IST

Featured

RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.

  • Fotolia_60505744_Subscription_Monthly_XXL

    Commentary

    The Hackers' Bazaar

    Apr 11, 2014

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

  • tinker_computing_center_120830-F-WS541-003

    Report

    Cost Considerations in Cloud Computing

    Oct 2, 2014

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

Explore Computer and Information Science and Technology

  • Report

    Maritime Tactical Command and Control Analysis of Alternatives

    This report is about software systems that support situational awareness and command and control (C2) for the U.S. Navy. This report provides the results of an analysis of alternatives for the follow-on to the Global C2 system maritime (GCCS-M).

    Aug 29, 2016

  • News Release

    RAND and Lawrence Livermore National Lab Combine High-Performance Computing and Public Policy Analysis for ...

    A workshop demonstrated how RAND's innovative analytic methods supported by Lawrence Livermore National Laboratory's advanced computing capabilities can improve decision and policymaking for particularly complex issues like water resource management.

    Aug 25, 2016

  • Research Brief

    Engineering a Roadmap for Health Information Technology in Chile

    Describes a roadmap with five objectives for the Chilean government to expand its health information technology (IT) capabilities over the next ten years.

    Aug 25, 2016

  • The Glen Canyon Dam in northern Arizona was built to provide hydroelectricity and flow regulation from the upper Colorado River Basin to the lower

    Report

    Using High-Performance Computing to Support Water Resource Planning

    Researchers from RAND and the Lawrence Livermore National Laboratory tested five different water management portfolios such as conservation, groundwater and seawater desalination, and water reuse, against thousands of scenarios reflecting uncertainty about future climate change and development patterns.

    Aug 25, 2016

  • A doctor looking at an image of a human brain on a tablet

    Commentary

    Who's Funding Mental Health Research Worldwide?

    The size and diversity of mental health research is significant, but it remains a loosely defined field in which funders tend not to spell out what counts as mental health. An outline of the current state of mental health research funding worldwide helps to address the huge challenges of mental illness.

    Aug 17, 2016

  • Global internet security illustration

    Project

    Developing a Toolbox for the Global Cyber Security Capacity Centre Maturity Model

    The Cyber Security Capability Maturity Model allows organisations to map and assess maturity to achieve a healthy and resilient national cyber ecosystem. A new toolbox will aim to help policymakers identify priority areas for intervention to strengthen cyber capabilities.

    Aug 16, 2016

  • News Release

    U.S. Social Media Strategy Can Weaken ISIS Influence on Twitter

    On Twitter, there are six times more ISIS opponents than supporters, but those who support ISIS are more active. U.S. officials could help ISIS opponents enhance the effectiveness and reach of their messaging by offering social media training.

    Aug 16, 2016

  • The ISIS hashtag is seen typed into a Twitter smartphone app, February 6, 2016

    Report

    Examining ISIS Support and Opposition on Twitter

    ISIS uses Twitter to inspire followers, recruit fighters, and spread its message, while opponents use Twitter to denounce it. An analysis of the communities opposed to ISIS suggests inroads for influence that the U.S. government's social media strategy should explore to weaken ISIS propaganda and recruitment.

    Aug 16, 2016

  • News Release

    Untangling the 'Dark Web': New Study Shows Steady Growth of the Online Illicit Drugs Trade

    The number of transactions for illicit drugs on cryptomarkets, which exist on the “dark web,” have tripled and revenues have doubled since 2013, when Silk Road 1.0 was shut down by the FBI.

    Aug 8, 2016

  • Cyber drug dealer

    Project

    Taking Stock of the Online Drugs Trade

    On behalf of the Dutch Research and Documentation Centre, RAND Europe is partnering on an effort to understand the scope and size of Internet drug trafficking, as well as what role the Netherlands may play.

    Aug 5, 2016

  • Research Brief

    The role of the 'dark web' in the trade of illicit drugs

    The Internet has fundamentally changed ways of doing business, including the operations of illegal markets. RAND Europe was commissioned to investigate the role of the Internet in facilitating the drugs trade, particularly in the Netherlands.

    Aug 5, 2016

  • Spider web

    Report

    Growth of the Online Illicit Drugs Trade

    Silk Road was the first major online market place for illegal goods on the hidden web. Since the FBI took it down in 2013, copycats have filled the void. Transactions for illicit drugs on cryptomarkets have tripled and revenues have doubled.

    Aug 5, 2016

  • Guo Shengkun, China's Minister of Public Security, speaks during the Second U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues in Beijing, China, June 14, 2016

    Commentary

    The U.S.-China Cyber Agreement: A Good First Step

    China's apparent compliance with the cyber agreement might represent little more than a temporary shift in tactics. The U.S. should make clear that indictments may once again be sought if Chinese hackers resume cyber espionage against U.S. firms.

    Aug 1, 2016

  • Massive unclassified paper shred and uniform drop-off bins help prevent OPSEC violations

    Commentary

    Keeping Up with the Policymakers: The Unclassified Tearline

    Unclassified tearlines could convey the bottom line and potential implications of a classified story in unclassified terms, while obscuring sensitive sources and methods. There are good reasons to build them into the business process and culture of intelligence agencies.

    Jul 28, 2016

  • Tool

    Courts Innovation Needs Tool

    Using information drawn from the report findings, this interactive tool for ranking court innovation needs allows users to re-prioritize the needs, based on their own views of the importance of different court system policy goals.

    Jul 22, 2016

  • Aerographer's mates stand by as an unmanned underwater vehicle leaves the surface to search for mines as part of a training exercise

    Commentary

    The Ethics of Artificial Intelligence in Intelligence Agencies

    The defense community has already begun a healthy dialogue about the ethics of AI in combat systems. The intelligence community should develop standards for AI risk assessments and assign responsibility for conducting them.

    Jul 18, 2016

  • Los Angeles city skyline

    Dissertation

    Exploring Sources of Innovation in the Knowledge-Based Economy: The Case of Los Angeles

    Uses a mix of both quantitative and qualitative methods to help policy makers identify sources of innovation in the knowledge-based economy and to best leverage these sources for regional economic growth.

    Jul 15, 2016

  • Russian President Vladimir Putin speaks with journalists after a live broadcast nationwide call-in, Moscow, Russia, April 14, 2016

    Report

    The Russian “Firehose of Falsehood” Propaganda Model

    The Russian propaganda model is high-volume and multichannel, and it disseminates messages without regard for the truth. It is also rapid, continuous, and repetitive, and it lacks commitment to consistency.

    Jul 11, 2016

  • Double decker bus going by Big Ben and Parliament in London, UK

    Commentary

    Looking Out the Window to Transport in 2035

    The UK's roads, railways, and airports are some of the most congested in the world. An exploration of future transport scenarios and the key technologies that will drive them helps to guide today's policy and investment decisions.

    Jun 27, 2016

  • Periodical

    RAND Review: July-August 2016

    This issue highlights the stress of military deployments and resilience of military families; RAND research on cybercrime, network defense, and data breaches; the 40th anniversary of RAND's landmark Health Insurance Experiment; and more.

    Jun 27, 2016