This work emphasizes the existence of instruments for the protection of intangible cultural heritage with primacy at federal level, both in administrative and jurisdictional terms, considering the participation in the National Program of Intangible Heritage, which was documented from the analysis of the legislation in force and the doctrine pertinent to the subject, contained in books and scientific publications. Thus, the method used for the research was the monographic one, whose research techniques consisted in the documentary analysis of normative instruments of several norms.
During the last few years, the amount of information and services available and used in electronic form has increased almost exponentially. These types of digital information and services constitute a new general class of goods, which we call Intangible Goods. Intangible goods having distinct characteristics from their counterpart tangible ones, that require specialized approaches when accessed and traded over the Internet. Of major importance in the commercialization and trading of intangible goods and services is security. What is needed, is not only the secure transmission of the data but also models and methods for ensuring the protection of intellectual property, user authentication etc. Three papers describing different issues in these areas are presented in the first part of the minitrack.The first paper, ¿Models and Languages for Digital Rights¿ by Gunter and Wright, presents an approach to describing digital rights through abstract models and policy description languages. The model allows the owner of an intangible good to describe with precision the terms and conditions under which the good is accessed by the consumer. The described model provides a starting point for a precise analysis of the capabilities for specifying and understanding digital rights.The second paper, ¿Development of Personal Authentication System Using a Fingerprint with Digital Signature Technologies¿, by Isobe, Seto and Kataoka, presents a prototype biometrics-based personal authentication system in which smart card and fingerprint verification technologies are combined. By combining smart card and fingerprint verification, they provide a simple and robust method for authentication of the user.In the third paper, ¿Steganographic Watermarking for Documents¿, by Bogarin, Baran and Gomez, a prototype system that seals text documents is presented. The system allows the insertion of digital marks or patterns that are not easily perceived when viewed under ordinary word processors or text editors. This way information like document authenticity as well as right access, can be undetectably incorporated in the structure and content of the document itself.The second part of the presentations deals with systems and models for (electronic) commerce. The paper by Jazayeri and Podnar, ¿A Business and Domain Model for Information Commerce¿, presents a business model for the information marketplace using the UML. It defines goals and responsibilities of information customers, information providers and intermediaries providing a model for the emerging information marketplace, so that potential new technical and business opportunities can be identified.The next paper, ¿WebXice : an infrastructure for information commerce on the WWW¿ by Wombacher, Kostaki and Aberer, focuses on the question, how e-commerce participants with minimal infrastructure (i.e. a standard Web browser), can be technologically enabled to participate in the information commerce, without sacrificing the functionality and security required in an information commerce scenario. A prototype implementation, webXice, demonstrates the feasibility of the task.The paper ¿Implementing B2B Contracts Using Biz-Talk¿, by Bond, Goodchild, Herring and Milosevic, describes a B2B enterprise model that supports the wide range of economic transactions associated with intangible goods and services. A prototype framework demonstrating the relevant implementation issues supports the model. In the last part of the presentations, we have two papers presenting issues for e-government related services.The paper by Fortier and Smart, ¿Web based e-government data distribution¿ discusses protocols, services and policies being developed in the context of the US government e-government directive in order to allow the general public to access e-government information on watershed health, water quality assessment and fisheries assessment. It describes three web based data distribution models with varying levels of complexity and user interaction flexibility.The last paper, ¿From Physical to Digital Delivery: Definition, Scope and Tariff Revenue Implications of Electronic Goods Trading¿, by Teltscher discusses issues related to trading of intangible goods in the global market. The differences in tariffs and trading of goods based on United Nations data between developing and developed countries serve as the basis for the analysis.
This paper constructs a data set to document firms' expenditures on an identifiable list of intangible items and examines the implications of treating intangible spending as an acquisition of final (investment) goods on GDP growth for Canada. It finds that investment in intangible capital by 2002 is almost as large as the investment in physical capital. This result is in line with similar findings for the U.S. and the U.K. Furthermore, the growth in GDP and labor productivity may be underestimated by as much as 0.1 percentage point per year during this same period
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This paper tests whether intangible capital is a substitute or, to some degree, a complement to standard inputs in the production process. The analysis is conducted for public sectors in which governmental institutions are directly responsible both for efficiently producing public goods and for investing in new production factors. The results reveal that intangible capital is a relevant input factor in the production of public goods and only weakly substitutable with other inputs.
The changing intensity and frequency of hydro-meteorological (interpreted roughly as "water-related ") hazards and the risk of extreme hazardous events is highly variable, riddled with uncertainty, and requires flexibility in the updating and revision of risk assessment and management strategies. These strategies must overcome challenges posed by a changing environment, and require a place-based approach for establishing an understanding of the local context for disaster risk reduction (DRR) and in trying to develop tailor-made strategies for a local, spatial context. This is particularly relevant given that how risks are handled and defined strongly depends upon this context, which is determined through physical characteristics as well as socio and cultural values. The basic premise for research presented in this dissertation is that DRR is achieved through minimizing risk governance deficits, encouraging good governance practices, and taking a place-based approach to better understand contextual factors and to be able to consequentially respond to the challenges posed by changing environments. Under this premise, a conceptual framework and an analysis tool were created to develop an understanding of "good" risk governance and how this can be operationalized and analyzed within different spatial contexts. The tool itself is based on an extensive policy analysis conducted using MAXQDA qualitative data analysis software to code and derive a category and indicator set for "good" risk governance at the EU level. This level was chosen as a common denominator for the analysis of on-the-ground practices and connects conceptual, policy, and in-practice understandings of "good" risk governance through its use in the analysis and comparison of over 100 qualitative interviews completed in four case study sites. The four cases, represented by catchment based delineations, are divided into two main cases (represented by the Barcelonnette catchment in Alpes des Haute Provence, France and Nehoiu catchment in Buzău County, Romania) and two satellite case (represented by the Fella River catchment in Friuli-Venezia-Giulia region, Italy and the Wieprzówka catchment in Małopolska, Poland). Main cases were chosen and results presented individually to demonstrate the depth of the use of the analysis tool; while the satellite in combination with the main cases were used to demonstrate the cross-case comparative potential and to amass findings through a multi-case breadth. Results reflect upon the analysis tool itself and the understanding of how different and often intangible principles of "good" risk governance can be interpreted and connected to in-practice strategies. The research concludes with recommendations for both the cases and, for the issues found in common across cases, at the EU level for future policy development in advancing the understanding and connection of risk governance to in-practice strategies and issues for local spatial contexts.
The Constitution protects us from our own best intentions."' During times of grave emergency, the powers granted and reserved by the federal government remain unaltered in order to avoid shortsighted solutions that would, in the long run, be worse than the current crisis. Even a simple cure for appreciable suffering may have larger implications, and the rule of law does not know whether it is constraining good or aiding evil. In the aftermath of Hurricane Katrina, the most costly natural disaster in U.S. history, the Federal Communications Commission ("FCC") imposed a shortsighted resolution that tested the boundaries of its authority. Under previously unused powers to prevent the "warehousing, hoarding, and brokering of toll-free numbers," the FCC unilaterally transferred one private party's phone number to another private party, without offering any form of compensation. An entrepreneur had originally registered the number, 1-800-RED- ARMS, for his company of the same name. When the number's use increased during earthquakes, tornadoes, and floods, he realized his fateful overlap: 1-800-RED-ARMS has the same underlying keypad sequence as 1-800-RED-CROSS (1-800-733-2767). During emergencies, the entrepreneur voluntarily routed calls to local American Red Cross chapters, charging only reimbursement costs. Failed negotiations to transfer the number permanently (the charity had steadfastly refused to pay six figures) led the Red Cross to make an emergency request to the FCC. In the wake of Hurricane Katrina, which "propelled the Red Cross into its largest U.S. relief effort in history," the FCC intervened and ordered that the number be reassigned to the Red Cross."
AbstractThe intangible flow theory explains that flows of economic material elements (such as physical goods; or cash) are consummated by human related intangible flows (such as work flows; service flows; information flows; or communicational flows) that cannot be precisely appraised at an actual or approximate value, and have properties precluding them from being classified as assets or capitals. Thus, although mathematical/quantitative research methodologies are very relevant for science, they are insufficient to study economy and society.Due to its prejudice against non‐mathematical/quantitative scientific reasoning, neoclassical economics could not be technologically prepared to reach the intangible flow dynamics of economic phenomena. Furthermore, the neoclassical solution to call people human capital or assets, besides being ethically very questionable, offers performative non‐scientific metaphors that intervene in the production of the reality they claim to represent; and sabotages the study of well delimited research questions by scientific approaches outside the realm of neoclassical economics.