IST

Featured

RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.

  • tinker_computing_center_120830-F-WS541-003

    Report

    Cost Considerations in Cloud Computing

    Oct 2, 2014

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

  • Fotolia_60505744_Subscription_Monthly_XXL

    Commentary

    The Hackers' Bazaar

    Apr 11, 2014

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

Explore Computer and Information Science and Technology

  • Hand touching tablet behind social media diagram and map

    Commentary

    The Clash of Internet Civilizations: Why Neither Side Should Prevail

    The debate over net neutrality pits two opposing philosophies against each other — one pushing for the continued evolution of the Internet as an open information superhighway, the other asserting that the Internet's evolution needs to take more account of the many ways it is and will be used.

    Apr 10, 2015

  • Man on laptop at night

    Report

    Problematic Internet Use and Well-Being: Recommendations for the Air Force

    Problematic Internet use (PIU) is a mental health issue that can have serious consequences. With an estimated 6 percent of Airmen suffering from PIU, what can the U.S. Air Force do to help with treatment and prevention?

    Mar 20, 2015

  • Police in formation at a Memorial Day ceremony in Connecticut

    Commentary

    When It Comes to Police-Community Relations, “Expect What You Inspect”

    As the President's Task Force on 21st Century Policing report suggests, local governments should evaluate police on more than crime statistics, and police departments and officers should be held publicly accountable for meeting the community's expectations. Adding new dimensions of performance metrics would help.

    Mar 17, 2015

  • Eye and technology display

    Report

    Training Cyber Warriors: Lessons from Defense Language Training

    To ensure the U.S. Department of Defense has sufficient numbers of skilled cyber workers, it may need to develop additional training approaches as it plans for broader recruiting and workforce management. Examining how DoD handles foreign language training yields lessons that could be applied to cyber training.

    Mar 16, 2015

  • Tool

    Propensity Scores for Multiple Treatments: A Tutorial for the MNPS Macro in the TWANG SAS Macros

    This tutorial explains the syntax and features related to the implementation of the MNPS function in the SAS TWANG macros.

    Mar 13, 2015

  • News Release

    The Costs of Mobile 'Not-Spots'

    Rural areas lacking a mobile phone signal (“not-spots”) experience a negative impact on businesses of all sizes, and could suffer detrimental effects to the long-term sustainability of communities. Residents and visitors would be willing to pay for better mobile coverage.

    Mar 12, 2015

  • Man on a bench in countryside using mobile

    Report

    The Costs of Mobile “Not-Spots”

    Rural areas lacking a mobile phone signal (“not-spots”) experience a negative impact on businesses of all sizes, and could suffer detrimental effects to the long-term sustainability of communities. Residents and visitors would be willing to pay for better mobile coverage.

    Mar 12, 2015

  • Farmer using a smartphone and tablet PC while standing in his field

    Report

    Estimating the value of mobile telephony in mobile network not-spots: Summary

    This study uses stated preference discrete choice experiments to quantify the value that residents and businesses in not-spot areas and local visitors and tourists to these areas are willing to pay for mobile phone coverage.

    Mar 12, 2015

  • A man accesses data from a computer

    Testimony

    Sharing Information About Threats Is Not a Cybersecurity Panacea

    Information-sharing—specifically, threat-centric information-sharing—has dominated recent discussions on improving cybersecurity, but it is not a silver bullet. Its usefulness is tied to certain assumptions about attacks, and while it should be encouraged, it addresses only one facet of a very complex space.

    Mar 4, 2015

  • Journal Article

    Use of Pooled State Administrative Data for Mental Health Services Research

    State mental health authorities routinely devote resources to collect data for state planning and reporting purposes. However, these data are rarely used in cross-state comparisons to inform state or federal policy development.

    Feb 26, 2015

  • Illustration of idea, solution, and money

    Commentary

    Managing Technology in an Unmanageable World

    The need for purposeful and focused R&D in the U.S. has never been greater, but technology is advancing so quickly that the structures available to manage it have not kept pace. A comprehensive examination of the technological landscape is needed to help the government take a more holistic approach to investing in and regulating technologies.

    Feb 19, 2015

  • Group of young students studying in the classroom with a laptop

    Report

    Education, Technology and Connectedness: Global Societal Trends to 2030

    The spread of technology and its relationship to education will transform the education and power of citizens, forming a significant societal challenge for the European Union in the coming decades.

    Feb 12, 2015

  • Tool

    Toolkit for Weighting and Analysis of Nonequivalent Groups: A Tutorial for the R TWANG Package

    This tutorial describes the use of the TWANG package in R to estimate propensity score weights when there are two treatment groups, and how to use TWANG to estimate nonresponse weights.

    Feb 6, 2015

  • People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo

    Commentary

    Decoding the Breach: The Truth About the CENTCOM Hack

    When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.

    Feb 3, 2015

  • Criminal justice technology taxonomy web tool

    Tool

    Criminal Justice Technology Taxonomy Web Tool

    This tool presents a dynamic map populated by information on tools and practices that allow the user to explore the different areas of corrections technology and practice and to make comparisons between community and institutional corrections.

    Feb 2, 2015

  • Report

    Spotlight on 2014

    Spotlight 2014 is RAND Europe’s annual review. We present our research to support policymaking in four areas of transformation: harnessing the power of ICT, safeguarding society, building healthier communities and innovating for efficiency.

    Jan 27, 2015

  • Report

    Public Perception of Security and Privacy: Results of the comprehensive analysis of PACT's pan-European Survey

    This study reports public preferences for security, surveillance and privacy across 27 European Member States measured using a stated preference survey. It focuses on three real life contexts: metro travel, internet use and health records.

    Jan 27, 2015

  • Service members working in the Global Strategic Warning and Space Surveillance System Center

    Commentary

    Put a Cybercop on the Beat

    What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.

    Jan 22, 2015

  • U.S. President Barack Obama delivers his State of the Union address to a joint session of Congress on Capitol Hill in Washington, January 20, 2015

    Blog

    State of the Union 2015: Clarion Calls on Terrorism, Cyber, Education, and More

    The agenda President Barack Obama outlined in his State of the Union address can perhaps best be characterized as broad, mirroring the range of diverse and emerging issues facing the U.S. in 2015.

    Jan 21, 2015

  • Police officer using radio to communicate

    Report

    High-Priority Information Technology Needs for Law Enforcement

    Law enforcement's knowledge of information technology and its dissemination can be improved. A federal coordinator for technology-related outreach should be designated; this coordinator would work with various offices involved to develop and monitor a dissemination strategy.

    Jan 19, 2015