G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR3172
来源IDRR-3172-PAC
Literature on Personnel Vetting Processes and Procedures: Annotated Selected Bibliography
David Stebbins; Sina Beaghley; Ashley L. Rhoades; Sunny D. Bhatt
发表日期2019-10-14
出版年2019
语种英语
结论 Literature on Personnel Vetting Processes and Procedures: Annotated Selected Bibliography | RAND
Loading…
摘要

U.S. government vetting processes and procedures for public trust and national security positions are evolving to improve their effectiveness and to incorporate new technological capabilities. The rise of social media and other sources of information not historically used for vetting purposes are increasingly enhancing legacy vetting systems that otherwise might not uncover a prospective government employee's or contractor's propensity to cause harm to national security institutions. This reform effort is intended to protect government systems, information, and assets by ensuring aligned, effective, efficient, secure, and reciprocal processes to support a trusted federal workforce.

,

The authors researched, reviewed, and assembled a selected bibliography of relevant literature related to government and other relevant vetting processes and procedures. The bibliography is organized into 13 categories, each containing a short summary and analysis of the respective literature. The bibliography addresses current U.S. government practices, policies, and procedures, as well as those of the United States' Five Eyes (FVEY) community partners (the United Kingdom, Australia, New Zealand, and Canada), and it also highlights research conducted by others within the private sector and by academic institutions.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Personnel Vetting Practices

  • Chapter Three

    Preinvestigation and Investigation

  • Chapter Four

    Adjudication and Adjudication Bias

  • Chapter Five

    Suitability, Fitness, and Contractor Vetting

  • Chapter Six

    Insider Threats

  • Chapter Seven

    Continuous Monitoring and Continuous Evaluation

  • Chapter Eight

    Trust in the Workplace

  • Chapter Nine

    Asset Protection

  • Chapter Ten

    Organizational Resiliency and Risk Assessment

  • Chapter Eleven

    Fraud Detection

  • Chapter Twelve

    Credentialing

  • Chapter Thirteen

    Information Sharing and Reciprocity

  • Chapter Fourteen

    Five Eyes Partner Practices

  • Appendix A

    Table of Bibliography Sources, by Category

  • Appendix B

    U.S. Policy and Law Relevant for Categories

  • Appendix C

    Boolean Search Terms and Strings

主题Cybersecurity ; Intelligence Community ; Threat Assessment ; United States Department of Defense ; Workforce Management ; Workplace Violence
URLhttps://www.rand.org/pubs/research_reports/RR3172.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/523908
推荐引用方式
GB/T 7714
David Stebbins,Sina Beaghley,Ashley L. Rhoades,et al. Literature on Personnel Vetting Processes and Procedures: Annotated Selected Bibliography. 2019.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR3172.pdf(1308KB)智库出版物 限制开放CC BY-NC-SA浏览
1571064884456.jpg(6KB)智库出版物 限制开放CC BY-NC-SA缩略图
浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[David Stebbins]的文章
[Sina Beaghley]的文章
[Ashley L. Rhoades]的文章
百度学术
百度学术中相似的文章
[David Stebbins]的文章
[Sina Beaghley]的文章
[Ashley L. Rhoades]的文章
必应学术
必应学术中相似的文章
[David Stebbins]的文章
[Sina Beaghley]的文章
[Ashley L. Rhoades]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR3172.pdf
格式: Adobe PDF
文件名: 1571064884456.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。