The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
Tools for Civic Engagement

Governments that want to engage their citizens via technology have many choices; the challenge for most communities is determining which tools are right for them. While the factors influencing which tools a community should select often vary, the benefits that can be realized from new methods of civic engagement are clear. This publication highlights key features to consider when selecting civic engagement tools.

Civic Engagement Data Management June 2016
Software as a Service The Key to Modernizing Government

On all levels of government, public sector agencies are looking to the cloud to re-imagine their business processes and power new innovations. Through effective cloud deployment and management, organizations can reduce costs, deploy services with agility, and identify new ways to accomplish the complex missions of the public sector. With the cloud, organizations have gained new ways to access data, software and computing power, all of which have disrupted the traditional notions of IT service delivery. In a three-part series, GovLoop will highlight the power of the Oracle cloud and explore how Oracle is helping government agencies transform the way they deliver services. Oracle offers both private and public cloud offerings for infrastructure, platform and applications solutions to public sector customers. In part one of our series, we explore Oracle’s Software-as-a-Service (SaaS) offerings.

Cloud Services Data Management May 2016
A Cloud Roadmap: From Implementation to Innovation How a Complete Cloud Offers Agencies a Modern Approach to Cutting-Edge Service Delivery

The government IT infrastructure must evolve. The traditional approach to delivering IT services is proving incapable of keeping up with either the growing complexity of the IT enterprise or the increasing demand for innovation. This pressure to provide an infrastructure that is more manageable, scalable and flexible is pushing government agencies to accelerate their adoption of cloud solutions.

Until recently, government agencies have been slow to move to the cloud. In 2011, the Office of Management and Budget (OMB) issued its “Cloud First” policy, which directed agencies to adapt their IT strategies to take full advantage of the cloud. Yet a September 2014 report from the U.S. Government Accountability Office found that at seven major agencies, investments in the cloud accounted for a mere two percent of IT budgets. Collectively, the agencies consider cloud services for only 33 percent of their IT investments.

Cloud Data Management May 2016
Mapping Government’s Journey to the Cloud: 8 Success Stories

The early years of cloud adoption in government were marked by curiosity and skepticism about delivering secure IT-asa-Service, but time has proved that cloud has enormous potential to improve government service delivery. Agencies are discovering they can simplify their IT, and improve back-office business functions like procurement and HR, while often reducing costs. The first step to starting your cloud journey is to ask three questions:

  • Why do we want to move to the cloud?
  • What functions do we want to move?
  • How do we make the change?
Cloud Services Data Management May 2016
Smart Cities Readiness Guide

The first goal of the Readiness Guide is to give you a “vision” of a smart city, to help you understand how technology will transform the cities of tomorrow.

The second goal is to help you construct your own roadmap to that future. It suggests the goals to which you should aspire, the features and functions you should specify, the best practices that will gain you the maximum benefits for the minimum cost, at reduced risk.

The Readiness Guide is intended for mayors, city managers, city planners and their staffs. It helps cities help themselves by providing objective, vendor-neutral information to make confident, educated choices about the technologies that can transform a city.

Smart Cities Data Management, Security April 2016
Public Safety Analytics R&D Roadmap

The public safety community is in a period of great transition. Over the next 20 years, technology advancements will increase accessibility of data/video applications to public safety, and allow for the eventual migration of voice communications from disparate Land Mobile Radio (LMR) networks to a nationwide Long Term Evolution (LTE) broadband network, the Nationwide Public Safety Broadband Network (NPSBN). Emerging technologies within this new infrastructure present opportunities and challenges for public safety, and the process of modernizing responder communications requires significant coordination and planning. To facilitate the transition from LMR to LTE, the Public Safety Communications Research (PSCR) program initiated a research and development (R&D) planning process to determine what technology investments are of highest priority to the public safety community.

Communications Communications April 2016
What is Application Security?

Every enterprise’s application landscape is now both business critical and rapidly expanding.

Mobile and cloud computing are dramatically changing the way we do business. Today, the world runs on applications, and, as a result, every company is becoming a software company – regardless of its primary business. Even GE now considers itself a software company. 

And enterprises are producing these applications faster than ever before, often using Agile development processes and then augmenting their internal development programs with third-party software and open source libraries and components. 

How can organizations ensure the security of their critical and fluid application landscapes? That’s where application security comes in. 

Data Security Data Management, Security April 2016
A State Government Protects Citizen Data by Securing Applications

A state government, facing concerns from citizens over data breaches and concerned about federal requirements such as HIPAA, implemented a high priority initiative on cybersecurity. Recognizing the importance of application security as part of an overall cybersecurity approach (including security training and data loss prevention technology), the state’s CIO brought in Veracode to provide an application security governance program that could be easily rolled out across multiple state agencies. 

With Veracode’s cloud-based service and policy-based approach, the state has assessed 200 applications across 14 state agencies in the first year of the program, fixing over 28,000 flaws and achieving a 77% pass rate on the state’s application security policy. Additionally, the state has begun requiring vendors to meet the application security standards as well. 

Data Security Data Management, Security April 2016
Making the Case for FBI-CJIS Security Policy

The Federal Bureau of Investigation (FBI) created the FBI-Criminal Justice Information Services Division Security Policy (FBI-CJIS Security Policy) to provide authorized agencies with a security management structure for accessing, protecting and safeguarding Criminal Justice Information (CJI) accessed or received from the FBICJIS system of services. While FBI-CJIS security policy compliance is not a certification or a cyber-rubber stamp of approval from the FBI, it does provide a security framework and foundation that enables government agencies to evaluate their own networks and procedures, as well as those of private contractors, service providers and cloud providers. 

For agencies evaluating third parties, FBI-CJIS compliance is not a one-way street. It requires a unique partnership between the agency customer and the contractor/vendor/cloud provider to
assess the products and services.

Data Security Data Management, Security April 2016
JCAT Joint Counterterrorism Assessment Team Intelligence Guide for First Responders

In the post-9/11 era, first responders have incorporated protecting the Homeland against terrorism into their daily mission. Law enforcement, fire service, and emergency medical services personnel play a vital role in detecting and preventing attacks because of the nature of their work, their frequent interaction with members of the public, and the level of access their jobs provide. People who hold these jobs often can identify behaviors or activities that could signal a pending terrorist attack; therefore, public safety personnel must continue to report, according to the Nationwide Suspicious Activity Reporting Initiative, observations that raise reasonable suspicion.

The Intelligence Community routinely produces information for public safety personnel that may help first responders identify terrorist-related activities and prevent, deter, or respond to
terrorist attacks. You can obtain this information through existing joint partnerships and from Internet-based U.S. Government information-sharing systems. It is critical that first responders, who are entrusted with keeping our citizens safe, be able to access, understand, and use this information.

Data Security Data Management March 2016