or drugstores. 2.1.2 Skin Care Industry in Western Europe For BPC industry and consumers, it has been tough in the past couple of years. However, the latest data showed that Skin Care was the only category managing to sustain an average of positive 4% growth during the economic downturn.Comprising 23% of global BPC sales in 2010, it remained the most valuable category during 2005-2010. Despite the growth of Skin Care sector slightly slowed down due to the decreased consumptions on non-essential purchases, the global sales of Skin Care sector was still largely focused in mature Western countries. Anti-age cosmeceuticals were considered and predicted as the star performer for Skin Care market for the future couple of years while the premium and luxury products performed the worst and were pushed toward the category of super premium or â€Å"masstige†skincare for a better performance and the growth in both anti-age and premium was accelerated by the high demand in Asia Pacific. Comparing to Skin Care, global Hand Care sales showed a sli ght yet stable growth and the reason was believed to be linked directly with consumers threaten perception of swine flu. In Western Europe, while recent data showed a gradual result of an average 4% Skin Care sales growth in UK, Netherlands and Germany during 2009 2010, key markets such as France, Italy and Spain reflected an average of -2% in term of sales growth, resulting an overall 2% growth drop in Skin Care segment in Western Europe (Fig. 11 and Table 1). While the Skin Care sales growth in western European slowed down in recent years, anti-age sub-category maintained an outstanding growth reflecting the desire for a younger looking appearance from the consumers. Table 1 Skin Care in Key Western European Countries (2005-2010) Crossing the overall BPC Western European market, in 2010, the top 10 Skin Care brands which share 26.2% of the market are belonging to 7 companies: Beiersdorf AG, LOrà ©al Group, Procter Gamble Co., Clarins SA, Yves Rocher SA, Està ©e Lauder Cos Inc, and Henkel AG Co., in which 4 brands are categorised into mass market class (Nivea, LOrà ©al Paris, Oolay and Garnier), 3 in premium/luxary (Clarins, Clinique and Lancà ´me), 2 in pharmacy/dermo-cosmetics (Vichy and Diadermine), and Yves Rocher is classified into natural/organic brands. On the other hand, in terms of company shares in Western European Skin Care market where up to nearly 58.6% market shares are held by the top 10 BPC companies, their products are crossing over all cosmetics classifications and sales distribution channels except the direct-selling category (Appendix 1 2). In relation to consumers behaviour toward BPC market in Western Europe, four fundamental trends characterized by Lee (2010)that impact global BPC market across all categories may sum up this market trend: the ageing population, agelessness pursuance, advances of technology and intensive awareness of health and wellness. The Ageing Population The global population is becoming older. Comparing to Japan who has the oldest population in the world with nearly 23% over the age of 65 in 2010, the median age in Western Europe today is just over 40. Japan has the differentiation of being the largest Skin Care consumer on a per capita basis. In 2010, it accounted for 22% of global skin care sales with USD 19.3 billion and this may referable to its huge older consumers, high disposable incomes and the great interest in combination of health and beauty. Agelessness Pursuance The pursuance of younger looking is highly associated with increased life-pan and the development of technologies. People take greater care of their appearances in order to reflect their interior youthfulness. In result, for example, the high demands for cosmetic minimally-invasive treatment (including Botox, laser skin resurfacing, soft tissue fillers, etc.) that intending for skin firming and elasticity made up 11.6 million procedures in 2010 with 110% growth during 2000 2010 in the US and was expecting to reach totally USD 17.6 billion in 2015. Advances of Technology Skin Care companies and manufactures today are able to sell their products with higher prices thanks to the aggressive introductions of technologically advanced formulations. Consumers in Western Europe may willing to pay up to EUR 20, EUR 40 or even EUR 300 on a product that claims benefits such as firming or wrinkle reduction and contains innovative whatsoever ingredients, while a product that only provides a single basic function may not be able to sold even it only charges EUR 10. High Awareness of Health and Wellness The concerns about health and product safety among consumers in Western Europe have massively increased during the past couple of years due to the aging population and the age-related illnesses. Consumers are becoming more and more careful about what they put on their skins and the detrimental effects of chemicals. In result, this will lead to a strong interest in finding cosmeceuticals with a balance of natural, organic ingredients and effective functions. 2.1.3 Skin Care Industry in China Table 2 BPC Market by categories in China (2009-2010) BPC market in emerging countries such the BRICs (Brazil, Russia, India and China) has shown enormous growth in the past couple of years. In China, BPC market showed strong resilience of 10% sales growth, reaching RMB 145.5 billion (proximately USD 22.4 billion) under the global recession impact in 2009 and continuously increased in 2010. While the growth rate in sectors such as deodorants, fragrances and mens grooming products were less well performed comparing to 2009, skin care, hair care and premium cosmetics were the most dynamic sectors in 2010 (Table 2 and Fig. 12). Comprising 6% of global BPC market value in 2010, Chinas BPC sales is expected to have a relative resilience to the global recession and reach as much as RMB 206 billion (proximately USD 31.7 billion) by 2014. Crossing the overall Skin Care market in China, interestingly, while 9 out of top 10 skin Care brands in Japan all belong to Japanese local BPC manufacturers, the top 10 brands who share 51.5% of Chinas Skin Care market in 2010 are from 4 foreign countries: Mary Kay (US), Artistry (US), Longligi (China) and Avon (US) are categorized into direct-selling channel; Olay (US), LOrà ©al Paris (France) and Nivea (Germany) belongs to mass market class; and Shiseido (Japan), Lancà ´me (France) and Chcà ©do (China) are classified into premium/luxary sector. There are no pharmacy/dermo-cosmetics brands in top 10 and the best performer Vichy (France) only shares 2.1% followed by La Roche-Posays (France) 0.4% in the market. 2.2 Cosmetics Market Regulation in China While China represents today one of the most important and attractive BPC markets in the world, however, its complex cosmetic regulatory system with rapid amendments make the BPC business full of difficulties. The Ministry of Health (MOH) of China has promulgated the â€Å"Regulations on Cosmetics Hygiene Supervision† on 13 November 1989 and the regulation was effective on 1 January 1990.According to it, a foreign cosmetic company (either a manufacturer or brand owner) with a valid business registration licenseis required to obtain two licenses under the cosmetic regulatory system in China the Hygiene License and the China Inspection Quarantine (CIQ) Labeling Certificate. i. Hygiene License Issued by the State Food and Drugs Administration (SFDA), the Hygiene License is concerning of cosmetic products and ingredients monitoring and supervision. Foreign companies holding Chinese business registration licenses with 3 classified cosmetic products listing below are requested to apply for an Import Hygiene License before their products are allowed to be distributed and placed on the China market (the pre-market approval): â€Å"Special-use cosmetics†, which 8 different sorts of products are included: hair dyeing, hair perm, hair-growth, deodorant, depilation, body shaping (including slimming and breast enlarging), sun cream and spot removing. Non special-use cosmetics† including ordinary BPC products such as skin care, hair, fragrance and manicure/pedicure products that are not belonged to special-use cosmetic category. â€Å"New ingredient†, meaning ingredients that are not listed on the â€Å"Inventory of Existing Cosmetic Ingredients in China (IECIC)†. There are several documents including the product ingredients list, product quality standard, product testing report and packaging are needed for Hygiene License application. A full list of application documents is attached in the appendix 4. ii. The China Inspection Quarantine (CIQ) Labeling Certificate Issued by the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ), the CIQ Labeling Certificate is concerning of imported products packaging supervision. A full list of application documents is attached in the appendix 4. Foreign BPC companies are required to a Chinese legal reporting representative throughout the SFDA Hygiene Licenses application process. Moreover, as the official language of China is simplified Chinese, all mandatory information should be in simplified Chinese including the full product ingredients list shown on cosmetic labeling. According to Pisacane (2009), the Managing Partner from Great Way Advisory, after submitting all requested documents to the SFDA, the whole application process will take 4 5 months for â€Å"non special-use cosmetics† and 8 9 months for â€Å"special-use cosmetics† to obtain the final certificate as the SFDA review and evaluate imported cosmetics only 6 times a year. In terms of cosmetics import tariffs, the current import tariff bound rate for imported BPC products is about 10% basically but it depends also on the country of origin and the product category which the import tariffs can reach as much as 150%, plus 17% VAT (value added tax) a nd 5% 30% CT (consume tax). 2.3 Chinese Consumers Behaviour Comprising 34% market share in Chinas BPC market in 2010, the skin care sector is worth USD 9.9 billion, growing at a rate above the GDPand will continue to dominate the BPC industry sales for future couple of years. While more and more people in China move from the lower class into the middle class, they are able and willing to spend more money on personal beauty care products. However, despite the fast rise in personal wealth, the development in Chinese BPC market sales growth which is greatly linked to better richness can be very fluctuating due to the countrys strong consumer saving level. Moreover, in terms of the growth of Chinas BPC sub-categories is rather unequal, for example, sector such as skin care (sales value USD 9.9 billions) is reaching mainstream status in 2010 while others such as fragrances (sales value USD 0.58 billions) and sun care (sales value USD 0.48 billions) remain niche segments. Despite these, there are still obvious areas where Chinese consumers are will ing to spend their money generously such as Premium Baby Care (21% sales growth 2009-10), Premium Skin Care (+19%) or Premium Colour Cosmetics (+15%). Chinese consumer behaviour and their knowledge, attitude, use and response to Skin Care products that reflects in their spending patterns are very much linked with Chinese Culture. Grubow(2008)characterises several beauty trends from the view points of Chinese consumers that intensively influence Skin Care market trends in China: desire for status-improving products, medicinal ingredients welcome, respect for skin care regimes, openness to professional advices and demand for luxury packaging.    Desire for Status-Improving Products Tracking back to ancient Chinese culture, giving a fair, even, pale and fragile quality skin look is quite associated with beauty as it implicated being in a aristocratic social stature. The standard of beauty does not actually change much. Today, Chinese women want a fair, flawless, radiance and translucent skin tone which is considered as wealthy and healthy, meanwhile, browner or darker skin is linked with rural and toiling for money. In result, Chinese women are interested in whitening-orientated products (but bleaching ones which do not give an appearance of evenness and a glow skin tone). Interestingly, a recent survey made by Asia Market Intelligence found that around two-thirds Chinese men also prefer fairer skin and are opened to male skin whiteners. This cultural ideal attracts to every class of people, from the mass to ultra luxury channels, and leading brands such as Olay, Shiseido, Nivea and Avon are offering whitening products not only for facial skin but body in Chinese Skin Care market. Another Chinese beauty trend in terms of status-improving is the skin concentration products which cover for examples facial masks, patches and eyes and chest treatment. Mask treatment is considered luxury as it used to be applied only in a spa treatment which required time and money. This â€Å"DIY approach† with masks containing rich textures or high-tech functions appeals to Chinese consumers and makes them feel unique and luxurious. Again, this pattern taps into the sense of status-enhancing.   Medicinal Ingredients Welcome Traditional Chinese herbal medicine impact strongly on many parts of Chinese day to day life and skin care products are no exception. Chinese consumers believe that some special ingredients provide a better benefit of healing and this is highly linked with the Chinese medicinal practices history. Taking examples of burdock, ginseng and green tea extract which contain antioxidants for skin nourishment; these natural ingredients are popular and famous among both younger and older generations because they are believed to be more inartificial and safer than other ingredients.   Respect for Skin Care Regimes Similar as Japanese skin care rituals that a full Japanese daily ritualistic process contains up to 9 separate steps, Chinese women also respect skin care order. They like to arrange their cosmetics on the dressing table and enjoy the skin care rituals consisting separate steps.While Western Consumers are appealed by products with two-in-one or multiple functions such as Neutrogenas 2-in-1 Cleansing Gel (cleansing and mask), Vichys Puretà © Thermale 3-in-1 One Step Cleanser (cleansing, toning and eye makeup remover) or Olays Total Effects, in China, women purchase Neutrogenas Deep Clean Makeup Remover, Cleanser, Blackhead Eliminating Patch and Soothing Mask or Olays Renewal Lightening Toner, Moisturizer, Lotion and Eye Cream.   Openness to professional advices Though the development of beauty and health care speciality drug stores such as Watsons, Mannings and Sasa in China is far behind the pharmacies in France or Japan or the drug stores in Germany, in principal cities of China, the specialty drug stores has witnessed an enormous sales growth during the past decade. Watsons, for instance, had only 80 outlets back in 2005. But last year, it has opened its 700th outlet in China, making it as the leading beauty and health care speciality drug store in Chinas BPC market.This is not just about the locations or its competitive prices policy that attract lots of consumers; the evidence that each Watsons outlet is equipped with counsellors and pharmacists who provide products advices and recommendations is also one of the key reasons that drive consumers into shops. Consumers in China trust and appreciate the advices of skin care from these shop assistances. It is therefore not difficult to interpret that with this advices-welcoming concept, direct-selling brands such as Mary Kay, Artistry and Avon who always come with sales counsellors and host frequently cosmetics seminars and makeup workshops appeal intensively Chinese consumers attention. (In 2010, 4 out of top 10 Skin care brands are categorized as direct-selling channel.) Demand for Luxury Packaging As consumers from emerging countries tend to search for higher cost-effectiveness products, in China, a cosmeceutical product with a luxury packaging is very much appreciated by Chinese consumers as it gives again the sense of status-enhancing. Packaging like heavy glass container appears more attraction for consumers than a plastic container even if it contains better ingredients or product volume. In addition, Trout (2011)suggests that when developing a new product range at different pricing and customer targeting, the design of packaging helps companies to define a â€Å"new† brand image and extend the attraction to wider potential consumers. 2.4 International Operation Strategy 2.4.1 Operation Strategy Strategy, originally derived from Greek word â€Å"strategos†, was firstly used in the military term and then in the management of business. Drucker(1954)proposed that strategy is â€Å"to analyse the current situation, including the inquiring of companys existing or should-be resources, and if necessary, change the situation.† Strategy was was also suggested by Chandler(1962) that â€Å"determines the base of corporations long-term objectives and taken actions, resources and configuration standards to achieve these targets.† In Andrew(1971)s The Concept of Corporate Strategy book, proposed that strategy is â€Å"the scheme of targets development and major policies and plans for the purpose of achieving specific objectives to describe the companys current and future business.† Glueck(1976)considered strategy â€Å"is a unified, coordinated, broad and integrated plan to reach the basic objectives of the organization†. The definition of strategy was a lso given by Porter (1985), â€Å"strategy is the response to external opportunities and threats, and internal strengths and weaknesses, in order to achieve competitive advantages†. In 1990, Ansoffdefined strategy as â€Å"a set of criteria to lead the organizational behaviour for the decision-making.† Kaplan and Norton(1990) described strategy is â€Å"a set of assumptions of cause and effect†. Porter(1996) again explained that strategy is â€Å"to conduct a selection among activities, enabling the organizational competitiveness while creating the sustainability and differences of the market†. There are various ways and results in strategic planning according to organizational goals and objectives that classify strategic management into different frameworks. Scholars attempt to conclude strategies in practice that are partly summarized underneath. However, there is so far no better or the most appropriate classifications or concepts. It is though agreed that a model which can be applicable to organizations would be capable to recognise and assess their chosen strategy content. Ansoff (1965)s Product-Market Growth Matrix (Table 3). Based on two basic aspects (product and market), a four-product-market portfolio is created that corresponds with corporations marketing strategy: Market penetration strategy is based on the present products portfolio, attempting to increase the market share. Market development strategy is to find and develop a new potential market basing on present products. Product development strategy is to create or bring new products in order to replace companys existing products Diversification strategy is to develop new products for new potential market. Porter (1980) characterized three general types of strategies into a category scheme that can be used to achieve and continue business competitive advantages: cost leadership strategy, differentiation strategy and segmentation strategy (Table 4). David (1986, 1995, 2010), has formed a modern Strategy-Formulation Analytical Framework that assisted strategies generate and evaluate feasible alternatives for the purpose of choosing a specific course of action. Strategies can be recognized, assessed and chosen by this framework which contains three stages including: the input, matching and decision (Table 5). 2.4.2 SWOT Analysis Originally developed by Albert Humphrey in his research project based upon the US Fortune 500 companies during 1960s to 1970s, SWOT analysis is a strategic planning method that specifies the corporate objective and identifies the favourable or unfavourable internal and external factors to accomplish this objective. It defines, analyses and evaluates corporate internal Strengths and Weaknesses and its external Opportunities and Threats that helps the organisation to determine the operational problem and the strategic decision making. A SWOT analysis result matrix was presented by Weihrich(1982) using strategies matching approach to develop relevant future coping strategies (Table 6). The procedures of SWOT analysis are often associated with corporate strategic planning process that can be combined into following steps: Conducting the description of business environment; Identifying and validating all affecting external factors; Predicting and assessing the future changes of external factors; Reviewing the internal strengths and weaknesses; Framing a feasible strategic planning by using SWOT analysis; and Conducting strategic choices and decision making. According to Weihrichs SWOT Analysis Result Matrix (in step five), a result of 22 strategies is hereby described as follows: SO Strategy: in accordance with the Maxi-Maxi principle, to consolidate strengths and improve opportunities. The direction of business development can be for example, (1) focusing on the growth of one single product, technique or market; (2) discovering new market for alternative selling channels; (3) developing new product using organizational resources; or (4) creating a new product life circle for customers to identify with aiming at winning the competitive market. It is the best operational strategy for business development and profits making with a closed coordination of corporate internal resources and external environment. WO Strategy: in accordance with the Mini-Maxi principle, to improve organizational weaknesses and manage opportunities. The result of Mini-Maxi strategic planning can be (1) unrelated diversification; (2) joint venture; (3) strategic alliance; or (4) consortium. ST Strategy: in accordance with the Maxi-Mini principle, to reinforce corporate self-strengths and cope with threats. Examples for strategic decision making can be (1) horizontal integration: integrating business of the same level to reduce competitors; (2) vertical integration: integrating upstream/downstream firms to avoid external threats; or (3) using related diversification improve business synergy.

Tuesday, August 20, 2019

Cryptography and Network Security Applications

Cryptography and Network Security Applications Part I Cryptography and Data Security Role of Cryptography in Securing Data Cryptography plays a key role in securing any company’s online data. Encryption is the most widely used method to implement cryptography on the companies’ data as it secures the data while simultaneously allowing it to be transferred to others. It is very difficult for an outsider to break into an encrypted file and access the sensitive information. Encryption acts as a crucial component of security for protecting the cloud storage data as it is vulnerable to being attacked by outsiders, for concealing the operating systems, and for keeping security on emails which are the most common method of communication in business. Purpose of Symmetric and Asymmetric Encryptions In symmetric encryption, the message is encrypted by the application of a secret key which can be in the form of a number, a word, or an alphanumeric string. The key is applied to the message (also known as plaintext) by the sender, and as long as the recipient has the key, they can decrypt the encrypted message (also known as cipher-text). Confidentiality is achieved by this method of encryption. If the symmetric key is changed in every session of communication the key is known as a session key that is valid for one session only and this provides improved confidentiality. This is a traditional method of encryption, using it becomes frantic when secure communication is needed by a number of employees in an organization as everyone will have a number of keys to communicate with different individuals. Secure key distribution among all the members is another problem in using symmetric encryption. In order to resolve these issues, Asymmetric encryption should be used in this organization. Each member has two keys namely public and private key. Public keys are used to encrypt and decrypt messages which are to be shared among all the members of the organization. Private keys are for to secure a private communication taking place between two persons. In this way, the all public and private communication inside premises is secured using these authentication methods and the files shared with these messages as attachments are also secured. Advanced Encryption Standard (AES) Algorithm: This algorithm is trusted as a standard by most government organizations as it is tremendously efficient in protecting the data of 128-bit. However, it is also used for data of 192 and 256 bits.Message Authentication Code  (MAC) Algorithm: This is also known as a tag, it is small information used for  authenticating a message which means it confirms the authenticity of the message by checking that the received message has been sent by the authenticated sender of it. The MAC value helps in protecting a messages  data authenticity and its integrity, by allowing the concerned persons to detect if the content of the message has been changed. Digital Signatures Digital signatures are commonly used for verifying the authenticity of digital documents and messages. It ensures the recipient that the received message has come from a known sender and the integrity of the message has not been altered during its transmission process. Since all the paper documents in the organization are now replaced with the electronic documents, digital signatures can be considered as an alternative to ink signatures and stamps of authenticity. Application of digital signatures offers authentication, integrity, and most importantly non-repudiation, i.e. one cannot deny their signature later if they have signed the document. Hence, digital signatures should be considered as one of the security measures while planning data security in this organization. These features can improve the transparency and security among the businesses through communications. These are basically comprised of 3 algorithms namely key generation algorithm, signing algorithm, and a signature verifying algorithm. It is very easy to create digital signatures, one can just open the electronic document that needs to be signed in an electronic signature tool such as Docusign or Microsoft office tools. Further steps differ as per the tool and document and these steps are instructed to the user as he opens the document in the tool. Users just have to follow the instructions and verify their identity in order to add their digital signatures on the document. When messages are sent after being digitally signed, the hash value ensures that no changes have been made in the document. All of this handled automatically handled by a software tool, which shows warning if a decrypted hash value produces an altered output. The encrypted value of the hash is added to the bottom or as an attachment in the email. Part II Cryptographic Keys and User Authentication   Ã‚  Ã‚  A user authentication system can be recommended to provide strict authenticity for users to access the companys resources. In this system, an identity is stated by the users who then applies an authenticator such as a password or a security key or combination of both of these in order to validate their identity. The security key presented by the user to verify their identity must be unique so that it authenticates only one particular user. The keys should be made in such a way that they are easy to remember by the user but cannot be stolen, copied, or forged. The process of revoking the previous key and issuing a new key should be easy. It should be impossible for the users to transfer their security keys to another user. The system should be protected against any attacker during the transit of data. Asymmetric encryption methods can be used as one of the user authentication methods to validate this system. Since the information secured through cryptographic keys depends directly on the key strength, key mechanisms and protocols effectiveness, and afforded protection. It is important to have a proper key management system in order to ensure proper distribution of keys. The user authentication should be made in such a way that it offers key protection against any modification. Private keys should be protected against any type of unauthorized disclosure. System Recommended for Employees to Get Discounts on Fruit Juice and Nut Bar The system recommended for the employees to make proper use of ijuice.com and nutbar.com is that when the employees click on the link given on the employee benefits page, a login or signup page should appear. If the employee is new to the system, they employee must make an account on the product website by signing up using their authentic credentials and their confidential employee ID along with a username or password that would be the key they use to access their account. As the user logs into the website, a session is created, and by the received login information of the user, special discount coupons unique to the employee is available to be added to their accounts so that they can use the coupon when they purchase any specific coupon applicable item. Once the user logs out from their account, the session is terminated, and the information about the session remains safe with the servers of ijuice.com and nutbar.com. Part III Secure Cloud Computing for Handling the Companys Data Implementation   John will want to implement most of the data used and stored for the company in a virtual cloud system. This will provide a certain effective measurement of security, efficiency, transfer methods, time saving and cost reductions. The first step in implementing cloud based storage is the replacement of physical infrastructures with virtual infrastructures. A software layer generates a virtual instance of the hardware as the controlling software point and is much easier to manage, interactive with, share and make changes too.  The second step, includes the decision making process of what cloud storage system would be best suited for the company. A common cloud service is ‘Google Drive’ ‘Oricle’ or IBM. These cloud services offer a greater visability into the usage and cost of virtual infrastructure as well as assisting in tracking and assessing shared computer resource usage accuracy. The third step of implementing cloud is realizing in companies where most of the work data flow demands server regularity without the interference of attacks and that’s where cloud security comes in. Blowfish, AES (Advanced Encryption Standard), and RSA (Rivest-Shamir-Adleman) are some of the most commonly used cloud computing algorithms to provide efficient security to cloud platforms. AES encryption algorithms were described previously, but RSA encryption relies upon the computational difficulty of processing large integer values. The strength of this encryption is left up to the key size which are usually 1024- or 2048-bits in length, which is huge and is why it would be a great choice to implement upon cloud infrastructure storage security. Risks Denial of Service (DoS) Attacks: These attacks prevents the users from accessing the services by flooding the systems or networks with traffic to make the resources work on unnecessary data or inevitably crash which then prevents the user from accessing their data . Such attacks have more computational power in cloud computing.Malware Injection Attack: These attacks inject harmful software to the victims data in the cloud and takes control of it. The results of successful injection can be very disastrous, it can even allow the propagation of computer worms which then can potentially use the company’s data distribution methods as a platform to spread the attack to individuals or groups who authentically interact with the company’s data.Side Channel Attack: These attacks place a virtual machine with the victim’s virtual machine in order to target cryptographic implementation of the systems instead of using any theoretical weaknesses of the algorithms or any other force. Cache attack, timing attack, power – monitoring attack, electromagnetic attack, acoustic cryptanalysis, differential fault analysis, data reminisce, and software-initiated fault attacks are different forms of side channel attacks. Countermeasures The data stored in the cloud must be zipped up with either a password or AES encryption and the keys must not be shared with anyone.Login authentication should not be simple in terms of guess work and rather should implement multifactor authentication.A CCSP (Certified Cloud Security Professional) should be hired to manage the cloud after installation.Data integrity must be verified by implementing data encryption and decryption over the wire. It is advisable to use cloud computing for the operational purposes in order to reduce the hardware infrastructure cost and maintain efficient management of databases and confidential data if all the vulnerabilities are taken care of by using proper countermeasures. Part IV Business and Blockchain Integration Blockchain technology has created a backbone for a new kind of internet. A blockchains store information across a network of computers making them not just decentralized but distributed which means no single individual or company owns a system but everyone can use it and help run it. It can be looked at in three different ways: technical, legal, and business (Nair & Sebastian, 2017).  As per technical aspect, it could be seen as a backend database which has a distributed ledger. As per business aspect, it is an exchange network that can be used by peers for transferring value. This mechanism validates a transaction and may validate it from a legal point of view. There is no requirement of any middlemen to make a transaction valid. In order to ensure proper functioning of blockchains at such a corporate level, a consensus algorithm is required which must be secure, functional, and efficient. â€Å"Proof of work†, â€Å"Proof of Authority†, and â€Å"Proof of stake† are some of the consensus algorithm which are considered as potential for blockchain integration. However, the use of a â€Å"Proof of Work† algorithm has already been started for blockchains in Bitcoins. Blockchains can enhance the security in three different forms which are: blockage of identity thefts, prevention from denial of service attacks, and prevention of data tampering. Advantages It allows people to sell or buy anything they like to and or from anybody in the world, without letting any other party to interfere and impose rules upon them.Every consumer can choose their identity in transactions, such can remain anonymous, public, or private as per their choice.Approach used in blockchains for storing DNS entries could increase security by eliminating the single target that can be attacked by the hackers. This will not cause the entire system to be compromised by the attack.Blockchain will also eliminate the network fees on DNS reads and will only charge for new entries and updates, of course depending upon the DNS provider that John chooses to go with. Drawbacks Financial services will be impacted as blockchain is defined as everything that a bank does.Government services as one can choose to buy or sell anything to anyone without any geographical boundaries. No one will go to government departments for completing the formalities.Blockchains will require a lot of computational power as compared to centralized database processes. Blockchain provides the ability for every node in the network to process the request independently.Existing currencies are regulated and created by the national governments, but blockchain and a product of blockchain such as Bitcoin will face hurdles in being adopted by the already existing financial institutions if the regulation status of the governments remain unsettled. References Stallings, W., & Tahiliani, M. P. (2014).  Cryptography and network security: principles and practice  (Vol. 6). London: Pearson. Jonsson, J., Moriarty, K., Kaliski, B., & Rusch, A. (2016). PKCS# 1: RSA Cryptography Specifications Version 2.2. Salomaa, A. (2013).  Public-key cryptography. Springer Science & Business Media. Hernandez, K. (2017). Blockchain for Development–Hope or Hype?. Nair, G. R., & Sebastian, S. (2017). BlockChain Technology Centralised Ledger to Distributed Ledger. Rittinghouse, J. W., & Ransome, J. F. (2016).  Cloud computing: implementation, management, and security. CRC press. Stojmenovic, I. (2014, November). Fog computing: A cloud to the ground support for smart things and machine-to-machine networks. In  Telecommunication Networks and Applications Conference (ATNAC), 2014 Australasian  (pp. 117-122). IEEE.

Monday, August 19, 2019

Extraordinary Potential of Man Revealed in Atlas Shrugged Essay

The Extraordinary Potential of Man Revealed in Atlas Shrugged  Ã‚   Freewill is the tenet on which men founded the United States of America, and the glory of "America the Beautiful" stems from the unlocked potential of its people. The callused hands of the laborers sip from the cup of American wealth, not the lazy plowman demanding government help. The inventor's mind synthesizes, theorizes, and designs the American dream, not the indifferent, insolent mechanic. The steel will of the industrialists propels the nation to greater heights, not the selfish arrogance of the beggar. The men who carry the weight of the world, Atlas and his proteges, do so by their incredible strength, not because of weakness, just as Ayn Rand asserts in her novel, Atlas Shrugged. Full of heroes and villains, Atlas Shrugged demands much from an intelligent reader. As global forces scheme to destroy various characters, Rand's continually acid wit and ironic tone set the stage for the various battles. One of the central characters in the novel, Hank Rearden, a steel magnate and tireless worker, invents a metal alloy that beats out all other steel alloys on the market. Naming it Rearden metal, Hank plans to storm the marketplace with his life's work, and make a bundle of money in the meantime. Dagny Taggart, a woman sharing with Rearden a vision of an America run by ingenuity, energy, and hard work, is the Vice-President in Charge of Operation for Taggart Transcontinental, a thriving railroad company. The two join forces, hoping to profit from their genius the old-fashioned way, by earning their fortune. Unfortunately, America refuses to allow these industrialists to follow their dreams. A creeping disease has infected the spirits of many A... ...l, purely logical absolutes leave no room for opposites to exist within them, and the defining characteristic of such absolutes are then lost. For example, absolute heat will not tolerate cold, yet how can we describe any heat without some reference to a colder temperature? By giving an example of Rearden's philosophy that works well despite the uncertainty of life, Rand reaches out to every man who has struggled for ideals. In reaching out to humanity through "Atlas Shrugged," Ayn Rand strengthened her argument about the basic goodness and extraordinary potential she believed all men could reach. Because this book takes incredible concentration to comprehend, understanding is left to individual effort, and Rand's permanent lesson for humanity is open to all seek her knowledge. Works Cited: Rand, Ayn. Atlas Shrugged. New York: Random House, Inc., 1957.

Sunday, August 18, 2019

Movie: Whats Eating Gilbert Grape Essay -- essays research papers

Movie: What's Eating Gilbert Grape "What's Eating Gilbert Grape", as directed by Lasse Hallstrom, is a comedy, drama, romance, all wrapped up into one grand movie. Leonardo DiCaprio plays a mentally impaired boy with a caring brother, who always took care of his brother until the love of his life came to town, proposing the essential question: What is a boy willing to sacrifice in order to be with the one he loves? Johnny Deep plays Gilbert Grape whose father left when he was little, causing his mother to become depressed and never leave the house again. Gilbert referees to her as a â€Å"beached whale† because she has gained so much weight. One afternoon a silver camper had engine trouble, forcing them to stay in town for a few weeks until it is fixed...

Saturday, August 17, 2019

Food Dyes

Purpose of food coloring People associate certain colors with certain flavors, and the color of food can influence the perceived flavor in anything from candy to wine. [2] Sometimes the aim is to simulate a color that is perceived by the consumer as natural, such as adding red coloring to glace cherries (which would otherwise be beige), but sometimes it is for effect, like the green ketchup that Heinz launched in 1999.Color additives are used in foods for many reasons including:[3] offset color loss due to exposure to light, air, temperature extremes, moisture and storage conditions correct natural variations in color enhance colors that occur naturally provide color to colorless and â€Å"fun† foods Color additives are recognized as an important part of many foods we eat. [4] [edit]Regulation Food colorings are tested for safety by various bodies around the world and sometimes different bodies have different views on food color safety.In the United States, FD&C numbers (which indicate that the FDA has approved the colorant for use in foods, drugs and cosmetics) are given to approved synthetic food dyes that do not exist in nature, while in the European Union, E numbers are used for all additives, both synthetic and natural, that are approved in food applications. The food colors are known by E numbers that begin with a 1, such as E100 (turmeric) or E161b (lutein). [5] Most other countries have their own regulations and list of food colors which can be used in various applications, including maximum daily intake limits.Natural colors are not required to be certified by a number of regulatory bodies throughout the world, including the United States FDA. The FDA lists â€Å"color additives exempt from certification† for food in subpart A of the Code of Federal Regulations – Title 21 Part 73. However, this list contains substances which may have synthetic origins. FDA's permitted colors are classified as subject to certification or exempt from certification, both of which are subject to rigorous safety standards prior to their approval and listing for use in foods. Certified colors are ynthetically produced and are used widely because they impart an intense, uniform color, are less expensive, and blend more easily to create a variety of hues. There are nine certified color additives approved for use in the United States. Certified food colors generally do not add undesirable flavors to foods. Colors that are exempt from certification include pigments derived from natural sources such as vegetables, minerals or animals. Nature derived color additives are typically more expensive than certified colors and may add unintended flavors to foods.Examples of exempt colors include annatto, beet extract, caramel, beta-carotene and grape skin extract. [edit]Natural food dyes Natural food colors can make a variety of different hues A growing number of natural food dyes are being commercially produced, partly due to consumer concerns surrounding synthetic dyes. Some examples include: Caramel coloring (E150), made from caramelized sugar Annatto (E160b), a reddish-orange dye made from the seed of the achiote. Chlorophyllin (E140), a green dye made from chlorella algae Cochineal (E120), a red dye derived from the cochineal insect, Dactylopius coccus Betanin (E162) extracted from beetsTurmeric (curcuminoids, E100) Saffron (carotenoids, E160a) Paprika (E160c) Lycopene (E160d) Elderberry juice Pandan (Pandanus amaryllifolius), a green food coloring Butterfly pea (Clitoria ternatea), a blue food dye To ensure reproducibility, the colored components of these substances are often provided in highly purified form, and for increased stability and convenience, they can be formulated in suitable carrier materials (solid and liquids). Hexane, acetone and other solvents break down cell walls in the fruit and vegetables and allow for maximum extraction of the coloring.Residues of these often remain in the finished product, but they do not need to be declared on the product; this is because they are part of a group of substances known as carry-over ingredients. Natural food colors, due to their organic nature, can sometimes cause allergic reactions and anaphylactic shock in sensitive individuals. Coloring agents known to be potential hazards include annatto, cochineal and carmine. [citation needed] [edit]Artificial coloring [edit]In the United States Seven dyes were initially approved under the Pure Food and Drug Act of 1906, but several have been delisted and replacements have been found. 6] Some of the food colorings have the abbreviation â€Å"FCF† in their names. This stands for â€Å"For Coloring Food† (US)[7] or â€Å"For Colouring of Food† (UK). [8][9] [edit]Current seven In the US, the following seven artificial colorings are permitted in food (the most common in bold) as of 2007: FD Blue No. 1 – Brilliant Blue FCF, E133 (blue shade) FD Blue No. 2 – Indigotine, E 132 (indigo shade) FD Green No. 3 – Fast Green FCF, E143 (turquoise shade) FD Red No. 40 – Allura Red AC, E129 (red shade) FD Red No. 3 – Erythrosine, E127 (pink shade, commonly used in glace cherries)[10] FD Yellow No. 5 – Tartrazine, E102 (yellow shade)FD Yellow No. 6 – Sunset Yellow FCF, E110 (orange shade) [edit]Limited use The following dyes are only allowed by the FDA for specific limited applications: Orange B (red shade) – allowed only for use in hot dog and sausage casings. Citrus Red 2 (orange shade) – allowed only for use to color orange peels. [edit]Delisted and banned FD Red No. 2 – Amaranth FD Red No. 4[11][12] FD Red No. 32 was used to color Florida oranges. [6][11] FD Orange Number 1 was one of the first water soluble dyes to be commercialized, and one of seven original food dyes allowed under the Pure Food and Drug Act of June 30, 1906. 6][11] FD Orange No. 2 was used to color Florida oranges. [6] FD Yellow No. 1, 2, 3, and 4[11] FD Violet No. 1[11] [edit]Other Locations As stated above, most other countries have their own regulations and list of food colors which can be used in various applications, including maximum daily intake limits. In the EU, E numbers 102-143 cover the range of artificial colors. For an overview of currently allowed additives see here. Some artificial dyes approved for food use in the EU include: Quinoline Yellow: E104 Carmoisine: E122 Ponceau 4R: E124 Patent Blue V: E131 Green S: E142 [edit]Dyes and lakesColor additives are available for use in food as either â€Å"dyes† or lake pigments (commonly known as â€Å"lakes†). Dyes dissolve in water, but are not soluble in oil. Dyes are manufactured as powders, granules, liquids or other special purpose forms. They can be used in beverages, dry mixes, baked goods, confections, dairy products, pet foods, and a variety of other products. Dyes also have side effects which lakes do not, including the fact tha t large amounts of dyes ingested can color stools. Lakes are made by combining dyes with salts to make insoluble compounds. Lakes tint by dispersion.Lakes are not oil soluble, but are oil dispersible. Lakes are more stable than dyes and are ideal for coloring products containing fats and oils or items lacking sufficient moisture to dissolve dyes. Typical uses include coated tablets, cake and doughnut mixes, hard candies and chewing gums, lipsticks, soaps, shampoos, talc, etc. [edit]Other uses Because food dyes are generally safer to use than normal artists' dyes and pigments, some artists have used food coloring as a means of making pictures, especially in forms such as body-painting. Red food dye is often used in theatrical blood.Most artificial food colorings are a type of acid dye, and can be used to dye protein fibers and nylon with the addition of an acid. They are all washfast and most are also lightfast. They will not permanently bond to plant fibers and other synthetics. [13 ] [edit]Criticism and health implications Though past research showed no correlation between attention-deficit hyperactivity disorder (ADHD) and food dyes,[14][15] new studies now point to synthetic preservatives and artificial coloring agents as aggravating ADD and ADHD symptoms, both in those affected by these disorders and in the general population. 16][17] Older studies were inconclusive, quite possibly due to inadequate clinical methods of measuring offending behavior. Parental reports were more accurate indicators of the presence of additives than clinical tests. [18] Several major studies show academic performance increased and disciplinary problems decreased in large non-ADD student populations when artificial ingredients, including artificial colors, were eliminated from school food programs. [19][20] Norway banned all products containing coal tar and coal tar derivatives in 1978. New legislation lifted this ban in 2001 after EU regulations.Tartrazine causes hives in less t han 0. 01% of those exposed to it. [21] Erythrosine is linked to thyroid tumors in rats. [22] Cochineal, also known as carmine, is derived from insects and therefore is not vegan, vegetarian or kosher. This criticism originated during the 1950s. In effect, many foods that used dye (such as red velvet cake) became less popular. [citation needed] Brilliant Blue (BBG) food coloring was cited in a recent study in which rats that had suffered a spinal injury were given an injection of the dye immediately after the injury, and were able to regain or retain motor control.BBG helps protect spine from ATP (adenosine triphosphate), which the body sends to the area after a spinal injury, which further damages the spine by killing motor neurons at the site of the injury. [23] Research by King Feisal University points that the use of synthetic color in various foods has adverse effects on some of biochemical analysis, specifically at high concentration and administration for along periods of tim e. Changes in liver and kidney histopathological structure and increases in white blood cell count indicated that inflammation is specific to certain colorants. [24]