Addiction Research and Clinical Practice

quality of lifeSubstance abusers seek help quitting drugs not as an end in itself, but as a means to escape these negative consequences and to gain a better life. Accordingly, while substance abuse treatment seeks to promote abstinence or at least significant reductions in substance use, its ultimate aim is to improve the patient’s quality of life (QOL).  Unfortunately,

Clinicians tend to focus on symptoms, whereas for clients, symptom management is a means to an end.

Alexandre B. Laudet, Ph.D., presents current concepts of QOL and tools used to measure it, summarize recent paradigmatic shifts in the SUD field that are leading to an emerging interest in QOL, and review the evidence bearing on QOL in the treatment of addiction.  Dr. Laudet also presents implications of incorporating QOL concepts into clinical practice and research.

Company Culture is Linked to Bottom Line

org changeRecognize This! – You can’t engage employees. You can only create a culture in which they want to engage.

An article in Knoweldeg at W.P. Carey pointed out the importance of company culture to achieving the company strategy – and the peril of ignoring that importance.

Why is culture so important? Culture is simply the shared beliefs, values and behaviors of a group of people.

Change Begins with Desired Results

org change2Your culture produces your results. If you need a change in results, then you need a change in culture. Your culture is always working, either for you or against you. To accelerate a change in the culture, start by defining the new results you wish to achieve. Everyone in the organization needs to be focused on and aligned with the desired new outcomes. Culture changes one person at a time.

Your people must believe that these new results are obtainable. Only then can they change their thinking and actions — something that usually happens when they can verbalize their job descriptions in terms of how they contribute to successful outcomes.

Misconfigured Networks Lead to Network Breaches

network laceMisconfigured networks account for more than three quarters of breaches. A survey found that a badly configured network is the main cause of network breaches because IT professionals "don’t know what to look for."

The survey, conducted by Tufin, also revealed that 18 percent of security experts believe misconfigured networks are the result of insufficient time or money for audits, while 14 percent felt that compliance audits that do not always capture security best practices are a factor. The CTO and co-founder of Tufin said: "The really big question coming out of the survey is how to manage the risk that organizations run dealing with the complexity that is part and parcel of any medium-to-large sized company’s security operations.

5 Ways to Improve IT Effectiveness

effectivenessIs the information-technology function at your company focusing on the same priorities as the business? Based on a recent survey by The Corporate Executive Board's IT Leadership Exchange, the overwhelming answer to this question is—No.

Through a survey of 150 IT departments at mid-sized companies, the IT Leadership Exchange found that 90 percent of CIOs expect that the IT department will be misaligned with business needs in an economic recovery, and more than half feel that this will threaten the business's long-term competitiveness.

China Implicated in Email Attacks

china cyberspaceChina is the number-one source of email-borne targeted attacks of the sort Google and at least 30 other companies are believed to have suffered, according to the latest monthly MessageLabs Intelligence report from Symantec Hosted Services. The firm analyzed the email headers of suspect messages intercepted last month to identify the true IP address of the senders, and found that around 28 percent of targeted attacks originated in China.

CEOs Fail To Support Data Security Efforts

bad ceo

More than half of IT and security professionals worldwide believe their company’s laptops and other mobile devices pose security risks to their organizations, and only half of them have CEOs who are strong advocates and supporters of data security efforts, according to new report issued today.

[Rich opinion: Information Technology (IT) is nothing but "chop wood and carry water".  Technology leaders must be so much more than technologists with business titles. They must be strong business leaders to successfully participate in risk management. In the end, it's all about money, politics, and time value. Are you part of the accountability or part of the risk?]

California to Launch InfoSec Ops Center

ops securityCalifornia intends to create a state-of-the-art information security operations center to monitor cyber-threats and protect state and local government networks from attack. The center also would support local government networks that need assistance.

Computer Programmers Arrested

fraudTwo computer programmers designed codes to alter thousands of trade blotters and records for swindler Bernard Madoff and took hush money to help keep the massive fraud going, U.S. authorities said. The FBI arrested Jerome O'Hara, 46, and George Perez, 43, at their homes on Friday morning.

Information

Pragmatic Journey is Richard (rich) Wermske's life of recovery; a spiritual journey inspired by Buddhism, a career in technology and management with linux, digital security, bpm, and paralegal stuff; augmented with gaming, literature, philosophy, art and music; and compassionate kinship with all things living -- especially cats; and people with whom I share no common language.