Scenario 1

advertisement
‫תרחישים ככלי בחיזוי טכנולוגי‪-‬חברתי‬
‫אהרון האופטמן‬
‫היחידה לחיזוי טכנולוגי וחברתי‪ ,‬אוניברסיטת ת"א‬
‫‪www.notes.co.il/hauptman‬‬
‫‪haupt@post.tau.ac.il‬‬
‫"העתיד המפתיע ביותר הוא זה שאין בו הפתעות"‬
‫הרמן קאהן‬
Low-likelihood, high-impact events
“futurequakes”: As earthquakes – surprising, but not impossible
Jan 2012
Where there is a sufficiently large number of wild cards,
the probability that no wild card will occur tends to
zero.”
In the long run, wild cards
will shape the future!
K. Steinmüller (2003)
If there are 1000 such events and the probability of each
one happening is 1 in 100,000, then there is a pretty
good chance that one will occur, and fairly soon!
P. Shwartz and D. Randall (2007)
DENIAL
“Denial is a powerful form of cognitive bias….
can stifle creativity and make companies and nations
susceptible to STRATEGIC SURPRISE”
P. Shwartz & D. Randall, in “Blindside: How to anticipate forcing
events and Wild Cards in global politics”, F. Fukuyama (ed), 2007
“Well-crafted scenarios can help
organizations that suffer from denial
about future change to rehearse it in
advance…”
“encourage management teams to
“think the unthinkable”, anticipate
surprises, and try out new
possibilities.”
P. Shwartz & D. Randall, in “Blindside: How to anticipate forcing
events and Wild Cards in global politics”, F. Fukuyama (ed), 2007
Foresight of Evolving Security Threats
Posed by Emerging Technologies
www.festos.org
FESTOS Horizon Scanning & Foresight
“intelligence about the future” and policy implications
~ 80 "potentially threatening" technologies in six
fields: ICT, Nano, Bio, Robotics, New Materials, and
Converging Technologies
Threat assessment of 33 selected technologies
(international expert survey)
Narrative scenarios (focus on Wild Cards)
Prevention, Control of Knowledge?
Preliminary policy implications (focus on future R&D)
10
FESTOS Foresight
Security threats of emerging technologies
Sufficiently maturity to be used in practise (when?)
Severity of threat
Easiness of malicious use
Likelihood to actually pose a threat, in different time-frames (till 2035+)
Which societal spheres would be threatened (people, infrastructures,
economy, environment, political systems and values)
Wild-Card (narrative) scenarios
11
FESTOS scenarios process
FESTOS Scenarios Process
FESTOS WP4
Futures Wheel
Source: Glenn [1994]
FESTOS WP4
March 16th 2009
FESTOS Narrative Scenarios
Describe future threats and their impacts.
Interrelation with social, political, technological, and
environmental aspects make complex threats
perceivable.
Thinking about possible futures and their societal &
technological contexts
 Assessment of threat potential and impact
 Possible interactions among technologies, individuals &
groups
 Identification of cascade and side effects of an event
 Identification of approaches to countermeasures
Narrative scenarios:
Tool for transferring the complexity of a technology-driven
threat to a real life situation in the future
Encourage individual imagination and ideas that emerge
when reading the texts.
Challenge conventional thinking
Support for the understanding of alternative futures
Emotional identification with characters
Suspension of disbelief
Construction of a “Wild Card” scenario
Programmable
matter
Molecular
Manufacturing
Internet of
Things
18
Construction of a “Wild Card” scenario
Programmable
matter
Molecular
Manufacturing
Internet of
Things
19
Scenario 3: At the Flea Market
Everyday intelligent nanotechnology-based products can
be set to self-destruct with a wireless signal.
“Security climate” :
(Background society/political features)
Strong non-governmental actors, Corruption/ organised crime,
weak government, weak legislation/ laws, strong local structures, low
trust in governmental structures, high interpersonal trust, small size of
country, high population density, average natural resources, average
education system, monopoly on the media by the government...
Programmable Matter
Materials programmed to self-assemble, alter their shape
and properties, and then disassemble - in response to
user input or autonomous sensing. Known also as
“InfoChemistry” or “Claytronics” this emerging field
combines
chemistry,
information
theory,
and
programmability to build information directly into materials.
Potential threats:
Ordinary items programmed to transform into a weapon.
A perfect camouflage of any object.
Reconfigurable tools with perfect performance, including weapons, readily
adaptable to changing conditions and mission requirements
21
Programmable Matter (cont.)
Societal Spheres Threatened:
Future R&D?
 Detection of non-metal weapons and other dangerous objects
 Countermeasures, e.g. "self destruction" code/signal in case of unauthorised use
 New techniques to cope with perfect camouflage.
23
Scenario 1: Cyber-Insects attack!
Swarms of cyber-insects attack people and animals.
“Mommy, Daddy, the synsects stung me!” Julie ran into the house in a fluster.
Martin, who just sat down to deal with the administrative stuff for his organic
farm, looked over at his eleven-year-old daughter. On her face and all over her
arms were red marks that looked like mosquito bites. “What happened?”
“Security climate” :
(Background society/political features)
Green ideology is the standard, democratic, high level of access to
technology, conservative, decentralized, high trust level, strong control
of emerging technologies, very repressive against inner opposition,
excellent education system/research
Scenario 2: The Genetic Blackmailers
Individual DNA is misused for extortion.
Scenario background: a new bill addressing secure handling of individual biodata and bio-samples.
Tony Raasonen could barely believe his eyes. Without a doubt the e-mail read:
“If you don’t vote against the Biobank Bill, we’ll publish the results of an analysis
of your DNA on the Internet. Freedom for our genes! - The Movement for
Genetic Self-Determination.”
Security Climate:
New member of the EU, problems with separatists, still in the process of
building a national consciousness, open to new technologies but with
low level of access to technologies, after a period of dictatorship,
government is centralistic, population is heterogeneous, low general
income…
Scenario 4: We’ll change your mind…
A terrorist group uses an acoustic virus to change the behaviour
of a portion of the population for a certain period of time.
“Have a look and see what strikes you.” The chief editor set a stack of printouts on the desk in front of Viktor. He picked them up without interest. The
somewhat gimmicky title on the top page read “Tonal Terror”. “Separatists
from the Southern Province unleash an inaudible acoustic virus. Are the
elections in danger?” Sometimes, it was amusing to see the drivel that the
competition would come up with.
EU FP7 Project iKNOW
WILD CARDS & WEAK SIGNALS (WI-WE) SHAPING
AND SHAKING THE FUTURE OF SCIENCE,
TECHNOLOGY AND INNOVATION IN EUROPE
Weak Signals:
unclear yet observable changes that may hint at
growing probability of Wild Cards.
Wild Cards Delphi
Physical infrastructures
Social welfare
Security
Environment & ecosystems
STI
Env
Ph-I
SoW
Virtual infrastructures
Economy
Policy & governance
Science, technology & innovation (STI) systems
Pol
Eco
Growing frequency of
floods in Europe and
the world
Lack of interest in
science by young
scholars
100%
75%
50%
SoW
Pol
Increasing SelfMedication
25%
Pol
STI
Growing interest in
wild cards and weak
signals research
Growing efforts to
assist SMEs to exploit
R&D collaborative
projects
Eco
STI
0%
Pol
Eco
SoW
Next generation peerto-peer content
delivery platform
Administration rather
than results a priority
Eco
Fast electronics for
compact lab-on-chip
applications
Neuro-Enhancement
Sec
STI
Migration of internet
services in pervasive
ICT environment
STI
Vi-I
Vi-I
STI
Some observations
from iKNOW Delphi
Pronounced gap between IMPORTANCE and
PREPAREDNESS (policy implications)
Higher priority in the long term (but the main surprise
could be the timing!)
Raising awareness of Wi-We is very important
Privacy - Appraising Challenges
to Technologies and Ethics
Privacy impacts of new technologies
threats to privacy
enhancement of privacy
change of perception
(sensitivity to privacy)
35
Mental Privacy
Oxford University Press,
September 2012
37
www.practis.org
haupt@post.tau.ac.il
high
Possible Privacy Scenarios?
Rejection of new technologies
Privacy is sacred
Extreme version:
“Back to nature”
Low
Sensitivity to privacy
1. “Technology? Not for me!“
2. “Little brothers and sisters”
Limited/conditional acceptance of
technologies: Only if privacy is assured.
PETs play a significant role
Extreme version:
Full-fledged privacy-by-design
high
Perceived benefits of new technologies
3. “Who cares?”
4. “I want this this gadget!”
People are indifferent.
Aggressive marketing of technologies
Massive manipulation of consumers by
privacy-intruding advertising techniques
(brain scans?)
Enthusiastic acceptance of new technologies
Privacy is easily sacrificed for benefits
(security, health…)
Aharon Hauptman, ICTAF
PRACTIS Workshop, Vienna
Low
Extreme version: Big Brother?
Extreme version: “World Without Secrets”
PRACTIS Privacy Scenarios
1. Privacy has faded away
People give up privacy
voluntarily, in favor of benefits
of new technologies
3. People have lost their
control of privacy
They get used, and stop worrying.
Info is gathered about everybody.
Everyone has equal access to
others’ information.
2. People maintain as much
privacy as possible
Effective use of PETs. PbD
4. Segmented privacy
Privacy = a market value, but only the
wealthy can afford it
5. Tailor-made privacy
Some value privacy highly, other
ignore it, but everyone has freedom
of choice
1. Privacy has faded away
People give up privacy voluntarily, in favor of benefits of new technologies
Different goods have become more vital than privacy 
People sell their ”moral” for money
Technological context: ”mind reading” gadgets, intelligent medical
implants etc. are widely used
People make trade-offs in favour of products and services
People give up privacy voluntarily
Emerging technologies are widely accpeted
3. People maintain as much privacy as possible
Effective use of PETs. PbD
People believe in privacy, and do not accept new technologies
as easily as before because of former experiences of privacy
intrusions
People want to protect their privacy. Therefore, effective use
of privacy enhancing technologies (PETs) and Privacy by Design
(PbD) is established
Due to the changes of social norms, the majority of people
have started to oppose the “big brother phenomenon”
4. People have lost their control of privacy
They get used, and stop worrying. Info is gathered about everybody.
Everyone has equal access to others’ information.
People have become highly dependent on technologies and also
highly oppressed by them
Technology context: brain-to-brain communication, medical
nanorobots etc. are widely in use
People are permanently monitored by the state or private sector.
Information is gathered constantly about everybody
People are “sleep walking” into a world without privacy without
noticing, and suddenly they have no choice but to live with it
5. Segmented privacy
Privacy = a market value, but only the wealthy can afford it
The world is divided based on social and economic backgrounds
Technological context: Firms have made two versions of their
technology applications
Emerging technologies and privacy are perceived differently
depending on which “class” a person belongs to
Privacy has become a market value
Only wealthy people can afford to buy technologies where privacy
settings are considered and highly valued
6. Tailor-made privacy
Some value privacy highly, other ignore it, but everyone has freedom of
choice
Technology enables people to achieve tailor-made privacy. Privacy
enhancing technologies (PETs) are available to everyone
Privacy is understood differently by each individual
Freedom of choice is highly valued
Awareness of the possibilities and disadvantages of emerging
technologies is high
New technologies are treated with openness
Responsible Innovation Agenda for Competitive
European Transport Industries up to 2050
www.race2050.org
Technische Universitat Berlin,
Germany
VTM Consultores – Consultores Em
Engenharia E Planeamento LDA, Portugal
Ritchey Consulting AB, Sweden
Interdisciplinary Center for
Zurich University of Applied Sciences, Institute of Transport Economics,
Technology Analysis & Forecasting Institute of Sustainable Development,
Norway
at Tel-Aviv University, Israel
Switzerland
Scenario construction by general morphological analysis (GMA)
A 6-parameter morphological field. The darkened cells define one of 4800 possible
(formal) configurations (T. Ritchey, 2009)
Download