The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|5 Trends Transforming Public Safety Communications||
Public safety communications are transforming. The 2015 research revealed five key trends that impact agencies of all sizes. These indicators signal fundamental changes in the way agencies interact with their communities, interoperate with each other, access real-time information, migrate to more collaborative multi-networks and devices, and manage data and evolving technologies.
|A Cloud Roadmap: From Implementation to Innovation How a Complete Cloud Offers Agencies a Modern Approach to Cutting-Edge Service Delivery||
The government IT infrastructure must evolve. The traditional approach to delivering IT services is proving incapable of keeping up with either the growing complexity of the IT enterprise or the increasing demand for innovation. This pressure to provide an infrastructure that is more manageable, scalable and flexible is pushing government agencies to accelerate their adoption of cloud solutions.
Until recently, government agencies have been slow to move to the cloud. In 2011, the Office of Management and Budget (OMB) issued its “Cloud First” policy, which directed agencies to adapt their IT strategies to take full advantage of the cloud. Yet a September 2014 report from the U.S. Government Accountability Office found that at seven major agencies, investments in the cloud accounted for a mere two percent of IT budgets. Collectively, the agencies consider cloud services for only 33 percent of their IT investments.
|Cloud||Data Management||May 2016|
|A Comparison of Averted and Completed School Attacks from the Police Foundation Averted School Violence Database||
The Police Foundation, in collaboration with the COPS Office, implemented the Averted School Violence (ASV) database to provide a platform for sharing information about averted incidents of violence in institutions of elementary, secondary, and higher education. As a companion to the preliminary report on the ASV database (Daniels 2018), this report compares 51 completed with 51 averted incidents of school violence from the ASV database and analyzes both sets. It includes findings on the demographics of individuals who plan attacks, victims' demographics in completed attacks, and community characteristics; it also provides important recommendations to minimize school violence and improve student and school safety.
|School Security||Security||February 2019|
|A Comprehensive Report on School SafetyTechnology||
Under cooperative agreement, NIJ tasked the National Criminal Justice Technology Research, Test and Evaluation (RT&E) Center at Johns Hopkins University to undertake a comprehensive assessment of how technology is currently used in the United States and in other countries to prevent and respond tocriminal acts of violence in K-12 schools, both public and private.
The resulting report, entitled “A Comprehensive Review of School Safety Technologies,” is intended to be used by a range of audiences, including school administrators, security directors, principals, and others. It features four research components—a literature review, a technology review, case studies, and a legal review. It examines the technologies currently being used, how they are used, how those technologies were chosen, and how well they are working. By providing this context, school officials can make informed decisions about technology choices that can increase the safety of school children, faculty, and staff.
|School Safety||Security||October 2016|
|A Framework for Improving Cross-Sector Coordination for Emergency Preparedness and Response||
Action Steps for Public Health, Law Enforcement, the Judiciary and Corrections
|Emergency Preparedness and Response Coordination||Data Management||June 2008|
|A Practical Path to Unified Identity Across Data Center, Cloud and Mobile||
Establishing and maintaining a security and compliance posture, in what is a disparate and dynamically changing IT environment, is regularly cited as the top concern of IT leaders who are responsible for mitigating risk and protecting the information assets of their organizations. The major trends at the heart of this changing IT environment is the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.
|Saas||Data Management||October 2015|
|A Project Manager's Guide to RMS/CAD System Software Acquisition||
This no-cost guide was developed to provide law enforcement practitioners with a practical and high level overview of project planning, requirements development, and purchasing phases of RMS/CAD System software acquisition. This document is based on the LEITSC Standard Functional Specifications for Law Enforcement Computer Aided Dispatch (CAD) Version I and Records Management Systems (RMS) Version II. Published with support from the Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA).
|RMS/CAD Acquisition||Data Management||May 2009|
|A Report from the Task Force on State and Local Homeland Security Funding||
Homeland Security Secretary Tom Ridge formed the Task Force on State and Local Homeland Security Funding to examine why federal funds were not reaching local governments and first responders in a timely fashion. The Task Force was brought together on a bipartisan basis to examine the funding process and to provide specific recommendations to expedite the flow of homeland security dollars to those responsible for preventing and responding to acts of terrorism.
|A Report on Technical and Operational Issues Impacting the Provision of Wireless Enhanced 911 Services||
The purpose of this report is to convey the results of an independent inquiry into the technical and operational issues affecting the deployment of wireless Enhanced 911 (“E911”) services in the United States. The inquiry was carried out by the author on behalf of the Federal Communications Commission (“Commission”) over a six month period beginning on April 15, 2002.
|E911 Assessment/Analysis||Communications||September 2002|
|A State Government Protects Citizen Data by Securing Applications||
A state government, facing concerns from citizens over data breaches and concerned about federal requirements such as HIPAA, implemented a high priority initiative on cybersecurity. Recognizing the importance of application security as part of an overall cybersecurity approach (including security training and data loss prevention technology), the state’s CIO brought in Veracode to provide an application security governance program that could be easily rolled out across multiple state agencies.
With Veracode’s cloud-based service and policy-based approach, the state has assessed 200 applications across 14 state agencies in the first year of the program, fixing over 28,000 flaws and achieving a 77% pass rate on the state’s application security policy. Additionally, the state has begun requiring vendors to meet the application security standards as well.
|Data Security||Data Management, Security||April 2016|