版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
CybersecurityFutures2030NewFoundations
WHITEPAPER
DECEMBER2023
Images:GettyImages
Contents
Foreword3
Executivesummary4
Introduction6
1
Findingsandinsightsfromtheworkshops7
1.1Overarchingobservations7
1.2Thenewdigitalsecuritylandscapefor20308
1.3Regionalvariances10
2
What’snext?Howtousethisreport11
2.1Whatstrengthsmatter11
2.2Whatweaknessesmatter12
2.3Whatobjectivesmatter12
Contributors14
Endnotes15
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontribution
toaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesult
ofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForum
butwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomic
Forum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
?2023WorldEconomicForum.
Allrightsreserved.
CybersecurityFutures2030NewFoundations2
December2023
CybersecurityFutures2030:
NewFoundations
Foreword
AnnCleaveland
ExecutiveDirector,CLTC,UCBerkeley
DawnThomas
Co-Director,InstituteforPublicResearch,CNA
Theglobalcybersecuritylandscapeisconstantlyandrapidlychanging.By2030,itwillonceagainberadicallytransformed.Tobetterunderstandhowtechnological,political,economicand
environmentalchangesareimpactingthe
futureofcybersecurityforgovernmentsand
organizations,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),theWorldEconomicForumCentreforCybersecurityandCNA’s
InstituteforPublicResearchhavecollaboratedonCybersecurityFutures2030,aforesight-
focusedresearchinitiativethataimstoinformcybersecuritystrategicplansaroundtheglobe.
OurengagementintheCybersecurityFutures2030initiativereflectsasharedcommitmenttopromotedigitalsecurityasastrategicpriorityandunderstandhowsystemiccybersecurity
challengesareexperiencedandaddressed
indifferentregionsaroundtheworld.
AkshayJoshi
HeadofIndustryand
Partnerships,CentreforCybersecurity,World
EconomicForum
Throughaseriesofin-depthworkshopsheldinsixinternationallocations,weexploredvarious
alternativedigitalfuturesconsideringhow
cybersecurityissettotransformoverthenextfivetosevenyears.Thereportincludesinsightsfromtheglobalworkshopsthatarebroadlyapplicableacrosscountriesandregions.Thefindingsaim
tohelpdecision-makersingovernment,industry,academiaandcivilsocietyseizeopportunities
andmitigaterisksjustoverthehorizon.
Weextendourgratitudetothosewhocontributedtothisinitiative,recognizingthatonlythrough
collaborativeeffortscanwesecurelyharnessthepromiseandpotentialoftechnologicalprogress.Maytheinsightscontainedhereinspurmeaningfuldialogue,inspireactionandguideourcollective
journeytowardamoresecureandinclusivedigitalfuture.
CybersecurityFutures2030NewFoundations3
Executivesummary
Digitalinnovationisaccelerating.Decision-makersneedlong-termstrategicforesighttoseizeopportunitiesandmitigaterisks.
ThisreportpresentsfindingsfromCybersecurity
Futures2030,aglobalresearchinitiativefocusedonexploringhowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Thegoalofthisprojectistohelpshapeafuture-focusedresearchandpolicyagendathatiswidelyapplicableacrosscountries
andsectors.
Thefindingsarebasedondiscussionsheldat
aseriesofin-personworkshopsconducted
throughout2023inDubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)andSingapore,aswellasavirtualworkshopwithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Theworkshopscentredondiscussionoffourscenariosthatportray
diverse“cybersecurityfutures”thatarefictional
(butplausible)depictionsoftheworldroughlyin
theyear2030.UCBerkeleyCenterforLong-TermCybersecurity(CLTC)independentlydesignedthescenariostoexploretrade-offsingoalsandvaluesthatdecision-makerswillhavetocontendwithinthenearfuture.
Keyfindings
–Accelerationintechnologyandbusiness
modelinnovation(bothlicitandcriminal)will
underpinthenewdigitalsecuritylandscapefor2030.Societiesmustfundamentallyreorient
theirresponsestoperennialdigitalsecuritychallenges,includingdataprivacy,talentdevelopmentandsustainability.
–Shoringuptrustwillbeakeygoalof
cybersecurityeffortsoverthenextdecade.Theonlinespreadofmis-anddisinformationarenowcorecybersecurityconcerns.
Cybersecuritywillbecomelessabout
protectingtheconfidentialityandavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.
–Stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity
strategiescanbecometrusted“brands”,
gainingadvantagesinattractingtalent,
seizingleadershipopportunitiesinmultilateralstandards-settingprocessesandcounteringdisinformationcampaigns.
–Public-privatepartnershipswillbeimperativetomovetheneedleoncombatingsovereignandcriminalcyberattacksandinformation
operationsbutnewincentivestructureswillbeneededtoachievesuchpartnerships.
–Thereisawindowofopportunityforemerginganddevelopingcountriestoimplement“securebydesign”principlesthatthefirstwavesof
digitalizationhavelargelyfailedtoembed.
Decision-makersshouldmonitorthepaceof
digitalizationandtheabilityofpopulationsto
integratenewtechnologiessafelyandsecurely.
–Transformativeinvestmentincybersecuritytalentandtrainingwillbeapriorityobjective.Countries’abilitytoprojectthemselvesas
trustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovidea
productiveenvironmenttocapitalizeon
thattalentmatterssignificantly.Promoting
educationandawarenessofdigitalsecuritywillbecritical.
–Decision-makersacrossregionsare
strugglingtobalancetechnologyvalue-
chaininterdependenciesandself-sufficiency.Evenasnationaldataregulationsproliferate,
trustedstandardsareneededthatincentivizeinteroperabilityincybersecurityandartificial
intelligence(AI)security.Insomeregions,thereisasenseofagloballeadershipvoid,alack
oftrustedandexpertregulatorybodiesand
insufficientcapacityforenforcementofsecurityandprivacylawsandstandards.
–Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldin
flux.Thisdynamicwillvaryacrossregions,willbeinfluencedbytheirrelationshipswithChinaand/ortheUSandwillholdsteadyregardlessofthestrengthorweaknessoftheUS-Chinarelationshipoverthenextfiveyears.
CybersecurityFutures2030NewFoundations4
Takeawaysfordecision-makers
–Organizationswillneedtoensuretheyhave
astableandsecuresupplychainofresources,includingtechnologycomponents,rawmaterialsandskilled,affordableworkers.
–Effectivedigitalpoliciesandregulationsshoulddemonstrateclearandstable
prioritiesofcompanies,governmentsandotherorganizations.
–Resilience,humourandoptimismaboutthe
future–andtheopportunitiesthatawaitthosewillingandabletoseizethem–arecriticalintherun-upto2030.
–Havingadigitallyliteratepublicandcustomer
basethatismediasavvyandinoculatedagainstmis-,dis-andmal-information(MDM)willbeasourceofstrengthfororganizationsthatwishtosucceedinaneraofdegradingtrust.
–Leadersshouldactivelylookforwaysto
ensurethatemergingtechnologieshelpthegeneralpopulation,forexamplebystabilizingnationaleconomies,addressinghighcostsofliving,providingfoodsecurityandadvancingrenewableenergy.
–Thepublicandprivatesectorsshouldinvestineducation(e.g.medialiteracyandcybersecurityhygiene)forthegeneralpopulationtodecreasetheattacksurfaceandin-jobtrainingtoupskilladigitalworkforce.
–LeaderswillneedtostrategicallyandtacticallyuseregulationtoguardagainstthedownsidesofAIproductsastheyriseinprominenceandmusttakemeaningfulmeasurestocombat
MDMbeforeitfurtherdegradestrustandunity.
–Countriesshouldformandstrengthentrustedresearchinstitutions,particularlyinless-
developedeconomies,tosupportgovernmentsinaddressingthemostchallengingsocialandtechnicalcybersecurityproblemsof2030.
Thenextphaseofthisprojectwillincludeworkingwithdecision-makerstogenerateadditional
prioritiesandthinkingmorebroadlyabout
howfindingsfromthisreportcouldreshape
organizations’futures.Grapplingwiththese
kindsofquestionsshouldbeadefiningfocus
in2024forC-suites,boardsandgovernment
agenciesinternationally.
CybersecurityFutures2030NewFoundations5
Thisbroaderlookatcybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnology
touchessociety.
Introduction
CybersecurityFutures2030isaforesight-
focusedresearchinitiativethataimstoinform
cybersecuritystrategicplanningaroundtheglobe.
Awiderangeofissueshavechangedthe
cybersecurityagendaoverthepastfiveyears–fromdigitaltransformationduringaglobalpandemicto
thecommercializationoflargelanguagemodels
andfromthelargestmilitaryconflictsofthecyber
agetoaninternationalransomwarescourge.As
KenMcCallum,theDirector-GeneraloftheBritish
SecurityService,recentlyremarked:“Ifyouare
workingatthecuttingedgeoftechnologytoday,youmaynotbeinterestedingeopolitics,butgeopoliticsiscertainlyinterestedinyou.”1Thenextfiveyearswillbringanothersetofunprecedentedcybersecurity
challengesandopportunities.Thosewithstrategicforesightwillbebettersituatedtotiltthedigitalworldinadirectionthatismoresecure.
Tolookoverthehorizon,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),withthe
supportoftheWorldEconomicForum’sCentreforCybersecurity(C4C)andCNA’sInstituteforPublicResearch,launchedCybersecurityFutures2030,aglobalinitiativethatexploreshowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Theaimistohelpshapeafuture-focusedresearch
andpolicyagendathatiswidelyapplicableacrosscountriesandsectors.Thisbroaderlookat
cybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnologytouchessociety.
BetweenJanuaryandApril2023,theCLTC
independentlydevelopedasetoffourscenariosthatportraypossible“cybersecurityfutures”
lookingforwardtoroughly2030.Thescenariosweredesignedtoexaminesomeofthetrade-
offsingoalsandvaluesthatdecision-makers
willhavetocontendwithinthenearfuture.The
scenariosfocusonwhatisrelevantandplausible,whilealsochallengingimplicitbeliefsandtoday’sconventionalwisdom.Ratherthanpredictthe
future,theyarespecificallydesignedtoelicitmeaningfullydifferentglobalperspectives.
BetweenMayandSeptember2023,theinitiativetookthesescenariostofiveinternationallocationsthatwillhavedifferentinfluencesandperspectivesonthedigitalsecuritylandscapeofthenext
decade:Dubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)
andSingapore.Inaddition,therewerevirtual
workshopswithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Aworkshop
ineachlocationhadamixofparticipantsfrom
government,business,civilsociety,academiaandotherdomains.Similarworkshopprocesseswereruntoextractreactionsandinsightsthatwould
becomparable.Thesecomparisonsarethemostimportantimmediateproductoftheworkshops.
Ofcourse,thesecomparisonscomewithcaveats,themostimportantofwhichistheuseofaggregategeographicalcategoriesasplaceholders.A
singleworkshopinNewDelhi(despitebroad
representationfromexpertsinacademia,industry,governmentandcivilsociety)cannotrepresentthecomprehensiveperspectiveofcitizensintheworld’smostpopulouscountry.Norcanaworkshopin
KigalispeakforthewholeAfricancontinent.The
geographiclabelsarebestthoughtofasimperfectproxiesthatshedlightoncommonalitiesand
differencesacrossmanyregionsthatwillimpactthefutureoftheglobaldigitalsecuritylandscape,but
therewasnocapacitytoconveneworkshopsinallpartsoftheworld.Anothercaveatisrecencybias;theworkshopparticipantsarepeopleandpeople
readfuturescenariosinthecontextofwhatismostimportantandurgentintheirmindsatthatmoment.Inthiscontext,itislikelyunsurprisingthatworkshopparticipantsmentionedartificialintelligence(AI)morethanotheremergingtechnologiesbyafactorof
10.Finally,scenariosthemselveshaveblindspots,evenastheystretchimaginationstotheedgeof
plausibility.Theworkshopprocesswasdesignedtominimizethesekindsofbiasesbutitisimpossibletofullyeliminatethem.
Theworkshopshelpedexposehowattitudesandperspectivesaredevelopinganddivergingacrossgeographies.Theinsightsreportedbelowarelikelytoreframethedecision-makingenvironmentand
willhelpdecision-makersingovernment,industry
andcivilsocietyreducefrictions,seizeopportunitiesforcooperationandbetterprepareforthefuture.
CybersecurityFutures2030NewFoundations6
Cybersecuritywillbecomelessaboutprotectingtheconfidentialityandavailability
ofinformationandmoreaboutprotectingits
integrityand
provenance.
Digitalsecurityisbeingreframedasthe
abilityofsocietiestomatchthespeed
oftrustwiththespeedofinnovation.In
eachworkshop,participantsvoicedfears
thatthespeedoftechnologicalandcriminal
2
1
Findingsandinsights
fromtheworkshops
Aseriesofinternationalworkshopsrevealed
criticalchallenges,uncertaintiesand
opportunitiesforgovernmentsandorganizationsinarapidlyevolvingcybersecuritylandscape.
Thisreportdetailsthreeoverarchingobservationsandthreeproposedelementsofthenewlandscapein2030thatemergedfromtheworkshops.
Eachdeservesfocusedattentioninstrategicplanningandfuturedecision-making.
1.1Overarchingobservations
1
innovationhassurpassedhumanity’sability
toensurethetrustworthinessofdigital
productsandinformation,whichhasprofoundconsequencesforthelegitimacyofnational
andinternationalinstitutions.Shoringup
trustemergedasakeygoalofcybersecurityeffortsoverthenextdecade.Atastrategic
level,stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity
strategiescanbecometrusted“brands”,
gainingadvantagesinattractingtalent,
seizingleadershipopportunitiesinmultilateralstandard-settingprocessesandcountering
disinformationcampaigns.ThisoutlookwasmostpronouncedinSingapore,IndiaandtheUnitedArabEmirates.Atamoreoperationallevel,participantsalsodiscussedregulators’roleinmonitoringmultinationalcompanies
closelywitheffectiveaccountabilitymeasures.
ThissentimentwasmostpronouncedinAfricaandtheEU.IntheUS,therewasmuchmore
tensionaboutwhois“incharge”oftrust–thegovernmentortheprivatesector.Agreement
thatpublic-privatepartnershipsareimperativetomovetheneedleoncombatingsovereign
andcriminalcyberattacksandinformation
operationswasaccompaniedbyanequal
senseofdisillusionmentaboutthefeasibility
ofsuchpartnershipsgivencurrentincentive
structures.Participantsvoicednearlyuniversalagreementthattheonlinespreadofmis-,
dis-andmal-information(MDM)arenowcorecybersecurityconcerns.Cybersecuritywill
becomelessaboutprotectingtheconfidentiality
andavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.
Thepaceandscaleofdigitalizationwill
drivechangestotheglobalsecurity
landscapeasmuchas(ormorethan)
thespecificcapabilitiesofemerging
technologies.Workshopparticipants
focusedonAIandautomationmorethan
othertechnologiesbyafactorof10,thoughthecurrentandpotentialcapabilitiesof
quantumcomputing,theinternetofthings
(IoT)andadvancesinspacealsoemerged
aspriorities.Inthecontextofuncertainties
andvulnerabilities,participantscautioned
aboutfuturecleavagesthatcouldemerge
withquantumtechnologiesandidentifiedthedevelopmentanddeploymentofquantum-safecryptographyasapriority.Preparing
technicallyandbycreatingnormsand
boundariescouldhavesweepingpositive
impactsforgovernments,businessesandsocieties.Space–giventheintegrationofadvancedtechnologiesinspace-based
systems–cameupasanotherenvironmentwhereemergingtechnologycouldcause
futurecleavagesandasadomainripeforcountriestoinnovateandadvance.Yetthe
biggestthreattothedigitalsecuritylandscapeisstillmorehumanthantechnical.Thesecurityconsequencesofrapiddigitaltransformationhadparticularrelevanceinemergingand
developingcountrieswithlargepopulations.Cybersecuritychallengesandopportunitiesofthenextdecadewillbeproportionatetothepaceandscaleatwhichcountriesdigitalize.AsparticipantsinIndiapointedout,larger
populationscorrespondtoalargertargetforattacks,rangingfromdisinformation
CybersecurityFutures2030NewFoundations7
3
campaignstofraudandextortion–familiar
attacksthatwillonlybecomemorecomplexascriminalsgaineasierandcheaperaccesstomoresophisticatedtechnologies.The
upsideisthatthereisawindowofopportunityforemerginganddevelopingcountriesto
implement“securebydesign”principles
thatthefirstwavesofdigitalizationinmore
developedcountrieshavelargelyfailed
toembed.Toanticipateandaddressthe
cybersecuritychallengesofthenextdecade,decision-makersshouldmonitorthepaceofdigitalization–andtheabilityofpopulationstointegratenewtechnologiessafelyand
securely–ascloselyastheydothesecurityspecificationsofthetechnologyitself.
Debatesaboutinternetfragmentation
versusa“freeandopen”internet
aremorphingintomorepractical
conversationsabouttrade-offsbetween
digitalsovereigntyandinteroperability.
Decision-makersacrossregionsare
strugglingtocreatetherightbalancebetweentechnologyvalue-chaininterdependencies
andself-sufficiency.Forexample,even
asnationaldataregulationsproliferate,
includingacrossthecontinentofAfrica,
participantsvoicedmoreuniformandurgentcallsfortrustedstandardsthatincentivize
interoperabilityincybersecurityandAI
security.InSingapore,therewasmore
confidencethatthegovernmentcande-risk
itsdependenciesbyexertinginfluencethroughregulation,standardsandpartnershipsto
ensurethattechnologiesusedinthecountrymeethighcybersecuritystandards.Inotherregions,thereisaprofoundsenseofa
globalleadershipvoid,alackoftrustedand
expertregulatorybodiesandinsufficient
capacityfortheenforcementofsecurityand
privacylawsandstandards.Tomeetthis
need,multi-alignedcountriesmaybebest
positionedtofacilitatemultilateraleffortsandmostabletoadvancecommonnormsand
standardsthatbenefitcollectivecybersecurity,whilesimultaneouslyinvestingtolimittheir
technologyandsupplychaindependencies.Thispragmaticsenseofopportunitywas
heardmoststronglyinSingapore,theUnitedArabEmiratesandIndia.Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldinflux.
Thisdynamicseemstogaintractionas
countriesbecomeincreasinglyawareoftheconsequencesoftechnologicalcolonialism
thatregionshaveexperiencedtovarying
degreesdependingontheirrelationships
withChinaand/ortheUS,andholdssteadyregardlessofthestrengthorweaknessof
theUS-Chinarelationshipoverthenextfiveyears.Europeansworriedaboutafalsesenseofsecurityandaskedthequestion:“Ifthe
regionisreliantonexternallargetechnologycompaniestomanageourdataanddevelopAI,howcanweknowwhichtechnology
productsaresafetouse?”Chinesetools
permeateIndiaandRwanda(andAfrica
morebroadly),andChinesetechnology
companiescontinuetobeseenaspotentialpartnersforadvancingdigitalinfrastructureintheseregions.ThereisalsoconsiderableconcernaboutChina’sabilityandwillingnesstoprotectpartnertechnology,potentiallossofprivacyandtheendoflow-cost,high-
qualitytechnologyproductsiftheUSand
Chinacooperateinsteadofcompeting.
Participantsanticipatethatglobalalliancesaresettoreshuffleinthecomingyears,withopportunitiesforcountriestocreatenew
polesinamoremultipolarworld.
1.2Thenewdigitalsecuritylandscapefor2030
to2030willbeforcountries,communities
andindividualstonegotiateafairreturnon
investment(ROI)incontrolledandresponsibleuseoftheirdata.Whatdoesthismeanforthefutureofdigitalsecurityandprivacy?Europeanparticipantssawatightropewalkbetween
leadingtheworldindigitalregulationand
enforcementononesideandthefinancialandeconomicreturnsthatdata-poweredinnovationcouldgenerateontheother.InRwanda,
Theobjectivein2030willbeforcountries,
communities
andindividualstonegotiateafairreturnon
investmentin
controlledandresponsibleuseoftheirdata.
Accelerationintechnologyandbusinessmodel
innovation(bothlicitandcriminal)willunderpin
thenewdigitalsecuritylandscapefor2030.The
workshopsuncoveredauniversalsensethatthis
accelerationisnotlikelytobeincremental.Thenew
landscapewillrequiresocietiestofundamentally
reorienttheirresponsestoperennialdigital
securitychallenges,threeofwhicharechanging
inparticularlyimportantways:dataprivacy,talent
developmentandsustainability.
concernsemergedaboutAImodelsthatare
movingaheadwithoutAfricandata.African
representationintrainingdataiscriticalinorderforAIproductstobesafeandtrustworthyto
deployinanAfricancontextbuttechnology
producersandAfricandataownersmustbe
equalparticipantsinthetransaction.IntheUS,firmsmakinginvestmentsindataprotectionand
–“Makesureyouaregettingsomethinginreturn
foryourpersonaldata,”wasarefrainheard
aroundtheworld.Intheworkshopdiscussions,
almostnoonebelievedthatitisstillplausibleor
desirabletofullyrestrictflowsofpersonaldata.
Rather,thesentimentisthat“thecatisoutof
thebag”andthattheobjectiveinthedecade
CybersecurityFutures2030NewFoundations8
Transformativeinvestmentin
cybersecurity
talentandtrainingemergedasa
priorityobjectiveacrossscenariosandgeographies.
usewillneedtocontendwithemergingsocietalmovementsadvocatingformoreself-owned
orself-manageddata.Thereisalsopotentialforplatformfirmsandtheiruserstobecomenewalliesindisincentivizinglarge-scaledatascrapingbythirdparties.Butthe“Makesureourdataisoutthere–andusedsecurelyinwaysthatbenefitcommunities”sentiment
isapronouncedchangeinattitudetowardspersonaldatathanheardinthepast.
–Transformativeinvestmentincybersecurity
talentandtrainingemergedrobustlyasapriorityobjectiveacrossgeographies.Toafargreater
degreethanseeninthepast,participantsinallworkshoplocationsrecognizedtheimportanceofhumancapitalformanagingtechnology
andcybersecurity,regardlessoftechnologicaladvances.Severalintersectingdynamicswereuniversallycited:
a.Theintensifyingcompetitionforglobal
talent.Thebarforcybersecuritytalentis
gettinghigher.Participantsnotedthatas
automationandAIfulfillmanyentry-level
technicaljobs,therewillbeincreasingneedandopportunitiesforpeopletrainedin
supervisoryandpolicyrolesforcybersecurityandAIsecurity.Inaddition,thedemandforpeoplewhocandesign,buildanddeploy
securemachinelearningandAIproducts
isskyrocketing.Theabilityofcountriesto
projectthemselvesastrustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovideaproductiveenvironmentto
capitalizeonthattalentmatterssignificantly.Participantsexpressedacuteawareness
oftheriskofazero-sumgamedynamic–
wherebycountriescompeteoverthesamelimitedpooloftalent–ifcountriesdon’t
simultaneouslyinvestinthedevelopment
andretentionoflocaltalent,withparticularconsequencesforlessdevelopedcountries.Insteadof“braindrain”,decision-makerswillneedtoconsiderideaslike“braincirculation”(bywhichforeign-borntechnologists
transfertechnicalandinstitutionalknow-howbetweendistantregionaleconomies)inthenextdecade.2
b.Theurgencyforbroadcyberliteracytrainingtocombatdisinformationandgarden-varietycybercrime.Educationandawarenessof
digitalsecuritywillbecritical.Participantssawprofoundupsideforcompanies,
governmentsandNGOsthatsuccessfullycreateupdatedcampaignsandcurricula
toeducatethepublicondigitalsecurity
issuesandbestpractices.Thisisespeciallytruefornewtechnologyusersinless
developedcountries.
c.Localandregionaleducationandskilling
programmestoreshoresupplychainsand
enableeconomicdevelopment.Then
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年醫(yī)用放射治療設(shè)備合作協(xié)議書
- 2024年激光轉(zhuǎn)速測量儀項目建議書
- 江蘇省連云港市2024-2025學年高二上學期9月月考語文試題及答案
- 春節(jié)日記7篇范文
- 新學期的計劃模板集合五篇
- 愛崗敬業(yè)的演講稿范文錦集10篇
- 讀書演講稿集合六篇
- 教科版小學科學六年級上冊期末試卷
- 2024年蘭州客車從業(yè)資格證題庫
- 2024年貴陽客運資格證應用能力考試題
- 《橋之美吳冠中》課件
- 身心靈療愈行業(yè)前景分析
- 弘揚大慶精神鐵人精神的時代意義演示稿件
- 裝修工地安全隱患及預防
- 鋼筋掛籃計算書
- 智能高速鐵路概論-課件-第一章-世界智能鐵路發(fā)展-
- 變電站電力設(shè)備絕緣綜合在線監(jiān)測系統(tǒng)的開發(fā)
- 普通心理學第六版PPT完整全套教學課件
- 創(chuàng)意美術(shù)《布老虎》課件
- 余世維如何成為一個成功的職業(yè)經(jīng)理
- 比亞迪唐DM-i說明書
評論
0/150
提交評論