RAND mathematician Mary Lee describes the wide variety of personal data collected by smart devices and applications, such as smartwatches, brain implants, and period trackers.
Facial recognition technology is developing rapidly and is increasingly being used in policing. What do policymakers need to understand in order to minimize the risks it poses, while also maximizing its benefits?
Policymakers and cybersecurity analysts should avoid messaging that emphasizes the risk that cryptanalytically relevant quantum computers developed in secret could be imminent or already operational. There is already more than enough reason to upgrade our communications systems to resist attacks from quantum computers as soon as possible.
This article discuss the need for statisticians to become better-acquainted with disclosure avoidance methodologies, both traditional approaches and new.
This paper presents an in-depth evaluation of differentially private synthetic data sets created for the National Institute of Standards and Technology's "Differential Privacy Synthetic Data Challenge."
This weekly recap focuses on the devastating earthquake that struck Turkey and Syria, regulating the use of facial recognition technology by law enforcement, improving data collection on gun violence, and more.
Our health is heavily influenced by our surroundings—including the health of the people around us. For digital health companies to credibly claim to improve people's health, their next step could be an increased willingness to look beyond an individualized notion of health and to work with public health agencies.
This weekly recap focuses on the decline of dementia rates among Americans, the dangers of deepfakes, data privacy after the reversal of Roe v. Wade, and more.
Until privacy protection laws are cemented into place, consumer privacy won't be assured unless consumers can effectively take the steps they need to take to protect their data. Tech companies might view this as a burden, but there will likely be profits for those companies that instead see it as an opportunity.
Future quantum computers could create a significant national security risk by enabling attackers to break a foundational element of security in America's networked communication infrastructure. The United States is taking strides to address national security risks from quantum computing, but there is a long road ahead.
The Supreme Court decision to overturn Roe v. Wade has providers and health advocates strategizing about how to provide more abortions where it is still legal. Expanding virtual medical visits is one popular idea. Policymakers and clinics could take steps to make telemedicine better understood, easier to use, and more equitable.
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers. If a bounty helps catch a vulnerability before it's deployed, then the modest cost of the bounty could prevent much higher costs down the line.
The demand for using software to improve health care, including software as a medical device (SaMD), is on the rise. Realizing the potential benefits of the growing demand for SaMD may require clearer and more-consistent regulation of patient safety and medical effectiveness.
In this report, researchers discuss how the United States should seek to balance the potential gains of the era of fifth-generation wireless networks with the potential loss of privacy and of control of personal data.
We examine how participants from 22 countries perceived the relative value of measures to demonstrate the trustworthiness of those using donated DNA and/or medical information.
Researchers summarize the multitude of ways access to and utilization of treatment for individuals with OUD might have been expanded by state and federal policy during COVID-19 pandemic in 4 key areas: telehealth, privacy, licensing, and medication.
RWJF commissioned RAND to produce a series of white papers that describe the current landscape, emerging innovations, and opportunities for transforming and transitioning to a new public health data system.