Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
futures:conflict_going_unconventonal [2023/08/04 03:59] – richarderwin | futures:conflict_going_unconventonal [2023/08/06 05:04] (current) – richarderwin | ||
---|---|---|---|
Line 7: | Line 7: | ||
=====In Futures Research===== | =====In Futures Research===== | ||
- | ====Disinformation from bad actors==== | + | ====Disinformation from Bad Actors / Vulnerability of Voting Systems==== |
- | [[library: | + | [[library: |
- | ====Vulnerability of Voting Systems==== | + | Our voting system |
- | [[library: | + | |
- | ====Geopolitical Vulnerabilities==== | + | ====Artificial Intelligence and Machine Learning==== |
- | [[library:nonferrous_metals_manufacturing_vision_for_2050_and_actions_needed|Non-ferrous Metals Manufacturing: | + | [[library:the_impact_of_new_and_emerging_technologies_on_the_cyber_threat_landscape_and_their_implications_for_nato|The Impact of New and Emerging Technologies on the Cyber Threat Landscape and Their Implications for NATO]], by [[encyclopedia: |
- | ====Conflict==== | + | That said, the most significant impact on the cyber threat landscape |
- | [[library: | + | |
- | + | ||
- | ====Info-Flows Control and Opportunities==== | + | |
- | [[library: | + | |
- | + | ||
- | ====New types of security threats | + | |
- | [[library: | + | |
- | + | ||
- | ====Non-traditional threats defy conventional notions of security==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Ransomware and Threats from Nations-States==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Cyberspace as a New Battleground for Geostrategic Supremacy==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Consumption and Production patterns==== | + | |
- | [[library: | + | |
- | political and economic power of China; 3) increasing urbanization across high- and middle-income economies; and 4) (violent and non-violent) conflict, contestation and cooperation between states. | + | |
- | + | ||
- | ====Empowerment of Individuals==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Democratisation of Technology by Emerging Powers and Non-State Actors==== | + | |
- | [[library: | + | |
- | + | ||
- | ====New Vulnerabilities, | + | |
- | [[library: | + | |
- | + | ||
- | ====More Capabilities for Adversaries==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Decreased Role of the State as the Main Security Provider==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Outsourced Military Functions==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Continued need to Work through Alliances, Partnerships and Networks==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Blurring of Lines between Conventional, | + | |
- | [[library: | + | |
- | + | ||
- | ====The Growing Internationalization of Conflict==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Quantum Security==== | + | |
- | [[library: | + | |
- | exploiting quantum effects. In the simplest terms, quantum-based technologies would reveal whether transmitted data had been intercepted or viewed by unintended parties. | + | |
- | + | ||
- | ====Artificial Intelligence | + | |
- | [[library: | + | |
- | ====Complex Synergies and Effects==== | + | ====New Vulnerabilities around Cybersecurity / Blurring of Lines regarding Warfare==== |
- | [[library:the_impact_of_new_and_emerging_technologies_on_the_cyber_threat_landscape_and_their_implications_for_nato|The Impact of New and Emerging Technologies on the Cyber Threat Landscape and Their Implications | + | [[library:exploring_europes_capability_requirements_for_2035_and_beyond|Exploring Europe' |
- | ====Complex Synergies | + | The overall character of war is unpredictable |
- | [[library: | + | |
====Transnational Security Challenges==== | ====Transnational Security Challenges==== | ||
- | [[library: | + | [[library: |
+ | [[library: | ||
Last modified: 2023/08/04 03:59 by richarderwin