Wednesday, July 31, 2019

Personality Traits and Characteristics Essay

I had assumed that analyzing my own personality would be an easier task than analyzing the personality of a famous historical person. I made this assumption based on the thought that I knew myself extremely well. However, as I sat down to write this analysis, I drew a blank. I was unsure what to write about my own personality traits and characteristics. As a result of this difficulty, I completed the Myers-Briggs Type Indicator to achieve some insight into my own personality. I also interviewed family members to gather information about my personality that was clear and unbiased. The two approaches I have chosen to complete this self-analysis are Carl Jung’s Attitude and Functions and Erikson’s Psychosocial Stages of Development theories. Carl Jung’s personality theories cover an extremely wide array of ideas regarding the human psyche, or all psychological processes. As a result of this I have chosen to focus on his theories of attitudes and functions. According to Jung, psychological types are a result of various combinations of two basic attitudes and four functions. These attitudes and functions are responsible for our ways of perceiving the environment and orienting experiences. The two basic attitudes of Jung’s theory are extraversion, in which the psyche is oriented outward to the objective world, and introversion, in which the psyche is oriented inward to the subjective world. The four functions include thinking, feeling, sensing and intuition (Engler, 2009). After a considerable amount of research, I concluded that I was an introverted feeler. I tend to be shy and quiet, especially in social situations. As a result I have experienced difficulty developing friendships and relationships with others. I am also a hypersensitive, emotional person. I have been concerned with personal values, attitudes and beliefs my entire life. When I carefully thought about how I come to make decisions, judgments or conclusions, I realized that I do so based on my emotions. My family verified that I am an introverted feeler during their interviews. To expand on my knowledge and understanding of my personality type, I completed the Myers-Briggs Type Indicator. This specific test sorts individuals into groups based on the following dichotomies: Extraversion-Introversion (EI), Sensing-Intuition (SN), Thinking-Feeling (TF), and Judgment-Perception (JP) (Engler, 2009). The result of this test was the personality profile was ISFJ, which stands for introverted sensing feeling judging. Many, if not all of my personality traits and characteristics fit perfectly with the ISFJ personality type. I have always had a strong need to â€Å"be needed† by others. I have often struggled with feelings that others did not appreciate my accurate, thorough work at home and in the work place. My perfectionist tendencies have often caused problems for me and cause me to be overly critical of myself. I have often felt taken advantage of by employers and friends because of my loyal and giving tendencies. I have always been the person who worked other people’s shifts or gave friends rides, even when I had other important things to do. Typically, I function best in small groups or one-on-one situations because I am empathetic and sympathetic with others. I frequently overanalyze other’s behaviors and sometimes interpret them as rejection. I am also easily embarrassed. I dislike confrontation and I have extreme difficulty hiding or articulating distress (Heiss, 2007). Another article found on the CG Jung organization website mentioned the affects of the R. A. S. , or Reticular Activating System, has on an individuals personality traits and characteristics. The R. A. S. regulates our stable level of wakefulness, is linked to anxiety and makes it possible for individuals to focus their attention. According to this article, people who are highly aroused take in more information per second than the average person and subsequently needs to diminish or limit the â€Å"volume† of stimulation around them. This is what makes a person an introvert. Introverts are overloaded with information more quickly, and due to that introverts often have chronic anxiety, as well as a negative attitude towards life (Benziger, 2007). I myself have struggled with anxiety and negative attitudes, which led to depression. Due to the fact that I am easily overwhelmed, I tend to sleep excessively. Sleep gives my brain a break from the overstimulation I experience in everyday life. Erikson’s psychosocial stages of development are centered on the polarity that children encounter during certain phases of their life. This theory proposes eight epigenetic stages, each entailing its own life crisis in which an individual can turn one of two ways. Each psychosocial stage provides the individual with opportunities for certain basic virtues to develop (Engler, 2009). However, I am only going to focus on the first six stages of Erikson’s development because I have not been through the other two stages. The first developmental stage is trust versus mistrust, which occurs during infancy. This is when an infant learns whether or not the world can be trusted. If dependable care is given and the infant’s needs are met, the basic virtue of hope will develop (Engler, 2009). I was adopted in my infancy and given more than adequate care. I personally do not believe that my adoption caused me any issues until my later years. The second psychosocial stage is autonomy versus shame and doubt, which arises during the second and third year of life. This stage deals with a toddler’s ability to control their body and bodily activities, as well as independence. The basic virtue that develops at this stage of life is will. Erikson’s third stage is initiative versus guilt, which occurs at three to five years. At this point in time, children are focused on mastering new skills and tasks. If a child prevails, the basic virtue that will arise is purpose. The fourth psychosocial stage is industry versus inferiority, which occurs during ages six to eleven. During this stage children must learn to master skills that they will need to be successful in society. If a child successfully does so, they will develop a sense of competence (Engler, 2009). I do not recall experiencing anything incredibly difficult during these three psychosocial stages of development. I know that my parents had gotten a divorce at age three, which was somewhat confusing for me, but it did not really damage me psychologically in any way. I do remember being incredibly attached to my mother during these stages however, and was typically upset or anxious if I was separated from her. When I was around the age of five, my family moved a short distance to a house in Baldwinsville. The adjustment was easy for me. At age seven, my mother got remarried, in my life long before he and my mother were married. He had always treated my sister and I as his own children. For that, I am extremely grateful. The hardest thing I remember experiencing was moving from Baldwinsville to Liverpool, when I was about to turn eleven years old. I was very anxious, but adapted to my new surroundings with ease. I also did well in elementary school academically and developed a close friendship with another girl during this time period suggesting consistent with Erikson’s ideas of mastery in middle childhood. Ego identity versus role confusion is the fifth stage of development, which occurs during ages twelve to eighteen, and involves establishing an identity and viewing ones self as a productive member of society. During this stage an individual will develop the basic virtue of fidelity. This was a stage in which I struggled. I was beginning to understand what adoption was and had a very difficult time understanding why my birth mother would just give me away. I plunged into an identity crisis at this stage of my life and temporarily developed a negative identity, which was in contrast with my personal values and upbringing. I was also a victim of sexual assault at this time, which diminished my self-confidence and sense of self worth even further. I do believe that my mother’s occupation during my adolescent years complicated my life to a certain extent. Having a mother who is superintendent of the school district I was attending made me feel alienated from my peers and I found it more difficult to make connections with others. The sixth and final psychosocial stage I will be discussing is intimacy versus isolation, takes place during the eighteenth to twenty-fourth years of life. At this time young adults must be able to overcome the fear of ego loss and form a close affiliation with another individual. It is at this point that the basic virtue of love can potentially be established (Engler, 2009). I am currently in this psychosocial stage myself and am struggling. Recently, I escaped a very emotionally and physically abusive relationship, which damaged me psychologically. I also have experienced two significant losses in my life, which I have just begun recovering from. As said previously, the other two stages I have not experienced yet and therefore will not be addressing in this paper. I chose Jung and Erikson’s theories to complete a self-analysis because I felt that they best defined my own personality. I found the results of this analysis extremely accurate and insightful. However, certain aspects of my personality were left out. I believe that some of my traits and characteristics are hereditary while others were learned by watching those close to me over the years. My twin sister and I both have attention deficit disorders, which causes us to be extremely moody and impulsive. Both of us are very opinionated and stubborn individuals. Clearly, some behaviors are a result of genetics. I found this paper very useful in my own self-exploration. It helped me readily identify some of my neurotic tendencies and their possible causes. I plan on using what I have learned from this experience to make necessary changes so that I can lead a happier, healthier life with less neurotic symptoms.

Comparing two poems Essay

In this essay I will be comparing two poems. These poems are on the topic of war which is very relevant especially as there is a war going on in Iraq as I am writing this. The first poem I am going to write about called: â€Å"Dulce et Decorum est† is written by Wilfred Owen. He had first hand experience of war as he was a soldier; so he will give us a very honest opinion of war and what it was really like to fight in one. Unfortunately for him he was killed in action a week before the war ended. The poem has a very strong anti-war feeling about it; it is his personal view that dying for your country is not a very good thing and in the poem he conveys this to us by giving us very clear mental pictures of the horrible effects of war. Wilfred Owens’s attitude to war is that he is frustrated, angry and resentful of it. The poem type Wilfred uses in this poem is the Sonnet; this is odd because Sonnet poems are usually about love but in this case he is writing about hurt; rhythm of the octaves in this poem is slow and speeds up in the sestet. These ties in with the mood of the poem e.g.: â€Å"Gas! Gas! Gas! † This line has been broken up with exclamation marks to show that there is an emergency. Then it slows down quite considerably again in the final stanza to make us think of the suffering the soldiers go through. It is wonderful the way that he structures this poem from the soldiers’ feelings, to his own and then he asks the reader for their views. There is one very noticeable thing about the structure and that is that there are two lines of the poem on their own; also these line are not in the past tense like the rest of the poem and this is because he is trying to emphasize the mental scars of war which remain with him in the present. He gives us a very detailed mental picture and he gives us this in all three verses. In verse 1 he talks about the physical breakdown of the soldiers. He builds up this mental image of suffering e.g.: â€Å"knocked kneed†, and he continues this mental picture into versus 2 as he talks about his fellow solider suffering and dying in the gas as he can’t get his helmet on. He uses verbs in this verse in a clever way e.g.: Fumbling and floundering. E.g.: â€Å"†¦Fumbling, Fitting the clumsy helmets just in time.† â€Å"And floundering like a man in fire or lime.† In verse 3 he uses Onomatopoeic e.g.: gargling. He uses this word to explain how his fellow solider died e.g. â€Å"†¦Gargling from the forth-corrupted lungs.† The pain that this soldier suffered is conveyed to us in a very gruesome way e.g.: â€Å"As under a green sea, I saw him drowning.† What he means by that is he has breathed in so much gas its suffocating him so it is ver y like drowning. Another example â€Å"He plunges at me, guttering, choking, drowning.† In the first verse he uses metaphors in a very powerful way e.g. â€Å"Blood shod†, â€Å"drunk with fatigue† to show the exhaustion and suffering of the soldiers. Also the Onomatopoeic words in the first verse â€Å"sludge† and â€Å"trudge†, show us how the soldiers slowly marched ; it tell us also that they had no determination and enthusiasm lift to fight for their country. Wilfred Owen is basically saying in this poem that he’s been there and it’s not that good at all to fight for your country. This is the complete opposite of what Lord Tennyson talks about in â€Å"The Charge of the Light Brigade†. Lord Tennyson’s poem is different from Wilfred Owen in a number of ways. Firstly Lord Tennyson has never fought in a war; Tennyson poem is also saying that it is good to die for your country and Tennyson’s poem is about the soldiers being heroes and noble men. The poet’s attitude to war is that it is an honorable and noble thing to die for your country. The tone of this poem is fast and very sharp e.g.: â€Å"Forward, the Light Brigade! Charge for the guns! † Another example is â€Å"Cannon to right of them, Cannon to left of them, Cannon in front of them† stays at this speed for most of the poem. Tennyson structures his poem in to 6 verses of even length. He starts off describing the advance in verse 1 and 2 e.g.: â€Å"Into the valley of death† â€Å"Forward, the Light Brigade!† then into verse 4 he talks about the heat of the battle e.g.: â€Å"Flashed all their sabers bare, Flashed as they turned in air, Sabring the gunners there.† In verses 5 and 6 he talks about the retreat e.g.: â€Å"Back from the mouth of Hell, All that was left of them† and he then goes on to say how courageous, noble and heroic the soldiers were e.g.: â€Å"honour the charge they made! Honour the light brigade, Noble six hundred†. Verse 6 is shorter than the rest as it is a tribute to the soldiers that fought in the war. The rhythm of the poem is regular; it conveys how inevitable the charge was. The rhyme sounds very grand, patriotic and has a musical tone about it. The poem type is a ballad. A ballad is usually a short narrative poem with stanzas of two or four lines and usually a refrain. They contain repetition e.g.: â€Å"Rode the six hundred† (which is on the end of every verse) another example: â€Å"Half league, half league, half league onward†. They are written in straight-forward verse, seldom with detail, but always with graphic simplicity and force. Many old-time ballads were written and performed by minstrels attached to noblemen’s courts. Language used in the poem is very powerful to glorify the charge rather than show pity. He uses metaphors in his poem e.g.: â€Å"Into the valley of death†; there is also personification used in his poem e.g.: â€Å"Into the jaws of death† and â€Å"Into the mouth of hell† He uses these metaphors and personification in his poem to emphasize the suicidal march of the Light Brigade. The hell and death in these phrases reinforces the views of this being the end for the soldiers. I really liked the way that Tennyson brings the reader into his poem by asking a rhetorical question: â€Å"Was there a man dismayed?† and â€Å"When can their glory fade?† He does use a quite a lot of onomatopoeia e.g.: â€Å"Volleyed and thundered† and â€Å"†¦Shot and shell†. He has also chosen his verbs in his poem really well. They are Very prominent; convey idea of speed, the light and movement all in the one verb is â€Å"flashed†. The repetition is very powerful and significant in the poem from the very first line: â€Å"Half a league, Half a League, Half a league onward.† My personal view on war is that it is a terrible thing and should only be used for a last resort. I would only agree with a war at present if there was evidence to prove that Iraq have weapons of mass destruction and then I would consider it a just war and that we must get Saddam quickly and carefully to keep down the risk of innocent deaths. I personally prefer â€Å"Dulce et Decorum est.† by Wilfred Owen as it is more detailed and gives you very vivid pictures of the soldiers deaths and as Wilfred Owen was believable actually there it’s more in a sense as he was has seen it up close. This poem taught me that war is a bad thing and it’s not worth it; it helped me to appreciate how much pain some of the soldiers had to suffer in the war.

Tuesday, July 30, 2019

‘India’ a Hub for Medical Tourism

? ABSTRACT Medical tourism has become a popular option for tourists across the world. It takes into account primarily the biomedical procedures, combined with travel and tourism. Medical tourism has been coined by different travel agencies and the mass media to describe the rapidly growing practice of travelling across international borders to obtain cutting edge medical care. Countries like India, Malaysia, and Thailand are promoting medical tourism aggressively. The key competitive advantages of India in medical tourism stem from the following: ?Low cost advantage. ?Strong reputation in the Advanced Healthcare Segment (Cardiovascular Surgery, Organ Transplants, Eye Surgery etc. ) ? The diversity of tourist destinations available in the country. The key concerns facing the industry include: ?Less Government Initiatives. ?Lack of a coordinated effort to promote the industry. ?No accreditation mechanism for hospitals and the lack of uniform pricing policies and standards across hospit als. Medical tourism or health care tourism is fast growing multibillion-dollar industry around the world.It is an economic activity that entails trade in services and represents the mixing of two of the largest world industries: Medicine and Tourism. The paper identifies the strengths of India’s medical tourism service providers and points at a number of problems that may reduce the growth opportunity of this industry. This paper focuses on the key issues and opportunities possessed by Indian medical tourism sector that enables it to overcome domestic and international barriers on upgrading its medical services.Finally, this paper analyses and concludes the main reasons why the developing country like India attracts foreign tourists for the medical treatment. Keywords: Medicine, Tourism, Yoga, Unani, Siddha, Ayurvedic, Naturopathy. INTRODUCTION India has a bountiful of diverse tourism hotspots which enchant the recuperating visitors, their scenic beauty, historicity and soci o-cultural significance would be great harbingers of health to the ailing foreign visitors. In the recent years, government support, low cost treatment, improved healthcare infrastructure, and rich cultural heritage, have taken the Indian medical tourism to new heights.India has emerged as one of the world’s most cost-efficient medical tourism destinations, and hence, attained a position among the global leaders. According to â€Å"Booming Medical Tourism in India†, the heart surgery centers in the country offer treatment at a significantly lesser prices compared to North America and Europe. Superior quality of dental care and Ayurvedic Spa treatments are also attracting patients from across the globe. Each market segment describes the cost effectiveness compared to other countries.Though India’s reputation is not good on hygiene front, its state-of-the-art medical facilities and value for money offered attracts thousands of patients each year. In this way, the country holds enormous potential for growth in medical tourism in future. Extensive research and analysis has also revealed that quality-driven wellness centers, cord blood banking, and medical tourism facilitates medical tourism market. It has been observed that wellness tourism, alternate meditation, and the advantage of being the least competitive pricing have been the Unique Selling Point (USP) of the Indian medical tourism.Cardiac and Orthopedic procedures constitute the majority share of the market. This study reflects an in-depth knowledge of various government initiatives that provides a positive impact on the medical tourism market in India. The adoption of the Public Private Partnership (PPP) Model by the Indian Government at both central and state levels to improve healthcare infrastructure in the country through expertise of private sector and better support of public sector provided the extra thrust to medical tourism.We also observed that the regulatory structure in co nnection to the medical tourism industry has been quite liberal and supportive in the country so far. Considering all the positive insights of the analysis, it’s a hope that the analysis of current market performance and future outlook of the Indian medical tourism industry with the forecasts provided in the report will help in devising the rightful strategies and make sound investment decisions. Comparative Cost of Medical Treatment in Euros (1â‚ ¬ = 70. 24 Rs) Type of ProcedureUnited StatesIndiaThailandBone Marrow Transplant300,000 â‚ ¬ = 21,072,000 Rs24,000 â‚ ¬ = 16,85,760 Rs50,000 â‚ ¬ = 35,12,000 Rs Open Heart Procedure40,000 â‚ ¬ = 2,809,600 Rs11,000 â‚ ¬ = 7,72,640 Rs 35,000 â‚ ¬ = 24,58,400 Rs Knee Surgery13,000 â‚ ¬ = 9,13,120 Rs3,500 â‚ ¬ = 2,45,840 Rs5,500 â‚ ¬ = 3,86,320 Rs Eye Surgery2,400 â‚ ¬ = 1,68,576 Rs600 â‚ ¬ = 42,144 Rs 5,500 â‚ ¬ = 3,86,320 Rs Facelift6,500 – 16,000 â‚ ¬ = 4,56,560 – 11,23,840 Rs20 00 â‚ ¬ = 1,40,480 Rs 8,000 – 16,000 â‚ ¬ = 5,61,920 – 11,23,840 Rs Source: Business World India and Indian Brand Equity Foundation Comparative Picture of the Price of the Treatment in USD and Percentage ProcedureUSD in USA)USD (in India)Difference in Price Bone Marrow Transplant2500006920028% Liver Transplant3000006935023% Heart Surgery30000870029% Orthopedic Surgery20000630032% Cataract Surgery2000135068% Dental Procedure Metal Free Bridge550060011% Dental Implants350090026% Porcelain Metal Bridge300060020% Porcelain Metal Crown100010010% Source: IIMK Part IX – Medical Tourism CHALLENGES One of the major challenges for Medical Tourism Industry in India is the phenomenon of Crowding-Out where healthcare could become less accessible to the local population.The discrimination of care has been happening with the opening up of the healthcare market and has brought about for the residents of the destination countries. The revenue generated by developing countr ies providing medical services to foreign patients can be used to improve the access and quality of care available to the residents. However, concerns have been expressed over Medical Tourism Industry in India that it may seriously undermine the care of local residents by adversely affecting the healthcare workforce distribution.Critics addresses globalization as commoditization of worldwide healthcare where in the redirection of economic resources to support the foreign care industry makes an ill-effect on local health care as the lower income groups that have reduced access and longer waits for health services. So, instead of contributing to broader social and economic development the provision of care to patients from other countries might make worse, the existing in-equalities and further polarize the richest and poorest members of society.Healthcare spending in India accounts for over 5% of the country's Gross Domestic Product (GDP) of which only 20% is provided by the governme nt. This reflects that the public healthcare is not only weak but also under-utilized and inefficient. Similarly contends that rising in-equalities in healthcare access across private and public systems encourages a domestic Brain-Drain (migration of healthcare professionals’ takes place from public to private sector) and increases dualism in healthcare in India.It is a fear that the remunerative Medical Tourism Industry in India might flourish at the expense of the treatment of endemic diseases (AIDS, tuberculosis and malaria) thus disregarding half of the disease burden in India which is primarily infectious diseases. Hence it is to be emphasized on the governments of destination countries to implement and enforce appropriate macroeconomic redistributive policies to ensure that the local residents of these nations actually realize the potential benefits of the Medical Tourism Industry in India.In addition, there is a rapidly increasing element of competition for India for m edical tourism income from other host countries such as Thailand and Singapore. Hence, one of the key factors for the host hospitals is the concept of efficient marketing to the developed countries offering innovative ideas like a holistic medical service and tourism package. It’s also a concern on the dependency of the developed nations on developing nations for healthcare provision.In addition, it is wondered if an established model of Medical Tourism Industry in India with the niche market which draws specific patients for designated procedures and can be followed by all developing countries. If multiple developing countries entered this market, the oversaturation of healthcare services would lead to severe price-cutting to the detriment of quality of healthcare. Another area of concern is the effect on the reputation of the destination country of the practice of soliciting patients for money.For example, Dr Kohli, an Indian pediatric cardiologist admitted to soliciting me dical tourists for money on the 60 Minutes. In addition, it’s warned that the quality of some of the services offered to medical tourists can cause significant risks due to the use of:- ? Older surgical equipment and inferior quality medications; ? Poorly trained health care providers; ?Inadequate emergency rooms and implanting older-generation medical devices.In a recent research conducted by Walsh, an antibiotic found amongst the UK medical tourists returning from India and Pakistan after undergoing cosmetic surgeries. The management of post-operative complications that occur after a patient returns to his home country and the consequent costs of this care are difficult issues that remain unresolved. Besides, hospitals catering to Medical Tourism Industry in India lack accreditation labels whereas there is an demand for oversight by neutral administrator such as (JCI and Patients beyond Borders) to attract foreign to the host country.Moreover, foreign patients have to bear the treatment cost out of their own pockets since the procedures performed under Medical Tourism Industry in India are usually not reimbursed by the insurance agencies with the exception of a few companies such as Blue Cross and Blue Shield in USA. Also, Medical Tourism Industry in India lacks stringent governance and regulatory policies. Consequently, faced with the choice of many medical institutions in diverse countries, medical tourists may find it very difficult to identify well-trained physicians and modern hospitals that consistently provide high-quality care.Lack of transparent pricing policies across hospitals, customer perception of some host countries as unhygienic and prone to terrorism with low coordination between the various Medical Tourism Industry in India operators such as airlines, hospitals, hotels and insurance companies are some of the other reported shortcomings. Since, Medical Tourism Industry in India is a relatively new phenomenon, some under-researched are as are observed in the available published literature such as: ?Limited statistical information; ?Impact of globalization on healthcare policies of Medical Tourism Industry in India; ? Challenges posed by Medical Tourism Industry in India like ethical and litigation issues; ? Public sector health inequity and post operative care of the medical tourists. Hence, a qualitative research is much needed to bridge this gap with a combination of primary (semi-structured interviews) and secondary (literature review) research. OPPORTUNITIESThe emergence of Medical Tourism Industry in India encouraged a reverse Brain-Drain where highly skilled medical professionals prefer to practice in their own countries rather than in the lucrative industrialized nations. One of the compensations for their move is the freedom to carry out rare medical procedures, such as hip resurfacing which have not yet been authorized in industrialized nations. There is an accompanying flow of patients as some citizens o f developed nations choose to bypass the care offered in their countries and travel to less developed areas of the world to receive a variety of reasonably priced medical services.As a result, regional and national governments in India, Thailand, Singapore, Malaysia, Philippines and Indonesia regard Medical Tourism Industry in India as an important resource for economic and social development. The difference in treatment costs can be considerable; for example, the cost of an elective coronary artery bypass graft surgery is about $60,400 in California, $25,000 in Mexico, $15,500 in Bumrungrad, $10,000 in Thailand, and in India only $6,500 in Apollo.Hence, cost-conscious patients choose to accept the inconvenience and uncertainties of off-shore healthcare to obtain service at prices they can more comfortably afford. Medical Tourism Industry in India can be regarded as a tool for lessen the overburdened healthcare systems of industrialized nations. For example, in the US, there are 46. 6 million people with no medical insurance, inadequate coverage and those who are not eligible for Medicare. Moreover, overwhelming health-related expenses contribute to bankruptcies in the United States.Also, patients choose Medical Tourism Industry in India to circumvent the delays associated with the long waiting list in their native countries and to attain cosmetic surgeries such as dental reconstruction, fertility treatment not offered in their National Health Services such as in United Kingdom and Canada. Patients also travel overseas to access stem cell therapies which are restricted on ethical grounds in most industrialized countries but are available in the Medical Tourism Industry in India.The shortage of human organ supply available for transplant in the United States drives some patients to other countries to obtain organ transplants, a practice that has been referred to as transplant tourism. There is another category of patients who prefer Medical Tourism Industry in India for confidentiality of the treatment rendered such as plastic surgery, drug rehabilitation and reproductive tourism. Patients also prefer Medical Tourism Industry in India for more personalized nursing care offered owing to the lower labor costs in developing nations supplemented by travel to exotic locations.Recently, several Fortune 500 corporations such as Blue Ridge Paper Products Inc. have been evaluating the feasibility of outsourcing expensive medical procedures to offshore healthcare destinations to reduce the financial burden of employee healthcare. In addition with these trends, the health insurance sector has potential commercial opportunity for foreign insurance firms. Insurance provider networks are being expanded to include physicians across the globe, and it is anticipated that within a decade a majority of large employer’s health plans will include off-shore medical centers.It is believed that if Medical Tourism Industry in India continues its meteoric g rowth, medical insurance plans could take advantage of its cost savings and begin offering lower-priced premiums if policyholders could be assigned to lower-priced countries for treatment. Hence, healthcare financing could become better calibrated to patients’ financial status. Consequently, medical tourism is a component of export-led economic growth, with the foreign currency earnings from international patients translating into output, jobs and income for developing countries with the added bonus of improving their public health systems.Supplemented by other factors such as: ? Low cost of administrative and medico-legal expenses; ?Medical visas being issued in lieu of travel visas for patients allowing an extended stay for medical reasons; ? Favorable economy. English being widely spoken due to India’s history as a British colony and enjoying a favorable Government support Medical Tourism Industry in India seems to be a promising sector for India. STRATEGIES ON INDI AN MEDICAL TOURISM ?Product ?Price ?Place ?Promotion ?People ?Process ?Physical Evidence SUGGESTIONS Role of Government: The government of India must act as a regulator to institute a uniform grading and accreditation system for hospitals to build consumers’ trust. ?Medical Visas: A simplified systems of getting medical visas should be developed in order to make travel across borders smoother. Visas can be extended depending on the condition of the patients. ?Holistic medical and diagnostic centers within the corporate hospitals: The hospitals have small spaces for the relatives to pray in, thereby wedding science with religion and traditional with modern medical practices. Setting up National Level Bodies: To market India’s specialized healthcare products in the world and also address the various issues confronting the corporate healthcare sector, leading private hospitals across the country are planning to set up a national-level body on the lines of National Associa tion of Software and Service Companies (NASSCOM), the apex body of software companies in the country. It is therefore essential to form an apex body for health tourism – National Association of Health Tourism (NHAT). The main agenda for NAHT are: 1. Building the India Brand Abroad . Promoting Inter-Sectored Coordination 3. Information Dissemination using Technology 4. Standardization of Services ?Integrate vertically: Various added services may be offered to the patients. For example, hospitals may have kiosks at airports, offer airport pickups, bank transactions, or tie-ups with airlines for tickets and may help facilitate medical visas by the government. ?Joint Ventures / Alliances: In order to counter increasing competition in medical tourism sector, Indian hospitals should tie-up with foreign institutions for assured supply of medical tourists.CONCLUSION ?The First World’s Treatment at Third World Prices: India offers world-class healthcare that costs substantially less than those in developed countries, using the same technology delivered by competent specialists and attaining comparable success rates. ?India is receptively Less â€Å"Scary† Now: The author believes that a lot of entrusting medical care to different locations is about a psychological fear of the unknown. An important strategic challenge for developing-country hospitals is to reduce the psychological fear, which India has and is doing assiduously. Presence of a Collection of Medicine and Medicine Care: In India, the same depth of pool of talent for medicine exists as is the case of engineering and mathematical talent for software outsourcing. In the 1950s and '60s, the Indian government invested a lot in tertiary education. By now there are at least a small handful of medical institutes that are really first-rate, and the doctors they produce are extremely well trained. ?Strong Reputation in the Advanced Healthcare Segment: India has a plethora of hospitals offering wo rld class treatments in nearly every medical field of specialization. Portfolio of Indian Healthcare Tourism Offerings: This includes non-surgical medication complemented with Yoga therapies; unani and homoeopathic streams of medical care are in vogue. India is at an advantageous position to tap the global opportunities in the medical tourism sector. Its role is crucial to the development of medical tourism. The government should take steps in performing a role of a regulator and also as a facilitator of private investment in healthcare.Mechanisms need to be evolved to enable quicker visa grants to foreign tourists for medical purposes where patients can contact the Immigration Department at any point of entry for quick clearance. Tax incentives to the service providers, import duty reduction on medical equipment, committees to promote and foster medical tourism are some of the initiatives that can be devised. There is also a need to develop robust infrastructure in terms of transpo rt services to facilitate tourism in India. The tourism, health, information and communication departments need to work in tandem for efficient patient care.It should aim in building and promoting the image of India as high quality medical tourism destination, creating and promoting new combination of medical tourism products, keeping up the high standard of quality treatments at a reasonable price, providing informative online and offline materials and make them available to the potential customers. It should place a help desk and multi-lingual at different airports for medical tourists seeking information in various aspects. The fountainhead of India’s competitive advantage arises from the skillful use of its core competencies.These competencies are used to gain competitive advantage against rivals in the global market. Also attaining the accreditation/standard to reassure the quality of treatments as well as emphasizing on the needs and demands of the existing target marke ts must be incorporated. References ?Dr. Suman Kumar Dawn & Swati Pal, International Journal of Multidisciplinary Research ? Dr. R Gopal, The key issues and challenges in medical tourism sector in India (A Hospital perspective) ? Jyotsana Mal, Globalisation of Healthcare: Case studies of Medical Tourism in Multi-Specialty Hospitals in India ? Journals on HealthCare and Medical tourism

Monday, July 29, 2019

Zero 2016 Assignment Example | Topics and Well Written Essays - 250 words

Zero 2016 - Assignment Example Real home gives person confidence in own power to have a better life (ProvidenceJournal). Also, this program helps people to understand that they are not left behind. 3. The campaign targets chronic and veteran homeless people who are promised to be given an affordable housing during next two years ( «Zero: 2016 »). Basically, the campaign helps senior people who need someones help to have a better life. The campaign is powered by public and private sponsors who invest in affordable housing, training and rehabilitation for the homeless. It creates an environment where people can learn how to live in a different way. 4. The theme of the campaign is the permanent struggle with homelessness in the USA. Initiators of the campaign believe that shared learning environment and active community involvement can end homelessness faster than other conventional methods used to take homeless people away from streets. This campaign follows another successful campaign against homelessness called 100,000 Homes.  «Community Solutions Announces Selection of 71 Communities to Participate in Zero: 2016 ». Community Solutions. November 4, 2014. Web. December 15, 2014. ProvidenceJournal.  «More than a place to sleep: In R.I., a housing first solution for chronic homelessness ». Youtube. June 25, 2014. Web. December 15, 2014. < https://www.youtube.com/watch?v=4Bi5rzDs1zE&feature=youtu.be

Sunday, July 28, 2019

Second most income for saudi arabia Essay Example | Topics and Well Written Essays - 1750 words

Second most income for saudi arabia - Essay Example The country’s stability in both its religious and economic status makes it one of the most prestigious Islamic States. Saudi Arabia’s strict adherence to Sharia Law and religious rituals has made the country a significant religious center in the world. The country is largely occupied by the Sunni Muslims, who account for more than a third of the total population in Saudi Arabia. This essay will cover the impact of the two pilgrimages, Hajj and Umrah in Saudi Arabia’s economy while also citing the respective countries that attend these pilgrimages. The Hajj and Umrah are important rituals in the Islam religion; the practices are conducted for religious dedications as well as acts of solidarity among the Muslims in the entire world. For instance, the Hajj pilgrimage is attributed to the great prophet Muhammad, which dates back to the seventh century. Although Umrah is optional unlike Hajj Muslim turn in great numbers to mark the practice, which is symbolic of their Islamic faith. The Hajj is a requirement for all Muslims at some point of their lives as long as they are financially and physically able. The continuous practice of these two pilgrimages over the years have not only improved Saudi Arabia’s economy but also strengthened the Islamic faith among Muslims worldwide. Millions of Muslim visitors who go to perform the annual Hajj and Umrah spend billions of dollars in Mecca. Al-Monitor states that the revenues generated from Hajj and Umrah in 2012 were about 62 billion riyals, which were a 10% increment compared to the previous year. The reports also indicate that out of the three million pilgrims who attended the Hajj ritual in 2012, 1.7 million were foreign visitors. The pilgrims were organized according their nationalities, out of the 189 different countries that the pilgrims had come from. According to Al-Monitor, the expert sources that provided the estimate statistics also indicated

Saturday, July 27, 2019

Personeal Development Planning (PDP) Essay Example | Topics and Well Written Essays - 5500 words

Personeal Development Planning (PDP) - Essay Example Moreover I have also observed how they analyse a candidate during the interpersonal process and at the same time make them feel comfortable. Although the feedback that I received from my peers was largely positive, my supervisors have clearly pointed out certain inherent drawbacks that I have. However, through extensive reading I have learnt a lot about effective interviewing and I have also applied the knowledge so gathered during mock-interviews that I had arranged with the cooperation of my colleagues. During the process I have realised that my technical acumen has to be honed and currently I am working on this area. On a whole the feedback from my peers has been good and they have encouraged my efforts. I have come to a decision that I will continue to read more in order to analyse the behavioral aspects of the interviewing process so that I can get rid of the personal biases that my supervisors have pointed out in me. I am hopeful that the successful manifestation of my short-te rm as well as long-term objectives will help me perform even better as an interviewer. 3. Mail from the peers – (2.3) – They appreciated my ability of active participation, multitasking & managing mails from co-workers – (2.4) – Congratulated me after the team won the lawn tennis match. One needs to have good time management skill in order to be successful in life. Hence I decided to improve my time management skill as far as possible. I feel all my efforts assisted me to overcome the habit of mealtime management. Now I can plan my schedule as per the priority order which I feel has helped me to implement my plan effectively. My on-job trainings taught me how to finish ones work in a more organised manner. With time I realised that time management is a combination of both art and science. One need to be logical while segregating the time into different activities. From my early college days my study pressure made me forego cultural programs of any kind;

Friday, July 26, 2019

Management in Nursing Essay Example | Topics and Well Written Essays - 1500 words

Management in Nursing - Essay Example Sundry Issues on Nurse Managers’ Leadership / Management Styles: Reflective Essay There has been a distinction cited between leadership and management. In particular, it has been noted that leadership is just one of the numerous desirable facets that a manager ought to have. The eventual goal of a manager is to optimize the productivity of the firm through effective administration. To carry this out, the manager must effectively carry out the functions of organizing, planning, staffing, directing, and controlling. Thus, leadership is said to only be a single aspect of the directing role. Moreover, Predpall (1994) suggests that senior management must manifest profound involvement and be a role model; such involvement by senior management cannot be delegated. There are several noteworthy issues which I have had the opportunity to reflect on during the course of my clinical placement. My insights were analyzed in light of the different leadership styles, and the strategies employed by each nurse manager who exhibited the style. The first leadership style, that of the autocrat, leads through the use of unilaterism to achieve one objective. This style, on the whole, requires that the leader exert constant pressure and directing from the leader to accomplish results. In addition, a prevalent outcome is submissive resistance from subordinates.

The British Industrial Revolution Essay Example | Topics and Well Written Essays - 2750 words

The British Industrial Revolution - Essay Example It is a period of modernisation is various aspects of life including social changes and other economic changes that signify a great stride in the life of the society. Industrial development of any society is closely related to the innovations which help to change the nature of life of the society. It is marked by large-scale development of energy. In this case there is increased use of energy and metallurgy production. Industrialization also comes with philosophical changes in the societies. In this regard the society adopts different attitudes toward the surroundings and most of all a changing perception of the nature and the components of nature. There have been arguments on the methods that are used to measure the level of industrialization of any nation. There are some who use the amount of energy that is being used by a nation to measure the level of advancement while at het same time there are those who use other aspects of civilization like advancement in education and social life in order to gauge the level of industrial. However industrial has been described as a period of general development which cannot be measured using one aspect only. This means that there are various political and social changes in light of the economic development that are taking place. There are some factors that have been identified by key researchers to gauge the level of industrialization. Some of these factors include a favourable political-legal environment for the advancement of commerce and industries, abundance use of natural resources and plentiful supply of low cost labour which is able to suit the demands of the world. Industrial revolution in England England was one of the states which experience industrial revolution as early as 1700s. Between 1760 and 1860, there was a marked period of technological progress which was also reflected in education and increasing capital stock in the market. This helped to transform England from a pre-industrialized nation to a full industrialized nation. There were different chains that were taking place in the society from the agriculture, manufacturing and transportation sectors which helped to shape the socioeconomic life of the people. There was also a profound change in the culture of the people which spread the whole of Europe though the 18th and 19th century. In the 1700s, there was a great replacement of manual labour in Great Britain with one dominated by machines. This stated with the seemly mechanisation of the textile industry which was aimed at making sure that there was efficiency in production. There was the development of the iron-making technology which increase the use and the refinery of coal. There was increased trade between different communities and European counties due to the introduction of canals, improved roads and railways. There was increased capacity of production of textile industry with the invention of the steam power which used coal as the main energy and powered machinery which was used in the textile industry. The development of the metallic machine tools helped to facilitate increased production in the manufacturing industries. From the first revolution to the second industrial revolution, there were eminent changes that were taking place in the society and which helped to set a difference between the England society and the rest of the world.

Thursday, July 25, 2019

To what extent have the fair-trade initiatives increased standard of Research Paper

To what extent have the fair-trade initiatives increased standard of living in West Africa - Research Paper Example The paper tells that since the end of World War II, the industrialized countries of the world have been befitting from consistently increasing world trade patterns. International trade fuels both national economies and the international economy, determining the wellbeing of individual States, and directly affecting the standard of living of the population of every country in the world. In West Africa, the Economic Community of West African States (ECOWAS) is the overarching economic and political structure, within which unrestricted trade is meant to take place. This structure was set up to promote â€Å"cooperation and integration† leading to an economic union in West Africa â€Å"in order to raise the living standards of its peoples†. A Pan-Africanist slant is also evident in that the intention to promote progress and development on the whole continent is explicitly stated. Thus a common market was an original intention; regional economic reform would have to take pla ce; integration particularly in food, agriculture and natural resources was seen as vital; and the establishment of a common market through liberalization of trade among West African States was envisioned. An important aspect of the ECOWAS initiative is also to ensure a â€Å"common external tariff† and trade policy with regard to third countries. Additionally, a stated intention in the ECOWAS revised treaty is to promote â€Å"balanced development† and a focus on the â€Å"special problems of each Member State particularly those of land-locked and small island Member States†.... This has not happened. The elites – both within countries and within the region continue to be advantaged, while the poor continue to grow in number, and in levels of poverty. Analysis surrounding the economies of West Africa, their political stances, and their trade policies, as well as the world economy, and West Africa’s part in it will be examined in this paper. The information from the analyses is organized in the Findings Section, to show the realities of the situation in West African countries and their economic relationships with particularly the Western, developed world. In the Comments and Recommendations Section of this essay, it is proposed that the exploitative relationship which has existed between African developing or underdeveloped countries (and other developing countries) since slavery and colonialism has not been redressed. Instead, initiatives such as Free Trade agreementsNote that this has been introduced earlier, extensively within associations su ch as the Economic Community of West African States (ECOWAS) have no chance of success because of the nature of the trade balance which continues to exist between developing countries and the developed world. All that is maintained is the advantage of the Western power blocs over the developing world, in the guise of aiming to stimulate and improve conditions in these countries. The essay concludes with a summary comment on the nature of the economic, political and power relationships between the countries of West Africa, as well as ECOWAS and the world. Analysis There tends to be a bias toward the economic principles, values and norms of the West in much writing about the economics of West Africa

Wednesday, July 24, 2019

Corrections trend Evaluation Research Paper Example | Topics and Well Written Essays - 1500 words

Corrections trend Evaluation - Research Paper Example The changes in the correction programs have occurred due to the rising count of the number of prisoners. Moreover, growing concern with regard to the rules as well as the regulations for the safety of public and reducing incarceration cost have resulted in the modification of the correction programs. These changes are majorly made with the intention of reducing inmate population and minimizing cost (Adams, n.d.). The paper intends to discuss the trends of correction programs for the development as well as the improvement of the correction institutions. Moreover, an analysis will be executed with the objective of identifying the issues in relation to prisons and their administrators both in the present and future prospects. Discussion Research Prisoners or offenders are offered with correction programs and are convicted to correction institutions with the aim of minimizing crime rates and changing their criminal behavior and attitude. In the past, prisoners or offenders were observed to be treated in an inhuman manner and they were punished in physical forms which include being tortured and hanged among others. The prisoners were treated as slaves mainly due to inadequate funding or resources availability and development (Hartnett, n.d.). In this respect, with growing number of offenders and inadequate funds, prisons as well as jails were privatized in order to improve the operations and to render enhanced development of correction institutions. The privatization of prisons as well as jails will facilitate in minimizing cost. By the year 2001, in the US, there were around 158 correction facilities owned by private sectors operating in almost 30 states. Privatization of prisons as well as jails was the major trend in the past in order to cope up with the increased demand and operational costs. In this respect, the government has contacted the private sector with the motive of acquiring adequate financial assistance as well as to construct correction facilities at a cheaper rate as compared to public prisons (Austin & Coventry, 2001). Number of Prisoners from 1925 to 2010 Source: (The Sentencing Project, 2012) In the US, offenders or prisoners are observed to be offered with two different sorts of sentences which include treatment and punishment. Treatment implies that society is protected by implementing correction programs with the objective of changing the criminal behavior of offenders through rehabilitation. On the other hand, punishment signifies that society is protected by incarceration of offenders. It has been realized that there are various phases on the basis of which changes are acquired in the correction programs or facilities. The correction programs started with the development of reform movement for the disposition of prisoners to jails in order to minimize and control crime. In 1920, more prisons were developed and various educational and corrective programs were implemented in order to improve the behaviors as well as atti tudes of offenders. In the period between 1930 and 1940, importance was placed to medical model for better treatment of inmates. Moreover, during these periods various therapies including psychodrama and transitional analysis among others had been adopted with the objective of improving the treatment procedures. In 1970s, it was observed that treatment or rehabilitation of prisoners was a failure due to increased crime rate.

Tuesday, July 23, 2019

Pr campaign brief Coursework Example | Topics and Well Written Essays - 750 words

Pr campaign brief - Coursework Example We shall stress on the advantages of building the bypass and at the same time try to counter any adverse reaction. My firm will present its ideas to the relevant authorities with the full realization that while it may not be their responsibility to buy these ideas, it is our responsibility to sell them. We will therefore try to have these authorities interested by stressing on the importance and urgency of the project (Deegan, 2001). Our petition to the House of Commons will be aimed at facilitating any kind legislation needed to undertake this process. We shall present the risks posed to the inhabitants and the vehicle drivers by the numerous vehicles passing through the village centre. We shall particularly present the risk of fatal accidents to the residents, school children, senior citizens and other members of the Ponteland and Darras Hall community as well as the drivers. In addition, we shall present our concerns about the centre’s pollution, traffic congestion and the traffic slows down; leading to longer travel time, fuel wastage and loss of timing for the vehicles. We shall also present the overwhelming support this proposal has received, not only from the community, but also other organisations such as AA, RAC, the British Coach Operators Federation and the Freight Drivers Association. To achieve this goal, will create awareness through methods such as radio talk shows, protest meetings and media coverage to increase pressure on the MPs. Moreover, we shall use posters, stickers and other methods to publicize the issues and carry out door to door canvassing to enrol more and more members. From our cost-benefit analysis, we shall show the Department of Transport and the ex-chequer that even though the bypass will cost some amount of money, its long term benefits will be much more than the cost of building it. We shall bring to their attention the immense saving they will make in

Monday, July 22, 2019

Gothic Cathedrals Essay Example for Free

Gothic Cathedrals Essay Gothic architecture flourished during the Medieval times or Middle Ages. It evolves from the Romanesque style of architecture. The best example of Gothic architecture are the Gothic Cathedrals, specifically the La Sainte-Chapelle Cathedral in France and the Salisbury Cathedral in England. This paper will discuss the main and identifiable features of Gothic Cathedrals and explore the changes and evolution in floor plans and sculptural program of the exterior of the church from a stylistic and conceptual point of view. It will also explain how Christian religion’s needs and preoccupations changed overtime by using the buildings of La Sainte-Chapelle Cathedral and Salisbury Cathedral. II. Identifiable features: pointed arch, flying buttresses and ribbed vaulting The three most noticeable characteristic of Gothic Cathedrals are its height (tall), spaciousness and good ventilation (light). This is made possible by the development of new style technology, the pointed arch, flying buttresses and the ribbed vaulting. Prior to the use of pointed arch, the roofs of churches in the olden times were supported with a rounded arch. However, architects discovered that with a pointed arch, they can build taller buildings. With a higher building came a new type of buttress that takes care of the weight of the roof by supporting the walls from the outside by leaning arches called â€Å"flying buttresses† which are usually placed one above the other. As a result walls could be made taller and less massive, enabling a wide expanse of wall space for stained-glass windows. Meanwhile, the idea of ribbed vaulting also becomes popular. Instead of the groin vault of the Romanesque period, the Gothic architects discovered that ribs (diagonal arches) could be built that would support the entire weight of the roof. The space between the ribs could then be filled in with lighter material (Dudley Faricy, 1973, p. 291-295; Perry, 1988, p. 189). With the adoption of these three technological styles, the Gothic cathedrals as compared to the somber, dark churches that preceded it are much higher, lighter and more spacious making it more inviting for the Christians. On the other hand, the concept of allowing more light inside the church is derived from the concept that God is Light. As much as possible partitions in the floor plans were removed so that a dazzling light will emanate from the choir toward the congregation. Moreover, the concept of building tall churches with tall towers and spires conveys the idea of the supremacy and importance of Christian religion in a person’s life especially that it towers above all other buildings surrounding it. Such are the qualities and impression that La Sainte-Chapelle Cathedral and Salisbury Cathedral projects. Both two cathedrals still uses the cross floor plans, the Salisbury cathedral, however, though it contained two transepts, is much simpler than the La Sainte-Chapelle which was built upon the order of the fashionable French monarch, Louise IX. La Sainte-Chapelle is elaborately decorated, the elaborate ornamentation conveying the idea of the wealth of the church and hence the prosperity of the Kingdom (Scott, 2003, p. 21-23; Vauchez, 2000, p. 1228). II. Reflection of Christian needs and Preoccupation of the Middle Ages The Gothic cathedrals, although took many years (even centuries) to build, first began to be created during the Middle ages, a time characterized by feudal wars ,famine and epidemics. In spite of these unfavorable conditions, the Christians took the effort to make a big church, as an expression of their Christian devotion. One notable feature of Gothic stained glass windows, as seen in the two cathedrals, are the paintings of Biblical characters. The primary purpose why they paint them all over the walls is so that the illiterate could picture out what was written in the Bible (Perry, 1988, 189). Le Sainte-Chapelle, howvere, housed important Christian relics collected by Louise IX signifying the preoccupations of the rich Christian monarchs with anything regarding Christianity. The facade of Gothic cathedrals are also elaborately decorated using sculptured human figures ( saints ,kings and peasant life) as the main features, illustrating their growing interest in humanism ideas ( human life and accomplishments) as it replace the usual carvings of animals, fruits and other figures. The story of Christ, specifically his incarnation, decorate the entrance of the church, urging whoever will pay homage or pilgrimage to the church not to admire its gold or cost but to focus their attention to Christ ( Dudley, 1974, p. 291; Scott, 2003, pp. 47-48) . II. Conclusion Gothic Cathedrals, like the Salisbury Cathedral and La Sainte-Chapelle, are the best representative of Gothic art. The knowledge of new style of architectural technology by using a pointed arch, flying buttresses and ribbed vaulting paved the way for a taller , more spacious and well-lighted or ventilated churches. It erased therefore the somber, gloomy aura of the Romanesque churches, and the new concept of God as Light and Supreme was successfully incorporated into the church structure. In spite of the presence of wars, famines and epidemics, this ambitious project was embarked on, signifying the Christian devotion of the people of the Medieval era. Works Cited Dudley, Louise and Austin Faricy. The Humanities, 5th edition. New York: McGraw-Hill Company, 1973. Perry, Marvin. A History of the World. New York: Houghton-Mifflin, Inc, 1988. Scott, Robert A. The Gothic Enterprise: A Guide to Understanding the Medieval Cathedral. Berkeley: University of California Press, 2003. Vauchez, Andre, and et al. Encyclopedia of the Middle Ages. New York: Routledge, 2000.

Sunday, July 21, 2019

Strategies to Protect Sensitive Corporate Data

Strategies to Protect Sensitive Corporate Data Jasjeet Singh What are the steps project managers must incorporate to uphold the security, privacy and disaster recovery policies to prevent Companies sensitive and vital corporate Data? Abstract Security, disasters and privacy are risks to a project and to a project manager. But project managers are trained to deal with risks. These risks are best addressed when the project manager fully understands them. In a nutshell, we can say its all about protection of vital data and its critical element CIA(confidentiality, integrity, and availability) including the machines and process that use, store, and transmit that data. Security is a risk to project managers for both implementing a project and perhaps the project itself if it is IT or telecom related. In this paper, I will include the data security risks facing a project manager, How to protect the CIA Triad using various security policies, standards, and procedures. And I will try to touch some more information security related aspects like Security Awareness and privacy protection, etc. Keywords-Project management; Project Manager; Data Security; Privacy; Security Policies; Confidentiality; Security Awareness. Almost every project generate or use, some form of information and information technology. Mostly, this information needs to be preserved or isolated by some form of security. Security planning and implementation is an integral part of the overall project life cycle which also include many different issues to be considered when planning a project. Whereas finally what is being safeguarded is the data produced by the machines, the information that data is used to create, and in some manner, the conclusions made based upon that vital data. A security threat is something that jeopardizes any of the CIA Triad (availability, confidentiality, and integrity) of a machines data. Security flaws and risks emerge from such threats. Solutions and planning to manage such items begins in the very initiation stages of a projects life with the identification of any of these security related flaws, risks, and threats. In parallel with each phase, efforts work towards constantly identifying new threats and reducing the identified security risks through the diligent planning and proper implementation of risk mitigation strategies specifically developed to resolve each unique threat specifically. Security of vital data and associated technology systems must be considered when planning projects, developing applications, implementing systems, or framework etc. So as to be effective and efficient, security must be organized for and embedded into the systems from the very starting, and monitored periodically throughout the life of the proje ct, and be maintained all along the life of the system. Thereby the result is planning as soon as possible in early stages and embedding security into all phases of a projects life cycle is usually considerably easier and much less cost consuming than waiting till the later project phases to consider it. On the moment when addressing the security for the majority of the data frameworks, it might be a chance to be decayed under three principal segments that are; communications, hardware, and software. Arranging how every from claiming these zones may be ensured includes not the main attention by the people, policy, practice etc. and also, financial considerations with furnish for those Audit from claiming the framework, asset procurement, execution of security solutions, progressing security maintenance and so on. Figure 1: CIA Triad The image shows the main goal of such efforts which are to maintain the availability, confidentiality, and integrity of vital information. All information system must maintain: Confidentiality disclosure or exposure to unauthorized individuals or systems is prevented Integrity data cannot be created, changed, or deleted without proper authorization. Availability information and the security controls used to protect it are functioning correctly when the information is needed.   Ã‚   An ordinary Project Management technique doesnt incorporate subtle elements regarding guaranteeing integrity, confidentiality, Furthermore availability for the majority of the data or those protections about particular data. Background need to be demonstrated that mostly the information security or privacy experts would not consult regarding the undertaking until those test phase, alternately much more terrible The point when the project needs with be marked off or executed Also about to go live. These conditions will feel thick, as commonplace on the majority of the data security experts Also privacy officers indistinguishable. This cautiously might prompt postponements previously, sign-off Whats more go-live alternately significantly more repulsive another information skeleton being moved under preparing without expanding security Also security controls completed. This means exploitation of risks such as: Breaches of legal requirements, for example, the Privacy Act, Unauthorized access to systems and information, Disclosure of information Moreover bolting on security instruments controls alternately privacy controls toward those end of the development, for example, another provision or the usage of a new data framework is really unreasonable Furthermore drawn out. Data information and framework security Whats more security methods oughta chance to be inserted under the organizations venture administration procedure. This ensures that majority of the data security Also security dangers would identify, assessed, figured out how Whats more tended to ask and only an undertaking. This approach Might make associated for during whatever endeavor regardless to its character, e.g. an endeavor for focus profits of those business process, IT, office organization Moreover different supporting manifestations. Venture supervisors would continuously set under a considerable measure from claiming weight to guarantee they convey on time Whats more inside plan. On accomplish execution of a secure Also industry consistent legitimate a dministrative necessities data system, it may be vital to take part for the majority of the data security and security topic masters from those minute a feasible ticket may be recognized to Creating. The two main approaches to project management are: The waterfall approach (delivery is all-in-one-go, for example, Prince 2 and PMP); and A release-based iterative approach (delivery is in bursts of functionality spread over time, for example, Agile Scrum/Sprint methodology). Both methodologies need pros Furthermore cons Furthermore, we wont talk about whatever points of these two approaches, rather it takes a gander during the place whats more entryway data security Also privacy ought to a chance to be joined under those project management cycle, in any case about which methodology is picked. Process Steps Everyone dares organization methodologies to take after a tantamount high-cap convert starting with asserting 4 alternately 5 steps, in the passages underneath those steps to that Agile technique would previously, (brackets). Every for these steps needs their goal/objective, in addition, an arranged starting with guaranteeing deliverables to that step. For every to these steps, those one assignment director ought to should incorporate a security proficient. Incorporating security under exercises beginning with that start will Abstain starting with each moment abstain? In addition (often very) irrationally additions later on in the project. The individuals taking then afterward slug concentrates give to an Audit of the lions share of the information security Also privacy-related considerations for each phase. More details on this topic can be studied on the internet. Scope/Initiation/Discovery (Stage 1 Vision) Might be specific information included in this project alternately converted at that passed on information system? Assuming that something like that the individuals or security officers necessities around an opportunity to be contacted at this stage. What is the order alternately affect the ability of the data processed? Ensure that the Information Security Officer (or equivalent role such as ICT security, CISO, ITSM) is involved in communicating security requirements; these must be an important part of the business needs. Is there a requirement for compliance with legal or regulatory needs, national or international standards (ISO27001) or contractual security and privacy obligations? Business Case/Planning (Stage 2 Product Roadmap and stage 3 Release Planning) Indulge with the respective subject matter professionals to discuss in detail the security and privacy needs, so they can be implemented during the design of the project. Pre-define the acceptance methodology for all the business needs, including security and privacy protection. Identify security and privacy risks and perform risk and privacy impact assessments. Depending upon the results of these assessments, identify security and privacy countermeasures and techniques which need to be included in the design. Development/Execution (Stage 4 Sprint Planning and Stage 5 Daily Scrum) During the design implementation the identified security and privacy controls? Perform compliance checks and security reviews against requirements and selected controls, against existing policies and standards. communicate with external security experts such as penetration testers, code reviewers, and auditors, etc Plan for performing vulnerability scans (internally) and checking of the patch fixing status. Consider meeting the Operations team that will handle the solution from a security perspective after moving on to production. Test Evaluation/Control Validation (Stage 6 Sprint Review) Indulge with security and privacy subject concern experts to assist with communicating and understanding the resulting reports (test). Execute all security testing: penetration test, code review and/or ISO audit. Have Security operations team go through with the operational documentation? Regularly check the risk register and review all risks, based on the solution as it has been formulated. Launch/Close (Stage 7) Pass on the formulated security and privacy treatment plans, which have been accepted and agreed by the business owner. Start the business normally with security operations, monitoring of risks and compliance. Milestones or gated Approach The waterfall project management techniques discuss that for managing Also controlling the one project phases, An amount from claiming checkpoints, turning points or gateways ought further bolstering be presented. Figure 2: Gated approach The main motive of these gateways is to make sure that all criteria or needs are fulfilled or not, all required deliverables for that phase are done or not, and to review if the project is still on time/within budget. These gateways are the instances in time during a project where security and compliance milestones can be introduced to safeguard that the project in compliance with all agreed business needs, including security and privacy formulations. Underneath are some checks, decisions, and lists that should be implemented from an information security and privacy point of view: Scope gate High-level business, information security, and privacy needs identified. The seriousness of information assessed and considered. Business case sign-off gate By in-depth study on the risks assessment, note down all security and privacy controls and procedures. In-depth security and privacy requirements formulated and acceptance criteria accepted upon. Indulge with IT design architects and information security subject matter professionals to compose a Risk management Plan (which will include a resource plan/budget). Maintain a risk register that lists down all privacy risks, security risks, and initial level of risk (gross risk). Design sign-off gate Assessment of privacy, security and reviews and compliance points against agreed sign-off criteria. Go through the project risk register that lists down all security risks, privacy risks, and potential residual risk. Communicate with 3rd parties to agree on the scope of a penetration test, Certification Accreditation audits, code review or other security tests that are been outsourced. Communicate with the operational security team to put forward the solution and manage if the document set is complete, acceptable and up-to-date. Final business sign-off gate Check weather all formulated security and privacy controls and procedure implemented as designed? The job of Information Security is primarily to ensure CIA in place but there is a common misconception that only IT is responsible for it. But theyre not!! Then who is responsible for Information Security in your organization or say for the project youre managing? Lets think of below: Who is the information owner in the organization for this project? Its senior management or business heads (on behalf of the customer). Remember IT is the custodian of information while the owner will decide about classification and protection/access requirement. Who is to understand and conduct impact assessment? The owner should be the one who is gonna tell us how important ( or say risk level) the information is and assess what will happen if we fail to protect. How to secure information flow/process in your project? Once you understand customer or owners requirement and the impact, now Project Manager has to play the role. However, PMs are not expected to be security experts but be fully aware of it. PM is the one who: Should understand what are information risk concerning his/her project Interpret impact to senior management and customer for security issues Need to be able to decide on appropriate mitigating action Minimize the risk associated with information security threats/breaches. Include security considerations is integrated into every phase and process of a projectà Ã‚ ¾ and Ensure adherence to policy and standard/compliance So need to include Information Security within the project process right from the Initiation. We can fit it in when developing Project Charter Business Case  ­ Consider Impact Assessment on proposed product service from information risk perspective and also must include information security safeguard and issue during cost benefit analysis. Discuss and identify security features/requirements to be added. Project Statement of Work  ­ Review product scope to identify info. sec requirement and incorporate any additional Customer requirement for specific info ­sec standard compliance Organizational Process Asset  ­ Internal Information Security Policy, Standard and Procedure and also security control and audit requirement for process systems including a stipulated in RFP. Enterprise Environmental Factors  ­ In addition to Legal Regulatory requirement may need to consider industry standard practice on Information Security. Formulated security testing reviewing the results and make a decision if things are acceptable or not. Project Plan integrate information security Scope Management Collect Requirements Legislation, regulation and customer expectations on information security and make sure you know how you will be able to measure whether above requirements are met? Change Control process should always consider IS impact during approval/review. Data Classification should be approved by management and customer and also define control requirements in the system, 3rd party and operational process for the data type. Identify all requirements on data storage, record management and destruction for the internal and external party and then prepare data governance/ handling policy and procedure for your project based on the above. Figure 3: Threat Activity model Procurement Identify critical supplier who can have a significant impact on project deliverable and responsible for handling restricted data. Do we need sign NDA? Require Audit right to review their process and controls? Have to safeguard from relevant security flaws appropriately resolved in all your third party contracts. Quality Control Quality will include security compliance on process and record management. Quality Assurance will perform security audit and review privilege (system +operational) to review data disposal and backup process. For effective measurement, need to identify appropriate PI for security control. Next, integrate within your Project Plan. Cost Time Ensure budget and schedule covered security related activities and controls. Stakeholder Management Cross-border data transfer and data privacy issue applicable? Regulatory compliance and approval required? Engage early with concerned parties to properly plan ahead. Monitor change in regulatory and statutory policy. How to maintain requests for information from government agencies and those results from legal process? Example: Regulators response and deadline may challenge project outcome. Project Risk Management Information Risk Assessment Lets review the basics once again: Define Information Risk  ­ Risk is a factor of the likelihood of a given threat sources exploiting a particular potential vulnerability and the resulting effect of that adverse event on the organization. Qualitative Risk Assessment A method can be Overall Risk Score = Likelihood X Impact. The likelihood is a chance of this event occurring in the scale of 1 ­5 or Very Likely, Likely, Maybe, Unlikely, Highly Unlikely etc. For example, whats the chance vendor the system will compromise our data during the project? The impact is how much effect once the risk (no control in place) in the scale of 1 ­5 or Critical, High, Medium, Low, Minimal. For example, what will happen to us once the data is compromised? Define overall rating for risk, For example, can be High if > 15, Medium for 10- ­15, and Low if When required should engage information owner, customer, and security function wherever possible and then assign monitoring responsibility and activities within a risk response plan. Quantitative Risk Assessment Annualized Loss Expectancy (ALE) is the expected monetary loss that can be expected for an asset due to a risk being realized over a one year period. ALE = SLE * ARO ­SLE (Single Loss Expectancy) is the value of a single event loss of the asset [impact] ­SLE = Asset Value x Exposure factor. [EF is what % of the asset will be damaged] ­ARO (Annualized Rate of Occurrence) is how often the incident can occur in a year [likelihood]. A risk occurring once in 5 years has an ARO of 0.05à Ã‚ ¾ while if occurring 10 times in a year then ARO = 10 Could use average = (Worst + 4*Average + Best) / 6. The above is kept simple and not perfect but better than nothing. Risk Response Cost Benefit analysis of feasible Safeguard/Control Compare ALE considering with and without safeguard control in place. Value = ALE (with NO safeguard) (ALE after implementing safeguard) (annual the cost of safeguard). Select Mitigation, Transfer, Acceptance, and Avoidance based on above. Note: SIME: Security Information and Event Management  ­ DLP: Data Leakage Protection  ­ DRM: Digital Rights Management. HR/People Manage Security with People Security Skills Assessment What are the resources and skill requirement for information security in your project? Does your security function have sufficient trained resources? Assign security management and appropriate level of authority to carry out this role. Security Awareness Security is not police job, rather we are protecting corporate information to safeguard our customer, our business and to comply with statutory requirements. All team members know their responsibilities to help establish security and comply with the policy. Set up ground rules on acceptable and unacceptable activities, for example, usage of social media, official email monitoring etc as per organizational procedure. Clearly, understand data classification policy and how to handle each type of data. Figure 4: Security Awareness Training Promote awareness campaign to motivate team members to be the safeguard of corporate information. Security breach/issue reporting and handling procedure should be clearly communicated. Discuss why we focus on information security and clarify concern during team building. Project Communication Secure what you communicate Comply with the security policies Comply with the policy from both client organization and project organization. In cases where policies overlap, the more restrictive policy will apply. Check whether supplier/vendor/outsource Company meets the same standard. Checkpoint for data transfers and storage Consider using method in which password protect the meetings and/or use the roll call system of the conferencing. Prefer to encrypt data during the distribution of meeting proceedings and another project documents via email. Select Instant messaging, desktop or application sharing/video conferencing via secured provider or channel. Check what information is acceptable to be left in auto responders and in voice mailboxes. Establish administrative controls Prepare Guidelines for use of social media and how to share project information. There should be guidelines or ground rules regarding forwarding work related email to personal or transfer to smart phones ­ Consequence of a security breach and data leakage should be clearly communicated. Project Execution Implement effective control Direct and Manage Project Work Segregation of Duties execution, and supervision of any process should not be performed by a single person and establish dual control or Maker Checker process on activity involving risk. Strictly follow approval and authorization limit for layered control on requesting a change. Reviewed authority and access right upon during staff transfer or exit from the project. Ensure appropriate labeling and storage of documents resulted from project activities. Remind importance of security awareness and to notify breach/incidents immediately. Engage with the supplier to increase security awareness with their employee as per your standard. Data backup and restoration should be periodically tested for project related system(s). Manage Communication When information requested by the supplier, check against requirement and policy before sharing. Maintain the record of send and receipt when documents are shared/sent to the 3rd party. Figure 5: Communication Management Discuss information security issue in the regular review meeting and notify formally when appropriate. Monitor Control Pro-active check and act Control Scope Risks Ensure security verification upon milestone achievement. Reviewed system logs, alert and process audit output to identify the potential incident. Monitor change in regulatory and other critical factors that may force information risk re ­assessment. Security Incident Management Assess impact Internal, Financial, Legal, Regulatory, Customer, and Media/Reputation. Do NOT underestimate any impact often serious consequence happens from simple case. Invoke organizational incident management process and escalate to senior management if required. Manage 3rd Party Risk Conduct an audit to see how Vendor/Outsourced company process, store and destroy your information. Review what formal information ( and their type) are being shared with external parties. Check with the critical supplier for Business Continuity drill as it may impact your project during any disaster. Project Closure -Secure disposal Formal Sign Off Conduct security audit with supplier and customer (if required) and document formal sign off. Ensure all project documents and necessary records are properly achieved. Document lesson learned from security issue and incident handling. Operational Handover Document to enforce security controls as recommended for regular operation. Revoke access rights from the system before dissolving project team. Formal handover production system, customer/business documents, manual or other records including backup data and electronic equipment containing information. Data Disposal Formally confirm with all project team members on secure destruction either stored in electronic format or paper-based document which no longer required. Confirm destruction from a supplier who may retain information belong to your company/customer. Conclusion Information Security plays a very important role in the development of every project irrespective of projects magnitude. So the project manager has to be very much alert and attentive to check and to meet the protocols so as to preserve the vital corporate data of the organizations during each phase of the project development. Figure 6: Template for Questionnaire to review security of project The project manager must use various new techniques to embed the security into the project from the very initiation phase one of such technique is to use Questionnaire to review the security of the project. Project Managers can also look for a new secured Software development life cycle model which incorporates all major aspects of the data security, privacy, and recovery for a software development. Figure 7: Secure SDLC Model Those A large cost savvy approach to managing security under products or techniques is to actualize all the security Furthermore privacy controls and mechanisms under the configuration, Including them later alternately. After the project needs to be run live, will be significantly a greater amount exorbitant and might diminish those Return-on-Investment of the project altogether. References [1] Security Issues that Project Managers at CDC Need to Address, CDC Unified Process Project Management, vol. 2, no. 6, June 2008. [2] M. Dean, A risk ­based approach to planning and implementing an information security program, in PMI, 2008. [3] B. Egeland, Learn 3 Ways to Ensure Your Project Data is Secure., Is Project Security that Important?, July 2, 2015. [4] R. J. Ellison, Security and Project Management, Security and Project Management | US ­CERT, February 06, 2006. [5] D. E. Essex, government database project outsourcing, A matter of public record, August 2003. [6] S. Fister Gale, Safeguarding the data treasure, February 2011. [7] S. Hendershot, Security guards ­ data ­security initiatives for Project Managers, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control), Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), September 2014. [8] C. Klingler, Security, privacy and disaster recovery for the project manager, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control) , Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), 2002. [9] Monique, Information Security Privacy as part of Project Management, 18 March, 2015. [10] M. Pruitt, Security Best Practices for IT Project Managers, SANS Institute, June 18, 2013. Table of Figures Figure 1: CIA Triad: https://www.checkmarx.com/wp-content/uploads/2016/06/Data-Securi

Formulation And Production Of Various Types Of Detergents Biology Essay

Formulation And Production Of Various Types Of Detergents Biology Essay Detergents are cleaning agents which play a very important role in our daily life. They not only can help us to stay care, health for our homes and wealth, but also can make our environment more pleasant and active. According to the different functions and usages, detergent can be classified into various types which are laundry, household, personal and dishwashing cleaning products. Besides that, these different types of detergents can also be further classified into powder, cake, liquid and others depending on their texture form. Among the various types of detergents, the formulation and production of solid and liquid laundry detergents are going to be described by giving examples. Laundry detergent is a type of detergent used to clean and rinse the laundry things. Different kind of detergents will be formulated from different substances in order to meet the requirement of cleaning and the manufacturing process will also be slightly different. Generally, laundry detergents are formulated from six groups of matters which include surfactants, builders, bleaching agents, enzymes, fillers and other minor additives. An example of solid laundry detergent that I would like to illustrate is a solid laundry detergent containing light density silicate salt. It was invented by Nigel Patrick Somerville Roberts in 2009.  This detergent is formulated from light density silicate salt, detersive surfactant, carbonate salt, sulphate salt, phosphate builder, zeolite builder, enzymes and other additives. These formulations are going to be described in detail. This type of detergent contains light density silicate salt that is usually a sodium silicate salt. This composition is considered to be the most important in this detergent because this is a detergent which specially contains light density silicate salt. The light density silicate salt is 1 wt% 40 wt% and has a bulk density of less than 200 g/l or 150 g/l. Sometimes, the density is even less than 100 g/l. Besides that, it has a weight average particle size of less than 300  µm, 200  µm or 100  µm. The light density silicate salt can be got from a flash-drying process. It has been found that adding the light density silicate salt into other ingredients can make the detergent to be produced through conventional set processes and even a set of single mixer processes. Besides that, light density silicate salt or sodium silicate salt added acts as a corrosion inhibitor, so it can prevent materials from rusting. Furthermore, the ingredient of the detergent also consists of 5wt% 60 wt% detersive surfactant. Surfactant is an organic compound which can be obtained through a chemical reaction involving fats or oil as raw materials. Since surfactant has emulsifying, wetting and dispersing properties, it is able to remove dirt from clothes and keep the soil suspending on the water, so that soil will not stick on the clothes and can be easily rinsed away. There are different types of surfactants which include anionic, cationic, non-ionic, amphoteric and zwitterionic detersive surfactants. Among these detersive surfactants, anionic detersive surfactant is preferred to be used as surfactant in this detergent. Alkoxylated alcohol sulphate anionis detersive surfactants such as substituted or unsubstituted, linear or branched ethoxylated C12-18 alcohol sulphates, linear unsubstituted C10-13 alkyl benzene sulphonates, alkyl sulphates, alkyl sulphonates, alkyl phosphates, alkyl phosphonates and alkyl car boxylates are suitable to be anionic detersive surfactants. Besides anionic detersive surfactant, cationic detersive surfactants such as mono-C6-18  alkyl mono-hydroxyethyl di-methyl quaternary ammonium chlorides, mono-C8-10  alkyl mono-hydroxyethyl di-methyl quaternary ammonium chloride, mono-C10  alkyl mono-hydroxyethyl di-methyl quaternary ammonium chloride and mono-C10-12  alkyl mono-hydroxyethyl di-methyl quaternary ammonium chloride, and non-ionic detersive surfactants such as C12-18  alkyl ethoxylated alcohols and C8-18  alkyl alkoxylated alcohols may also be added into the solid laundry detergent. Although surfactant is not effective in hard water, its detergent property is also incomplete in soft water. In addition, one of the ingredients included in the solid laundry detergent is builders. Builders are used to remove magnesium and calcium ions which are present in the hard water or soils, so that the quantity of surfactant added to execute the detersive action can be reduced. Some builders can also prevent magnesium and calcium salts from precipitating on the clothes. In this kind of solid laundry detergent, 0 wt% to 30 wt% phosphates and 0 wt% to 5 wt% zeolite builders are used. If the component of the detergent which has a very good environmental profile is desired, then phosphate builders are preferred. On the other hand, if the composition of the detergent is desired to be highly water soluble and transparent wash liquor, then zeolite builders are favoured. Therefore, depending on different requirement, different type of builders is needed. Phosphate builders include sodium tripolyphosphate whereas zeolite builders consist of zeolite A, zeolite P, zeolite X and zeolite MAP Moreover, the detergent also comprises from 0 wt% 50wt% of carbonate salts to maintain the alkalinity. Sodium carbonate and sodium bicarbonate can be used, but thereof, sodium carbonate is more preferred. In order to enabling the adjustment of the active matter in the laundry detergent to the amount used, 0 wt% 40 wt% of sulphate salt such as sodium sulphate in powdered form is also added. The sodium sulphate which is a filler product can also be used to dilute powdered detergent. Solid laundry detergent also formulated from bleaching agent which is used to remove immovable soil and guarantee sanitation by killing bacteria through an oxidation reaction. It is usually carried out by peroxygen generator such as sodium percarbonate salt is more preferred. Besides that, bleach activator such as tetraacetyl ethylene diamine, imide bleach activator such as N-nonanoyl-N-methyl acetamide, oxybenzene sulphonate bleach activator such as nonanoyl oxybenzene sulphonate, caprolactam bleach activator, polymeric carboxylates and preformed peracids may also be added in order to activate the bleaching agents. Enzymes such as amylases, cellulases, lipases, carbohydrases, proteases, laccases, oxidases, peroxidases, pectate lyases and mannanases are also added into the detergent to catalyse the degradation of soils and then help the elimination. Some minor additives like suds suppressing systems, fluorescent whitening agents, photobleach, fabric-softening agents, flocculants, dye transfer inhibitors, fabric integrity components, soil dispersants and soil anti-redeposition aids, anti-redeposition components, perfume, dyes, sulphamic acid and citric acids are also added in small quantities to effectively improve the specific washing properties. In order to produce solid laundry detergent, there are three different ways which are dry mixing or blender process, agglomeration and spray drying process. Among these three methods, dry mixing and agglomeration are more common. For dry mixing or blender process which is a manufacturing method used to blend dry raw materials, all ingredients are firstly loaded into either ribbon blender or tumbling blender. Ribbon blender is cylinder-shaped and blades are fitted inside the blender to scratch and blend ingredients together, whereas tumbling blender is a box with rectangular- shaped and it is twisted and shaked from outside by a machine. When all the ingredients of detergents have been blended uniformly in the blender, a gateway at the bottom of the machine will be opened and the powdered mixture will then released through a conveyor belt or other channelling device to a place where the detergents can be packed into boxes or cartons and then transported to the market. For the second method, agglomeration process, initially, dry compositions which have been placed into the Shuggi agglomerator are mixed and sheared equally into fine particles by sharp and rolling blades in the agglomerator. Then, liquid compositions are sprayed onto the dry mixture through nozzles which are on the agglomerators wall after the dry compositions have been mixed uniformly in the agglomerator. A liquid mixture formed is hot and viscous because exothermic reaction occurs when blending process continues. Then, the liquid flows out from the agglomerator and accumulates on a drying belt. Drying belt contains a hot air blower which makes the liquid easier to be crushed. Finally, it is crushed and pushed through sizing screen to prevent unmixed large particles from being formed before detergents are transported to the market. High density powdered detergents are produced. Spray drying process is also known as slurry method. Firstly, all dry and liquid ingredients are mixed together to form a slurry in a tank which is called crutcher. The heated slurry is pumped and blown into a tower through nozzles in order to form small droplets. High pressure is applied in the tower to force the droplets from the top of the spray tower to the bottom. Once the slurry dries, hollow granules formed will be collected in the bottom of the tower and then screened to get a standard size. After the beads of the dry detergents are cooled, heat sensitive materials such as enzyme, bleaching agent and perfume are added and finally they are collected for packaging. Since the technology nowadays is more advanced compared to last time, air inside the granules can be effectively reduced and higher density solid detergent can be formed through this method. Another type of detergent that I am going to describe is liquid laundry detergent. This detergent will be illustrated by an example which is known as liquid laundry detergent containing cationic hydroxyethyl cellulose polymer. It is invented by Peter Gerard Gray, Karel Jozef Maria Depoot, Luc Marie Willy, Lievens, Falke Elisabeth Vanneste and Serge Omer Alfons Jean Thoof in 2008. This detergent which is good for washing delicate fabrics is formulated from cationic hydroxyethyl cellulose polymer, surfactant, fatty acid, enzyme which is free of cellulytic activity, builder and other additives. This liquid laundry detergent contains about 0.05%-0.4%, by weight of the composition, of cationic hydroxyethyl cellulose polymer. Besides that, the cationic hydroxyethyl cellulose polymer has a more preferably 0.01 0.10 degree of substitution of cationic charge, as well as, molecular weight of about 200000 800000. The cationic hydroxyethyl cellulose has repeating substituted anhydroglucose units and the anhydroglucose units may be substituted by alkyl groups. Moreover, to avoid lumps formation when adding water into it at ambient temperature, the cationic hydroxyethyl cellulose polymer can be cross-linked with dialdehyde like glyoxyl. The purpose of adding cationic hydroxyethyl cellulose polymer is actually to provide fabric care advantages to laundered textiles when it is combined with surfactant and fatty acid. Furthermore, surfactant is one of the ingredients added into the liquid laundry detergent. More preferably, the detergent contains 7% -15%, by weight of the compositions, of surfactant. The surfactant must comprise at least one anionic surfactant such as alkyl ethoxylate sulphate and linear straight chain alkyl benzene sulphonates, and at least one non-ionic surfactant such as polyhydroxy fatty acid amides. The suitable anionic surfactants include the water-soluble salts, especially alkali metal and ammonium salts of organic sulphuric reaction products. The liquid laundry detergent also consists of 2% 15%, 2% -10% or 2.5% 7%, by weight of the composition, of fatty acid. The fatty acid used in the detergent is saturated and unsaturated with 8 24 or 12 18 carbon atoms. Besides that, the detergent is significantly free of optical brighter. This means that the amount of optical brighter must not be detectable, so the detergent must contains less 0.0001% of optical brighter. The optical brighter can be used to improve the appearance of colour of fabrics and make the fabric look cleaner, but it will cause allergic, so it is not added into the detergent. Moreover, enzymes which are substantially free of cellulytic activity are also included in the liquid laundry detergent at the sufficient amount, such as protease, amylase, lipase and others. The concentration of enzymes containing cellulytic activity must be less than 0.0001% or even in the undetectable quantity. This is because there may be cellulase present in those enzymes and it will hydrolyze the cationic hydroxyethyl cellulose polymer that provides fabric care benefits. Thus, indirectly, the benefits of this detergent will be damaged. Nevertheless, if this type of enzyme is required, then sufficient amount of cellulase inhibitor including enzyme stabilizing system can be added to stop the action of cellulase towards the cationic hydroxyethyl cellulose polymer. The compositions of the detergent may also consist of 0.1% 80%, by weight of the composition, of builder. The builders comprise either phosphate salt or organic and inorganic non-phosphorus builders. Organic non-phosphorus builders which are water soluble include carboxylate, polycarboxylate, polyhydroxy sulphonates, different alkali metals, ammonium and substituted ammonium polyacetates. While inorganic non-phosphorus builders consist of aluminosilicates, borates, silicates and carbonates. In addition, the liquid laundry detergent also contain extra compositions such as opacifying agents, soil release polymers, suds suppressors, chelants, performance boosting polymers, dye transfer inhibiting polymers, stabilizers, viscosity modifiers, preservatives, structurants, citric acid, as well as benefit agent containing delivery particles. These additional ingredients are used to enhance the properties of the detergent. To manufacture the liquid laundry detergents, the very first step is to choose right raw materials by depending on the factors, such as cost, human and environmental safety, as well as the specific properties that we desired in the final product. In this process, continuous blending is required. Dry ingredients are mixed with liquid ingredients which include water solution and solubilizers. Solubilizers are added to ensure stability and evenness of the final product. Then, they are blended evenly to form a mixture by using static or in-line mixers. Besides that, in order to produce a more concentrated liquid laundry detergent, a new high energy mixing process combined with stabilizing agents can used.