Foresight of evolving security threats posed by emerging technologies

被引:10
|
作者
Hauptman, Aharon [1 ]
Sharan, Yair [1 ]
机构
[1] Tel Aviv Univ, Interdisciplinary Ctr Technol Anal & Forecasting, Tel Aviv, Israel
来源
FORESIGHT | 2013年 / 15卷 / 05期
关键词
Foresight; Security; Emerging technologies; Future threats; Signals of change; Wild cards;
D O I
10.1108/FS-05-2012-0036
中图分类号
TU98 [区域规划、城乡规划];
学科分类号
0814 ; 082803 ; 0833 ;
摘要
Purpose - Many emerging technologies are being developed in an accelerating pace and are key drivers of future change. In foresight studies, usually their positive impact on the quality of life is considered or their negative environmental effects. This paper seeks to draw attention to an overlooked "dark side'' of new technologies: their potential abuse by terrorists or organized crime. Recent cybercrime events are examples of abuse that perhaps could have been minimized if appropriate foresight studies were performed years ago. This was the aim of the recently completed EU-funded project FESTOS. Design/methodology/approach - Several foresight methodologies were employed. Following a horizon scanning for potentially threatening technologies, a Delphi-type expert survey helped to evaluate critical threat characteristics of selected 33 technologies: the likelihood that each technology will actually come to pose a security threat (in different time frames), the easiness of its malicious use, the severity of the threat, and the most threatened societal spheres. Findings - The results enabled ranking the technologies by their "abuse potential'' and "threat intensity''. Certain emerging technologies (or their combinations), regarded as "weak signals'', inspired ideas for potential "wild cards''. In a subsequent workshop, which employed a variant of the "futures wheel'' method, four wild-card" scenario sketches'' were constructed. These were later developed to full narrative scenarios. Originality/value - The entire process enables the introduction of security foresight into policy planning in a long-range perspective. The foresight results were followed by the evaluation of policy implications and coping with the knowledge control dilemma. The paper illustrates how a mix of foresight methods can help in a continuous analysis of new and threats posed by emerging technologies, thus raising awareness of decision makers and mitigating the risk of unforeseen surprises.
引用
收藏
页码:375 / 391
页数:17
相关论文
共 50 条
  • [21] Smartphone Security An overview of emerging threats.
    Grzonkowski, Slawomir
    Mosquera, Alejandro
    Aouad, Lamine
    Morss, Dylan
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2014, 3 (04) : 40 - 44
  • [22] Surveillance or Security? The Risks Posed by New Wiretapping Technologies
    McCarthy, Wil
    MEDIA WAR AND CONFLICT, 2012, 5 (03): : 290 - 293
  • [23] Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
    Boyle, Philip
    CONTEMPORARY SOCIOLOGY-A JOURNAL OF REVIEWS, 2012, 41 (02) : 221 - 223
  • [24] Surveillance or Security? The Risks Posed by New Wiretapping Technologies
    Laprise, John
    TECHNOLOGY AND CULTURE, 2012, 53 (03) : 742 - 743
  • [25] Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
    Monsour, Mitch
    INFORMATION SOCIETY, 2015, 31 (02): : 225 - 226
  • [26] Evolving skills for emerging technologies: a collaborative approach
    Brown, Jennifer
    Crocamo, James Thomas
    Bielskas, Amanda
    Ransom, Ellie
    Vanti, William B.
    Wilfong, Krystie
    LIBRARY HI TECH, 2017, 35 (03) : 346 - 359
  • [27] Emerging Viral Diseases: Confronting Threats with New Technologies
    Marston, Hilary D.
    Folkers, Gregory K.
    Morens, David M.
    Fauci, Anthony S.
    SCIENCE TRANSLATIONAL MEDICINE, 2014, 6 (253)
  • [28] An Analysis of the GDPR Compliance Issues Posed by New Emerging Technologies
    Mone, Varda
    Sivakumar, C. L. V.
    LEGAL INFORMATION MANAGEMENT, 2022, 22 (03) : 166 - 174
  • [29] INVESTMENT PORTFOLIO PRIORITIZATION FOR EMERGING HOMELAND SECURITY THREATS
    Stromgren, Chel
    Lara, Gabriel
    Hendrickson, Jennifer
    Mapar, Jalal
    2018 WINTER SIMULATION CONFERENCE (WSC), 2018, : 2769 - 2780
  • [30] Understanding Security Threats in Emerging Neuromorphic Computing Architecture
    Chidhambaranathan Rajamanikkam
    Rajesh JS
    Sanghamitra Roy
    Koushik Chakraborty
    Journal of Hardware and Systems Security, 2021, 5 (1) : 45 - 57