RAND mathematician Mary Lee describes the wide variety of personal data collected by smart devices and applications, such as smartwatches, brain implants, and period trackers.
Facial recognition technology is developing rapidly and is increasingly being used in policing. What do policymakers need to understand in order to minimize the risks it poses, while also maximizing its benefits?
Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.
Society benefits from the exchange of large-scale data in many ways. Anonymization is the usual mechanism for addressing the privacy of data subjects. Unfortunately, anonymization is broken.
Using insights from Internet of Things (IoT) implementations and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the IoT in the UK.
Using insights from businesses and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the Internet of Things in the UK.
RAND developed a roadmap with five objectives for the Chilean government to expand its health information technology (health IT) capabilities over the next ten years.
This report describes a roadmap for fostering development of health information technology in Chile's public health system and presents some recommendations for the ministry to consider when implementing the roadmap.
The general public has a more nuanced preference for the privacy of electronic health records than previously thought. Survey respondents said that they would not be averse to individuals involved in the health and rescue professions having access to their basic health information.
A growing number of constraints have been imposed around the world on information in the cloud, fueling concerns that the Internet—the economic engine of the information age—may become hopelessly fragmented.
This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.
About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.
A survey of over 26,000 citizens across the EU found that even in the event of a national emergency or limiting access of individuals' Internet usage to law enforcement agencies, there was still a strong aversion to information being stored or accessed.
This report assesses the current state of health information technology adoption and implementation in Chile, as well as the challenges and opportunities facing the sector in the coming years.
The policy debate about unique patient identifier numbers should determine the best approach for reconciling two goals: optimizing the privacy and security of health information and making record matching as close to perfect as is practical.
In perhaps no other field does society have as direct a stake in getting technology right as in policing. How will technology change the work that law enforcement agencies do and the communities they serve?
Millions of people leave behind online footprints each day, giving law enforcement and intelligence experts the chance to construct a profile of who is more likely to commit violence in the name of a murderous ideology.
Could a non-state actor deploy a virtual currency to disrupt sovereignty and increase its political or economic power? How might a government or organization successfully disrupt such a deployment?
Mobile phones collect and retain enormous amounts of information that can be useful in criminal investigations. However, state and local law enforcement face substantial challenges when accessing these data.
Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America's networks with appropriate resources dedicated to combatting criminal, terrorist, and other threats in cyberspace.
This study frames thinking about how the Digital Catapult can contribute to economic productivity. The Digital Catapult targets market and innovation inefficiencies that likely inhibit the up-take of data-driven innovation across sectors.