Computer and Information Science and Technology

Featured

RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.

  • tinker_computing_center_120830-F-WS541-003

    Report

    Cost Considerations in Cloud Computing

    Oct 2, 2014

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

  • Fotolia_60505744_Subscription_Monthly_XXL

    Commentary

    The Hackers' Bazaar

    Apr 11, 2014

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

Explore Computer and Information Science and Technology

  • Journal Article

    Use of Pooled State Administrative Data for Mental Health Services Research

    State mental health authorities routinely devote resources to collect data for state planning and reporting purposes. However, these data are rarely used in cross-state comparisons to inform state or federal policy development.

    Feb 26, 2015

  • Illustration of idea, solution, and money

    Commentary

    Managing Technology in an Unmanageable World

    The need for purposeful and focused R&D in the U.S. has never been greater, but technology is advancing so quickly that the structures available to manage it have not kept pace. A comprehensive examination of the technological landscape is needed to help the government take a more holistic approach to investing in and regulating technologies.

    Feb 19, 2015

  • Group of young students studying in the classroom with a laptop

    Report

    Education, technology and connectedness: Global societal trends to 2030: Thematic report 2

    This report forms part of our series on global societal trends and their impact on the EU in 2030, focusing on education, technology and connectedness. It analyses technological progress and the adoption of new technologies by businesses and citizens.

    Feb 12, 2015

  • Tool

    Toolkit for Weighting and Analysis of Nonequivalent Groups: A Tutorial for the R TWANG Package

    This tutorial describes the use of the TWANG package in R to estimate propensity score weights when there are two treatment groups, and how to use TWANG to estimate nonresponse weights.

    Feb 6, 2015

  • People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo

    Commentary

    Decoding the Breach: The Truth About the CENTCOM Hack

    When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.

    Feb 3, 2015

  • Criminal justice technology taxonomy web tool

    Tool

    Criminal Justice Technology Taxonomy Web Tool

    This tool presents a dynamic map populated by information on tools and practices that allow the user to explore the different areas of corrections technology and practice and to make comparisons between community and institutional corrections.

    Feb 2, 2015

  • Report

    Spotlight on 2014

    Spotlight 2014 is RAND Europe’s annual review. We present our research to support policymaking in four areas of transformation: harnessing the power of ICT, safeguarding society, building healthier communities and innovating for efficiency.

    Jan 27, 2015

  • Report

    Public Perception of Security and Privacy: Results of the comprehensive analysis of PACT's pan-European Survey

    This study reports public preferences for security, surveillance and privacy across 27 European Member States measured using a stated preference survey. It focuses on three real life contexts: metro travel, internet use and health records.

    Jan 27, 2015

  • Service members working in the Global Strategic Warning and Space Surveillance System Center

    Commentary

    Put a Cybercop on the Beat

    What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.

    Jan 22, 2015

  • U.S. President Barack Obama delivers his State of the Union address to a joint session of Congress on Capitol Hill in Washington, January 20, 2015

    Blog

    State of the Union 2015: Clarion Calls on Terrorism, Cyber, Education, and More

    The agenda President Barack Obama outlined in his State of the Union address can perhaps best be characterized as broad, mirroring the range of diverse and emerging issues facing the U.S. in 2015.

    Jan 21, 2015

  • Police officer using radio to communicate

    Report

    High-Priority Information Technology Needs for Law Enforcement

    Law enforcement's knowledge of information technology and its dissemination can be improved. A federal coordinator for technology-related outreach should be designated; this coordinator would work with various offices involved to develop and monitor a dissemination strategy.

    Jan 19, 2015

  • Lily Ablon holding medal received for winning DEF CON 21 challenge at Def Con Cybersecurity conference

    Blog

    The Good Hacker: Q&A with Lillian Ablon

    Lillian Ablon talks about hacking, winning the DEF CON black badge, women in STEM, and more.

    Jan 16, 2015

  • Report

    RAND Review: January-February 2015

    This issue of RAND Review reports on technology literacy in kids, self-driving cars, marijuana legalization, hacking and cybersecurity, monetary compensation for mass tragedies, and recent philanthropic gifts to RAND.

    Jan 12, 2015

  • Horizon over the water, sunrise or sunset

    Project

    Foresight and Optimisation in Horizon 2020

    As digital technology becomes more relevant in diverse aspects of our economy and society, it is important to anticipate changes in technology and how we use it. This understanding is particularly important for Horizon 2020, the EU’s 7-year research and innovation funding programme.

    Jan 12, 2015

  • Security guard watching video monitoring surveillance security system with portable radio transmitter

    Report

    New Tool Helps Corrections Agencies Rank Innovation Needs

    Institutional and community corrections agencies are facing increasingly complex tasks and challenges that call for innovative tools, technology, practices, and approaches. Given resource constraints, prioritizing needs is essential. A new tool can help.

    Jan 6, 2015

  • Priority Criminal Justice Needs Initiative Tool

    Tool

    Interactive Tool for Ranking Corrections Innovation Needs

    Interactive tool that allows users to leverage the research in Fostering Innovation in Community and Institutional Corrections.

    Jan 6, 2015

  • People pose in front of a display showing the word 'cyber' in binary code, Zenica, Bosnia and Herzegovina, December 27, 2014

    Commentary

    After a Year of Major Hacks, 2015 Resolutions to Bolster Cyber Security

    With numerous data breaches and emerging software vulnerabilities, 2014 was the year the hack went viral. But realizing a few New Year's resolutions in 2015 could help defenders make strides in protection, tools, and techniques to gain the edge over cyber attackers in years to come.

    Dec 31, 2014

  • Illustrated photo of a person typing on a computer keyboard

    Commentary

    Preventing Cyber Attacks: Sharing Information About Tor

    While Tor has many benefits, it is also used to hide criminal activity online such as the recent cyber attacks against JPMorgan Chase and Sony Pictures. The U.S. government should share the IP addresses of Tor network nodes with U.S. critical infrastructure and financial firms so that future cyber attacks could be prevented.

    Dec 17, 2014

  • Journal Article

    Understanding Data Requirements of Retrospective Studies

    This study seeks to characterize the types and patterns of data usage from electronic health records (EHRs) for clinical research.

    Dec 15, 2014

  • North Korean leader Kim Jong-un guides a takeoff and landing drill on a highway airfield in this undated photo released by North Korea's Korean Central News Agency in Pyongyang, October 19, 2014

    Commentary

    How Should the U.S. Respond to the Sony Hack?

    North Korea is likely testing the United States and its cyber community to see where vulnerabilities may exist. So this is not just an issue of how Sony Pictures responds—this is an issue of how the United States responds.

    Dec 11, 2014