Communication Technology

Featured

Explore Communication Technology

  • World map, connected people icons, and binary code

    Commentary

    War on the Web

    While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.

    Jul 23, 2015

  • Hand press on free trial button on virtual screen

    Project

    Examining Misleading Online Free Trials and Subscription Traps Experienced by European Consumers

    The European Commission has contracted GfK Belgium, RAND Europe, and time.lex to carry out a study on misleading online free trials and subscription traps experienced by consumers in Europe.

    Jul 23, 2015

  • Identify theft illustration

    Commentary

    U.S. Needs a New Electronic Identity-Protection Strategy to Prevent 'Hybrid Warfare' Attacks

    The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.

    Jul 6, 2015

  • News Release

    Internet Freedom Software Tools Developed by the United States Do Not Facilitate Cybercrime

    Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are numerous alternative technologies that are better suited.

    Jun 30, 2015

  • A person uses a smartphone to photograph a Red Shirt rally in Bangkok, Thailand

    Report

    Internet Freedom Software Tools Do Not Facilitate Cybercrime

    Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are alternative technologies that are better suited.

    Jun 30, 2015

  • Network hub and cable

    Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace

    Hackers, including state and non-state actors, are continuing to find opportunities to penetrate U.S. government networks. Defending these networks will require a systems approach.

    Jun 24, 2015

  • News Release

    Companies Are Making Cybersecurity a Greater Priority, but Hackers Still May Be Gaining

    While worldwide spending on cybersecurity is close to $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • An information security illustration superimposed over a businesswoman holding a tablet

    Report

    Companies Are Prioritizing Cybersecurity, but Hackers Still May Be Gaining

    While spending on cybersecurity is $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • Man wearing camouflage using a laptop

    Commentary

    Social Media as a Tool for Reaching Veterans in Need of Mental Health Care

    Reaching veterans to learn more about their mental health care seeking poses a conundrum. They are typically recruited for studies in clinical settings, so those who are not seeking care are not represented. Facebook may be a viable method to reach them.

    Jun 9, 2015

  • Paul Cornish at the 2015 WSIS forum

    Multimedia

    WSIS 2015 Interview

    RAND Europe research group director Paul Cornish attended the World Summit on the Information Society (WSIS) Forum 2015 in Geneva, Switzerland, 25-29 May 2015. In this video he summarizes his role in the Dialogue on Building Trust in Cyberspace, at the interpersonal as well as commercial level. He says his talk emphasized the role of the sovereign state in building trust and establishing bilateral and multilateral relationships.

    May 29, 2015

  • Journal Article

    Prediction of Political Action by Means of Propaganda Analysis

    A study to determine an opponent's initiatives through analysis of his propaganda.

    May 27, 2015

  • NYPD officers interact with pedestrians in Central Park, Manhattan, May 22, 2011

    Report

    Strengthening Trust Between Police and the Public

    Amid recent tensions between law enforcement and the public, three key questions must be answered to build the foundation for long-lasting mutual trust, especially given technological changes that are increasing transparency.

    May 1, 2015

  • Hand touching tablet behind social media diagram and map

    Commentary

    The Clash of Internet Civilizations: Why Neither Side Should Prevail

    The debate over net neutrality pits two opposing philosophies against each other — one pushing for the continued evolution of the Internet as an open information superhighway, the other asserting that the Internet's evolution needs to take more account of the many ways it is and will be used.

    Apr 10, 2015

  • Man on laptop at night

    Report

    Problematic Internet Use and Well-Being: Recommendations for the Air Force

    Problematic Internet use (PIU) is a mental health issue that can have serious consequences. With an estimated 6 percent of Airmen suffering from PIU, what can the U.S. Air Force do to help with treatment and prevention?

    Mar 20, 2015

  • Businessman talking on a cell phone near a broken-down car

    Project

    Estimating the Value of Mobile Telephony in Mobile Network 'Not-Spots'

    Around 80,000 premises in the UK are located in areas without mobile phone coverage – referred to as “not-spots”. Researchers are estimating the social, economic and environmental impacts associated with eliminating mobile not-spot areas in England.

    Mar 12, 2015

  • News Release

    The Costs of Mobile 'Not-Spots'

    Rural areas lacking a mobile phone signal (“not-spots”) experience a negative impact on businesses of all sizes, and could suffer detrimental effects to the long-term sustainability of communities. Residents and visitors would be willing to pay for better mobile coverage.

    Mar 12, 2015

  • Man on a bench in countryside using mobile

    Report

    The Costs of Mobile “Not-Spots”

    Rural areas lacking a mobile phone signal (“not-spots”) experience a negative impact on businesses of all sizes, and could suffer detrimental effects to the long-term sustainability of communities. Residents and visitors would be willing to pay for better mobile coverage.

    Mar 12, 2015

  • Farmer using a smartphone and tablet PC while standing in his field

    Report

    Estimating the value of mobile telephony in mobile network not-spots: Summary

    This study uses stated preference discrete choice experiments to quantify the value that residents and businesses in not-spot areas and local visitors and tourists to these areas are willing to pay for mobile phone coverage.

    Mar 12, 2015

  • Journal Article

    Geographic Targeting, Message Content and Character Limitation Subgroup Report

    This Communications Security, Reliability and Interoperability Council (CSRIC) report analyzes geo-targeting, message content, and character limitations of the Wireless Emergency Alerts (WEA).

    Feb 27, 2015

  • Group of young students studying in the classroom with a laptop

    Report

    Education, Technology and Connectedness: Global Societal Trends to 2030

    The spread of technology and its relationship to education will transform the education and power of citizens, forming a significant societal challenge for the European Union in the coming decades.

    Feb 12, 2015