Information Privacy

Featured

  • Woman typing into a laptop, photo by pathdoc/Fotolia

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    Apr 14, 2016

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

  • Digital silhouettes of people, photo by blackdogvfx/Fotolia

    Commentary

    How to Rethink Data Privacy

    Oct 5, 2016

    Society benefits from the exchange of large-scale data in many ways. Anonymization is the usual mechanism for addressing the privacy of data subjects. Unfortunately, anonymization is broken.

Explore Information Privacy

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Data sharing and privacy concept

    Commentary

    Collaboration Is the Best Strategy to Combat Population Health Concerns

    The greatest opportunities to improve health happen pretty much everywhere but the doctor's office. Collaborative programming that merges strategies from housing, education, or labor could make a big difference.

    Dec 14, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • Dissertation

    Role of Data in Improving Care within a Health System: A Case Study of the Australian Health System

    This study aims to understand how organizational context and interfaces affect the collection, management, and use of data for care improvement (CI).

    Aug 2, 2017

  • Journal Article

    Possible Legal Barriers for PCP Access to Mental Health Treatment Records

    Over one-third of states appear to have more stringent medical privacy laws than HIPAA (federal), which could hinder primary care and mental health providers' efforts to share information and integrate care.

    Jul 19, 2017

  • Global network and information connection

    Report

    Social Media Analysis Could Support Information Operations

    Social media analysis could provide a window into the perspectives and communications of adversaries and other key audiences. If DoD seeks to expand its capability in this area, it must navigate U.S. law, cultural norms, and other issues.

    Jun 14, 2017

  • A mobile phone with an app to control wireless devices in a smart home like a washing machine, security camera, door lock, and music player

    Commentary

    Using Digital Data in Criminal Investigations

    Personal devices such as smartphones and wearables gather and store personal data. How much of this “digital footprint” should be available for criminal investigations?

    May 15, 2017

  • Blockchain vector background with various icons

    Journal Article

    Distributed Ledger Technologies/Blockchain: Challenges, Opportunities and the Prospects for Standards

    An overview of the current landscape of DLT/Blockchain developments and the issues that are central to the development of DLT/Blockchain.

    May 11, 2017

  • Man using credit card and smartphone

    Report

    Helping Law Enforcement Use Data from Mobile Applications: A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool

    Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.

    Apr 28, 2017

  • Report

    Understanding value in health data ecosystems: A review of current evidence and ways forward

    The potential of health data to improve health R&D, innovation, healthcare delivery, and health systems is substantial. Realising the benefits of health data will require a supportive health data ecosystem and addressing associated challenges.

    Apr 27, 2017

  • A coder types on laptop keyboard

    Commentary

    Reining in Internet Abuse

    The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.

    Mar 23, 2017

  • A man being interviewed by police in dark interrogation room

    Commentary

    What Data Is the Government Keeping About You?

    Governments are amassing a wealth of data on citizens, a trend that will continue as technology advances. But with no reliable way to ensure that the data is accurate, risks abound. In the criminal justice system, for example, poor quality data could affect individual freedoms and employability.

    Mar 1, 2017

  • Binary code bursts from phones held by a crowd of people with an overlay of glowing electronic numbers

    Commentary

    What Is the Adversary Likely to Do with the Clearance Records for 20 Million Americans?

    The state actor that hacked the Office of Personnel Management could use the stolen information to further its domestic control against dissidents, enhance its foreign intelligence, and improve its position in the global military and economic order.

    Jan 20, 2017