Articles

23 Items

U.S. Military Academy cadets watch data on computers

AP Photo

Journal Article - Quarterly Journal: International Security

Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War

    Authors:
  • Avi Goldfarb
  • Jon R. Lindsay
| Winter 2021/22

Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Journal Article - Quarterly Journal: International Security

Correspondence: New Era or New Error? Technology and the Future of Deterrence

    Authors:
  • Ryan Snyder
  • Benoît Pelopidas
  • Keir A. Lieber
  • Daryl Press
| Winter 2018/19

Ryan Snyder and Benoît Pelopidas respond to Keir A. Lieber and Daryl G. Press's spring 2017 article, “The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence.”

The U.S. Capitol Building in Washington is shrouded in fog early in the morning Tuesday, Nov. 6, 2018 on Election Day in the U.S. (AP Photo/J. David Ake)

AP Photo/J. David Ake

Magazine Article - Politico Magazine

How A Divided Congress Could Unite Around Tech

| Dec. 06, 2018

Beyond tougher oversight hearings, somber observers expect so little from our newly divided Congress that we all ought to be on the lookout for nonpartisan opportunities.

There is one important area where members could defy partisan gridlock to help Washington better meet a critical challenge of 21st century governance: assessing the public impact of today’s disruptive technologies.

I have firsthand experience with a model that worked. It’s one that could work again for members and their staffs, who understandably struggle to grapple with the sheer complexity of today’s highly disruptive and socially consequential technologies.

Photo of Mark Zuckerberg preparing to resume testimony about user data on Facebook.

(AP Photo/Jacquelyn Martin)

Magazine Article - Belfer Center for Science and International Affairs, Harvard Kennedy School

America Needs to Align Technology with a Public Purpose

| Nov. 25, 2018

The arc of innovative progress has reached an inflection point, writes Ash Carter in The Atlantic. "Recent technological change that has brought immeasurable improvements to billions around the globe now threatens to overwhelm us. Making this disruption positive for all is the chief challenge of our time. We ourselves—not only market forces—should bend the arc of change toward human good. To do so, we must reinvigorate an ethos of public purpose that has become dangerously decoupled from many of today’s leading tech endeavors."

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

A  visitor walks past signs for energy conservation during the 2010 China International Industry Fair in Shanghai, China, 9 November 2010.

AP Photo

Journal Article - Energy

A Network-based Modeling Framework for Stakeholder Analysis of China's Energy Conservation Campaign

    Authors:
  • Wen Feng
  • Zheng Li
  • Edward F. Crawley
  • Weidou Ni
| August 2011

This paper proposes a network-based modeling framework to facilitate the development of stakeholder analysis of China's energy conservation campaign. Given the proposed framework, an illustrative case study is provided to elaborate how to integrate a set of techniques to further develop a quantitative model, as well as to demonstrate the practicability of the proposed framework. The results derived from the case study shows that the proposed framework and the model can be used as analytical tools to improve the government's policymaking process in term of providing a systematic perspective of stakeholder interrelations.

teaser image

Journal Article - SAIS Review

Toward a Closer Digital Alliance

| Nov. 18, 2010

Countries will need to reconcile the facts that their Internet infrastructures are vulnerable and less resilient to attack and that their economic dependence on the Internet makes cooperation between countries on cybersecurity issues essential. Disparate and uncoordinated cyber defense schemes could adversely affect individual and collective security, privacy, usability, transparency, speed, and interoperability. Much tighter alignment and better integration of European and NATO initiatives with national laws, policies, and funding priorities is necessary to counteract threats against national networks and infrastructure. Only through international cooperation and private-public partnerships can cyber defense measures succeed.