The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Trends in Smart City Development||
The National League of Cities (NLC) released "Trends in Smart City Development," a new report featuring case studies about how five cities — Philadelphia, San Francisco, Chicago, Charlotte, N.C., and New Delhi, India — are implementing smart city projects from different approaches. The report also provides recommendations to help local governments consider and plan smart city projects.
|Smart Cities, Transportation||Communications||January 2017|
|Smart City Challenge: Lessons for Building Cities of the Future||
In December 2015, the US Department of Transportation launched the Smart City Challenge, asking mid-sized cities across America to share their ideas for how to create an integrated, first-of-its-kind smart transportation system that would use data, applications, and technology to help people and goods move faster, cheaper, and more efficiently. The applications proposed a wide range of innovative approaches to tackling urban mobility challenges. This report outlines ideas from the 78 Smart City visions.
|Transportation, Smart Cities||Communications||January 2017|
|State Progress in Record Reporting for Firearm-Related Background Checks: Misdemeanor Crimes of Domestic Violence||
This report was prepared by SEARCH and the National Center for State Courts using Federal funding provided by the Bureau of Justice Statistics (BJS).
This resource is part of a series of BJS grant-funded reports on firearm-related background checks. This report provides an overview of legislation (National Instant Criminal Background Check System Improvement Amendments Act) and reporting mechanisms for misdemeanor crimes of domestic violence, the challenges states face in reporting, strategies implemented to overcome the challenges, and data that illustrate the improvements accomplished over the past 20 years in this area.
|Data Sharing||Data Management||January 2017|
|Guide for Cybersecurity Event Recovery||
As the number of cybersecurity incidents climbs, and the variety of types of attacks grows, “It’s no longer if you are going to have a cybersecurity event, it is when,” said computer scientist Murugiah Souppaya, one of the guide’s authors.
NIST computer researchers wrote the Guide for Cybersecurity Event Recovery to consolidate existing NIST recovery guidance such as on incident handling and contingency planning. It also provides a process that each organization—federal or otherwise—can use to create its own comprehensive recovery plan to be ready when a cybersecurity event occurs.
|Data Security||Security||January 2017|
|NASCIO and NASPO Topical Roundtable Designing for Agility: Advancing IT and Procurement Modernization||
In continuing their shared interests in working together to improve IT procurement, NASPO and NASCIO have developed an action plan for navigating the ever-changing terrain shaping state procurement efforts and information technology updates. The action plan addresses several key areas of state government common to both specialties, including governance and organizational structure; teaming and roles; interactions and processes; and budgeting and forecasting.
|IT Procurement||Uncategorized||January 2017|
|The Role of Technology in Improving K–12 School Safety||
The National Institute of Justice has commissioned the RAND Corporation Justice Policy
|School Safety||Security||December 2016|
|Safer, Less Vulnerable Software Is the Goal of New NIST Computer Publication||
We can create software with 100 times fewer vulnerabilities than we do today, according to computer scientists at the National Institute of Standards and Technology (NIST). To get there, they recommend that coders adopt the approaches they have compiled in a new publication.
The 60-page document, NIST Interagency Report (NISTIR) 8151: Dramatically Reducing Software Vulnerabilities(link is external), is a collection of the newest strategies gathered from across industry and other sources for reducing bugs in software. While the report is officially a response to a request for methods from the White House’s Office of Science and Technology Policy, NIST computer scientist Paul E. Black says its contents will help any organization that seeks to author high-quality, low-defect computer code.
|Data Security||Data Management, Security||December 2016|
|Blue Ribbon Commission Urges Next President to Strengthen Cybersecurity Efforts in First 100 Days||
To protect and continue to expand the digital economy, the next U.S. president must strengthen collaboration between the public and private sectors before, during and after cybersecurity events, according to a new report released today by a blue ribbon Presidential Commission.
“When it comes to cybersecurity, organizations cannot operate in isolation. It is impossible to stop all attacks. Resilience must be a core component of any cybersecurity strategy,” the commissioners said in their report.
The Commission on Enhancing National Cybersecurity was established by President Obama (Executive Order 13718 (link is external)) with the explicit purpose of making recommendations to strengthen cybersecurity in both the public and private sectors.
The 90-page report emphasizes the need for partnerships between the public and private sectors, as well as international engagement. It also discusses the role consumers must play in enhancing our digital security. The report categorizes its recommendations within six overarching imperatives focused on infrastructure, investment, consumer education, workforce capabilities, government operations, and requirements for a fair and open global digital economy.
|Cybersecurity||Data Management, Security||December 2016|
|Forensic Optical Topography - A Landscape Study||
The National Institute of Justice’s (NIJ’s) Forensic Technology Center of Excellence (FTCoE) at RTI International directed this landscape study of optical topography instrument for implementation in forensic practice with input from law enforcement, crime laboratories, research scientists, and practitioners in the criminal justice community. A landscape study, in concept, is designed to provide a comprehensive list of market participants, their products, and product features to enable better informed decisions by end users. This report provides a landscape view of currently available optical topography systems for firearms identification. It is intended to provide forensic laboratory directors, practitioners, and stakeholders with a survey of commercial systems and a basic introduction to the technology.
|Optical topography systems for firearms identification||Data Management||December 2016|
|Smart Cities: Wireless Connectivity Enhances AMI/Smart Meter Project||
Smart meter technology provides utilities with significant operational and customer service benefits. In 2014, Memphis Light, Gas & Water (MLGW) began deploying an advanced metering infrastructure (AMI) and smart meters to enhance services for its 425,000 customers.
MLGW, a division of the City of Memphis, is the largest three-service municipal utility in the U.S. Since 1939, MLGW has provided electricity, natural gas, and water services for 425,000 residents and businesses in Memphis and adjoining Shelby County, covering a 768 square mile operating area. To better capture customer billing data and to streamline operations, MLGW is installing electric, gas and water smart meters at customer premises throughout its territory.
|Wireless Connectivity||Data Management||November 2016|