Computer and Information Science and Technology


RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.

  • Fotolia_60505744_Subscription_Monthly_XXL


    The Hackers' Bazaar

    Apr 11, 2014

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

  • tinker_computing_center_120830-F-WS541-003


    Cost Considerations in Cloud Computing

    Oct 2, 2014

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

Explore Computer and Information Science and Technology

  • Report

    Mapping UK mental health research funding and its contribution to global funding: A refined analysis for the UK context

    This briefing provides an analysis across the UK of government support for mental health research, with a particular emphasis on the UK Department of Health. This analysis builds on the project -- Mapping the global mental health research system.

    Oct 21, 2016

  • Illustration of a digital world


    Where Next for the Digital Society?

    Digital technologies are omnipresent, both in terms of where we are and what we do. A digital society can bring about economic and societal gain, but there are many challenges that need to be addressed beyond the actual technologies.

    Oct 14, 2016

  • Dissertation

    Police, Process, and Privacy: Three Essays on the Third Party Doctrine

    This dissertation presents the results of three studies that investigate how law enforcement uses electronic surveillance.

    Oct 13, 2016

  • Report

    Thought Leadership programme 2016: Key Findings

    Key findings from the 2016 Thought Leadership Programme, convened by Corsham Institute in conjunction with RAND Europe and St George's House exploring opportunities and challenges created by digital technologies in society.

    Oct 13, 2016

  • A 3D printed logo of Twitter and an Islamic State flag


    Fighting the Islamic State on Social Media

    Countering ISIL in the real world also requires countering its messaging online. It is critical that the U.S. and its international partners work with influential communities in the region that can more effectively and credibly counter the ISIL narrative.

    Oct 11, 2016

  • Concept of leaky software, data pouring out of pipe


    Digital Theft: The New Normal

    Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.

    Oct 10, 2016

  • Woman paying a cashier with a credit card

    Journal Article

    Cost of Cyber Incidents to American Companies Is Less Than Expected

    Why don't American companies invest more in computer security? One possible explanation: Relative to the other risks they face, cyber risks often aren't as significant as expected. Most breaches cost companies less than 0.4 percent of their annual revenues.

    Oct 10, 2016

  • Report

    Social change and public engagement with policy and evidence

    This report offers an overview of emerging social trends which may affect public engagement with evidence and policy in Britain. It was produced to provide background for a workshop hosted by Sense about Science and the Nuffield Foundation.

    Oct 6, 2016

  • Digital silhouettes of people


    How to Rethink Data Privacy

    Society benefits from the exchange of large-scale data in many ways. Anonymization is the usual mechanism for addressing the privacy of data subjects. Unfortunately, anonymization is broken.

    Oct 5, 2016

  • News Release

    Ukraine's Security Sector Needs Substantial Reform

    An assessment of Ukraine's security sector determines what different institutions need to do and where gaps exist. Roles and responsibilities need to be clarified, and coordination is needed among individual ministries and agencies.

    Oct 5, 2016

  • Ukrainian servicemen take part in a rehearsal for the Independence Day military parade in central Kiev, Ukraine, August 22, 2016


    Security Sector Reform in Ukraine

    The 2014 Maidan revolution created an opportunity for change in a system that had resisted it for 25 years. The Ukrainian security establishment has progressed since then, but its efforts have been insufficient to address the threats now facing the nation.

    Oct 5, 2016

  • Internet of Things illustration


    Accelerating the Internet of Things in the UK

    To gain a rounded picture of the potential policy implications of IoT developments in the UK, and to inform the development and adoption of the IoT, RAND Europe researchers brought together inputs from businesses and individual users of technology and developed a process for policy feedback

    Oct 4, 2016

  • Research Brief

    Accelerating the Internet of Things in the UK: Linking policy with practice

    Using insights from Internet of Things (IoT) implementations and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the IoT in the UK.

    Oct 4, 2016

  • Report

    Accelerating the Internet of Things in the UK: Using policy to support practice

    Using insights from businesses and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the Internet of Things in the UK.

    Oct 4, 2016

  • A graphical model meant to help prevent hackers from attacking vulnerable computer resources


    Challenges and Opportunities in Cyberspace

    Cyberspace provides opportunities for innovation, commerce, and societal advancement but also raises significant issues for policymakers in securing cyber vulnerabilities, ensuring privacy and protection of personal data, and considering the use of cyber weapons as a national security asset.

    Sep 30, 2016

  • Dmitri Dolgov, principal engineer on the software team of Google's Self-Driving Car project, speaks during a presentation in Mountain View, California, September 29, 2015


    The Brains Behind Autonomous Vehicles May Need a License to Drive

    Autonomous vehicles require exquisite software. To make it secure, industry and government should consider educational standards and licensure requirements for the engineers who create it.

    Sep 27, 2016

  • A police officer working on a computer in a patrol car


    Using Future Broadband Communications Technologies to Strengthen Law Enforcement

    This report describes the finding of an expert panel convened in September 2015 to discuss how law enforcement can best leverage future communications capabilities anticipated to be fielded over the next 10 to 15 years.

    Sep 26, 2016

  • News Release

    Cost of Cyber Incidents Not Large Compared with Other Business Losses; May Influence Responses by Businesses

    Data breaches have made headlines in recent years, exposing poor practices that put the personal information of millions of consumers at risk. But the cost of a typical cyber breach is much less than generally estimated, providing one possible explanation for why American companies do not invest more to improve computer security.

    Sep 20, 2016

  • A man counting pills on his laptop


    Dark Web Likely Isn't Fuelling International Drug Sales

    Vendors in the Netherlands have developed a fairly successful international trade of ecstasy-type drugs and stimulants from online markets, but it appears that most countries are selling illicit drugs within their own borders.

    Sep 19, 2016

  • Laptop and cursor with a gun icon pattern


    International Arms Trade on the Hidden Web

    RAND Europe was commissioned by the Economic and Social Research Council to explore the European illegal arms trade, with focus on the role played by the hidden web in fuelling and/or facilitating such trade.

    Sep 15, 2016