Skip to main content

Technology Landscape - Other Technologies and Technology-related Area

  1. This section highlights other technologiesthat the Working Group encountered at a high-level during its fact-finding. (GREEN: Already here; ORANGE: On the horizon, i.e., emerging; BROWN: Nascent, i.e., still largely theoretical and under development)

Maturity

Technology

Opportunities

Impact/Risks

 
Image

Synthetic media: Recordings or live presentations (video or audio) that use AI to create “fake” content or “deepfakes”

  • Use of deepfake “artificial reality identities” to connect with clients and make presentations96 

  • Training simulations for education and evaluation 

  • Reaching and engaging with larger, more diverse audiences in an efficient way 

  • Opportunity for NFTs as it can facilitate determining the authenticity of a physical or digital asset (i.e., virtual/digital content such as photos, videos, audio, or tweets) because the original source of such videos will be tagged in the blockchain underlying the NFT97

  • Prevalence of mis-/disinformation98 to shift public opinion in spite of factual and evidence-based information to the contrary, and resulting challenges in undoing viral social media posts that present such information 

  • Use of deepfakes to commit fraud, for example, consider a deepfake of a senior executive at a company or an audit partner commenting on sensitive information circulating around social media99

  • Identity theft poses a threat to authorization processes 

  • Increased need for being alert and applying professional skepticism and having an inquiring mind  

 
Image

Internet of Things (IoT): Any device (with a built-in sensor) connected to the internet, creating a network of connected devices that collects and shares data about the people and/or environment around it

  • Helps to collect and generate data that was previously not available or easily accessible, improving visibility and allowing for improved data analytics, especially when coupled with AI100 
  • Remote asset management and monitoring, such as location tracking, including autonomous driving applications 
  • Improve asset utilization, such as through predictive maintenance of industrial equipment and increased operational efficiencies through IoT-based process automation 
  • Common examples of usage in everyday life already include smart home and wearable devices
  • Privacy and related issues relating to data collected101 (i.e., could be of sensitive nature such as health data, have varying legal implications across jurisdictions) and “new” risks such as the inadvertent collection of data from such devices 
  • Expands the “attack surface” to penetrate a secure network,102 see discussion on Focus on Data Governance 
  • Challenges in quality control and compatibility (i.e., huge numbers of IoT devices that have different standards of quality and security) as well as connectivity (i.e., bandwidth) impact the successful functionality of IoT103 
 
Image

Digital 5G: The 5th generation of mobile networking with dramatically faster (i.e., by an anticipated 8 to 16 times) upload and download speeds than 4G network

  • Predictive intelligence in smart industrial settings and smart cities, including ties to sustainability104 
  • Enhanced mobile broadband and speeding up large data transfers 
  • Accelerating the development and deployment of IoT applications, including edge computing105
  • Increase in 5G mobile powered digital transactions means that companies will need a streamlined way to authenticate users. Digital authentications will need to be more versatile, more frequent and more frictionless than before106
 
Image

Immersive digital worlds (“metaverse”): Enabled by augmented reality (“AR”, which augments real-world scenes with additional information overlays) and/or virtual reality (“VR”, which creates a completely virtual environment

  • Professional education and evaluation through simulations 
  • Specific to audit firms, the pandemic has seen an increase in using AR and drones for remote inventory counting. Nevertheless, uptake is still slow mainly driven by reluctance from regulators and jurisdictional legislation that might not allow virtual inventory taking
  • Data privacy, cybersecurity concerns, and lack of identity verifiability107 
  • Questions over harassment and discrimination in virtual worlds and the lack of research on the physiological impacts on humans of prolonged immersion in VR/AR environments108 
  • Transactions, many speculative at this point, that are conducted in the metaverse will also have tax and financial reporting implications that are evolving
 
Image

Edge Computing: Realtime processing of data at the source by combining the use of IoT with cloud computing

  • Distinguished from cloud computing, which aggregates data collection from sources before processing it in the cloud 
  • Improving response times and decisionmaking, and saving bandwidth by bringing computation closer to the source of data (i.e., important when facing today’s supply chain issues) 
  • Allows continuous learning and optimization of the process as data is processed in real-time
 
Image

Web 3.0: Envisioned as the third generation of the internet built on a decentralized distributed ledger (i.e., blockchain) and where users can create and own their own data. Web 2.0 is today’s internet built mainly on Javascript and HTML5, which allows user interaction but where relatively few companies own user data, i.e., large technology companies109

  • No central authority controlling the collection, ownership, and flow of information 
  • Facilitates blockchain technology and concepts, including digital identity, smart contracts, DeFi and decentralized applications (dApps).110 See section  above on Technology Landscape: Blockchain – Cryptocurrencies, Tokens and Decentralized Finance
  • The notion of a “creator” economy will mean a rise in NFTs that serve as products or services which can be bought and sold on the blockchain underlying Web 3.0. Presents questions over data security; data ownership; digital identity; and the identification and mitigation of fraudulent transactions, programming bugs and errors, etc. 
  • See also discussion on Technology Landscape: Blockchain – Cryptocurrencies, Tokens and Decentralized Finance 
 
Image

Quantum computing: Emerging technology that harnesses the laws of quantum mechanics to solve problems “too complex” for today’s computers111

  • Where today’s supercomputers use a “two-dimensional” approach to solve statistical problems, quantum computing is anticipated to allow a new multidimensional approach to solving statistical problems, meaning that its computing power has increased significantly and can take into account an exponential number of multiple variables and uncertainties as compared to today’s computers 
  • Will innovate different method/approach of encryption in face of such massive computing power
  • Impact on cybersecurity due to the increased computing power that will effectively render all of today’s public-key encryption systems “useless”. Accordingly, there will be a need to upgrade the technical security for every organization and entity112
 
Image

Homomorphic encryption, part of a wider group of technologies called Privacy Enhancing Technologies (PETs): Allows data to be securely and privately used throughout its lifecycle without the need to decrypt it, meaning that different parties can be given access to work directly on the encrypted data without ever seeing the raw data113

  • Allows businesses to comply with various jurisdictional data protection laws 
  • Enables data testing by third parties114 as PETs facilitate privacy protection while data sharing 
  • Protects against privacy breaches that could potentially severely harm business reputation
  • Computation overhead needs to be significantly decreased as it is still very slow, so not yet practical to use for many applications115 
  • Additionally, integration challenges between data collection points, i.e., IoT (typically designed to consume low energy and storage), and PETs (running PETs typically requires greater computational power) 
  • Trade-off between utility and privacy, presenting questions over data authenticity and integrity and reducing transparency in data, for example, impacting the assessment of data used to train AI models 
 
Image

Cognitive AI: AI with cognitive abilities more similar to a human, including the ability to make decisions in unforeseen environments

  • Ability to mimic human behavior and respond to complex problems. See the section above on Technology Landscape: AI
  • Cognitive AI will impact decision-making and whether such decisions made by AI have human oversight, are understandable and explainable. See discussion on Technology Landscape: AI

 

Endnotes

96 Simonite, Tom. “Deepfakes Are Now Making Business Pitches.” Wired, 16 August 2021, https://www.wired.com/story/deepfakes-making-businesspitches; Vincent, James. “Deepfake dubs could help translate film and TV without losing an actor’s original performance.” Verge, 18 May 2021, https://www.theverge.com/2021/5/18/22430340/deepfake-dubs-dubbing-film-tv-flawless-startup; and Lesté-Lasserre, Christa. “Fake faces created by AI look more trustworthy than real people.” New Scientist, 14 February 2022, https://www.newscientist.com/article/2308312-fake-faces-created-byai-look-more-trustworthy-than-real-people/

97 Ozair, Merav. “Non-Fungible Tokens (NFTs): Looking Beyond the Hype.” NASDAQ, 4 March 2022, https://www.nasdaq.com/articles/non-fungibletokens-nfts%3A-looking-beyond-the-hype.

98 See, for example, Murphy, Matt. “The Dawn of AI Mischief Models.” Future Tense, 3 August 2022, https://slate.com/technology/2022/08/4chanai-open-source-trolling.html. Note that on other side of the equation, Microsoft has developed a tool, Video Authenticator that can analyze a still photo or video to provide confidence score that the medium has been artificially manipulated – Burt, Tom, and Eric Horvitz. “New Steps to Combat Disinformation.” Microsoft, 1 September 2020, https://blogs.microsoft.com/on-the-issues/2020/09/01/disinformation-deepfakes-newsguard-videoauthenticator/.

In addition, Microsoft, the BBC, CBC/Radio-Canada, and the New York Times have launched Project Origin to use such Microsoft technology for publishing tamper-proof metadata – Branscombe, Mary. “Deepfakes: Microsoft and others in big tech are working to bring authenticity to videos, photos.” TechRepublic, 26 July 2021, https://www.techrepublic.com/article/deepfakes-microsoft-and-others-in-big-tech-are-working-to-bringauthenticity-to-videos-photos/.

99 See, for example, the 5 commerce scenarios presented in, Brooks, Tina, et al. “Increasing Threats of Deepfake Identities.” US Department of Homeland Security, 2021, https://www.dhs.gov/sites/default/files/publications/increasing_threats_of_deepfake_identities_0.pdf

100 Some, Kamalika. “AI and IoT – 5 use cases where it’s gathering pace.” T_HQ, 3 February 2021, https://techhq.com/2021/02/ai-and-iot-5-use-caseswhere-its-gathering-pace/.

101 See, for example, Allhoff, Fritz and Adam Henschke. “The Internet of Things: Foundational ethical issues.” Internet of Things 1-2:55-66, September 2018, https://doi.org/10.1016/j.iot.2018.08.005.

102 As an example of how IoT devices can be compromised en masse, see Duong, Minh. “How I hacked ALL displays in my high school district to play Rick Astley.” TNW, 12 October 2021, https://thenextweb.com/news/how-i-hacked-high-school-rick-astley-rickrolling-syndication.

103 D’mello, Anasia. “5 challenges still facing the Internet of Things.” IoT Now, 3 June 2020, https://www.iot-now.com/2020/06/03/103228-5- challenges-still-facing-the-internet-of-things/.

104 See, for example, “The Impact of 5G: Creating New Value across Industries and Society.” World Economic Forum and PwC, January 2020, https:// www.pwc.com/gx/en/about-pwc/contribution-to-debate/wef-the-impact-of-fiveg-report.pdf.

105 Vaish, Rishi, and Sky Matthews. “5G Will Accelerate a New Wave of IoT Applications.” IBM, https://newsroom.ibm.com/5G-accelerate-IOT.

106 Desai, Rodger. “The Future Is Here: How 5G Is Revolutionizing Digital Identity.” Forbes, 3 February 2022, https://www.forbes.com/sites/ forbestechcouncil/2022/02/03/the-future-is-here-how-5g-is-revolutionizing-digital-identity/?sh=2235869d33f6.

107 Pratt, Mary K. “10 metaverse dangers CIOs and IT leaders should address.” TechTarget, 24 June 2022, https://www.techtarget.com/searchcio/ feature/10-metaverse-dangers-CIOs-and-IT-leaders-should-address.

108 See, for example, Kenwright, Ben. “Virtual Reality: Ethical Challenges and Dangers,” IEEE Technology and Society, 14 January 2019, https:// technologyandsociety.org/virtual-reality-ethical-challenges-and-dangers/.

109 “Why Some See Web 3.0 as the Future of the Internet.” Youtube, uploaded by Wall Street Journal, February 2022, https://www.youtube.com/ watch?v=OEJGQD1OuKA.

110 Minevich, Mark. “The Metaverse and Web3 Creating Value in the Future Digital Economy.“ Forbes, 17 June 2022, https://www.forbes.com/sites/ markminevich/2022/06/17/the-metaverse-and-web3-creating-value-in-the-future-digital-economy/.

111 “What is Quantum Computing?” IBM, https://www.ibm.com/topics/quantum-computing.

112 See, for example, “NIST Announces First Four Quantum-Resistant Cryptographic Algorithms.” US National Institute of Standards and Technology (US NIST), 7 July 2022, https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms; and O’Neill, Patrick H. “The US is worried that hackers are stealing data today so quantum computers can crack it in a decade.” 3 November 2021, MIT Technology Review, https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/.

113 See, for example, Brandao, Luis T.A.N., and Rene Peralta. “Privacy-Enhancing Cryptography to Complement Differential Privacy.” US NIST, 3 November 2021, https://www.nist.gov/blogs/cybersecurity-insights/privacy-enhancing-cryptography-complement-differential-privacy.

114 Including use of client data by audit firms, see “IAASB Digital Technology Market Scan: Homomorphic Encryption.” 20 October 2022, IAASB Digital Technology Market Scan: Homomorphic Encryption | IFAC.

115 Marr, Bernard. “What is Homomorphic Encryption? And Why Is It So Transformative?” Forbes, 15 November 2019, https://www.forbes.com/sites/ bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=51bbc1ce7e93.