- This section highlights other technologies2 that the Working Group encountered at a high-level during its fact-finding. (GREEN: Already here; ORANGE: On the horizon, i.e., emerging; BROWN: Nascent, i.e., still largely theoretical and under development)
Maturity |
Technology |
Opportunities |
Impact/Risks |
Image
|
Synthetic media: Recordings or live presentations (video or audio) that use AI to create “fake” content or “deepfakes” |
|
|
Image
|
Internet of Things (IoT): Any device (with a built-in sensor) connected to the internet, creating a network of connected devices that collects and shares data about the people and/or environment around it |
|
|
Image
|
Digital 5G: The 5th generation of mobile networking with dramatically faster (i.e., by an anticipated 8 to 16 times) upload and download speeds than 4G network |
|
|
Image
|
Immersive digital worlds (“metaverse”): Enabled by augmented reality (“AR”, which augments real-world scenes with additional information overlays) and/or virtual reality (“VR”, which creates a completely virtual environment |
|
|
Image
|
Edge Computing: Realtime processing of data at the source by combining the use of IoT with cloud computing |
|
|
Image
|
Web 3.0: Envisioned as the third generation of the internet built on a decentralized distributed ledger (i.e., blockchain) and where users can create and own their own data. Web 2.0 is today’s internet built mainly on Javascript and HTML5, which allows user interaction but where relatively few companies own user data, i.e., large technology companies109 |
|
|
Image
|
Quantum computing: Emerging technology that harnesses the laws of quantum mechanics to solve problems “too complex” for today’s computers111 |
|
|
Image
|
Homomorphic encryption, part of a wider group of technologies called Privacy Enhancing Technologies (PETs): Allows data to be securely and privately used throughout its lifecycle without the need to decrypt it, meaning that different parties can be given access to work directly on the encrypted data without ever seeing the raw data113 |
|
|
Image
|
Cognitive AI: AI with cognitive abilities more similar to a human, including the ability to make decisions in unforeseen environments |
|
|
Endnotes
96 Simonite, Tom. “Deepfakes Are Now Making Business Pitches.” Wired, 16 August 2021, https://www.wired.com/story/deepfakes-making-businesspitches; Vincent, James. “Deepfake dubs could help translate film and TV without losing an actor’s original performance.” Verge, 18 May 2021, https://www.theverge.com/2021/5/18/22430340/deepfake-dubs-dubbing-film-tv-flawless-startup; and Lesté-Lasserre, Christa. “Fake faces created by AI look more trustworthy than real people.” New Scientist, 14 February 2022, https://www.newscientist.com/article/2308312-fake-faces-created-byai-look-more-trustworthy-than-real-people/.
97 Ozair, Merav. “Non-Fungible Tokens (NFTs): Looking Beyond the Hype.” NASDAQ, 4 March 2022, https://www.nasdaq.com/articles/non-fungibletokens-nfts%3A-looking-beyond-the-hype.
98 See, for example, Murphy, Matt. “The Dawn of AI Mischief Models.” Future Tense, 3 August 2022, https://slate.com/technology/2022/08/4chanai-open-source-trolling.html. Note that on other side of the equation, Microsoft has developed a tool, Video Authenticator that can analyze a still photo or video to provide confidence score that the medium has been artificially manipulated – Burt, Tom, and Eric Horvitz. “New Steps to Combat Disinformation.” Microsoft, 1 September 2020, https://blogs.microsoft.com/on-the-issues/2020/09/01/disinformation-deepfakes-newsguard-videoauthenticator/.
In addition, Microsoft, the BBC, CBC/Radio-Canada, and the New York Times have launched Project Origin to use such Microsoft technology for publishing tamper-proof metadata – Branscombe, Mary. “Deepfakes: Microsoft and others in big tech are working to bring authenticity to videos, photos.” TechRepublic, 26 July 2021, https://www.techrepublic.com/article/deepfakes-microsoft-and-others-in-big-tech-are-working-to-bringauthenticity-to-videos-photos/.
99 See, for example, the 5 commerce scenarios presented in, Brooks, Tina, et al. “Increasing Threats of Deepfake Identities.” US Department of Homeland Security, 2021, https://www.dhs.gov/sites/default/files/publications/increasing_threats_of_deepfake_identities_0.pdf
100 Some, Kamalika. “AI and IoT – 5 use cases where it’s gathering pace.” T_HQ, 3 February 2021, https://techhq.com/2021/02/ai-and-iot-5-use-caseswhere-its-gathering-pace/.
101 See, for example, Allhoff, Fritz and Adam Henschke. “The Internet of Things: Foundational ethical issues.” Internet of Things 1-2:55-66, September 2018, https://doi.org/10.1016/j.iot.2018.08.005.
102 As an example of how IoT devices can be compromised en masse, see Duong, Minh. “How I hacked ALL displays in my high school district to play Rick Astley.” TNW, 12 October 2021, https://thenextweb.com/news/how-i-hacked-high-school-rick-astley-rickrolling-syndication.
103 D’mello, Anasia. “5 challenges still facing the Internet of Things.” IoT Now, 3 June 2020, https://www.iot-now.com/2020/06/03/103228-5- challenges-still-facing-the-internet-of-things/.
104 See, for example, “The Impact of 5G: Creating New Value across Industries and Society.” World Economic Forum and PwC, January 2020, https:// www.pwc.com/gx/en/about-pwc/contribution-to-debate/wef-the-impact-of-fiveg-report.pdf.
105 Vaish, Rishi, and Sky Matthews. “5G Will Accelerate a New Wave of IoT Applications.” IBM, https://newsroom.ibm.com/5G-accelerate-IOT.
106 Desai, Rodger. “The Future Is Here: How 5G Is Revolutionizing Digital Identity.” Forbes, 3 February 2022, https://www.forbes.com/sites/ forbestechcouncil/2022/02/03/the-future-is-here-how-5g-is-revolutionizing-digital-identity/?sh=2235869d33f6.
107 Pratt, Mary K. “10 metaverse dangers CIOs and IT leaders should address.” TechTarget, 24 June 2022, https://www.techtarget.com/searchcio/ feature/10-metaverse-dangers-CIOs-and-IT-leaders-should-address.
108 See, for example, Kenwright, Ben. “Virtual Reality: Ethical Challenges and Dangers,” IEEE Technology and Society, 14 January 2019, https:// technologyandsociety.org/virtual-reality-ethical-challenges-and-dangers/.
109 “Why Some See Web 3.0 as the Future of the Internet.” Youtube, uploaded by Wall Street Journal, February 2022, https://www.youtube.com/ watch?v=OEJGQD1OuKA.
110 Minevich, Mark. “The Metaverse and Web3 Creating Value in the Future Digital Economy.“ Forbes, 17 June 2022, https://www.forbes.com/sites/ markminevich/2022/06/17/the-metaverse-and-web3-creating-value-in-the-future-digital-economy/.
111 “What is Quantum Computing?” IBM, https://www.ibm.com/topics/quantum-computing.
112 See, for example, “NIST Announces First Four Quantum-Resistant Cryptographic Algorithms.” US National Institute of Standards and Technology (US NIST), 7 July 2022, https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms; and O’Neill, Patrick H. “The US is worried that hackers are stealing data today so quantum computers can crack it in a decade.” 3 November 2021, MIT Technology Review, https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/.
113 See, for example, Brandao, Luis T.A.N., and Rene Peralta. “Privacy-Enhancing Cryptography to Complement Differential Privacy.” US NIST, 3 November 2021, https://www.nist.gov/blogs/cybersecurity-insights/privacy-enhancing-cryptography-complement-differential-privacy.
114 Including use of client data by audit firms, see “IAASB Digital Technology Market Scan: Homomorphic Encryption.” 20 October 2022, IAASB Digital Technology Market Scan: Homomorphic Encryption | IFAC.
115 Marr, Bernard. “What is Homomorphic Encryption? And Why Is It So Transformative?” Forbes, 15 November 2019, https://www.forbes.com/sites/ bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=51bbc1ce7e93.