Future scenarios and challenges for security and privacy

Over the past half-century, technology has evolved beyond our wildest dreams. However, while the benefits of technological growth are undeniable, the nascent Internet did not anticipate the online threats we routinely encounter and the harms which can result. As our world becomes increasingly connec...

Full description

Bibliographic Details
Main Authors: Williams, M, Axon, L, Nurse, J, Creese, S
Format: Conference item
Published: Institute of Electrical and Electronics Engineers 2016
_version_ 1797076996373610496
author Williams, M
Axon, L
Nurse, J
Creese, S
author_facet Williams, M
Axon, L
Nurse, J
Creese, S
author_sort Williams, M
collection OXFORD
description Over the past half-century, technology has evolved beyond our wildest dreams. However, while the benefits of technological growth are undeniable, the nascent Internet did not anticipate the online threats we routinely encounter and the harms which can result. As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. Through this, we distill 10 emerging scenarios and reflect on the impact these might have on a range of stakeholders. Considering gaps in best practice and requirements for further research, we explore how security and privacy might evolve over the next decade. We find that existing guidelines both fail to consider the relationships between stakeholders and do not address the novel risks from wearable devices and insider threats. Our approach rigorously analyses emerging scenarios and suggests future improvements, of crucial importance as we look to pre-empt new technological threats.
first_indexed 2024-03-07T00:11:27Z
format Conference item
id oxford-uuid:795f85af-4c4f-43b1-b442-6ffaf34bf8bc
institution University of Oxford
last_indexed 2024-03-07T00:11:27Z
publishDate 2016
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling oxford-uuid:795f85af-4c4f-43b1-b442-6ffaf34bf8bc2022-03-26T20:37:02ZFuture scenarios and challenges for security and privacyConference itemhttp://purl.org/coar/resource_type/c_5794uuid:795f85af-4c4f-43b1-b442-6ffaf34bf8bcSymplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2016Williams, MAxon, LNurse, JCreese, SOver the past half-century, technology has evolved beyond our wildest dreams. However, while the benefits of technological growth are undeniable, the nascent Internet did not anticipate the online threats we routinely encounter and the harms which can result. As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. Through this, we distill 10 emerging scenarios and reflect on the impact these might have on a range of stakeholders. Considering gaps in best practice and requirements for further research, we explore how security and privacy might evolve over the next decade. We find that existing guidelines both fail to consider the relationships between stakeholders and do not address the novel risks from wearable devices and insider threats. Our approach rigorously analyses emerging scenarios and suggests future improvements, of crucial importance as we look to pre-empt new technological threats.
spellingShingle Williams, M
Axon, L
Nurse, J
Creese, S
Future scenarios and challenges for security and privacy
title Future scenarios and challenges for security and privacy
title_full Future scenarios and challenges for security and privacy
title_fullStr Future scenarios and challenges for security and privacy
title_full_unstemmed Future scenarios and challenges for security and privacy
title_short Future scenarios and challenges for security and privacy
title_sort future scenarios and challenges for security and privacy
work_keys_str_mv AT williamsm futurescenariosandchallengesforsecurityandprivacy
AT axonl futurescenariosandchallengesforsecurityandprivacy
AT nursej futurescenariosandchallengesforsecurityandprivacy
AT creeses futurescenariosandchallengesforsecurityandprivacy