Search results
1 – 10 of 279Droughts threaten knock-on effects for areas without direct water scarcity challenges, in the form of food price pressures, increased irregular migration from displaced…
Details
DOI: 10.1108/OXAN-DB285712
ISSN: 2633-304X
Keywords
Geographic
Topical
SOUTH KOREA: Disinformation will shape elections
Details
DOI: 10.1108/OXAN-ES285324
ISSN: 2633-304X
Keywords
Geographic
Topical
AI start-ups and companies founded in the last few years in South-eastern Europe are now starting to reveal their potential. However, factors such as the brain drain and the…
Details
DOI: 10.1108/OXAN-DB284234
ISSN: 2633-304X
Keywords
Geographic
Topical
A widening income gap, coupled with a sluggish economy over the past two years, will be a disadvantage for the ruling Democratic Progressive Party in Taiwan’s presidential…
MFA involves requiring people to present more than one credential to authenticate themselves. These protocols reduce the risk and impact of credential theft, but also present…
Details
DOI: 10.1108/OXAN-DB280441
ISSN: 2633-304X
Keywords
Geographic
Topical
The trip underscored the importance that Delhi and Washington give to their partnership, with the two sides announcing various deals covering a range of areas.
Details
DOI: 10.1108/OXAN-DB280192
ISSN: 2633-304X
Keywords
Geographic
Topical
These were used to monitor the exposure risk of individuals and provide a basis to mandate quarantine or refuse access to public venues.
Details
DOI: 10.1108/OXAN-DB274770
ISSN: 2633-304X
Keywords
Geographic
Topical
China will provide technology and training, which will strengthen Beijing’s influence in South-east Asia and reinforce a growing trend towards authoritarianism in the region. The…
Details
DOI: 10.1108/OXAN-DB275198
ISSN: 2633-304X
Keywords
Geographic
Topical
SOUTH-EAST ASIA: Tech firms face tighter data rules
Details
DOI: 10.1108/OXAN-ES272207
ISSN: 2633-304X
Keywords
Geographic
Topical
Currently a theoretical threat, it could materialise in the future with wide-ranging implications. Quantum computers could be used to undermine cryptographic protection of…