Databases and Data Collection, Analysis, and Processing

With computer technology has come the growth of local and online databases: collections of structured information stored on a computer or network of computers for querying and analysis. RAND has been a leader in the collection, analysis, and processing of databases for multidisciplinary projects in a range of research areas from census data and economic statistics to survey research and medical studies.

  • Report

    Spotlight on 2014

    Spotlight 2014 is RAND Europe’s annual review. We present our research to support policymaking in four areas of transformation: harnessing the power of ICT, safeguarding society, building healthier communities and innovating for efficiency.

    Jan 27, 2015

  • Report

    Public Perception of Security and Privacy: Results of the comprehensive analysis of PACT's pan-European Survey

    This study reports public preferences for security, surveillance and privacy across 27 European Member States measured using a stated preference survey. It focuses on three real life contexts: metro travel, internet use and health records.

    Jan 27, 2015

  • Service members working in the Global Strategic Warning and Space Surveillance System Center

    Commentary

    Put a Cybercop on the Beat

    What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.

    Jan 22, 2015

  • Holding a tablet computer with a weather icon

    Report

    The Adoption of New Smart-Grid Technologies

    A smart grid for the United States could have large-scale benefits. There are technological, economic, and regulatory barriers, but new policies or changes to policy could help overcome them.

    Jan 15, 2015

  • People pose in front of a display showing the word 'cyber' in binary code, Zenica, Bosnia and Herzegovina, December 27, 2014

    Commentary

    After a Year of Major Hacks, 2015 Resolutions to Bolster Cyber Security

    With numerous data breaches and emerging software vulnerabilities, 2014 was the year the hack went viral. But realizing a few New Year's resolutions in 2015 could help defenders make strides in protection, tools, and techniques to gain the edge over cyber attackers in years to come.

    Dec 31, 2014

  • Illustrated photo of a person typing on a computer keyboard

    Commentary

    Preventing Cyber Attacks: Sharing Information About Tor

    While Tor has many benefits, it is also used to hide criminal activity online such as the recent cyber attacks against JPMorgan Chase and Sony Pictures. The U.S. government should share the IP addresses of Tor network nodes with U.S. critical infrastructure and financial firms so that future cyber attacks could be prevented.

    Dec 17, 2014

  • Journal Article

    Understanding Data Requirements of Retrospective Studies

    This study seeks to characterize the types and patterns of data usage from electronic health records (EHRs) for clinical research.

    Dec 15, 2014

  • Two doctors looking at a patient's electronic medical records

    Journal Article

    Health Information Exchanges Show Promise, but More Work Is Needed to Realize Greater Benefits

    Health information exchanges show some evidence of reducing emergency department costs and usage, but since only a few have been evaluated, there is not enough evidence to say whether or not they are on track as a potential solution to the problem of fragmented health care delivery in the U.S.

    Dec 3, 2014

  • Architects holding blueprint and tape measure

    Commentary

    A Competitive Landscape for Providing Services Is an Opportunity for Evidence-Building, but Who Will Benefit?

    In a tight fiscal climate the UK government has been an innovator in ways to fund and deliver effective public services. New funding arrangements present opportunities for developing the evidence base for policy and practice, since they are associated with different types of service providers.

    Dec 2, 2014

  • News Release

    Health Information Exchanges Show Promise, but More Work Is Needed to Realize Greater Benefits

    Health information exchanges show some evidence of reducing emergency department costs and usage, but since only a few have been evaluated, there is not enough evidence to say whether or not they are on track as a potential solution to the problem of fragmented health care delivery in the U.S.

    Dec 1, 2014

  • Members of the the Group of the Greens/European Free Alliance hold posters during a voting session on the Anti-Counterfeiting Trade Agreement (ACTA) at the European Parliament in Strasbourg, July 4, 2012

    Commentary

    ACTA Revisited? TTIP and Data Privacy

    The EU has embarked on negotiations with the U.S. on the TTIP, which shares some of ACTA's goals. This time, though, the European Commission is seeking to make the talks more transparent by publishing a series of position papers on key issues very early on in the process. This is a step in the right direction toward an agreement that will have economic benefits for a net-exporting region of intellectual property such as the EU.

    Nov 26, 2014

  • Richard Danzig, Adm. Michael S. Rogers, and Michael E. Leiter at RAND's Politics Aside 2014

    Blog

    Setting Standards for Cyber Security

    Developing international norms and standards about appropriate cyber security activity by nations, groups, and even individuals is key to governing online activity in the future, said NSA Director Adm. Michael S. Rogers during a panel discussion at RAND's Politics Aside event.

    Nov 14, 2014

  • Server room in data center

    Commentary

    Putting the Brussels House in Order: Why Data Protection Frameworks in EU Institutions and Agencies Are Not Fit for Purpose

    EU institutions and agencies urgently need to revisit the frameworks that govern data privacy in their own houses if they want to keep pace with some of the latest trends in corporate information and communication technology (ICT) delivery and use, such as cloud computing or the consumerisation of ICT ('bring your own device').

    Oct 23, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • Montage of images depicting big data and public policy

    Project

    Big Data and Public Policy

    Connecting Diverse Strands Advances in digital technology are making it possible to collect, store and process ever-expanding amounts of data. This explosion of data holds tremendous potential to boost innovation, productivity, efficiency and, ultimately, economic growth and social value. The use of ‘big’ data, ...

    Sep 29, 2014

  • Report

    The 2014 Technology Summit for Victim Service Providers: Identifying Challenges and Possible Solutions

    Summarizes discussions and observations made at a national summit on leveraging technology to enable victims of crime to more quickly and effectively obtain the help they need.

    Sep 17, 2014

  • Information privacy design concept with globe, lock, and data

    Project

    Assessing the Public Perception of Security and Privacy in Europe

    A 3-year EU-funded research project is assessing existing knowledge about the relationship between security and privacy; collecting empirical evidence through a pan-European survey; and analyzing the main factors that affect how the public perceives the security and privacy implications of security technology.

    Sep 10, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Commentary

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Man in living room with smart television

    Commentary

    Are You Sitting Comfortably? Understanding the Security and Privacy Implications of the Internet-Connected Living Room

    The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.

    Sep 3, 2014

  • Family of mother and daughters playing video games together

    Project

    Are You Sitting Comfortably?

    A range of emerging, but important, risks to our Internet-connected living room have implications for security and privacy. Addressing these might require more action from government, industry and consumers alike.

    Sep 2, 2014