The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
Policy Machine: Features, Architecture, and Specification

The purpose of this Internal Report (IR) is to provide an overview of the PM and guidelines for its implementation. The report explains the basics of the PM framework and discusses the range
of policies that can be specified and enacted. It also describes the architecture of the PM and the details of key functional components.

This document, while technical in nature, provides background information to help readers understand the topics that are covered. The material presumes that readers have a basic understanding of computer security and possess fundamental operating system and networking expertise. 

Data Security, Access Control Data Management, Security October 2015
Justice Assistance Grant (JAG) Program, 2015

The Department of Justice's Bureau of Justice Statistics (BJS) has released Justice Assistance Grant (JAG) Program, 2015, which describes steps used in the Edward Byrne Memorial Justice Assistance Grant (JAG) formula calculation process to determine award amounts for states, local governments, and territories. It presents summary results of the FY 2014 allocation amounts.

Grant Funding Uncategorized October 2015
Content Encryption: Key Issues to Consider

Encryption of electronic content is an essential best practice, despite the fact that many organizations and individual users do not encrypt email, files stored behind their corporate firewall, files stored in the cloud, and in other venues. However, most IT administrators understand the benefits of encrypting content to protect sensitive or confidential information, to protect their organizations against data breaches, to satisfy regulatory obligations, and to protect against various types of legal liabilities.

It is important for decision makers to understand that encryption is more than simply a defensive strategy to protect against data breaches or to comply with regulations. Organizations that encrypt content can create new business opportunities and create competitive differentiation that can contribute significantly to their bottom line and provide new ways of attracting and keeping customers.

Data Security Data Management October 2015
Criminal Justice Information Services (CJIS) Security Policy (v5.4)

The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual—contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity—with access to, or who operate in support of, criminal justice services and information.

Data Security Security October 2015
NIST Big Data Interoperability Framework: Volume 1, Definitions

There is broad agreement among commercial, academic, and government leaders about the remarkable potential of Big Data to spark innovation, fuel commerce, and drive progress. Big Data is the common term used to describe the deluge of data in today’s networked, digitized, sensor-laden, and information driven world. The availability of vast data resources carries the potential to answer questions previously out of reach, including the following:

  • How can a potential pandemic reliably be detected early enough to intervene?
  • Can new materials with advanced properties be predicted before these materials have ever been synthesized?
  • How can the current advantage of the attacker over the defender in guarding against cyber security threats be reversed?
Data Security Data Management, Security September 2015
State agencies digitize processes and share information in real time

Georgia Technology Authority (GTA)’s mission is to introduce new technology to state agencies to improve business processes and expand data-sharing opportunities. In the past, agencies were limited by point-to-point, hard-coded integrations, siloed systems and manual processes that were paper-based and slow.

GTA meets its objectives by using Software AG technology as a key component for the State IT Roadmap and is prepared for the challenges of the digital world. webMethods is the standard platform for application integration so agencies can share information securely in real-time. ARIS and webMethods are used
to model, automate and optimize business processes.

Data Sharing Data Management September 2015
Broadband Opportunity Council Report and Recommendations

The United States continues to experience unprecedented growth and innovation in broadband and in the advanced applications and services it enables. While the benefits of increased broadband access and adoption are widespread, barriers like income and geography keep many Americans from taking advantage of the economic, educational and social benefits of broadband access. To make sure that the Federal government does everything within its power to support broadband deployment and adoption, on March 23, 2015, President Obama signed a Presidential Memorandum (Memorandum) “Expanding Broadband Deployment and Adoption by Addressing Regulatory Barriers and Encouraging Investment and Training.”1 The Memorandum created the Broadband Opportunity Council (Council) and tasked it to produce specific recommendations to increase broadband deployment, competition and adoption through executive actions within the scope of existing Agency programs, missions and budgets. 

Data Interoperability, Broadband Data Management, Communications, Mobile/Portable Computing September 2015
Health IT Standards for Health Information Management Practices

The IHE Information Technology Infrastructure (ITI) White Paper “HIT Standards for HIM Practices,” describes the need for, value and an approach for aligning HIM business practices (HIM practices) with capabilities of standards-based HIT products to support information governance in healthcare. 

Health Info Management Data Management September 2015
An IBM Academy of Technology Perspective about FirstNet, a Public Safety Network

After the events of September 2001 in the United States, first responders rallied the United States government to dedicate a portion of the 700 MHz radio frequency in North America to emergency first responders. The 9/11 Commission recommended the establishment of a nationwide, interoperable public safety communications network to resolve the communication challenges that are faced by first responders nationwide. In the United States, this network is called FirstNet. 

Interoperable Communications Communications September 2015
Mobile Apps for Public Safety Organizations: Survey of Common Features

The use of mobile devices has grown significantly in the last few years. In a recent Pew Research report, 46% of respondents said they could not live without their smartphone; earlier research had 44% of respondents reporting that they sleep with their phones.

Google has extensively studied mobile search and app use and has coined a new term: “micro-moments.” These micro-moments are defined as “the I want-to-know moments, I want-to-go moments, I want-to-do moments, and I want-to-act moments” that drive behavior.

Sponsored by MicroAssist

Mobile Applications, Information Sharing Data Management, Mobile/Portable Computing September 2015