




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
CybersecurityFutures2030NewFoundations
WHITEPAPER
DECEMBER2023
Images:GettyImages
Contents
Foreword3
Executivesummary4
Introduction6
1
Findingsandinsightsfromtheworkshops7
1.1Overarchingobservations7
1.2Thenewdigitalsecuritylandscapefor20308
1.3Regionalvariances10
2
What’snext?Howtousethisreport11
2.1Whatstrengthsmatter11
2.2Whatweaknessesmatter12
2.3Whatobjectivesmatter12
Contributors14
Endnotes15
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontribution
toaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesult
ofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForum
butwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomic
Forum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
?2023WorldEconomicForum.
Allrightsreserved.
CybersecurityFutures2030NewFoundations2
December2023
CybersecurityFutures2030:
NewFoundations
Foreword
AnnCleaveland
ExecutiveDirector,CLTC,UCBerkeley
DawnThomas
Co-Director,InstituteforPublicResearch,CNA
Theglobalcybersecuritylandscapeisconstantlyandrapidlychanging.By2030,itwillonceagainberadicallytransformed.Tobetterunderstandhowtechnological,political,economicand
environmentalchangesareimpactingthe
futureofcybersecurityforgovernmentsand
organizations,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),theWorldEconomicForumCentreforCybersecurityandCNA’s
InstituteforPublicResearchhavecollaboratedonCybersecurityFutures2030,aforesight-
focusedresearchinitiativethataimstoinformcybersecuritystrategicplansaroundtheglobe.
OurengagementintheCybersecurityFutures2030initiativereflectsasharedcommitmenttopromotedigitalsecurityasastrategicpriorityandunderstandhowsystemiccybersecurity
challengesareexperiencedandaddressed
indifferentregionsaroundtheworld.
AkshayJoshi
HeadofIndustryand
Partnerships,CentreforCybersecurity,World
EconomicForum
Throughaseriesofin-depthworkshopsheldinsixinternationallocations,weexploredvarious
alternativedigitalfuturesconsideringhow
cybersecurityissettotransformoverthenextfivetosevenyears.Thereportincludesinsightsfromtheglobalworkshopsthatarebroadlyapplicableacrosscountriesandregions.Thefindingsaim
tohelpdecision-makersingovernment,industry,academiaandcivilsocietyseizeopportunities
andmitigaterisksjustoverthehorizon.
Weextendourgratitudetothosewhocontributedtothisinitiative,recognizingthatonlythrough
collaborativeeffortscanwesecurelyharnessthepromiseandpotentialoftechnologicalprogress.Maytheinsightscontainedhereinspurmeaningfuldialogue,inspireactionandguideourcollective
journeytowardamoresecureandinclusivedigitalfuture.
CybersecurityFutures2030NewFoundations3
Executivesummary
Digitalinnovationisaccelerating.Decision-makersneedlong-termstrategicforesighttoseizeopportunitiesandmitigaterisks.
ThisreportpresentsfindingsfromCybersecurity
Futures2030,aglobalresearchinitiativefocusedonexploringhowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Thegoalofthisprojectistohelpshapeafuture-focusedresearchandpolicyagendathatiswidelyapplicableacrosscountries
andsectors.
Thefindingsarebasedondiscussionsheldat
aseriesofin-personworkshopsconducted
throughout2023inDubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)andSingapore,aswellasavirtualworkshopwithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Theworkshopscentredondiscussionoffourscenariosthatportray
diverse“cybersecurityfutures”thatarefictional
(butplausible)depictionsoftheworldroughlyin
theyear2030.UCBerkeleyCenterforLong-TermCybersecurity(CLTC)independentlydesignedthescenariostoexploretrade-offsingoalsandvaluesthatdecision-makerswillhavetocontendwithinthenearfuture.
Keyfindings
–Accelerationintechnologyandbusiness
modelinnovation(bothlicitandcriminal)will
underpinthenewdigitalsecuritylandscapefor2030.Societiesmustfundamentallyreorient
theirresponsestoperennialdigitalsecuritychallenges,includingdataprivacy,talentdevelopmentandsustainability.
–Shoringuptrustwillbeakeygoalof
cybersecurityeffortsoverthenextdecade.Theonlinespreadofmis-anddisinformationarenowcorecybersecurityconcerns.
Cybersecuritywillbecomelessabout
protectingtheconfidentialityandavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.
–Stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity
strategiescanbecometrusted“brands”,
gainingadvantagesinattractingtalent,
seizingleadershipopportunitiesinmultilateralstandards-settingprocessesandcounteringdisinformationcampaigns.
–Public-privatepartnershipswillbeimperativetomovetheneedleoncombatingsovereignandcriminalcyberattacksandinformation
operationsbutnewincentivestructureswillbeneededtoachievesuchpartnerships.
–Thereisawindowofopportunityforemerginganddevelopingcountriestoimplement“securebydesign”principlesthatthefirstwavesof
digitalizationhavelargelyfailedtoembed.
Decision-makersshouldmonitorthepaceof
digitalizationandtheabilityofpopulationsto
integratenewtechnologiessafelyandsecurely.
–Transformativeinvestmentincybersecuritytalentandtrainingwillbeapriorityobjective.Countries’abilitytoprojectthemselvesas
trustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovidea
productiveenvironmenttocapitalizeon
thattalentmatterssignificantly.Promoting
educationandawarenessofdigitalsecuritywillbecritical.
–Decision-makersacrossregionsare
strugglingtobalancetechnologyvalue-
chaininterdependenciesandself-sufficiency.Evenasnationaldataregulationsproliferate,
trustedstandardsareneededthatincentivizeinteroperabilityincybersecurityandartificial
intelligence(AI)security.Insomeregions,thereisasenseofagloballeadershipvoid,alack
oftrustedandexpertregulatorybodiesand
insufficientcapacityforenforcementofsecurityandprivacylawsandstandards.
–Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldin
flux.Thisdynamicwillvaryacrossregions,willbeinfluencedbytheirrelationshipswithChinaand/ortheUSandwillholdsteadyregardlessofthestrengthorweaknessoftheUS-Chinarelationshipoverthenextfiveyears.
CybersecurityFutures2030NewFoundations4
Takeawaysfordecision-makers
–Organizationswillneedtoensuretheyhave
astableandsecuresupplychainofresources,includingtechnologycomponents,rawmaterialsandskilled,affordableworkers.
–Effectivedigitalpoliciesandregulationsshoulddemonstrateclearandstable
prioritiesofcompanies,governmentsandotherorganizations.
–Resilience,humourandoptimismaboutthe
future–andtheopportunitiesthatawaitthosewillingandabletoseizethem–arecriticalintherun-upto2030.
–Havingadigitallyliteratepublicandcustomer
basethatismediasavvyandinoculatedagainstmis-,dis-andmal-information(MDM)willbeasourceofstrengthfororganizationsthatwishtosucceedinaneraofdegradingtrust.
–Leadersshouldactivelylookforwaysto
ensurethatemergingtechnologieshelpthegeneralpopulation,forexamplebystabilizingnationaleconomies,addressinghighcostsofliving,providingfoodsecurityandadvancingrenewableenergy.
–Thepublicandprivatesectorsshouldinvestineducation(e.g.medialiteracyandcybersecurityhygiene)forthegeneralpopulationtodecreasetheattacksurfaceandin-jobtrainingtoupskilladigitalworkforce.
–LeaderswillneedtostrategicallyandtacticallyuseregulationtoguardagainstthedownsidesofAIproductsastheyriseinprominenceandmusttakemeaningfulmeasurestocombat
MDMbeforeitfurtherdegradestrustandunity.
–Countriesshouldformandstrengthentrustedresearchinstitutions,particularlyinless-
developedeconomies,tosupportgovernmentsinaddressingthemostchallengingsocialandtechnicalcybersecurityproblemsof2030.
Thenextphaseofthisprojectwillincludeworkingwithdecision-makerstogenerateadditional
prioritiesandthinkingmorebroadlyabout
howfindingsfromthisreportcouldreshape
organizations’futures.Grapplingwiththese
kindsofquestionsshouldbeadefiningfocus
in2024forC-suites,boardsandgovernment
agenciesinternationally.
CybersecurityFutures2030NewFoundations5
Thisbroaderlookatcybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnology
touchessociety.
Introduction
CybersecurityFutures2030isaforesight-
focusedresearchinitiativethataimstoinform
cybersecuritystrategicplanningaroundtheglobe.
Awiderangeofissueshavechangedthe
cybersecurityagendaoverthepastfiveyears–fromdigitaltransformationduringaglobalpandemicto
thecommercializationoflargelanguagemodels
andfromthelargestmilitaryconflictsofthecyber
agetoaninternationalransomwarescourge.As
KenMcCallum,theDirector-GeneraloftheBritish
SecurityService,recentlyremarked:“Ifyouare
workingatthecuttingedgeoftechnologytoday,youmaynotbeinterestedingeopolitics,butgeopoliticsiscertainlyinterestedinyou.”1Thenextfiveyearswillbringanothersetofunprecedentedcybersecurity
challengesandopportunities.Thosewithstrategicforesightwillbebettersituatedtotiltthedigitalworldinadirectionthatismoresecure.
Tolookoverthehorizon,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),withthe
supportoftheWorldEconomicForum’sCentreforCybersecurity(C4C)andCNA’sInstituteforPublicResearch,launchedCybersecurityFutures2030,aglobalinitiativethatexploreshowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Theaimistohelpshapeafuture-focusedresearch
andpolicyagendathatiswidelyapplicableacrosscountriesandsectors.Thisbroaderlookat
cybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnologytouchessociety.
BetweenJanuaryandApril2023,theCLTC
independentlydevelopedasetoffourscenariosthatportraypossible“cybersecurityfutures”
lookingforwardtoroughly2030.Thescenariosweredesignedtoexaminesomeofthetrade-
offsingoalsandvaluesthatdecision-makers
willhavetocontendwithinthenearfuture.The
scenariosfocusonwhatisrelevantandplausible,whilealsochallengingimplicitbeliefsandtoday’sconventionalwisdom.Ratherthanpredictthe
future,theyarespecificallydesignedtoelicitmeaningfullydifferentglobalperspectives.
BetweenMayandSeptember2023,theinitiativetookthesescenariostofiveinternationallocationsthatwillhavedifferentinfluencesandperspectivesonthedigitalsecuritylandscapeofthenext
decade:Dubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)
andSingapore.Inaddition,therewerevirtual
workshopswithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Aworkshop
ineachlocationhadamixofparticipantsfrom
government,business,civilsociety,academiaandotherdomains.Similarworkshopprocesseswereruntoextractreactionsandinsightsthatwould
becomparable.Thesecomparisonsarethemostimportantimmediateproductoftheworkshops.
Ofcourse,thesecomparisonscomewithcaveats,themostimportantofwhichistheuseofaggregategeographicalcategoriesasplaceholders.A
singleworkshopinNewDelhi(despitebroad
representationfromexpertsinacademia,industry,governmentandcivilsociety)cannotrepresentthecomprehensiveperspectiveofcitizensintheworld’smostpopulouscountry.Norcanaworkshopin
KigalispeakforthewholeAfricancontinent.The
geographiclabelsarebestthoughtofasimperfectproxiesthatshedlightoncommonalitiesand
differencesacrossmanyregionsthatwillimpactthefutureoftheglobaldigitalsecuritylandscape,but
therewasnocapacitytoconveneworkshopsinallpartsoftheworld.Anothercaveatisrecencybias;theworkshopparticipantsarepeopleandpeople
readfuturescenariosinthecontextofwhatismostimportantandurgentintheirmindsatthatmoment.Inthiscontext,itislikelyunsurprisingthatworkshopparticipantsmentionedartificialintelligence(AI)morethanotheremergingtechnologiesbyafactorof
10.Finally,scenariosthemselveshaveblindspots,evenastheystretchimaginationstotheedgeof
plausibility.Theworkshopprocesswasdesignedtominimizethesekindsofbiasesbutitisimpossibletofullyeliminatethem.
Theworkshopshelpedexposehowattitudesandperspectivesaredevelopinganddivergingacrossgeographies.Theinsightsreportedbelowarelikelytoreframethedecision-makingenvironmentand
willhelpdecision-makersingovernment,industry
andcivilsocietyreducefrictions,seizeopportunitiesforcooperationandbetterprepareforthefuture.
CybersecurityFutures2030NewFoundations6
Cybersecuritywillbecomelessaboutprotectingtheconfidentialityandavailability
ofinformationandmoreaboutprotectingits
integrityand
provenance.
Digitalsecurityisbeingreframedasthe
abilityofsocietiestomatchthespeed
oftrustwiththespeedofinnovation.In
eachworkshop,participantsvoicedfears
thatthespeedoftechnologicalandcriminal
2
1
Findingsandinsights
fromtheworkshops
Aseriesofinternationalworkshopsrevealed
criticalchallenges,uncertaintiesand
opportunitiesforgovernmentsandorganizationsinarapidlyevolvingcybersecuritylandscape.
Thisreportdetailsthreeoverarchingobservationsandthreeproposedelementsofthenewlandscapein2030thatemergedfromtheworkshops.
Eachdeservesfocusedattentioninstrategicplanningandfuturedecision-making.
1.1Overarchingobservations
1
innovationhassurpassedhumanity’sability
toensurethetrustworthinessofdigital
productsandinformation,whichhasprofoundconsequencesforthelegitimacyofnational
andinternationalinstitutions.Shoringup
trustemergedasakeygoalofcybersecurityeffortsoverthenextdecade.Atastrategic
level,stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity
strategiescanbecometrusted“brands”,
gainingadvantagesinattractingtalent,
seizingleadershipopportunitiesinmultilateralstandard-settingprocessesandcountering
disinformationcampaigns.ThisoutlookwasmostpronouncedinSingapore,IndiaandtheUnitedArabEmirates.Atamoreoperationallevel,participantsalsodiscussedregulators’roleinmonitoringmultinationalcompanies
closelywitheffectiveaccountabilitymeasures.
ThissentimentwasmostpronouncedinAfricaandtheEU.IntheUS,therewasmuchmore
tensionaboutwhois“incharge”oftrust–thegovernmentortheprivatesector.Agreement
thatpublic-privatepartnershipsareimperativetomovetheneedleoncombatingsovereign
andcriminalcyberattacksandinformation
operationswasaccompaniedbyanequal
senseofdisillusionmentaboutthefeasibility
ofsuchpartnershipsgivencurrentincentive
structures.Participantsvoicednearlyuniversalagreementthattheonlinespreadofmis-,
dis-andmal-information(MDM)arenowcorecybersecurityconcerns.Cybersecuritywill
becomelessaboutprotectingtheconfidentiality
andavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.
Thepaceandscaleofdigitalizationwill
drivechangestotheglobalsecurity
landscapeasmuchas(ormorethan)
thespecificcapabilitiesofemerging
technologies.Workshopparticipants
focusedonAIandautomationmorethan
othertechnologiesbyafactorof10,thoughthecurrentandpotentialcapabilitiesof
quantumcomputing,theinternetofthings
(IoT)andadvancesinspacealsoemerged
aspriorities.Inthecontextofuncertainties
andvulnerabilities,participantscautioned
aboutfuturecleavagesthatcouldemerge
withquantumtechnologiesandidentifiedthedevelopmentanddeploymentofquantum-safecryptographyasapriority.Preparing
technicallyandbycreatingnormsand
boundariescouldhavesweepingpositive
impactsforgovernments,businessesandsocieties.Space–giventheintegrationofadvancedtechnologiesinspace-based
systems–cameupasanotherenvironmentwhereemergingtechnologycouldcause
futurecleavagesandasadomainripeforcountriestoinnovateandadvance.Yetthe
biggestthreattothedigitalsecuritylandscapeisstillmorehumanthantechnical.Thesecurityconsequencesofrapiddigitaltransformationhadparticularrelevanceinemergingand
developingcountrieswithlargepopulations.Cybersecuritychallengesandopportunitiesofthenextdecadewillbeproportionatetothepaceandscaleatwhichcountriesdigitalize.AsparticipantsinIndiapointedout,larger
populationscorrespondtoalargertargetforattacks,rangingfromdisinformation
CybersecurityFutures2030NewFoundations7
3
campaignstofraudandextortion–familiar
attacksthatwillonlybecomemorecomplexascriminalsgaineasierandcheaperaccesstomoresophisticatedtechnologies.The
upsideisthatthereisawindowofopportunityforemerginganddevelopingcountriesto
implement“securebydesign”principles
thatthefirstwavesofdigitalizationinmore
developedcountrieshavelargelyfailed
toembed.Toanticipateandaddressthe
cybersecuritychallengesofthenextdecade,decision-makersshouldmonitorthepaceofdigitalization–andtheabilityofpopulationstointegratenewtechnologiessafelyand
securely–ascloselyastheydothesecurityspecificationsofthetechnologyitself.
Debatesaboutinternetfragmentation
versusa“freeandopen”internet
aremorphingintomorepractical
conversationsabouttrade-offsbetween
digitalsovereigntyandinteroperability.
Decision-makersacrossregionsare
strugglingtocreatetherightbalancebetweentechnologyvalue-chaininterdependencies
andself-sufficiency.Forexample,even
asnationaldataregulationsproliferate,
includingacrossthecontinentofAfrica,
participantsvoicedmoreuniformandurgentcallsfortrustedstandardsthatincentivize
interoperabilityincybersecurityandAI
security.InSingapore,therewasmore
confidencethatthegovernmentcande-risk
itsdependenciesbyexertinginfluencethroughregulation,standardsandpartnershipsto
ensurethattechnologiesusedinthecountrymeethighcybersecuritystandards.Inotherregions,thereisaprofoundsenseofa
globalleadershipvoid,alackoftrustedand
expertregulatorybodiesandinsufficient
capacityfortheenforcementofsecurityand
privacylawsandstandards.Tomeetthis
need,multi-alignedcountriesmaybebest
positionedtofacilitatemultilateraleffortsandmostabletoadvancecommonnormsand
standardsthatbenefitcollectivecybersecurity,whilesimultaneouslyinvestingtolimittheir
technologyandsupplychaindependencies.Thispragmaticsenseofopportunitywas
heardmoststronglyinSingapore,theUnitedArabEmiratesandIndia.Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldinflux.
Thisdynamicseemstogaintractionas
countriesbecomeincreasinglyawareoftheconsequencesoftechnologicalcolonialism
thatregionshaveexperiencedtovarying
degreesdependingontheirrelationships
withChinaand/ortheUS,andholdssteadyregardlessofthestrengthorweaknessof
theUS-Chinarelationshipoverthenextfiveyears.Europeansworriedaboutafalsesenseofsecurityandaskedthequestion:“Ifthe
regionisreliantonexternallargetechnologycompaniestomanageourdataanddevelopAI,howcanweknowwhichtechnology
productsaresafetouse?”Chinesetools
permeateIndiaandRwanda(andAfrica
morebroadly),andChinesetechnology
companiescontinuetobeseenaspotentialpartnersforadvancingdigitalinfrastructureintheseregions.ThereisalsoconsiderableconcernaboutChina’sabilityandwillingnesstoprotectpartnertechnology,potentiallossofprivacyandtheendoflow-cost,high-
qualitytechnologyproductsiftheUSand
Chinacooperateinsteadofcompeting.
Participantsanticipatethatglobalalliancesaresettoreshuffleinthecomingyears,withopportunitiesforcountriestocreatenew
polesinamoremultipolarworld.
1.2Thenewdigitalsecuritylandscapefor2030
to2030willbeforcountries,communities
andindividualstonegotiateafairreturnon
investment(ROI)incontrolledandresponsibleuseoftheirdata.Whatdoesthismeanforthefutureofdigitalsecurityandprivacy?Europeanparticipantssawatightropewalkbetween
leadingtheworldindigitalregulationand
enforcementononesideandthefinancialandeconomicreturnsthatdata-poweredinnovationcouldgenerateontheother.InRwanda,
Theobjectivein2030willbeforcountries,
communities
andindividualstonegotiateafairreturnon
investmentin
controlledandresponsibleuseoftheirdata.
Accelerationintechnologyandbusinessmodel
innovation(bothlicitandcriminal)willunderpin
thenewdigitalsecuritylandscapefor2030.The
workshopsuncoveredauniversalsensethatthis
accelerationisnotlikelytobeincremental.Thenew
landscapewillrequiresocietiestofundamentally
reorienttheirresponsestoperennialdigital
securitychallenges,threeofwhicharechanging
inparticularlyimportantways:dataprivacy,talent
developmentandsustainability.
concernsemergedaboutAImodelsthatare
movingaheadwithoutAfricandata.African
representationintrainingdataiscriticalinorderforAIproductstobesafeandtrustworthyto
deployinanAfricancontextbuttechnology
producersandAfricandataownersmustbe
equalparticipantsinthetransaction.IntheUS,firmsmakinginvestmentsindataprotectionand
–“Makesureyouaregettingsomethinginreturn
foryourpersonaldata,”wasarefrainheard
aroundtheworld.Intheworkshopdiscussions,
almostnoonebelievedthatitisstillplausibleor
desirabletofullyrestrictflowsofpersonaldata.
Rather,thesentimentisthat“thecatisoutof
thebag”andthattheobjectiveinthedecade
CybersecurityFutures2030NewFoundations8
Transformativeinvestmentin
cybersecurity
talentandtrainingemergedasa
priorityobjectiveacrossscenariosandgeographies.
usewillneedtocontendwithemergingsocietalmovementsadvocatingformoreself-owned
orself-manageddata.Thereisalsopotentialforplatformfirmsandtheiruserstobecomenewalliesindisincentivizinglarge-scaledatascrapingbythirdparties.Butthe“Makesureourdataisoutthere–andusedsecurelyinwaysthatbenefitcommunities”sentiment
isapronouncedchangeinattitudetowardspersonaldatathanheardinthepast.
–Transformativeinvestmentincybersecurity
talentandtrainingemergedrobustlyasapriorityobjectiveacrossgeographies.Toafargreater
degreethanseeninthepast,participantsinallworkshoplocationsrecognizedtheimportanceofhumancapitalformanagingtechnology
andcybersecurity,regardlessoftechnologicaladvances.Severalintersectingdynamicswereuniversallycited:
a.Theintensifyingcompetitionforglobal
talent.Thebarforcybersecuritytalentis
gettinghigher.Participantsnotedthatas
automationandAIfulfillmanyentry-level
technicaljobs,therewillbeincreasingneedandopportunitiesforpeopletrainedin
supervisoryandpolicyrolesforcybersecurityandAIsecurity.Inaddition,thedemandforpeoplewhocandesign,buildanddeploy
securemachinelearningandAIproducts
isskyrocketing.Theabilityofcountriesto
projectthemselvesastrustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovideaproductiveenvironmentto
capitalizeonthattalentmatterssignificantly.Participantsexpressedacuteawareness
oftheriskofazero-sumgamedynamic–
wherebycountriescompeteoverthesamelimitedpooloftalent–ifcountriesdon’t
simultaneouslyinvestinthedevelopment
andretentionoflocaltalent,withparticularconsequencesforlessdevelopedcountries.Insteadof“braindrain”,decision-makerswillneedtoconsiderideaslike“braincirculation”(bywhichforeign-borntechnologists
transfertechnicalandinstitutionalknow-howbetweendistantregionaleconomies)inthenextdecade.2
b.Theurgencyforbroadcyberliteracytrainingtocombatdisinformationandgarden-varietycybercrime.Educationandawarenessof
digitalsecuritywillbecritical.Participantssawprofoundupsideforcompanies,
governmentsandNGOsthatsuccessfullycreateupdatedcampaignsandcurricula
toeducatethepublicondigitalsecurity
issuesandbestpractices.Thisisespeciallytruefornewtechnologyusersinless
developedcountries.
c.Localandregionaleducationandskilling
programmestoreshoresupplychainsand
enableeconomicdevelopment.Then
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- T-ZSM 0057-2024“領(lǐng)跑者”評價(jià)技術(shù)要求 石油、石化及相關(guān)工業(yè)用的鋼制球閥
- T-ZJZYC 010-2024 中藥材產(chǎn)業(yè)合規(guī)管理規(guī)范
- 二零二五年度個(gè)人向新能源車輛制造商借款購買電動車的合同
- 歷年合同法司考備考輔導(dǎo)班師資聘用合同2025年度
- 2025年度集體土地租賃與特色小鎮(zhèn)建設(shè)合同
- 二零二五年度互聯(lián)網(wǎng)廣告聯(lián)盟合作協(xié)議合同
- 2025年度砂石場勞務(wù)人員薪酬及福利待遇合同
- 二零二五年度網(wǎng)紅獨(dú)家經(jīng)紀(jì)合作協(xié)議模板
- 二零二五年度電子商務(wù)平臺支付清算合同范本
- 新能源汽車項(xiàng)目買賣合同
- 國企治理三會一層詳解
- 公司企業(yè)生產(chǎn)安全事故應(yīng)急預(yù)案演練計(jì)劃
- 人教鄂教版科學(xué)六年級下冊全冊教案
- 鋁合金鑄造基礎(chǔ)知識(課堂PPT)
- 診斷學(xué)課件:臨床常用免疫學(xué)檢測
- jw甲級設(shè)計(jì)院十六層醫(yī)院綜合樓全套電氣施工圖紙103張含多大樣圖
- 港股通開戶測評答案
- 廣東專插本高等數(shù)學(xué)真題
- 云南省普通初中學(xué)生成長記錄
- 仿真技術(shù)在車架防腐性能開發(fā)中的應(yīng)用
- 初一平面直角坐標(biāo)系集體備課
評論
0/150
提交評論