All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2028622",
"signature": "Article:2028622",
"url": "https://staging.dailymaverick.co.za/article/2024-01-31-the-top-risks-from-technology-that-well-be-facing-by-the-year-2040/",
"shorturl": "https://staging.dailymaverick.co.za/article/2028622",
"slug": "the-top-risks-from-technology-that-well-be-facing-by-the-year-2040",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "The top risks from technology that we’ll be facing by the year 2040",
"firstPublished": "2024-01-31 14:00:46",
"lastUpdate": "2024-01-26 19:14:04",
"categories": [
{
"id": "1825",
"name": "Maverick Life",
"signature": "Category:1825",
"slug": "maverick-life",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-life/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 5626,
"contents": "Bewilderingly rapid changes are happening in the technology and reach of computer systems. There are exciting advances in artificial intelligence, in the masses of tiny interconnected devices we call the <a href=\"https://www.zdnet.com/article/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now/\">“Internet of Things”</a> and in wireless connectivity.\r\n\r\nUnfortunately, these improvements bring potential dangers as well as benefits. To get a safe future we need to anticipate what might happen in computing and address it early. So, what do experts think will happen, and what might we do to prevent major problems?\r\n\r\nTo answer that question, our research team from universities in Lancaster and Manchester turned to the science of looking into the future, which is called “forecasting”. No one can predict the future, but we can put together forecasts: descriptions of what may happen based on current trends.\r\n\r\nIndeed, long-term forecasts of trends in technology <a href=\"https://www.sciencedirect.com/science/article/abs/pii/S0040162502001865?casa_token=EvYkcjUyAtcAAAAA:l0b2wIChPdSxqXAxuGklh3FvNDxnftrjIBG0MCJddE4vY78BPMT6jfLbuXl2n0Qt9u88eY8HB5qo\">can prove remarkably accurate</a>. An excellent way to get forecasts is to combine the ideas of many different experts to find where they agree.\r\n\r\nWe <a href=\"https://ieeexplore.ieee.org/document/10380243/\">consulted 12 expert “futurists”</a> for a new research paper; these are people whose roles involve long-term forecasting on the effects of changes in computer technology by the year 2040.\r\n\r\nUsing a technique called <a href=\"https://en.wikipedia.org/wiki/Delphi_method\">a Delphi study</a>, we combined the futurists’ forecasts into a set of risks, along with their recommendations for addressing those risks.\r\n\r\nThe experts foresaw rapid progress in artificial intelligence (AI) and connected systems, leading to a much more computer-driven world than nowadays. Surprisingly, though, they expected little impact from two much-hyped innovations: <a href=\"https://en.wikipedia.org/wiki/Blockchain\">Blockchain</a>, a way to record information that makes it impossible or difficult for the system to be manipulated, they suggested, is mostly irrelevant to today’s problems; and <a href=\"https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/\">Quantum computing</a> is still at an early stage and may have little impact in the next 15 years.\r\n\r\nThe futurists highlighted three major risks associated with developments in computer software, as follows.\r\n<h4><strong>AI Competition leading to trouble</strong></h4>\r\nOur experts suggested that many countries’ stance on AI as an area where they want to gain a competitive, technological edge will encourage software developers to take risks in their use of AI. This, combined with AI’s complexity and potential to surpass human abilities, could lead to disasters.\r\n\r\nFor example, imagine that shortcuts in testing lead to an error in the control systems of cars built after 2025, which goes unnoticed amid all the complex programming of AI. It could even be linked to a specific date, causing large numbers of cars to start behaving erratically at the same time, killing many people worldwide.\r\n<h4><strong>Generative AI</strong></h4>\r\n<a href=\"https://research.ibm.com/blog/what-is-generative-AI\">Generative AI</a> may make truth impossible to determine. For years, photos and videos have been very difficult to fake, and so we expect them to be genuine. Generative AI has already radically changed this situation. We expect its ability to produce convincing fake media to improve so it will be <a href=\"https://www.dhs.gov/sites/default/files/publications/increasing_threats_of_deepfake_identities_0.pdf\">extremely difficult to tell whether some image or video is real</a>.\r\n\r\n<strong>Read in <em>Daily Maverick: </em></strong><a href=\"https://www.dailymaverick.co.za/article/2024-01-05-2023-was-the-year-of-generative-ai-what-can-we-expect-in-2024/\">2023 was the year of generative AI. What can we expect in 2024?</a>\r\n\r\nSupposing someone in a position of trust – a respected leader, or a celebrity – uses social media to show genuine content, but occasionally incorporates convincing fakes. For those following them, there is no way to determine the difference – it will be impossible to know the truth.\r\n<h4><strong>Invisible cyber attacks</strong></h4>\r\nFinally, the sheer complexity of the systems that will be built – networks of systems owned by different organisations, all depending on each other – has an unexpected consequence. It will become difficult, if not impossible, to get to the root of what causes things to go wrong.\r\n\r\nImagine a cybercriminal hacking an app used to control devices such as ovens or fridges, causing the devices all to switch on at once. This creates a spike in electricity demand on the grid, creating major power outages.\r\n\r\nThe power company experts will find it challenging to identify even which devices caused the spike, let alone spot that all are controlled by the same app. Cyber sabotage will become invisible, and impossible to distinguish from normal problems.\r\n<h4><strong>Software jujitsu</strong></h4>\r\nThe point of such forecasts is not to sow alarm, but to allow us to start addressing the problems. Perhaps the simplest suggestion the experts suggested was a kind of software jujitsu: using software to guard and protect against itself. We can make computer programs perform their own safety audits by creating extra code that validates the programs’ output – effectively, <a href=\"https://dl.acm.org/doi/abs/10.1145/3540250.3549081\">code that checks itself</a>.\r\n\r\nSimilarly, we can insist that methods already used to ensure safe software operation continue to be applied to new technologies. And that the novelty of these systems is not used as an excuse to overlook good safety practice.\r\n<h4><strong>Strategic solutions</strong></h4>\r\nHowever, the experts agreed that technical answers alone will not be enough. Instead, solutions will be found in the interactions between humans and technology.\r\n\r\nWe need to build up the skills to deal with these human technology problems and new forms of education that cross disciplines. Governments need to establish safety principles for their own AI procurement and legislate for AI safety across the sector, encouraging responsible development and deployment methods.\r\n\r\nThese forecasts give us a range of tools to address the possible problems of the future. Let us adopt those tools, to realise the exciting promise of our technological future. <strong>DM <iframe style=\"border: none !important;\" src=\"https://counter.theconversation.com/content/220979/count.gif?distributor=republish-lightbox-advanced\" width=\"1\" height=\"1\"></iframe></strong>\r\n\r\n<em><i>This story was first published on </i><a href=\"https://theconversation.com/the-top-risks-from-technology-that-well-be-facing-by-the-year-2040-220979\">The Conversation</a>. Charles Weir is a Research Fellow and Lecturer at Lancaster University.</em>",
"teaser": "The top risks from technology that we’ll be facing by the year 2040",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "909449",
"name": "Charles Weir",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/charles-weir/",
"editorialName": "charles-weir",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "6093",
"name": "Technology",
"url": "https://staging.dailymaverick.co.za/keyword/technology/",
"slug": "technology",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Technology",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "17214",
"name": "Artificial intelligence",
"url": "https://staging.dailymaverick.co.za/keyword/artificial-intelligence/",
"slug": "artificial-intelligence",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Artificial intelligence",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "44939",
"name": "AI",
"url": "https://staging.dailymaverick.co.za/keyword/ai/",
"slug": "ai",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "AI",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "59909",
"name": "cyber security",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-security/",
"slug": "cyber-security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "392478",
"name": "forecast",
"url": "https://staging.dailymaverick.co.za/keyword/forecast/",
"slug": "forecast",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "forecast",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "396062",
"name": "Generative AI",
"url": "https://staging.dailymaverick.co.za/keyword/generative-ai/",
"slug": "generative-ai",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Generative AI",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "414283",
"name": "futurists",
"url": "https://staging.dailymaverick.co.za/keyword/futurists/",
"slug": "futurists",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "futurists",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "414284",
"name": "Software concerns",
"url": "https://staging.dailymaverick.co.za/keyword/software-concerns/",
"slug": "software-concerns",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Software concerns",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "50476",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/7b6HEps0r4Xu_JfxJIXg1Wh5BK0=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/GvLYkPsBaIS-n8PTbirVEOQa03s=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/_F9bDEiuXGuhav1IC6NAqxtQdzQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/PT745hSJJHiTRy2cxRUbkYCRYCg=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/9DUImd-U6hjYraGZxpfTA49LApU=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/7b6HEps0r4Xu_JfxJIXg1Wh5BK0=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png",
"url_medium": "https://dmcdn.whitebeard.net/i/GvLYkPsBaIS-n8PTbirVEOQa03s=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png",
"url_large": "https://dmcdn.whitebeard.net/i/_F9bDEiuXGuhav1IC6NAqxtQdzQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png",
"url_xl": "https://dmcdn.whitebeard.net/i/PT745hSJJHiTRy2cxRUbkYCRYCg=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png",
"url_xxl": "https://dmcdn.whitebeard.net/i/9DUImd-U6hjYraGZxpfTA49LApU=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/01/DALL%C2%B7E-2024-01-26-19.10.47-an-illustration-in-cream-and-beige-tones-of-a-face-no-gender-broken-in-the-middle-by-pixels-lot-of-space-around.png",
"type": "image"
}
],
"summary": "A new study consulted futurists for their predictions about technological evolution.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "The top risks from technology that we’ll be facing by the year 2040",
"search_description": "Bewilderingly rapid changes are happening in the technology and reach of computer systems. There are exciting advances in artificial intelligence, in the masses of tiny interconnected devices we call ",
"social_title": "The top risks from technology that we’ll be facing by the year 2040",
"social_description": "Bewilderingly rapid changes are happening in the technology and reach of computer systems. There are exciting advances in artificial intelligence, in the masses of tiny interconnected devices we call ",
"social_image": ""
},
"cached": true,
"access_allowed": true
}