Remote sensing and machine learning

There is increasing interest in using machine learning to automatically analyse remote sensing data and increase our understanding of complex environmental systems. While there are benefits from this approach, there are also some barriers to its use. This POSTnote examines the value of these approaches, and the technical and ethical challenges for wider implementation. …

Read more

Food fraud

Evidence suggests that food fraud continues to be an issue in the global food supply chain. This POSTnote provides an overview of food fraud, including its drivers and impacts. It discusses methods for food authenticity testing, broader strategies to prevent food fraud and impacts of EU exit. …

Read more

Online extremism

Extremism is possible in any ideology, including (but not limited to) politics and religion. Extremism can affect mental well-being, amplify hostility and threaten democratic debate. The global reach of the internet poses social and technological challenges for safeguarding citizens from extremism online. When the Commission for Countering Extremism surveyed over 2500 members of the public in 2019, 56% agreed that a lot more should be done to counter extremism online. This POSTnote outlines how…

Read more

Online safety education

Online technologies are an integral part of many children’s lives. In 2017, the Children’s Commissioner for England identified shortcomings in online safety education and a number of stakeholders have called for action to increase ‘digital literacy’ in the UK. Upcoming changes to the curriculum mean that aspects of online safety will be taught in all schools from 2020. This POSTnote gives an overview of how children use the internet and the opportunities and risks it presents. It provide…

Read more

Brain-computer interfaces

Brain-Computer Interfaces (BCIs) measure brain activity and can be used to control digital devices. The focus of BCI development has been on using the technology to allow patients to control assistive equipment such as wheelchairs or prostheses. Beyond medicine they are under development for applications in entertainment, marketing and defence. This POSTnote looks at the underpinning technology, its applications and the associated ethical and regulatory challenges. …

Read more

Misuse of civilian drones

Drones (also known as unmanned aircraft) are flying systems that do not carry a pilot. As the technology has become cheaper and more sophisticated, the use of drones for recreational and commercial purposes has grown, with the Civil Aviation Authority (CAA) reporting a significant increase in the number of permissions obtained for operating commercial drones in the UK. Despite their potential to reduce costs, improve efficiency and provide new services, drones may be misused accidentally or for…

Read more

Access to critical materials

Critical materials (CMs) are key to UK manufacturing, including for the aerospace, automotive, energy and chemical sectors, which rely on materials typically extracted and processed abroad. CMs are vital components of several emerging technologies, including electric vehicles, renewable energy infrastructure such as wind turbines, and digital technologies such as computers and smartphones. The UK imports most of its CMs and faces international competition for key resources. This POSTnote looks a…

Read more

Research for Parliament: Preparing for a changing world

This document builds on POST's previous publication, Topics of Interest 2018 (POSTbrief 27). The subjects are listed under under six category headings based on the drivers of change identified in POSTnote 500: demographic change and healthcare; social and cultural trends; geopolitical and governance challenges; environmental pressures and climate change; resource security and sustainability; and technological advance.…

Read more

5G technology

5G is the next generation of mobile communications technology. It follows on from the previous generations of mobile technology, such as 3G and 4G. 5G is expected to improve on previous mobile technologies by providing faster, lower latency (response time) mobile broadband connections and being able to connect a greater number of devices to a mobile network in a particular area while maintaining good quality connections. 5G mobile broadband will be the first widespread application of the technol…

Read more

Cyber Security of Consumer Devices

Weaknesses in the cyber security of internet-connected consumer devices can undermine the privacy and safety of individual users and can be used for large-scale cyber-attacks. This briefing looks at the cyber threats associated with consumer devices and their causes, as well as initiatives to improve device security, and the related challenges.…

Read more

Shift Work, Sleep and Health

A POSTnote that describes how working outside of daytime hours – shift work – affects physical and mental health and performance through its impact on sleep and circadian timing. It highlights the latest research, explains the implications for policy and how research can inform the design of interventions to improve shift workers' sleep and overall health.…

Read more

Distributed Ledger Technology

Distributed ledger technology (DLT) is a type of digital records system that allows multiple identical copies of a ledger to be stored on different computers on a network and updated by multiple different users. This POSTbrief provides a technical overview of the different types of DLT and how they work. It discusses some of the main applications of DLT and highlights the benefits and challenges of the technology. …

Read more