Extremist groups have been trolling the internet for decades, and they have learned to temper their words and disguise their intentions. A new scorecard can help users—or parents, or advertisers, or the social media companies themselves—understand when they might be interacting with extremist content.
This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.
The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.
The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.
The report summarises the conclusions of an expert consultation exploring how citizens are increasingly becoming involved in scientific research. It investigates the benefits and challenges that citizen science poses for different stakeholders.
Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.
Advances in digital technology can connect businesses and consumers, develop new and niche markets, and commodify new activities. As the exchange of goods and services evolves, what are the societal impacts?
In the late 1960s and early '70s, RAND released a series of reports about cable television — the technology, federal and state regulation, and its use in education. The researchers' interactive vision for cable TV was a lot like the internet.
Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.
The Islamic State's caliphate is collapsing but its legacy will live on virtually because of its information operations. The scale of the menace presented by the group today pales in comparison to other global challenges, yet it manages to dominate and terrorize the public mind.
An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.
This Perspective explores the potential impacts that digital technologies may have on the nature of civic engagement and political processes, providing an overview of the opportunities and risks associated with the use of these technologies.
This document provides a detailed description of the RAND American Life Panel methodology related to sample recruitment, sample retention, and weighting and should be of use for users of the panel and as general reference material.
Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.
The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.
The number of attacks like the one on London Bridge are low because jihadist ideologies have failed to gain traction in most Muslim countries, and it's difficult to recruit people remotely. Supporting violence and participating in it are two different things.
Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.