The conceptual model of the application of artificial intelligence technology governance in the promotion of cyber power with a meta-combination approach

Document Type : Research Paper

Authors

Higher National Defense University

Abstract

The current research, in terms of its purpose, is developmental; In terms of approach, it has been done qualitatively and based on the meta-combination method. Based on this, the statistical community of the research includes a collection of articles that have been published in the period of 2020 to 2024 with the topics of artificial intelligence, artificial intelligence governance, cyber power and cyber power promotion. The authors selected 71 articles from among 376 articles by searching among prominent domestic and foreign scientific databases. In this research, based on the results of content analysis, categories and concepts were extracted in the form of 14 components (automation and efficiency, cognitive skills, prediction, decision-making, offensive, defensive and security capabilities, reliability, explainability, responsibility, mechanisms, processes, social norms, ethics, regulation) and 4 dimensions (cyber power, artificial intelligence, organizational and environmental) have been identified.In the following, referring to the research expert community, the quality test and validation of the categories was done, which led to the study of the validity of the final output of the research. It seems that with the application of such components, it can be used in a pragmatic model and ethical and responsible use, while minimizing the risks associated with the use of artificial intelligence, in order to achieve cyber power.

Keywords

Main Subjects


  1. منابع

    الف- فارسی

    1. رمضان‌زاده، مجید و همکاران (۱۳۹۹)، ارائه الگوی مفهومی ارزیابی قدرت سایبری نیروهای مسلح با تأکید بر بعد بازدارندگی، فصلنامه مدیریت نظامی، دوره بیستم، شماره ۷۸، صص ۹۲-۶۱
    2. قاسمی، علی و همکاران (۱۴۰۲)، الگوی ارزیابی قدرت آفند سایبری ارتش ج.ا.ایران، فصلنامه علوم و فنون نظامی، دوره ۱۹، شماره ۶۴، صص ۶۱-۳۶

    ب- انگلیسی

    الف) کتب انگلیسی

    1. Haunschild, J., Kaufhold, M. A., & Reuter, C. (2022). Cultural violence and fragmentation on social media: Interventions and countermeasures by humans and social bots. In Cyber security politics (pp. 48–63). Routledge.
    2. Sànchez-Marrè, M. (2022). Intelligent decision support systems. Springer International Publishing.
    3. Schembri, J., Gentile, R., & Galasso, C. (2023). Enhancing natural-hazard exposure modeling using natural language processing: A case-study for Maltese planning applications. Procedia Structural Integrity, 44.
    4. Voeneky, S., Kellmeyer, P., Mueller, O., & Burgard, W. (Eds.). (2022). The Cambridge handbook of responsible artificial intelligence: Interdisciplinary perspectives. Cambridge University Press.
    5. Agrawal, A., Gans, J., & Goldfarb, A. (2018). Prediction machines: The simple economics of artificial intelligence. Harvard Business Press.
    6. Chakraborty, S. P., Dashora, P., & Gupta, S. (2022). Application of machine learning in open government database. In Impact of artificial intelligence on organizational transformation. Wiley.
    7. Chouhan, A., Chutia, D., & Raju, P. L. N. (2021). Deep learning applications on very high-resolution aerial imagery. In Artificial intelligence. Chapman and Hall/CRC.
    8. Cohen, C., Nye Jr., J. S., & Armitage, R. L. (2007). A smarter, more secure America.
    9. Nye, J. S. (2010). Cyber power. Belfer Center for Science and International Affairs, Harvard Kennedy School.
    10. Raska, M., & Bitzinger, R. A. (Eds.). (2023). The AI wave in defence innovation: Assessing military artificial intelligence strategies, capabilities, and trajectories. Taylor & Francis.
    11. Sandelowski, M., & Barroso, J. (2007). Handbook for synthesizing qualitative research. Springer.
    12. Ventre, D. (2020). Artificial intelligence, cybersecurity and cyber defense. ISTE Ltd and John Wiley & Sons.
    13. Vuuren, J. V., Plint, G., Leenen, L., Zaaiman, J., Kadyamatimba, A., & Phahlahmohlaka, J. (2016). Building blocks for national cyberpower.
    14. Vuuren, J. V., & Leenen, L. (2019). Building blocks and measurement of national cyberpower. In M. Sarfraz (Ed.), Developments in information security and cybernetic wars (pp. xx–xx). IGI Global.
    15. Wiesmüller, S. (2023). The relational governance of artificial intelligence: Forms and interactions. Springer Nature.
    16. Zekos, G. I. (2022). Political, economic and legal effects of artificial intelligence: Governance, digital economy and society. Springer Nature

    ب) مقالات انگلیسی

    1. Arrieta, A. B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., ... & Herrera, F. (2020). Explainable artificial intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information Fusion, 58, 82–115.
    2. Arslan, A. S. (2023). Neorealist analysis of security dilemma in cyberspace: A quantitative study. APSA Preprints.
    3. Berente, N., Gu, B., Recker, J., & Santhanam, R. (2021). Managing artificial intelligence. MIS Quarterly, 45(3).
    4. Birkstedt, T., Minkkinen, M., Tandon, A., & Mäntymäki, M. (2023). AI governance: Themes, knowledge gaps and future agendas. Internet Research, 33(7), 133–167.
    5. Bonfanti, M. E. (2022). Artificial intelligence and the offence-defence balance in cyber security. In Cyber security: Socio-technological uncertainty and political fragmentation (pp. 64–79). Routledge.
    6. Boni, M. (2021). Artificial intelligence and governance: Going beyond ethics. European View, 20(2).
    7. Butcher, J., & Beridze, I. (2019). What is the state of artificial intelligence governance globally? The RUSI Journal, 164(5–6), 88–96.
    8. Dafoe, A. (2018). AI governance: A research agenda. Future of Humanity Institute. Retrieved from https://www.fhi.ox.ac.uk/
    9. Duan, Y., Edwards, J. S., & Dwivedi, Y. K. (2019). Artificial intelligence for decision making in the era of big data: Evolution, challenges and research agenda. International Journal of Information Management, 48, 63–71.
    10. Eriksson, T., Bigi, A., & Bonera, M. (2020). Think with me, or think for me? On the future role of artificial intelligence in marketing strategy formulation. The TQM Journal, 32(4).
    11. Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The emerging threat of AI-driven cyber-attacks: A review. Applied Artificial Intelligence, 36(1), 2037254.
    12. Johnson, J. (2020). Artificial intelligence: A threat to strategic stability. Strategic Studies Quarterly, 14(1), 16–39.
    13. Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 101804.
    14. Kuehl, D. T. (2009). From cyberspace to cyberpower: Defining the problem. In Cyberpower and national security (pp. 30–xx).
    15. Laato, S., Tiainen, M., Islam, A. K. M. N., & Mäntymäki, M. (2022). How to explain AI systems to end users: A systematic literature review and research agenda. Internet Research, 32(7).
    16. Mäntymäki, M., Minkkinen, M., Zimmer, M. P., Birkstedt, T., & Viljanen, M. (2023). Designing an AI governance framework: From research-based premises to meta-requirements. ECIS 2023 Research Papers.
    17. Martin, K. (2019). Ethical implications and accountability of algorithms. Journal of Business Ethics, 160, 835–850.
    18. Matsuzaka, Y., & Yashiro, R. (2023). AI-based computer vision techniques and expert systems. AI, 4(1).
    19. Mijwil, M., Salem, I. E., & Ismaeel, M. M. (2023). The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review. Iraqi Journal for Computer Science and Mathematics, 4(1), 87–101.
    20. Mökander, J., & Floridi, L. (2021). Ethics-based auditing to develop trustworthy AI. Minds and Machines, 31(2), 323–327.
    21. Nye, J. S. (2009). Get smart: Combining hard and soft power. Foreign Affairs.
    22. Schmitt, L. (2022). Mapping global AI governance: A nascent regime in a fragmented landscape. AI and Ethics, 2(2), 303–314.
    23. Soni, V. D. (2019). Role of artificial intelligence in combating cyber threats in banking. International Engineering Journal for Research & Development, 4(1), 7.
    24. Tontiwachwuthikul, P., Chan, C. W., Zeng, F., Liang, Z., Sema, T., & Chao, M. (2020). Recent progress and new developments of applications of AI, KBS, and ML in the petroleum industry. Petroleum Journal, 6(4), 319–320.
    25. Zhang, D., Pee, L. G., & Cui, L. (2021). Artificial intelligence in e-commerce fulfillment: A case study of resource orchestration at Alibaba’s smart warehouse. International Journal of Information Management, 57, 102304.
    26. Schmidt, E., Work, B., Catz, S., Chien, S., Darby, C., Ford, K., ... & Matheny, J. (2021). National security commission on artificial intelligence (AI). National Security Commission on AI.

    ج) وبگاه‌ها

    1. Hafiz Sheikh Adnan, A. (2022). Developing an artificial intelligence governance framework. ISACA. https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2022/volume-38/developing-an-artificial-intelligence-governance-framework
    2. Stewart, I. J. (2023). Why the IAEA model may not be best for regulating artificial intelligence. Bulletin of the Atomic Scientists. https://thebulletin.org/2023/06/why-the-iaea-model-may-not-be-best-for-regulating-artificial-intelligence/

    COPYRIGHTS

    2025 by the authors. Published by The National Defense University. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0