Skip to main content
Log in

Potential vulnerabilities associated with emerging technologies: insights from a systematic literature review

  • Published:
Management Review Quarterly Aims and scope Submit manuscript

Abstract

Emerging technologies advance so rapidly that it is challenging to account for all of their positive and negative impacts. Discussion of vulnerabilities, the potential negative impacts, tends to be sidelined in favor of innovative transformations that such technologies have enabled in human lives. A holistic view of the impacts of emerging technologies is crucial for developers, policy makers, and technology users to improve design, evaluation, and policies to reduce threats and protect society. In this paper a systematic literature review has been conducted to identify various vulnerabilities that can be associated with emerging technologies, categorize the vulnerabilities, identify different types of each vulnerability and identify existing recommendations to mitigate them. Our analyses reveal that the potential vulnerabilities can be categorized into seven domains of technical, economical, health, ethical, legal/political, societal, and environmental vulnerabilities. In each category, vulnerabilities have been identified, examples and statistics of vulnerabilities have been explored, and protocols and suggested preventive actions have been identified. Our findings reveal that the most discussed categories of vulnerabilities are technical and ethical, and few protocols or preventative actions exist for reducing vulnerability in any of the categories. Considering both positive and negative impacts of emerging technologies is paramount in properly evaluating and regulating emerging technologies. This study sheds light in this direction by elaborating various vulnerabilities of emerging technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

All data and materials supporting this research including the excel sheet that was created to code the identified studies will be available upon request. Interested readers are encouraged to contact the second author (saman.asvadi@mail.concordia.ca).

Notes

  1. https://www.ebsco.com/user/login.

  2. Our search queries include: (“unintended consequences”) + (“digital”; “dark side” OR “dark sides”) + (“digital”; “vulnerability” OR “vulnerabilities”) + (“digital”; “ethical problem” OR “ethical problems”) + (“IT’; “negative”) + (“digital”; “problem”) + (“digital technology”; “unintended”) + (“technology”).

  3. https://shidler.hawaii.edu/itm/hicss.

References

  • Acemoglu D (2021) Harms of AI. National Bureau of Economic Research

    Book  Google Scholar 

  • Ahmed YA, Ahmad MN, Ahmad N, Zakaria NH (2019) Social media for knowledge-sharing: a systematic literature review. Telemat Inf 37:72–112

    Article  Google Scholar 

  • AI H (2019) High-level expert group on artificial intelligence. In: European Commission. p 6. Available at: https://ec.europa.eu/digital-single

  • Bagchi K, Bannan C, Franklin SB, Hurlburt H, Sarkesian L, Schulman R, Stager J, Edmond J. (2020) Digital tools for COVID-19 contact tracing: identifying and mitigating the equity, privacy, and civil liberties concerns

  • Britton K (2016) Handling privacy and security in the internet of things. J Intern Law 19(10):3–7

    Google Scholar 

  • Brooke Z (2018) A marketer’s guide to the dark web. Market Insights

  • Burnett JR, Lisk TC (2019) The future of employee engagement: real-time monitoring and digital tools for engaging a workforce. Int Stud Manag Organ 49(1):108–119

    Google Scholar 

  • Čelik P (2019) Institutional measures for increasing the cyber security for business in the European Union. Econ Themes 57(3):351–364

    Article  Google Scholar 

  • Chaison G (2002) Information technology: the threat to unions. J Lab Res 23(2):249–259

    Article  Google Scholar 

  • Chakravarty A, Grewal R, Sambamurthy V (2013) Information technology competencies, organizational agility, and firm performance: enabling and facilitating roles. Inf Syst Res 24(4):976–997

    Article  Google Scholar 

  • Chatterjee S, Sarker S (2013) Infusing ethical considerations in knowledge management scholarship: toward a research agenda. J Assoc Inf Syst 14(8):1

    Google Scholar 

  • Chatterjee S, Sarker S, Fuller M (2009) Ethical information systems development: a Baumanian postmodernist perspective. J Assoc Inf Syst 10(11):3

    Google Scholar 

  • Chen H, Pendleton M, Njilla L, Xu S (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv (CSUR) 53(3):1–43

    Article  Google Scholar 

  • Clim A (2019) Cyber security beyond the Industry 4.0 era. A short review on a few technological promises. Inform Econ 23(2):34–44

    Google Scholar 

  • Costa RD, Souza GF, Valentim RA, Castro TB (2020) The theory of learning styles applied to distance learning. Cogn Syst Res 64:134–145

    Article  Google Scholar 

  • Davis JE, Scherz P (2019) Persons without qualities: algorithms, AI, and the reshaping of ourselves. Soc Res Int Q 86(4):9–10

    Google Scholar 

  • De Cremer D, Nguyen B, Simkin L (2017) The integrity challenge of the Internet-of-Things (IoT): on understanding its dark side. J Mark Manag 33(1–2):145–158

    Article  Google Scholar 

  • DiGrazia K (2017) Cyber insurance, data security, and blockchain in the wake of the Equifax breach. J Bus Tech l 13:255

    Google Scholar 

  • Elliott K, Price R, Shaw P, Spiliotopoulos T, Ng M, Coopamootoo K, van Moorsel A (2021) Towards an equitable digital society: artificial intelligence (AI) and corporate digital responsibility (CDR). Society 58(3):179–188. https://doi.org/10.1007/s12115-021-00594-8

    Article  Google Scholar 

  • Estrada EP, Anderson AD, Brown A (2021) # IamaRefugee: social media resistance to trump’s ‘Muslim Ban.’ J Refug Stud 34(3):3442–3463

    Article  Google Scholar 

  • Federico C, Thompson T (2019) Do IRS computers dream about tax cheats: artificial intelligence and big data in tax enforcement and compliance. J Tax Prac Proc 21:35

    Google Scholar 

  • Ferraris D, Fernandez-Gago C (2020) TrUStAPIS: a trust requirements elicitation method for IoT. Int J Inf Secur 19(1):111–127

    Article  Google Scholar 

  • Ferretti L, Wymant C, Kendall M, Zhao L, Nurtay A, Abeler-Dörner L, Parker M, Bonsall D, Fraser C (2020) Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368(6491):eabb6936. https://doi.org/10.1126/science.abb6936

    Article  Google Scholar 

  • Figueroa-Lorenzo S, Añorga J, Arrizabalaga S (2020) A survey of IIoT protocols: a measure of vulnerability risk analysis based on CVSS. ACM Comput Surv (CSUR) 53(2):1–53

    Article  Google Scholar 

  • Gioia DA, Corley KG, Hamilton AL (2013) Seeking qualitative rigor in inductive research: notes on the Gioia methodology. Organ Res Methods 16(1):15–31

    Article  Google Scholar 

  • Gozman D, Butler T, Lyytinen K (2020) Regulation in the age of digitalization. Call Pap Spec Issue J Inform Technol 1–5

  • Grant P (2007) A new approach to diabetic control: fuzzy logic and insulin pump technology. Med Eng Phys 29(7):824–827

    Article  Google Scholar 

  • Grody AD (2020) Addressing cyber risk in financial institutions and in the financial system. J Risk Manag Financ Inst 13(2):155–162

    Google Scholar 

  • Gunasekaran KA (2019) Safety matters. Profess Saf J

  • Guo X, Ling KC, Liu M (2012) Evaluating factors influencing consumer satisfaction towards online shopping in China. Asian Soc Sci 8(13):40

    Article  Google Scholar 

  • Halaweh M (2013) Emerging technology: What is it. J Technol Manag Innov 8(3):108–115

    Article  Google Scholar 

  • Haryanti DA, Margianti ES, Prihantoro E, Ohorella NR (2021) The effect of knowledge sharing and benefits on sharing intentions through social interaction in social media groups. Int J Sci Res Sci Technol. https://doi.org/10.32628/IJSRST21848

    Article  Google Scholar 

  • Holland P, Bardoel A (2015) Special issue of International Journal of Human Resource Management the impact of technology on work in the twenty-first century exploring the smart and dark side. Taylor Francis, Milton Park

    Google Scholar 

  • Humble KP, Altun D (2020) Artificial Intelligence and the threat to human rights. J Intern Law 24(3):1–19

    Google Scholar 

  • Islam N, Dhir A, Talwar S, Walsh S (2021) Reimaging emerging technologies in the new normal: forecasting growth trajectory, risk and resistance towards a friction-free diffusion in varied industry verticals. IEEE Technol Eng Manag

  • Jan Recker SC, Janina Sundermeier VG-D (2022) Special issue CFP: digital responsibility: social, ethical, and ecological implications. J Assoc Inf Syst. Retrieved from https://aisnet.org/news/604253/JAIS-Special-Issue-CFP-Digital-Responsibility-Social-Ethical-and-Ecological-Implications.htm

  • Janger EJ, Twerski AD (2019) The heavy hand of Amazon: a seller not a neutral platform. Brook J Corp Fin Com L 14:259

    Google Scholar 

  • Kane GC, Young AG, Majchrzak A, Ransbotham S (2021) Avoiding an oppressive future of machine learning: a design theory for emancipatory assistants. MIS Q 45(1):371–396

    Article  Google Scholar 

  • Kelley S (2022) Employee perceptions of the effective adoption of AI principles. J Bus Ethics 178(4):871–893

    Article  Google Scholar 

  • Keszthelyi A (2014) New challenges of a new era. Proc Manag Chall Contemp Soc 7(1):144

    Google Scholar 

  • LC (2017) How to ensure a secure internet of things. Digit Econ

  • Lee D, Jackson J (2018) Protecting against cybersecurity threats. Healthc Financ Manag 72(9):24–26

    Google Scholar 

  • Limayem M, Khalifa M, Frini A (2000) What makes consumers buy from Internet? A longitudinal study of online shopping. IEEE Trans Syst Man Cybern-Part A Syst Hum 30(4):421–432

    Article  Google Scholar 

  • Lobschat L, Mueller B, Eggers F, Brandimarte L, Diefenbach S, Kroschke M, Wirtz J (2021) Corporate digital responsibility. J Bus Res 122:875–888

    Article  Google Scholar 

  • Ludin IHBH, Cheng BL (2014) Factors influencing customer satisfaction and e-loyalty: online shopping environment among the young adults. Manag Dyn Knowl Econ 2(3):462–462

    Google Scholar 

  • Mäkinen J (2015) Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things. Inf Commun Technol Law 24(3):262–277

    Article  Google Scholar 

  • Mani Z, Chouk I (2018) Consumer resistance to innovation in services: challenges and barriers in the internet of things era. J Prod Innov Manag 35(5):780–807

    Article  Google Scholar 

  • Manyika J (2017) Technology, jobs and the future of work

  • Meijer A, Thaens M (2021) The dark side of public innovation. Public Perform Manag Rev 44(1):136–154

    Article  Google Scholar 

  • Miller J, Green I, Putland G (2005) Emerging technologies: a framework for thinking. Australian capital territory department of education and training. Retrieved 13 Nov 2008

  • Morantz M (2018) The dark side of digital economy: bad things come in big packages. OECD Observer, Paris

    Google Scholar 

  • Mundt M, Ross K, Burnett CM (2018) Scaling social movements through social media: the case of Black Lives Matter. Soc Med Soc 4(4):2056305118807911

    Google Scholar 

  • Munsch A, Munsch P (2020) The future of API security: the adoption of APIs for digital communications and the implications for cyber security vulnerabilities. J Int Technol Inf Manag 29(3):25

    Google Scholar 

  • Ng IC, Wakenshaw SY (2017) The Internet-of-Things: review and research directions. Int J Res Mark 34(1):3–21

    Article  Google Scholar 

  • Ng CK, Wu CH, Yung KL, Ip WH, Cheung T (2018) A semantic similarity analysis of Internet of Things. Enterp Inf Syst 12(7):820–855

    Article  Google Scholar 

  • Otoom M, Alshraideh H, Almasaeid HM, López-de-Ipina D, Bravo J (2015) Real-time statistical modeling of blood sugar. J Med Syst 39:1–6

    Article  Google Scholar 

  • Park KC, Shin D-H (2017) Security assessment framework for IoT service. Telecommun Syst 64:193–209

    Article  Google Scholar 

  • Paudel P (2021) Online education: benefits, challenges and strategies during and after COVID-19 in higher education. Int J Stud Educ 3(2):70–85

    Article  Google Scholar 

  • Peimani N, Kamalipour H (2021) Online education and the COVID-19 outbreak: a case study of online teaching during lockdown. Educ Sci 11(2):72

    Article  Google Scholar 

  • Perz P, Gemzik-Salwach A (2020) Cryptocurrencies as a subject of financial investments. Risk analysis and potential benefits on the example of bitcoin. Acta Sci Polon Oecon 19(2):15–23

    Article  Google Scholar 

  • Popa M, Toma C, Boja C, Zamfiroiu A (2017) Privacy and security in connected vehicles ecosystems. Inform Econ 21(4):29–40

    Google Scholar 

  • Popescul D, Georgescu M (2014) Internet of Things—some ethical issues. USV Ann Econ Public Adm 13(2 (18)):208–214

    Google Scholar 

  • Radanliev P, De Roure D (2023) New and emerging forms of data and technologies: literature and bibliometric review. Multimed Tools Appl 82(2):2887–2911

    Article  Google Scholar 

  • Radanliev P, De Roure D, Maple C, Ani U (2022) Super-forecasting the ‘technological singularity’ risks from artificial intelligence. Evol Syst 13(5):747–757

    Article  Google Scholar 

  • Rezaei H (2012) The application of information technology and its relationship with organizational intelligence. Proced Technol 1:94–97

    Article  Google Scholar 

  • Rippee SM (2020) This internet thing is great, isn’t it, Hal? Product liability in the next 100 years. Def Counsel J 87:1

    Google Scholar 

  • Rossi M, Cheung CM, Thatcher JB (2020) Ethical issues and unintended consequences of digitalization and platformization. Call Pap J Inf Technol

  • Rosso M, Nasir A, Farhadloo M (2020) Chilling effects and the stock market response to the Snowden revelations. New Media Soc 22(11):1976–1995

    Article  Google Scholar 

  • Rotolo D, Hicks D, Martin BR (2015) What is an emerging technology? Res Policy 44(10):1827–1843

    Article  Google Scholar 

  • Sadeghi M (2019) A shift from classroom to distance learning: advantages and limitations. Int J Res Eng Educ 4(1):80–88

    Google Scholar 

  • Salah-Eddine M, Belaissaoui M, El Alami A, Salah-Eddine K (2019) Technostress management through data mining. J Manag Inf Decis Sci 22(1):66–82

    Google Scholar 

  • Santoso G, Hani S, Kristiyana S, Saputra Y (2019) Design non-invasive of blood sugar detector prototypes using cellular technology GPS-based. In: Paper presented at the Journal of Physics: Conference Series

  • Scholz RW, Bartelsman EJ, Diefenbach S, Franke L, Grunwald A, Helbing D, Hill R, Hilty L, Höjer M, Klauser S, Montag C (2018) Unintended side effects of the digital transition: European scientists’ messages from a proposition-based expert round table. Sustainability 10(6):2001

    Article  Google Scholar 

  • Sinha P, Paterson AE (2020) Contact tracing: Can ‘big tech’ come to the rescue, and if so, at what cost? EClinicalMedicine 24:100412

    Article  Google Scholar 

  • Sowmiya B, Abhijith V, Sudersan S, Sakthi Jaya Sundar R, Thangavel M, Varalakshmi P (2021) A survey on security and privacy issues in contact tracing application of COVID-19. SN Comput Sci 2:1–11

    Article  Google Scholar 

  • Steininger DM, Mikalef P, Pateli A, Ortiz-de-Guinea A (2022) Dynamic capabilities in information systems research: a critical review, synthesis of current knowledge, and recommendations for future research. J Assoc Inf Syst 23(2):447–490

    Google Scholar 

  • Tahiliani A, Hassija V, Chamola V, Kanhere SS, Guizani M (2021) Privacy-preserving and incentivized contact tracing for COVID-19 using blockchain. IEEE Internet Things Mag 4(3):72–79

    Article  Google Scholar 

  • Tarafdar M, Gupta A, Turel O (2013) The dark side of information technology use. Inf Syst J 23(3):269–275

    Article  Google Scholar 

  • Tarafdar M, Pullins EB, Ragu-Nathan T (2015) Technostress: negative effect on performance and possible mitigations. Inf Syst J 25(2):103–132

    Article  Google Scholar 

  • Turel O, Qahri-Saremi H (2016) Problematic use of social networking sites: antecedents and consequence from a dual-system theory perspective. J Manag Inf Syst 33(4):1087–1116

    Article  Google Scholar 

  • Ul Rehman S, Manickam S (2016) A study of smart home environment and its security threats. Int J Reliab Qual Saf Eng 23(03):1640005

    Article  Google Scholar 

  • Vargas-Hernández JG, Salcedo MTA (2018) The influence and benefits of technology as a strategy in organizations. Global J Enterp Inf Syst 10(4):6–17

    Google Scholar 

  • Vassakis K, Petrakis E, Kopanakis I (2018) Big data analytics: applications, prospects and challenges. In: Skourletopoulos G, Mastorakis G, Mavromoustakis C, Dobre C, Pallis E (eds) Mobile big data: a roadmap from models to technologies. Springer, Cham, pp 3–20

    Chapter  Google Scholar 

  • Vassilakopoulou P, Hustad E (2023) Bridging digital divides: a literature review and research agenda for information systems research. Inf Syst Front 25(3):955–969

    Article  Google Scholar 

  • Vieira da Cunha J, Carugati A, Leclercq-Vandelannoitte A (2015) The dark side of computer-mediated control. Inf Syst J 25(4):319–354

    Article  Google Scholar 

  • Vinuesa R, Azizpour H, Leite I, Balaam M, Dignum V, Domisch S, Felländer A, Langhans SD, Tegmark M, Fuso Nerini F (2020) The role of artificial intelligence in achieving the Sustainable Development Goals. Nat Commun 11(1):233. https://doi.org/10.1038/s41467-019-14108-y

    Article  Google Scholar 

  • Voegtlin C, Scherer AG, Stahl GK, Hawn O (2022) Grand societal challenges and responsible innovation. J Manag Stud 59(1):1–28

    Article  Google Scholar 

  • Warschauer M (2011) Emerging technologies for autonomous language learning. Reading 2(3):107

    Google Scholar 

  • Weber RM, Horn BD (2017) Breaking bad security vulnerabilities. J Financ Serv Prof 71(1):50

    Google Scholar 

  • Yehya F (2020) Promoting technology-implementation learning paradigm for online learning in secondary education. Global J Inf Technol Emerg Technol 10(1):12–21

    Google Scholar 

  • Zeng J (2016) China’s date with big data: Will it strengthen or threaten authoritarian rule? Int Aff 92(6):1443–1462

    Article  Google Scholar 

  • Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34

    Article  Google Scholar 

  • Zittrain J (2006) The generative internet. Harvard law review. Oxf Legal Stud Res Pap 119:1970

    Google Scholar 

Download references

Funding

The authors would like to acknowledge the financial support received from the Mobilizing Insights in Defense and Security (MINDS) program of the Department of National Defense (DND), Canada. Any opinions and conclusions in this work are strictly those of the authors and do not reflect the views, positions, or policies of - and are not endorsed by - MINDS, DND, or the Government of Canada.

Author information

Authors and Affiliations

Authors

Contributions

Mohsen Farhadloo designed and conceptualized the study. The literature search, material preparation, and data collection were performed by Saman Asvadi. Mohsen Farhadloo and Saman Asvadi contributed to the analysis and synthesis of the results. Saman Asvadi and Mohsen Farhadloo drafted the work and Kash Khorasani critically revised the work.

Corresponding author

Correspondence to Mohsen Farhadloo.

Ethics declarations

Conflict of interest

All authors report no conflict of interest. In addition, no funding was received for conducting this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farhadloo, M., Asvadi, S. & Khorasani, K. Potential vulnerabilities associated with emerging technologies: insights from a systematic literature review. Manag Rev Q (2024). https://doi.org/10.1007/s11301-024-00420-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11301-024-00420-5

Keywords

JEL Classification

Navigation