Publications & Documents


  • 29-November-2012

    English

    Cybersecurity: Managing risks for greater opportunities

    While the nature of cyber attacks continues to include criminal activities motivated by financial gain, the main emerging threats are large-scale denial of service attacks, information leaks, targeted cyber espionage, and the disruption of critical infrastructures.

    Related Documents
  • 23-November-2012

    English, PDF, 157kb

    Committee on Consumer Policy (CCP) brochure

    An overview of the work of the OECD Committee on Consumer Policy.

  • 21-November-2012

    English

    Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

    These terms of reference set the context, objectives, scope and modalities for the second review of the 2002 Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security.

    Related Documents
  • 21-November-2012

    English

    The Role of the OECD Security Guidelines: Towards Cybersecurity for an Open and Interconnected Economy

    This paper provides an overview of the history of the OECD Guidelines for the Security of Information Systems and Networks since the adoption of the first version in 1992. It explains how the 2002 revision of the Guidelines introduced a fundamental paradigm shift in the way IT security was previously addressed.

    Related Documents
  • 19-November-2012

    English

    Non-governmental Perspectives on a New Generation of National Cybersecurity Strategies

    This document brings together views from business, civil society and the Internet technical community on the emergence of a new generation of national cybersecurity strategies. This input was used in developing the report on “Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy”.

  • Comparative analysis of national cybersecurity strategies
  • 19-November-2012

    English

    Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy

    This report analyses the latest generation of national cybersecurity strategies in 10 OECD countries. It reveals that cybersecurity policy making has become a national policy priority and relies on holistic strategies supported by stronger leadership which aims to drive economic and social prosperity and protect cyberspace-reliant societies against cyber-threats.

    Related Documents
  • 31-October-2012

    English

    E-books: Developments and Policy Considerations

    This report provides background on e-book markets and examines various policy issues. These include differing tax rates in countries between physical books and e-books, consumer lock-in to specific platforms, limitations on how users can read and share their purchased content, and a lack of transparency about how data on their reading habits is used.

    Related Documents
  • 30-October-2012

    English

    Technology and game theory

    Mobile phones and e-books are already essential school supplies on many university campuses. But they’re just slide rules compared to what education tools might look like in a few years.

  • 22-October-2012

    English

    OECD Technology Foresight Forum 2012 - Harnessing data as a new source of growth: Big data analytics and policies

    The 2012 Technology Foresight Forum will focus on the potential of big data analytics as a new source of growth, which could help generate significant economic and social benefits

    Related Documents
  • 22-October-2012

    English

    Internet traffic exchange: 2 billion users and it’s done on a handshake

    Every day one exabyte of data is said to travel over the Internet – enough data to fill 300,000 of the world’s biggest hard disks or 212 million DVDs. And astonishingly, according to a new OECD report on Internet traffic exchange, most of the thousands of networks that exchange this traffic do so without a written contract or formal agreement.

    Related Documents
  • << < 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 > >>