Communication Technology

Featured

  • Woman communicates with telemedicine doctor by digital tablet

    Journal Article

    Direct-to-Consumer Telemedicine Following Natural Disasters

    Apr 25, 2018

    Direct-to-consumer telemedicine is a viable way to deliver medical care in the days after a natural disaster. But most people who use such services do so for routine matters, not disaster-caused illnesses.

  • A graphic representing an accelerating future

    Article

    Can Humans Survive a Faster Future?

    May 1, 2018

    Life is moving faster and faster. Just about everything—transportation, weapons, the flow of information—is accelerating. How will decisionmakers preserve our personal and national security in the face of hyperspeed?

Explore Communication Technology

  • A man using a radio transceiver

    Report

    Signals Intelligence for Anyone

    Signals intelligence (SIGINT) is intelligence gathered from communications, electronics, or foreign instrumentation. This has traditionally been considered a governmental function. But new technologies are changing that. Now private citizens can conduct SIGINT activities.

    Dec 5, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Tool

    Interfacing Force-on-Force and Communications Models: MANA and JNE

    This report documents an interface between an agent-based force-on-force simulation and a network simulation for the U.S. Army's Cyber Center of Excellence, Capabilities Development and Integration Directorate (CDID), Cyber Battle Lab.

    Nov 8, 2017

  • Congressman Adam Schiff speaks at a House Intelligence Committee meeting about Russian use of social media to influence U.S. elections, Washington, D.C., November 1, 2017

    Commentary

    Covert Influence Is the New Money Laundering

    Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.

    Nov 6, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017

  • Report

    Civic engagement: How can digital technologies underpin citizen-powered democracy?

    The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.

    Oct 11, 2017

  • Report

    Digital currency: Transacting and value exchange in the digital age

    The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.

    Oct 11, 2017

  • Report

    Open science: The citizen's role in and contribution to research

    The report summarises the conclusions of an expert consultation exploring how citizens are increasingly becoming involved in scientific research. It investigates the benefits and challenges that citizen science poses for different stakeholders.

    Oct 11, 2017

  • Report

    Building our Connected Society: Findings from the 2017 Thought Leadership programme

    This report summarises the key themes that emerged from four thought leadership sessions on the UK's connected society, along with recommended actions moving forward for the UK government, industries, the third sector and the public.

    Oct 11, 2017

  • Journal Article

    Evaluation of Telephone First Approach to Demand Management in English General Practice: Observational Study

    For clinicians, this study provides clear evidence that a considerable part of patient workload can be dealt with through phone consultations.

    Oct 6, 2017

  • Supporters of Lebanon's Hezbollah leader Sayyed Hassan Nasrallah listen to him via a screen during a rally marking the 11th anniversary of the end of Hezbollah's 2006 war with Israel, in Khiam, Lebanon, August 13, 2017

    Commentary

    How Hezbollah Came to Dominate Information Warfare

    Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.

    Sep 19, 2017

  • A man uses an Apple Watch to demonstrate the mobile payment service Apple Pay at a cafe in Moscow, Russia, October 3, 2016

    Report

    Digital Technology and the Future of Commerce

    Advances in digital technology can connect businesses and consumers, develop new and niche markets, and commodify new activities. As the exchange of goods and services evolves, what are the societal impacts?

    Aug 30, 2017

  • Two girls on a couch watching TV while eating popcorn

    Blog

    How RAND Helped Cable TV Spread Far and Wide

    In the late 1960s and early '70s, RAND released a series of reports about cable television — the technology, federal and state regulation, and its use in education. The researchers' interactive vision for cable TV was a lot like the internet.

    Aug 25, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • An Iraqi military HMMWV drives past an Islamic State sign in eastern Mosul after they captured it from IS

    Commentary

    The Islamic State May Be Failing, but Its Strategic Communications Legacy Is Here to Stay

    The Islamic State's caliphate is collapsing but its legacy will live on virtually because of its information operations. The scale of the menace presented by the group today pales in comparison to other global challenges, yet it manages to dominate and terrorize the public mind.

    Aug 17, 2017

  • Report

    Civic Engagement: How Can Digital Technology Encourage Greater Engagement in Civil Society?

    This Perspective explores the potential impacts that digital technologies may have on the nature of civic engagement and political processes, providing an overview of the opportunities and risks associated with the use of these technologies.

    Aug 7, 2017