Latest Documents


  • 9-June-2006

    English

    Bioeconomy Background Documents

    The bioeconomy, a new concept, covers a broad range of economic activities, each benefiting from new discoveries, and the related products and services arising out of the biosciences.

  • 28-May-2006

    English

    OECD Reviews of Risk Management Policies: Norway - Information Security

    The first in a series of reviews of various countries' risk management policies, this review identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made.

  • 4-May-2006

    English

  • 27-April-2006

    English

  • 27-April-2006

    English

    Past partners (1990-2006)*

    List of IFP Partners who have contributed to the Programme.

    Related Documents
  • 12-April-2006

    English, , 120kb

  • 20-February-2006

    English

    Futures Network and Partners

    It strengthens the Programme's capacity to monitor long-term developments and to identify new themes and ideas...

    Related Documents
  • 10-February-2006

    English, , 2,232kb

    OECD Studies in Risk Management - United States: Disaster Information Needs of Ethnic Minorities

    The study develops a tool that the New Mexico Indian tribes/communities can use to assess their exposure and vulnerability to hazards, as well as their capabilities and needs for managing disaster risks.

    Related Documents
  • 10-February-2006

    English, , 2,450kb

    OECD Studies in Risk Management - Sweden: Safety of the Elderly

    The elderly are particularly exposed in disasters. The study looks at how the situation of the elderly may evolve in the next decades and how risk and vulnerability management can be adapted accordingly.

    Related Documents
  • 10-February-2006

    English, , 2,355kb

    OECD Studies in Risk Management - Norway: Information Security

    The development of information and communication technologies has created new opportunities for society, but also new threats and vulnerabilities. The study looks at possible public responses to improve information security.

    Related Documents
  • << < 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 > >>