Findings from a survey of U.S. teachers reveal how limited home internet access has been a barrier to providing instruction amid pandemic-related school closures. The problem is particularly acute among high-poverty schools.
Digital platforms that let users interact virtually and often anonymously have given rise to harassment and other criminal behaviors. Tech-facilitated abuse—such as nonconsensual pornography, doxing, and swatting—compromises privacy and safety. How can law enforcement respond?
Lillian Ablon, a cybersecurity and emerging technologies researcher, spoke at a RAND Policy Circle Conversation on the world's expanding cyber vulnerability, those who are out there to take advantage of those vulnerabilities, as well as consumer attitudes toward breaches.
A growing number of constraints have been imposed around the world on information in the cloud, fueling concerns that the Internet—the economic engine of the information age—may become hopelessly fragmented.
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.
About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.
To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.
The tensions that divide the United States and China apply just as much to cyberspace as to relations in the physical world. Can the two countries achieve meaningful outcomes through formal negotiations over cyber norms and rules?
Analysis of visitors to CalMHSA-funded student mental health websites shows that visitors at educational institutions comprised the largest audience segment and promotional campaigns likely increased traffic.
Since the terrorist attack in Madrid 12 years ago, the threat of terrorism has not diminished. But counter-terrorism efforts have become more sophisticated across Europe, taking aim at the root causes of terrorism before actual attacks take place.
How has interest in military careers evolved over time and by geographic location? And what are potential recruits' biggest concerns related to the Army? Anonymous data from Internet searches can provide insight.
As the security on the iPhone better protects users from criminals, it also excels at keeping law enforcement from accessing the data. The dispute between the FBI and Apple over unlocking the iPhone of one of the San Bernardino attackers continues but the real debate is about whether society wants legislation that weakens iPhone security for law enforcement.
Cyberspace is expanding, becoming more vulnerable, and hosting increasingly vast amounts of data. Compounding this challenge is the growing number of bad actors seeking to exploit cyberspace. What steps can be taken to help mitigate emerging threats and improve U.S. cybersecurity?
Technology is thoroughly embedded within the average person's life but security is not emphasized to the general user. Teaching the importance of security early on and continually bringing awareness to the public could help temper technology-based attacks.
A survey of over 26,000 citizens across the EU found that even in the event of a national emergency or limiting access of individuals' Internet usage to law enforcement agencies, there was still a strong aversion to information being stored or accessed.
When defending an organization, cybersecurity professionals must choose from a large set of defensive measures while operating with a limited set of resources. What is the menu of actions for defending against an attack? And how can defenders navigate the selection process?
Millions of people leave behind online footprints each day, giving law enforcement and intelligence experts the chance to construct a profile of who is more likely to commit violence in the name of a murderous ideology.