NOTICE: Read Paul Wormeli’s BLOG at Wormeli Consulting

IJIS Institute Mission

The IJIS Institute unites the private and public sectors to improve critical information sharing for those who provide public safety and administer justice in our communities.

The IJIS Factor has been picked up as a MUST READ by FedTech Magazine

Federal Technology Blogger Badge 150px
FedTech's Must-Read Federal IT Blogs

IJIS Linked-In Blog
IJIS Twitter Blog

The Latest Revolution

Throughout the developed world, and at all levels of government, the latest explosive innovation linked to government use of information technology (IT) is the rush to open data. Particularly in larger cities in the U.S. and Europe, state and local governments are finding more and more datasets never before made public and are publishing these [...]

Re-using Proven Processes

March 7, 2013. The Nationwide Suspicious Activity Reporting Initiative (NSI) is an interesting and unusual model for government programs and instructive in the underlying methodology that created it. The NSI program was originally sponsored and started by an investment from the Program Manager for the Information Sharing Environment (PM-ISE), in collaboration with the Bureau of [...]

A Fresh Start

January 3, 2013. We seem to have a natural proclivity to start each new year with a resolve to improve our personal lives, lose weight, stop smoking, spend more time with family, etc. Recent studies show that a majority of us keep our resolutions, at least for a few months. Organizations, whether private or governmental, [...]

The Urgency of Transformation

Speeches about the importance of critical infrastructure normally refer to such national resources as the power grid, economic systems, but I would submit that the entirety of the justice and public safety IT infrastructure is just as critical to crime prevention and homeland security. [...]

Beyond the Field of Dreams

July 11, 2012. Large organizations, including government agencies, universities, and companies, often develop new products and services for which the demand seems quite low. These mystery launches recall the mantra popularized by the 1989 film “Fields of Dreams”: “if we build it, they will come.”

Even in the fantasy world of the movie, it was [...]

The Wrong Direction

January 24, 2012. The Supreme Court has overturned the conviction of a drug dealer based on the use of GPS technology to track the offender that led to his arrest. The court ruled that the police should have obtained a valid warrant in order to use this technology. In fact, a warrant was obtained but [...]

WikiLeaks and the City/County

Many CIO’s believe that the information which resides in their database isn’t as sensitive as the information leaked by WikiLeaks, which as we all know, created a maelstrom of commotion, panic and embarrassment across the world. While this is partially true, there are many hackers that would love nothing more than to get their hands on personal identification information and use it for financial gain. In order to deter such identity theft and crime, there needs to be a tool in place that will ensure role-based security is applied to data, and those who are permitted with access are the only ones to view this information. [...]

New Sources of Knowledge

Most of us are trained from an early age to hoard knowledge. Having heard the expression that “knowledge is power” all too often, we generally expect our government to declare this principle as in the best interests of the people, sometimes seeing such results in powerful ways. [...]

What Makes a Strategy “National”?

While Federal agencies look to develop a “National” strategy for executing major innovations, they need to make sure this strategy, which differs from a “Federal” strategy, includes the same needs, aspirations, and intentions of the stakeholders that can help make this vision a reality through collaboration. In order to create a “National” strategy, Federal agencies need to provide leadership iand engage stakeholders at all levels of government and the private sector. [...]

Integrity and Trust in Building Community

Since the original thinking about the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI), there has been a pervasive and extensive recognition that building a national program that encourages the reporting of behaviors that may be actual precursors to crimes, including terrorist acts, may be perceived as a denigration of civil rights and an invasion of [...]