This study uses exploratory data analysis techniques to develop typologies of innovation modes or strategies for groups of firms. Analysing micro-level survey data from 18 countries we identify five innovation modes. The coherence and relevance of the innovation modes is tested by using them as explanatory factors in equations explaining economic performance.
Viewers are watching a growing share of video via Internet-based distribution systems. New digital content distribution services are having appreciable impacts on established media industries and network service providers in many OECD countries. This paper argues that convergence should be taken as the rule, rather than the exception. Careful application of best practices can address most policy concerns.
English, PDF, 447kb
The role of space technologies and ICT in the surveillance of major threats
This study analyses countries' government and institutional level policies on formal training in transferable skills for researchers, from doctoral students through to experienced research managers.
English, PDF, 1,070kb
Monitoring Global Threats: The Contribution of Satellite Technologies
This workshop, held on 29 November 2012, aimed to bring together a wide range of stakeholders to exchange views on the way ahead for government policy for the shipbuilding industry.
While the nature of cyber attacks continues to include criminal activities motivated by financial gain, the main emerging threats are large-scale denial of service attacks, information leaks, targeted cyber espionage, and the disruption of critical infrastructures.
English, PDF, 157kb
An overview of the work of the OECD Committee on Consumer Policy.
These terms of reference set the context, objectives, scope and modalities for the second review of the 2002 Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security.
This paper provides an overview of the history of the OECD Guidelines for the Security of Information Systems and Networks since the adoption of the first version in 1992. It explains how the 2002 revision of the Guidelines introduced a fundamental paradigm shift in the way IT security was previously addressed.