The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|The Anywhere, Anytime College Experience||
Schools today need to ensure that students can access the information they need, whenever they need it, from whatever device they choose.
As technology advances and students remain on the cutting edge, colleges and universities have no choice but to keep up. While the changes in culture, strategy, and technology take some adjustment, the advances also ultimately benefit the institutions and their staff by improving efficiency, enhancing security, and bolstering management capabilities.
Sponsored by Carahsoft
|Mobility, Virtualization, Education||Data Management, Mobile/Portable Computing||June 2015|
|K-12 Education Secure Online Testing Solution||
Is your school district prepared to securely deliver state assessments that comply with the Common Core State Standards Initiative?
The target 2014–2015 school year for rolling out Common Core testing is here and many school districts are still not prepared for how they will administer the tests. How can a school district securely deliver hundreds if not thousands of online tests using specific browsers or browser versions without having to touch each testing station? Also, once the testing period is over, how can a testing room be quickly switched back to a general purpose computer lab?
Sponsored by Carahsoft
|Date Security, Education, Virtualization||Data Management, Security||June 2015|
|Body-Worn Cameras: Additional Considerations for the Camera Craze||
The public perception is that body-worn cameras are a panacea, a cure-all for issues concerning law enforcement, but, with any new technology, there are a number of other considerations before implementation can occur.
Read CJIS GROUP’s examination of the body-worn craze, including
|Body Worn Cameras, Security, Data Storage||Security, Mobile/Portable Computing, Technology Equipment||June 2015|
|IT Evolution to a Hybrid Enterprise Drives the Need for Location- Independent Computing||
Enterprise IT has gone through several waves of evolution since the birth of computing. The computing platform has evolved from mainframe computing to minicomputers, shifted to client/server computing, and finally moved to Internet computing in the cloud era.
|Hybrid Computing, Cloud Computing, Legacy Systems||Data Management||May 2015|
|Are your legacy systems suitable for the cloud?||
3 Critical Evaluation Activities to Ensure Migration Success
Many enterprises are currently planning or are in the process of migrating their critical business applications to the cloud as the trend toward the hybrid enterprise continues to gather momentum. In fact, the industry predicts that enterprise spending on cloud-related services could reach the $235 billion mark by 2017.
Sponsored by Riverbed
|Modernization, Cloud Computing, Legacy Systems||Data Management||May 2015|
|Case Study: Michigan OCS delivers great service to citizens.||
The Michigan Office of Child Support (OCS) is dedicated to helping families become and remain self-sufficient. This commitment motivated OCS to make organizational and infrastructure changes, including case intake process improvements and implementation of a new Interactive Voice Response (IVR) phone system, in order to deliver more responsive service to citizens.
Sponsored by Nuance
|Interactive Voice Response (IVR), Citizen Engagement||Data Management, Communications||May 2015|
|CJIS Data-in-Transit Encryption Standards: How to Address Your Criminal Justice Information Services Security Policy Requirements Effectively||
For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure that the security mechanisms employed don’t in any way impede staff in fulfilling the agencies’ chief charter: fighting crime. This paper examines data-in-transit encryption, which is an important component of CJIS-SP requirements. It offers a number of insights into the approaches that can help organizations address data-in-transit encryption policies most efficiently and effectively—while ensuring that investigators and other users always get reliable, timely access to the information they need to do their jobs.
|Data Security, CJIS Security Policy||Data Management, Security||May 2015|
|Case Study: Natural language— NYC311 service better than ever.||
For more than 10 years, NYC311has provided the public with quick, easy access to all New York City non-emergency government services and information while maintaining the highest possible level of customer service. It helps agencies improve service delivery by allowing them to focus on their core missions and manage their workloads efficiently. Today NYC311 is the most popular customer channel the City averaging more than 20 million calls per year.
Sponsored by Nuance
|Interactive Voice Response (IVR), Citizen Engagement||Communications||May 2015|
|US DOJ Office of Justice Programs Body Worn Cameras Funding Fact Sheet||
The Department of Justice (DOJ) recognizes that body-worn cameras are one law enforcement strategy aimed at improving public safety, reducing crime, and improving public trust between police and the citizens they serve. DOJ provides numerous resources to assist state, local, and tribal law enforcement agencies in developing and enhancing their body-worn camera program. In addition to the resources listed in this BWC Funding Fact Sheet, the Edward Byrne Memorial Justice Assistance Grant (JAG) Program is a valuable resource for agencies when seek body-worn camera programs.
|Body Worn Cameras, Federal Funding||Mobile/Portable Computing||May 2015|
|Case Study: Connecting the Dots - Supporting Evidence-Based Sentencing Decisions With Risk-Need-Responsivity Principles||
In 2011 the Conference of Chief Judges and the Conference of State Court Administrators endorsed a set of principles for incorporating risk and need assessment information into sentencing1. As of this writing, the National Center for State Courts (NCSC) has published reports for ten jurisdictions profiling their experiences using validated risk-need assessments (RNA) to inform their sentencing practices.
With decades of research advocating the need for a more scientifically objective approach to sentence decision-making, and with numerous jurisdictions reporting success in using such tools, it is our belief that the trend toward RNA-informed sentencing will continue to gain speed and acceptance.
This paper provides a historical perspective as well as the current thinking on the use of evidence-based practices for judicial case formulation and sentencing design. To help illustrate the benefits of validated RNA and assist the user in “connecting the dots”, this paper references the COMPAS2 (Correctional Offender Management Profiling for Alternative Sanctions) RNA system. There are several RNA systems available to justice agencies for this purpose and we encourage the reader’s independent investigation of such tools.
Sponsored by CourtView
|Correctional Offender Management||Data Management||March 2015|