Skip to main content



Child-Maltreatment-Research-L (CMRL) List Serve

Browse or Search All Past CMRL Messages

Welcome to the database of past Child-Maltreatment-Research-L (CMRL) list serve messages (10,000+). The table below contains all past CMRL messages (text only, no attachments) from Nov. 20, 1996 - September 14, 2018 and is updated quarterly.

Instructions: Postings are listed for browsing with the newest messages first. Click on the linked ID number to see a message. You can search the author, subject, message ID, and message content fields by entering your criteria into this search box:

Message ID: 8654
Date: 2010-10-01

Author:Kristen Johnson

Subject:RE: risk assessment tools for assessing abuse and neglect

The CSSP report makes important points about the need for ongoing evaluation and practice monitoring efforts to help ensure the appropriate use and accuracy of risk instruments. Peer-reviewed articles of shorter length that make similar points include: Shlonsky, A., & Wagner, D. (2005). The next step: Integrating actuarial risk assessment and clinical judgment into an evidence-based practice framework in CPS case management. Children and Youth Services Review, 27, 409–427. Toth, S., Manly, J. T., & Nilsen, W.J. (2008). From research to practice: Lessons learned. Journal of Applied Developmental Psychology , 29(4), 317–325. Folks wondering how to develop an accurate, equitable actuarial risk assessment may be interested in: Gottfredson, D. M., & Snyder, H. N. (2005). The mathematics of risk classification: Changing data into valid instruments for juvenile courts. Washington, D.C.: U.S. Department of Justice, Office of Juvenile Programs. Or S.D. Gottfredson and G.R. Jarjoura, "Race, Gender, and Guidelines Decision Making," Journal of Research in Crime and Delinquency 33, no. 1 (1996):49–69. Kristen Johnson, PhD The Children's Research Center, The National Council on Crime & Delinquency 426 S. Yellowstone Dr. Suite 250 Madison Wisconsin 53719 Ph: (608) 831-1180 Fx: (608) 831-6446 kjohnson@nccdcrc.org www.nccd-crc.org Please do not send any identifying or confidential information (such as names, birthdates, social security numbers) via e-mail. It is possible for third parties to intercept information transmitted in an e-mail. Identification numbers (such as case or referral numbers) may be included where necessary. Intercepting persons cannot use these numbers to identify a client unless they have access to the host application or database.

The CSSP report makes important points about the need for ongoing evaluation and practice monitoring efforts to help ensure the appropriate use and accuracy of risk instruments. Peer-reviewed articles of shorter length that make similar points include: Shlonsky, A., & Wagner, D. (2005). The next step: Integrating actuarial risk assessment and clinical judgment into an evidence-based practice framework in CPS case management. Children and Youth Services Review, 27, 409–427. Toth, S., Manly, J. T., & Nilsen, W.J. (2008). From research to practice: Lessons learned. Journal of Applied Developmental Psychology , 29(4), 317–325. Folks wondering how to develop an accurate, equitable actuarial risk assessment may be interested in: Gottfredson, D. M., & Snyder, H. N. (2005). The mathematics of risk classification: Changing data into valid instruments for juvenile courts. Washington, D.C.: U.S. Department of Justice, Office of Juvenile Programs. Or S.D. Gottfredson and G.R. Jarjoura, "Race, Gender, and Guidelines Decision Making," Journal of Research in Crime and Delinquency 33, no. 1 (1996):49–69. Kristen Johnson, PhD The Children's Research Center, The National Council on Crime & Delinquency 426 S. Yellowstone Dr. Suite 250 Madison Wisconsin 53719 Ph: (608) 831-1180 Fx: (608) 831-6446 kjohnsonnccdcrc.org www.nccd-crc.org Please do not send any identifying or confidential information (such as names, birthdates, social security numbers) via e-mail. It is possible for third parties to intercept information transmitted in an e-mail. Identification numbers (such as case or referral numbers) may be included where necessary. Intercepting persons cannot use these numbers to identify a client unless they have access to the host application or database.