As technology becomes integrated into more aspects of our lives, the profile of risks associated with technology is also expanding. New advances in many kinds of technologies pose potentially, significant ethical challenges (e.g. ‘Artificial intelligence’ (AI), ‘Biotechnology’, or decarbonization technologies). This coincides with our increasing use of these technologies, creating potential risks at a macro-level (e.g. cybersecurity of a nation’s critical infrastructures) and at a micro-level (e.g. security of personal data and individuals’ vulnerability to online manipulation). Such risks are certainly to be expected with the advent of disruptive technologies and they are the price we have to pay for the great benefits these technologies offer us; it is a question of how well we recognize and mitigate these risks so as to ensure that new technologies can be used for the benefit of all.
Society trends
Many governments around the world are turning their attention to the ethics of technology and the implications of fast-developing technology for future societies.
Ethics related to the use of ‘Artificial intelligence’ for automated vehicles, automated decisions, and consumer interactions are topics that are frequently raised[1] and governments will increasingly be expected to address concerns around digital harm, disinformation, antitrust and foreign interference.[2] The AI-enabled technologies of the future must benefit from effective ‘technical, legal, and ethical frameworks’, according to the UK Ministry of Defence. Ethical questions are perhaps most critical in the area of militarized AI, and the use of technology in conflict. While machines could behave without regard for human suffering, they may also more accurately calculate the costs of conflict. Complexities can be expected to arise if countries develop conflicting ethical and legal frameworks for AI, both in military contexts and more broadly.[3] Other key ethical issues related to AI systems are about unwanted bias, eavesdropping, and safety, and industry is already busy trying to address these. The ISO/IEC committee working on AI (ISO/IEC JTC 1/SC 42) has collected 132 use cases for AI, including ethical considerations and societal concerns for each (for more details, see ISO/IEC TR 24030:2021, Information technology – Artificial intelligence (AI) – Use cases).
When considering the ethics of using AI, however, it is equally important to consider the ethics of not using AI. The risks of using AI are frequently discussed, but one question that is not addressed often enough is – when does it become unethical for us not to use AI? For example, if AI technology could predict the next pandemic or speed up vaccine development, one could argue that it would be unethical not to use this technology. There are plenty of examples like this, for instance, a common question posed is: if an AI-enabled autonomous vehicle had to hit someone, who should it hit? But is this the right question if the proper use of AI-enabled autonomous driving can help save lives by reducing accidents overall?
Of course, AI is not the only emerging technology that could pose significant ethical challenges in the future. Advancements in biotechnology could – alone, or in combination with AI – lead to the creation of synthetic life forms or augmented human beings, with enhanced physical or cognitive abilities. How to regulate technologies that can fundamentally alter human capabilities or change the human gene pool “could prompt strident domestic and international battles” in coming decades (see ‘Gene editing’).[4] Even technological advances to treat diseases could engender political debates about the ethics of access (since treatments are likely to be available only to those who can afford them).[4] Not to mention continued ethical debates about genetically engineered crops and foods and their potential ecological or health-related consequences.[5]
As the climate crisis becomes more urgent, we may also soon face ethical issues related to the use of new technologies for decarbonization. While geoengineering technologies (carbon dioxide [CO2] removal and solar-radiation management) have for many years been considered morally unacceptable, they are now gaining more attention as potential solutions of last resort.[6] Ethical concerns here range from distributive justice for future generations or vulnerable populations (negative effects of geoengineering actions could disproportionately some countries or populations e.g. by increasing drought in Africa and Asia), to procedural justice questions (who should decide to use these technologies and how?).
Related trends
News stories
- Опубликовано 3532 | Проекты на стандии разработки 520
- Trustworthiness — Vocabulary
- Опубликовано 33 | Проекты на стандии разработки 35
- ISO/IEC DTS 6254 [В настоящее время на стадии разработки]Information technology — Artificial intelligence — Objectives and approaches for explainability and interpretability of ML models and AI systems
- Information technology — Artificial intelligence — Treatment of unwanted bias in classification and regression machine learning tasks
- ISO/IEC DIS 12792 [В настоящее время на стадии разработки]Information technology — Artificial intelligence — Transparency taxonomy of AI systems
- ISO/IEC AWI TS 22443 [В настоящее время на стадии разработки]Information technology — Artificial intelligence — Guidance on addressing societal concerns and ethical considerations
- Information technology — Artificial intelligence — Guidance on risk management
- Information technology — Artificial intelligence — Overview of trustworthiness in artificial intelligence
- Information technology — Artificial intelligence — Overview of ethical and societal concerns
- Information technology — Governance of IT — Governance implications of the use of artificial intelligence by organizations
- Information technology — Artificial intelligence — Management system
- Опубликовано 4 | Проекты на стандии разработки 1
- Road traffic safety (RTS) — Guidance on ethical considerations relating to safety for autonomous vehicles
- Опубликовано 40 | Проекты на стандии разработки 4
- Ethical claims and supporting information — Principles and requirements
- Опубликовано 610 | Проекты на стандии разработки 103
- ISO/IEC DIS 21617-1 [В настоящее время на стадии разработки]Information technology — JPEG TrustPart 1: Core foundation
- ISO/IEC AWI 21617-2 [В настоящее время на стадии разработки]Information technology — JPEG TrustPart 2: Trust profiles catalogue
“Trust and accountability are the new litmus tests for businesses in a world where digital is everywhere.”[7]
In the future, will data privacy be a thing of the past? Many sources agree that there is a clear trend towards the progressive loss of privacy that accompanies new developments in technology. According to the UK Ministry of Defence, “In the coming decades, every facet of one’s life is likely to be recorded by the ubiquitous presence of wearable devices, smart sensors and the ‘Internet of Things’”.[3] But at the same time, there is also a trend towards emphasizing privacy, for example, using privacy by design development. Once privacy-respecting technology is available, the market has the choice, and the global success of the European Union’s General Data Protection Regulation (GDPR) principles is an indicator of this trend.[8]
The use of biometric data, such as fingerprints and facial mapping, is increasing in both private (e.g. social media and personal technology products) and public (law enforcement and population surveillance) contexts.[9,10] Consumer trust will be an increasingly important issue as technology becomes increasingly prolific in everyday activities. Already, a majority of consumers are wary of connected devices and fearful of misuse of their personal data.[7,11] Some even suggest there may be a ‘digital bubble’, the bursting of which will be due in part to privacy concerns – “Concerns about data privacy have called into question whether digital technologies will continue to grow at this rate.”.[11] At the same time, companies are adjusting to market conditions and, if the market demands privacy, industry will develop appropriate products.[7] Industry needs to realize that privacy-respecting products are not much more expensive (if well done), but can instead provide a competitive advantage, since trust is a key decision factor for consumers faced with multiple options. Initiatives allowing the creation of ‘digital trust’, such as Yelp and Foursquare, are thus likely to grow in popularity.[12] Once society acknowledges that data has a value and therefore the data owner needs to be paid, a ‘new balance’ will be established. The question is, if and when such an acknowledgement may come…?
In the meantime, to reassure consumers, both government regulation and business leadership are necessary to establish privacy and data management standards that keep pace with emerging needs.[10] Indeed, this will be a growing consumer expectation.[7] Ultimately, it seems inevitably that technology will permeate almost everything we do and lead to enormous improvements in quality of life across society. However, these benefits will need to be carefully balanced with the accompanying risks to privacy and security.[12]
Related trends
News stories
- Опубликовано 247 | Проекты на стандии разработки 72
- ISO/IEC CD 5181 [В настоящее время на стадии разработки]Information technology — Security and privacy — Data provenance
- Information security, cybersecurity and privacy protection — Biometric information protection
- ISO/IEC DIS 24760-1 [В настоящее время на стадии разработки]IT Security and Privacy — A framework for identity managementPart 1: Terminology and concepts
- ISO/IEC DIS 24760-3 [В настоящее время на стадии разработки]IT Security and Privacy — A framework for identity managementPart 3: Practice
- ISO/IEC WD 24760-4.4 [В настоящее время на стадии разработки]IT Security and Privacy — A framework for identity managementPart 4: Authenticators, Credentials and Authentication
- ISO/IEC FDIS 27706 [В настоящее время на стадии разработки]Requirements for bodies providing audit and certification of privacy information management systems
- ISO/IEC WD 27091.2 [В настоящее время на стадии разработки]Cybersecurity and Privacy — Artificial Intelligence — Privacy protection
- Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devicesPart 1: Local modes
- ISO/IEC DIS 27553-2 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devicesPart 2: Remote modes
- Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework
- Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management
- Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework
- Privacy technologies — Consent record information structure
- Information security, cybersecurity and privacy protection — Privacy operationalisation model and method for engineering (POMME)
- ISO/IEC FDIS 27562 [В настоящее время на стадии разработки]Information technology — Security techniques — Privacy guidelines for fintech services
- Security and privacy in artificial intelligence use cases — Best practices
- ISO/IEC DIS 27565 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero knowledge proofs
- ISO/IEC DIS 27566-1 [В настоящее время на стадии разработки]Information technology, cybersecurity and privacy protection — Age assurance systemsPart 1: Framework
- ISO/IEC WD 27566-3.2 [В настоящее время на стадии разработки]Information technology, cybersecurity and privacy protection — Age assurance systemsPart 3: Benchmarks for benchmarking analysis
- ISO/IEC DIS 27701.2 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance
- Information technology — Security techniques — Privacy framework
- Information technology — Security techniques — Guidelines for privacy impact assessment
- Опубликовано 110 | Проекты на стандии разработки 19
- ISO/IEC DIS 15944-8 [В настоящее время на стадии разработки]Information technology — Business operational viewPart 8: Identification of privacy protection requirements as external constraints on business transactions
- ISO/IEC DIS 15944-12 [В настоящее время на стадии разработки]Information technology — Business operational viewPart 12: Privacy protection requirements (PPR) on information life cycle management (ILCM) and EDI of personal information (PI)
- Information technology — Business operational viewPart 17: Fundamental principles and rules governing Privacy-by-Design (PbD) requirements in an EDI and collaboration space context
- Опубликовано 55 | Проекты на стандии разработки 12
- ISO/IEC DIS 29187-1 [В настоящее время на стадии разработки]Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET)Part 1: Framework and reference model
- Опубликовано 32 | Проекты на стандии разработки 6
- ISO/AWI 30439 [В настоящее время на стадии разработки]Human Resource Management — Safe Handling of Data
- Опубликовано 2
- Consumer protection — Privacy by design for consumer goods and servicesPart 1: High-level requirements
- Consumer protection — Privacy by design for consumer goods and servicesPart 2: Use cases
Increasing reliance on technology and the proliferation of digital devices in daily life will create increasing risks related to ‘Data privacy’, cyberattacks, and consequences of system failure.[3,13] The key factor for prevention is risk awareness and proactive risk mitigation.
New digital technologies present serious challenges for governments and organizations and cybersecurity will remain a priority as critical infrastructure is increasingly connected to online systems and technological dependence on the Internet continues to rise (see ‘Spread of the Internet’). Internationally, countries will have to respond to evolving cyber-threats and prepare for cyberattacks as an instrument of war, counterintelligence, and political interference.[9,13,14] One data breach can impact multiple nations sharing online systems.[15] If they are aware, national leaders may take appropriate steps to protect large-scale systems such as electrical, communications, financial, logistical, and food-production grids.[9] They need to be proactive. Common Criteria for Information Technology Security Evaluation or the EU Cybersecurity Act are two examples of such proactive ventures.
Questions around ‘cyber borders’ may be part of the discussion around ensuring protection from attacks therefore countries and organizations alike must prepare for developments in cyber-crime.[3] As increasing numbers of citizens are connected to, and reliant on, online networks, the potential for terrorist attacks will grow, if the system is not resilient enough and sufficiently protected.[9] For developing countries in particular, preparedness for cyber-threats will need to accompany digitalization programmes and development of connected systems.[16]
Finally, cyber-vulnerability does not exist only at the level of countries and organizations. Looked at from a slightly different perspective, the vulnerability of individuals is also set to increase because of their online exposure. For example, more people will get their information online, leaving them potentially more exposed to misinformation (‘fake news’), which could be used to manipulate individuals or even on a larger scale to influence public opinion.[13]
To effectively mitigate these risks related to cyber-vulnerability, people cannot rely on government action alone – society needs to be the driving force. Society needs to demand that organizations maintain highly sophisticated information security systems to foster consumer trust and remain competitive.[2]
Related trends
News stories
- Опубликовано 247 | Проекты на стандии разработки 72
- Cybersecurity — Multi-party coordinated vulnerability disclosure and handling
- Cybersecurity — Security considerations throughout the product life cycle
- ISO/IEC DIS 15408-1 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Evaluation criteria for IT securityPart 1: Introduction and general model
- ISO/IEC DIS 15408-2 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Evaluation criteria for IT securityPart 2: Security functional components
- ISO/IEC DIS 15408-3 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Evaluation criteria for IT securityPart 3: Security assurance components
- ISO/IEC DIS 15408-4 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Evaluation criteria for IT securityPart 4: Framework for the specification of evaluation methods and activities
- ISO/IEC DIS 15408-5 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Evaluation criteria for IT securityPart 5: Pre-defined packages of security requirements
- ISO/IEC DIS 18045 [В настоящее время на стадии разработки]Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
- Cybersecurity — Security reference model for industrial internet platform (SRM- IIP)
- ISO/IEC 27031 [В настоящее время на стадии разработки]Cybersecurity — Information and communication technology readiness for business continuity
- Cybersecurity — Guidelines for Internet security
- Cybersecurity — Supplier relationshipsPart 2: Requirements
- Cybersecurity — Supplier relationshipsPart 3: Guidelines for hardware, software, and services supply chain security
- Cybersecurity — Security recommendations for establishing trusted connections between devices and services
- ISO/IEC CD 27090 [В настоящее время на стадии разработки]Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems
- ISO/IEC CD TS 27103 [В настоящее время на стадии разработки]Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
- ISO/IEC AWI TR 27109 [В настоящее время на стадии разработки]Cybersecurity education and training
- ISO/IEC WD TS 27115.2 [В настоящее время на стадии разработки]Cybersecurity evaluation of complex systems — Introduction and framework overview
- Cybersecurity — IoT security and privacy — Guidelines
- Cybersecurity — IoT security and privacy — Device baseline requirements
- Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
- ISO/IEC DIS 27404 [В настоящее время на стадии разработки]Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
- Information technology — Security techniques — Vulnerability disclosure
- Information technology — Security techniques — Vulnerability handling processes
- Опубликовано 441 | Проекты на стандии разработки 76
- Ships and marine technology — Assessment of onboard cyber safety
- Ships and marine technology — Cyber safety
- Опубликовано 161 | Проекты на стандии разработки 46
- Road vehicles — Guidelines for auditing cybersecurity engineering
- ISO/SAE CD PAS 8475 [В настоящее время на стадии разработки]Road vehicles — Cybersecurity Assurance Levels (CAL) and Targeted Attack Feasibility (TAF)
- ISO/SAE AWI TR 8477 [В настоящее время на стадии разработки]Road vehicles — Cybersecurity verification and validation
- Road vehicles — Cybersecurity engineering
- Опубликовано 114 | Проекты на стандии разработки 33
ISO/CD TS 23543[В время удалено]Guidance for developing cybersecurity requirements in anaesthetic and respiratory equipment standards
- Опубликовано 46 | Проекты на стандии разработки 12
- Electrical requirements for lifts, escalators and moving walksPart 20: Cybersecurity
- Опубликовано 246 | Проекты на стандии разработки 62
- ISO/DTS 6268-1.2 [В настоящее время на стадии разработки]Health informatics — Cybersecurity framework for telehealth environmentsPart 1: Overview and concepts
- ISO/CD TS 6268-2 [В настоящее время на стадии разработки]Health informatics — Cybersecurity framework for telehealth environmentsPart 2: Cybersecurity reference models of telehealth
- Health informatics — Device interoperabilityPart 40101: Foundational — Cybersecurity — Processes for vulnerability assessment
- Health informatics — Device interoperabilityPart 40102: Foundational — Cybersecurity — Capabilities for mitigation
References
- Digital megatrends. A perspective on the coming decade of digital disruption (Commonwealth Scientific and Industrial Research Organisation, 2019)
- The global risks report 2021 (World Economic Forum, 2021)
- Global strategic trends. The future starts today (UK Ministry of Defence, 2018)
- Global trends. Paradox of Progress (US National Intelligence Council, 2017)
- Global trends 2040. A more contested world (US National Intelligence Council, 2021)
- Ethics of geoengineering (Viterbi Conversations in Ethics, 2021)
- Technology vision 2020. We, the post-digital people (Accenture, 2020)
- Two years of GDPR. questions and answers (European Commission, 2020)
- Global trends and the future of Latin America. Why and how Latin America should think about the future (Inter-American Development Bank, Inter-American Dialogue, 2016)
- 20 New technology trends we will see in the 2020s (BBC Science Focus Magazine, 2020)
- Beyond the noise. The megatrends of tomorrow's world (Deloitte, 2017)
- Future outlook. 100 Global trends for 2050 (UAE Ministry of Cabinet Affairs and the Future, 2017)
- Global trends to 2030. Challenges and choices for Europe (European Strategy and Policy Analysis System, 2019)
- Global risks 2035 update. Decline or new renaissance? (Atlantic Council, 2019)
- Asia pacific megatrends 2040 (Commonwealth Scientific and Industrial Research Organisation, 2019)
- Foresight Africa. Top priorities for the continent 2020-2030 (Brookings Institution, 2020)