Fast Forward - Technology Developments By 2040

As the pace of  technology advances surges ahead and  IT systems become increasingly interlinked, it is vital to know how these technology advances could impact the world, in order to take steps to prevent the worst outcomes.

Now, expert futurists have forecast how rapid technological changes might shape our world by 2040 and consider the world of digital technology and how things might develop in the next 15 years.  From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040.

Using a Delphi study, a well known technique for forecasting, a team of cyber security researchers led by academics from Lancaster University interviewed 12 experts in the future of technologies. These selected  experts were asked how particular technologies may develop and change our world over the next 15 years, what risks they might pose, and how to address the challenges that may arise. 

The forecasts were published by the Inst. of Elecrrica & Electronic lEngineers (IEEE)  titles Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability. The lead researcher of the study is Dr. Charles Weir, Lecturer at Lancaster University’s School of Computing and Communications,said “Technology advances have brought, and will continue to bring, great benefits... We also know there are risks around some of these technologies, including AI, and where their development may go, everyone’s been discussing them, but the possible magnitude of some of the risks forecast by some of the experts was staggering." 

By forecasting what potential risks lie just over the horizon, steps can be taken to avoid the  major anticipated problems.

According to Techxplore, most of the experts forecasted exponential growth in AI over the next 15 years, with many expressing concerns about cutting corners in the development of safe AI, possibly driven by nation-states seeking competitive advantage. Most of the experts questioned were also concerned that technological advances will ease the spread of misinformation, which in turn has the potential to make it harder for people to tell the difference between truth and fiction, with ramifications for democracies.

Other technologies were forecast to not have as big of an impact by 2040, including Quantum Computing which experts see as having impacts over a much longer timescale, and Blockchain which was dismissed as a major factor by most of the experts.

These are the experts’ forecasts for the year 2040, as provided by Techxplore:

  • Competition between nation-states and big tech companies will lead to corners being cut in the development of safe AI.
  • Quantum computing will have a limited impact.
  • There will be ownership of public web assets and these will be identified and traded through digital tokens.
  • It will be harder to distinguish truth from fiction because widely accessible AI can massively generate doubtful content.
  • There will be less ability to distinguish accidents from criminal incidents due to the decentralised nature and complexity of systems.

This study includes some suggested solutions for some of the concerns raised, including that governments consider  introducing AI safety guidelines, new laws to regulate AI safety, and having universities introduce courses combining technical skills and legislation.

Lancaster University:    Lancaster University:   Techxplore:     I-HLS:       Science Daily:     IEEE Xplore:   

IEEE Xplore:     Weir, Dyson, Jogunola & Dennis:     WDiarium:     Image: Allison Saeng

You Might Also Read: 

A Brief History Of Artificial Intelligence & Its Potential Future: (£)

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Reducing The Risk Of Weak Links With Consolidation
Russia Affected By Mysterious Nationwide Internet Outage »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

National Cybersecurity Consortium (NCC) - Canada

National Cybersecurity Consortium (NCC) - Canada

The NCC’s mandate is to keep Canada’s cyber and critical infrastructures and citizens safe while ensuring Canada’s global competitiveness and leadership in cybersecurity.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

XeneX

XeneX

XeneX Cloud Security Services address enterprise-class security challenges by enabling DevOps and Security teams to access a shared source of truth.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.