The jurisdiction of regulators has changed in many countries as responsibilities, formerly with ministries, was transferred to regulators.
The development of broadband Internet access, has triggered a shift in voice traffic from traditional public switched telephone networks (PSTN) to alternative Internet Protocol (IP) networks.
This report on consumer information campaigns concerning scams, makes recommendations for five areas in which practice can be improved to ensure that scams are more effectively understood and that campaigning against them is more integrated.
This report is a major information resource on governments’ effective efforts to date to foster a shift in culture as called for in the OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security.
This paper examines the dynamics of knowledge production for a panel of 19 OECD countries. A new and unique data set is used to proxy the domestic flows of “new-to-the-world” knowledge and ideas.
English, , 175kb
The "Anti-Spam Regulation" paper has been prepared with the objective of aiding the development and review of anti-spam legislation strategies and arrangements in OECD member countries and non-member economies.
This paper presents a preliminary set of European and international citation data tables designed to enable researchers to become familiar with the subject and undertake a range of analyses.
English, , 299kb
The services sector now accounts for over 70% of total employment and value added in OECD economies. It also accounts for almost all employment growth in the OECD area.
This study quantifies the contribution of foreign affiliates to productivity growth using a growth accounting approach and compares the presence of foreign affiliates across OECD countries. The analysis confirms that foreign affiliates can make an important contribution to productivity growth.
This report is intended to provide an understanding of the benefits and limitations of biometric-based technologies. It also includes information on existing privacy and security methodologies for assessing biometrics.