Direct-to-consumer (DTC) telemedicine serves millions of patients; however, there is limited research on the care provided. This study compared the quality of care at Teladoc, a large DTC telemedicine company, with that at physician offices and compared access to care for Teladoc users and nonusers.
The study seeks to better understand cybersecurity threats and existing cybersecurity capabilities in the European Union and the United States, examining in tandem transnational cooperation and perceptions of the effectiveness of the EU response.
Water resource agencies around the world are grappling with how to make smart investments to ensure long-term water reliability at a time of unprecedented water stress, growing demands, uncertain climate change, and limited budgets.
Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America's networks with appropriate resources dedicated to combatting criminal, terrorist, and other threats in cyberspace.
This study uses a simple model to speculate about whether deterrence can be a significant part of dealing with special features of the cyber attack challenge, and distinguishing different classes and contexts of cyber threats.
This study describes the development of a Youth Resilience Corps, or YRC (i.e., a set of tools to engage young people in youth-led community resilience activities) and the findings from a small-scale pilot test.
The Volkswagen scandal comes at a time when the public's trust in both the automotive industry and tech companies is at risk. The level of public trust in an individual organization could end up burnishing — or infecting — an entire industry or new technology.
U.S. Air Force weapon systems containing information technology may be vulnerable to intelligence exploitation and cyberattacks. But there are steps that the Air Force can take to improve the security of these systems throughout their life cycles.
The human element is the most unpredictable factor in cybersecurity. A social engineer aims to make people do what they want or give the social engineer information, often without the person considering the negative consequences.
Technology has afforded the U.S. national security apparatus incredible capabilities, along with equally monumental challenges and risks. The government has the option to choose whether to adjust by taking a proactive approach or to allow external forces to determine the future of its secrets.
California has implemented numerous policy changes to cope with a record-breaking, four-year drought. In this Events @ RAND podcast, a panel of experts discuss what government agencies can do to better manage water resources, what methods are most effective at encouraging citizens to use water wisely, and how leaders can better plan for future climate crises.
The DoD's cyber strategy is aligned with its mission, but there will be challenges to implementation—including building and maintaining a capable workforce, assessing risk across DoD networks and systems, and planning for operations.
While a U.S.-China cyberspace agreement is a welcome step, it also underscores the greater issues facing the United States and the international community in this largely ungoverned space. A precondition for securing U.S. networks should be the development of an overarching cyber doctrine that defines acceptable behavior and allows the U.S. to defend its networks against threats.
Established in 2005 after Hurricane Katrina, the RAND Gulf States Policy Institute tackles tough questions in the topic areas relevant to the region's long-term economic development and the well-being of its residents. This overview highlights research projects related to coastal protection and restoration, community resilience, housing, health and mental health, education, and public safety.
The Partnerships for Recovery Across The Sectors (PRACTIS) toolkit employs a survey, a quality improvement guide, and a recovery exercise to strengthen disaster recovery partnerships between local health departments and community-based organizations.