206,274 research outputs found
Recommended from our members
UK Research Information Shared Service (UKRISS) Final Report, July 2014
The reporting of research information is a complex and expensive activity for research organisations (ROs). There is little alignment between funders of the reporting requests made to institutions and requests made to individual researchers about their research outputs and outcomes. This inevitably results in duplication and increased costs across the sector, whilst limiting the potential sharing and reuse of the information. The UK Research Information Shared Service (UKRISS) project conducted a feasibility and scoping study for the reporting of research information at a national level based on CERIF (Common European Research Information Format), with the objective of increasing efficiency, productivity and quality across the sector. The aim was to define and prototype solutions which are compelling, easy to use, have a low entry barrier, and support innovative information sharing and benchmarking. CERIF has emerged as the preferred format for expressing research information across Europe. To date, CERIF has been piloted for specific applications, but not as a format for reporting requirements across all UK ROs. The final report presents the work carried out by the UKRISS project, including requirements gathering, modelling and prototyping, as well as recommendation for sustainability. UKRISS was divided into two phases. Phase 1, mapping the reporting landscape, ran from March 2012 to December 2012. Phase 2, exploring delivery of potential solutions, began in February 2013 and ended in December 2013
Evaluating a Potential US-China Bilateral Investment Treaty: Background, Context and Implications
[Excerpt] This paper, prepared by the Economist Intelligence Unit for the US-China Economic and Security Council, summarises the context, current discussions and implications of a potential US-China bilateral investment treaty (BIT). The paper is organised in six sections:
I. Existing US BITs
II. China’s current BITs with other countries
III. The potential US-China BIT
IV. Major regulatory and transparency issues
V. Implications for the US economy
VI. Interviews
Simply defined, a BIT is a treaty between two countries designed to promote and protect investments between the two signatory states. A BIT provides investors with a safer and more transparent investment environment by guarding against the risk of expropriation by the host state. Many countries, especially the larger economies, sign BITs with their main trading partners, both to ensure that companies from their country receive proper protection when they make investments abroad and to ensure that their rights can be protected and enforced through binding international arbitration
Losing the War Against Dirty Money: Rethinking Global Standards on Preventing Money Laundering and Terrorism Financing
Following a brief overview in Part I.A of the overall system to prevent money laundering, Part I.B describes the role of the private sector, which is to identify customers, create a profile of their legitimate activities, keep detailed records of clients and their transactions, monitor their transactions to see if they conform to their profile, examine further any unusual transactions, and report to the government any suspicious transactions. Part I.C continues the description of the preventive measures system by describing the government\u27s role, which is to assist the private sector in identifying suspicious transactions, ensure compliance with the preventive measures requirements, and analyze suspicious transaction reports to determine those that should be investigated.
Parts I.D and I.E examine the effectiveness of this system. Part I.D discusses successes and failures in the private sector\u27s role. Borrowing from theory concerning the effectiveness of private sector unfunded mandates, this Part reviews why many aspects of the system are failing, focusing on the subjectivity of the mandate, the disincentives to comply, and the lack of comprehensive data on client identification and transactions. It notes that the system includes an inherent contradiction: the public sector is tasked with informing the private sector how best to detect launderers and terrorists, but to do so could act as a road map on how to avoid detection should such information fall into the wrong hands. Part I.D discusses how financial institutions do not and cannot use scientifically tested statistical means to determine if a particular client or set of transactions is more likely than others to indicate criminal activity. Part I.D then turns to a discussion of a few issues regarding the impact the system has but that are not related to effectiveness, followed by a summary and analysis of how flaws might be addressed.
Part I.E continues by discussing the successes and failures in the public sector\u27s role. It reviews why the system is failing, focusing on the lack of assistance to the private sector in and the lack of necessary data on client identification and transactions. It also discusses how financial intelligence units, like financial institutions, do not and cannot use scientifically tested statistical means to determine probabilities of criminal activity. Part I concludes with a summary and analysis tying both private and public roles together.
Part II then turns to a review of certain current techniques for selecting income tax returns for audit. After an overview of the system, Part II first discusses the limited role of the private sector in providing tax administrators with information, comparing this to the far greater role the private sector plays in implementing preventive measures. Next, this Part turns to consider how tax administrators, particularly the U.S. Internal Revenue Service, select taxpayers for audit, comparing this to the role of both the private and public sectors in implementing preventive measures. It focuses on how some tax administrations use scientifically tested statistical means to determine probabilities of tax evasion. Part II then suggests how flaws in both private and public roles of implementing money laundering and terrorism financing preventive measures might be theoretically addressed by borrowing from the experience of tax administration. Part II concludes with a short summary and analysis that relates these conclusions to the preventive measures system.
Referring to the analyses in Parts I and II, Part III suggests changes to the current preventive measures standard. It suggests that financial intelligence units should be uniquely tasked with analyzing and selecting clients and transactions for further investigation for money laundering and terrorism financing. The private sector\u27s role should be restricted to identifying customers, creating an initial profile of their legitimate activities, and reporting such information and all client transactions to financial intelligence units
German and Israeli Innovation: The Best of Two Worlds
This study reviews – through desk research and expert interviews with Mittelstand companies, startups and ecosystem experts – the current status of the Israeli startup ecosystem and the Mittelstand region of North Rhine- Westphalia (NRW), Germany. As a case study, it highlights potential opportunities for collaboration and analyzes different engagement modes that might serve to connect the two regions.
The potential synergies between the two economies are based on a high degree of complementarity. A comparison of NRW’s key verticals and Israel’s primary areas of innovation indicates that there is significant overlap in verticals, such as artificial intelligence (AI), the internet of things (IoT), sensors and cybersecurity. Israeli startups can offer speed, agility and new ideas, while German Mittelstand companies can contribute expertise in production and scaling, access to markets, capital and support. The differences between Mittelstand companies and startups are less pronounced than those between startups and big corporations. However, three current barriers to fruitful collaboration have been identified: 1) a lack of access, 2) a lack of transparency regarding relevant players in the market, and 3) a lack of the internal resources needed to select the right partners, often due to time constraints or a lack of internal expertise on this issue.
To ensure that positive business opportunities ensue, Mittelstand companies and startups alike have to be proactive in their search for cooperation partners and
draw on a range of existing engagement modes (e.g., events, communities, accelerators). The interviews and the research conducted for this study made clear that no single mode of engagement can address all the needs and challenges associated with German-Israeli collaboration
The Digitalisation of African Agriculture Report 2018-2019
An inclusive, digitally-enabled agricultural transformation could help achieve meaningful livelihood improvements for Africa’s smallholder farmers and pastoralists. It could drive greater engagement in agriculture from women and youth and create employment opportunities along the value chain. At CTA we staked a claim on this power of digitalisation to more systematically transform agriculture early on. Digitalisation, focusing on not individual ICTs but the application of these technologies to entire value chains, is a theme that cuts across all of our work. In youth entrepreneurship, we are fostering a new breed of young ICT ‘agripreneurs’. In climate-smart agriculture multiple projects provide information that can help towards building resilience for smallholder farmers. And in women empowerment we are supporting digital platforms to drive greater inclusion for women entrepreneurs in agricultural value chains
Recommended from our members
The East Midlands public procurement opportunities plan
Public sector procurement activity accounts for a significant share of economic activity. This document sets out how the East Midlands can maximize the commercial benefits of these opportunities and contribute to the delivery of public policy in the region
- …