The Internet

Featured

  • Motion blur. Abstract technology and cyber space environment, photo by Quardia/Getty Images

    Commentary

    Three 'New Rules' Worth Considering for the Internet

    May 10, 2019

    Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. But why stop there? His proposal could be expanded to include much more: security-by-design, net worthiness, and updated internet business models.

  • Woman using smartphone

    Tool

    What's Being Done to Fight Disinformation Online

    Nov 12, 2019

    With the rise of the internet and social media, false or intentionally misleading information can spread further and faster than ever before. What tools exist to fight disinformation online?

Explore The Internet

  • Evan Spiegel at RAND's Politics Aside 2014

    Blog

    Snapchat CEO Discusses App's Appeal, Future of Digital Communication

    With technology a persistent theme throughout RAND's biennial Politics Aside event, it was only fitting that the proceedings closed with a conversation on social media between Michael Lynton, CEO of Sony Pictures, and Evan Spiegel, the 24-year-old co-founder and CEO of Snapchat.

    Nov 20, 2014

  • The flags of China and Hong Kong are seen above tents outside Legislative Council Complex at an occupied area in Hong Kong November 11,2014

    Commentary

    The Mountains Are High and the Emperor Is Far Away

    Since September 22, tens of thousands of protesters have flooded the streets of Hong Kong, calling for universal suffrage in the 2017 chief executive election and the resignation of current Chief Executive Chun-ying Leung. When they took to Twitter to share their ideas and mobilize support, they revealed the profound disconnect that separates elements of Hong Kong society from their mainland counterparts.

    Nov 11, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Commentary

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Report

    Portfolio Assessment of the Department of State Internet Freedom Program

    Employing portfolio analysis techniques, the authors assessed the Bureau of Democracy, Human Rights, and Labor (DRL)'s Internet freedom program for FY 2012-2013 to determine its project portfolio's effectiveness in performance, balance, and synergy.

    Sep 4, 2014

  • Man in living room with smart television

    Commentary

    Are You Sitting Comfortably? Understanding the Security and Privacy Implications of the Internet-Connected Living Room

    The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.

    Sep 3, 2014

  • Two boys sitting on a couch playing video games, photo by Sean Davis/Fotolia

    Report

    Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications

    The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014

  • Report

    Ramifications of DARPA's Programming Computation on Encrypted Data Program

    RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.

    Aug 25, 2014

  • Astronomical observatory

    Periodical

    RAND Review: Vol. 38, No. 2, Summer 2014

    The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.

    Aug 7, 2014

  • News Release

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security.

    Jun 17, 2014

  • two men working in a bright office

    Report

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    Demand for trained cybersecurity professionals who work to protect organizations from cybercrime is high nationwide, but the shortage is particularly severe in the federal government, which does not offer salaries as high as the private sector.

    Jun 17, 2014

  • A woman walks past European Parliament election campaign posters in Vilnius

    Commentary

    How 'Wired' Are the 2014 European Elections?

    The 2014 elections will prove a critical test of whether the modernisation of the EU's media strategies and increasing number of members of the European Parliament active on social networking sites will have an impact on citizens' political participation at the European level.

    May 21, 2014

  • Protests in Malaga, Spain against the government's spending cuts and failure to revive the moribund economy

    Commentary

    The European Democracy Paradox

    While social media and other tools have enhanced opportunities to participate in the political process, these new drivers do not seem to translate easily into offline political participation.

    May 21, 2014

  • A person holding an iPad in Shanghai

    Commentary

    Net Gain: Washington Cedes Control of ICANN

    Had the U.S. kept its fist clenched around ICANN, it would have undermined faith in the multistakeholder model of Internet governance and empowered the ITU. Instead, Washington has disarmed critics and helped ensure that the Internet will remain open and free.

    Apr 11, 2014

  • hands on a computer keyboard in a dark room

    Commentary

    The Hackers' Bazaar

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

    Apr 11, 2014

  • News Release

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory

    Report

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized, and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • man using and illuminated by the light of tablet

    Commentary

    The Internet's Role in Radicalisation

    Even as people enjoy the advantages of social networks, online shopping and access to information, concerns are growing about the negative effects of the Internet, such as its potential role in radicalising terrorists.

    Mar 21, 2014

  • Brochure

    Spotlight on 2013: Building trust in policymaking

    Spotlight on 2013 is RAND Europe's annual review. This year's focus is trust, and we feature RAND Europe projects that support policymakers to gain trust at three levels: from strategic challenges, through robust methods, to effective delivery.

    Jan 28, 2014

  • Project

    Radicalization in the Digital Era

    An analysis of the use of the internet in 15 cases of terrorism and extremism provides primary data on how the internet is used by individuals in the process of their radicalization.

    Nov 5, 2013