Cyber and Data Sciences

Featured

RAND was at the forefront of early computing and data science. In the 1950s, we built computers to improve researchers' analytic and modeling capabilities. We also developed data communications technologies that were forerunners of the internet. Today, RAND experts recommend policies and best practices to support safe and secure technological innovation and adoption.

  • Cybersecurity locks illustration superimposed over a photo of Tokyo at night

    Report

    Preparing for Cybersecurity Threats to the 2020 Olympics

    Oct 4, 2018

    The Olympic Games are an attractive target for hackers. An examination of Japan's cybersecurity threat landscape and lessons from past events can help planners reduce cybersecurity risks in advance of the 2020 Tokyo Games.

  • Accountability in Cyberspace: The Problem of Attribution

    Multimedia

    How to Achieve Accountability in Cyberspace

    Jan 14, 2019

    Identifying the responsible party behind malicious cyber incidents is necessary for holding bad actors accountable. But there are many challenges that accompany cyber attribution. Creating an independent, global organization that investigates and publicly assigns blame for major hacks could help.

Explore Cyber and Data Sciences

  • Israeli Prime Minister Benjamin Netanyahu and Chinese President Xi Jinping shake hands ahead of their talks at Diaoyutai State Guesthouse in Beijing, China, March 21, 2017, photo by Etienne Oliveau/Reuters/Pool

    Report

    How Has the Israel-China Relationship Evolved?

    Since the early 2000s, relations between China and Israel have expanded in areas like diplomacy, trade, investment, construction, educational partnerships, scientific cooperation, and tourism. What challenges does the relationship pose for Israel and the United States?

    Mar 21, 2019

  • An illustration of a double helix with binary code. Photo by ymgerman / Getty Images

    Report

    Assessing the Need for and Uses of Sequences of Interest Databases: A Report on the Proceedings of a Two-Day Workshop

    This report details the proceedings of a Homeland Security Operational Analysis Center workshop in which experts considered how a genetic database of "sequences of interest" could best support stakeholders to improve biotechnology research efforts.

    Mar 21, 2019

  • Imam Ibrahim Abdul Halim of the Linwood Mosque is embraced by Father Felimoun El-Baramoussy from the Coptic Church, in Christchurch, New Zealand March 18, 2019, photo by Edgar Su/Reuters

    Commentary

    The Christchurch Massacre Was Another Internet-Enabled Atrocity

    Terrorism has become an internet-enabled abuse—incited by, propagated by, and sometimes organized and concealed by online activity. Who should be held accountable for abusive content, the author or the publisher? And what role should the government play in regulating it?

    Mar 20, 2019

  • Interior of autonomous car with ones and zeroes superimposed, photo by metamorworks/Getty Images

    Commentary

    Why AV Safety and Cybersecurity Need to Be Pursued in Tandem

    Safety and cybersecurity are generally pursued by separate teams within autonomous vehicle companies. A joint approach to standards could optimize safety and cybersecurity and reduce overall risks to autonomous vehicle operation.

    Mar 20, 2019

  • Christine Wormuth and Kimberly Kagan at the 2018 Roberta Wohlstetter Forum on National Security

    Report

    Roberta Wohlstetter Forum on National Security

    In October 2018, RAND hosted a forum on national security that honored the legacy of Roberta Wohlstetter, a military analyst who worked at RAND from its creation in 1948 until 1965. In the forum, panelists discussed events, capabilities, technologies, and methodologies that demand new concepts for national security and defense.

    Mar 19, 2019

  • Journal Article

    Responsible E-Prescribing Needs E-Discontinuation

    Adding e-discontinuation functionality has the potential to help reduce medication errors and take fuller advantage of e-prescribing technology. Prescribers need to be able to e-discontinue prescriptions, just as easily as they can e-prescribe them.

    Mar 12, 2019

  • Patient consulting with his doctor via videochat over his laptop, photo by Henfaes/Getty Images

    Report

    Experiences of Medicaid Programs and Health Centers in Implementing Telehealth

    Telehealth is underutilized by safety-net providers due to a range of policy, organizational, and logistical barriers. This research facilitates state-to-state learning to inform both Medicaid policy and Medicare policy and provide lessons learned.

    Mar 8, 2019

  • A man visits the Huawei Cyber Security Transparency Centre in Brussels, Belgium, March 5, 2019, photo by Yves Herman/Reuters

    Commentary

    Public Evidence of Huawei as a Cyber Threat May Be Elusive, but Restrictions Could Still Be Warranted

    Although a “smoking gun” of Huawei involvement in government-directed espionage remains elusive, the United States has compelling security and economic reasons to consider limiting the involvement of Chinese telecommunications companies in its domestic networks.

    Mar 7, 2019

  • Gun wall rack with rifles, photo by artas/Getty Images

    Testimony

    Scientific Research Could Reduce Disagreements on Gun Policy

    More high-quality research is needed to craft policies that could contribute to reducing gun injuries, deaths, and violence. There are many ways Congress could help build a robust and transformative gun policy research enterprise. One is to appropriate funds to support a diverse portfolio of studies.

    Mar 7, 2019

  • Report

    Evaluation of Technology-Enabled Collaborative Learning and Capacity Building Models: Materials for a Report to Congress

    This report examines the quality of evidence for the effectiveness of health care models that connect generalist providers with specialist teams via technology to provide additional training.

    Mar 6, 2019

  • Periodical

    RAND Review: March-April 2019

    This issue explores resilience and adaptation strategies researchers can pursue to address the impacts of climate change; security challenges posed by artificial intelligence and the speed at which technology is transforming society; and more.

    Mar 4, 2019

  • School children stretching up at lesson, photo by mediaphotos/Getty Images

    Commentary

    Measuring Social-Emotional Skills, Carefully

    In the often-fraught debate over education policy, there is growing agreement that educators should pay close attention to the development of the social and emotional skills that allow students to persevere when working on difficult tasks, regulate emotions, and work effectively in teams. But measuring such skills remains a significant challenge.

    Feb 28, 2019

  • Cyborg head using artificial intelligence to create digital interface 3D rendering, image by sdecoret/Adobe Stock

    Q&A

    The Promise and Perils of AI: Q&A with Douglas Yeung

    Douglas Yeung, a social psychologist at RAND, discusses how any technology reflects the values, norms, and biases of its creators. Bias in artificial intelligence could have unintended consequences. He also warns that cyber attackers could deliberately introduce bias into AI systems.

    Feb 27, 2019

  • Journal Article

    LGA Cyber Security Stocktake: National-Level Report

    A cybersecurity stocktake of all 353 councils in England examined IT security, leadership, governance, partnerships, technology arrangements and training, offering recommendations on areas for improvement.

    Feb 22, 2019

  • Young Asian woman looking at an eye scanner image, photo by Photographer is my life/Getty Images

    Commentary

    Biology, in the Language of the People

    As technology and the ability to gather ever-growing amounts of data move further into the realms of biology and human performance, communication and transparency become increasingly important. Authors should consider whether they are using the words, examples, and models that connect with a broad audience most effectively.

    Feb 21, 2019

  • Elizebeth Smith Friedman, United States Government image

    Commentary

    Book Review: 'The Woman Who Smashed Codes' by Jason Fagone

    'The Woman Who Smashed Codes' by Jason Fagone is the story of Elizebeth Friedman, the mother of modern cryptoanalysis and cryptography. She broke coded messages of organized crime, broke the Nazi Enigma cryptography machine, and deciphered, mapped, and monitored Nazi activities in South America, though it is her husband William who often gets credit.

    Feb 19, 2019

  • Teacher with laptop, photo by contrastwerkstatt/Adobe Stock

    Report

    Teachers' Access to and Use of Student Data Varies

    Using student data to inform instruction is considered sound educational practice. Many teachers have access to grades, attendance records, and standardized test scores, but they don't all have the skills needed to interpret and use the data. Providing educators with more support could increase their use of student data.

    Feb 14, 2019

  • Hawaii Air National Guardsmen evaluate network vulnerabilities during the Po’oihe 2015 Cyber Security Exercise at the University of Hawaii Manoa Campus, Honolulu, HI, June 4, 2015, photo by Airman 1st Class Robert Cabuco/Hawaii Air National Guard

    Commentary

    Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process

    If governments seek to create an objective framework for decision making about whether or when to disclose software vulnerabilities, what might that look like? What questions should be included, how should they influence the outcome and how can one interpret the results?

    Feb 5, 2019

  • A helicopter co-pilot reads a map en route to Playas Training Area, New Mexico during exercise Angel Thunder 2013, photo by Stocktrek Images/Getty Images

    Commentary

    America's National Defense Strategy and the Paradox of Technology

    The need for the military to make greater investments in technology is difficult if not impossible to separate from the risks posed by an increasing military reliance on this technology. Striking a balance between the two won't be easy.

    Feb 4, 2019

  • Teacher using tablet computer in elementary school lesson

    Report

    Artificial Intelligence Applications to Support Teachers

    Artificial intelligence could support teachers rather than replace them. But before the promise of AI in the classroom can be realized, risks and technical challenges must be addressed.

    Jan 23, 2019