Computer and Information Science and Technology

Featured

RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.

  • Fotolia_60505744_Subscription_Monthly_XXL

    Commentary

    The Hackers' Bazaar

    Apr 11, 2014

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

Explore Computer and Information Science and Technology

  • Journal Article

    Understanding Data Requirements of Retrospective Studies

    This study seeks to characterize the types and patterns of data usage from electronic health records (EHRs) for clinical research.

    Dec 15, 2014

  • North Korean leader Kim Jong-un guides a takeoff and landing drill on a highway airfield in this undated photo released by North Korea's Korean Central News Agency in Pyongyang, October 19, 2014

    Commentary

    Did North Korea Hack Sony Pictures Entertainment?

    North Korea has tried pressuring Sony Pictures, the White House, and the UN to halt the release of a film that depicts Kim Jong-un in terms Kim would not want the world and especially his elites to see. After failing to stop the film diplomatically, North Korea may have been motivated to escalate its efforts.

    Dec 11, 2014

  • Architects holding blueprint and tape measure

    Commentary

    A Competitive Landscape for Providing Services Is an Opportunity for Evidence-Building, but Who Will Benefit?

    In a tight fiscal climate the UK government has been an innovator in ways to fund and deliver effective public services. New funding arrangements present opportunities for developing the evidence base for policy and practice, since they are associated with different types of service providers.

    Dec 2, 2014

  • Members of the the Group of the Greens/European Free Alliance hold posters during a voting session on the Anti-Counterfeiting Trade Agreement (ACTA) at the European Parliament in Strasbourg, July 4, 2012

    Commentary

    ACTA Revisited? TTIP and Data Privacy

    The EU has embarked on negotiations with the U.S. on the TTIP, which shares some of ACTA's goals. This time, though, the European Commission is seeking to make the talks more transparent by publishing a series of position papers on key issues very early on in the process. This is a step in the right direction toward an agreement that will have economic benefits for a net-exporting region of intellectual property such as the EU.

    Nov 26, 2014

  • Evan Spiegel at RAND's Politics Aside 2014

    Blog

    Snapchat CEO Discusses App's Appeal, Future of Digital Communication

    With technology a persistent theme throughout RAND's biennial Politics Aside event, it was only fitting that the proceedings closed with a conversation on social media between Michael Lynton, CEO of Sony Pictures, and Evan Spiegel, the 24-year-old co-founder and CEO of Snapchat.

    Nov 20, 2014

  • Richard Danzig, Adm. Michael S. Rogers, and Michael E. Leiter at RAND's Politics Aside 2014

    Blog

    Setting Standards for Cyber Security

    Developing international norms and standards about appropriate cyber security activity by nations, groups, and even individuals is key to governing online activity in the future, said NSA Director Adm. Michael S. Rogers during a panel discussion at RAND's Politics Aside event.

    Nov 14, 2014

  • The flags of China and Hong Kong are seen above tents outside Legislative Council Complex at an occupied area in Hong Kong November 11,2014

    Commentary

    The Mountains Are High and the Emperor Is Far Away

    Since September 22, tens of thousands of protesters have flooded the streets of Hong Kong, calling for universal suffrage in the 2017 chief executive election and the resignation of current Chief Executive Chun-ying Leung. When they took to Twitter to share their ideas and mobilize support, they revealed the profound disconnect that separates elements of Hong Kong society from their mainland counterparts.

    Nov 11, 2014

  • Server room in data center

    Commentary

    Putting the Brussels House in Order: Why Data Protection Frameworks in EU Institutions and Agencies Are Not Fit for Purpose

    EU institutions and agencies urgently need to revisit the frameworks that govern data privacy in their own houses if they want to keep pace with some of the latest trends in corporate information and communication technology (ICT) delivery and use, such as cloud computing or the consumerisation of ICT ('bring your own device').

    Oct 23, 2014

  • An exercise at the Joint Cyber Control Center

    Report

    The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Both special operations forces and cyber forces are small teams of highly skilled specialists, and both communities value skilled personnel above all else. What lessons can be drawn from a review of the commonalities, similarities, and differences between U.S. cyber forces and early U.S. special forces?

    Oct 3, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • The dashboard for the New York Police Department's Domain Awareness System

    Report

    Assessing the Payoff of Police Department Investment in IT

    Budget tightening has presented police departments with challenging questions about how to deliver public safety more efficiently. Can information technology investments increase efficiency in policing, and do so cost-effectively?

    Sep 25, 2014

  • Graphic design with blue globe

    Project

    Examining the EU's Information Security and Data Protection Frameworks

    Has Brussels put its own house in order when it comes to information security and data privacy? RAND Europe research suggests that the EU institutions and agencies should review the rules that govern their information security and data privacy procedures if they want to be ahead of the ICT innovation curve.

    Sep 22, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Commentary

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Report

    Portfolio Assessment of the Department of State Internet Freedom Program

    Employing portfolio analysis techniques, the authors assessed the Bureau of Democracy, Human Rights, and Labor (DRL)'s Internet freedom program for FY 2012-2013 to determine its project portfolio's effectiveness in performance, balance, and synergy.

    Sep 4, 2014

  • Man in living room with smart television

    Commentary

    Are You Sitting Comfortably? Understanding the Security and Privacy Implications of the Internet-Connected Living Room

    The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.

    Sep 3, 2014

  • Family of mother and daughters playing video games together

    Project

    Are You Sitting Comfortably?

    A range of emerging, but important, risks to our Internet-connected living room have implications for security and privacy. Addressing these might require more action from government, industry and consumers alike.

    Sep 2, 2014

  • Two boys sitting on a couch playing video games, photo by Sean Davis/Fotolia

    Report

    Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications

    The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014

  • Report

    Ramifications of DARPA's Programming Computation on Encrypted Data Program

    RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.

    Aug 25, 2014

  • Report

    RAND Review: Vol. 38, No. 2, Summer 2014

    The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.

    Aug 7, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    RAND Review Takes Measure of Cybercrime, Medical Innovation, U.S. Security Cooperation

    Stories in RAND's flagship magazine discuss the duel between cybercrime and the law, the gamble of medical innovation, and the fruits of U.S. security cooperation.

    Aug 7, 2014