Facial recognition technology is developing rapidly and is increasingly being used in policing. What do policymakers need to understand in order to minimize the risks it poses, while also maximizing its benefits?
The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?
This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.
Over one-third of states appear to have more stringent medical privacy laws than HIPAA (federal), which could hinder primary care and mental health providers' efforts to share information and integrate care.
Social media analysis could provide a window into the perspectives and communications of adversaries and other key audiences. If DoD seeks to expand its capability in this area, it must navigate U.S. law, cultural norms, and other issues.
Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.
The potential of health data to improve health R&D, innovation, healthcare delivery, and health systems is substantial. Realising the benefits of health data will require a supportive health data ecosystem and addressing associated challenges.
The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.
Governments are amassing a wealth of data on citizens, a trend that will continue as technology advances. But with no reliable way to ensure that the data is accurate, risks abound. In the criminal justice system, for example, poor quality data could affect individual freedoms and employability.
The state actor that hacked the Office of Personnel Management could use the stolen information to further its domestic control against dissidents, enhance its foreign intelligence, and improve its position in the global military and economic order.
RAND conducted two discovery games to explore possible solutions for improving cybersecurity, assess their implications, and develop an initial framework to support debate and inform decisions regarding cybersecurity policies and practices.
Key findings from the 2016 Thought Leadership Programme, convened by Corsham Institute in conjunction with RAND Europe and St George's House exploring opportunities and challenges created by digital technologies in society.
Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.
Using insights from Internet of Things (IoT) implementations and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the IoT in the UK.
Using insights from businesses and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the Internet of Things in the UK.