Premium Essay

Aaliyah Case Summary

Submitted By
Words 1407
Pages 6
Aaliyah report not knowing the reason for being in foster care. Aaliyah explain being in foster care and no one explained why she is in foster care.
The referring agency referral did not state how Aaliyah entered care. Aaliyah entered SAFY care from Palmetto County Behavioral Health. Per referring agency report, Aaliyah met the goals set for her and the facility has to offer. The referring agency did not report any behavioral problems; however, Aaliyah has a history of running away to meet adult men to have sex.

PRS:
Aaliyah has a history of displaying depression symptoms as deflated self-esteem, sadness and worthlessness. Aaliyah displays argumentative behaviors with peers and adults, resentful, blames others, deliberately ignores authority figures. Aaliyah lack coping skills to maintain healthy relationships, manage …show more content…
Aaliyah will express depressive symptoms without fear weekly per youth or foster parent report weekly. 2. Aaliyah will identify triggers to emotions of anger, hopelessness and low-esteem weekly per youth or foster parent.
Interventions: 1. MHP will teach and model self-calming techniques monthly. 2. MHP will teach CBT techniques (role-play, modeling, summarizing and worksheets) to identify triggers and situations that leads to feelings of depression monthly. 3. MHP, Aaliyah and family will debrief incidents of Aaliyah displaying anger, hopelessness and low-esteem monthly.
Progress Summary: Initial Goal
BMod
Problem: Aaliyah display inappropriate behaviors in all settings. Aaliyah lacks positive skills to help with making good decisions to decrease defiant behaviors of talking back, yell, threats of self-harm, and manage impulsive control. Aaliyah struggle with accepting responsibility for her decisions, impulsive control and processing display inappropriate behaviors.

Goal #1: Aaliyah will make good decisions
Criteria for Achievement: Aaliyah will make good choices to increase positive outcomes 4 out of 8

Similar Documents

Free Essay

Grant Writing for Dummies

...Grant Writing FOR DUMmIES 3RD ‰ EDITION by Dr. Beverly A. Browning, MPA, DBA Grant Writing For Dummies® 3rd Edition , Published by Wiley Publishing, Inc. 111 River St. Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600. Requests to the Publisher for permission should e addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201)748-6008, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/ or its affiliates in the United States and other countries, and...

Words: 113853 - Pages: 456

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558