Truth Decay, the diminishing role of facts in American public life, isn't a problem that any one person can fix. But there are simple steps that individuals can take to help counter it.
Extremist groups have been trolling the internet for decades, and they have learned to temper their words and disguise their intentions. A new scorecard can help users—or parents, or advertisers, or the social media companies themselves—understand when they might be interacting with extremist content.
As digital technology becomes more relevant in diverse aspects of our economy and society, it is important to anticipate changes in technology and how we use it. This understanding is particularly important for Horizon 2020, the EU’s 7-year research and innovation funding programme.
This issue of RAND Review reports on technology literacy in kids, self-driving cars, marijuana legalization, hacking and cybersecurity, monetary compensation for mass tragedies, and recent philanthropic gifts to RAND.
With numerous data breaches and emerging software vulnerabilities, 2014 was the year the hack went viral. But realizing a few New Year's resolutions in 2015 could help defenders make strides in protection, tools, and techniques to gain the edge over cyber attackers in years to come.
With technology a persistent theme throughout RAND's biennial Politics Aside event, it was only fitting that the proceedings closed with a conversation on social media between Michael Lynton, CEO of Sony Pictures, and Evan Spiegel, the 24-year-old co-founder and CEO of Snapchat.
Since September 22, tens of thousands of protesters have flooded the streets of Hong Kong, calling for universal suffrage in the 2017 chief executive election and the resignation of current Chief Executive Chun-ying Leung. When they took to Twitter to share their ideas and mobilize support, they revealed the profound disconnect that separates elements of Hong Kong society from their mainland counterparts.
Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.
Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.
Employing portfolio analysis techniques, the authors assessed the Bureau of Democracy, Human Rights, and Labor (DRL)'s Internet freedom program for FY 2012-2013 to determine its project portfolio's effectiveness in performance, balance, and synergy.
The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.
The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.
RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.
The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.
The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security.
Demand for trained cybersecurity professionals who work to protect organizations from cybercrime is high nationwide, but the shortage is particularly severe in the federal government, which does not offer salaries as high as the private sector.
The 2014 elections will prove a critical test of whether the modernisation of the EU's media strategies and increasing number of members of the European Parliament active on social networking sites will have an impact on citizens' political participation at the European level.
While social media and other tools have enhanced opportunities to participate in the political process, these new drivers do not seem to translate easily into offline political participation.
Had the U.S. kept its fist clenched around ICANN, it would have undermined faith in the multistakeholder model of Internet governance and empowered the ITU. Instead, Washington has disarmed critics and helped ensure that the Internet will remain open and free.
Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.
Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.
Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.