OECD Home › Directorate for Science, Technology and Innovation › Latest Documents
This paper outlines factors that may affect the ability of researchers to access patented inventions for legitimate research purposes. It reviews evidence of access limitations and explores options for the formulation of research exemptions that balance research use and patent holders' rights.
This study shows how knowledge-intensive services activities (KISAs) contribute to the acquisition and growth capabilities of firms and public sector organisations.
Untersuchung der Verbraucherpolitik: Bericht über Verbraucherinformationskampagnen gegen Trickbetrug
Despite the attention that offshore outsourcing currently demands in the public media, there is little empirical evidence on its economic impact. This paper surveys the empirical literature on offshore outsourcing and its productivity effects.
The new WiMAX equipment could play a key role in helping bridge the digital divide as long-distance wireless links could help deliver higher-speed access to areas traditionally out of reach of fixed-line networks.
These guidelines offer principles and best practices for the licensing of genetic inventions used for the purpose of human health care.
This report examines the statistical relationship between the share of employment potentially affected by ICT-enabled offshoring of services and other economic and structural developments, using some simple descriptive regressions on a panel of OECD economies between 1996 and 2003.
It strengthens the Programme's capacity to monitor long-term developments and to identify new themes and ideas...
VoIP traffic is growing rapidly in conjunction with the growth in broadband connections, in particular digital subscriber lines (DSL) and cable modems. According to a recent survey, VoIP is growing at twice the rate of traditional switched voice.
English, , 2,450kb
The elderly are particularly exposed in disasters. The study looks at how the situation of the elderly may evolve in the next decades and how risk and vulnerability management can be adapted accordingly.