版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
CybersecurityFutures2030NewFoundations
WHITEPAPER
DECEMBER2023
Images:GettyImages
Contents
Foreword3
Executivesummary4
Introduction6
1
Findingsandinsightsfromtheworkshops7
1.1Overarchingobservations7
1.2Thenewdigitalsecuritylandscapefor20308
1.3Regionalvariances10
2
What’snext?Howtousethisreport11
2.1Whatstrengthsmatter11
2.2Whatweaknessesmatter12
2.3Whatobjectivesmatter12
Contributors14
Endnotes15
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontribution
toaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesult
ofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForum
butwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomic
Forum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
?2023WorldEconomicForum.
Allrightsreserved.
CybersecurityFutures2030NewFoundations2
December2023
CybersecurityFutures2030:
NewFoundations
Foreword
AnnCleaveland
ExecutiveDirector,CLTC,UCBerkeley
DawnThomas
Co-Director,InstituteforPublicResearch,CNA
Theglobalcybersecuritylandscapeisconstantlyandrapidlychanging.By2030,itwillonceagainberadicallytransformed.Tobetterunderstandhowtechnological,political,economicand
environmentalchangesareimpactingthe
futureofcybersecurityforgovernmentsand
organizations,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),theWorldEconomicForumCentreforCybersecurityandCNA’s
InstituteforPublicResearchhavecollaboratedonCybersecurityFutures2030,aforesight-
focusedresearchinitiativethataimstoinformcybersecuritystrategicplansaroundtheglobe.
OurengagementintheCybersecurityFutures2030initiativereflectsasharedcommitmenttopromotedigitalsecurityasastrategicpriorityandunderstandhowsystemiccybersecurity
challengesareexperiencedandaddressed
indifferentregionsaroundtheworld.
AkshayJoshi
HeadofIndustryand
Partnerships,CentreforCybersecurity,World
EconomicForum
Throughaseriesofin-depthworkshopsheldinsixinternationallocations,weexploredvarious
alternativedigitalfuturesconsideringhow
cybersecurityissettotransformoverthenextfivetosevenyears.Thereportincludesinsightsfromtheglobalworkshopsthatarebroadlyapplicableacrosscountriesandregions.Thefindingsaim
tohelpdecision-makersingovernment,industry,academiaandcivilsocietyseizeopportunities
andmitigaterisksjustoverthehorizon.
Weextendourgratitudetothosewhocontributedtothisinitiative,recognizingthatonlythrough
collaborativeeffortscanwesecurelyharnessthepromiseandpotentialoftechnologicalprogress.Maytheinsightscontainedhereinspurmeaningfuldialogue,inspireactionandguideourcollective
journeytowardamoresecureandinclusivedigitalfuture.
CybersecurityFutures2030NewFoundations3
Executivesummary
Digitalinnovationisaccelerating.Decision-makersneedlong-termstrategicforesighttoseizeopportunitiesandmitigaterisks.
ThisreportpresentsfindingsfromCybersecurity
Futures2030,aglobalresearchinitiativefocusedonexploringhowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Thegoalofthisprojectistohelpshapeafuture-focusedresearchandpolicyagendathatiswidelyapplicableacrosscountries
andsectors.
Thefindingsarebasedondiscussionsheldat
aseriesofin-personworkshopsconducted
throughout2023inDubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)andSingapore,aswellasavirtualworkshopwithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Theworkshopscentredondiscussionoffourscenariosthatportray
diverse“cybersecurityfutures”thatarefictional
(butplausible)depictionsoftheworldroughlyin
theyear2030.UCBerkeleyCenterforLong-TermCybersecurity(CLTC)independentlydesignedthescenariostoexploretrade-offsingoalsandvaluesthatdecision-makerswillhavetocontendwithinthenearfuture.
Keyfindings
–Accelerationintechnologyandbusiness
modelinnovation(bothlicitandcriminal)will
underpinthenewdigitalsecuritylandscapefor2030.Societiesmustfundamentallyreorient
theirresponsestoperennialdigitalsecuritychallenges,includingdataprivacy,talentdevelopmentandsustainability.
–Shoringuptrustwillbeakeygoalof
cybersecurityeffortsoverthenextdecade.Theonlinespreadofmis-anddisinformationarenowcorecybersecurityconcerns.
Cybersecuritywillbecomelessabout
protectingtheconfidentialityandavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.
–Stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity
strategiescanbecometrusted“brands”,
gainingadvantagesinattractingtalent,
seizingleadershipopportunitiesinmultilateralstandards-settingprocessesandcounteringdisinformationcampaigns.
–Public-privatepartnershipswillbeimperativetomovetheneedleoncombatingsovereignandcriminalcyberattacksandinformation
operationsbutnewincentivestructureswillbeneededtoachievesuchpartnerships.
–Thereisawindowofopportunityforemerginganddevelopingcountriestoimplement“securebydesign”principlesthatthefirstwavesof
digitalizationhavelargelyfailedtoembed.
Decision-makersshouldmonitorthepaceof
digitalizationandtheabilityofpopulationsto
integratenewtechnologiessafelyandsecurely.
–Transformativeinvestmentincybersecuritytalentandtrainingwillbeapriorityobjective.Countries’abilitytoprojectthemselvesas
trustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovidea
productiveenvironmenttocapitalizeon
thattalentmatterssignificantly.Promoting
educationandawarenessofdigitalsecuritywillbecritical.
–Decision-makersacrossregionsare
strugglingtobalancetechnologyvalue-
chaininterdependenciesandself-sufficiency.Evenasnationaldataregulationsproliferate,
trustedstandardsareneededthatincentivizeinteroperabilityincybersecurityandartificial
intelligence(AI)security.Insomeregions,thereisasenseofagloballeadershipvoid,alack
oftrustedandexpertregulatorybodiesand
insufficientcapacityforenforcementofsecurityandprivacylawsandstandards.
–Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldin
flux.Thisdynamicwillvaryacrossregions,willbeinfluencedbytheirrelationshipswithChinaand/ortheUSandwillholdsteadyregardlessofthestrengthorweaknessoftheUS-Chinarelationshipoverthenextfiveyears.
CybersecurityFutures2030NewFoundations4
Takeawaysfordecision-makers
–Organizationswillneedtoensuretheyhave
astableandsecuresupplychainofresources,includingtechnologycomponents,rawmaterialsandskilled,affordableworkers.
–Effectivedigitalpoliciesandregulationsshoulddemonstrateclearandstable
prioritiesofcompanies,governmentsandotherorganizations.
–Resilience,humourandoptimismaboutthe
future–andtheopportunitiesthatawaitthosewillingandabletoseizethem–arecriticalintherun-upto2030.
–Havingadigitallyliteratepublicandcustomer
basethatismediasavvyandinoculatedagainstmis-,dis-andmal-information(MDM)willbeasourceofstrengthfororganizationsthatwishtosucceedinaneraofdegradingtrust.
–Leadersshouldactivelylookforwaysto
ensurethatemergingtechnologieshelpthegeneralpopulation,forexamplebystabilizingnationaleconomies,addressinghighcostsofliving,providingfoodsecurityandadvancingrenewableenergy.
–Thepublicandprivatesectorsshouldinvestineducation(e.g.medialiteracyandcybersecurityhygiene)forthegeneralpopulationtodecreasetheattacksurfaceandin-jobtrainingtoupskilladigitalworkforce.
–LeaderswillneedtostrategicallyandtacticallyuseregulationtoguardagainstthedownsidesofAIproductsastheyriseinprominenceandmusttakemeaningfulmeasurestocombat
MDMbeforeitfurtherdegradestrustandunity.
–Countriesshouldformandstrengthentrustedresearchinstitutions,particularlyinless-
developedeconomies,tosupportgovernmentsinaddressingthemostchallengingsocialandtechnicalcybersecurityproblemsof2030.
Thenextphaseofthisprojectwillincludeworkingwithdecision-makerstogenerateadditional
prioritiesandthinkingmorebroadlyabout
howfindingsfromthisreportcouldreshape
organizations’futures.Grapplingwiththese
kindsofquestionsshouldbeadefiningfocus
in2024forC-suites,boardsandgovernment
agenciesinternationally.
CybersecurityFutures2030NewFoundations5
Thisbroaderlookatcybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnology
touchessociety.
Introduction
CybersecurityFutures2030isaforesight-
focusedresearchinitiativethataimstoinform
cybersecuritystrategicplanningaroundtheglobe.
Awiderangeofissueshavechangedthe
cybersecurityagendaoverthepastfiveyears–fromdigitaltransformationduringaglobalpandemicto
thecommercializationoflargelanguagemodels
andfromthelargestmilitaryconflictsofthecyber
agetoaninternationalransomwarescourge.As
KenMcCallum,theDirector-GeneraloftheBritish
SecurityService,recentlyremarked:“Ifyouare
workingatthecuttingedgeoftechnologytoday,youmaynotbeinterestedingeopolitics,butgeopoliticsiscertainlyinterestedinyou.”1Thenextfiveyearswillbringanothersetofunprecedentedcybersecurity
challengesandopportunities.Thosewithstrategicforesightwillbebettersituatedtotiltthedigitalworldinadirectionthatismoresecure.
Tolookoverthehorizon,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),withthe
supportoftheWorldEconomicForum’sCentreforCybersecurity(C4C)andCNA’sInstituteforPublicResearch,launchedCybersecurityFutures2030,aglobalinitiativethatexploreshowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Theaimistohelpshapeafuture-focusedresearch
andpolicyagendathatiswidelyapplicableacrosscountriesandsectors.Thisbroaderlookat
cybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnologytouchessociety.
BetweenJanuaryandApril2023,theCLTC
independentlydevelopedasetoffourscenariosthatportraypossible“cybersecurityfutures”
lookingforwardtoroughly2030.Thescenariosweredesignedtoexaminesomeofthetrade-
offsingoalsandvaluesthatdecision-makers
willhavetocontendwithinthenearfuture.The
scenariosfocusonwhatisrelevantandplausible,whilealsochallengingimplicitbeliefsandtoday’sconventionalwisdom.Ratherthanpredictthe
future,theyarespecificallydesignedtoelicitmeaningfullydifferentglobalperspectives.
BetweenMayandSeptember2023,theinitiativetookthesescenariostofiveinternationallocationsthatwillhavedifferentinfluencesandperspectivesonthedigitalsecuritylandscapeofthenext
decade:Dubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)
andSingapore.Inaddition,therewerevirtual
workshopswithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Aworkshop
ineachlocationhadamixofparticipantsfrom
government,business,civilsociety,academiaandotherdomains.Similarworkshopprocesseswereruntoextractreactionsandinsightsthatwould
becomparable.Thesecomparisonsarethemostimportantimmediateproductoftheworkshops.
Ofcourse,thesecomparisonscomewithcaveats,themostimportantofwhichistheuseofaggregategeographicalcategoriesasplaceholders.A
singleworkshopinNewDelhi(despitebroad
representationfromexpertsinacademia,industry,governmentandcivilsociety)cannotrepresentthecomprehensiveperspectiveofcitizensintheworld’smostpopulouscountry.Norcanaworkshopin
KigalispeakforthewholeAfricancontinent.The
geographiclabelsarebestthoughtofasimperfectproxiesthatshedlightoncommonalitiesand
differencesacrossmanyregionsthatwillimpactthefutureoftheglobaldigitalsecuritylandscape,but
therewasnocapacitytoconveneworkshopsinallpartsoftheworld.Anothercaveatisrecencybias;theworkshopparticipantsarepeopleandpeople
readfuturescenariosinthecontextofwhatismostimportantandurgentintheirmindsatthatmoment.Inthiscontext,itislikelyunsurprisingthatworkshopparticipantsmentionedartificialintelligence(AI)morethanotheremergingtechnologiesbyafactorof
10.Finally,scenariosthemselveshaveblindspots,evenastheystretchimaginationstotheedgeof
plausibility.Theworkshopprocesswasdesignedtominimizethesekindsofbiasesbutitisimpossibletofullyeliminatethem.
Theworkshopshelpedexposehowattitudesandperspectivesaredevelopinganddivergingacrossgeographies.Theinsightsreportedbelowarelikelytoreframethedecision-makingenvironmentand
willhelpdecision-makersingovernment,industry
andcivilsocietyreducefrictions,seizeopportunitiesforcooperationandbetterprepareforthefuture.
CybersecurityFutures2030NewFoundations6
Cybersecuritywillbecomelessaboutprotectingtheconfidentialityandavailability
ofinformationandmoreaboutprotectingits
integrityand
provenance.
Digitalsecurityisbeingreframedasthe
abilityofsocietiestomatchthespeed
oftrustwiththespeedofinnovation.In
eachworkshop,participantsvoicedfears
thatthespeedoftechnologicalandcriminal
2
1
Findingsandinsights
fromtheworkshops
Aseriesofinternationalworkshopsrevealed
criticalchallenges,uncertaintiesand
opportunitiesforgovernmentsandorganizationsinarapidlyevolvingcybersecuritylandscape.
Thisreportdetailsthreeoverarchingobservationsandthreeproposedelementsofthenewlandscapein2030thatemergedfromtheworkshops.
Eachdeservesfocusedattentioninstrategicplanningandfuturedecision-making.
1.1Overarchingobservations
1
innovationhassurpassedhumanity’sability
toensurethetrustworthinessofdigital
productsandinformation,whichhasprofoundconsequencesforthelegitimacyofnational
andinternationalinstitutions.Shoringup
trustemergedasakeygoalofcybersecurityeffortsoverthenextdecade.Atastrategic
level,stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity
strategiescanbecometrusted“brands”,
gainingadvantagesinattractingtalent,
seizingleadershipopportunitiesinmultilateralstandard-settingprocessesandcountering
disinformationcampaigns.ThisoutlookwasmostpronouncedinSingapore,IndiaandtheUnitedArabEmirates.Atamoreoperationallevel,participantsalsodiscussedregulators’roleinmonitoringmultinationalcompanies
closelywitheffectiveaccountabilitymeasures.
ThissentimentwasmostpronouncedinAfricaandtheEU.IntheUS,therewasmuchmore
tensionaboutwhois“incharge”oftrust–thegovernmentortheprivatesector.Agreement
thatpublic-privatepartnershipsareimperativetomovetheneedleoncombatingsovereign
andcriminalcyberattacksandinformation
operationswasaccompaniedbyanequal
senseofdisillusionmentaboutthefeasibility
ofsuchpartnershipsgivencurrentincentive
structures.Participantsvoicednearlyuniversalagreementthattheonlinespreadofmis-,
dis-andmal-information(MDM)arenowcorecybersecurityconcerns.Cybersecuritywill
becomelessaboutprotectingtheconfidentiality
andavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.
Thepaceandscaleofdigitalizationwill
drivechangestotheglobalsecurity
landscapeasmuchas(ormorethan)
thespecificcapabilitiesofemerging
technologies.Workshopparticipants
focusedonAIandautomationmorethan
othertechnologiesbyafactorof10,thoughthecurrentandpotentialcapabilitiesof
quantumcomputing,theinternetofthings
(IoT)andadvancesinspacealsoemerged
aspriorities.Inthecontextofuncertainties
andvulnerabilities,participantscautioned
aboutfuturecleavagesthatcouldemerge
withquantumtechnologiesandidentifiedthedevelopmentanddeploymentofquantum-safecryptographyasapriority.Preparing
technicallyandbycreatingnormsand
boundariescouldhavesweepingpositive
impactsforgovernments,businessesandsocieties.Space–giventheintegrationofadvancedtechnologiesinspace-based
systems–cameupasanotherenvironmentwhereemergingtechnologycouldcause
futurecleavagesandasadomainripeforcountriestoinnovateandadvance.Yetthe
biggestthreattothedigitalsecuritylandscapeisstillmorehumanthantechnical.Thesecurityconsequencesofrapiddigitaltransformationhadparticularrelevanceinemergingand
developingcountrieswithlargepopulations.Cybersecuritychallengesandopportunitiesofthenextdecadewillbeproportionatetothepaceandscaleatwhichcountriesdigitalize.AsparticipantsinIndiapointedout,larger
populationscorrespondtoalargertargetforattacks,rangingfromdisinformation
CybersecurityFutures2030NewFoundations7
3
campaignstofraudandextortion–familiar
attacksthatwillonlybecomemorecomplexascriminalsgaineasierandcheaperaccesstomoresophisticatedtechnologies.The
upsideisthatthereisawindowofopportunityforemerginganddevelopingcountriesto
implement“securebydesign”principles
thatthefirstwavesofdigitalizationinmore
developedcountrieshavelargelyfailed
toembed.Toanticipateandaddressthe
cybersecuritychallengesofthenextdecade,decision-makersshouldmonitorthepaceofdigitalization–andtheabilityofpopulationstointegratenewtechnologiessafelyand
securely–ascloselyastheydothesecurityspecificationsofthetechnologyitself.
Debatesaboutinternetfragmentation
versusa“freeandopen”internet
aremorphingintomorepractical
conversationsabouttrade-offsbetween
digitalsovereigntyandinteroperability.
Decision-makersacrossregionsare
strugglingtocreatetherightbalancebetweentechnologyvalue-chaininterdependencies
andself-sufficiency.Forexample,even
asnationaldataregulationsproliferate,
includingacrossthecontinentofAfrica,
participantsvoicedmoreuniformandurgentcallsfortrustedstandardsthatincentivize
interoperabilityincybersecurityandAI
security.InSingapore,therewasmore
confidencethatthegovernmentcande-risk
itsdependenciesbyexertinginfluencethroughregulation,standardsandpartnershipsto
ensurethattechnologiesusedinthecountrymeethighcybersecuritystandards.Inotherregions,thereisaprofoundsenseofa
globalleadershipvoid,alackoftrustedand
expertregulatorybodiesandinsufficient
capacityfortheenforcementofsecurityand
privacylawsandstandards.Tomeetthis
need,multi-alignedcountriesmaybebest
positionedtofacilitatemultilateraleffortsandmostabletoadvancecommonnormsand
standardsthatbenefitcollectivecybersecurity,whilesimultaneouslyinvestingtolimittheir
technologyandsupplychaindependencies.Thispragmaticsenseofopportunitywas
heardmoststronglyinSingapore,theUnitedArabEmiratesandIndia.Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldinflux.
Thisdynamicseemstogaintractionas
countriesbecomeincreasinglyawareoftheconsequencesoftechnologicalcolonialism
thatregionshaveexperiencedtovarying
degreesdependingontheirrelationships
withChinaand/ortheUS,andholdssteadyregardlessofthestrengthorweaknessof
theUS-Chinarelationshipoverthenextfiveyears.Europeansworriedaboutafalsesenseofsecurityandaskedthequestion:“Ifthe
regionisreliantonexternallargetechnologycompaniestomanageourdataanddevelopAI,howcanweknowwhichtechnology
productsaresafetouse?”Chinesetools
permeateIndiaandRwanda(andAfrica
morebroadly),andChinesetechnology
companiescontinuetobeseenaspotentialpartnersforadvancingdigitalinfrastructureintheseregions.ThereisalsoconsiderableconcernaboutChina’sabilityandwillingnesstoprotectpartnertechnology,potentiallossofprivacyandtheendoflow-cost,high-
qualitytechnologyproductsiftheUSand
Chinacooperateinsteadofcompeting.
Participantsanticipatethatglobalalliancesaresettoreshuffleinthecomingyears,withopportunitiesforcountriestocreatenew
polesinamoremultipolarworld.
1.2Thenewdigitalsecuritylandscapefor2030
to2030willbeforcountries,communities
andindividualstonegotiateafairreturnon
investment(ROI)incontrolledandresponsibleuseoftheirdata.Whatdoesthismeanforthefutureofdigitalsecurityandprivacy?Europeanparticipantssawatightropewalkbetween
leadingtheworldindigitalregulationand
enforcementononesideandthefinancialandeconomicreturnsthatdata-poweredinnovationcouldgenerateontheother.InRwanda,
Theobjectivein2030willbeforcountries,
communities
andindividualstonegotiateafairreturnon
investmentin
controlledandresponsibleuseoftheirdata.
Accelerationintechnologyandbusinessmodel
innovation(bothlicitandcriminal)willunderpin
thenewdigitalsecuritylandscapefor2030.The
workshopsuncoveredauniversalsensethatthis
accelerationisnotlikelytobeincremental.Thenew
landscapewillrequiresocietiestofundamentally
reorienttheirresponsestoperennialdigital
securitychallenges,threeofwhicharechanging
inparticularlyimportantways:dataprivacy,talent
developmentandsustainability.
concernsemergedaboutAImodelsthatare
movingaheadwithoutAfricandata.African
representationintrainingdataiscriticalinorderforAIproductstobesafeandtrustworthyto
deployinanAfricancontextbuttechnology
producersandAfricandataownersmustbe
equalparticipantsinthetransaction.IntheUS,firmsmakinginvestmentsindataprotectionand
–“Makesureyouaregettingsomethinginreturn
foryourpersonaldata,”wasarefrainheard
aroundtheworld.Intheworkshopdiscussions,
almostnoonebelievedthatitisstillplausibleor
desirabletofullyrestrictflowsofpersonaldata.
Rather,thesentimentisthat“thecatisoutof
thebag”andthattheobjectiveinthedecade
CybersecurityFutures2030NewFoundations8
Transformativeinvestmentin
cybersecurity
talentandtrainingemergedasa
priorityobjectiveacrossscenariosandgeographies.
usewillneedtocontendwithemergingsocietalmovementsadvocatingformoreself-owned
orself-manageddata.Thereisalsopotentialforplatformfirmsandtheiruserstobecomenewalliesindisincentivizinglarge-scaledatascrapingbythirdparties.Butthe“Makesureourdataisoutthere–andusedsecurelyinwaysthatbenefitcommunities”sentiment
isapronouncedchangeinattitudetowardspersonaldatathanheardinthepast.
–Transformativeinvestmentincybersecurity
talentandtrainingemergedrobustlyasapriorityobjectiveacrossgeographies.Toafargreater
degreethanseeninthepast,participantsinallworkshoplocationsrecognizedtheimportanceofhumancapitalformanagingtechnology
andcybersecurity,regardlessoftechnologicaladvances.Severalintersectingdynamicswereuniversallycited:
a.Theintensifyingcompetitionforglobal
talent.Thebarforcybersecuritytalentis
gettinghigher.Participantsnotedthatas
automationandAIfulfillmanyentry-level
technicaljobs,therewillbeincreasingneedandopportunitiesforpeopletrainedin
supervisoryandpolicyrolesforcybersecurityandAIsecurity.Inaddition,thedemandforpeoplewhocandesign,buildanddeploy
securemachinelearningandAIproducts
isskyrocketing.Theabilityofcountriesto
projectthemselvesastrustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovideaproductiveenvironmentto
capitalizeonthattalentmatterssignificantly.Participantsexpressedacuteawareness
oftheriskofazero-sumgamedynamic–
wherebycountriescompeteoverthesamelimitedpooloftalent–ifcountriesdon’t
simultaneouslyinvestinthedevelopment
andretentionoflocaltalent,withparticularconsequencesforlessdevelopedcountries.Insteadof“braindrain”,decision-makerswillneedtoconsiderideaslike“braincirculation”(bywhichforeign-borntechnologists
transfertechnicalandinstitutionalknow-howbetweendistantregionaleconomies)inthenextdecade.2
b.Theurgencyforbroadcyberliteracytrainingtocombatdisinformationandgarden-varietycybercrime.Educationandawarenessof
digitalsecuritywillbecritical.Participantssawprofoundupsideforcompanies,
governmentsandNGOsthatsuccessfullycreateupdatedcampaignsandcurricula
toeducatethepublicondigitalsecurity
issuesandbestpractices.Thisisespeciallytruefornewtechnologyusersinless
developedcountries.
c.Localandregionaleducationandskilling
programmestoreshoresupplychainsand
enableeconomicdevelopment.Then
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 職工身聯(lián)誼協(xié)議書
- 聘用鐘點工協(xié)議書
- 個體扣稅協(xié)議書
- 2025年內(nèi)容管理系統(tǒng)開發(fā)協(xié)議
- 保密保密協(xié)議(2025年客戶信息)
- 辦公室租賃代理服務(wù)協(xié)議
- 發(fā)熱老年人的癥狀管理
- 遼寧省交通高等??茖W(xué)?!吨袊肪V要》2023-2024學(xué)年第一學(xué)期期末試卷
- 儀隴縣交通安全課件
- 中國計量學(xué)院黨課
- 網(wǎng)絡(luò)系統(tǒng)管理與維護期末考試練習(xí)題含答案
- 2025國家開放大學(xué)《公共政策概論》期末機考題庫及答案
- (2025年標準)贍養(yǎng)老人協(xié)議分攤協(xié)議書
- 交強險基本知識培訓(xùn)
- 穿越機入門教學(xué)課件
- 《二次根式的混合運算》教學(xué)設(shè)計
- 地質(zhì)災(zāi)害危險性評估方案報告
- 感術(shù)行動培訓(xùn)課件
- DB44∕T 2552-2024 藥物臨床試驗倫理審查規(guī)范
- 血管外科第三集講解
- 跨區(qū)域文化協(xié)作-洞察及研究
評論
0/150
提交評論