Computer and Information Science and Technology

Featured

RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.

  • A graphical model meant to help prevent hackers from attacking vulnerable computer resources, photo courtesy of Pacific Northwest National Laboratory

    Content

    Challenges and Opportunities in Cyberspace

    Sep 30, 2016

    Cyberspace provides opportunities for innovation, commerce, and societal advancement but also raises issues for policymakers in securing cyber vulnerabilities, ensuring privacy and protection of personal data, and considering the use of cyber weapons as a national security asset.

  • Concept of leaky software, data pouring out of pipe. Photo by the_lightwriter/Fotolia

    Commentary

    Digital Theft: The New Normal

    Oct 10, 2016

    Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.

Explore Computer and Information Science and Technology

  • Report

    Robust and Resilient Logistics Operations in a Degraded Information Environment

    The U.S. Air Force asked RAND Project AIR FORCE to examine how tactics, techniques, and procedures should change to improve an airman's ability to detect, evaluate, and mitigate significant corruption of logistics data.

    Nov 22, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Tool

    Interfacing Force-on-Force and Communications Models: MANA and JNE

    This report documents an interface between an agent-based force-on-force simulation and a network simulation for the U.S. Army's Cyber Center of Excellence, Capabilities Development and Integration Directorate (CDID), Cyber Battle Lab.

    Nov 8, 2017

  • Congressman Adam Schiff speaks at a House Intelligence Committee meeting about Russian use of social media to influence U.S. elections, Washington, D.C., November 1, 2017

    Commentary

    Covert Influence Is the New Money Laundering

    Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.

    Nov 6, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Report

    National Guard Youth ChalleNGe: Program Progress in 2015–2016

    National Guard Youth ChalleNGe is a residential, quasi-military program for young people at risk of dropping out of high school. This report provides information on recent ChalleNGe participants and develops metrics of program success.

    Nov 1, 2017

  • Multimedia

    Equifax and the Data-Breach Era: How Worried Should We Be?

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

    Oct 26, 2017

  • Robots working with cardboard boxes on a conveyer belt

    Commentary

    AI's Promise and Risks

    Artificial intelligence seems to be advancing faster than efforts to understand its potential consequences, good and bad. And discussions about AI often veer toward extremes. More balanced, rigorous analysis is needed to help shape policies that mitigate AI's risks and maximize its benefits.

    Oct 24, 2017

  • Periodical

    RAND Review: November-December 2017

    This issue highlights recent RAND research on post-9/11 military caregivers; RAND-Lex, a computer program built at RAND that can analyze huge data sets of text; and the implications of climate change on Arctic cooperation.

    Oct 19, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Open science: The citizen's role in and contribution to research

    The report summarises the conclusions of an expert consultation exploring how citizens are increasingly becoming involved in scientific research. It investigates the benefits and challenges that citizen science poses for different stakeholders.

    Oct 11, 2017

  • Report

    Digital currency: Transacting and value exchange in the digital age

    The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.

    Oct 11, 2017

  • Report

    Building our Connected Society: Findings from the 2017 Thought Leadership programme

    This report summarises the key themes that emerged from four thought leadership sessions on the UK's connected society, along with recommended actions moving forward for the UK government, industries, the third sector and the public.

    Oct 11, 2017

  • Report

    Civic engagement: How can digital technologies underpin citizen-powered democracy?

    The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.

    Oct 11, 2017

  • Scales of justice in front of computer monitors with code

    Commentary

    The Intersection of Algorithms and an Individual's Rights

    Data collection, and our reliance on it, have evolved extremely rapidly. The resulting algorithms have proved invaluable for organizing, evaluating and utilizing information. How do individuals' rights come in to play, when data about their lives is compiled to create algorithms, and the resulting tools are applied to judge them?

    Sep 29, 2017

  • Tool

    Roadmap to Succeed in the Open for the National Geospatial-Intelligence Agency's Human Development Directorate

    This tool provides the National Geospatial-Intelligence Agency's Human Development Directorate with a roadmap for how employees can overcome the hurdles to achieving the agency's missions outside of secure and classified environments.

    Sep 26, 2017

  • Report

    Follow the Money: Promoting Greater Transparency in Department of Defense Security Cooperation Reporting

    This report analyzes the obstacles that the Department of Defense (DoD) faces in tracking security cooperation spending and provides recommendations for streamlining DoD's reporting process to meet new requirements for transparency.

    Sep 19, 2017

  • Supporters of Lebanon's Hezbollah leader Sayyed Hassan Nasrallah listen to him via a screen during a rally marking the 11th anniversary of the end of Hezbollah's 2006 war with Israel, in Khiam, Lebanon, August 13, 2017

    Commentary

    How Hezbollah Came to Dominate Information Warfare

    Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.

    Sep 19, 2017

  • Soldiers with U.S. Army Cyber Command take part in network defense training

    Report

    How the Army Can Retain Its Cyber Expertise

    Projected earnings for information security analysts with characteristics similar to those of enlisted soldiers are comparable with military pay. But retention efforts may be hampered by soldiers' perceptions of civilian opportunities.

    Sep 18, 2017