This report takes an initial look at methodologies to measure and estimate the monetary value of personal data, which is creating economic and social value at an increasing pace. But measuring and estimating its value is difficult. This is because not only a huge amount of personal data is being generated, but also as it is used in many different situations and for numerous purposes.
The future will be inherently knowledge-based. Are we moving in the right direction? What must we know to be able to get there? Understanding knowledge-based capital is an important first step.
This report shows that despite the financial crisis, business-to-consumer e-commerce has grown steadily across the OECD, spurred by the spread of mobile devices, easy-to-use payment mechanisms and participative web tools such as price comparisons or consumer ratings. Trust in e-commerce, however, remains challenged by many issues.
In 2017 a household with two teenagers will have 25 Internet connected devices. In 2022 this will rise to 50, compared with only 10 today. In households in the OECD alone there will be 14 billion connected devices, up from 1.7 billion today and this doesn’t take into account everything outside the household and outside the OECD. All this leads to the smart world discussed in this paper.
This report provides an overview of existing data and statistics in the fields of information security, privacy and the protection of children online. It highlights the potential for the development of better indicators in these respective fields showing in particular that there is an underexploited wealth of empirical data that, if mined and made comparable, will enrich the current evidence base for policy making.
Viewers are watching a growing share of video via Internet-based distribution systems. New digital content distribution services are having appreciable impacts on established media industries and network service providers in many OECD countries. This paper argues that convergence should be taken as the rule, rather than the exception. Careful application of best practices can address most policy concerns.
While the nature of cyber attacks continues to include criminal activities motivated by financial gain, the main emerging threats are large-scale denial of service attacks, information leaks, targeted cyber espionage, and the disruption of critical infrastructures.