Databases and Data Collection, Analysis, and Processing

With computer technology has come the growth of local and online databases: collections of structured information stored on a computer or network of computers for querying and analysis. RAND has been a leader in the collection, analysis, and processing of databases for multidisciplinary projects in a range of research areas from census data and economic statistics to survey research and medical studies.

  • Double decker bus going by Big Ben and Parliament in London, UK

    Commentary

    Looking Out the Window to Transport in 2035

    The UK's roads, railways, and airports are some of the most congested in the world. An exploration of future transport scenarios and the key technologies that will drive them helps to guide today's policy and investment decisions.

    Jun 27, 2016

  • Red bus passing over Westminster bridge with Big Ben in the background, London, UK

    Report

    Travel in Britain in 2035

    Without substantial investment, the UK will experience severe congestion across its transport infrastructure by 2035. How might emerging technologies be able to address the problem?

    Jun 24, 2016

  • Research Brief

    Travel in Britain in 2035: Future scenarios and their implications for technology

    By 2035 UK transport infrastructure may be severely congested. Innovate UK commissioned this study to explore how technology might address the congestion problem by using capacity more efficiently, supporting modal choice and managing travel demand.

    Jun 24, 2016

  • Research Brief

    A global map of mental health research funding

    This brief summarizes a study mapping the global funding of mental health research from 2009 to 2014. It built a bottom up a picture of who the major funders are, what kinds of research they support and how their strategies relate to one another.

    Jun 22, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016

  • A pro-Russian rebel sends messages over his smartphone in the eastern Ukrainian town of Slaviansk, May 16, 2014

    Report

    How Commercial Tech Can Affect Military Intelligence Operations

    Commercial technologies such as smartphones are primarily about identifying and tracking people and patterns of behavior. Their presence is greatest in urban environments. This happens to be where most military intelligence operations are conducted and where most future insurgencies and wars are likely to take place.

    Jun 6, 2016

  • Panoramic view of Santiago de Chile and Los Andes mountain range

    Report

    A Roadmap for the Development of Health Information Technology in Chile

    This report describes a roadmap for fostering development of health information technology in Chile's public health system and presents some recommendations for the ministry to consider when implementing the roadmap.

    May 20, 2016

  • Paramedics helping a patient

    Commentary

    Privacy Preferences for Healthcare Records and Information Across Europe

    The general public has a more nuanced preference for the privacy of electronic health records than previously thought. Survey respondents said that they would not be averse to individuals involved in the health and rescue professions having access to their basic health information.

    May 11, 2016

  • Cloud computing and lightning

    Commentary

    Cloud Computing: Can Data Localization Threaten Future Growth?

    A growing number of constraints have been imposed around the world on information in the cloud, fueling concerns that the Internet—the economic engine of the information age—may become hopelessly fragmented.

    Apr 29, 2016

  • News Release

    One-Fourth of American Adults Notified of Data Breach in Past Year; Few Consumers Penalize Hacked Companies

    About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.

    Apr 14, 2016

  • Infographic

    Data Theft Victims, and Their Response to Breach Notifications

    This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.

    Apr 14, 2016

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

    Apr 14, 2016

  • Illustration of profile and visible brain with world planisphere

    Project

    Project Ecosystem: Mapping the Global Mental Health Research Funding System

    To support the coordination of mental health research, RAND Europe mapped the research funding 'ecosystem'. Researchers explored who the major funders are, what kinds of research they support, and how their strategies relate to one another.

    Mar 25, 2016

  • Illustration of profile and visible brain with world planisphere

    Report

    Mapping the global mental health research funding system

    This study maps the global funding of mental health research between 2009 and 2014. It builds from the bottom up a picture of who the major funders are, what kinds of research they support and how their strategies relate to one another.

    Mar 25, 2016

  • An NYPD officer stands across the street from the Apple Store on 5th Ave. in New York, March 11, 2016

    Commentary

    The False Choice at the Core of the Apple-FBI Standoff

    The Apple-FBI case should spark a broader debate among technology companies concerning their role in maintaining the privacy and security balance. A starting point should be to recognize that the majority of cyberattacks are related to phishing—and a user's action—not to whether a device can be secured.

    Mar 21, 2016

  • Syrian refugees stand in line as they wait for aid packages at Al Zaatari refugee camp in Mafraq, Jordan, January 20, 2016

    Commentary

    Tracking Refugees with Biometrics: More Questions Than Answers

    Using biometrics in refugee crises is compelling because it gives individuals who have nothing proof of identity even without a government-issued credential like an ID card or passport. But who has rights to the U.N. biometrics database and what is its future?

    Mar 9, 2016

  • A fish-eye view of a rack of computers

    Report

    Using Big Data to Identify the Concerns of Potential Army Recruits

    How has interest in military careers evolved over time and by geographic location? And what are potential recruits' biggest concerns related to the Army? Anonymous data from Internet searches can provide insight.

    Mar 9, 2016

  • Three young people on smartphones

    Report

    Attitudes Toward Local and National Government Expressed Over Chinese Social Media

    How can social media provide perspective on how the Chinese public feels about domestic political issues, such as the environment, food safety, and local versus national government?

    Mar 4, 2016

  • Pieces of an iPhone are seen on a repair store counter in New York City, February 17, 2016

    Commentary

    The Cost of Security in the iPhone Era

    As the security on the iPhone better protects users from criminals, it also excels at keeping law enforcement from accessing the data. The dispute between the FBI and Apple over unlocking the iPhone of one of the San Bernardino attackers continues but the real debate is about whether society wants legislation that weakens iPhone security for law enforcement.

    Feb 26, 2016

  • Man using a laptop and drinking tea

    Commentary

    How Willing Are People to Allow Access to Their Internet Browsing History If It Helps National Security?

    A survey of over 26,000 citizens across the EU found that even in the event of a national emergency or limiting access of individuals' Internet usage to law enforcement agencies, there was still a strong aversion to information being stored or accessed.

    Feb 15, 2016