Fast Forward - Technology Developments By 2040

As the pace of  technology advances surges ahead and  IT systems become increasingly interlinked, it is vital to know how these technology advances could impact the world, in order to take steps to prevent the worst outcomes.

Now, expert futurists have forecast how rapid technological changes might shape our world by 2040 and consider the world of digital technology and how things might develop in the next 15 years.  From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040.

Using a Delphi study, a well known technique for forecasting, a team of cyber security researchers led by academics from Lancaster University interviewed 12 experts in the future of technologies. These selected  experts were asked how particular technologies may develop and change our world over the next 15 years, what risks they might pose, and how to address the challenges that may arise. 

The forecasts were published by the Inst. of Elecrrica & Electronic lEngineers (IEEE)  titles Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability. The lead researcher of the study is Dr. Charles Weir, Lecturer at Lancaster University’s School of Computing and Communications,said “Technology advances have brought, and will continue to bring, great benefits... We also know there are risks around some of these technologies, including AI, and where their development may go, everyone’s been discussing them, but the possible magnitude of some of the risks forecast by some of the experts was staggering." 

By forecasting what potential risks lie just over the horizon, steps can be taken to avoid the  major anticipated problems.

According to Techxplore, most of the experts forecasted exponential growth in AI over the next 15 years, with many expressing concerns about cutting corners in the development of safe AI, possibly driven by nation-states seeking competitive advantage. Most of the experts questioned were also concerned that technological advances will ease the spread of misinformation, which in turn has the potential to make it harder for people to tell the difference between truth and fiction, with ramifications for democracies.

Other technologies were forecast to not have as big of an impact by 2040, including Quantum Computing which experts see as having impacts over a much longer timescale, and Blockchain which was dismissed as a major factor by most of the experts.

These are the experts’ forecasts for the year 2040, as provided by Techxplore:

  • Competition between nation-states and big tech companies will lead to corners being cut in the development of safe AI.
  • Quantum computing will have a limited impact.
  • There will be ownership of public web assets and these will be identified and traded through digital tokens.
  • It will be harder to distinguish truth from fiction because widely accessible AI can massively generate doubtful content.
  • There will be less ability to distinguish accidents from criminal incidents due to the decentralised nature and complexity of systems.

This study includes some suggested solutions for some of the concerns raised, including that governments consider  introducing AI safety guidelines, new laws to regulate AI safety, and having universities introduce courses combining technical skills and legislation.

Lancaster University:    Lancaster University:   Techxplore:     I-HLS:       Science Daily:     IEEE Xplore:   

IEEE Xplore:     Weir, Dyson, Jogunola & Dennis:     WDiarium:     Image: Allison Saeng

You Might Also Read: 

A Brief History Of Artificial Intelligence & Its Potential Future: (£)

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Reducing The Risk Of Weak Links With Consolidation
Russia Affected By Mysterious Nationwide Internet Outage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.

Arcfield

Arcfield

Arcfield protects the nation and its allies through innovations in systems engineering and integration, space and mission launch assurance, cybersecurity, and missile support.