Search results

1 – 10 of 23
Expert briefing
Publication date: 21 April 2021

The proposal is part of the EU’s wider effort to make Europe ‘fit for the digital age’ and align the bloc with other major democracies, particularly the United States, on…

Details

DOI: 10.1108/OXAN-DB260983

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 29 September 2017

The meeting took place against a background of persisting tensions between European authorities and the mainly US-owned digital giants over questions of data protection and…

Expert briefing
Publication date: 18 March 2021

Relatively low internet penetration rates (an average of 40% across the continent) and stark differences in digital access within and across states mask social media’s increasing…

Expert briefing
Publication date: 17 June 2016

EU/US tensions on internet economy

Expert briefing
Publication date: 3 May 2024

Despite a strong Chinese push on AI innovation, Beijing’s regulatory approach to AI sharply contrasts with the approaches of Western digital economies, notably the United States…

Expert briefing
Publication date: 19 October 2015

The ECJ ruling could add to potential disruptions to transatlantic commercial data flows arising from the EU's developing data protection regime that a study for the US Chamber of…

Expert briefing
Publication date: 8 March 2022

The Biden administration has continued the hawkish foreign policy stance towards Beijing adopted by his predecessor, Donald Trump, maintaining the central aspects around trade and…

Details

DOI: 10.1108/OXAN-DB267785

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 15 February 2016

The European Commission and the US government on February 2 announced a political agreement in principle on rules to govern the transfer of data between them: the EU-US Privacy…

Expert briefing
Publication date: 14 September 2022

Currently a theoretical threat, it could materialise in the future with wide-ranging implications. Quantum computers could be used to undermine cryptographic protection of…

1 – 10 of 23