The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Case Study: Connecting the Dots - Supporting Evidence-Based Sentencing Decisions With Risk-Need-Responsivity Principles||
In 2011 the Conference of Chief Judges and the Conference of State Court Administrators endorsed a set of principles for incorporating risk and need assessment information into sentencing1. As of this writing, the National Center for State Courts (NCSC) has published reports for ten jurisdictions profiling their experiences using validated risk-need assessments (RNA) to inform their sentencing practices.
With decades of research advocating the need for a more scientifically objective approach to sentence decision-making, and with numerous jurisdictions reporting success in using such tools, it is our belief that the trend toward RNA-informed sentencing will continue to gain speed and acceptance.
This paper provides a historical perspective as well as the current thinking on the use of evidence-based practices for judicial case formulation and sentencing design. To help illustrate the benefits of validated RNA and assist the user in “connecting the dots”, this paper references the COMPAS2 (Correctional Offender Management Profiling for Alternative Sanctions) RNA system. There are several RNA systems available to justice agencies for this purpose and we encourage the reader’s independent investigation of such tools.
Sponsored by CourtView
|Correctional Offender Management||Data Management||March 2015|
|2015 Key Market Drivers||
This report will help state and local IT vendors:
|Key Market Drivers||Uncategorized||January 2015|
|Implementing a Body-Worn Camera Program: Recommendations and Lessons Learned||
The Police Executive Research Forum (PERF), with support from the Office of Community Oriented Policing Services (COPS), conducted research in 2013 on the use of body-worn cameras. This research included interviews with police executives, a review of agencies' policies, and a national conference at which 200 police executives and other experts discussed their experiences with body-worn cameras. This publication describes the findings of this research, explores the issues surrounding body-worn cameras, and offers policy recommendations for law enforcement agencies.
|Body Worn Cameras||Mobile/Portable Computing||September 2014|
|Criminal Justice Information Services (CJIS) Security Policy (v5.3)||
The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual-contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity-with access to, or who operate in support of, criminal justice services and information.
|Data Security||Security||August 2014|
|2012 Census of Governments - Individual State Descriptions||
A census of governments is taken at 5-year intervals as required by law under Title 13, U.S. Code, Section 161. This 2012 Census covers three major subject fields—government organization, public employment, and government finances.The “Individual State Descriptions” provides information about the organization of state and local governments. There is a separate summary for each state and the District of Columbia. The summaries are divided according to the five basic types of local governments recognized for the U.S. Census Bureau’s classification of government units— county, municipal, township, school district, and special district governments.
|Government organization, employment, and finances||Uncategorized||September 2013|
|Mitigating Risks in the Application of Cloud Computing in Law Enforcement||
Mitigating Risks in the Application of Cloud Computing in Law Enforcement, by Paul Wormeli, Executive Director Emeritus, IJIS Institute, explores concerns the law enforcement community has regarding Cloud Computing, its reliability and availability, performance requirements, cost of migration, and the recovery of data. The report concludes with six recommendations on how law enforcement organizations can successfully implement a move to cloud computing.
|Cloud Computing||Data Management, Security||October 2012|
|Steps to Prepare for Public Safety Broadband||
The National Governors Association hosted a forum, "Preparing for Public Safety Broadband," to help states with the implementation of the nationwide broadband network dedicated to public safety communications. During the forum NGA released Steps to Prepare for Public Safety Broadband and an accompanying white paper, which outlines the essential steps states can take now to prepare for implementation.
|Public Safety Broadband||Communications||July 2012|
|Health Care: Next Steps After the Supreme Court Decision||
The National Governors Association held a meeting for states entitled Health Care: Next Steps after the Supreme Court Decision, which offered governors' health policy advisors, Medicaid directors, insurance commissioners and exchange leads an opportunity to confer with each other, federal officials and health system experts about next steps relative to their state's health care system. Here is a summary of the meeting and an appendix of questions from states compiled during the meeting.
|Health Care System||Data Management||July 2012|
|Criminal Justice Information Services (CJIS) Security Policy (v5.1)||
The CJIS Security Policy provides Criminal Justice Agencies (CJA) and Noncriminal Justice Agencies (NCJA) with a minimum set of security requirements for the access to Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division systems and information and to protect and safeguard Criminal Justice Information (CJI).
|Criminal Justice Information Security||Data Management||July 2012|
|Leveraging Enterprise Architecture for Improved IT Procurement||
This NASCIO brief presents an overview of how the discipline of Enterprise Architecture (EA) can be used to improve and lower costs of state IT procurement. The degree of EA maturity in states can vary as much as the very rules that govern IT procurement, but a closer look will provide guidance on alignment of these vital functions of government.
|IT Procurement||Uncategorized||June 2012|