Databases and Data Collection, Analysis, and Processing

With computer technology has come the growth of local and online databases: collections of structured information stored on a computer or network of computers for querying and analysis. RAND has been a leader in the collection, analysis, and processing of databases for multidisciplinary projects in a range of research areas from census data and economic statistics to survey research and medical studies.

  • Report

    Using Future Broadband Communications Technologies to Strengthen Law Enforcement

    This report describes the finding of an expert panel convened in September 2015 to discuss how law enforcement can best leverage future communications capabilities anticipated to be fielded over the next 10 to 15 years.

    Sep 26, 2016

  • Glass globe and stethoscope on laptop

    Research Brief

    Engineering a Roadmap for Health Information Technology in Chile

    Describes a roadmap with five objectives for the Chilean government to expand its health information technology (IT) capabilities over the next ten years.

    Aug 25, 2016

  • A doctor looking at an image of a human brain on a tablet

    Commentary

    Who's Funding Mental Health Research Worldwide?

    The size and diversity of mental health research is significant, but it remains a loosely defined field in which funders tend not to spell out what counts as mental health. An outline of the current state of mental health research funding worldwide helps to address the huge challenges of mental illness.

    Aug 17, 2016

  • News Release

    U.S. Social Media Strategy Can Weaken ISIS Influence on Twitter

    On Twitter, there are six times more ISIS opponents than supporters, but those who support ISIS are more active. U.S. officials could help ISIS opponents enhance the effectiveness and reach of their messaging by offering social media training.

    Aug 16, 2016

  • The ISIS hashtag is seen typed into a Twitter smartphone app, February 6, 2016

    Report

    Examining ISIS Support and Opposition on Twitter

    ISIS uses Twitter to inspire followers, recruit fighters, and spread its message. Its opponents use Twitter to denounce the group. An analysis of the communities opposed to ISIS suggests inroads for influence that the U.S. government's social media strategy should explore.

    Aug 16, 2016

  • Double decker bus going by Big Ben and Parliament in London, UK

    Commentary

    Looking Out the Window to Transport in 2035

    The UK's roads, railways, and airports are some of the most congested in the world. An exploration of future transport scenarios and the key technologies that will drive them helps to guide today's policy and investment decisions.

    Jun 27, 2016

  • Red bus passing over Westminster bridge with Big Ben in the background, London, UK

    Report

    Travel in Britain in 2035

    Without substantial investment, the UK will experience severe congestion across its transport infrastructure by 2035. How might emerging technologies be able to address the problem?

    Jun 24, 2016

  • Research Brief

    Travel in Britain in 2035: Future scenarios and their implications for technology

    By 2035 UK transport infrastructure may be severely congested. Innovate UK commissioned this study to explore how technology might address the congestion problem by using capacity more efficiently, supporting modal choice and managing travel demand.

    Jun 24, 2016

  • Research Brief

    Project Ecosystem: A global map of mental health research funding

    This brief summarizes a study mapping the global funding of mental health research from 2009 to 2014. It built a bottom up a picture of who the major funders are, what kinds of research they support and how their strategies relate to one another.

    Jun 22, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016

  • A pro-Russian rebel sends messages over his smartphone in the eastern Ukrainian town of Slaviansk, May 16, 2014

    Report

    How Commercial Tech Can Affect Military Intelligence Operations

    Commercial technologies such as smartphones are primarily about identifying and tracking people and patterns of behavior. Their presence is greatest in urban environments. This happens to be where most military intelligence operations are conducted and where most future insurgencies and wars are likely to take place.

    Jun 6, 2016

  • Panoramic view of Santiago de Chile and Los Andes mountain range

    Report

    A Roadmap for the Development of Health Information Technology in Chile

    This report describes a roadmap for fostering development of health information technology in Chile's public health system and presents some recommendations for the ministry to consider when implementing the roadmap.

    May 20, 2016

  • Paramedics helping a patient

    Commentary

    Privacy Preferences for Healthcare Records and Information Across Europe

    The general public has a more nuanced preference for the privacy of electronic health records than previously thought. Survey respondents said that they would not be averse to individuals involved in the health and rescue professions having access to their basic health information.

    May 11, 2016

  • Cloud computing and lightning

    Commentary

    Cloud Computing: Can Data Localization Threaten Future Growth?

    A growing number of constraints have been imposed around the world on information in the cloud, fueling concerns that the Internet—the economic engine of the information age—may become hopelessly fragmented.

    Apr 29, 2016

  • News Release

    One-Fourth of American Adults Notified of Data Breach in Past Year; Few Consumers Penalize Hacked Companies

    About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.

    Apr 14, 2016

  • Infographic

    Data Theft Victims, and Their Response to Breach Notifications

    This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.

    Apr 14, 2016

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

    Apr 14, 2016

  • Illustration of profile and visible brain with world planisphere

    Project

    Project Ecosystem: Mapping the Global Mental Health Research Funding System

    To support the coordination of mental health research, RAND Europe mapped the research funding 'ecosystem'. Researchers explored who the major funders are, what kinds of research they support, and how their strategies relate to one another.

    Mar 25, 2016

  • Cover image of RR1271

    Report

    Project Ecosystem: Mapping the global mental health research funding system

    This study maps the global funding of mental health research between 2009 and 2014. It builds from the bottom up a picture of who the major funders are, what kinds of research they support and how their strategies relate to one another.

    Mar 25, 2016

  • An NYPD officer stands across the street from the Apple Store on 5th Ave. in New York, March 11, 2016

    Commentary

    The False Choice at the Core of the Apple-FBI Standoff

    The Apple-FBI case should spark a broader debate among technology companies concerning their role in maintaining the privacy and security balance. A starting point should be to recognize that the majority of cyberattacks are related to phishing—and a user's action—not to whether a device can be secured.

    Mar 21, 2016