Publications

The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
K-12 Education Secure Online Testing Solution

Is your school district prepared to securely deliver state assessments that comply with the Common Core State Standards Initiative?

The target 2014–2015 school year for rolling out Common Core testing is here and many school districts are still not prepared for how they will administer the tests. How can a school district securely deliver hundreds if not thousands of online tests using specific browsers or browser versions without having to touch each testing station? Also, once the testing period is over, how can a testing room be quickly switched back to a general purpose computer lab?

Sponsored by Carahsoft

Date Security, Education, Virtualization Data Management, Security June 2015
Body-Worn Cameras: Additional Considerations for the Camera Craze

The public perception is that body-worn cameras are a panacea, a cure-all for issues concerning law enforcement, but, with any new technology, there are a number of other considerations before implementation can occur.

Read CJIS GROUP’s examination of the body-worn craze, including

  • how agencies are buying new systems,
  • what other technologies should be included and
  • other areas of opportunity related to this hot trend. 
Body Worn Cameras, Security, Data Storage Security, Mobile/Portable Computing, Technology Equipment June 2015
IT Evolution to a Hybrid Enterprise Drives the Need for Location- Independent Computing
Enterprise IT has gone through several waves of evolution since the birth of computing. The computing platform has evolved from mainframe computing to  minicomputers, shifted to client/server computing, and finally moved to Internet computing in the cloud era.
Hybrid Computing, Cloud Computing, Legacy Systems Data Management May 2015
Are your legacy systems suitable for the cloud?
3 Critical Evaluation Activities to Ensure Migration Success
Many enterprises are currently planning or are in the process of migrating their critical business applications to the cloud as the trend toward the hybrid enterprise continues to gather momentum. In fact, the industry predicts that enterprise spending on cloud-related services could reach the $235 billion mark by 2017.
 
Sponsored by Riverbed
Modernization, Cloud Computing, Legacy Systems Data Management May 2015
Case Study: Michigan OCS delivers great service to citizens.
The Michigan Office of Child Support (OCS) is dedicated to helping families become and remain self-sufficient. This commitment motivated OCS to make organizational and infrastructure changes, including case intake process improvements and implementation of a new Interactive Voice Response (IVR) phone system, in order to deliver more responsive service to citizens.
 
Sponsored by Nuance
Interactive Voice Response (IVR), Citizen Engagement Data Management, Communications May 2015
CJIS Data-in-Transit Encryption Standards: How to Address Your Criminal Justice Information Services Security Policy Requirements Effectively
For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure that the security mechanisms employed don’t in any way impede staff in fulfilling the agencies’ chief charter: fighting crime. This paper examines data-in-transit encryption, which is an important component of CJIS-SP requirements. It offers a number of insights into the approaches that can help organizations address data-in-transit encryption policies most efficiently and effectively—while ensuring that investigators and other users always get reliable, timely access to the information they need to do their jobs.
Data Security, CJIS Security Policy Data Management, Security May 2015
Case Study: Natural language— NYC311 service better than ever.
For more than 10 years, NYC311has provided the public with quick, easy access to all New York City non-emergency government services and information while maintaining the highest possible level of customer service. It helps agencies improve service delivery by allowing them to focus on their core missions and manage their workloads efficiently. Today NYC311 is the most popular customer channel the City averaging more than 20 million calls per year.
Sponsored by Nuance
Interactive Voice Response (IVR), Citizen Engagement Communications May 2015
US DOJ Office of Justice Programs Body Worn Cameras Funding Fact Sheet
The Department of Justice (DOJ) recognizes that body-worn cameras are one law enforcement strategy aimed at improving public safety, reducing crime, and improving public trust between police and the citizens they serve. DOJ provides numerous resources to assist state, local, and tribal law enforcement agencies in developing and enhancing their body-worn camera program. In addition to the resources listed in this BWC Funding Fact Sheet, the Edward Byrne Memorial Justice Assistance Grant (JAG) Program is a valuable resource for agencies when seek body-worn camera programs.
Body Worn Cameras, Federal Funding Mobile/Portable Computing May 2015
Case Study: Connecting the Dots - Supporting Evidence-Based Sentencing Decisions With Risk-Need-Responsivity Principles
In 2011 the Conference of Chief Judges and the Conference of State Court Administrators endorsed a set of principles for incorporating risk and need assessment information into sentencing1. As of this writing, the National Center for State Courts (NCSC) has published reports for ten jurisdictions profiling their experiences using validated risk-need assessments (RNA) to inform their sentencing practices.
With decades of research advocating the need for a more scientifically objective approach to sentence decision-making, and with numerous jurisdictions reporting success in using such tools, it is our belief that the trend toward RNA-informed sentencing will continue to gain speed and acceptance.
This paper provides a historical perspective as well as the current thinking on the use of evidence-based practices for judicial case formulation and sentencing design. To help illustrate the benefits of validated RNA and assist the user in “connecting the dots”, this paper references the COMPAS2 (Correctional Offender Management Profiling for Alternative Sanctions) RNA system. There are several RNA systems available to justice agencies for this purpose and we encourage the reader’s independent investigation of such tools.
 
Sponsored by CourtView
Correctional Offender Management Data Management March 2015
2015 Key Market Drivers

This report will help state and local IT vendors:

  • Identify the top areas of concern for state and local government agencies and how those issues influence procurement of IT systems
  • Understand language and key terms that government agencies use when referring to new technologies
  • Review live, pre-RFP, projects uncovered by CJIS GROUP researchers that fit each top market driver
  • Develop strategies to work with agencies that are assessing and reviewing new technologies in the near future
Key Market Drivers Uncategorized January 2015

Pages