Fast Forward - Technology Developments By 2040

As the pace of  technology advances surges ahead and  IT systems become increasingly interlinked, it is vital to know how these technology advances could impact the world, in order to take steps to prevent the worst outcomes.

Now, expert futurists have forecast how rapid technological changes might shape our world by 2040 and consider the world of digital technology and how things might develop in the next 15 years.  From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040.

Using a Delphi study, a well known technique for forecasting, a team of cyber security researchers led by academics from Lancaster University interviewed 12 experts in the future of technologies. These selected  experts were asked how particular technologies may develop and change our world over the next 15 years, what risks they might pose, and how to address the challenges that may arise. 

The forecasts were published by the Inst. of Elecrrica & Electronic lEngineers (IEEE)  titles Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability. The lead researcher of the study is Dr. Charles Weir, Lecturer at Lancaster University’s School of Computing and Communications,said “Technology advances have brought, and will continue to bring, great benefits... We also know there are risks around some of these technologies, including AI, and where their development may go, everyone’s been discussing them, but the possible magnitude of some of the risks forecast by some of the experts was staggering." 

By forecasting what potential risks lie just over the horizon, steps can be taken to avoid the  major anticipated problems.

According to Techxplore, most of the experts forecasted exponential growth in AI over the next 15 years, with many expressing concerns about cutting corners in the development of safe AI, possibly driven by nation-states seeking competitive advantage. Most of the experts questioned were also concerned that technological advances will ease the spread of misinformation, which in turn has the potential to make it harder for people to tell the difference between truth and fiction, with ramifications for democracies.

Other technologies were forecast to not have as big of an impact by 2040, including Quantum Computing which experts see as having impacts over a much longer timescale, and Blockchain which was dismissed as a major factor by most of the experts.

These are the experts’ forecasts for the year 2040, as provided by Techxplore:

  • Competition between nation-states and big tech companies will lead to corners being cut in the development of safe AI.
  • Quantum computing will have a limited impact.
  • There will be ownership of public web assets and these will be identified and traded through digital tokens.
  • It will be harder to distinguish truth from fiction because widely accessible AI can massively generate doubtful content.
  • There will be less ability to distinguish accidents from criminal incidents due to the decentralised nature and complexity of systems.

This study includes some suggested solutions for some of the concerns raised, including that governments consider  introducing AI safety guidelines, new laws to regulate AI safety, and having universities introduce courses combining technical skills and legislation.

Lancaster University:    Lancaster University:   Techxplore:     I-HLS:       Science Daily:     IEEE Xplore:   

IEEE Xplore:     Weir, Dyson, Jogunola & Dennis:     WDiarium:     Image: Allison Saeng

You Might Also Read: 

A Brief History Of Artificial Intelligence & Its Potential Future: (£)

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Reducing The Risk Of Weak Links With Consolidation
Russia Affected By Mysterious Nationwide Internet Outage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.