Untersuchung der Verbraucherpolitik: Bericht über Verbraucherinformationskampagnen gegen Trickbetrug
Despite the attention that offshore outsourcing currently demands in the public media, there is little empirical evidence on its economic impact. This paper surveys the empirical literature on offshore outsourcing and its productivity effects.
The new WiMAX equipment could play a key role in helping bridge the digital divide as long-distance wireless links could help deliver higher-speed access to areas traditionally out of reach of fixed-line networks.
These guidelines offer principles and best practices for the licensing of genetic inventions used for the purpose of human health care.
This report examines the statistical relationship between the share of employment potentially affected by ICT-enabled offshoring of services and other economic and structural developments, using some simple descriptive regressions on a panel of OECD economies between 1996 and 2003.
VoIP traffic is growing rapidly in conjunction with the growth in broadband connections, in particular digital subscriber lines (DSL) and cable modems. According to a recent survey, VoIP is growing at twice the rate of traditional switched voice.
English, , 2,450kb
The elderly are particularly exposed in disasters. The study looks at how the situation of the elderly may evolve in the next decades and how risk and vulnerability management can be adapted accordingly.
English, , 4,343kb
Denmark is currently reappraising its strategy for managing major risks. The aim of the study is to contribute to ongoing reflections on how to better assess the country’s vulnerabilities and exposure to hazards.
English, , 2,418kb
The number of tunnels in Norway and its topography make tunnel risk management particularly challenging. The study reviews recent developments in other OECD countries and proposes possible policy responses.
English, , 2,355kb
The development of information and communication technologies has created new opportunities for society, but also new threats and vulnerabilities. The study looks at possible public responses to improve information security.