Synopsis: Security:


WEF_GlobalInformationTechnology_Report_2014.pdf

The Global Information technology Report 2014 Rewards and Risks of Big data Beñat Bilbao-Osorio, Soumitra Dutta,

and Bruno Lanvin, Editors Insight Report 2014 World Economic Forum Insight Report The Global Information technology Report 2014 Rewards and Risks of Big data Beñat Bilbao

and Rewards and Risks of Big data 1. 1 The Networked Readiness Index 2014: 3 Benchmarking ICT Uptake in a World of Big data Beñat Bilbao-Osorio and Roberto Crotti (World Economic

Balancing the Risks and 53 Rewards of Data-Driven Public Policy Alex Pentland (MIT) 1. 5 Managing the Risks and Rewards 61 of Big data Matt Quinn and Chris

and risks accruing from big data, an unprecedented phenomenon in terms of the volume, velocity, and variety of sources of the creation of new data.

This can present a threat that can often turn a company's advantage into a weakness.

Consider, for example, the threats, distractions, and benefits of one current element of digitization: big data. This is comprised of large datasets often gathered in unstructured forms from the behavior of people and groups.

3) balancing the risks and rewards of big data from a public policy perspective;(4) managing these risks and rewards;(

5) rebalancing socioeconomic asymmetry in a data-driven economy;(6) the role of regulation and trust building in unlocking the value of big data;(

and the Ioe including standards and interoperability, privacy and security, spectrum and bandwidth constraints, crossborder data traffic, legacy regulatory models, reliability, scaling, and electrical power.

Balancing the Risks and Rewards of Data-Driven Public Policy Alex Sandy Pentland from the Massachusetts institute of technology (MIT) highlights in Chapter 1. 4 that we are entering a big data world,

while at the same time providing greater security for organizations that use xiv The Global Information technology Report 2014 Executive Summary 2014 World Economic Forum big data.

and helps minimize the risk of unauthorized information leakage. 3. Systems controlled by partner organizations,

Managing the Risks and Rewards of Big data In Chapter 1. 5, . Matt Quinn and Chris Taylor from TIBCO argue that expert handling of big data brings the reward of being able to react to world-changing events,

but at the same time, big data brings risks that require balancing those benefits against privacy concerns raised by the potentially unsettling correlation of personal information.

and get to the core of understanding big data's risks and rewards. Rebalancing Socioeconomic Asymmetry in a Data-Driven Economy Chapter 1. 6, contributed by Peter Haynes of the Atlantic Council

These socioeconomic asymmetries in the broad data ecosystem are a potential threat to the emerging data-driven economy

and Rewards and Risks of Big data 2014 World Economic Forum 2014 World Economic Forum The Global Information technology Report 2014 3 CHAPTER 1. 1 The Networked Readiness

and the efficiency of the lawmaking process) as well as more ICT-specific dimensions (the passing of laws related to ICTS and software piracy rates).

In terms of readiness, China is making an effort to improve its infrastructure, with augmented production of electricity and higher international Internet bandwidth capacity and server security.

and sometimes concerns about geopolitical and strategic matters regarding national security, have been raised. Measures that can build resilience and avoid these perils will need to be developed.

in settling disputes*c 1. 05 Efficiency of legal system in challenging regulations*c 1. 06 Intellectual property protection*1. 07 Software piracy rate,

(or disarming) security settings remotely. At an industrial level, applications using sensor technologies are capturing vast amounts of data to improve decision-making.

and environmental conditions, improve public safety and security, and increase efficiency in the delivery of public services such as municipal traffic systems that incorporate real-time remote monitoring to streamline traffic flows.

technical and policy challenges exist in the ability of current IP networks to fully exploit big data expansion (Figure3).

Policy and technical issues facing big data and the Ioe Standards & interoperability Privacy & security Spectrum & bandwidth constraints Reliability Scaling Electrical power Cross-border data traffic

The key security issues for big data include the reliable prevention of hacking and access by unauthorized and unwanted users to large databases and data flows.

network security is essential. Over the next five years, the growth of mobile data traffic will require greater radio spectrum to enable wireless M2m,

Healthcare applications that require instant communication between end users and medical professionals, safety and security applications, utility functions,

At the consumer level, smart meters may present privacy and security challenges. However, at the aggregation and distribution levels, utility companies face the new reality of a changing energy source mix

potentially limiting companies'ability to exploit big data opportunities or exposing them to threats of legal and regulatory intervention.

Failure to develop comprehensive environment readiness carries the risk of losing competitive advantage vis-à-vis other countries.

Balancing the Risks and Rewards of Data-Driven Public Policy ALEX PENTLAND MIT In June 2013,

massive US surveillance of phone records and Internet data was revealed by former National security agency (NSA) contractor Edward Snowden,

This chapter will outline both the risks and the rewards of this new age of big data

The risk of deploying this sort of data-driven policy and regulation comes from the danger of putting so much personal data into the hands of either companies or governments.

Balancing the Risks and Rewards of Data-Driven Public Policy 54 The Global Information technology Report 2014 2014 World Economic Forum Box 1:

Balancing the Risks and Rewards of Data-Driven Public Policy 2014 World Economic Forum These selected results are just a small sample of the impressive work that is made possible by this rich and unique data commons.

or that help citizens reduce their risk of catching the flu. The work of these 90 research groups also suggests that many of the privacy fears associated with the release of data about human behavior may be generally misunderstood.

Balancing the Risks and Rewards of Data-Driven Public Policy 56 The Global Information technology Report 2014 2014 World Economic Forum themselves.

or the risks associated with sharing through current social media. These data can then be used for the personal selfempowerment of each member,

A major risk of deploying data-driven policies and regulations comes from the danger of putting so much personal data into the hands of governments.

using many different types of computer systems and encryption. Similarly, human resources should be organized into cells of access

and encryption systems, are hard to attack, both physically as well as through cyberattack. This is because any single exploit is likely to gain access to only a limited part of the whole database.

Similarly, the resilience of organizations with a heterogeneous cell-like human and permissions structure is familiar from intelligence and terrorist organizations.

Importantly, resistance to attack by adopting a distributed organization is a particularly pressing issue for authoritarian governments

A familiar example of this type of monitoring is the many eyes security strategy. When patterns of communication among different departments are visible (as with physical mail

Balancing the Risks and Rewards of Data-Driven Public Policy 2014 World Economic Forum the requested records) remains hidden.

Misbehavior by employees, industrial espionage, and cyberattack are among the greatest dangers that companies face in the big data era.

A distributed architecture of databases joined with a network that supports permissions, provenance, and auditing can reduce risk

This chapter has suggested one path that can limit potential abuses of power while at the same time providing greater security for organizations that use big data.

and auditing and helps to minimize the risk of unauthorized information leakage by providing the minimum amount of information required. 3. Systems controlled by partner organizations,

Balancing the Risks and Rewards of Data-Driven Public Policy 58 The Global Information technology Report 2014 2014 World Economic Forum found within modern computer databases and networks.

Balancing the Risks and Rewards of Data-Driven Public Policy 2014 World Economic Forum 2014 World Economic Forum CHAPTER 1. 5 Managing the Risks and Rewards of Big data

MATT QUINN CHRIS TAYLOR TIBCO One of the biggest challenges of the term big data is deciding on a standard definition of what those words really mean.

RISKS AND REWARDS Digitization itself is not new, but the maturation and availability of the Internet;

It is in those extremes that the risks and rewards of big data are decided. THREE KEY BIG DATA TRENDS As the world becomes more familiar with big data,

three key trends that have a significant impact on those risks and rewards are emerging.

The third type of sensor provides constant reporting by machines that perform the work critical to our security, health, and lifestyle.

and risks represented by these new sources. Automated systems that manage big data ecosystems cannot be developed around rigid schemas that require redevelopment for each new stream of information.

Managing the Risks and Rewards of Big data 62 The Global Information technology Report 2014 2014 World Economic Forum RESOLVING TWO PRIMARY CHALLENGES OF BIG DATA Most organizations need to overcome two primary challenges before becoming productive

Managing the Risks and Rewards of Big data 2014 World Economic Forum data not with the goal of having a larger dataset,

and the risk associated with the decision. There is a broad spectrum of judgments that covers small,

Many of the risks and rewards of big data are coupled tightly to the use of all of those data.

and personal security. Given enough personal data information can be correlated that can be both unsettling and unwanted.

making them vulnerable to burglaries. Each discrete piece of information is not meaningful, but in the aggregate can make someone a potential victim.

Managing the Risks and Rewards of Big data 64 The Global Information technology Report 2014 2014 World Economic Forum stretching of the boundaries of individual expectations.

while mitigating risks is entirely a matter of data systems sophistication. This section will explore three examples that demonstrate the successful use of big data.

The first example of that sophistication is on display at a major network of hospitals in the Midwest to address the problem of sepsis the systemic infection of the body which is a constant threat to hospitalized patients.

and reducing the risk of negotiating and accepting poor contracts. Without the ability to manage all relevant data

a risk remains in gaining the customer's favor while requiring access to so much personal information.

Managing the Risks and Rewards of Big data 2014 World Economic Forum ideal way to gain that access

mitigating the risk of a brand being perceived as stalking the customer or invading their privacy.

MITIGATING THE RISKS Managing the three key trends of leveraging previously untapped data sources, using automation wherever possible,

while mitigating its risks. Accomplishing these three objectives requires successfully meeting big data's two main challenges:

Its benefits need to be considered as a function of how well its risks are managed. Truly expert handling of big data brings the reward of being able to react to world-changing events, both big and small, at an unprecedented rate and scope.

Organizations that manage big data have an obligation to monitor security device, server, and application logs, all of which generate machine data that provide insight into how,

which entails the deliberate sharing of more and more personal information, with the requirements of security and

Organizations, both public and private, must balance the risks and rewards of big data especially as big data moves from low impact experiments to driving real-time operations and decision-making.

and personal security and the introduction of the creepiness factor are all things to consider.

Managing the Risks and Rewards of Big data 66 The Global Information technology Report 2014 2014 World Economic Forum CHAPTER 1. 6 Rebalancing Socioeconomic Asymmetry in a Data-Driven

while minimizing risks and harms to individuals and enterprises globally. Existing regulatory approaches that are based on the principles of notice

and analytics of big data is how little we actually know about it its potential risks and rewards,

A primary challenge is security: although metadata can be logically bound to data, it can also be unbound by bad actors (a situation similar to the vulnerability of today's financial systems to hackers).

Thus a strong legal and policy framework will be required to ensure that criminals are discouraged from doing this (again analogous to the laws governing today's financial systems.

The development of such an architecture needs to be a collaboration between multiple data stakeholders to ensure its feasibility and inherent security,

whether ways can be found to protect information technology infrastructures and the data they carry from cyberattacks.

The European union Agency for Network and Information security (ENISA) states that a great deal of data are stored in different places in the cloud for security reasons,

Understanding customer concerns and regulatory issues early will help companies determine the areas of risk they need to start tackling.

Initially companies should conduct an assessment of their regulatory and operational status quo to identify risks and opportunities.

In this model, they would become aware of the benefits of their participation as well as potential privacy risks.

Finance functions (such as finance, risk, and treasury) can use big data for intraday liquidity management, providing real-time monitoring of price movements in relation to positions,

and for improved credit risk assessment, through multiple big data supported credit risk assessments that factor in hundreds or even thousands of indicators.

Most opportunity for analysis Least opportunity for analysis Data systems least fit for purpose Customer service Operations & productionsales Finance Information & research Risk/security R&d Procurement Supply chain

The sheer variety of value creation evident from clinical trials and marketing to risk management and audits, from analyzing crop

Governments should spearhead the effort to ensure the privacy and security of personal data. The appropriate agency should take a leading role in working with all relevant private

A global corporation offering computer-assisted legal research services uses a big data technology platform it has developed in house both for its risk management business

This enables the finance department to better understand various business risks and adjust audit coverage to the areas that pose the greatest risks.

At the same time, it reduces the time spent on auditing by about 15 percent. A British multinational music recording and publishing company has created the Million Interview Dataset over the last few years

*114.2.9 1. 07 Software piracy rate,%software installed...77.75 1. 08 No. procedures to enforce a contract...

*114.2.9 1. 07 Software piracy rate,%software installed...77.75 1. 08 No. procedures to enforce a contract...

*145.2.2 1. 07 Software piracy rate,%software installed...95.84 1. 08 No. procedures to enforce a contract...

*137.2.4 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*139.2.3 1. 07 Software piracy rate,%software installed...69.69 1. 08 No. procedures to enforce a contract...

*75.3.6 1. 07 Software piracy rate,%software installed...101.88 1. 08 No. procedures to enforce a contract...

*21.5.3 1. 07 Software piracy rate,%software installed...5...23 1. 08 No. procedures to enforce a contract...

*17.5.5 1. 07 Software piracy rate,%software installed...5...23 1. 08 No. procedures to enforce a contract...

*69.3.7 1. 07 Software piracy rate,%software installed...100.87 1. 08 No. procedures to enforce a contract...

*32.4.8 1. 07 Software piracy rate,%software installed...44.54 1. 08 No. procedures to enforce a contract...

*130.2.6 1. 07 Software piracy rate,%software installed...104.90 1. 08 No. procedures to enforce a contract...

*37.4.5 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*22.5.2 1. 07 Software piracy rate,%software installed...7...24 1. 08 No. procedures to enforce a contract...

*101.3.1 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*44.4.1 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*98.3.2 1. 07 Software piracy rate,%software installed...83.79 1. 08 No. procedures to enforce a contract...

*135.2.5 1. 07 Software piracy rate,%software installed...62.66 1. 08 No. procedures to enforce a contract...

*47.4.1 1. 07 Software piracy rate,%software installed...87.80 1. 08 No. procedures to enforce a contract...

*80.3.5 1. 07 Software piracy rate,%software installed...40.53 1. 08 No. procedures to enforce a contract...

*39.4.4 1. 07 Software piracy rate,%software installed...65.67 1. 08 No. procedures to enforce a contract...

*104.3.0 1. 07 Software piracy rate,%software installed...61.64 1. 08 No. procedures to enforce a contract...

*88.3.4 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*142.2.3 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*99.3.2 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*100.3.2 1. 07 Software piracy rate,%software installed...93.83 1. 08 No. procedures to enforce a contract...

*13.5.6 1. 07 Software piracy rate,%software installed...14.27 1. 08 No. procedures to enforce a contract...

*105.3.0 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*144.2.2 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*60.3.8 1. 07 Software piracy rate,%software installed...53.61 1. 08 No. procedures to enforce a contract...

*53.3.9 1. 07 Software piracy rate,%software installed...80.77 1. 08 No. procedures to enforce a contract...

*95.3.2 1. 07 Software piracy rate,%software installed...40.53 1. 08 No. procedures to enforce a contract...

*59.3.8 1. 07 Software piracy rate,%software installed...50.58 1. 08 No. procedures to enforce a contract...

*123.2.7 1. 07 Software piracy rate,%software installed...89.81 1. 08 No. procedures to enforce a contract...

*81.3.5 1. 07 Software piracy rate,%software installed...40.53 1. 08 No. procedures to enforce a contract...

*40.4.4 1. 07 Software piracy rate,%software installed...34.48 1. 08 No. procedures to enforce a contract...

*61.3.8 1. 07 Software piracy rate,%software installed...20.35 1. 08 No. procedures to enforce a contract...

*26.5.0 1. 07 Software piracy rate,%software installed...7...24 1. 08 No. procedures to enforce a contract...

*107.3.0 1. 07 Software piracy rate,%software installed...78.76 1. 08 No. procedures to enforce a contract...

*79.3.6 1. 07 Software piracy rate,%software installed...67.68 1. 08 No. procedures to enforce a contract...

*94.3.2 1. 07 Software piracy rate,%software installed...53.61 1. 08 No. procedures to enforce a contract...

*112.2.9 1. 07 Software piracy rate,%software installed...87.80 1. 08 No. procedures to enforce a contract...

*31.4.8 1. 07 Software piracy rate,%software installed...34.48 1. 08 No. procedures to enforce a contract...

*85.3.5 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*1...6. 2 1. 07 Software piracy rate,%software installed...10.25 1. 08 No. procedures to enforce a contract...

*12.5.7 1. 07 Software piracy rate,%software installed...22.37 1. 08 No. procedures to enforce a contract...

*131.2.6 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*43.4.2 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*124.2.7 1. 07 Software piracy rate,%software installed...107.91 1. 08 No. procedures to enforce a contract...

*14.5.6 1. 07 Software piracy rate,%software installed...12.26 1. 08 No. procedures to enforce a contract...

*56.3.9 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*70.3.7 1. 07 Software piracy rate,%software installed...53.61 1. 08 No. procedures to enforce a contract...

*111.2.9 1. 07 Software piracy rate,%software installed...83.79 1. 08 No. procedures to enforce a contract...

*143.2.2 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*84.3.5 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*147.2.0 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*103.3.1 1. 07 Software piracy rate,%software installed...75.73 1. 08 No. procedures to enforce a contract...

*10.5.7 1. 07 Software piracy rate,%software installed...30.43 1. 08 No. procedures to enforce a contract...

*58.3.9 1. 07 Software piracy rate,%software installed...28.41 1. 08 No. procedures to enforce a contract...

*29.4.8 1. 07 Software piracy rate,%software installed...34.48 1. 08 No. procedures to enforce a contract...

*71.3.7 1. 07 Software piracy rate,%software installed...58.63 1. 08 No. procedures to enforce a contract...

*55.3.9 1. 07 Software piracy rate,%software installed...98.86 1. 08 No. procedures to enforce a contract...

*122.2.8 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*19.5.4 1. 07 Software piracy rate,%software installed...19.34 1. 08 No. procedures to enforce a contract...

*34.4.6 1. 07 Software piracy rate,%software installed...17.31 1. 08 No. procedures to enforce a contract...

*67.3.7 1. 07 Software piracy rate,%software installed...34.48 1. 08 No. procedures to enforce a contract...

*83.3.5 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*11.5.7 1. 07 Software piracy rate,%software installed...3...21 1. 08 No. procedures to enforce a contract...

*36.4.6 1. 07 Software piracy rate,%software installed...50.58 1. 08 No. procedures to enforce a contract...

*73.3.6 1. 07 Software piracy rate,%software installed...78.76 1. 08 No. procedures to enforce a contract...

*86.3.4 1. 07 Software piracy rate,%software installed...81.78 1. 08 No. procedures to enforce a contract...

*48.4.0 1. 07 Software piracy rate,%software installed...25.40 1. 08 No. procedures to enforce a contract...

*62.3.8 1. 07 Software piracy rate,%software installed...52.59 1. 08 No. procedures to enforce a contract...

*140.2.3 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*64.3.8 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*51.4.0 1. 07 Software piracy rate,%software installed...44.54 1. 08 No. procedures to enforce a contract...

*136.2.4 1. 07 Software piracy rate,%software installed...71.71 1. 08 No. procedures to enforce a contract...

*92.3.3 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*68.3.7 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*146.2.2 1. 07 Software piracy rate,%software installed...104.90 1. 08 No. procedures to enforce a contract...

*66.3.7 1. 07 Software piracy rate,%software installed...44.54 1. 08 No. procedures to enforce a contract...

*6...5. 9 1. 07 Software piracy rate,%software installed...2...20 1. 08 No. procedures to enforce a contract...

*54.3.9 1. 07 Software piracy rate,%software installed...62.66 1. 08 No. procedures to enforce a contract...

*108.2.9 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*89.3.4 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*30.4.8 1. 07 Software piracy rate,%software installed...47.55 1. 08 No. procedures to enforce a contract...

*127.2.7 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*28.4.9 1. 07 Software piracy rate,%software installed...30.43 1. 08 No. procedures to enforce a contract...

*132.2.5 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*49.4.0 1. 07 Software piracy rate,%software installed...48.57 1. 08 No. procedures to enforce a contract...

*77.3.6 1. 07 Software piracy rate,%software installed...48.57 1. 08 No. procedures to enforce a contract...

*125.2.7 1. 07 Software piracy rate,%software installed...104.90 1. 08 No. procedures to enforce a contract...

*134.2.5 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*76.3.6 1. 07 Software piracy rate,%software installed...83.79 1. 08 No. procedures to enforce a contract...

*90.3.3 1. 07 Software piracy rate,%software installed...62.66 1. 08 No. procedures to enforce a contract...

*90.3.3 1. 07 Software piracy rate,%software installed...62.66 1. 08 No. procedures to enforce a contract...

*129.2.7 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*126.2.7 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*41.4.3 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*117.2.9 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*9...5. 7 1. 07 Software piracy rate,%software installed...14.27 1. 08 No. procedures to enforce a contract...

*3...6. 0 1. 07 Software piracy rate,%software installed...4...22 1. 08 No. procedures to enforce a contract...

*82.3.5 1. 07 Software piracy rate,%software installed...83.79 1. 08 No. procedures to enforce a contract...

*121.2.8 1. 07 Software piracy rate,%software installed...91.82 1. 08 No. procedures to enforce a contract...

*15.5.5 1. 07 Software piracy rate,%software installed...14.27 1. 08 No. procedures to enforce a contract...

*24.5.2 1. 07 Software piracy rate,%software installed...53.61 1. 08 No. procedures to enforce a contract...

*109.2.9 1. 07 Software piracy rate,%software installed...98.86 1. 08 No. procedures to enforce a contract...

*35.4.6 1. 07 Software piracy rate,%software installed...72.72 1. 08 No. procedures to enforce a contract...

*141.2.3 1. 07 Software piracy rate,%software installed...93.83 1. 08 No. procedures to enforce a contract...

*120.2.8 1. 07 Software piracy rate,%software installed...65.67 1. 08 No. procedures to enforce a contract...

*78.3.6 1. 07 Software piracy rate,%software installed...70.70 1. 08 No. procedures to enforce a contract...

*72.3.7 1. 07 Software piracy rate,%software installed...40.53 1. 08 No. procedures to enforce a contract...

*38.4.5 1. 07 Software piracy rate,%software installed...25.40 1. 08 No. procedures to enforce a contract...

*7...5. 9 1. 07 Software piracy rate,%software installed...29.42 1. 08 No. procedures to enforce a contract...

*4...6. 0 1. 07 Software piracy rate,%software installed...38.50 1. 08 No. procedures to enforce a contract...

*110.2.9 1. 07 Software piracy rate,%software installed...58.63 1. 08 No. procedures to enforce a contract...

*113.2.9 1. 07 Software piracy rate,%software installed...58.63 1. 08 No. procedures to enforce a contract...

*33.4.7 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*27.5.0 1. 07 Software piracy rate,%software installed...39.51 1. 08 No. procedures to enforce a contract...

*96.3.2 1. 07 Software piracy rate,%software installed...81.78 1. 08 No. procedures to enforce a contract...

*115.2.9 1. 07 Software piracy rate,%software installed...72.72 1. 08 No. procedures to enforce a contract...

*46.4.1 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*87.3.4 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*2...6. 1 1. 07 Software piracy rate,%software installed...18.33 1. 08 No. procedures to enforce a contract...

*65.3.7 1. 07 Software piracy rate,%software installed...25.40 1. 08 No. procedures to enforce a contract...

*42.4.2 1. 07 Software piracy rate,%software installed...33.46 1. 08 No. procedures to enforce a contract...

*18.5.5 1. 07 Software piracy rate,%software installed...20.35 1. 08 No. procedures to enforce a contract...

*50.4.0 1. 07 Software piracy rate,%software installed...32.44 1. 08 No. procedures to enforce a contract...

*63.3.8 1. 07 Software piracy rate,%software installed...95.84 1. 08 No. procedures to enforce a contract...

*118.2.9 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*52.4.0 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*16.5.5 1. 07 Software piracy rate,%software installed...7...24 1. 08 No. procedures to enforce a contract...

*5...6. 0 1. 07 Software piracy rate,%software installed...10.25 1. 08 No. procedures to enforce a contract...

*23.5.2 1. 07 Software piracy rate,%software installed...22.37 1. 08 No. procedures to enforce a contract...

*93.3.2 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*102.3.1 1. 07 Software piracy rate,%software installed...72.72 1. 08 No. procedures to enforce a contract...

*128.2.7 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*91.3.3 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*97.3.2 1. 07 Software piracy rate,%software installed...76.74 1. 08 No. procedures to enforce a contract...

*74.3.6 1. 07 Software piracy rate,%software installed...57.62 1. 08 No. procedures to enforce a contract...

*119.2.8 1. 07 Software piracy rate,%software installed...n/a n/a 1. 08 No. procedures to enforce a contract...

*133.2.5 1. 07 Software piracy rate,%software installed...95.84 1. 08 No. procedures to enforce a contract...

*20.5.3 1. 07 Software piracy rate,%software installed...22.37 1. 08 No. procedures to enforce a contract...

*8...5. 8 1. 07 Software piracy rate,%software installed...12.26 1. 08 No. procedures to enforce a contract...

*25.5.2 1. 07 Software piracy rate,%software installed...1...19 1. 08 No. procedures to enforce a contract...

*45.4.1 1. 07 Software piracy rate,%software installed...67.68 1. 08 No. procedures to enforce a contract...

*148.1.6 1. 07 Software piracy rate,%software installed...101.88 1. 08 No. procedures to enforce a contract...

*116.2.9 1. 07 Software piracy rate,%software installed...89.81 1. 08 No. procedures to enforce a contract...

*138.2.4 1. 07 Software piracy rate,%software installed...103.89 1. 08 No. procedures to enforce a contract...

*57.3.9 1. 07 Software piracy rate,%software installed...91.82 1. 08 No. procedures to enforce a contract...

*106.3.0 1. 07 Software piracy rate,%software installed...108.92 1. 08 No. procedures to enforce a contract...

*261 1. 07 Software piracy rate...262 1. 08 Number of procedures to enforce a contract...

n/a 1. 07 Software piracy rate Unlicensed software units as a percentage of total software units installed 2011 SOURCE:

2011 BSA Global Software Piracy Study (ninth edition) 2014 World Economic Forum The Global Information technology Report 2014 263 3:

US Central intelligence agency (CIA), The World Factbook (accessed November 11, 2013) 1 2009 2 2010 3 2012 2014 World Economic Forum The Global Information technology Report

World Economic Forum, Executive Opinion Survey, 2012 and 2013 editions 1. 07 Software piracy rate Unlicensed software units as a percentage of total software

units installed 2011 This measure covers piracy of all packaged software that runs on personal computers (PCS),

systems software such as databases and security packages; business applications; and consumer applications such as games, personal finance,

2011 BSA Global Software Piracy Study (ninth edition) 1. 08 Number of procedures to enforce a contract Number of procedures to resolve a dispute,

US Central intelligence agency (CIA), The World Factbook (accessed November 11, 2013) 2014 World Economic Forum The Global Information technology Report 2014 325 Technical Notes and Sources 3. 02 Mobile network coverage rate Percentage of total

Internet servers per million population 2012 Secure Internet servers are servers using encryption technology in Internet transactions.

and policy in areas including cybersecurity, big data, the Internet of things, and the economic impact of digital technologies.

Jess Hemerly Jess Hemerly is a Senior Public Policy and Government affairs analyst at Google, focusing on privacy and security, data-driven innovation, and accessibility.

IP-enabled services, wireless and spectrum policy, security, privacy, Internet governance, and ICT development. He joined Cisco in July 2005 from the FCC,

Professor, Graduate school of Media Design Heizo Takenaka, Director, Global security Research Institute Jiro Tamura, Professor of Law, Keio University In cooperation with Keizai Doyukai (Japan

dives deeper into the rewards and risks that derive from the advent of big data. In addition, the Report includes detailed profiles for the 148 economies covered this year together with data tables for each of the 54 indicators used in the computation of the NRI.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011