Proven Risk Youth Vs At-Risk & High-Risk Youth

In the fields of juvenile justice policy and programming, there are certain terms that are used to describe target populations. In terms of youth who are prone to illegal and illicit acts, the two terms that are most commonly used are at-risk youth and high-risk youth. The former term is generally associated with youth who come from lower-income, urban, single-mother backgrounds. High-risk youth is a label used to categorize and describe youth who share the following characteristics:

* are from poor families and communities;

* are (usually) high school dropouts, homeless or young parents;

* are unemployed or underemployed; and

* are involved with or transitioning from the child welfare or juvenile justice systems.

Youth from minority groups are disproportionately represented in these categories.1

The problem with this definition is that it tends not to disaggregate the range of crimes that lead the youth into the juvenile justice system. There are insufficient distinctions made with respect to the types of youth that fall within them. The category high-risk youth includes the young person who has engaged in serious criminal and violent behavior as well as those who have engaged in lower-level offenses that may not necessarily include violence.

What is at stake with such categorizations? Incorrect sorting of these populations has implications for policy and programming. Those interventions that work well for certain types of youth who have been labeled as at-risk or high-risk are not as effective for the more violent youth who are incorrectly placed in these two categories. Poor sorting has a direct affect on these youth who are in desperate need of properly designed interventions.

What I propose is that another category be created that better sorts the youth who are classified as high-risk. The term proven risk encompasses the most violent youth who have been placed in the high-risk category. There are specific criteria that define proven-risk youth. They share the same characteristics as youth who are in the at-risk and high-risk categories. What distinguishes proven-risk youth from these other two types is that: they are gang-involved; frequently use drugs; have an incarcerated sibling and/or parent; and have been incarcerated before. Moreover, they have been convicted in court for having committed the following crimes:

* gun possession;

* armed robbery;

* aggravated rape;

* murder;

* attempted murder;

* armed home invasion;

* serious assault against staff and/or another inmate while incarcerated; and/or

* escape or attempted escape involving a serious assault on staff.

By better defining the types of youth who require intervention, policymakers, foundations, and youth-oriented non-profit organizations can better deploy their resources in ways that will be more likely to make a positive difference in the lives of youth who fall into the proven-risk youth category.

"Serving High-Risk Youth: Lessons from Research and Programming," Public/Private Ventures, September 2002, p. 2.

Andr? J. Norman is a public speaker. He is available for school assemblies, church groups, colleges and universities, non-profit organizations and corporations. In addition, Andr? has extensive experience designing programs and workshops focused on high-risk youth and ex-offenders. He also does corporate trainings.

Andr? runs his own consulting business, Project Footprints (http://www.projectfootprints.com).

Andr?'s work comes out of his personal experience of having served time in prison for armed robbery and other related charges. A Christian conversion accompanied by a decision to change his life led to his release from prison several years ago. Since then, Andr? has worked extensively with troubled youth and adults and corporate executives. Andr? draws on his own inspirational story, in which he moved from childhood illiteracy and crime to speaking for churches, youth groups, elementary, middle and high schools, and universities such as MIT and Harvard.

affordable house cleaning Park Ridge ..
In The News:

Holiday shopping scams surge as fake refund emails target distracted consumers during Black Friday and holiday seasons, costing Americans billions annually.
The AI-powered IRMO M1 exoskeleton features four modes, including turbo, eco, training and rest for hiking, running, cycling and sports with eight-hour battery life.
OpenAI announced upgrades for its ChatGPT Images platform on Tuesday, saying the program can now make more precise edits and produce images more quickly.
Chrome for Android now turns web articles into AI-powered podcast conversations. Get hands-free browsing with Google Gemini's natural audio summaries.
LastPass faces $1.6 million fine from U.K. regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.

Tax Attorney in Oregon or Washington; Does Your Small Business Have One?

Tax Evasion has been used to criminalize many, Nixon did... Read More

DC Lawyers; Have I Got a Case for You?

This is no time for the Black community to sue... Read More

Water at the Roots of Twenty First Centurys Conflicts

According to a postulate made by Ignacio Ramonet ecological resources... Read More

The G-8 and Other Figureheads

The Presidents Before Washington:From the moment that the first Declaration... Read More

Trains and the Flow of Fuel

Fuel costs seem to rank high in surveys of US... Read More

Franchising Democracy and Creating Cohesive World Government

There are so many problems with our perceived perfect checks... Read More

Clearing Land Mine Fields from the Air

You know we have sent many, many army tanks with... Read More

Paid Assassins

The civil war in Iraq seems to be much more... Read More

Anglo-Israelism and the Flesh

Recently a friend insisted that I read a book by... Read More

Think You Dont Need A License for A Wireless Microphone? Think Again

Believe it or not, every theatre, church, or Britney Spears... Read More

What Did You Do In The War Daddy?

This is the first of a series of four articles... Read More

What Is The Filibuster All About?

The filibuster has been a tool available to U.S. Senators... Read More

Chinese Military Build Up - Sun Tzu and Chinese War Machine

We are currently seeing a build up in China of... Read More

The Self-Appointed Altruists

Their arrival portends rising local prices and a culture shock.... Read More

The Irish Issue

The expertise and advancement of the evolution of man and... Read More

TABOR: The Growing Taxpayer Bill of Rights Movement and Economic Incentives for Industry

A governing.com report blast one of the major grassroots initiatives... Read More

Pierre Dupont de Nemours

After arranging the Armistice that ended or settled outstanding issues... Read More

Socialist Public Schools In America

Many parents might think it a bit farfetched to compare... Read More

The Contemporary Global Marketplace - IT, Software, and Services

"Had there not been outsourcing and utilization of cheaper resources... Read More

Tax Dollars and Transparency of Government Agencies

As we watch fewer Americans voting it is no wonder... Read More

Canada Tries to Stop Flow of Drugs into the US

As more and more cities and states set up websites... Read More

Population and Transportation in the Modern Era of International Terrorism

It is important as populations expand to work on the... Read More

For they know not what they do; Federal Regulators destroying business

Federal Regulations on Business Destroy America, these regulations are a... Read More

Mental Masturbation of FTC Franchise Rule Report

Please read through this quick thought and discussion as if... Read More

The Liberal Solution: Assault a Conservative?

Ok, here is what happened: On March 31, 2005, Pat... Read More

affordable house cleaning Mundelein ..