Risk And Protection Essay

1725 words - 7 pages

Elkhart County Community
Assessment Report
Written By: Jeremy McCord – Project Coordinator
and Elkhart County CTC Community
Assessment Work Group

Executive Summary
Elkhart County utilized the Communities That Care system as a capacity building tool to aid in the Strategic Prevention Framework process. The Strategic Prevention Framework is a 5-step planning process that guides the selection, implementation, and evaluation of evidence-based, culturally appropriate, sustainable prevention activities. Communities That Care is a tool used to guide a community through the assessment and prioritization of risk and protective factors most in need of attention and links those priorities to ...view middle of the document...

This system was developed by Dr. David Hawkins and Dr. Richard Catalano. It is based on their research, which has identified risk factors that predict youth problem behaviors and protective factors that buffer children from risk and help them succeed in life.
A key goal of the Communities That Care effort is to identify which risk factors, protective factors and problem behaviors are prevalent in our community, and implement evidence-based programs that address our community's unique profile. To that end, the Risk- and Protective-Factor Assessment work group collected and analyzed data on Elkhart County. Then, with input from the community, they identified priority risk factors to address, as well as community strengths on which to build.
The assessment was completed using the Indiana Youth Survey and archival data. The Indiana Youth Survey was administered to students in grades 6th at Elkhart Community schools and students in grades 10th in Concord Community Schools in Elkhart County in the spring of 2012. To get the most complete picture of our community, the Risk-and Protective-Factor Assessment work group also collected archival data from public records to measure risk factors and problem behaviors not covered by the survey.
Based on the analysis of the data and input from the community, the following risk factors were identified as priorities for community attention:
* Interaction with Pro-Social Peers (Peer and Individual Domain)
* Community Rewards for Anti-Social Involvement (Community Domain)
These risk factors were selected as priorities for prevention action primarily because data indicated that they are significantly elevated throughout Elkhart County.
The data also revealed Elkhart County's strengths. For example, the Indiana Youth Survey revealed that students throughout the county are motivated to follow society's expectations and standards. They reported high levels of the protective factor "Belief in the Moral Order" and low levels of the risk factor "Rebelliousness." This is an important area of strength on which to build to help protect our county's youth from the risk of problem behaviors.
This report recommends that the community give particular attention to the risk factors noted above when developing the community's action plan to prevent youth problem behaviors and promote positive youth development.

The Elkhart County Communities That Care Effort
In the fall of 2012, Elkhart County began implementing Communities That Care prevention-planning system. Developed by Dr. David Hawkins and Dr. Richard Catalano of the Social Development Research Group in Seattle, Washington, the Communities That Care system is a way for members of a community to work together to efficiently and effectively promote positive youth development and prevent youth problem behaviors such as substance use, delinquency, teen pregnancy, dropping out of school and violence.
Elkhart County implemented the Communities...

Other Papers Like Risk and Protection

Monitor and Maintain Health and Safety Practic Salon

1301 words - 6 pages and their representatives in the process. Targeting the underlying problems is the cost effective way for risk assessment. Finding a remedy for the dangerous situation should always occur respecting a hierarchy of measures: • Avoid the danger • Replace the danger by a non or less dangerous process or material • Collective protection measures • Individual protection measures • Record the risk • Analyse the risk and potential for the

Risk Response Planning Essay

1479 words - 6 pages The Instructions of Risk Response Planning Jinghan Xie PJM 6015 Project Risk Management Jacques Alexis Northeastern University College of Professional Studies August 8, 2015 Abstract As the fourth step in the risk management, risk response planning is very significant and it could affect the subsequent steps of risk management as well as the whole project. In other words, if a risk management plan does not has the sufficient

Enterprise Wide Risk Management

3548 words - 15 pages hedging undesirable risks, as well as to in crease the organisation’s capacity to originate desirable but concentrated risks. To reduce undesirable risks management should evaluate derivatives, insurance and hybrid products on a consistent basis and select the select the most cost –effective alternative. E.g., Honeywell and Mead have executed alternative risk transfer (ART) products that combine traditional insurance protection with financial risk

Critical Reflection

811 words - 4 pages educators may be viewed differently from the position of child protection field workers. What looks ‘possible’ and ‘positive’ from an academic perspective may feel considerably different for those who are ‘in the trenches’. Critical reflection leads to increased awareness of the tension between personal and professional integrity and ethics, and the tasks one is meant to undertake in the course of one’s work. Self-reflection, self-location and

Risk Management

1428 words - 6 pages gives protection against the risk by testing the method. 5. Evaluation Evaluating the implemented controls in order to make sure that they provide protection which was expected. Risk Management is the most important process in information security. The reason being any business’s survivability is directly dependent on its risk management. For example, data is one of the most important asset a business has and therefore a company invests

Force Health Protection

990 words - 4 pages risk acting as a critical ingredient in giving the nit a fighting strength. Force heath protection looks at preventive measures as much as it looks at preventive measures. Therefore, proper screening and regular health checks on the outlying COPs will ensure that only the fittest members of the unit get to do the job instead of unknowingly having weak and sickly persons doing a job that exposes them to risk and great danger. In addition, the

Is3110T Lab 2 Assessment Worksheet

954 words - 4 pages Lab #2 Assessment Worksheet Align Risks, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization

Risk Management

4553 words - 19 pages  private operator. Risk Reduction If a risk cannot be eliminated, the next choice is to attempt to reduce the risk. Risk reduction primarily involves safety. Some common techniques for reducing risks include adoption of policies for, and proper training of, personnel, particularly for the police and fire protection services, and proper inspection and maintenance of equipment and facilities. Segregation of equipment may also help avoid the loss of all

Justification for an Internal Control System

657 words - 3 pages has a different risk management tool. Insurance approach mitigates the risk to an insurance company. Portfolio approach minimizes risk and maximizes investment by spreading out the risk through the portfolio. An internal control system is more beneficial because it ensures the protection of a company’s assets by the use of many systems (financial data, compliance with laws and regulations. Internal control system is a proactive tool because it

Jit2 Task 1 Instructions

938 words - 4 pages SUBDOMAINS: 325.3 ­ SOLVING PROBLEMS & MAKING DECISIONS 326.3 ­ EVALUATING ECONOMICS OF MANAGEMENT DECISIONS 326.4 ­ MANAGING ENTERPRISE RISK & CONTINUITY 329.5 ­ USING INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE   Competencies: 325.3.4: Problem Solving ­ The graduate applies the problem solving process to solve organizational and team problems, and develops strategies to avoid decision­making pitfalls. 326.3.1: Decision Analysis

Financial Risk Management

1021 words - 5 pages finance management is balancing the income and consumption, planning the pension, investing on financial products of low risk. Modern perspective on personal finance management emphasised the protection of property which includes dealing the unexpected events and enhancing the stability of personal wealth, for example, suffering a traffic accident or global financial crisis. The core of personal finance management is controlling the risk. The main

Related Essays

A Risk Analysis For Information Security And Infrastrucure Protection

1322 words - 6 pages A Risk Analysis for Information Security and Infrastructure Protection Special Topics in Criminology and Criminal Justice Columbia Southern University January 03, 2012 A Risk Analysis for Information Security and Infrastructure Protection OBJECTIVE The sole purpose for performing a risk analysis for IT systems is to ensure businesses and or organizations, whether small or large to accomplish its

Welfare Risk Essay

576 words - 3 pages Summary assignment Social protection historical involved traditional welfare instruments like labour, social insurance and provision of social assistances in welfare states. The onset of globalization causes a rethink of approach to social protection especially for those in the developing countries after the Asian financial crisis. This paper examines social protection from the perspective of social risk management approach were the notion

Corporate Governance Essay

1714 words - 7 pages Purpose of study This journal is focusing about the relationship of investor protection and the risk choices in corporate investment. It also examines the factor that influence the risk choices are either due to the insider or the manager explicit ownership and compensation structure or through private benefit. From this journal, my review is about the positive relationship between investor and risk choices in order to influence more investment

Fwaffageagaga Essay

273 words - 2 pages After researching the info on the subject matter. I have broken down the summary in two categories. They are risk, threats, and vulnerabilities in a Workstation Domain, and Risk mitigation tactics used to audit for compliance. Top risk, threats, and vulnerabilities in a Workstation Domain are as followed: • Unauthorized access to workstation • Unauthorized access to systems, applications, and data • Desktop or laptop computer operation