Trends impacting Clergy & Religious Organizations
It is important to look broadly for disruption. This list includes 150 trends we're following that may shape the future for this industry. You can also click here to search for trends by industry and technology.
- Tech Companies Acting Like Banks
- Financial Inclusion
- The Rise of Quant Funds
- Regulating Open Banking
- Social Payments
- Countries Creating Digital Decentralized Currencies
- Smart City Initiatives
- U.S. and Global Election Security
- Interoperability Initiatives
- Corporate Foreign Policy
- Strengthening Municipal Cyber-Security Efforts
- The Proliferation of Splinternets
- Content Moderation in the Name of National Security
- Digitally Retouching History
- Decentralized Content Platforms
- Platform Switching and Demographic Shifts Threaten Established Social Networks
- Censorship in the Digital Age
- IRL Geography Reshapes the Virtual World
- Digital Frailty
- Platform Ownership
- Detecting Authentic Activity
- Bounty Programs
- Magnetic Tape Supply Shortages
- Biometric Malware
- State-Sponsored Security Breaches
- Critical Infrastructure Targets
- Offensive Government Hacking
- Security
- Zero-Day Exploits on the Rise
- Zero-Knowledge Proofs Go Commercial
- Gaining Access to Backdoors
- Remote Kill Switches
- Insecure Supply Chains
- Data Manipulation Becomes The Greater Threat
- Consumer Device Targeting
- Cyber Risk Insurance
- A.I.-Powered Automated Hacking Systems
- DDoS Attacks on the Rise
- Third-Party Verified Identities
- Ransomware-as-a-Service
- Decentralized Hacktivists
- Targeted Attacks on Voice Interfaces
- Open Source App Vulnerabilities
- Global Cybersecurity Pacts
- Proliferation of Darknets
- Hijacking Internet Traffic
- Weird Glitches
- The End of Biological Privacy
- Public Entities Selling Private Data
- Connected Device Security Loopholes
- Tech Workers Fighting for Privacy
- Encrypted Messaging Networks
- Vanishing Messages
- Digital Eavesdropping Rights
- Data Ownership
- Digital Self-Incrimination
- Differential Privacy
- Promoting Anonymity
- Verification
- Revenge Porn
- Drone Surveillance
- Influencing Future Privacy Laws
- Defining Online Harassment
- Safeguarding and Verifying Leaked Data
- Trolls
- Data Retention Policies
- Compliance Challenges and Unrealistic Budgets
- Connected Fabrics
- Smart Belts and Shoes
- Touch-Sensitive Materials
- Home Automation
- Privacy
- Rings and Bracelets
- Hearables / Earables
- Smart Gloves
- Biointerfaces
- Nanomesh Temporary Tattoos
- Dissolving Bioelectronics
- Smart Threads
- Adaptive Wearable Technologies
- Genetic Screening
- Biological DVRs
- Superbugs, Viruses and Phages
- Building a Comprehensive Human Cell Atlas
- Programmable, Ingestible, and Implantable Microbots
- Skinput
- Wearables
- Cloud-Based Wireless Body Area Networks
- Commercial Full-Body Exoskeletons
- Wearable Air Conditioners
- Brain-Machine Interfaces (BMIs)
- Smartwatches
- Single-Nucleotide Polymorphism (SNP) Profiling
- Creating Synthetic Wombs
- A.I. at the Edge
- Two-Factor Biometric-Based Authentication
- Gesture Recognition
- Object Recognition in Computational Photography
- Biometric Camouflage
- Personality Recognition
- Accent Recognition
- Emotional Recognition
- Responsive Recognition Technology
- Affective Computing
- Genetic Recognition
- Universal Genetic Databases
- Persistent Workplace and School Surveillance
- Prioritizing Accountability and Trust
- Scoring
- Persistent Tracking and Scoring
- Scoring Agencies Are On the Rise
- Intentionally Opaque Methodologies
- Recognition
- Faceprints
- Voiceprints
- Bone Recognition
- Proximity Recognition
- A.I. and Digital Dividends
- Vast Differences in Verification Systems
- Behavioral Biometrics
- Scoring Vulnerable Populations
- Surveillance Scoring-as-a-Service (SSaaS)
- Bias in Scoring Systems
- Conflicting Norms, Standards and Regulations for Scoring
- Automatic Voice Transcription
- Bioacoustic Recognition
- WiFi Recognition
- China’s A.I. Rules
- Artificial Emotional Intelligence
- Personal Digital Twins
- The Rise of Undocumented A.I. Accidents
- Problematic Data Sets
- A.I. to Catch Cheaters
- Algorithms Designed to Target Vulnerable Populations
- A.I. Still Has a Bias Problem
- A.I. Systems Intentionally Hiding Data
- Datamining Crowds
- Generating Virtual Environments from Short Videos
- Global Rush to Fund A.I.
- Algorithm Marketplaces
- Fragmentation
- Corporate Biometric Spoofing
- Bots
- Marketplace Consolidation
- Liability Insurance for A.I.
- Ambient Surveillance
- Artificial Intelligence
- A.I. in the Cloud
- Proliferation of Franken-Algorithms
- Companies Manipulating A.I. Systems for Competitive Advantage