Proven Risk Youth Vs At-Risk & High-Risk Youth

In the fields of juvenile justice policy and programming, there are certain terms that are used to describe target populations. In terms of youth who are prone to illegal and illicit acts, the two terms that are most commonly used are at-risk youth and high-risk youth. The former term is generally associated with youth who come from lower-income, urban, single-mother backgrounds. High-risk youth is a label used to categorize and describe youth who share the following characteristics:

* are from poor families and communities;

* are (usually) high school dropouts, homeless or young parents;

* are unemployed or underemployed; and

* are involved with or transitioning from the child welfare or juvenile justice systems.

Youth from minority groups are disproportionately represented in these categories.1

The problem with this definition is that it tends not to disaggregate the range of crimes that lead the youth into the juvenile justice system. There are insufficient distinctions made with respect to the types of youth that fall within them. The category high-risk youth includes the young person who has engaged in serious criminal and violent behavior as well as those who have engaged in lower-level offenses that may not necessarily include violence.

What is at stake with such categorizations? Incorrect sorting of these populations has implications for policy and programming. Those interventions that work well for certain types of youth who have been labeled as at-risk or high-risk are not as effective for the more violent youth who are incorrectly placed in these two categories. Poor sorting has a direct affect on these youth who are in desperate need of properly designed interventions.

What I propose is that another category be created that better sorts the youth who are classified as high-risk. The term proven risk encompasses the most violent youth who have been placed in the high-risk category. There are specific criteria that define proven-risk youth. They share the same characteristics as youth who are in the at-risk and high-risk categories. What distinguishes proven-risk youth from these other two types is that: they are gang-involved; frequently use drugs; have an incarcerated sibling and/or parent; and have been incarcerated before. Moreover, they have been convicted in court for having committed the following crimes:

* gun possession;

* armed robbery;

* aggravated rape;

* murder;

* attempted murder;

* armed home invasion;

* serious assault against staff and/or another inmate while incarcerated; and/or

* escape or attempted escape involving a serious assault on staff.

By better defining the types of youth who require intervention, policymakers, foundations, and youth-oriented non-profit organizations can better deploy their resources in ways that will be more likely to make a positive difference in the lives of youth who fall into the proven-risk youth category.

"Serving High-Risk Youth: Lessons from Research and Programming," Public/Private Ventures, September 2002, p. 2.

Andr? J. Norman is a public speaker. He is available for school assemblies, church groups, colleges and universities, non-profit organizations and corporations. In addition, Andr? has extensive experience designing programs and workshops focused on high-risk youth and ex-offenders. He also does corporate trainings.

Andr? runs his own consulting business, Project Footprints (http://www.projectfootprints.com).

Andr?'s work comes out of his personal experience of having served time in prison for armed robbery and other related charges. A Christian conversion accompanied by a decision to change his life led to his release from prison several years ago. Since then, Andr? has worked extensively with troubled youth and adults and corporate executives. Andr? draws on his own inspirational story, in which he moved from childhood illiteracy and crime to speaking for churches, youth groups, elementary, middle and high schools, and universities such as MIT and Harvard.

maide service in Park Ridge ..
In The News:

Scammers create fake Evite invitations that mimic legitimate event emails, requiring users to verify senders and use antivirus software for protection.
The new Apple Watch hypertension feature passively monitors blood pressure patterns over 30 days using sensors to detect chronic high blood pressure signs.
Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.

Common Sense vs. Common Senseless - How Thomas Paine Can Be Applied To Modern Day; Part Two

The cause of America is in a great measure the... Read More

Belly Full of the Clintons [Political View]

As I read the papers and watch the news day... Read More

Protectionism in Russia

The new law "Special Protective, Antidumping and Import Compensatory Measures"... Read More

US Government Regulators and Aides with AIDS

All government regulators or diplomat who are in high risk... Read More

Wartime Britain & Things Look Bleak

This is the second of a series of four articles... Read More

French NON to Europe Might be Engrained in Their History

Many of the problems that the members of the European... Read More

What Price Loyalty?

With the recent shakeups in the presidential cabinet, it has... Read More

The FTC Purports and Misrepresents Their Law Enforcement Experience as It Attacks Business

We should all give much kudos to the Federal Trade... Read More

Predator or Prey; Hunter or the Hunted; Teacher or the Pupil; Winning or Losing?

This is a thought on the study of Home and... Read More

To Grow Out Of Unemployment

There is a connection between economic growth and unemployment. There... Read More

California Mutual Assistance Program

In years past California Mutual Assistance Program and emergency response... Read More

Lost and Found in Gaza

The evacuation of Gaza is now completed, and the world... Read More

Double Standards for Regulators?

Elliot Spitzer, recently said he wanted to drive a stake... Read More

Revitalizing The Power of the Baby Boomers

As baby boomers, we have been spoiled all of our... Read More

Super Voting Ink and Vaccines

In the future when we decide to help nations vote... Read More

Cuba: Havana the Good

When North Americans discuss Cuba, they always focus the intense... Read More

Democracy, War and the Media - Uneasy Bedfellows All Round

Recent international wars and the often spectacular ways in which... Read More

Treasury Department Falls Short on Blocked Persons List

I would like to discuss the blocked persons list of... Read More

MORAL ARMOR Condemns Home and Business Seizure Law

Nothing could be more alarming for Americans than what I... Read More

UAV Materials and Thoughts on New Technologies and Keeping Up With Our Opponents

Possible UAV materials are infinite: Foam, Composite, Balsa Wood, Plastic,... Read More

National Archives Needs to Embed RFID Tags in Ink

Perhaps we should have printers with ink which has metallic... Read More

Howard Deans Big Fat Mouth

"The only time I open my mouth is when I... Read More

Dole, Kemp, Trusting People

Many in the peanut gallery of society are so quick... Read More

There Ought to Be a Law

The 'Land of the Free' is teaming with individual rights... Read More

Seattle Lawyer and Financial Freedom

We are destroying our freedoms and slowing innovation, due to... Read More

after renovation cleaning Highland Park ..