|
on Information and Communication Technologies |
By: | Cusolito , Ana P.; Lederman, Daniel |
Abstract: | Theories of international trade assume that all countries use similar and exogenous technologies in the production of any good. This paper relaxes this assumption. The marriage of literatures on biased technical change and trade yields a tractable theory, which predicts that differences in factor endowments and intellectual property rights bias technical change toward particular factor intensities, and thus unit factor input requirements can vary across economies. Using data on net exports of a single industry, computers, intellectual property rights and factor endowments for 73 countries during 1980-2000, the paper shows that once technological choices are considered, countries with different factor endowments can become net exporters of the same product. |
Keywords: | Technology Industry,Economic Theory&Research,ICT Policy and Strategies,E-Business,Labor Policies |
Date: | 2009–09–01 |
URL: | http://d.repec.org/n?u=RePEc:wbk:wbrwps:5043&r=ict |
By: | Rossbach, Peter; Gießamer, Dirk |
Abstract: | With the development of new internet technologies new security problems arise. Thus, it is important to consider security aspects during the complete development process of a web application. Every participant of such a process should have the appropriate knowledge. Classical learning methods are not sufficient, because they are not able to satisfy the needs of knowledge in the required topicality. As a consequence, we developed an eLearning application that supports the transfer of this knowledge time-and location-independent. To get a deep understanding about security problems and the resulting vulnerabilities and attacks the application consists of three complementing components. One component is a tool that provides all necessary information about the security problems. The second component is a vulnerable online banking application where the user can apply attacks in a virtual environment. The third component is a monitor application where one can inspect in real-time which information the attacker receives. |
Keywords: | eLearning, IT-Security,Internet Applications |
Date: | 2009 |
URL: | http://d.repec.org/n?u=RePEc:zbw:fsfmwp:116&r=ict |
By: | Rossbach, Peter |
Abstract: | Subject of the study presented in this paper is the analysis of the relevance of the Internet as an information source in German banks. The results show, that today the Internet is indeed the most important information source for many types of information used in the business processes of banks. Especially sources free of charge are not only used widely, they are moreover evaluated very high in quality. It is argued, that attitude and behavior are mainly influenced by psychological and sociological factors. Finally, it is stated, that due to the loss of control over parts of the input factors it is necessary for the banks to actively incorporate the Internet into the quality management processes. |
Keywords: | Information Search Behavior,Internet,Banks,Psychology,Sociology |
Date: | 2009 |
URL: | http://d.repec.org/n?u=RePEc:zbw:fsfmwp:120&r=ict |