Free Essay

Risk and Protection

In:

Submitted By jmccord35
Words 1700
Pages 7
Elkhart County Community
Assessment Report
Written By: Jeremy McCord – Project Coordinator and Elkhart County CTC Community
Assessment Work Group

Executive Summary
Elkhart County utilized the Communities That Care system as a capacity building tool to aid in the Strategic Prevention Framework process. The Strategic Prevention Framework is a 5-step planning process that guides the selection, implementation, and evaluation of evidence-based, culturally appropriate, sustainable prevention activities. Communities That Care is a tool used to guide a community through the assessment and prioritization of risk and protective factors most in need of attention and links those priorities to evidence-based and data driven programming to address them.

It is important to remember that the Communities That Care system is simply a tool to aid in building a prevention infrastructure referred to as the Strategic Prevention Framework process. Communities That Care and Strategic Prevention Framework are not programs nor are they administrative names for program implementation. They exist and work together in helping communities get organized, identify problem areas based on community data, make knowledgeable decisions pertaining to how these problems should be addressed, and evaluate any actions taken to counter the problem areas. Each phase of the Communities That Care system fits well into a coordinating phase of the Strategic Prevention Framework process, and it is clear that sustainability and cultural competency as key components to every part of building a prevention infrastructure.

This report describes the results of the risk- and protective-factor assessment completed as part of Elkhart County's Communities That Care effort. The Communities That Care system is a way for members of a community to work together to prevent youth problem behaviors, including substance use, delinquency, teen pregnancy, dropping out of school and violence. This system was developed by Dr. David Hawkins and Dr. Richard Catalano. It is based on their research, which has identified risk factors that predict youth problem behaviors and protective factors that buffer children from risk and help them succeed in life.
A key goal of the Communities That Care effort is to identify which risk factors, protective factors and problem behaviors are prevalent in our community, and implement evidence-based programs that address our community's unique profile. To that end, the Risk- and Protective-Factor Assessment work group collected and analyzed data on Elkhart County. Then, with input from the community, they identified priority risk factors to address, as well as community strengths on which to build.
The assessment was completed using the Indiana Youth Survey and archival data. The Indiana Youth Survey was administered to students in grades 6th at Elkhart Community schools and students in grades 10th in Concord Community Schools in Elkhart County in the spring of 2012. To get the most complete picture of our community, the Risk-and Protective-Factor Assessment work group also collected archival data from public records to measure risk factors and problem behaviors not covered by the survey.
Based on the analysis of the data and input from the community, the following risk factors were identified as priorities for community attention: * Interaction with Pro-Social Peers (Peer and Individual Domain) * Community Rewards for Anti-Social Involvement (Community Domain)
These risk factors were selected as priorities for prevention action primarily because data indicated that they are significantly elevated throughout Elkhart County.
The data also revealed Elkhart County's strengths. For example, the Indiana Youth Survey revealed that students throughout the county are motivated to follow society's expectations and standards. They reported high levels of the protective factor "Belief in the Moral Order" and low levels of the risk factor "Rebelliousness." This is an important area of strength on which to build to help protect our county's youth from the risk of problem behaviors.
This report recommends that the community give particular attention to the risk factors noted above when developing the community's action plan to prevent youth problem behaviors and promote positive youth development.

Introduction
The Elkhart County Communities That Care Effort
In the fall of 2012, Elkhart County began implementing Communities That Care prevention-planning system. Developed by Dr. David Hawkins and Dr. Richard Catalano of the Social Development Research Group in Seattle, Washington, the Communities That Care system is a way for members of a community to work together to efficiently and effectively promote positive youth development and prevent youth problem behaviors such as substance use, delinquency, teen pregnancy, dropping out of school and violence.
Elkhart County implemented the Communities That Care process to achieve the community's vision that all young people in Elkhart County grow up supported and nurtured by their families, schools and community, and become healthy adults who contribute positively to society.
Key accomplishments to date: * In May of 2012, the Indiana Youth Survey was administered to 6th graders in Elkhart Community Schools and 10th graders at Concord Community Schools in Elkhart County. * In June of 2012, partnership was confirmed with The Source, which is a coalition of local key leaders, to assist in capacity building of CTC process as well as carrying out of milestones and benchmarks. * In August of 2012, community coordinator was secured by Geminus Corporation to begin capacity building measures for CTC in Elkhart County. * In December of 2012, key leaders and coordinator secured ongoing support for Indiana Youth Survey from Elkhart Community schools and Concord Community Schools through school year 2015-16. * In January of 2013, community leaders attended a Key Leader Orientation and committed to the Communities That Care effort. * In March of 2013, a Community Board was formed. Members attended the two-day Community Board Orientation and established a structure for the Elkhart County Communities That Care effort. This included forming work groups to achieve the various steps in implementing the Communities That Care system. * In March of 2013, the Risk- and Protective-Factor Assessment work group attended the Community Assessment Training and developed a plan for completing the community risk- and protective-factor assessment. This report is the result of that assessment.
The Community Assessment
Dr. Hawkins and Dr. Catalano have identified risk factors that predict problem behaviors in youth, and protective factors that help protect young people from those risks. By addressing risk and protective factors, communities can help prevent adolescent problem behaviors and promote positive youth development. A key goal of the Communities That Care system is for communities to develop a profile of the risk factors, protective factors and problem behaviors in their community, and to develop a plan for addressing the risk factors that are most elevated while enhancing protective factors.
This report represents the first step in that process. The Risk- and Protective-Factor Assessment work group has collected data on risk factors, protective factors and problem behaviors in Elkhart County. With input from the community, the work group has identified our community's strengths and the priority risk factors to address in the prevention plan.

Data Collection Methods
As noted above, the Indiana Youth Survey was administered in May 2012. All students in grades 6th, 8th, 10th and 12th were asked to participate. The complete results are provided in the Elkhart County Communities That Care Youth Survey report. In addition, Dr. Hawkins and Dr. Catalano have identified archival data indicators that have been shown to be valid and reliable measures of certain risk factors and problem behaviors that are not measured by the survey, namely Extreme Economic Deprivation, Teen Pregnancy and School Drop-Out. The Risk- and Protective-Factor Assessment work group collected data from local and state agencies to supplement the youth survey.
How the Priorities Were Identified
The Risk- and Protective-Factor Assessment work group analyzed the data to identify which risk factors are most elevated in Elkhart County. This initial short list of priorities was presented to the Community Board, which discussed other considerations, such as the community's ability to have an impact on certain risk factors at this time. By consensus, the Community Board then selected the final priorities for prevention action in Elkhart County. Those priorities were presented to Key Leaders for endorsement.
Report Overview
The next section of the report provides detailed information and analysis of the risk factors, protective factors and problem behaviors in Elkhart County. The Conclusion presents the final list of priorities and recommendations for future action. Protective Factor: Depressed protection for community rewards for anti-social involvement and Interaction with pro-social peers.
The Indiana Youth Survey revealed that both protective factors are depressed throughout the county. The number of Elkhart County area 6th, 8th, 10th, and 12th graders benefitting from community rewards for involvement is less than that of other communities across the nation. The number of Elkhart County area 6th, 8th, 10th, and 12th graders benefitting from interaction with pro-social peers is less than that of other communities across the nation.

Conclusion and Recommendations
Elkhart County's Strengths
The data revealed that young people in Elkhart County are motivated to follow society's expectations and standards. In particular, young people reported high levels of the protective factor "Belief in the Moral Order" and low levels of the risk factor "Rebelliousness." Elkhart County should work to build on this strength while enhancing other protective factors in its prevention efforts.
Community Priorities
Based on the analysis of the data and input from the community, the following priority risk/protective factors were identified for the community to focus on over the next several years: * Interaction with Pro-Social Peers (Peer and Individual Domain) * Community Rewards for Anti-Social Involvement (Community Domain)
These risk factors were selected as priorities because the data indicated that they are among the most elevated throughout Elkhart County. We recommend that Elkhart County give particular attention to implementing strategies or programs to address these three risk factors when developing a prevention plan.
Next Steps
The next step in the Communities That Care process is to find out what resources are already in place in Elkhart County that address the priorities outlined above. The Resources Assessment and Evaluation work group will attend the Community Resources Assessment Training in November. Their assessment, combined with this report, will make up the profile of Elkhart County that will be used to identify programs and strategies to promote positive youth development and prevent problem behaviors in Elkhart County.

Similar Documents

Premium Essay

A Risk Analysis for Information Security and Infrastrucure Protection

...A Risk Analysis for Information Security and Infrastructure Protection Special Topics in Criminology and Criminal Justice Columbia Southern University January 03, 2012 A Risk Analysis for Information Security and Infrastructure Protection OBJECTIVE The sole purpose for performing a risk analysis for IT systems is to ensure businesses and or organizations, whether small or large to accomplish its missions by better securing the IT systems that store, process, or transmit organizational information. The primary function of risk analysis is to identify and correct the vulnerabilities and threats of an IT system. It enables management to make well-informed risk management decisions and justify the spending that is part of an IT budget. This also assists management in authorizing or accrediting the IT systems based on the performance results of a risk analysis. TARGET AUDIENCE Risk analysis will encompass a basic guide for experienced and inexperienced, technical and non-technical personnel who support or use risk analysis for their IT systems. This will included a detail listing and job description of personnel based on the National Institute of Standards and Technology (NIST) research: Senior management and mission owners make decisions about the IT security budget, and they ensure the implementation of risk management for agency systems and the security provided for the IT systems. The Designated Approving Authority (DAA) is responsible...

Words: 1308 - Pages: 6

Free Essay

Corporate Governance

...investor protection and the risk choices in corporate investment. It also examines the factor that influence the risk choices are either due to the insider or the manager explicit ownership and compensation structure or through private benefit. From this journal, my review is about the positive relationship between investor and risk choices in order to influence more investment to help the corporation in manufacturing sector to survive from different level of risk and sustain a good firm’s growth rate in future. Motivation of study According to the “law and finance” approach by La Porta, Lopez-de-Silanes, Shleifer and Vishny (1998 and 2000), they stated that the role of investor protection is really important to ensure for a good development of the country. Referring to the World Bank ranking, the top ten countries that have good investor protection are a part of OECD countries that have good political and economic condition and the most surprisingly Malaysia is one of the countries that only as an emerging country. From this, we clearly know the important of investor protection in order to help the country itself to survive in a longer time. Besides that, the corporations have to know how to raise external capital and grow without need to increase the risk. Nowadays, many corporations unable to survive without making a good risk choices plus do not make much in order to protect their investor. Problem statement 1) There is positive relationship between investor protection and risk...

Words: 1696 - Pages: 7

Free Essay

Case

...build a hedge portfolio by combining regular Treasuries and TIPS that has exposure to inflation risk but not to real interest risk, short position should be taken in regular Treasuries and long position should be taken in TIPS. Amount and durations of the positions should be equal. This combination will have no real interest risk. Infilation risk still exists since the nominal Treasuries have no protection on infilation. In inflation increased, positive returns will be gained. 3-) In order to build a hedge portfolio by combining regular Treasuries and TIPS that has exposure to inflation risk but not to real interest risk, short position should be taken in regular Treasuries and long position should be taken in TIPS. Amount and durations of the positions should be equal. This combination will have no real interest risk. Infilation risk still exists since the nominal Treasuries have no protection on infilation. In inflation increased, positive returns will be gained. 3-) In order to build a hedge portfolio by combining regular Treasuries and TIPS that has exposure to inflation risk but not to real interest risk, short position should be taken in regular Treasuries and long position should be taken in TIPS. Amount and durations of the positions should be equal. This combination will have no real interest risk. Infilation risk still exists since the nominal Treasuries have no protection on infilation. In inflation increased, positive returns will be gained.3-) In order to build a...

Words: 1601 - Pages: 7

Premium Essay

Welfare Risk

...Summary assignment Social protection historical involved traditional welfare instruments like labour, social insurance and provision of social assistances in welfare states. The onset of globalization causes a rethink of approach to social protection especially for those in the developing countries after the Asian financial crisis. This paper examines social protection from the perspective of social risk management approach were the notion of poverty reduction is seen through the lens of vulnerability of the poor and its instrumentalities. Social risk management approach involves four main goals; poverty as in vulnerability of the poor, consumption smoothing, enhancing equity and catalyst for economic development. Firstly, vulnerability as defined by Holzmann and Jorgensen (1999) is ‘‘risk of economic units to fall below the poverty line or for those below the poverty line, to remain in or fall further” (p.6). However, it is anticipated that better designed intervention will prevent this as a result of in-depth understanding of poverty through vulnerability compared to past efforts were poverty line was the indicator of status. The second approach is consumption smoothing were access to income by the vulnerable is uncertain, appropriate instruments are not available and social risk management is seen to provide that mechanism to enable the poor to save or dis-save to cushion effects of shock and achieving a welfare smoothing consumption path. The third definition equates...

Words: 561 - Pages: 3

Premium Essay

Huffman Trucking Benefits Election System Risks

...Huffman Trucking: Benefits Election System Security Lisa M. Gardner CMGT442: Information Systems Risk Management March 19, 2012 Craig McCormick Huffman Trucking: Benefits Election System Huffman Trucking Company has requested a new Benefits Election System to be implemented within the organization. The current benefit packages include medical, dental, and vision plans for employees. For the Benefit Election System, employee information and the benefit package they choose are stored and managed on a database system. This can either be a hardcopy paper file or an electronic file. Regardless of the storage method, security measures need to be implemented to protect employee’s privacy and information as well as preserve company assets from theft and/or litigation. Huffman Trucking Huffman Trucking has implemented such a system called the Benefits Election System, which assists management in tracking and reporting employee benefits (University of Phoenix, 2005). This paper will examine the security risks and requirements of the Benefits Election System of the organization. Security Requirements Ensuring the security of organizational and employee information is vital for any organization. Security misfortune can be damaging to the organization and the affected employees. In the case of Huffman Trucking information stored in the database includes...

Words: 1194 - Pages: 5

Premium Essay

Term

...State Agencies April 2008 Table of Contents INTRODUCTION .......................................................................................................................................................3 A SUGGESTED IMPLEMENTATION STRATEGY .............................................................................................5 SECURITY COMPONENTS ...................................................................................................................................12 RISK MANAGEMENT ................................................................................................................................................12 POLICY MANAGEMENT ............................................................................................................................................14 ORGANIZING INFORMATION SECURITY ....................................................................................................................16 ASSET PROTECTION .................................................................................................................................................18 HUMAN RESOURCES SECURITY ...............................................................................................................................20 PHYSICAL AND ENVIRONMENTAL SECURITY ...........................................................................................................22 COMMUNICATIONS AND OPERATIONS MANAGEMENT ............

Words: 14063 - Pages: 57

Premium Essay

Risk

...Summary Chevron commits huge resources to tackle environmental risks; this report studies the viability of doing so. We find that (1) it is using a right combination of internal and external tools to increase workers’ awareness, diversify environmental risks and mitigate moral hazard at the same time; and (2) the Decision Making (“DEMA”) system is valuable to the company in providing a systematic framework to quantify environmental risks. Introduction Chevron operates in the business of petroleum and natural gas exploration, production, refining and marketing, and as such faces huge environmental risks such as oil spills and exhaust emissions. Throughout the years Chevron has honoured its claim in “Protecting People and the Environment” by committing a higher proportion of revenues to environmental spending than its competitors. However, environmental risks and the benefits of managing them are by nature hard to be quantified, while the costs are obvious and substantial. This report studies the viability of Chevron’s investments in two steps. First, it examines the tools Chevron uses to manage environmental risks, and explains why they are different from those used to manage other risks. Second, the report will analyse the pros and cons of the novel DEMA system, an attempt by Chevron to systematically quantify environmental risks. What tools is Chevron currently using to manage environmental business risk? We have categorized the tools currently adopted by Chevron as...

Words: 2821 - Pages: 12

Premium Essay

Force Health Protection

...Name Institution Course Professor Date Brigade Support Company and Force Health Protection for COPs The Brigade Support Medical Company plays a variety of roles in its scope of work. This paper seeks to discuss and identify the manner in which the Brigade Support Medical Company can offer Force Health Protection to outlying COPs. The main roles of the company are that: they act as a unit level medical care; and they offer basic primary health care as per the Army Healthcare System and support to all BCT units that operate within the AO of the brigade (Menter, 148). The company also plays the above two roles on al BCT units that lack organic medical assets. The BSMC is led by a commander who leads supervision of the attached and organic medical augmentation elements. The company locates and sets up its headquarters from where it can offer services. This paper will outline the operations of the BSMC in line with provision of Force Health Protection to outlying COPs. The department of defense in the United States defines force heath protection as al activities and services that are provided, performed, and arranged by the services seeking to promote, conserve, improve, or restore the physical or mental well-being of the army personnel in different places and serving in the army (Wood, 59). Force Health Protection involves activities like, but not limited to, management of all resources in health care such as personnel, monies, and health facilities; offering...

Words: 976 - Pages: 4

Premium Essay

Cis8018

...evolving at a rapid pace and looking at the increasing information requirement for the organization it is important to have a robust information system which can cater to the requirement of various stakeholders. The aim of present paper is to analyze information security in context of Nickol Bay hospital located in Australia. Information risk management system would be analyzed for the current organization along with several protection mechanisms which are in place in order to safeguard information system against any kind of undesired usage of information system. In addition to protection mechanism role of personnel in information security and consideration for legal & ethical aspect for information security would be considered. Finally present paper would review implementation of PRTG network in context to Nickol Bay hospital so that network traffic in the hospital can be managed in such a manner that possible bottlenecks can be removed. Implementation of PRTG network monitor would help the organization to avoid situation for failure of information system due to excessive load so that data can be saved in such critical situations. Information risk management & control system in Nickol Bay Information...

Words: 1742 - Pages: 7

Premium Essay

Rear Area Operations Research Paper

...Maintaining the balance between the force protection operations in regard of the implementation of warfghting functions into the rear area operations actions will be affected due to the changes of political decisions and evolving nature of the operational environment. It may sounds easy and executable on first sight and leaves such an impression, but rear area operations have as big burden and value as the close and deep area operations. Rear area operations provide security for personnel, material, facilities and their basic purpose is establishing uninterrupted support and freedom of action of the forces as a whole especially to those forces involved in deep and close area operations extending the operational reach. The working climate,...

Words: 947 - Pages: 4

Premium Essay

Health, Safety and Security in Health and Social Care

...Safety at Work Act provides security of the health, safety and welfare of people at work, with the protection against risks to health or safety of an individual in connection with work activities. It sets out employers’ duties to staff where more than 5 staff are employed, and to the community, in addition to the duties of employees towards themselves and others. Health and Social Care Setting: Preschool The Health and Safety at Work Act aims to protect staff in relation to their health, safety and security in the workplace. It provides awareness in the workplace, so children and adults are aware of the health and safety issues. Within the preschool, the employer has a duty of providing induction training to staff which involves a clear and understandable explanation of health and safety concerns so that all adults are able to adhere to the policy and procedures as they understand their shared responsibility. The induction covers employees’ wellbeing, including safe lifting, and storage of hazardous substances. This also involves regular discussion of health and safety at staff meetings even after induction and there is a responsibility by the employer to ensure a written health and safety policy is adhered to, by appointing someone responsible to carry out this role. Also, under both the health and safety and safeguarding policies, employers are required to carry out thorough risk assessments before opening the preschool, and is essential to be updated regularly to...

Words: 3869 - Pages: 16

Premium Essay

11 – Safeguarding Adults & Promoting Independence

...|Course Title | Health & Social Care | |Unit Title |11 – Safeguarding Adults & Promoting Independence | |Level |3 | |Part Unit |P4, M2, M3, D2 |Whole Unit | | |Assessor | | |Start Date | |Task 1 (P4) | |You are in charge of a charity that runs a small care home and an adult placement scheme for people with mental health problems. A committee of | |volunteers oversees the charity’s work. | |A new member has been elected to the committee and has a meeting with you to find out more...

Words: 998 - Pages: 4

Premium Essay

Is2007

...November 2007 0 INTRODUCTION 0.1 WHAT IS INFORMATION SECURITY? 0.2 WHY INFORMATION SECURITY IS NEEDED? 0.3 HOW TO ESTABLISH SECURITY REQUIREMENTS 0.4 ASSESSING SECURITY RISKS 0.5 SELECTING CONTROLS 0.6 INFORMATION SECURITY STARTING POINT Information security is defined as the preservation of confidentiality, integrity and availability of information … Information security is defined as the preservation of confidentiality, integrity and availability of information … 0.7 CRITICAL SUCCESS FACTORS 0.8 DEVELOPING YOUR OWN GUIDELINES 1 SCOPE 2 TERMS AND DEFINITIONS 3 STRUCTURE OF THIS STANDARD 3.1 CLAUSES Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. 3.2 MAIN SECURITY CATEGORIES 4 RISK ASSESSMENT AND TREATMENT 4.1 ASSESSING SECURITY RISKS Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization 4.2 TREATING SECURITY RISKS 5 SECURITY POLICY 5.1 INFORMATION SECURITY POLICY 5.1.1 Information security policy document 5.1.2 Review of the information security policy 6 ORGANIZATION OF INFORMATION...

Words: 1623 - Pages: 7

Premium Essay

Cmgt/441

...private and company data through secrecy. With the huge increase of the Internet and electronic commerce (E-commerce), data protection is a lot more significant because of the potential for hackers, viruses, as well as malware. Current Specifications By analyzing data security in relation to Riordan, it's clear that almost no or none in any respect is present. Riordan’s data protection has a wide variety of haphazard and unorganized systems which contain sensitive data; but, not any of these systems are connected, nor are any of them up-to-date with regard to memory, speed, as well as processing power. In addition to that, worker information including payroll data, finished coaching, and situations related to complaints as well as harassment, are cataloged using Microsoft Excel that has got no real safety measures apart from a meager password protection alternative. In addition to that, hardcopy files of organization, worker, and customer information are saved in manager’s offices which are just protected by a wooden door (Apollo Group, 2004). Recommendations Because of a terrific lack in data protection features, the following suggestions are recommended: technique as well as risk evaluation, update on physical protection parts, and perform computer system and network protection. Strategy and risk assessment. All around data protection starts with the detection of dangers and the technique on the means to fix those dangers. This can easily be achieved by a Strengths...

Words: 540 - Pages: 3

Premium Essay

Term Papers

...Toussaint Chivars IS3110/Lab2 8/16/2014 Align Risks, Threats & Vulnerabilities to COBIT Lab 2 1. List indentified threats & vulnerabilities Risk Factors from Lab1 a. Unauthorized access from public Internet High risk b. User destroys data in application and deletes files High risk c. Hacker penetrates your IT infrastructure and Medium risk gains access to your internal network d. Intra-office employee romance gone bad High risk e. Fire destroys primary data center Low 2. PO9.2 IT Establishment of Risk Context; PO9.3 Event Identification; PO9.4 Risk Assessment. 3. a. Unauthorized access from public Internet Integrity b. User destroys data in application and deletes files Availability c. Hacker penetrates your IT infrastructure and Confidentiality gains access to your internal network 4. The risks potential, the current protection level and the mitigation steps needed to prepare or reduce the risks/damages. 5. a. Threat vulnerability 1: unauthorized from public internet Information---firewall and encryption. Applications---only from recommended sources (applications with encryption, antivirus protection will be used. Infrastructure—Firewalls People---IT awareness training for all employees, monitoring from IT manager b. Threat or...

Words: 719 - Pages: 3