› Norway › By Date
Norwegian, , 1,171kb
English, , 1,477kb
The purpose of this activity is to provide policymakers with options for developing systems to recognise non-formal and informal learning; to effectively implement the agenda; and determine under what conditions recognition of non-formal and informal learning can be beneficial for all.
Summarises proceedings of a conference looking at examples of human genetic research databases, how they are established, how they are managed and governed, how they might be commercialised, and what the policy considerations might be.
English, , 732kb
This Country Note on Norway forms part of the OECD Thematic Review of Tertiary Education. This is a collaborative project to assist the design and implementation of tertiary education policies which contribute to the realisation of social and economic objectives of countries.
This site contains a list of key references on Norway. The documentary database includes documents on partnership and local governance that have been published by governments, universities and other organisations.
The first in a series of reviews of various countries' risk management policies, this review identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made.
New forms of governance are emerging. Government, business and civil society are increasingly seeking ways to develop and pursue economic development strategies and solve socio-economic problems jointly.
This publication examines the innovation system in pharmaceutical biotechnology in eight OECD countries. Based on rich evidence, it draws policy recommendations to foster innovation in biopharmaceuticals advocating an integrated policy approach.
This study shows how knowledge-intensive services activities (KISAs) contribute to the acquisition and growth capabilities of firms and public sector organisations.
English, , 2,355kb
The development of information and communication technologies has created new opportunities for society, but also new threats and vulnerabilities. The study looks at possible public responses to improve information security.