Literature on Personnel Vetting Processes and Procedures
Annotated Selected Bibliography
Download eBook for Free
|PDF file||1.3 MB||
Use Adobe Acrobat Reader version 10 or higher for the best experience.
Purchase Print Copy
|Add to Cart||Paperback196 pages||$36.00||$28.80 20% Web Discount|
U.S. government vetting processes and procedures for public trust and national security positions are evolving to improve their effectiveness and to incorporate new technological capabilities. The rise of social media and other sources of information not historically used for vetting purposes are increasingly enhancing legacy vetting systems that otherwise might not uncover a prospective government employee's or contractor's propensity to cause harm to national security institutions. This reform effort is intended to protect government systems, information, and assets by ensuring aligned, effective, efficient, secure, and reciprocal processes to support a trusted federal workforce.
The authors researched, reviewed, and assembled a selected bibliography of relevant literature related to government and other relevant vetting processes and procedures. The bibliography is organized into 13 categories, each containing a short summary and analysis of the respective literature. The bibliography addresses current U.S. government practices, policies, and procedures, as well as those of the United States' Five Eyes (FVEY) community partners (the United Kingdom, Australia, New Zealand, and Canada), and it also highlights research conducted by others within the private sector and by academic institutions.
Table of Contents
Personnel Vetting Practices
Preinvestigation and Investigation
Adjudication and Adjudication Bias
Suitability, Fitness, and Contractor Vetting
Continuous Monitoring and Continuous Evaluation
Trust in the Workplace
Organizational Resiliency and Risk Assessment
Information Sharing and Reciprocity
Five Eyes Partner Practices
Table of Bibliography Sources, by Category
U.S. Policy and Law Relevant for Categories
Boolean Search Terms and Strings
Research conducted by
This research was sponsored by the Performance Accountability Council Program Management Office and conducted within the Cyber and Intelligence Policy Center of the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.
This report is part of the RAND Corporation Research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.