Publications

The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
The Rise of the Connected City

As technology increasingly puts the citizen in control, it also creates a call to action for administrators.

Administrators need to use technology as an opportunity to transform services and modernize the city, solving growing gaps that drive a stake between citizens and governments. They need to create a connected city.

A connected city is one that unites people, process, and government to one another across the community. Digital technology and online access enables administrators to place citizens at the heart of all operations, empowering leaders with the in-depth insight and tools targeting a specific gap they need fill in order to deliver a better tomorrow.

Sponsored by CarahSoft

Data Interoperability Data Management November 2015
Our Connected Government

Our nation is built on connections. Connecting our people, our nation, to services and devices. Learn how Salesforce is transforming government for the 21st Century.

Sponsored by CarahSoft

Data Interoperability Data Management November 2015
Moving Forward: Leadership Toolkit for State CISOs

In 2006, the National Association of State Chief Information Officers (NASCIO) surveyed state chief information security officers (CISOs) and released a report titled, A Current View of the State CISO: A National Survey Assessment. The report called for a heightened role of state CISOs as cybersecurity continues to be an important issue to states and state chief information officers (CIOs). Fast forward nearly 10 years and cybersecurity is not only “an” important issue but “the” issue of most importance to state CIOs.

Data Security Data Management, Security October 2015
The Vision and Value of a Connected Government

Government is in the midst of a profound transformation, powered by innovative ideas and a commitment to do better. The new model puts citizens first and agencies out in front of needs – anticipating, personalizing, and delivering intelligent services when, where, and to whom they are needed.

Government organizations are continuing the tradition of innovation that created the Internet 40 years ago. The transformation in progress today is equally profound. The stakes are high and the needs are urgent. Failures make headlines. Government needs to lead again - working to improve critical services without adding costs - turning to technology innovation to get there.

Sponsored by CarahSoft

Data Sharing Data Management October 2015
A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

Establishing and maintaining a security and compliance posture, in what is a disparate and dynamically changing IT environment, is regularly cited as the top concern of IT leaders who are responsible for mitigating risk and protecting the information assets of their organizations. The major trends at the heart of this changing IT environment is the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.

Saas Data Management October 2015
2015 State CIO Survey: The Value Equation

The state IT and business landscape continues to change, reflecting both emerging approaches to delivering IT products and services, and also the faster paced, more complex environment
faced by state CIOs. We asked state CIOs to share their perspective on a number of topics, with a particular focus on the emerging role of the CIO as a broker of shared services, and
on the use of incremental software development approaches to accelerate the delivery of value to customers. These topics share a common theme – customer expectations continue to rise, and state CIOs must be agile enough to adapt to changing circumstances and to rapidly deliver business value. We also asked CIOs about the characteristics they felt were most valuable for a state CIO, and which dimensions of the role were most critical for success. 

Data Management Data Management October 2015
The Value Equation Agility in Sourcing, Software and Services

The state IT and business landscape continues to change, reflecting both emerging approaches to delivering IT products and services, and also the faster paced, more complex environment faced by state CIOs. We asked state CIOs to share their perspective on a number of topics, with a particular focus on the emerging role of the CIO as a broker of shared services, and on the use of incremental software development approaches to accelerate the delivery of value to customers. These topics share a common theme – customer expectations continue to rise, and state CIOs must be agile enough to adapt to changing circumstances and to rapidly deliver business value. We also asked CIOs about the characteristics they felt were most valuable for a state CIO, and which dimensions of the role were most critical for success. 

Technology Products and Services Data Management, Services, Technology Equipment October 2015
Guide to Application Whitelisting

A whitelist is a list of discrete entities, such as hosts, email addresses, network port numbers, runtime processes, or applications that are authorized to be present or active on a system according to a welldefined baseline. A blacklist is a list of discrete entities that have been previously determined to be associated with malicious activity. A graylist is a list of discrete entities that have not yet been established as benign or malicious; more information is needed to move graylist items onto a whitelist or a blacklist. Whitelists, blacklists, and graylists are primarily used as a form of access control: permitting activity corresponding to the whitelist and not permitting activity corresponding to the blacklist.

Data Security Data Management October 2015
Policy Machine: Features, Architecture, and Specification

The purpose of this Internal Report (IR) is to provide an overview of the PM and guidelines for its implementation. The report explains the basics of the PM framework and discusses the range
of policies that can be specified and enacted. It also describes the architecture of the PM and the details of key functional components.

This document, while technical in nature, provides background information to help readers understand the topics that are covered. The material presumes that readers have a basic understanding of computer security and possess fundamental operating system and networking expertise. 

Data Security, Access Control Data Management, Security October 2015
Justice Assistance Grant (JAG) Program, 2015

The Department of Justice's Bureau of Justice Statistics (BJS) has released Justice Assistance Grant (JAG) Program, 2015, which describes steps used in the Edward Byrne Memorial Justice Assistance Grant (JAG) formula calculation process to determine award amounts for states, local governments, and territories. It presents summary results of the FY 2014 allocation amounts.

Grant Funding Uncategorized October 2015

Pages