Substance abusers seek help quitting drugs not as an end in itself, but as a means to escape these negative consequences and to gain a better life. Accordingly, while substance abuse treatment seeks to promote abstinence or at least significant reductions in substance use, its ultimate aim is to improve the patient’s quality of life (QOL). Unfortunately,
Clinicians tend to focus on symptoms, whereas for clients, symptom management is a means to an end.
Alexandre B. Laudet, Ph.D., presents current concepts of QOL and tools used to measure it, summarize recent paradigmatic shifts in the SUD field that are leading to an emerging interest in QOL, and review the evidence bearing on QOL in the treatment of addiction. Dr. Laudet also presents implications of incorporating QOL concepts into clinical practice and research.
Recognize This! – You can’t engage employees. You can only create a culture in which they want to engage.
Your culture produces your results. If you need a change in results, then you need a change in culture. Your culture is always working, either for you or against you. To accelerate a change in the culture, start by defining the new results you wish to achieve. Everyone in the organization needs to be focused on and aligned with the desired new outcomes. Culture changes one person at a time.
Misconfigured networks account for more than three quarters of breaches. A survey found that a badly configured network is the main cause of network breaches because IT professionals "don’t know what to look for."
Is the information-technology function at your company focusing on the same priorities as the business? Based on a recent survey by The Corporate Executive Board's IT Leadership Exchange, the overwhelming answer to this question is—No.
China is the number-one source of email-borne targeted attacks of the sort Google and at least 30 other companies are believed to have suffered, according to the latest monthly MessageLabs Intelligence report from Symantec Hosted Services. The firm analyzed the email headers of suspect messages intercepted last month to identify the true IP address of the senders, and found that around 28 percent of targeted attacks originated in China.
California intends to create a state-of-the-art information security operations center to monitor cyber-threats and protect state and local government networks from attack. The center also would support local government networks that need assistance.
Two computer programmers designed codes to alter thousands of trade blotters and records for swindler Bernard Madoff and took hush money to help keep the massive fraud going, U.S. authorities said. The FBI arrested Jerome O'Hara, 46, and George Perez, 43, at their homes on Friday morning.
BP (Beyond Petroleum laf!) has been fined a record $87m (£53m) for failing to correct safety hazards at its Texas City refinery in the U.S. The $87m fine is the largest in OSHA’s history. An explosion in 2005 at the Texas plant killed 15 people and injured 180 more. The safety violations found "could lead to another catastrophe", US Labor Secretary Hilda Solis said.
The Homeland Security Department should establish a national standard to encourage companies and individuals to report data breaches to federal authorities, helping them gauge the intensity of cyberattacks and investigate cybercrime, security professionals said on October 28. Federal agencies are required to report data breaches to the U.S. Computer Emergency Readiness Team, which is part of DHS. Reporting requirements for companies, however, vary by state.
The growing ineffectiveness of a popular and widely requested antibiotic has Chattanooga doctors emphasizing the importance of responsible antibiotic use. Chattanooga physicians say between one-half and two-thirds of the most-common bacteria — streptococcus pneumoniae — is showing resistance to azithromycin, the generic name for the antibiotic Zithromax. The antibiotic often is dispensed in a packet called the “Z-pak.”
The Cybersecurity Act of 2009 introduced in the Senate would allow the President to shut down private Internet networks. The legislation also calls for the government to have the authority to demand security data from private networks without regard to any provision of law, regulation, rule, or policy restricting such access.
Security experts have made a breakthrough in their five-month battle against the Conficker worm, with the discovery that the malware leaves a fingerprint on infected machines which is easy to detect using a variety of off-the-shelf network scanners. The finding means that, for the first time, administrators around the world have easy-to-use tools to positively identify machines on their networks that are contaminated by the worm.