Literature on Personnel Vetting Processes and Procedures
Annotated Selected Bibliography
Download
Download eBook for Free
Format | File Size | Notes |
---|---|---|
PDF file | 1.3 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Purchase
Purchase Print Copy
Format | List Price | Price | |
---|---|---|---|
Add to Cart | Paperback196 pages | $36.00 | $28.80 20% Web Discount |
U.S. government vetting processes and procedures for public trust and national security positions are evolving to improve their effectiveness and to incorporate new technological capabilities. The rise of social media and other sources of information not historically used for vetting purposes are increasingly enhancing legacy vetting systems that otherwise might not uncover a prospective government employee's or contractor's propensity to cause harm to national security institutions. This reform effort is intended to protect government systems, information, and assets by ensuring aligned, effective, efficient, secure, and reciprocal processes to support a trusted federal workforce.
The authors researched, reviewed, and assembled a selected bibliography of relevant literature related to government and other relevant vetting processes and procedures. The bibliography is organized into 13 categories, each containing a short summary and analysis of the respective literature. The bibliography addresses current U.S. government practices, policies, and procedures, as well as those of the United States' Five Eyes (FVEY) community partners (the United Kingdom, Australia, New Zealand, and Canada), and it also highlights research conducted by others within the private sector and by academic institutions.
Table of Contents
Chapter One
Introduction
Chapter Two
Personnel Vetting Practices
Chapter Three
Preinvestigation and Investigation
Chapter Four
Adjudication and Adjudication Bias
Chapter Five
Suitability, Fitness, and Contractor Vetting
Chapter Six
Insider Threats
Chapter Seven
Continuous Monitoring and Continuous Evaluation
Chapter Eight
Trust in the Workplace
Chapter Nine
Asset Protection
Chapter Ten
Organizational Resiliency and Risk Assessment
Chapter Eleven
Fraud Detection
Chapter Twelve
Credentialing
Chapter Thirteen
Information Sharing and Reciprocity
Chapter Fourteen
Five Eyes Partner Practices
Appendix A
Table of Bibliography Sources, by Category
Appendix B
U.S. Policy and Law Relevant for Categories
Appendix C
Boolean Search Terms and Strings
Research conducted by
This research was sponsored by the Performance Accountability Council Program Management Office and conducted within the Cyber and Intelligence Policy Center of the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.
This report is part of the RAND Corporation Research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.