Cybersecurity Futures: How Can We Regulate Emergent Risks?

被引:0
|
作者
Dupont, Benoit
机构
关键词
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
This article reviews nine socio-technical trends that are likely to shape the cybersecurity environment over the next decade. These nine trends have reached various levels of maturity, and some - such as quantum computing - are still theoretically contentious. These trends are: cloud computing; big data; the Internet of Things; the mobile Internet; brain-computer interfaces; near field communication payment systems; mobile robots; quantum computing; and the militarization of the Internet. What these nine trends have in common is that they will be instrumental in generating new opportunities for offending, which will result from an exponential increase in the quantity of data, number of connection points to the Internet, and velocity of data flows that irrigate the digital ecosystem. As a result, more opportunities for malicious exploitation will be available to attackers, "security by design" will be harder to achieve in such a fluid and dynamic environment, and the performance of control mechanisms is likely to erode significantly. Technical solutions to address these challenges are already being developed by computer scientists. This article focuses on a different and complementary approach, finding inspiration in the work of regulatory scholars who have framed promising theories such as regulatory pluralism and responsive regulation to explore options for the necessary institutional adaptation to these future changes.
引用
收藏
页码:6 / 11
页数:6
相关论文
共 50 条
  • [1] Cybersecurity Governance: How can we measure it?
    De Bruin, Rossouw
    von Solms, S. H.
    2016 IST-AFRICA WEEK CONFERENCE, 2016,
  • [2] How can we regulate medicines better?
    Garattini, Silvio
    Bertele', Vittorio
    BMJ-BRITISH MEDICAL JOURNAL, 2007, 335 (7624): : 803 - 805
  • [3] If the Financial System Is Complex, How Can We Regulate It?
    Gaffeo, Edoardo
    Tamborini, Roberto
    INTERNATIONAL JOURNAL OF POLITICAL ECONOMY, 2011, 40 (02) : 79 - 97
  • [4] IVF: how can we reduce the risks of infection?
    Sowerby, Emma
    Parsons, John
    OBSTETRICIAN & GYNAECOLOGIST, 2006, 8 (03): : 159 - 163
  • [5] Asthma attacks: how can we reduce the risks?
    Thomas, Mike
    Bateman, Eric
    NPJ PRIMARY CARE RESPIRATORY MEDICINE, 2015, 25
  • [6] Asthma attacks: how can we reduce the risks?
    Mike Thomas
    Eric Bateman
    npj Primary Care Respiratory Medicine, 25
  • [7] The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
    Carlo, Antonio
    Manti, Nebile Pelin
    Semesta, Bintang Alam
    Casamassima, Francesca
    Boschetti, Nicolo
    Breda, Paola
    Rahloff, Tobias
    JOURNAL OF SPACE SAFETY ENGINEERING, 2023, 10 (04): : 474 - 482
  • [8] Cybersecurity and healthcare: how safe are we?
    Martin, Guy
    Martin, Paul
    Hankin, Chris
    Darzi, Ara
    Kinross, James
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 358
  • [9] How Can We Reduce The Risks Of STA-MCA Bypasses?
    Teo, M.
    Abhinav, K.
    Bell-Stephens, T.
    Madhugiri, V
    Sussman, E.
    Azad, T. D.
    Zhang, M.
    Steinberg, G. K.
    WORLD FEDERATION OF NEUROSURGICAL SOCIETIES (WFNS SYMPOSIA 2018), 2018, : 120 - 131
  • [10] FUTURES STRATEGIES CAN CUT INDEPENDENTS RISKS
    不详
    OIL & GAS JOURNAL, 1987, 85 (12) : 44 - 46