Offering virtual dermatology care to Medicaid recipients can sharply increase use of dermatology services. This offers one potential way to increase access to medical specialists who are in short supply.
A growing number of constraints have been imposed around the world on information in the cloud, fueling concerns that the Internet—the economic engine of the information age—may become hopelessly fragmented.
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.
About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.
To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.
The tensions that divide the United States and China apply just as much to cyberspace as to relations in the physical world. Can the two countries achieve meaningful outcomes through formal negotiations over cyber norms and rules?
Self-driving vehicles offer the promise of significant benefits to society, but raise several policy challenges, including the need to update insurance liability regulations and privacy concerns such as who will control the data generated by this technology.
Analysis of visitors to CalMHSA-funded student mental health websites shows that visitors at educational institutions comprised the largest audience segment and promotional campaigns likely increased traffic.
Since the terrorist attack in Madrid 12 years ago, the threat of terrorism has not diminished. But counter-terrorism efforts have become more sophisticated across Europe, taking aim at the root causes of terrorism before actual attacks take place.
How has interest in military careers evolved over time and by geographic location? And what are potential recruits' biggest concerns related to the Army? Anonymous data from Internet searches can provide insight.
As the security on the iPhone better protects users from criminals, it also excels at keeping law enforcement from accessing the data. The dispute between the FBI and Apple over unlocking the iPhone of one of the San Bernardino attackers continues but the real debate is about whether society wants legislation that weakens iPhone security for law enforcement.
Cyberspace is expanding, becoming more vulnerable, and hosting increasingly vast amounts of data. Compounding this challenge is the growing number of bad actors seeking to exploit cyberspace. What steps can be taken to help mitigate emerging threats and improve U.S. cybersecurity?
Technology is thoroughly embedded within the average person's life but security is not emphasized to the general user. Teaching the importance of security early on and continually bringing awareness to the public could help temper technology-based attacks.
To evaluate the effectiveness of a care transition intervention using remote patient monitoring in reducing 180-day all-cause readmissions among a broad population of older adults hospitalized with HF.
A survey of over 26,000 citizens across the EU found that even in the event of a national emergency or limiting access of individuals' Internet usage to law enforcement agencies, there was still a strong aversion to information being stored or accessed.
When defending an organization, cybersecurity professionals must choose from a large set of defensive measures while operating with a limited set of resources. What is the menu of actions for defending against an attack? And how can defenders navigate the selection process?
On behalf of the Dutch Research and Documentation Centre, RAND Europe is partnering on an effort to understand the scope and size of Internet drug trafficking, as well as what role the Netherlands may play.