Truth Decay, the diminishing role of facts in American public life, isn't a problem that any one person can fix. But there are simple steps that individuals can take to help counter it.
Extremist groups have been trolling the internet for decades, and they have learned to temper their words and disguise their intentions. A new scorecard can help users—or parents, or advertisers, or the social media companies themselves—understand when they might be interacting with extremist content.
Had the U.S. kept its fist clenched around ICANN, it would have undermined faith in the multistakeholder model of Internet governance and empowered the ITU. Instead, Washington has disarmed critics and helped ensure that the Internet will remain open and free.
Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.
Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.
Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.
Even as people enjoy the advantages of social networks, online shopping and access to information, concerns are growing about the negative effects of the Internet, such as its potential role in radicalising terrorists.
Spotlight on 2013 is RAND Europe's annual review. This year's focus is trust, and we feature RAND Europe projects that support policymakers to gain trust at three levels: from strategic challenges, through robust methods, to effective delivery.
An analysis of the use of the internet in 15 cases of terrorism and extremism provides primary data on how the internet is used by individuals in the process of their radicalization.
A ground-breaking new report on the use of the Internet in 15 cases of terrorism and extremism provides primary data on how the Internet is used by individuals in the process of their radicalization. The study yields recommendations for framing policy responses to the use of the Internet in radicalization.
The Internet of Things builds out from today’s Internet by creating a pervasive and self-organising network of connected, identifiable and addressable physical objects through the use of embedded chips. Several actions could inform a consistent European policy stance.
By default, browsers generally are set to automatically allow online tracking, but there may be a better way to make sure consumers decide whether or not they want to allow advertisers to sniff at their digital footprints, writes Steven Isley.
The Internet has become a new battleground between governments that censor online content and those who advocate freedom to browse, post, and share information online. What are the implications of Internet freedom for state-society relations in nondemocratic regimes?
A review some of the provisions of the European Commission's 2013 proposals for a Network and Information Security Directive highlights specific concerns, including the relationship of incident notification achieving the outcomes of the directive, potential for overlapping regulation and definitions of covered entities.
No one knows quite what would happen if a country suffered a full-fledged cyberattack, despite the plethora of skirmishes. But while cyberattack capabilities cannot easily be used to shape the behavior of others, this does not mean they cannot be used at all.
"The U.S., while worried about a '9/11 in cyberspace,' also ought to worry about what a '9/12 in cyberspace' would look like," warns Martin C. Libicki in testimony presented before the House Foreign Affairs Committee, Subcommittee on Europe, Eurasia, and Emerging Threats on March 21, 2013. The consequences of the reaction to a cyberattack could be more serious than the consequences of the original action itself.
The U.S., while worried about a "9/11 in cyberspace," also ought to worry about what a "9/12 in cyberspace" would look like. The consequences of the reaction to a cyberattack could be more serious than the consequences of the original action itself.
The European Cyber Security Strategy is remarkable because it tries to co-ordinate policy across three areas whose competences and mandates were formerly very separate: law enforcement, the 'Digital Agenda', and defence, security, and foreign policy, writes Neil Robinson.
How do governments characterize cyber threats and what role does law enforcement play in tackling cyber crime in different countries? These are some of the questions RAND Europe investigated on behalf of the Swedish National Defence College to inform the development of the Swedish Cyber Security Strategy.
Al Qaeda has long used the internet to attract recruits but with minimal success in the U.S., however, as most American Muslims hold no sympathy for al Qaeda and are actually an effective counterforce to online jihadist efforts.
Self-triage using web-based decision support could be a useful way to encourage appropriate care-seeking behavior and reduce health system surge in epidemics.