Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

RAND

Below you will find reports with the source of “RAND”

image from Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events. (more available)
Added: October 26, 2018
image from Security Sector Reform In Ukraine

Security Sector Reform In Ukraine

This report provides a series of recommendations for the reform of Ukraine’s security and defense institutions. It covers a wide range of topics including cyber warfare. (more available)
Added: October 26, 2018
image from China's Evolving Approach To "Integrated Strategic Deterrence"

China's Evolving Approach To "Integrated Strategic Deterrence"

This report looks at China’s evolving approach to integrated strategic deterrence. Drawing on a variety of Chinese military writings, this report explores the origins of this concept, how it relates to Chinese development of counter-intervention capabilities, and how Beijing’s assessment of its external security environment influences its requirements. (more available)
Added: October 25, 2018
image from Retaining The Army's Cyber Expertise

Retaining The Army's Cyber Expertise

In this report, they focus on issues related to retaining cyber soldiers. They use data from the Army’s personnel files to determine how many new soldiers are likely to meet the qualifications for this new MOS, as well as their expected retention rates. (more available)
Added: October 25, 2018
image from Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

While the use of the dark web as facilitators for illicit drug trade has increasingly been the subject of research by a number of academics, little has been done to conduct a systematic investigation of the role of the dark web in relation to the illegal arms trade, drawing on the insights offered by primary data. (more available)
Added: October 24, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This project sought to draw lessons from the efforts of others (both nation-state and nonstate actors) in and through the IE for future U. (more available)
Added: October 24, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other. (more available)
Added: October 23, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This report offers the case studies used for the official report of the same name.
Added: October 23, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. (more available)
Added: October 22, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.
Added: October 21, 2018
image from US-Japan Alliance Conference: Strengthening Strategic Cooperation

US-Japan Alliance Conference: Strengthening Strategic Cooperation

In 2015, after two years of study and policy coordination, the United States and Japan publicly issued new defense guidelines, updating and expanding upon the previous guidance of 1997. (more available)
Added: October 21, 2018
image from Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

This report aims to investigate the role of the Internet in facilitating drugs trade. It is commissioned by the Research and Documentation Centre (Wetenschappelijk Onderzoek- en Documentatiecentrum, WODC), the independent research arm of the Ministry of Security and Justice in the Netherlands. (more available)
Added: October 20, 2018
image from Thought Leadership 2016 Programme: Key Findings

Thought Leadership 2016 Programme: Key Findings

The 2016 Thought Leadership programme convened by Corsham Institute, in conjunction with RAND Europe and St George’s House, examined a number of crucial dimensions of our connected society. (more available)
Added: October 20, 2018
image from Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

On behalf of the National Institute of Justice (NIJ) and as part of the Priority Criminal Justice Needs Initia- tive, the RAND Corporation, in partnership with the Police Executive Research Forum, organized a workshop in May 2017 on Challenges with Law Enforcement Access to Digital Evidence Held in Remote Data Centers. (more available)
Added: October 19, 2018
image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017. (more available)
Added: October 19, 2018
image from Getting To Yes With China In Cyberspace

Getting To Yes With China In Cyberspace

This report is a response to the absence of a formal dialogue and explores U.S. policy options for managing relations with China over this critical policy area. (more available)
Added: October 18, 2018
image from The Power To Coerce: Countering Adversaries Without Going To War

The Power To Coerce: Countering Adversaries Without Going To War

With the limits of both hard military power and soft power in mind, we set out to explore the space in between: nonmilitary ways of coercing, deterring, weaken- ing, and punishing those that threaten peace, security, and U. (more available)
Added: October 18, 2018
image from Exploring Cyber Security Policy Options In Australia

Exploring Cyber Security Policy Options In Australia

In December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security–focused 360o Discovery Exercise in Canberra. (more available)
Added: October 17, 2018
image from The National Computer Security Survey (NCSS)

The National Computer Security Survey (NCSS)

The Bureau of Justice Statistics (BJS) within the U.S. Department of Justice (DOJ), along with the U.S. Department of Homeland Security (DHS), conducted the National Computer Security Survey (NCSS), a nationally representative sample of businesses across 36 industry sectors. (more available)
Added: October 17, 2018
image from Estimating The Global Cost Of Cyber Risk: Methodology And Examples

Estimating The Global Cost Of Cyber Risk: Methodology And Examples

The goal of this research was to produce a transparent methodology for estimating present and future global costs of cyber risk, acknowledging the considerable uncertainty in the frequencies and costs of cyber incidents. (more available)
Added: October 16, 2018
image from The Moral Component Of Cross Domain Conflict

The Moral Component Of Cross Domain Conflict

This is the final report of a study commissioned by the UK Ministry of Defence (MOD) through the Defence Human Capability Science and Technology Centre (DHCSTC) framework. (more available)
Added: October 16, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)