This chapter considers characteristics of cyberthreats which businesses are likely to face in the future from traditional phishing to quantum computing attacks. By drawing a parallel between creative industries and cybercrime, we analyze how cybersecurity threats, vulnerabilities, and risks will change in the near as well as in the distant future. Implications of these changes for business cyberdefense strategy are also discussed.
- 1.Druga, S., Williams, R., Breazeal, C., & Resnick, M. (2017, June). Hey Google is it OK if I eat you? Initial explorations in child-agent interaction. In Proceedings of the 2017 Conference on Interaction Design and Children (pp. 595–600). ACM.Google Scholar
- 2.Augello, A., Gentile, M., Weideveld, L., & Dignum, F. (2016). A model of a social chatbot. In Intelligent Interactive Multimedia Systems and Services 2016 (pp. 637–647). Cham: Springer.Google Scholar
- 3.Janarthanam, S. (2017). Hands-on chatbots and conversational UI development: Build chatbots and voice user interfaces with Chatfuel, Dialogflow, Microsoft Bot Framework, Twilio, and Alexa Skills. Birmingham: Packt.Google Scholar
- 4.Penrose, L. S., & Penrose, R. (1958). Impossible objects: A special type of visual illusion. British Journal of Psychology, 49, 31–33. https://doi.org/10.1111/j.2044-8295.1958.tb00634.x (PMID: 13536303).CrossRefGoogle Scholar