Abstract
Emerging technologies advance so rapidly that it is challenging to account for all of their positive and negative impacts. Discussion of vulnerabilities, the potential negative impacts, tends to be sidelined in favor of innovative transformations that such technologies have enabled in human lives. A holistic view of the impacts of emerging technologies is crucial for developers, policy makers, and technology users to improve design, evaluation, and policies to reduce threats and protect society. In this paper a systematic literature review has been conducted to identify various vulnerabilities that can be associated with emerging technologies, categorize the vulnerabilities, identify different types of each vulnerability and identify existing recommendations to mitigate them. Our analyses reveal that the potential vulnerabilities can be categorized into seven domains of technical, economical, health, ethical, legal/political, societal, and environmental vulnerabilities. In each category, vulnerabilities have been identified, examples and statistics of vulnerabilities have been explored, and protocols and suggested preventive actions have been identified. Our findings reveal that the most discussed categories of vulnerabilities are technical and ethical, and few protocols or preventative actions exist for reducing vulnerability in any of the categories. Considering both positive and negative impacts of emerging technologies is paramount in properly evaluating and regulating emerging technologies. This study sheds light in this direction by elaborating various vulnerabilities of emerging technologies.
Similar content being viewed by others
Data availability
All data and materials supporting this research including the excel sheet that was created to code the identified studies will be available upon request. Interested readers are encouraged to contact the second author (saman.asvadi@mail.concordia.ca).
Notes
Our search queries include: (“unintended consequences”) + (“digital”; “dark side” OR “dark sides”) + (“digital”; “vulnerability” OR “vulnerabilities”) + (“digital”; “ethical problem” OR “ethical problems”) + (“IT’; “negative”) + (“digital”; “problem”) + (“digital technology”; “unintended”) + (“technology”).
References
Acemoglu D (2021) Harms of AI. National Bureau of Economic Research
Ahmed YA, Ahmad MN, Ahmad N, Zakaria NH (2019) Social media for knowledge-sharing: a systematic literature review. Telemat Inf 37:72–112
AI H (2019) High-level expert group on artificial intelligence. In: European Commission. p 6. Available at: https://ec.europa.eu/digital-single
Bagchi K, Bannan C, Franklin SB, Hurlburt H, Sarkesian L, Schulman R, Stager J, Edmond J. (2020) Digital tools for COVID-19 contact tracing: identifying and mitigating the equity, privacy, and civil liberties concerns
Britton K (2016) Handling privacy and security in the internet of things. J Intern Law 19(10):3–7
Brooke Z (2018) A marketer’s guide to the dark web. Market Insights
Burnett JR, Lisk TC (2019) The future of employee engagement: real-time monitoring and digital tools for engaging a workforce. Int Stud Manag Organ 49(1):108–119
Čelik P (2019) Institutional measures for increasing the cyber security for business in the European Union. Econ Themes 57(3):351–364
Chaison G (2002) Information technology: the threat to unions. J Lab Res 23(2):249–259
Chakravarty A, Grewal R, Sambamurthy V (2013) Information technology competencies, organizational agility, and firm performance: enabling and facilitating roles. Inf Syst Res 24(4):976–997
Chatterjee S, Sarker S (2013) Infusing ethical considerations in knowledge management scholarship: toward a research agenda. J Assoc Inf Syst 14(8):1
Chatterjee S, Sarker S, Fuller M (2009) Ethical information systems development: a Baumanian postmodernist perspective. J Assoc Inf Syst 10(11):3
Chen H, Pendleton M, Njilla L, Xu S (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv (CSUR) 53(3):1–43
Clim A (2019) Cyber security beyond the Industry 4.0 era. A short review on a few technological promises. Inform Econ 23(2):34–44
Costa RD, Souza GF, Valentim RA, Castro TB (2020) The theory of learning styles applied to distance learning. Cogn Syst Res 64:134–145
Davis JE, Scherz P (2019) Persons without qualities: algorithms, AI, and the reshaping of ourselves. Soc Res Int Q 86(4):9–10
De Cremer D, Nguyen B, Simkin L (2017) The integrity challenge of the Internet-of-Things (IoT): on understanding its dark side. J Mark Manag 33(1–2):145–158
DiGrazia K (2017) Cyber insurance, data security, and blockchain in the wake of the Equifax breach. J Bus Tech l 13:255
Elliott K, Price R, Shaw P, Spiliotopoulos T, Ng M, Coopamootoo K, van Moorsel A (2021) Towards an equitable digital society: artificial intelligence (AI) and corporate digital responsibility (CDR). Society 58(3):179–188. https://doi.org/10.1007/s12115-021-00594-8
Estrada EP, Anderson AD, Brown A (2021) # IamaRefugee: social media resistance to trump’s ‘Muslim Ban.’ J Refug Stud 34(3):3442–3463
Federico C, Thompson T (2019) Do IRS computers dream about tax cheats: artificial intelligence and big data in tax enforcement and compliance. J Tax Prac Proc 21:35
Ferraris D, Fernandez-Gago C (2020) TrUStAPIS: a trust requirements elicitation method for IoT. Int J Inf Secur 19(1):111–127
Ferretti L, Wymant C, Kendall M, Zhao L, Nurtay A, Abeler-Dörner L, Parker M, Bonsall D, Fraser C (2020) Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368(6491):eabb6936. https://doi.org/10.1126/science.abb6936
Figueroa-Lorenzo S, Añorga J, Arrizabalaga S (2020) A survey of IIoT protocols: a measure of vulnerability risk analysis based on CVSS. ACM Comput Surv (CSUR) 53(2):1–53
Gioia DA, Corley KG, Hamilton AL (2013) Seeking qualitative rigor in inductive research: notes on the Gioia methodology. Organ Res Methods 16(1):15–31
Gozman D, Butler T, Lyytinen K (2020) Regulation in the age of digitalization. Call Pap Spec Issue J Inform Technol 1–5
Grant P (2007) A new approach to diabetic control: fuzzy logic and insulin pump technology. Med Eng Phys 29(7):824–827
Grody AD (2020) Addressing cyber risk in financial institutions and in the financial system. J Risk Manag Financ Inst 13(2):155–162
Gunasekaran KA (2019) Safety matters. Profess Saf J
Guo X, Ling KC, Liu M (2012) Evaluating factors influencing consumer satisfaction towards online shopping in China. Asian Soc Sci 8(13):40
Halaweh M (2013) Emerging technology: What is it. J Technol Manag Innov 8(3):108–115
Haryanti DA, Margianti ES, Prihantoro E, Ohorella NR (2021) The effect of knowledge sharing and benefits on sharing intentions through social interaction in social media groups. Int J Sci Res Sci Technol. https://doi.org/10.32628/IJSRST21848
Holland P, Bardoel A (2015) Special issue of International Journal of Human Resource Management the impact of technology on work in the twenty-first century exploring the smart and dark side. Taylor Francis, Milton Park
Humble KP, Altun D (2020) Artificial Intelligence and the threat to human rights. J Intern Law 24(3):1–19
Islam N, Dhir A, Talwar S, Walsh S (2021) Reimaging emerging technologies in the new normal: forecasting growth trajectory, risk and resistance towards a friction-free diffusion in varied industry verticals. IEEE Technol Eng Manag
Jan Recker SC, Janina Sundermeier VG-D (2022) Special issue CFP: digital responsibility: social, ethical, and ecological implications. J Assoc Inf Syst. Retrieved from https://aisnet.org/news/604253/JAIS-Special-Issue-CFP-Digital-Responsibility-Social-Ethical-and-Ecological-Implications.htm
Janger EJ, Twerski AD (2019) The heavy hand of Amazon: a seller not a neutral platform. Brook J Corp Fin Com L 14:259
Kane GC, Young AG, Majchrzak A, Ransbotham S (2021) Avoiding an oppressive future of machine learning: a design theory for emancipatory assistants. MIS Q 45(1):371–396
Kelley S (2022) Employee perceptions of the effective adoption of AI principles. J Bus Ethics 178(4):871–893
Keszthelyi A (2014) New challenges of a new era. Proc Manag Chall Contemp Soc 7(1):144
LC (2017) How to ensure a secure internet of things. Digit Econ
Lee D, Jackson J (2018) Protecting against cybersecurity threats. Healthc Financ Manag 72(9):24–26
Limayem M, Khalifa M, Frini A (2000) What makes consumers buy from Internet? A longitudinal study of online shopping. IEEE Trans Syst Man Cybern-Part A Syst Hum 30(4):421–432
Lobschat L, Mueller B, Eggers F, Brandimarte L, Diefenbach S, Kroschke M, Wirtz J (2021) Corporate digital responsibility. J Bus Res 122:875–888
Ludin IHBH, Cheng BL (2014) Factors influencing customer satisfaction and e-loyalty: online shopping environment among the young adults. Manag Dyn Knowl Econ 2(3):462–462
Mäkinen J (2015) Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things. Inf Commun Technol Law 24(3):262–277
Mani Z, Chouk I (2018) Consumer resistance to innovation in services: challenges and barriers in the internet of things era. J Prod Innov Manag 35(5):780–807
Manyika J (2017) Technology, jobs and the future of work
Meijer A, Thaens M (2021) The dark side of public innovation. Public Perform Manag Rev 44(1):136–154
Miller J, Green I, Putland G (2005) Emerging technologies: a framework for thinking. Australian capital territory department of education and training. Retrieved 13 Nov 2008
Morantz M (2018) The dark side of digital economy: bad things come in big packages. OECD Observer, Paris
Mundt M, Ross K, Burnett CM (2018) Scaling social movements through social media: the case of Black Lives Matter. Soc Med Soc 4(4):2056305118807911
Munsch A, Munsch P (2020) The future of API security: the adoption of APIs for digital communications and the implications for cyber security vulnerabilities. J Int Technol Inf Manag 29(3):25
Ng IC, Wakenshaw SY (2017) The Internet-of-Things: review and research directions. Int J Res Mark 34(1):3–21
Ng CK, Wu CH, Yung KL, Ip WH, Cheung T (2018) A semantic similarity analysis of Internet of Things. Enterp Inf Syst 12(7):820–855
Otoom M, Alshraideh H, Almasaeid HM, López-de-Ipina D, Bravo J (2015) Real-time statistical modeling of blood sugar. J Med Syst 39:1–6
Park KC, Shin D-H (2017) Security assessment framework for IoT service. Telecommun Syst 64:193–209
Paudel P (2021) Online education: benefits, challenges and strategies during and after COVID-19 in higher education. Int J Stud Educ 3(2):70–85
Peimani N, Kamalipour H (2021) Online education and the COVID-19 outbreak: a case study of online teaching during lockdown. Educ Sci 11(2):72
Perz P, Gemzik-Salwach A (2020) Cryptocurrencies as a subject of financial investments. Risk analysis and potential benefits on the example of bitcoin. Acta Sci Polon Oecon 19(2):15–23
Popa M, Toma C, Boja C, Zamfiroiu A (2017) Privacy and security in connected vehicles ecosystems. Inform Econ 21(4):29–40
Popescul D, Georgescu M (2014) Internet of Things—some ethical issues. USV Ann Econ Public Adm 13(2 (18)):208–214
Radanliev P, De Roure D (2023) New and emerging forms of data and technologies: literature and bibliometric review. Multimed Tools Appl 82(2):2887–2911
Radanliev P, De Roure D, Maple C, Ani U (2022) Super-forecasting the ‘technological singularity’ risks from artificial intelligence. Evol Syst 13(5):747–757
Rezaei H (2012) The application of information technology and its relationship with organizational intelligence. Proced Technol 1:94–97
Rippee SM (2020) This internet thing is great, isn’t it, Hal? Product liability in the next 100 years. Def Counsel J 87:1
Rossi M, Cheung CM, Thatcher JB (2020) Ethical issues and unintended consequences of digitalization and platformization. Call Pap J Inf Technol
Rosso M, Nasir A, Farhadloo M (2020) Chilling effects and the stock market response to the Snowden revelations. New Media Soc 22(11):1976–1995
Rotolo D, Hicks D, Martin BR (2015) What is an emerging technology? Res Policy 44(10):1827–1843
Sadeghi M (2019) A shift from classroom to distance learning: advantages and limitations. Int J Res Eng Educ 4(1):80–88
Salah-Eddine M, Belaissaoui M, El Alami A, Salah-Eddine K (2019) Technostress management through data mining. J Manag Inf Decis Sci 22(1):66–82
Santoso G, Hani S, Kristiyana S, Saputra Y (2019) Design non-invasive of blood sugar detector prototypes using cellular technology GPS-based. In: Paper presented at the Journal of Physics: Conference Series
Scholz RW, Bartelsman EJ, Diefenbach S, Franke L, Grunwald A, Helbing D, Hill R, Hilty L, Höjer M, Klauser S, Montag C (2018) Unintended side effects of the digital transition: European scientists’ messages from a proposition-based expert round table. Sustainability 10(6):2001
Sinha P, Paterson AE (2020) Contact tracing: Can ‘big tech’ come to the rescue, and if so, at what cost? EClinicalMedicine 24:100412
Sowmiya B, Abhijith V, Sudersan S, Sakthi Jaya Sundar R, Thangavel M, Varalakshmi P (2021) A survey on security and privacy issues in contact tracing application of COVID-19. SN Comput Sci 2:1–11
Steininger DM, Mikalef P, Pateli A, Ortiz-de-Guinea A (2022) Dynamic capabilities in information systems research: a critical review, synthesis of current knowledge, and recommendations for future research. J Assoc Inf Syst 23(2):447–490
Tahiliani A, Hassija V, Chamola V, Kanhere SS, Guizani M (2021) Privacy-preserving and incentivized contact tracing for COVID-19 using blockchain. IEEE Internet Things Mag 4(3):72–79
Tarafdar M, Gupta A, Turel O (2013) The dark side of information technology use. Inf Syst J 23(3):269–275
Tarafdar M, Pullins EB, Ragu-Nathan T (2015) Technostress: negative effect on performance and possible mitigations. Inf Syst J 25(2):103–132
Turel O, Qahri-Saremi H (2016) Problematic use of social networking sites: antecedents and consequence from a dual-system theory perspective. J Manag Inf Syst 33(4):1087–1116
Ul Rehman S, Manickam S (2016) A study of smart home environment and its security threats. Int J Reliab Qual Saf Eng 23(03):1640005
Vargas-Hernández JG, Salcedo MTA (2018) The influence and benefits of technology as a strategy in organizations. Global J Enterp Inf Syst 10(4):6–17
Vassakis K, Petrakis E, Kopanakis I (2018) Big data analytics: applications, prospects and challenges. In: Skourletopoulos G, Mastorakis G, Mavromoustakis C, Dobre C, Pallis E (eds) Mobile big data: a roadmap from models to technologies. Springer, Cham, pp 3–20
Vassilakopoulou P, Hustad E (2023) Bridging digital divides: a literature review and research agenda for information systems research. Inf Syst Front 25(3):955–969
Vieira da Cunha J, Carugati A, Leclercq-Vandelannoitte A (2015) The dark side of computer-mediated control. Inf Syst J 25(4):319–354
Vinuesa R, Azizpour H, Leite I, Balaam M, Dignum V, Domisch S, Felländer A, Langhans SD, Tegmark M, Fuso Nerini F (2020) The role of artificial intelligence in achieving the Sustainable Development Goals. Nat Commun 11(1):233. https://doi.org/10.1038/s41467-019-14108-y
Voegtlin C, Scherer AG, Stahl GK, Hawn O (2022) Grand societal challenges and responsible innovation. J Manag Stud 59(1):1–28
Warschauer M (2011) Emerging technologies for autonomous language learning. Reading 2(3):107
Weber RM, Horn BD (2017) Breaking bad security vulnerabilities. J Financ Serv Prof 71(1):50
Yehya F (2020) Promoting technology-implementation learning paradigm for online learning in secondary education. Global J Inf Technol Emerg Technol 10(1):12–21
Zeng J (2016) China’s date with big data: Will it strengthen or threaten authoritarian rule? Int Aff 92(6):1443–1462
Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34
Zittrain J (2006) The generative internet. Harvard law review. Oxf Legal Stud Res Pap 119:1970
Funding
The authors would like to acknowledge the financial support received from the Mobilizing Insights in Defense and Security (MINDS) program of the Department of National Defense (DND), Canada. Any opinions and conclusions in this work are strictly those of the authors and do not reflect the views, positions, or policies of - and are not endorsed by - MINDS, DND, or the Government of Canada.
Author information
Authors and Affiliations
Contributions
Mohsen Farhadloo designed and conceptualized the study. The literature search, material preparation, and data collection were performed by Saman Asvadi. Mohsen Farhadloo and Saman Asvadi contributed to the analysis and synthesis of the results. Saman Asvadi and Mohsen Farhadloo drafted the work and Kash Khorasani critically revised the work.
Corresponding author
Ethics declarations
Conflict of interest
All authors report no conflict of interest. In addition, no funding was received for conducting this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Farhadloo, M., Asvadi, S. & Khorasani, K. Potential vulnerabilities associated with emerging technologies: insights from a systematic literature review. Manag Rev Q (2024). https://doi.org/10.1007/s11301-024-00420-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11301-024-00420-5