Thursday, August 22, 2019

Nursing capstone phase 2 Assignment Example | Topics and Well Written Essays - 250 words

Nursing capstone phase 2 - Assignment Example They concluded that whole blood therapy should be avoided and that only appropriate blood components should be transfused. Informatics systems, such as electronic health records, can be used in identifying patients who have already had blood transfusions for health-care staff and anesthetists, while also providing a blood tracking system for hematologists and health-care staff. Azizi et al (2014) set out to study the prevalence of complications in blood transfusion among patients at an Iranian hospital in a 2-year period. They find that there was a 0.4% incidence rate for acute transfusion reactions, especially related to restlessness, dyspnea, rigors, fever, chest pain, nausea, and palpitation. They conclude that that there should be a well-structure program to monitor blood transfusion-associated adverse reactions. In this case, the hospital should use appropriate visualization and statistical applications that will alert healthcare staff to health event aberrations to manage them as soon as possible. Execution of informatics implementation strategies will enable health-care staff to track adverse blood transfusion reactions, as well as track blood type and age and prior patient history, all of which will aid in either managing or preventing blood transfusion reactions. Gwaram, B. A., Borodo, M. M., Dutse, A. I., & Kuliya-Gwarzo, A. (January 01, 2012). Pattern of acute blood transfusion reactions in Kano, North-Western Nigeria. Nigerian Journal of Basic and Clinical Sciences, 9, 1,

Health and Safety Essay Example for Free

Health and Safety Essay The health and safety act consists of various principles, these are implemented to ensure employees are safe whilst at work, this doesnt just apply those those who are employed by a company it applies to any one who enters the building including professional bodies I.e district nurses, And general practitioners the legislation is made up of COSHH,RIDDOR,The manual handling operations regulations, the health and safety first aid regulations and management of health and safety at work regulations, I will identify and write a brief description on how these legislations relate to my job role and work environment. *Reporting any incidents or occurrences puts a duty on an employer o report serious workplace accidents ,occupational diseases and any near misses* this comes under RIDDOR, reporting of injuries,diseases and dangerous occurrences regulations 1995 ( amended 2008 ),it is a legal requirement to report any accidents and occournences. In my work setting if and accident or dangerous occournence,for example a trip slip or fall, I will report this an accident report book no matter how minor. It is a legal requirement for my employer to have this procedure in place to keep a record of accidents and occournences, and my work establishment complies with wi the requirements of the DATA PROTECTION ACT 1988, by having tear o out pages that are filed and not accessible to unauthorised persons. Another regulation is the *health and safety first aid regulation1981* And in the event of injury or sudden illness failier to provide the correct practice could have fatal results.The health and safety first aid regulations require that an employer provide correct equipment, facilities and personnel to ensure their employees or clients, receive immediate attention if they are taken ill or injured at work the regulation applies to all work settings including mine,adequate provisions will consist of first aid boxes, and first aid rooms at my work setting their is always a trained first aider on site including nightshifts. The COSHH legislation is put in place,this ensures the employer does a risk assessment on any any substance hazardous to health I.e medication,cleaning products and many more, if not used correctly the employer will asses the risks and make a decision on what precautions will be needed to ensure a safety.Relating to my work setting medication is COSHH issue. And only a senior carer who has had full medication training and has been assessed and found to be compitant can administer medication.medication is stored in a trolly which is then stored in a medication cupboard which is locked at all times unless in use and is only accessible to authorised users, again my seniro will have completed a risk assessment for this situation to ensure the correct action is taken and the health and safety is correct and all employees are informed on the situation I follow my work establishments policies and procedures the policies and procedures folder can be found in the nurses station and an additional copy in the mangers office, their are a number of different policies that are to be followed some of which include ââ€" ªCare of dying policy ââ€" ªEqual opportunities policy ââ€" ªLocking door in home policy ââ€" ªEvacuation of the home policy The folder consists of 422 policys and is required that once the policy has been read and understood e employees or manager are required to date and sign. Whilst at work I ensure that I support others to understand and follow safe and good hygenie practices i.e frequent hand washing and glove changes.i also ensure that myself and others are were correct ppe, and use the equipment required, and also risk asses any situation I may be in. I also monitor and report potentiometers health and safety risks by checking all equipment prior to use for e.g hoist slings and wheelchairs.if I find any problems or concerns I will report this to my manager and make sure all staff are aware that it is out of use, however something minor I.e a dirty wheelchair or frame is something I can take care of myself and ensure it is cleaned correctly. Risk assessments are put in place to ensure the safety of an individuals needs , these assessments vary as different people have different needs these asesments can range from mobility to mental capacity, eating and drinking to personal care. In my work setting their are clients who need help with their personal care, and their others who only need assistance with bathing or showering and can do their own personal care. Prior to arrival to my home a client will have been assessed by a senior Carer, and the information will be put into a care plan which I and my colleagues will then read so we no all information about a client. I practice minimising potential risks by following all of my work place policies and procedures and carrying out and using risk asesments, wearing correct ppe at all times and practicing good hand hygiene and making sure the work place is always clean and tidy and their are no hazardous substances accessible to clients I also practice minimising risks by making sure the building is secure by closing doors and keeping external doors locked. There are many different accidents that may occour in a home some of which are trips,slips and falls from wet or worn carpets, dioreah or vomit etc In the event of someone falling in the work setting different procedures will take. Place, for example if a staff member falls they may get up and feel fine it is essential that it is documented in the accident report book, on the other hand if a client falls carers will not move them until professional help has arrived the client will be made to feel comfortable and depending on e situation may be put into he recovery persition,this again will be documented into the accident report book. I support colleagues to follow practices that reduce the spread of infection by ensuring that we always where correct ppe, and practice good hand hygiene and using alcohol rubs but not as an equivalent to hand washing. I also support by ensuring my colleague and I dispose of hazardous substances in the correct way. Ways that I ensure my own health and hygenie do no pose a risk to others I always have clean uniform when attending work, to ensure I do not bring any airborn viruses I.e MRSA I also notify my manger if I pick up and virus like DV and will not return to work until I am clear of the virus for 48 hours on arrival back to work I will fill in a return to work form. The manual handlings operations 1992 regulations, requires employers to avoid all manual handling where their is risk of injury.the legislation also states that a risk assessment must take place and followed correctly to minimise any potential risks. If I want any additional support or information I ask my manager, senior carers, or fellow colleagues. I can also access any information I am not sure about in my policies and procedures folder. At my work establishment their are two folders in the nurses station that are acessable to any staff member that are unsure on a certain subject some of these are ââ€" ªMeeting clients nutritional needs ââ€" ªCleanliness and infection control These folders are built up of useful information and policies that are relevant to each subject. Ways in which I help practice to prevent fires from starting and spreading , are ensuring that I know my work setting fire safety policy attend all fire safety training,I also make that I make sure that I know where my fire assembly point is. I also make sure that there are no waste paper baskets overflowing or anything else that could help a fire to spread or start, my working setting also had a no smoking policy,so I also ensure I smoke in the designated smoking are.if a fire was to start , emergency services would be contacted and the building evacuated , and go straight to the fire assembly point.i also ask any visitors to sign in and out and tell them were the fire safety point is. The signing in book will determined how Many people are in the building on arival of the emergency services. Procedures are as followed at my work establishment and many others ââ€" ªNever let any one in the building in without signing in.and professional bodies will have Id on show always check is ââ€" ªIf I am unsure about a persons identity for e.g a visitor depending on the mental capacity of the person, ask if this person remembers this visitor if this is not possible phone a next of Kin. Personal information is vital in my work setting, all residents Care plans inlcude daily food and fluid intake, mental capacity and all relevant information on an individual is kept in folders in a locked cupboard that is not accessible to any unauthorised persons. I protect y,mown security and of others by making sure I have the correct ppe on at all times and do not have any jewerly on whilst at work, and make sure all external doors are shut, and gates at the top and bottom of stairs are shut and locked. I also ensure others no of my whereabouts whilst at work, to ensure that a fellow carer is their to support the floor, even if I am assisting someone to go the toilet I make someone aware I am of the floor. Comon signs of stress can be very easy to spot some of these include ââ€" ªadgitation ââ€" ªBeing emotional and short tempered ââ€" ªNot completing jobs properly ââ€" ªWeight loss or weight gain ââ€" ªSmoking more ââ€" ªAlcohol binging My self indication for stress is ââ€" ªConstant worrying ââ€" ªWeight gain ââ€" ªBeing over emotional and snappy ââ€" ªFeeling very low and under the weather My own stress levels are triggered by unstructured situations, e.g understaffing at work have caused me to feel stressed and when I am unsure of a situation cause me to feel slightly stressed. My strategies for managing my own stress levels are having a written plan of what My main tasks are that shift, for e.g a morning shift my main task is to ensure all residents and clean and have eaten by. Reasonable time. Some may find it easier to take it task as it comes how ever I would rather focus on the main tasks and making sure these are completed correctly.

Wednesday, August 21, 2019

International Operation Strategy of Eucerin: SWOT

International Operation Strategy of Eucerin: SWOT Chapter 1 Introduction 1.1 Research Background The use of cosmetics was over thousands of years. The earliest archaeological evidence can be traced back to some royalty in Ancient Egypt times, where the Ancient Egyptians mixed perfume, sandalwood incense and aromatherapy products with oil applied to human bodies for pilgrimages or as an antiseptic. The Ancient Greeks and Romans also used cosmetics containing often lead and mercury. In the West, the popularization of cosmetics usage began in the 17th century and was originally intended to cover face scars of female patients healed from smallpox. In the19th Century, Queen Victoria once declared publicly that the use of makeup was â€Å"improper, vulgar, and acceptable only for use by actors†. Nevertheless, by the Second World War, cosmetics have been widely used in the West (except Nazi Germany). Today, the worldwide market size for Beauty and Personal Care Industry (BPC Industry) has increased 36% during 2005-2010 and reached USD 382.3 billion last year.Despite the significant influence of global economic recession in the year of 2009, BPC industry still showed stable and continuous growth in certain regions with emerging markets, particularly in Asia Pacific and Latin America. It is forecasted that these two dynamic regions will drive the BPC future global sales and become equally the joint largest market (with Western Europe) by 2014. Figure 1 and 2 below shows the global and regional market value of BPC industry during 2005 to 2010. Cosmetics industry, also called Personal Care Products Industry, Cosmetics and Toiletries Industry, Health and Beauty Industry, or Beauty and Personal Care Industry in this paper, in which companies manufacture and/or market personal care products such as creams, lotions, perfumes or makeup, covers a fully 13 key sub-sectors (Fig. 3). Recent reports show that Skin Care is the largest sector in the BPC industry (Fig. 4). It is predicted that in 2014, Skin Care, together with Hair Care, Colour Cosmetics and Fragrances sector will become the principle contributors to global BPC sales value growth due to the booming market in Asia Pacific. In Asia Pacific region, China represents today one of the most important and attractive BPC markets in the world due to its huge population, the increasing purchasing power of consumer and a better awareness of fashion among the younger generation. According to National Bureau of Statistics of China, the retail value of Chinese BPC products reached RMB 133.24 billion (proximately USD 20.51 billion) in 2010 with a 11.4% nominal growth compared to 2009. The total Chinese BPC market value is expected to reach as much as RMB 206 billion (proximately USD 31.7 billion) by 2014. However, in spite of this rising trend, industry players talked about that the increasing costs such as rental, labour, logistic and advertisement has given heavy pressure on cosmetics companies particularly those who had poorer brand equity were losing their profit margin. 1.2 Research Motivation Funded by Dr. Lifschà ¼tz in 1900, Eucerin ® is now Germanys largest and worlds 4th leading dermo-cosmetics brand in pharmacy segment in Skin Care industry. Belonging to famous German Group Beiersdorf AG, Eucerin sees itself as a â€Å"dermatologist-recommended skin care brand† that provides reliable, high quality and effective dermo-cosmetic products and expertise. Currently, Eucerin provides skin care products that are catalogued in 4 major lines: Face Care, Sensitive Skin Care, Dry Skin Care (medical products) and Sun Protection. Each line contains quite a few sub-lines that are assorted either by skin types / products functions (pure, dry, very dry, problematic, sensitive skin, etc.) or by products application places of the skin (face, body, deodorant, hair, etc.). While Eucerin firstly entered into Asian BPC markets in 1991 and quickly built its brand awareness and popularity among the world of pharmacy skin care products in Thailand, Vietnam, Singapore and Malaysia, in China, however, it has being constantly a big â€Å"missing piece† to complete its global share of market. As Chinas BPC market size is currently rated in the 3rd position after the US and Japan and is still possessing enormous growth potential (12% market growth is expected during 2011 to 2014), and the Skin Care segment is the primary driver for BPC market, it is for Eucerins greatest interest and challenge how to exceed existing international and local skin care competitors to complete its global entire territory. 1.3 Research Scope and Objectives The purpose of this study is therefore attempting to assess and analyse the international operation strategy of Eucerin. Through the SWOT analysis, identify and highlight the key internal and external factors of corporate ongoing strategic planning, gaining an in-depth understanding of the companys strategic operational issues, critical success factors, emerging market opportunities and future marketing challenges and trends. The research scope covers issues including the study of BPC and dermo-cosmetics industry: market sales, market share, Chinese cosmetic market regulations, marketing strategy of Eucerin: marketing segmentations, positioning, and Chinese consumer behaviours. 1.4 Research Process and Chapter Structure The process of this research is approximately composed eight stages summarized as figure 6 underneath. By the case study of Eucerin a Beiersdorf owned dermo-cosmetics brand of BPC Industry, through the literature review, SWOT and critical success factors analysis, attempting to analyse, assess and obtain an embedded understanding of the companys strategic operational issues and its future marketing challenges and trends in Chinese BPC market. Chapter 2 Literature Review 2.1 Beauty and Personal Care Industry The global Beauty and Personal Care market (BPC market), also called Cosmetics and Toiletries market has generated total revenues of US$ 382.3 billion in 2010, representing a compound annual growth rate (CAGR) of 36% for the period 2005-2010. By comparison, markets of Asia Pacific, Western Europe and North America brought out 70% of global BPC market in 2010 (Fig. 8). Most interestingly, both Western Europe and North Americas BPC markets has witnessed the economic recession, showed a negative growth in 2009 and decelerated performance afterward, while markets in Asia Pacific and Latin America, sales growth continue and for the first time the BPC market of Asia Pacific region (mainly referable to China) overtook the first position of global BPC market (Fig. 9). 2.1.1 Market Segmentation and Differentiations BPC products cover all daily personal care cosmetics such as makeup, nail polishes, hair sprays, hair colours, creams, lotions, perfumes, deodorants, shower and bath gel, bath salts, and lots of other product types. The market can be sorted into a completed 13 key sub-sectors scope as we have mentioned earlier (Fig. 10). Skin Care segment is the leading category that generates 22% of worldwide BPC market due to Asia Pacifics booming sales, the rising demand of anti-age products also conducts the segment as the key contributors to global BPC market over the forecast period. Global skin care brands can be also sorted by their marketing positioning into six classes: professional brands, luxury/premium, pharmacy/dermo-cosmetics (cosmeceuticals), organic/natural brands, direct-selling and mass market products. Each segment targets different consumers according to their purchasing power, quality requests or specific needs, etc. Key competitors of each class are listed below: Professional skin care brands (distributed mainly by beauty salons, spas): Sothys Paris, Lexli, RVB, Sparitual, Lotusdream, etc. Premium skin care brands(distributed mainly by department stores, perfumeries), : Shiseido, Està ©e Lauder, Lancà ´me (LOrà ©al Group), Clinique (Està ©e Lauder Group), Kanebo (Kao Group), Chanel, Christian Dior (LVMH Group), SK-II (PG Group), Yves Saint Laurent (LOrà ©al Group), etc. Pharmacy/dermo-cosmetics brands(distributed mainly by pharmacies, drugstores or via dermatologists recommendations): Vichy (LOrà ©al Group), La Roche-Posay (LOrà ©al Group), Boots, Eucerin (Beiersdorf Group), Johnsons, Avà ¨ne (Pierre Fabre SA), Caudalie, Lierac, ROC (Johnson Johnson), Nuxe, Galenic, etc. Organic/natural brands(distributed mainly by speciality stores, natural food stores): Yves Rocher, The Body Shop (LOrà ©al Group), LOccitane Direct-selling brands: Avon (USA), Natura (Brazil), Mary Kay (USA), Oriflame (Luxembourg), Artistry (Amway corp. USA), DHC (Japan), Nu Skin (USA) Mass market brands(distributed mainly by supermarkets, hypermarkets): LOrà ©al Paris, Nivea (Beiersdorf Group), Garnier (LOrà ©al Group), Olay (PG Group), Neutrogena (Johnson Johnson), Ponds (Unilever Group), Vaseline (Unilever Group) Eucerin ® is catalogued in the pharmacy/dermo-cosmetics brand of skin care industry as its products can be only purchased in pharmacies or drugstores. 2.1.2 Skin Care Industry in Western Europe For BPC industry and consumers, it has been tough in the past couple of years. However, the latest data showed that Skin Care was the only category managing to sustain an average of positive 4% growth during the economic downturn.Comprising 23% of global BPC sales in 2010, it remained the most valuable category during 2005-2010. Despite the growth of Skin Care sector slightly slowed down due to the decreased consumptions on non-essential purchases, the global sales of Skin Care sector was still largely focused in mature Western countries. Anti-age cosmeceuticals were considered and predicted as the star performer for Skin Care market for the future couple of years while the premium and luxury products performed the worst and were pushed toward the category of super premium or â€Å"masstige†skincare for a better performance and the growth in both anti-age and premium was accelerated by the high demand in Asia Pacific. Comparing to Skin Care, global Hand Care sales showed a sli ght yet stable growth and the reason was believed to be linked directly with consumers threaten perception of swine flu. In Western Europe, while recent data showed a gradual result of an average 4% Skin Care sales growth in UK, Netherlands and Germany during 2009 2010, key markets such as France, Italy and Spain reflected an average of -2% in term of sales growth, resulting an overall 2% growth drop in Skin Care segment in Western Europe (Fig. 11 and Table 1). While the Skin Care sales growth in western European slowed down in recent years, anti-age sub-category maintained an outstanding growth reflecting the desire for a younger looking appearance from the consumers. Table 1 Skin Care in Key Western European Countries (2005-2010) Crossing the overall BPC Western European market, in 2010, the top 10 Skin Care brands which share 26.2% of the market are belonging to 7 companies: Beiersdorf AG, LOrà ©al Group, Procter Gamble Co., Clarins SA, Yves Rocher SA, Està ©e Lauder Cos Inc, and Henkel AG Co., in which 4 brands are categorised into mass market class (Nivea, LOrà ©al Paris, Oolay and Garnier), 3 in premium/luxary (Clarins, Clinique and Lancà ´me), 2 in pharmacy/dermo-cosmetics (Vichy and Diadermine), and Yves Rocher is classified into natural/organic brands. On the other hand, in terms of company shares in Western European Skin Care market where up to nearly 58.6% market shares are held by the top 10 BPC companies, their products are crossing over all cosmetics classifications and sales distribution channels except the direct-selling category (Appendix 1 2). In relation to consumers behaviour toward BPC market in Western Europe, four fundamental trends characterized by Lee (2010)that impact global BPC market across all categories may sum up this market trend: the ageing population, agelessness pursuance, advances of technology and intensive awareness of health and wellness. The Ageing Population The global population is becoming older. Comparing to Japan who has the oldest population in the world with nearly 23% over the age of 65 in 2010, the median age in Western Europe today is just over 40. Japan has the differentiation of being the largest Skin Care consumer on a per capita basis. In 2010, it accounted for 22% of global skin care sales with USD 19.3 billion and this may referable to its huge older consumers, high disposable incomes and the great interest in combination of health and beauty. Agelessness Pursuance The pursuance of younger looking is highly associated with increased life-pan and the development of technologies. People take greater care of their appearances in order to reflect their interior youthfulness. In result, for example, the high demands for cosmetic minimally-invasive treatment (including Botox, laser skin resurfacing, soft tissue fillers, etc.) that intending for skin firming and elasticity made up 11.6 million procedures in 2010 with 110% growth during 2000 2010 in the US and was expecting to reach totally USD 17.6 billion in 2015. Advances of Technology Skin Care companies and manufactures today are able to sell their products with higher prices thanks to the aggressive introductions of technologically advanced formulations. Consumers in Western Europe may willing to pay up to EUR 20, EUR 40 or even EUR 300 on a product that claims benefits such as firming or wrinkle reduction and contains innovative whatsoever ingredients, while a product that only provides a single basic function may not be able to sold even it only charges EUR 10. High Awareness of Health and Wellness The concerns about health and product safety among consumers in Western Europe have massively increased during the past couple of years due to the aging population and the age-related illnesses. Consumers are becoming more and more careful about what they put on their skins and the detrimental effects of chemicals. In result, this will lead to a strong interest in finding cosmeceuticals with a balance of natural, organic ingredients and effective functions. 2.1.3 Skin Care Industry in China Table 2 BPC Market by categories in China (2009-2010) BPC market in emerging countries such the BRICs (Brazil, Russia, India and China) has shown enormous growth in the past couple of years. In China, BPC market showed strong resilience of 10% sales growth, reaching RMB 145.5 billion (proximately USD 22.4 billion) under the global recession impact in 2009 and continuously increased in 2010. While the growth rate in sectors such as deodorants, fragrances and mens grooming products were less well performed comparing to 2009, skin care, hair care and premium cosmetics were the most dynamic sectors in 2010 (Table 2 and Fig. 12). Comprising 6% of global BPC market value in 2010, Chinas BPC sales is expected to have a relative resilience to the global recession and reach as much as RMB 206 billion (proximately USD 31.7 billion) by 2014. Crossing the overall Skin Care market in China, interestingly, while 9 out of top 10 skin Care brands in Japan all belong to Japanese local BPC manufacturers, the top 10 brands who share 51.5% of Chinas Skin Care market in 2010 are from 4 foreign countries: Mary Kay (US), Artistry (US), Longligi (China) and Avon (US) are categorized into direct-selling channel; Olay (US), LOrà ©al Paris (France) and Nivea (Germany) belongs to mass market class; and Shiseido (Japan), Lancà ´me (France) and Chcà ©do (China) are classified into premium/luxary sector. There are no pharmacy/dermo-cosmetics brands in top 10 and the best performer Vichy (France) only shares 2.1% followed by La Roche-Posays (France) 0.4% in the market. 2.2 Cosmetics Market Regulation in China While China represents today one of the most important and attractive BPC markets in the world, however, its complex cosmetic regulatory system with rapid amendments make the BPC business full of difficulties. The Ministry of Health (MOH) of China has promulgated the â€Å"Regulations on Cosmetics Hygiene Supervision† on 13 November 1989 and the regulation was effective on 1 January 1990.According to it, a foreign cosmetic company (either a manufacturer or brand owner) with a valid business registration licenseis required to obtain two licenses under the cosmetic regulatory system in China the Hygiene License and the China Inspection Quarantine (CIQ) Labeling Certificate. i. Hygiene License Issued by the State Food and Drugs Administration (SFDA), the Hygiene License is concerning of cosmetic products and ingredients monitoring and supervision. Foreign companies holding Chinese business registration licenses with 3 classified cosmetic products listing below are requested to apply for an Import Hygiene License before their products are allowed to be distributed and placed on the China market (the pre-market approval): â€Å"Special-use cosmetics†, which 8 different sorts of products are included: hair dyeing, hair perm, hair-growth, deodorant, depilation, body shaping (including slimming and breast enlarging), sun cream and spot removing. Non special-use cosmetics† including ordinary BPC products such as skin care, hair, fragrance and manicure/pedicure products that are not belonged to special-use cosmetic category. â€Å"New ingredient†, meaning ingredients that are not listed on the â€Å"Inventory of Existing Cosmetic Ingredients in China (IECIC)†. There are several documents including the product ingredients list, product quality standard, product testing report and packaging are needed for Hygiene License application. A full list of application documents is attached in the appendix 4. ii. The China Inspection Quarantine (CIQ) Labeling Certificate Issued by the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ), the CIQ Labeling Certificate is concerning of imported products packaging supervision. A full list of application documents is attached in the appendix 4. Foreign BPC companies are required to a Chinese legal reporting representative throughout the SFDA Hygiene Licenses application process. Moreover, as the official language of China is simplified Chinese, all mandatory information should be in simplified Chinese including the full product ingredients list shown on cosmetic labeling. According to Pisacane (2009), the Managing Partner from Great Way Advisory, after submitting all requested documents to the SFDA, the whole application process will take 4 5 months for â€Å"non special-use cosmetics† and 8 9 months for â€Å"special-use cosmetics† to obtain the final certificate as the SFDA review and evaluate imported cosmetics only 6 times a year. In terms of cosmetics import tariffs, the current import tariff bound rate for imported BPC products is about 10% basically but it depends also on the country of origin and the product category which the import tariffs can reach as much as 150%, plus 17% VAT (value added tax) a nd 5% 30% CT (consume tax). 2.3 Chinese Consumers Behaviour Comprising 34% market share in Chinas BPC market in 2010, the skin care sector is worth USD 9.9 billion, growing at a rate above the GDPand will continue to dominate the BPC industry sales for future couple of years. While more and more people in China move from the lower class into the middle class, they are able and willing to spend more money on personal beauty care products. However, despite the fast rise in personal wealth, the development in Chinese BPC market sales growth which is greatly linked to better richness can be very fluctuating due to the countrys strong consumer saving level. Moreover, in terms of the growth of Chinas BPC sub-categories is rather unequal, for example, sector such as skin care (sales value USD 9.9 billions) is reaching mainstream status in 2010 while others such as fragrances (sales value USD 0.58 billions) and sun care (sales value USD 0.48 billions) remain niche segments. Despite these, there are still obvious areas where Chinese consumers are will ing to spend their money generously such as Premium Baby Care (21% sales growth 2009-10), Premium Skin Care (+19%) or Premium Colour Cosmetics (+15%). Chinese consumer behaviour and their knowledge, attitude, use and response to Skin Care products that reflects in their spending patterns are very much linked with Chinese Culture. Grubow(2008)characterises several beauty trends from the view points of Chinese consumers that intensively influence Skin Care market trends in China: desire for status-improving products, medicinal ingredients welcome, respect for skin care regimes, openness to professional advices and demand for luxury packaging.    Desire for Status-Improving Products Tracking back to ancient Chinese culture, giving a fair, even, pale and fragile quality skin look is quite associated with beauty as it implicated being in a aristocratic social stature. The standard of beauty does not actually change much. Today, Chinese women want a fair, flawless, radiance and translucent skin tone which is considered as wealthy and healthy, meanwhile, browner or darker skin is linked with rural and toiling for money. In result, Chinese women are interested in whitening-orientated products (but bleaching ones which do not give an appearance of evenness and a glow skin tone). Interestingly, a recent survey made by Asia Market Intelligence found that around two-thirds Chinese men also prefer fairer skin and are opened to male skin whiteners. This cultural ideal attracts to every class of people, from the mass to ultra luxury channels, and leading brands such as Olay, Shiseido, Nivea and Avon are offering whitening products not only for facial skin but body in Chinese Skin Care market. Another Chinese beauty trend in terms of status-improving is the skin concentration products which cover for examples facial masks, patches and eyes and chest treatment. Mask treatment is considered luxury as it used to be applied only in a spa treatment which required time and money. This â€Å"DIY approach† with masks containing rich textures or high-tech functions appeals to Chinese consumers and makes them feel unique and luxurious. Again, this pattern taps into the sense of status-enhancing.   Medicinal Ingredients Welcome Traditional Chinese herbal medicine impact strongly on many parts of Chinese day to day life and skin care products are no exception. Chinese consumers believe that some special ingredients provide a better benefit of healing and this is highly linked with the Chinese medicinal practices history. Taking examples of burdock, ginseng and green tea extract which contain antioxidants for skin nourishment; these natural ingredients are popular and famous among both younger and older generations because they are believed to be more inartificial and safer than other ingredients.   Respect for Skin Care Regimes Similar as Japanese skin care rituals that a full Japanese daily ritualistic process contains up to 9 separate steps, Chinese women also respect skin care order. They like to arrange their cosmetics on the dressing table and enjoy the skin care rituals consisting separate steps.While Western Consumers are appealed by products with two-in-one or multiple functions such as Neutrogenas 2-in-1 Cleansing Gel (cleansing and mask), Vichys Puretà © Thermale 3-in-1 One Step Cleanser (cleansing, toning and eye makeup remover) or Olays Total Effects, in China, women purchase Neutrogenas Deep Clean Makeup Remover, Cleanser, Blackhead Eliminating Patch and Soothing Mask or Olays Renewal Lightening Toner, Moisturizer, Lotion and Eye Cream.   Openness to professional advices Though the development of beauty and health care speciality drug stores such as Watsons, Mannings and Sasa in China is far behind the pharmacies in France or Japan or the drug stores in Germany, in principal cities of China, the specialty drug stores has witnessed an enormous sales growth during the past decade. Watsons, for instance, had only 80 outlets back in 2005. But last year, it has opened its 700th outlet in China, making it as the leading beauty and health care speciality drug store in Chinas BPC market.This is not just about the locations or its competitive prices policy that attract lots of consumers; the evidence that each Watsons outlet is equipped with counsellors and pharmacists who provide products advices and recommendations is also one of the key reasons that drive consumers into shops. Consumers in China trust and appreciate the advices of skin care from these shop assistances. It is therefore not difficult to interpret that with this advices-welcoming concept, direct-selling brands such as Mary Kay, Artistry and Avon who always come with sales counsellors and host frequently cosmetics seminars and makeup workshops appeal intensively Chinese consumers attention. (In 2010, 4 out of top 10 Skin care brands are categorized as direct-selling channel.) Demand for Luxury Packaging As consumers from emerging countries tend to search for higher cost-effectiveness products, in China, a cosmeceutical product with a luxury packaging is very much appreciated by Chinese consumers as it gives again the sense of status-enhancing. Packaging like heavy glass container appears more attraction for consumers than a plastic container even if it contains better ingredients or product volume. In addition, Trout (2011)suggests that when developing a new product range at different pricing and customer targeting, the design of packaging helps companies to define a â€Å"new† brand image and extend the attraction to wider potential consumers. 2.4 International Operation Strategy 2.4.1 Operation Strategy Strategy, originally derived from Greek word â€Å"strategos†, was firstly used in the military term and then in the management of business. Drucker(1954)proposed that strategy is â€Å"to analyse the current situation, including the inquiring of companys existing or should-be resources, and if necessary, change the situation.† Strategy was was also suggested by Chandler(1962) that â€Å"determines the base of corporations long-term objectives and taken actions, resources and configuration standards to achieve these targets.† In Andrew(1971)s The Concept of Corporate Strategy book, proposed that strategy is â€Å"the scheme of targets development and major policies and plans for the purpose of achieving specific objectives to describe the companys current and future business.† Glueck(1976)considered strategy â€Å"is a unified, coordinated, broad and integrated plan to reach the basic objectives of the organization†. The definition of strategy was a lso given by Porter (1985), â€Å"strategy is the response to external opportunities and threats, and internal strengths and weaknesses, in order to achieve competitive advantages†. In 1990, Ansoffdefined strategy as â€Å"a set of criteria to lead the organizational behaviour for the decision-making.† Kaplan and Norton(1990) described strategy is â€Å"a set of assumptions of cause and effect†. Porter(1996) again explained that strategy is â€Å"to conduct a selection among activities, enabling the organizational competitiveness while creating the sustainability and differences of the market†. There are various ways and results in strategic planning according to organizational goals and objectives that classify strategic management into different frameworks. Scholars attempt to conclude strategies in practice that are partly summarized underneath. However, there is so far no better or the most appropriate classifications or concepts. It is though agreed that a model which can be applicable to organizations would be capable to recognise and assess their chosen strategy content. Ansoff (1965)s Product-Market Growth Matrix (Table 3). Based on two basic aspects (product and market), a four-product-market portfolio is created that corresponds with corporations marketing strategy: Market penetration strategy is based on the present products portfolio, attempting to increase the market share. Market development strategy is to find and develop a new potential market basing on present products. Product development strategy is to create or bring new products in order to replace companys existing products Diversification strategy is to develop new products for new potential market. Porter (1980) characterized three general types of strategies into a category scheme that can be used to achieve and continue business competitive advantages: cost leadership strategy, differentiation strategy and segmentation strategy (Table 4). David (1986, 1995, 2010), has formed a modern Strategy-Formulation Analytical Framework that assisted strategies generate and evaluate feasible alternatives for the purpose of choosing a specific course of action. Strategies can be recognized, assessed and chosen by this framework which contains three stages including: the input, matching and decision (Table 5). 2.4.2 SWOT Analysis Originally developed by Albert Humphrey in his research project based upon the US Fortune 500 companies during 1960s to 1970s, SWOT analysis is a strategic planning method that specifies the corporate objective and identifies the favourable or unfavourable internal and external factors to accomplish this objective. It defines, analyses and evaluates corporate internal Strengths and Weaknesses and its external Opportunities and Threats that helps the organisation to determine the operational problem and the strategic decision making. A SWOT analysis result matrix was presented by Weihrich(1982) using strategies matching approach to develop relevant future coping strategies (Table 6). The procedures of SWOT analysis are often associated with corporate strategic planning process that can be combined into following steps: Conducting the description of business environment; Identifying and validating all affecting external factors; Predicting and assessing the future changes of external factors; Reviewing the internal strengths and weaknesses; Framing a feasible strategic planning by using SWOT analysis; and Conducting strategic choices and decision making. According to Weihrichs SWOT Analysis Result Matrix (in step five), a result of 22 strategies is hereby described as follows: SO Strategy: in accordance with the Maxi-Maxi principle, to consolidate strengths and improve opportunities. The direction of business development can be for example, (1) focusing on the growth of one single product, technique or market; (2) discovering new market for alternative selling channels; (3) developing new product using organizational resources; or (4) creating a new product life circle for customers to identify with aiming at winning the competitive market. It is the best operational strategy for business development and profits making with a closed coordination of corporate internal resources and external environment. WO Strategy: in accordance with the Mini-Maxi principle, to improve organizational weaknesses and manage opportunities. The result of Mini-Maxi strategic planning can be (1) unrelated diversification; (2) joint venture; (3) strategic alliance; or (4) consortium. ST Strategy: in accordance with the Maxi-Mini principle, to reinforce corporate self-strengths and cope with threats. Examples for strategic decision making can be (1) horizontal integration: integrating business of the same level to reduce competitors; (2) vertical integration: integrating upstream/downstream firms to avoid external threats; or (3) using related diversification improve business synergy.

Tuesday, August 20, 2019

Cryptography and Network Security Applications

Cryptography and Network Security Applications Part I Cryptography and Data Security Role of Cryptography in Securing Data Cryptography plays a key role in securing any company’s online data. Encryption is the most widely used method to implement cryptography on the companies’ data as it secures the data while simultaneously allowing it to be transferred to others. It is very difficult for an outsider to break into an encrypted file and access the sensitive information. Encryption acts as a crucial component of security for protecting the cloud storage data as it is vulnerable to being attacked by outsiders, for concealing the operating systems, and for keeping security on emails which are the most common method of communication in business. Purpose of Symmetric and Asymmetric Encryptions In symmetric encryption, the message is encrypted by the application of a secret key which can be in the form of a number, a word, or an alphanumeric string. The key is applied to the message (also known as plaintext) by the sender, and as long as the recipient has the key, they can decrypt the encrypted message (also known as cipher-text). Confidentiality is achieved by this method of encryption. If the symmetric key is changed in every session of communication the key is known as a session key that is valid for one session only and this provides improved confidentiality. This is a traditional method of encryption, using it becomes frantic when secure communication is needed by a number of employees in an organization as everyone will have a number of keys to communicate with different individuals. Secure key distribution among all the members is another problem in using symmetric encryption. In order to resolve these issues, Asymmetric encryption should be used in this organization. Each member has two keys namely public and private key. Public keys are used to encrypt and decrypt messages which are to be shared among all the members of the organization. Private keys are for to secure a private communication taking place between two persons. In this way, the all public and private communication inside premises is secured using these authentication methods and the files shared with these messages as attachments are also secured. Advanced Encryption Standard (AES) Algorithm: This algorithm is trusted as a standard by most government organizations as it is tremendously efficient in protecting the data of 128-bit. However, it is also used for data of 192 and 256 bits.Message Authentication Code  (MAC) Algorithm: This is also known as a tag, it is small information used for  authenticating a message which means it confirms the authenticity of the message by checking that the received message has been sent by the authenticated sender of it. The MAC value helps in protecting a messages  data authenticity and its integrity, by allowing the concerned persons to detect if the content of the message has been changed. Digital Signatures Digital signatures are commonly used for verifying the authenticity of digital documents and messages. It ensures the recipient that the received message has come from a known sender and the integrity of the message has not been altered during its transmission process. Since all the paper documents in the organization are now replaced with the electronic documents, digital signatures can be considered as an alternative to ink signatures and stamps of authenticity. Application of digital signatures offers authentication, integrity, and most importantly non-repudiation, i.e. one cannot deny their signature later if they have signed the document. Hence, digital signatures should be considered as one of the security measures while planning data security in this organization. These features can improve the transparency and security among the businesses through communications. These are basically comprised of 3 algorithms namely key generation algorithm, signing algorithm, and a signature verifying algorithm. It is very easy to create digital signatures, one can just open the electronic document that needs to be signed in an electronic signature tool such as Docusign or Microsoft office tools. Further steps differ as per the tool and document and these steps are instructed to the user as he opens the document in the tool. Users just have to follow the instructions and verify their identity in order to add their digital signatures on the document. When messages are sent after being digitally signed, the hash value ensures that no changes have been made in the document. All of this handled automatically handled by a software tool, which shows warning if a decrypted hash value produces an altered output. The encrypted value of the hash is added to the bottom or as an attachment in the email. Part II Cryptographic Keys and User Authentication   Ã‚  Ã‚  A user authentication system can be recommended to provide strict authenticity for users to access the companys resources. In this system, an identity is stated by the users who then applies an authenticator such as a password or a security key or combination of both of these in order to validate their identity. The security key presented by the user to verify their identity must be unique so that it authenticates only one particular user. The keys should be made in such a way that they are easy to remember by the user but cannot be stolen, copied, or forged. The process of revoking the previous key and issuing a new key should be easy. It should be impossible for the users to transfer their security keys to another user. The system should be protected against any attacker during the transit of data. Asymmetric encryption methods can be used as one of the user authentication methods to validate this system. Since the information secured through cryptographic keys depends directly on the key strength, key mechanisms and protocols effectiveness, and afforded protection. It is important to have a proper key management system in order to ensure proper distribution of keys. The user authentication should be made in such a way that it offers key protection against any modification. Private keys should be protected against any type of unauthorized disclosure. System Recommended for Employees to Get Discounts on Fruit Juice and Nut Bar The system recommended for the employees to make proper use of ijuice.com and nutbar.com is that when the employees click on the link given on the employee benefits page, a login or signup page should appear. If the employee is new to the system, they employee must make an account on the product website by signing up using their authentic credentials and their confidential employee ID along with a username or password that would be the key they use to access their account. As the user logs into the website, a session is created, and by the received login information of the user, special discount coupons unique to the employee is available to be added to their accounts so that they can use the coupon when they purchase any specific coupon applicable item. Once the user logs out from their account, the session is terminated, and the information about the session remains safe with the servers of ijuice.com and nutbar.com. Part III Secure Cloud Computing for Handling the Companys Data Implementation   John will want to implement most of the data used and stored for the company in a virtual cloud system. This will provide a certain effective measurement of security, efficiency, transfer methods, time saving and cost reductions. The first step in implementing cloud based storage is the replacement of physical infrastructures with virtual infrastructures. A software layer generates a virtual instance of the hardware as the controlling software point and is much easier to manage, interactive with, share and make changes too.  The second step, includes the decision making process of what cloud storage system would be best suited for the company. A common cloud service is ‘Google Drive’ ‘Oricle’ or IBM. These cloud services offer a greater visability into the usage and cost of virtual infrastructure as well as assisting in tracking and assessing shared computer resource usage accuracy. The third step of implementing cloud is realizing in companies where most of the work data flow demands server regularity without the interference of attacks and that’s where cloud security comes in. Blowfish, AES (Advanced Encryption Standard), and RSA (Rivest-Shamir-Adleman) are some of the most commonly used cloud computing algorithms to provide efficient security to cloud platforms. AES encryption algorithms were described previously, but RSA encryption relies upon the computational difficulty of processing large integer values. The strength of this encryption is left up to the key size which are usually 1024- or 2048-bits in length, which is huge and is why it would be a great choice to implement upon cloud infrastructure storage security. Risks Denial of Service (DoS) Attacks: These attacks prevents the users from accessing the services by flooding the systems or networks with traffic to make the resources work on unnecessary data or inevitably crash which then prevents the user from accessing their data . Such attacks have more computational power in cloud computing.Malware Injection Attack: These attacks inject harmful software to the victims data in the cloud and takes control of it. The results of successful injection can be very disastrous, it can even allow the propagation of computer worms which then can potentially use the company’s data distribution methods as a platform to spread the attack to individuals or groups who authentically interact with the company’s data.Side Channel Attack: These attacks place a virtual machine with the victim’s virtual machine in order to target cryptographic implementation of the systems instead of using any theoretical weaknesses of the algorithms or any other force. Cache attack, timing attack, power – monitoring attack, electromagnetic attack, acoustic cryptanalysis, differential fault analysis, data reminisce, and software-initiated fault attacks are different forms of side channel attacks. Countermeasures The data stored in the cloud must be zipped up with either a password or AES encryption and the keys must not be shared with anyone.Login authentication should not be simple in terms of guess work and rather should implement multifactor authentication.A CCSP (Certified Cloud Security Professional) should be hired to manage the cloud after installation.Data integrity must be verified by implementing data encryption and decryption over the wire. It is advisable to use cloud computing for the operational purposes in order to reduce the hardware infrastructure cost and maintain efficient management of databases and confidential data if all the vulnerabilities are taken care of by using proper countermeasures. Part IV Business and Blockchain Integration Blockchain technology has created a backbone for a new kind of internet. A blockchains store information across a network of computers making them not just decentralized but distributed which means no single individual or company owns a system but everyone can use it and help run it. It can be looked at in three different ways: technical, legal, and business (Nair & Sebastian, 2017).  As per technical aspect, it could be seen as a backend database which has a distributed ledger. As per business aspect, it is an exchange network that can be used by peers for transferring value. This mechanism validates a transaction and may validate it from a legal point of view. There is no requirement of any middlemen to make a transaction valid. In order to ensure proper functioning of blockchains at such a corporate level, a consensus algorithm is required which must be secure, functional, and efficient. â€Å"Proof of work†, â€Å"Proof of Authority†, and â€Å"Proof of stake† are some of the consensus algorithm which are considered as potential for blockchain integration. However, the use of a â€Å"Proof of Work† algorithm has already been started for blockchains in Bitcoins. Blockchains can enhance the security in three different forms which are: blockage of identity thefts, prevention from denial of service attacks, and prevention of data tampering. Advantages It allows people to sell or buy anything they like to and or from anybody in the world, without letting any other party to interfere and impose rules upon them.Every consumer can choose their identity in transactions, such can remain anonymous, public, or private as per their choice.Approach used in blockchains for storing DNS entries could increase security by eliminating the single target that can be attacked by the hackers. This will not cause the entire system to be compromised by the attack.Blockchain will also eliminate the network fees on DNS reads and will only charge for new entries and updates, of course depending upon the DNS provider that John chooses to go with. Drawbacks Financial services will be impacted as blockchain is defined as everything that a bank does.Government services as one can choose to buy or sell anything to anyone without any geographical boundaries. No one will go to government departments for completing the formalities.Blockchains will require a lot of computational power as compared to centralized database processes. Blockchain provides the ability for every node in the network to process the request independently.Existing currencies are regulated and created by the national governments, but blockchain and a product of blockchain such as Bitcoin will face hurdles in being adopted by the already existing financial institutions if the regulation status of the governments remain unsettled. References Stallings, W., & Tahiliani, M. P. (2014).  Cryptography and network security: principles and practice  (Vol. 6). London: Pearson. Jonsson, J., Moriarty, K., Kaliski, B., & Rusch, A. (2016). PKCS# 1: RSA Cryptography Specifications Version 2.2. Salomaa, A. (2013).  Public-key cryptography. Springer Science & Business Media. Hernandez, K. (2017). Blockchain for Development–Hope or Hype?. Nair, G. R., & Sebastian, S. (2017). BlockChain Technology Centralised Ledger to Distributed Ledger. Rittinghouse, J. W., & Ransome, J. F. (2016).  Cloud computing: implementation, management, and security. CRC press. Stojmenovic, I. (2014, November). Fog computing: A cloud to the ground support for smart things and machine-to-machine networks. In  Telecommunication Networks and Applications Conference (ATNAC), 2014 Australasian  (pp. 117-122). IEEE.

Monday, August 19, 2019

Extraordinary Potential of Man Revealed in Atlas Shrugged Essay

The Extraordinary Potential of Man Revealed in Atlas Shrugged  Ã‚   Freewill is the tenet on which men founded the United States of America, and the glory of "America the Beautiful" stems from the unlocked potential of its people. The callused hands of the laborers sip from the cup of American wealth, not the lazy plowman demanding government help. The inventor's mind synthesizes, theorizes, and designs the American dream, not the indifferent, insolent mechanic. The steel will of the industrialists propels the nation to greater heights, not the selfish arrogance of the beggar. The men who carry the weight of the world, Atlas and his proteges, do so by their incredible strength, not because of weakness, just as Ayn Rand asserts in her novel, Atlas Shrugged. Full of heroes and villains, Atlas Shrugged demands much from an intelligent reader. As global forces scheme to destroy various characters, Rand's continually acid wit and ironic tone set the stage for the various battles. One of the central characters in the novel, Hank Rearden, a steel magnate and tireless worker, invents a metal alloy that beats out all other steel alloys on the market. Naming it Rearden metal, Hank plans to storm the marketplace with his life's work, and make a bundle of money in the meantime. Dagny Taggart, a woman sharing with Rearden a vision of an America run by ingenuity, energy, and hard work, is the Vice-President in Charge of Operation for Taggart Transcontinental, a thriving railroad company. The two join forces, hoping to profit from their genius the old-fashioned way, by earning their fortune. Unfortunately, America refuses to allow these industrialists to follow their dreams. A creeping disease has infected the spirits of many A... ...l, purely logical absolutes leave no room for opposites to exist within them, and the defining characteristic of such absolutes are then lost. For example, absolute heat will not tolerate cold, yet how can we describe any heat without some reference to a colder temperature? By giving an example of Rearden's philosophy that works well despite the uncertainty of life, Rand reaches out to every man who has struggled for ideals. In reaching out to humanity through "Atlas Shrugged," Ayn Rand strengthened her argument about the basic goodness and extraordinary potential she believed all men could reach. Because this book takes incredible concentration to comprehend, understanding is left to individual effort, and Rand's permanent lesson for humanity is open to all seek her knowledge. Works Cited: Rand, Ayn. Atlas Shrugged. New York: Random House, Inc., 1957.

Sunday, August 18, 2019

Movie: Whats Eating Gilbert Grape Essay -- essays research papers

Movie: What's Eating Gilbert Grape "What's Eating Gilbert Grape", as directed by Lasse Hallstrom, is a comedy, drama, romance, all wrapped up into one grand movie. Leonardo DiCaprio plays a mentally impaired boy with a caring brother, who always took care of his brother until the love of his life came to town, proposing the essential question: What is a boy willing to sacrifice in order to be with the one he loves? Johnny Deep plays Gilbert Grape whose father left when he was little, causing his mother to become depressed and never leave the house again. Gilbert referees to her as a â€Å"beached whale† because she has gained so much weight. One afternoon a silver camper had engine trouble, forcing them to stay in town for a few weeks until it is fixed...

Saturday, August 17, 2019

Food Dyes

Purpose of food coloring People associate certain colors with certain flavors, and the color of food can influence the perceived flavor in anything from candy to wine. [2] Sometimes the aim is to simulate a color that is perceived by the consumer as natural, such as adding red coloring to glace cherries (which would otherwise be beige), but sometimes it is for effect, like the green ketchup that Heinz launched in 1999.Color additives are used in foods for many reasons including:[3] offset color loss due to exposure to light, air, temperature extremes, moisture and storage conditions correct natural variations in color enhance colors that occur naturally provide color to colorless and â€Å"fun† foods Color additives are recognized as an important part of many foods we eat. [4] [edit]Regulation Food colorings are tested for safety by various bodies around the world and sometimes different bodies have different views on food color safety.In the United States, FD&C numbers (which indicate that the FDA has approved the colorant for use in foods, drugs and cosmetics) are given to approved synthetic food dyes that do not exist in nature, while in the European Union, E numbers are used for all additives, both synthetic and natural, that are approved in food applications. The food colors are known by E numbers that begin with a 1, such as E100 (turmeric) or E161b (lutein). [5] Most other countries have their own regulations and list of food colors which can be used in various applications, including maximum daily intake limits.Natural colors are not required to be certified by a number of regulatory bodies throughout the world, including the United States FDA. The FDA lists â€Å"color additives exempt from certification† for food in subpart A of the Code of Federal Regulations – Title 21 Part 73. However, this list contains substances which may have synthetic origins. FDA's permitted colors are classified as subject to certification or exempt from certification, both of which are subject to rigorous safety standards prior to their approval and listing for use in foods. Certified colors are ynthetically produced and are used widely because they impart an intense, uniform color, are less expensive, and blend more easily to create a variety of hues. There are nine certified color additives approved for use in the United States. Certified food colors generally do not add undesirable flavors to foods. Colors that are exempt from certification include pigments derived from natural sources such as vegetables, minerals or animals. Nature derived color additives are typically more expensive than certified colors and may add unintended flavors to foods.Examples of exempt colors include annatto, beet extract, caramel, beta-carotene and grape skin extract. [edit]Natural food dyes Natural food colors can make a variety of different hues A growing number of natural food dyes are being commercially produced, partly due to consumer concerns surrounding synthetic dyes. Some examples include: Caramel coloring (E150), made from caramelized sugar Annatto (E160b), a reddish-orange dye made from the seed of the achiote. Chlorophyllin (E140), a green dye made from chlorella algae Cochineal (E120), a red dye derived from the cochineal insect, Dactylopius coccus Betanin (E162) extracted from beetsTurmeric (curcuminoids, E100) Saffron (carotenoids, E160a) Paprika (E160c) Lycopene (E160d) Elderberry juice Pandan (Pandanus amaryllifolius), a green food coloring Butterfly pea (Clitoria ternatea), a blue food dye To ensure reproducibility, the colored components of these substances are often provided in highly purified form, and for increased stability and convenience, they can be formulated in suitable carrier materials (solid and liquids). Hexane, acetone and other solvents break down cell walls in the fruit and vegetables and allow for maximum extraction of the coloring.Residues of these often remain in the finished product, but they do not need to be declared on the product; this is because they are part of a group of substances known as carry-over ingredients. Natural food colors, due to their organic nature, can sometimes cause allergic reactions and anaphylactic shock in sensitive individuals. Coloring agents known to be potential hazards include annatto, cochineal and carmine. [citation needed] [edit]Artificial coloring [edit]In the United States Seven dyes were initially approved under the Pure Food and Drug Act of 1906, but several have been delisted and replacements have been found. 6] Some of the food colorings have the abbreviation â€Å"FCF† in their names. This stands for â€Å"For Coloring Food† (US)[7] or â€Å"For Colouring of Food† (UK). [8][9] [edit]Current seven In the US, the following seven artificial colorings are permitted in food (the most common in bold) as of 2007: FD Blue No. 1 – Brilliant Blue FCF, E133 (blue shade) FD Blue No. 2 – Indigotine, E 132 (indigo shade) FD Green No. 3 – Fast Green FCF, E143 (turquoise shade) FD Red No. 40 – Allura Red AC, E129 (red shade) FD Red No. 3 – Erythrosine, E127 (pink shade, commonly used in glace cherries)[10] FD Yellow No. 5 – Tartrazine, E102 (yellow shade)FD Yellow No. 6 – Sunset Yellow FCF, E110 (orange shade) [edit]Limited use The following dyes are only allowed by the FDA for specific limited applications: Orange B (red shade) – allowed only for use in hot dog and sausage casings. Citrus Red 2 (orange shade) – allowed only for use to color orange peels. [edit]Delisted and banned FD Red No. 2 – Amaranth FD Red No. 4[11][12] FD Red No. 32 was used to color Florida oranges. [6][11] FD Orange Number 1 was one of the first water soluble dyes to be commercialized, and one of seven original food dyes allowed under the Pure Food and Drug Act of June 30, 1906. 6][11] FD Orange No. 2 was used to color Florida oranges. [6] FD Yellow No. 1, 2, 3, and 4[11] FD Violet No. 1[11] [edit]Other Locations As stated above, most other countries have their own regulations and list of food colors which can be used in various applications, including maximum daily intake limits. In the EU, E numbers 102-143 cover the range of artificial colors. For an overview of currently allowed additives see here. Some artificial dyes approved for food use in the EU include: Quinoline Yellow: E104 Carmoisine: E122 Ponceau 4R: E124 Patent Blue V: E131 Green S: E142 [edit]Dyes and lakesColor additives are available for use in food as either â€Å"dyes† or lake pigments (commonly known as â€Å"lakes†). Dyes dissolve in water, but are not soluble in oil. Dyes are manufactured as powders, granules, liquids or other special purpose forms. They can be used in beverages, dry mixes, baked goods, confections, dairy products, pet foods, and a variety of other products. Dyes also have side effects which lakes do not, including the fact tha t large amounts of dyes ingested can color stools. Lakes are made by combining dyes with salts to make insoluble compounds. Lakes tint by dispersion.Lakes are not oil soluble, but are oil dispersible. Lakes are more stable than dyes and are ideal for coloring products containing fats and oils or items lacking sufficient moisture to dissolve dyes. Typical uses include coated tablets, cake and doughnut mixes, hard candies and chewing gums, lipsticks, soaps, shampoos, talc, etc. [edit]Other uses Because food dyes are generally safer to use than normal artists' dyes and pigments, some artists have used food coloring as a means of making pictures, especially in forms such as body-painting. Red food dye is often used in theatrical blood.Most artificial food colorings are a type of acid dye, and can be used to dye protein fibers and nylon with the addition of an acid. They are all washfast and most are also lightfast. They will not permanently bond to plant fibers and other synthetics. [13 ] [edit]Criticism and health implications Though past research showed no correlation between attention-deficit hyperactivity disorder (ADHD) and food dyes,[14][15] new studies now point to synthetic preservatives and artificial coloring agents as aggravating ADD and ADHD symptoms, both in those affected by these disorders and in the general population. 16][17] Older studies were inconclusive, quite possibly due to inadequate clinical methods of measuring offending behavior. Parental reports were more accurate indicators of the presence of additives than clinical tests. [18] Several major studies show academic performance increased and disciplinary problems decreased in large non-ADD student populations when artificial ingredients, including artificial colors, were eliminated from school food programs. [19][20] Norway banned all products containing coal tar and coal tar derivatives in 1978. New legislation lifted this ban in 2001 after EU regulations.Tartrazine causes hives in less t han 0. 01% of those exposed to it. [21] Erythrosine is linked to thyroid tumors in rats. [22] Cochineal, also known as carmine, is derived from insects and therefore is not vegan, vegetarian or kosher. This criticism originated during the 1950s. In effect, many foods that used dye (such as red velvet cake) became less popular. [citation needed] Brilliant Blue (BBG) food coloring was cited in a recent study in which rats that had suffered a spinal injury were given an injection of the dye immediately after the injury, and were able to regain or retain motor control.BBG helps protect spine from ATP (adenosine triphosphate), which the body sends to the area after a spinal injury, which further damages the spine by killing motor neurons at the site of the injury. [23] Research by King Feisal University points that the use of synthetic color in various foods has adverse effects on some of biochemical analysis, specifically at high concentration and administration for along periods of tim e. Changes in liver and kidney histopathological structure and increases in white blood cell count indicated that inflammation is specific to certain colorants. [24]