ABSTRACT
Everyone wants to know the future. Exploring the future is not to make predictions, but to anticipate which futures might happen, so we may make better decisions today. The foresight process is a tool which enables researchers to become more attuned to the future; the foresight process is designed to help anticipate emerging trends, rather than be surprised by dramatic change. This paper identifies possible futures in two ways: extrapolating from the present into the future, and starting from future states to reconstruct how they might be arrived at from the current state. The result is 12 fresh scenarios and 13 new paradigms.
- 1998. Proceedings of the 1998 Workshop on New Security Paradigms. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA.Google Scholar
- Marshall D. Abrams. 1998. Security engineering in an evolutionary acquisition environment. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- Donald Beaver. 1998. Server-assisted cryptography.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- P. Bishop and A. Hines. 2012. Teaching About the Future (1 ed.). 0, Vol. 1. Palgrave Macmillan.Google Scholar
- LiWu Chang and Ira S. Moskowitz. 1998. Parsimonious downgrading and decision trees applied to the inference problem.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- D.L. Cooperrider, D. Whitney, and J.M. Stavros. 2008. Appreciative Inquiry Handbook (2 ed.). 1, Vol. 1. Crown Custom Publishing, Brunswick, OH.Google Scholar
- Crispin Cowan and Calton Pu. 1998. Death, taxes, and imperfect software: surviving the inevitable. (9 1998).Google Scholar
- E. Dragt. 2017. How to Research Trends (1 ed.). 1, Vol. 1. BIS Publishers BV.Google Scholar
- K.H.Dreborg. 1996. Essence of Backcasting. Futures 28, 9 (7 1996), 813--828. An optional note.Google Scholar
- Simon N. Foley. 1998. Evaluating system integrity.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- Steven J. Greenwald. 1998. Discussion topic: what is the old security paradigm?. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- Sohail Inayatullah. 1993. Causal Layered Analysis: Poststructuralism as Method. Futures 30, 8 (10 1993), 815--29.Google Scholar
- Sohail Inayatullah. 2014. Causal Layered Analysis Defined. The Futurist 48, 2 (2 2014).Google Scholar
- Michael Dunner Srinath Vasireddy Ray Escamilla J.D. Meier, Alex Mackman and Anandha Murukan. 2003. Improving Web Application Security: Threats and Countermeasures Roadmap (1 ed.). Microsoft Corporation.Google Scholar
- Erland Jonsson. 1998. An integrated framework for security and dependability.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- Clifford Kahn. 1998. Tolerating penetrations and insider attacks by requiring independent corroboration.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- Meng-Jang Lin, Aleta M. Ricciardi, and Keith Marzullo. 1998. A new model for availability in the face of self-propagating attacks.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- J. McDermott. 1998. Prolepsis on the problem of Trojan-horse based integrity attacks. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- Standards Association of Australia. 1995. AS/NZS 4360: Risk Management. Standards Association of Australia.Google Scholar
- Cynthia Phillips and Laura Painton Swiler. 1998. A graph-based system for network-vulnerability analysis.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- The Millennium Project. 2009. Futures Wheel, Futures Research Methodology Version 3.0 (3 ed.). The Millennium Project, Washington, DC.Google Scholar
- Noah Raford and Andrew (ed.) Curry. 2012. The Future of Futures (1 ed.). 1, Vol. 1. Association of Professional Futurists, Houston, TX, Chapter 8, From Design Fiction to Experiential Futures.Google Scholar
- Thomas Riechmann and Franz J. Hauck. 1998. Meta objects for access control: a formal model for role-based principals.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
- H. Sackman. 1974. Delphi Assessment: Expert Opinion, Forecasting and Group Process. Technical Report AD-786 878/R-1283-PR. RAND Corporation.Google Scholar
- Chris Salter, O. Sami Saydjari, Bruce Schneier, and Jim Wallner. 1998. Toward a secure system engineering methodology. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarDigital Library
Index Terms
- Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution
Recommendations
Artificial Intelligence in Strategic Foresight – Current Practices and Future Application Potentials: Current Practices and Future Application Potentials
ICEME '21: Proceedings of the 2021 12th International Conference on E-business, Management and EconomicsThe amount of data and information is growing rapidly and exponentially. A similar degree of change applies to market dynamics, volatile customer requirements, shortened product lifecycles and the amounts of environmental uncertainties in the context of ...
Young researchers' views on the current and future state of HRI
HRI '07: Proceedings of the ACM/IEEE international conference on Human-robot interactionThis paper presents the results of a panel discussion titled "The Future of HRI," held during an NSF workshop for graduate students on human-robot interaction in August 2006. The panel divided the workshop into groups tasked with inventing models of the ...
Engineering education: future trends and advances
EDUCATION'09: Proceedings of the 6th WSEAS international conference on Engineering educationEngineering developments and innovations are being brought forward at an increasingly rapid rate, thereby forcing engineering educators to adapt to new realities. A reasoned response to such pressures is essential, because engineering education, and ...
Comments