Skip Nav Destination
Close Modal
Update search
NARROW
Format
Journal
TocHeadingTitle
Date
Availability
1-5 of 5
Jon R. Lindsay
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Publisher: Journals Gateway
International Security (2022) 46 (3): 7–50.
Published: 25 February 2022
FIGURES
Abstract
View article
PDF
Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple substitute for human decision-making. The advances in commercial machine learning that are reducing the costs of statistical prediction are simultaneously increasing the value of data (which enable prediction) and judgment (which determines why prediction matters). But these key complements—quality data and clear judgment—may not be present, or present to the same degree, in the uncertain and conflictual business of war. This has two important strategic implications. First, military organizations that adopt AI will tend to become more complex to accommodate the challenges of data and judgment across a variety of decision-making tasks. Second, data and judgment will tend to become attractive targets in strategic competition. As a result, conflicts involving AI complements are likely to unfold very differently than visions of AI substitution would suggest. Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.
Journal Articles
Publisher: Journals Gateway
International Security (2015) 40 (1): 191–195.
Published: 01 July 2015
Journal Articles
Publisher: Journals Gateway
International Security (2015) 39 (3): 7–47.
Published: 01 January 2015
FIGURES
Abstract
View article
PDF
Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative Chinese cyber threat, there are also considerable Chinese vulnerabilities and Western advantages. China has inadvertently degraded the economic efficiency of its networks and exposed them to foreign infiltration by prioritizing political information control over technical cyber defense. Although China also actively infiltrates foreign targets, its ability to absorb stolen data is questionable, especially at the most competitive end of the value chain, where the United States dominates. Similarly, China's military cyber capacity cannot live up to its aggressive doctrinal aspirations, even as its efforts to guide national information technology development create vulnerabilities that more experienced U.S. cyber operators can attack. Outmatched by the West, China is resorting to a strategy of international institutional reform, but it benefits too much from multistakeholder governance to pose a credible alternative. A cyber version of the stability-instability paradox constrains the intensity of cyber interaction in the U.S.-China relationship—and in international relations more broadly—even as lesser irritants continue to proliferate.
Journal Articles
Publisher: Journals Gateway
International Security (2014) 39 (2): 181–192.
Published: 01 October 2014
Journal Articles
Publisher: Journals Gateway
International Security (2013) 37 (4): 173–198.
Published: 01 April 2013