RAND mathematician Mary Lee describes the wide variety of personal data collected by smart devices and applications, such as smartwatches, brain implants, and period trackers.
Facial recognition technology is developing rapidly and is increasingly being used in policing. What do policymakers need to understand in order to minimize the risks it poses, while also maximizing its benefits?
New Internet-based technology may aid criminal justice agencies through promising tools, such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.
The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.
Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are numerous alternative technologies that are better suited.
Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are alternative technologies that are better suited.
This study reports public preferences for security, surveillance and privacy across 27 European Member States measured using a stated preference survey. It focuses on three real life contexts: metro travel, internet use and health records.
With numerous data breaches and emerging software vulnerabilities, 2014 was the year the hack went viral. But realizing a few New Year's resolutions in 2015 could help defenders make strides in protection, tools, and techniques to gain the edge over cyber attackers in years to come.
Health information exchanges show some evidence of reducing emergency department costs and usage, but since only a few have been evaluated, there is not enough evidence to say whether or not they are on track as a potential solution to the problem of fragmented health care delivery in the U.S.
Health information exchanges show some evidence of reducing emergency department costs and usage, but since only a few have been evaluated, there is not enough evidence to say whether or not they are on track as a potential solution to the problem of fragmented health care delivery in the U.S.
The EU has embarked on negotiations with the U.S. on the TTIP, which shares some of ACTA's goals. This time, though, the European Commission is seeking to make the talks more transparent by publishing a series of position papers on key issues very early on in the process. This is a step in the right direction toward an agreement that will have economic benefits for a net-exporting region of intellectual property such as the EU.
EU institutions and agencies urgently need to revisit the frameworks that govern data privacy in their own houses if they want to keep pace with some of the latest trends in corporate information and communication technology (ICT) delivery and use, such as cloud computing or the consumerisation of ICT ('bring your own device').
Summarizes discussions and observations made at a national summit on leveraging technology to enable victims of crime to more quickly and effectively obtain the help they need.
Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.
The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.
RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.
License plate reader technology can be a force multiplier for law enforcement. Its ability to identify license plates of interest to police in real-time makes it an effective tool but there is also potential for abuse. Law enforcement authorities should address credible privacy concerns.
Systems that automatically read automobile license plates have the potential to save police investigative time and increase safety, but law enforcement officials must address issues related to staffing, compatibility, and privacy before the technology can reach its full potential.
Systems that automatically read automobile license plates have the potential to save police investigative time and increase safety, but law enforcement officials must address issues related to staffing, compatibility, and privacy before the technology can reach its full potential.
RAND Europe, supported by IBM, worked through a multi-method approach to assess different pathways for collecting and utilising real world data (RWD) in the health and healthcare sector. Based on a literature review, case studies, a small set of interviews of experts from public and private organisations, and a scenario-based workshop, researchers have outlined possible strategies to illustrate how the development of standards could facilitate RWD-based research.