Home About us Contact | |||
Prevention Systems (prevention + system)
Selected AbstractsInstalling the communities that care prevention system: implementation progress and fidelity in a randomized controlled trialJOURNAL OF COMMUNITY PSYCHOLOGY, Issue 3 2008Rose K. Quinby This article describes the degree to which high fidelity implementation of the Communities That Care (CTC) prevention operating system was reached during the first 18 months of intervention in 12 communities in the Community Youth Development Study, a 5-year group randomized controlled trial designed to test the efficacy of the CTC system. CTC installation in these communities included the delivery of six CTC trainings from certified CTC trainers at each site, the active involvement of locally selected and community-based CTC community coordinators, ongoing monitoring of progress using the CTC milestones and benchmarks, and proactive technical assistance and coaching. CTC implementation fidelity ratings averaged across three groups of raters show that between 89% and 100% of the CTC milestones in the first four phases of CTC implementation were "completely met" or "majority met" in the 12 intervention communities, indicating that the first four phases of the CTC system have been well implemented in the communities in this trial. © 2008 Wiley Periodicals, Inc. [source] Evidence-based early reading practices within a Response to Intervention systemPSYCHOLOGY IN THE SCHOOLS, Issue 5 2010Bill Bursuck Many students who experience reading failure are inappropriately placed in special education. A promising response to reducing reading failure and the overidentification of students for special education is Response to Intervention (RTI), a comprehensive early detection and prevention system that allows teachers to identify and support struggling readers early, before they fail. A key component of RTI is the implementation of evidence-based reading practices within a multitiered framework. School psychologists are increasingly being asked to lead or be members of RTI building teams. As such, they can play an important role in assuring that evidence-based practices in reading are implemented with integrity. The purpose of this article is to provide a framework for judging the extent to which early reading instruction within a multitier RTI system is evidence based. Key evidence-based practices related to the content, design, and delivery of early reading instruction are described. © 2010 Wiley Periodicals, Inc. [source] Executive function in traumatic brain injury and obsessive,compulsive disorder: An overlap?PSYCHIATRY AND CLINICAL NEUROSCIENCES, Issue 2 2001Rudolf Coetzer MA Abstract Thirteen individuals with traumatic brain injury, 13 individuals with obsessive,compulsive disorder (OCD) and 10 normal controls were compared on neuropsychological measures of executive function. Individuals with a traumatic brain injury performed significantly poorer than the other two groups on a test measuring visuo-spatial strategy. Although the traumatic brain injury group made more errors on a test of maze learning and the OCD group less than the control group, this did not reach statistical significance. No support for an overlap in executive dysfunction in traumatic brain injury and OCD was found. It may be that the ,error prevention system' in the brain was influenced in a contrasting way by executive dysfunction in these disorders. This difference may reveal itself clinically in impulsivity/perseveration and slowness, respectively. Further studies were needed to test this hypothesis. [source] The cigar as a drug delivery device: youth use of bluntsADDICTION, Issue 10 2003Stephen Soldz ABSTRACT Aims, Blunts are hollowed-out cigars used to smoke marijuana (and perhaps other substances) in the United States. We investigated rates of blunt use; whether cigar use reported in surveys may actually be blunt use; the relationship of blunt to cigar use; characteristics of blunt users; brands of cigars used to make blunts; and drugs added to blunts. Design, A school-based survey of youth, the Cigar Use Reasons Evaluation (CURE). Setting, Eleven schools across Massachusetts. Participants, A total of 5016 students in grades 7,12. Measurements, CURE items assessing blunt, cigar and cigarette use, brands used to make blunts, drugs added to blunts and demographics were used. Findings, Life-time blunt use was reported by 20.0% of the sample, with use greater among high school (25.6%) than middle school (11.4%) students, and among males (23.7%) than females (16.6%). Self-reported cigar use rates were not influenced strongly by blunt use being misreported as cigar use. In a multivariate model, blunt use was associated with male gender, higher grade in school, lower GPA, truancy, lower school attachment, not living in a two-parent family, being of ,other' race/ethnicity and current use of both cigarettes and cigars. ,Phillies' was the most popular brand of cigar for making blunts, used by 59.$% of users. ,Garcia y Vega' (18.0%) was the second most popular. Twenty-eight per cent of blunt users had added drugs other than marijuana to blunts. Conclusions, The use of blunts as a drug delivery device is a serious problem. Efforts to address it will require the cooperation of the tobacco control and substance abuse prevention systems. [source] Strengthening Prevention Performance Using Technology: A Formative Evaluation of Interactive Getting To Outcomes®AMERICAN JOURNAL OF ORTHOPSYCHIATRY, Issue 4 2009Matthew Chinman PhD Communities face challenges implementing evidence-based prevention programs. To help, policymakers are exploring how to build community-level capacity for prevention for thousands of organizations or communities across the United States. This article reports on a formative evaluation within 2 states' prevention systems of an Internet system designed to build capacity on a large scale, interactive Getting To Outcomes® (iGTO). In Tennessee, 30 coalitions were randomly assigned to receive either the iGTO system or nothing. In Missouri, 18 coalitions receiving iGTO were compared with 8 like coalitions who did not receive iGTO. The primary outcome was iGTO's impact on the performance of the coalitions' programs, assessed through interviews at baseline and after a year of iGTO implementation. Analyses suggest that iGTO-programs improved their performance of prevention practices over non-iGTO programs. Semi-structured interviews of iGTO users and state-level stakeholders showed that iGTO was adopted by most iGTO-assigned coalitions, albeit in mostly an elementary fashion. Perceptions of the iGTO system were mixed. The findings suggest that more comprehensive integration requires that state leadership also use iGTO and provide more support for its use at the local level. [source] Building secure products and solutionsBELL LABS TECHNICAL JOURNAL, Issue 3 2007Ashok K. Gupta Many security vulnerabilities in current information technology (IT) solutions and products are the result of a piecemeal "strap-on" security approach. The inclusion of many security add-ons, such as firewalls, antivirus software, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs), may imply that the security objectives were an afterthought, not adequately defined initially, or that the required security objectives were never met by the individual system components. In fact, a "grounds-up" approach to security, where each component is individually secure, in a defined network deployment scenario helps meet the need of minimal risk exposure. Security should not be bolted on; rather, it should be the prime consideration from the beginning and throughout the entire lifecycle,from concept to deployment and ongoing operation for each product in the solution. Given the ever-increasing sophistication of attacks, developing and monitoring secure products have become increasingly difficult. Despite the wide-scale awareness of common security flaws in software products, e.g., buffer overflows, resource exhaustion, and structured query language (SQL) injection, the same flaws continue to exist in some of the current products. The objective of this paper is to introduce a technology-agnostic approach to integrating security into the product development lifecycle. The approach leverages the Bell Labs Security Framework, the foundation of the International Telecommunication Union, Telecommunication Standardization Sector (ITU-T) X.805 global standard. Building this framework into the product lifecycle supports the goal of realizing secure products. The security framework can be applied to any product domain to facilitate security requirements analysis and the development of usable tools such as checklists, guidelines, and security policies. The application of Bell Labs Security Framework concepts and its use in the development of secure products are illustrated using the example of a centrally managed firewall product. © 2007 Alcatel-Lucent. [source] |