The Internet

Featured

  • Motion blur. Abstract technology and cyber space environment, photo by Quardia/Getty Images

    Commentary

    Three 'New Rules' Worth Considering for the Internet

    May 10, 2019

    Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. But why stop there? His proposal could be expanded to include much more: security-by-design, net worthiness, and updated internet business models.

  • Woman using smartphone

    Tool

    What's Being Done to Fight Disinformation Online

    Nov 12, 2019

    With the rise of the internet and social media, false or intentionally misleading information can spread further and faster than ever before. What tools exist to fight disinformation online?

Explore The Internet

  • hands on a computer keyboard in a dark room

    Commentary

    The Hackers' Bazaar

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

    Apr 11, 2014

  • News Release

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory

    Report

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized, and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • man using and illuminated by the light of tablet

    Commentary

    The Internet's Role in Radicalisation

    Even as people enjoy the advantages of social networks, online shopping and access to information, concerns are growing about the negative effects of the Internet, such as its potential role in radicalising terrorists.

    Mar 21, 2014

  • Brochure

    Spotlight on 2013: Building trust in policymaking

    Spotlight on 2013 is RAND Europe's annual review. This year's focus is trust, and we feature RAND Europe projects that support policymakers to gain trust at three levels: from strategic challenges, through robust methods, to effective delivery.

    Jan 28, 2014

  • Project

    Radicalization in the Digital Era

    An analysis of the use of the internet in 15 cases of terrorism and extremism provides primary data on how the internet is used by individuals in the process of their radicalization.

    Nov 5, 2013

  • Report

    Radicalization in the Digital Era

    A ground-breaking new report on the use of the Internet in 15 cases of terrorism and extremism provides primary data on how the Internet is used by individuals in the process of their radicalization. The study yields recommendations for framing policy responses to the use of the Internet in radicalization.

    Nov 5, 2013

  • smart meter infrastructure

    Research Brief

    Toward a Dynamic and Trustworthy Internet of Things

    The Internet of Things builds out from today’s Internet by creating a pervasive and self-organising network of connected, identifiable and addressable physical objects through the use of embedded chips. Several actions could inform a consistent European policy stance.

    Oct 29, 2013

  • woman using a laptop

    Commentary

    Opt-In, Opt-Out; Why Not Forced Choice?

    By default, browsers generally are set to automatically allow online tracking, but there may be a better way to make sure consumers decide whether or not they want to allow advertisers to sniff at their digital footprints, writes Steven Isley.

    Oct 8, 2013

  • politics on the Internet

    Report

    Internet Freedom and Political Space

    The Internet has become a new battleground between governments that censor online content and those who advocate freedom to browse, post, and share information online. What are the implications of Internet freedom for state-society relations in nondemocratic regimes?

    Sep 5, 2013

  • open red cyber lock with circuitboard background

    Journal Article

    Examining Data and Security Breaches and Cyber-Security Strategies

    A review some of the provisions of the European Commission's 2013 proposals for a Network and Information Security Directive highlights specific concerns, including the relationship of incident notification achieving the outcomes of the directive, potential for overlapping regulation and definitions of covered entities.

    Sep 1, 2013

  • 24th MEU,Realistic Urban Training,RUT,Sgt. Richard Blumenstein

    Report

    Brandishing Cyberattack Capabilities

    No one knows quite what would happen if a country suffered a full-fledged cyberattack, despite the plethora of skirmishes. But while cyberattack capabilities cannot easily be used to shape the behavior of others, this does not mean they cannot be used at all.

    May 13, 2013

  • Report

    Virtual Collaboration for a Distributed Enterprise

    Addresses the challenges to team effectiveness caused by geographic diversity through an assessment of three modes of virtual collaboration.

    Apr 22, 2013

  • Testimony

    Managing September 12th in Cyberspace

    "The U.S., while worried about a '9/11 in cyberspace,' also ought to worry about what a '9/12 in cyberspace' would look like," warns Martin C. Libicki in testimony presented before the House Foreign Affairs Committee, Subcommittee on Europe, Eurasia, and Emerging Threats on March 21, 2013. The consequences of the reaction to a cyberattack could be more serious than the consequences of the original action itself.

    Mar 21, 2013

  • Red network cables

    Testimony

    Managing September 12th in Cyberspace

    The U.S., while worried about a "9/11 in cyberspace," also ought to worry about what a "9/12 in cyberspace" would look like. The consequences of the reaction to a cyberattack could be more serious than the consequences of the original action itself.

    Mar 20, 2013

  • digital globe with data orbits

    Commentary

    The European Cyber Security Strategy: Too Big to Fail?

    The European Cyber Security Strategy is remarkable because it tries to co-ordinate policy across three areas whose competences and mandates were formerly very separate: law enforcement, the 'Digital Agenda', and defence, security, and foreign policy, writes Neil Robinson.

    Feb 8, 2013

  • digital globe

    Report

    Analysis of Cyber Threats Informs Swedish Strategy

    How do governments characterize cyber threats and what role does law enforcement play in tackling cyber crime in different countries? These are some of the questions RAND Europe investigated on behalf of the Swedish National Defence College to inform the development of the Swedish Cyber Security Strategy.

    Feb 5, 2013

  • A businesswoman types on a laptop computer

    Report

    U.S. Muslims Are Powerful Force in Online Battle Against al Qaeda

    Al Qaeda has long used the internet to attract recruits but with minimal success in the U.S., however, as most American Muslims hold no sympathy for al Qaeda and are actually an effective counterforce to online jihadist efforts.

    Feb 4, 2013

  • Journal Article

    Feasibility of Web-Based Self-Triage by Parents of Children with Influenza-Like Illness: A Cautionary Tale

    Self-triage using web-based decision support could be a useful way to encourage appropriate care-seeking behavior and reduce health system surge in epidemics.

    Feb 1, 2013

  • Commentary

    Opening of the European Cybercrime Centre — a Journey Begins

    While the opening of the EC3 at Europol, in line with our first-choice scenario, is very welcome, our study uncovered a range of risks that the EC3 will need to confront if it is to tackle cybercrime in a more coordinated and effective manner, writes Neil Robinson.

    Jan 11, 2013