Download

Download eBook for Free

FormatFile SizeNotes
PDF file 1.3 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 FormatList Price Price
Add to Cart Paperback196 pages $36.00 $28.80 20% Web Discount

U.S. government vetting processes and procedures for public trust and national security positions are evolving to improve their effectiveness and to incorporate new technological capabilities. The rise of social media and other sources of information not historically used for vetting purposes are increasingly enhancing legacy vetting systems that otherwise might not uncover a prospective government employee's or contractor's propensity to cause harm to national security institutions. This reform effort is intended to protect government systems, information, and assets by ensuring aligned, effective, efficient, secure, and reciprocal processes to support a trusted federal workforce.

The authors researched, reviewed, and assembled a selected bibliography of relevant literature related to government and other relevant vetting processes and procedures. The bibliography is organized into 13 categories, each containing a short summary and analysis of the respective literature. The bibliography addresses current U.S. government practices, policies, and procedures, as well as those of the United States' Five Eyes (FVEY) community partners (the United Kingdom, Australia, New Zealand, and Canada), and it also highlights research conducted by others within the private sector and by academic institutions.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    Personnel Vetting Practices

  • Chapter Three

    Preinvestigation and Investigation

  • Chapter Four

    Adjudication and Adjudication Bias

  • Chapter Five

    Suitability, Fitness, and Contractor Vetting

  • Chapter Six

    Insider Threats

  • Chapter Seven

    Continuous Monitoring and Continuous Evaluation

  • Chapter Eight

    Trust in the Workplace

  • Chapter Nine

    Asset Protection

  • Chapter Ten

    Organizational Resiliency and Risk Assessment

  • Chapter Eleven

    Fraud Detection

  • Chapter Twelve

    Credentialing

  • Chapter Thirteen

    Information Sharing and Reciprocity

  • Chapter Fourteen

    Five Eyes Partner Practices

  • Appendix A

    Table of Bibliography Sources, by Category

  • Appendix B

    U.S. Policy and Law Relevant for Categories

  • Appendix C

    Boolean Search Terms and Strings

This research was sponsored by the Performance Accountability Council Program Management Office and conducted within the Cyber and Intelligence Policy Center of the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.

This report is part of the RAND Corporation Research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.