Communication Technology

Featured

Explore Communication Technology

  • Report

    Living Room Connected Devices: Opportunities, security challenges and privacy implications for users and industry

    This report addresses the security and privacy implications of the Internet connected living room for industry and consumers, exploring potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014

  • Keyboard key with an airplane on it

    Report

    Technology and the Well-Being of U.S. Airmen

    Just like U.S. civilians, those serving in the Air Force use the Internet, email, texting, and social media for entertainment and to stay in touch with friends and family. But technology use can be disruptive, and “addiction” could signal broader issues.

    Aug 25, 2014

  • Report

    Ramifications of DARPA's Programming Computation on Encrypted Data Program

    RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.

    Aug 25, 2014

  • Report

    Shining a Light on State Campaign Finance: An Evaluation of the Impact of the National Institute on Money in State Politics

    This report evaluates the impact the National Institute on Money in State Politics has had on the public discourse over campaign finance at the state level.

    Aug 12, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    RAND Review Takes Measure of Cybercrime, Medical Innovation, U.S. Security Cooperation

    Stories in RAND's flagship magazine discuss the duel between cybercrime and the law, the gamble of medical innovation, and the fruits of U.S. security cooperation.

    Aug 7, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    Wild Wild Web: For Now, Cybercrime Has the Upper Hand in Its Duel with the Law

    The Internet has become a vast untamed territory for cybercriminals. But there are ways that private companies, defense contractors, law enforcement, and other government agencies can minimize the harmful influence of cyber black markets.

    Aug 7, 2014

  • Report

    RAND Review: Vol. 38, No. 2, Summer 2014

    The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.

    Aug 7, 2014

  • car interior with a dashboard computer

    Blog

    Sounding the Car Alarm on Hackers

    Security protections on vehicles have not kept pace with systems that control safety features, navigation capabilities, and wireless communication functions. Onboard computer networks will likely become much more attractive to hackers.

    Jun 30, 2014

  • News Release

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security.

    Jun 17, 2014

  • two men working in a bright office

    Report

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    Demand for trained cybersecurity professionals who work to protect organizations from cybercrime is high nationwide, but the shortage is particularly severe in the federal government, which does not offer salaries as high as the private sector.

    Jun 17, 2014

  • A woman walks past European Parliament election campaign posters in Vilnius

    Blog

    How 'Wired' Are the 2014 European Elections?

    The 2014 elections will prove a critical test of whether the modernisation of the EU's media strategies and increasing number of members of the European Parliament active on social networking sites will have an impact on citizens' political participation at the European level.

    May 21, 2014

  • Protests in Malaga, Spain against the government's spending cuts and failure to revive the moribund economy

    Blog

    The European Democracy Paradox

    While social media and other tools have enhanced opportunities to participate in the political process, these new drivers do not seem to translate easily into offline political participation.

    May 21, 2014

  • businessman talking on a cell phone near a broken-down car

    Project

    Estimating the Value of Mobile Telephony in Mobile Network 'Not-Spots'

    Around 80,000 premises in the UK are located in areas without mobile phone coverage – referred to as “not-spots”. Researchers are estimating the social, economic and environmental impacts associated with eliminating mobile not-spot areas in England.

    Apr 25, 2014

  • A person holding an iPad in Shanghai

    Blog

    Net Gain: Washington Cedes Control of ICANN

    Had the U.S. kept its fist clenched around ICANN, it would have undermined faith in the multistakeholder model of Internet governance and empowered the ITU. Instead, Washington has disarmed critics and helped ensure that the Internet will remain open and free.

    Apr 11, 2014

  • hands on a computer keyboard in a dark room

    Blog

    The Hackers' Bazaar

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

    Apr 11, 2014

  • Berlin by night

    Project

    Mapping Smart Cities in the EU

    The European Parliament asked RAND Europe to provide background information and advice to their members on the role of Smart Cities initiatives and to explain how existing mechanisms perform. The researchers established a working definition of a Smart City and mapped the cities fitting this definition across the Member States. An analysis of the Smart Cities initiatives found that Smart Cities objectives should be more explicit, well defined and clearly aligned to city development, innovation plans and Europe 2020 to be successful.

    Mar 25, 2014

  • News Release

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory

    Report

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized, and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • man using and illuminated by the light of tablet

    Blog

    The Internet's Role in Radicalisation

    Even as people enjoy the advantages of social networks, online shopping and access to information, concerns are growing about the negative effects of the Internet, such as its potential role in radicalising terrorists.

    Mar 21, 2014

  • a driverless car

    Event

    Policy Impacts of Self-Driving Vehicles

    Full-scale production of self-driving cars is predicted within 5–15 years. California allows these vehicles to operate on state roads, and the DMV is tasked with working on several rules for carmakers and the public. What is the best way forward?

    Mar 20, 2014