Cybersecurity Futures: How Can We Regulate Emergent Risks?

This article reviews nine socio-technical trends that are likely to shape the cybersecurity environment over the next decade. These nine trends have reached various levels of maturity, and some – such as quantum computing – are still theoretically contentious. These trends are: cloud computing; big...

Full description

Bibliographic Details
Main Author: Benoit Dupont
Format: Article
Language:English
Published: Carleton University 2013-07-01
Series:Technology Innovation Management Review
Subjects:
Online Access:http://timreview.ca/sites/default/files/article_PDF/Dupont_TIMReview_July2013.pdf
_version_ 1828434195353960448
author Benoit Dupont
author_facet Benoit Dupont
author_sort Benoit Dupont
collection DOAJ
description This article reviews nine socio-technical trends that are likely to shape the cybersecurity environment over the next decade. These nine trends have reached various levels of maturity, and some – such as quantum computing – are still theoretically contentious. These trends are: cloud computing; big data; the Internet of Things; the mobile Internet; brain–computer interfaces; near field communication payment systems; mobile robots; quantum computing; and the militarization of the Internet. What these nine trends have in common is that they will be instrumental in generating new opportunities for offending, which will result from an exponential increase in the quantity of data, number of connection points to the Internet, and velocity of data flows that irrigate the digital ecosystem. As a result, more opportunities for malicious exploitation will be available to attackers, “security by design” will be harder to achieve in such a fluid and dynamic environment, and the performance of control mechanisms is likely to erode significantly. Technical solutions to address these challenges are already being developed by computer scientists. This article focuses on a different and complementary approach, finding inspiration in the work of regulatory scholars who have framed promising theories such as regulatory pluralism and responsive regulation to explore options for the necessary institutional adaptation to these future changes.
first_indexed 2024-12-10T18:46:52Z
format Article
id doaj.art-91720f1f41f748108af631605ef85642
institution Directory Open Access Journal
issn 1927-0321
language English
last_indexed 2024-12-10T18:46:52Z
publishDate 2013-07-01
publisher Carleton University
record_format Article
series Technology Innovation Management Review
spelling doaj.art-91720f1f41f748108af631605ef856422022-12-22T01:37:28ZengCarleton UniversityTechnology Innovation Management Review1927-03212013-07-01July 2013: Cybersecurity611Cybersecurity Futures: How Can We Regulate Emergent Risks?Benoit DupontThis article reviews nine socio-technical trends that are likely to shape the cybersecurity environment over the next decade. These nine trends have reached various levels of maturity, and some – such as quantum computing – are still theoretically contentious. These trends are: cloud computing; big data; the Internet of Things; the mobile Internet; brain–computer interfaces; near field communication payment systems; mobile robots; quantum computing; and the militarization of the Internet. What these nine trends have in common is that they will be instrumental in generating new opportunities for offending, which will result from an exponential increase in the quantity of data, number of connection points to the Internet, and velocity of data flows that irrigate the digital ecosystem. As a result, more opportunities for malicious exploitation will be available to attackers, “security by design” will be harder to achieve in such a fluid and dynamic environment, and the performance of control mechanisms is likely to erode significantly. Technical solutions to address these challenges are already being developed by computer scientists. This article focuses on a different and complementary approach, finding inspiration in the work of regulatory scholars who have framed promising theories such as regulatory pluralism and responsive regulation to explore options for the necessary institutional adaptation to these future changes.http://timreview.ca/sites/default/files/article_PDF/Dupont_TIMReview_July2013.pdfcybersecuritycybersecurity policiesdigital ecosystememerging risksforecastingregulationtechnological trends
spellingShingle Benoit Dupont
Cybersecurity Futures: How Can We Regulate Emergent Risks?
Technology Innovation Management Review
cybersecurity
cybersecurity policies
digital ecosystem
emerging risks
forecasting
regulation
technological trends
title Cybersecurity Futures: How Can We Regulate Emergent Risks?
title_full Cybersecurity Futures: How Can We Regulate Emergent Risks?
title_fullStr Cybersecurity Futures: How Can We Regulate Emergent Risks?
title_full_unstemmed Cybersecurity Futures: How Can We Regulate Emergent Risks?
title_short Cybersecurity Futures: How Can We Regulate Emergent Risks?
title_sort cybersecurity futures how can we regulate emergent risks
topic cybersecurity
cybersecurity policies
digital ecosystem
emerging risks
forecasting
regulation
technological trends
url http://timreview.ca/sites/default/files/article_PDF/Dupont_TIMReview_July2013.pdf
work_keys_str_mv AT benoitdupont cybersecurityfutureshowcanweregulateemergentrisks