Cyber and Data Sciences

Featured

RAND was at the forefront of early computing and data science. In the 1950s, we built computers to improve researchers' analytic and modeling capabilities. We also developed data communications technologies that were forerunners of the internet. Today, RAND experts recommend policies and best practices to support safe and secure technological innovation and adoption.

  • Blue and red cables transmitting data signals, image by Alexey Novikov/Adobe Stock

    Report

    Response Options to Cyberattacks on U.S. Government Networks

    Apr 29, 2022

    The United States has proved vulnerable to cyber incidents, and a lack of response has emboldened Russia and China to expand their cyber espionage activities. Have U.S. responses changed over time or affected adversary behavior? What lessons do these cases offer for future policymaking?

  • A Flight Commander Course student interacts with artificial intelligence in a live simulation on Joint Base McGuire-Dix-Lakehurst, New Jersey, September 27, 2019, images by A1C Ariel Owings/U.S. Air Force and Jamesteohart/Adobe Stock; design by Carol Ponce/RAND Corporation

    Report

    Exploring the Civil-Military Divide over Artificial Intelligence

    May 11, 2022

    Artificial intelligence is anticipated to be a key capability for enabling the U.S. military to maintain its dominance. How do software engineers and other technical staff in the industry view the defense community? Are they willing to contribute to AI-related projects for military use?

Explore Cyber and Data Sciences

  • Blog

    Data Breaches, Marijuana, Turkey: RAND Weekly Recap

    This weekly recap focuses on consumer reactions to data breaches, understanding teen marijuana use after legalization, why the United States can't rely on Turkey to defeat ISIS, and more.

    Jan 4, 2019

  • Facebook CEO Mark Zuckerberg testifies before a House Energy and Commerce Committee hearing regarding the company's use and protection of user data on Capitol Hill in Washington, U.S., April 11, 2018

    Commentary

    Data Breaches Could Cause Users to Opt Out of Sharing Personal Data. Then What?

    As tech-based systems have become all but indispensable, many institutions might assume user data will be reliable, meaningful and, most of all, plentiful. But what if this data became unreliable, meaningless, or even scarce?

    Dec 28, 2018

  • Blog

    Terrorists, Policing, Cyberattacks: RAND Weekly Recap

    This weekly recap focuses on terrorism recruitment trends, helping police find the right strategies, who should investigate cyberattacks, and more.

    Dec 21, 2018

  • Blog

    Refugees, Brexit, Cannabis: RAND Weekly Recap

    This weekly recap focuses on how Syrian refugees can contribute to local economies, prospects for Brexit, marijuana legalization, and more.

    Dec 14, 2018

  • A smartphone showing the Islamic State logo in front of a screen showing the Telegram logo in Zenica, Bosnia and Herzegovina, November 18, 2015

    Commentary

    ISIS's Social Media Use Poses a Threat to Stability in the Middle East and Africa

    The importance of social media in projecting violent extremist propaganda and recruiting foreign fighters is well documented. As ISIS attempts to regroup and recuperate, investigating its use of information and communication technologies could be important to understanding the group's plans to regain territorial control.

    Dec 11, 2018

  • World map with electronic circuits

    Commentary

    When Cyber Attacks Occur, Who Should Investigate?

    Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.

    Dec 6, 2018

  • News Release

    News Release

    RAND Report Evaluates Possible Economic Benefits of Using 5.9 GHz Band for WiFi

    Opening up the 5.9 GHz frequency band for WiFi use could result in significant economic benefits, both in terms of contribution to GDP and in economic surplus.

    Nov 29, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport. But all participants on the field are playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom.

    Oct 25, 2018

  • News Release

    News Release

    Complex and Rapidly Changing Payment Models Challenge Physician Practices

    Physician payment models are becoming more complex and the pace of change is increasing, creating challenges for physician practices that might hamper their ability to improve the quality and efficiency of care despite their willingness to change.

    Oct 24, 2018

  • A robot's hand selecting a candidate photograph

    Commentary

    Intentional Bias Is Another Way Artificial Intelligence Could Hurt Us

    Conversations about unconscious bias in artificial intelligence often focus on algorithms unintentionally causing disproportionate harm to entire swaths of society. But the problem could run much deeper. Society should be on guard for the possibility that nefarious actors could deliberately introduce bias into AI systems.

    Oct 22, 2018

  • Processor pins of a microchip

    Commentary

    Examining the Weak Spots in Tech's Supply Chain Armor

    When an attack on the supply chain occurs, manufacturers and purchasers should be better positioned to respond and recover. Even the simplest devices can rely on parts from multiple suppliers, which may have their own suppliers and so on. But every supplier, no matter how small, represents a potential weak link in the chain.

    Oct 16, 2018

  • Woman's eye with technology of security concept

    Commentary

    The Perils of Connecting Our Bodies to the Internet

    High-tech health care solutions are part of an emerging sector of medical technologies that monitor personal health data by essentially connecting your body to the Internet. As smart devices in health care evolve, the line between human and machine is blurring, and creating new concerns about consumer safety and privacy rights.

    Oct 15, 2018

  • Doctors using a tablet and a desktop computer to view a patient's medical records

    Commentary

    How Smartphone Apps Could Help Keep Health Records Accurate

    Electronic health records have helped streamline record keeping but providers aren't always able to reliably pull together records for the same patient from different hospitals, clinics, and doctor's offices. The growing use of smartphones offers a promising opportunity to improve record matching.

    Oct 4, 2018

  • Jennifer Kavanagh and William “Pat” Getty discuss “Truth Decay” at RAND, September 20, 2018

    Blog

    Conversation at RAND: Truth Decay

    The recent erosion of public trust in facts and institutions is not the first period of Truth Decay in U.S. history. What's different this time is the increasing disagreement about objective facts. Jennifer Kavanagh and William “Pat” Getty discussed the trend and how to stop it.

    Oct 2, 2018

  • Hacker on a laptop

    Commentary

    Have a Victim Response Plan for Data Breaches

    In a large data breach, there could be a real risk to victims' financial or personal security. Though responsible organizations should do everything in their power to ensure data is protected in the first place, they also should prepare a plan to ensure prompt victim response.

    Oct 2, 2018

  • Man using the RAND Tablet

    Blog

    The RAND Tablet: iPad Predecessor

    In the 1960s RAND developed a 10-inch-square tablet. Users could draw shapes and text on it with a stylus, which a handwriting recognition program smoothed out and rendered on a monitor. Though it was too expensive for commercial use, the RAND Tablet paved the way for PalmPilots, Tablet PCs, and iPads.

    Sep 4, 2018

  • News Release

    News Release

    Mobile Phones and Smartphone Apps Hold Promise for Allowing Patient Participation in Improving Medical Record Matching

    Mobile phones and smartphone apps offer a promising approach to ensure that an individual's medical records when shared between different health care providers are matched correctly.

    Aug 22, 2018

  • Face detection and recognition

    Commentary

    Keeping Artificial Intelligence Accountable to Humans

    Artificial intelligence (AI) systems are often only as intelligent and fair as the data used to train them. To enable AI that frees humans from bias instead of reinforcing it, experts and regulators must think more deeply not only about what AI can do, but what it should do—and then teach it how.

    Aug 20, 2018

  • Voters voting in polling place

    Commentary

    Here's How Russia Will Try to Interfere in the 2018 Elections

    Russia will threaten U.S. midterm elections in November, although by how much is unclear. Moscow might be more restrained this year, but it could be wilier.

    Aug 14, 2018

  • The Facebook logo is pictured during the Viva Tech start-up and technology summit in Paris, France, May 25, 2018

    Commentary

    Freedom of the Internet 'Press'

    The First Amendment enables companies such as Facebook to publish what they choose. Arguing against this right could lead to government regulation over digital media. It could also further degrade the reliability of online information.

    Aug 10, 2018