To help inform the U.S. government in its efforts to improve the vetting processes for public trust and national security positions and protect its assets and information, the authors assembled a selected bibliography of relevant literature. The bibliography is organized into 13 categories, each containing a short summary and analysis of the respective literature, and it also examines the practices of the Five Eyes community partners.
Literature on Personnel Vetting Processes and Procedures
Annotated Selected Bibliography
- What publications are related to government and other relevant vetting processes and procedures?
- What are the new or emerging areas of insight related to potential personnel vetting improvements?
U.S. government vetting processes and procedures for public trust and national security positions are evolving to improve their effectiveness and to incorporate new technological capabilities. The rise of social media and other sources of information not historically used for vetting purposes are increasingly enhancing legacy vetting systems that otherwise might not uncover a prospective government employee's or contractor's propensity to cause harm to national security institutions. This reform effort is intended to protect government systems, information, and assets by ensuring aligned, effective, efficient, secure, and reciprocal processes to support a trusted federal workforce.
The authors researched, reviewed, and assembled a selected bibliography of relevant literature related to government and other relevant vetting processes and procedures. The bibliography is organized into 13 categories, each containing a short summary and analysis of the respective literature. The bibliography addresses current U.S. government practices, policies, and procedures, as well as those of the United States' Five Eyes (FVEY) community partners (the United Kingdom, Australia, New Zealand, and Canada), and it also highlights research conducted by others within the private sector and by academic institutions.
Table of Contents
Personnel Vetting Practices
Preinvestigation and Investigation
Adjudication and Adjudication Bias
Suitability, Fitness, and Contractor Vetting
Continuous Monitoring and Continuous Evaluation
Trust in the Workplace
Organizational Resiliency and Risk Assessment
Information Sharing and Reciprocity
Five Eyes Partner Practices
Table of Bibliography Sources, by Category
U.S. Policy and Law Relevant for Categories
Boolean Search Terms and Strings