The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Strategies for Connecting Unemployment Insurance (UI) Claimants to the Workforce System: Findings from the Implementation Study of the UI Workforce Connectivity Grant Program||
In 2010 the Department established a workgroup comprised of workforce leaders at the local, state, and national levels, and partnered with the National Association of State Workforce Agencies (NASWA) to develop a shared national vision to improve connectivity between UI program service delivery and reemployment services provided through the workforce system, both through one-stop centers and virtually and to promote innovative reemployment service delivery strategies for all job seekers.
To advance this new national vision the Department partnered with the National Association of State Workforce Agencies Information Technology Support Center (NASWA/ITSC) to provide grants to states to implement strategies and technology tools that embodied the different elements of the vision, now referred to as the UI Reemployment Connectivity Project (the project). As part of the connectivity grants program, the Department sponsored an implementation study of the Reemployment Connectivity Project.
|Virtual Service Delivery Methods||Data Management, Communications, Services||January 2017|
|Experiences of Three States in Developing Social Media Strategies for Employment Assistance Programs||
As part of its State Demonstration Projects in Providing Reemployment Services to UI Claimants (commonly known as the UI Workforce Connectivity Project), DOL provided grants in 2011 to three states to develop and use social media tools for the workforce system. These three-year grants enabled the states to develop new opportunities and modify existing service delivery processes using social media tools as a way to improve employment outcomes for job seekers, including outreach to job seekers, connecting job seekers and employers, and promoting networking among job seekers. To assess the effectiveness of these tools, DOL sponsored an implementation study of the grants.
|Social Media Tools||Data Management, Communications||January 2017|
|Trends in Smart City Development||
The National League of Cities (NLC) released "Trends in Smart City Development," a new report featuring case studies about how five cities — Philadelphia, San Francisco, Chicago, Charlotte, N.C., and New Delhi, India — are implementing smart city projects from different approaches. The report also provides recommendations to help local governments consider and plan smart city projects.
|Smart Cities, Transportation||Communications||January 2017|
|Smart City Challenge: Lessons for Building Cities of the Future||
In December 2015, the US Department of Transportation launched the Smart City Challenge, asking mid-sized cities across America to share their ideas for how to create an integrated, first-of-its-kind smart transportation system that would use data, applications, and technology to help people and goods move faster, cheaper, and more efficiently. The applications proposed a wide range of innovative approaches to tackling urban mobility challenges. This report outlines ideas from the 78 Smart City visions.
|Transportation, Smart Cities||Communications||January 2017|
|State Progress in Record Reporting for Firearm-Related Background Checks: Misdemeanor Crimes of Domestic Violence||
This report was prepared by SEARCH and the National Center for State Courts using Federal funding provided by the Bureau of Justice Statistics (BJS).
This resource is part of a series of BJS grant-funded reports on firearm-related background checks. This report provides an overview of legislation (National Instant Criminal Background Check System Improvement Amendments Act) and reporting mechanisms for misdemeanor crimes of domestic violence, the challenges states face in reporting, strategies implemented to overcome the challenges, and data that illustrate the improvements accomplished over the past 20 years in this area.
|Data Sharing||Data Management||January 2017|
|Guide for Cybersecurity Event Recovery||
As the number of cybersecurity incidents climbs, and the variety of types of attacks grows, “It’s no longer if you are going to have a cybersecurity event, it is when,” said computer scientist Murugiah Souppaya, one of the guide’s authors.
NIST computer researchers wrote the Guide for Cybersecurity Event Recovery to consolidate existing NIST recovery guidance such as on incident handling and contingency planning. It also provides a process that each organization—federal or otherwise—can use to create its own comprehensive recovery plan to be ready when a cybersecurity event occurs.
|Data Security||Security||January 2017|
|NASCIO and NASPO Topical Roundtable Designing for Agility: Advancing IT and Procurement Modernization||
In continuing their shared interests in working together to improve IT procurement, NASPO and NASCIO have developed an action plan for navigating the ever-changing terrain shaping state procurement efforts and information technology updates. The action plan addresses several key areas of state government common to both specialties, including governance and organizational structure; teaming and roles; interactions and processes; and budgeting and forecasting.
|IT Procurement||Uncategorized||January 2017|
|The Role of Technology in Improving K–12 School Safety||
The National Institute of Justice has commissioned the RAND Corporation Justice Policy
|School Safety||Security||December 2016|
|Safer, Less Vulnerable Software Is the Goal of New NIST Computer Publication||
We can create software with 100 times fewer vulnerabilities than we do today, according to computer scientists at the National Institute of Standards and Technology (NIST). To get there, they recommend that coders adopt the approaches they have compiled in a new publication.
The 60-page document, NIST Interagency Report (NISTIR) 8151: Dramatically Reducing Software Vulnerabilities(link is external), is a collection of the newest strategies gathered from across industry and other sources for reducing bugs in software. While the report is officially a response to a request for methods from the White House’s Office of Science and Technology Policy, NIST computer scientist Paul E. Black says its contents will help any organization that seeks to author high-quality, low-defect computer code.
|Data Security||Data Management, Security||December 2016|
|Blue Ribbon Commission Urges Next President to Strengthen Cybersecurity Efforts in First 100 Days||
To protect and continue to expand the digital economy, the next U.S. president must strengthen collaboration between the public and private sectors before, during and after cybersecurity events, according to a new report released today by a blue ribbon Presidential Commission.
“When it comes to cybersecurity, organizations cannot operate in isolation. It is impossible to stop all attacks. Resilience must be a core component of any cybersecurity strategy,” the commissioners said in their report.
The Commission on Enhancing National Cybersecurity was established by President Obama (Executive Order 13718 (link is external)) with the explicit purpose of making recommendations to strengthen cybersecurity in both the public and private sectors.
The 90-page report emphasizes the need for partnerships between the public and private sectors, as well as international engagement. It also discusses the role consumers must play in enhancing our digital security. The report categorizes its recommendations within six overarching imperatives focused on infrastructure, investment, consumer education, workforce capabilities, government operations, and requirements for a fair and open global digital economy.
|Cybersecurity||Data Management, Security||December 2016|