2,473 research outputs found

    The societal costs of alcohol misuse in Australia

    Get PDF
    It is well documented that alcohol-related problems compromise individual and social health, and wellbeing. The individual harms are numerous, including premature death, loss of enjoyment and loss of social utility through fear of crime and victimisation. The misuse of alcohol, particularly among those most at risk in our community, presents a major challenge for all levels of government. In this paper, a study is presented that provides a better national-level estimate of the costs of alcohol-related problems in Australia. Despite taking a conservative estimate, the aggregate of a range of societal costs substantially outweighs the tax revenue for the Commonwealth generated from the sale of alcohol. Results of this study provide evidence to policymakers regarding costs to the criminal justice system, costs to the health system, costs resulting from lost productivity and costs related to alcohol-related road accidents. Such evidence will provide an understanding of the economic tradeoffs that are present when making decisions that affect all Australians. Proposals are provided in the conclusion for a greater investment in prevention, based on the sound evaluation of prevention and diversion strategies by comparison with treatment options, in order to ensure better investments for the nation

    "On Mission and Leadership", Book Review

    Get PDF
    Book ReviewBook Revie

    Strangers in a Strange Land

    Get PDF
    In this text Manning examines the formation of nineteenth-century intelligentsia print publics in the former Soviet republic of Georgia both anthropologically and historically. At once somehow part of “Europe,” at least aspirationally, and yet rarely recognized by others as such, Georgia attempted to forge European style publics as a strong claim to European identity. These attempts also produced a crisis of self-definition, as European Georgia sent newspaper correspondents into newly re-conquered Oriental Georgia, only to discover that the people of these lands were strangers. In this encounter, the community of “strangers” of European Georgian publics proved unable to assimilate the people of the “strange land” of Oriental Georgia. This crisis produced both notions of Georgian public life and European identity which this book explores

    The Contrarian’s Guide to Leadership, Book Review

    Get PDF
    Book Revie

    Benchlearning; Good Examples as a Lever for Development, Book Review

    Get PDF
    Book ReviewBook Revie

    Case Histories in Business Ethics by Megone, C. & Robinson, S. J., Book Review

    Get PDF
    Book ReviewBook Revie

    The Entrepreneurial Personality: A Social Construction, 2nd ed., Book Review

    Get PDF
    Book ReviewBook Revie

    Trade unions, news media strategies and newspaper journalists

    Get PDF
    Trade unions, news media strategies and newspaper journalist

    Device fingerprinting identification and authentication: A two-fold use in multi-factor access control schemes

    Get PDF
    Network security has always had an issue with secure authentication and identification. In the current mixed device network of today, the number of nodes on a network has expanded but these nodes are often unmanaged from a network security perspective. The solution proposed requires a paradigm shift, a recognition of what has already happened, identity is for sale across the internet. That identity is the users’ network ID, their behavior, and even their behavior in using the networks. Secondly a majority of the devices on the Internet have been fingerprinted. Use of device fingerprinting can help secure a network if properly understood and properly executed. The research into this area suggests a solution. Which is the use of device fingerprints including clock skews to identify the devices and a dual- authentication process targeted at authenticating the device and the user. Not only authenticating the identity presented but also combining them into a unified entity so failure to authenticate part of the entity means the whole is denied access to the network and its resources
    • …
    corecore