An investigation and ranking of emerging information technologies in the defense sector

Document Type : Original Article

Authors

1 Assistant Prof, Department of Management, School of Management and Military Sciences, Imam Ali (AS) Military University, Tehran, Iran

2 Assistant Prof. in Semnan university

Abstract

I In recent years, there has been a serious need to understand the effects of emerging information technologies with a focus on artificial intelligence and the Internet in organizations. Therefore, the aim of this research is to identify and rank the various components of these emerging information technologies in the defense-military field. The research method is qualitative and based on Delphi. Initially, with the exploratory study of the new literature of the world's information technology in the military field, 23 emerging information technologies were provided to 9 members of the Delphi panel of AJA experts as the primary questionnaire. At this stage, 4 new technologies were introduced and one technology was eliminated. In the second phase of Delphi and Consensus of Experts, 26 effective emerging information technologies in the defense sector were identified and ranked through the Kendall test. In the third stage, experts were asked to determine the future ownership of these technologies by the Iranian defense sector in three periods: imitation of technology, adaptation to technology, and mastery of technology. According to the research findings, it takes 4, 7, and 13 years to imitate, adapt, and master technology, respectively. In the final stage, according to experts, these technologies were classified in terms of application in three categories: technical, tactical and strategic. Theoretical assistance of the article is the identification and classification of 26 emerging information technologies in two dimensions of technology acquisition and the type of application of technology in the defense sector.

Keywords


  •  

    • Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences305, 357-383.‏
    • Bhatnagar, S., Cotton, T., Brundage, M., Avin, S., Clark, J., Toner, H., & Amodei, D. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation Authors are listed in order of contribution Design Direction.‏
    • Button, R. W. (2017). Artificial intelligence and the military. RAND Blog, July9.‏
    • Chin, W. (2019). Technology, war and the state: past, present and future. International Affairs, 95(4), 765-783.
    • Gorla, N., Somers, T. M., & Wong, B. (2010). Organizational impact of system quality, information quality, and service quality. The Journal of Strategic Information Systems19(3), 207-228.
    • Hughes, J. J. (2007). Global technology regulation and potentially apocalyptic technological threats. Nanoethics: the ethical and social implications of nanotechnology. Hoboken, NJ: John Wiley, 201-214.‏
    • Johannsen, D.  Solka, L. and Rigsby, T. (2018). The Rapid Rise of Neural Networks for Defense: A Cautionary Tale.
    • Kostin, K. B. (2018). Foresight of the global digital trends. Strategic management23(1), 11-19.‏.
    • Kumar, S., Tiwari, P., & Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data6(1), 111.‏
    • Mehmood, M. U., Chun, D., Han, H., Jeon, G., & Chen, K. (2019). A review of the applications of artificial intelligence and big data to buildings for energy-efficiency and a comfortable indoor living environment. Energy and Buildings202, 109383.
    • Menon, R.(2020). Big Data Trends: Our Predictions for 2020 PLUS What Happened in 2019. Available at www.infoworks.io.
    • Nigania, J. (2019). In 2019 IoT Seems To Be More Embedded In Our Daily Life. Available at www.houseofbots.com.
    • Outsource2india. (2020). Big Data in2020: future, growth, and challenges. www.outsource2india.com.
    • Perry, B. Uuk, .R. (2019). AI Governance and the Policymaking Process: Key Considerations for Reducing AI Risk. Big data and cognitive computing.
    • Perwej, Y., AbouGhaly, M. A., Kerim, B., & Harb, H. A. M. (2019). An extended review on internet of things (iot) and its promising applications. Communications on Applied Electronics (CAE), ISSN, 2394-4714.‏
    • Premsankar, G. Francesco, M.D. and Talb, T. (2018).Edge computing for the internet of thing: a case study. Internet of Things Journal.
    • Raska, M. (2019). Strategic Competition for Emerging Military Technologies. PRISM8(3), 64-81.‏
    • Reis, J., Santo, P. E., & Melão, N. (2019, April). Artificial intelligence in government services: A systematic literature review. In World conference on information systems and technologies (pp. 241-252). Springer, Cham.‏.
    • Reuter, C. (2019). Information Technology for Peace and Security–Introduction and Overview. In Information Technology for Peace and Security (pp. 3-9). Springer Vieweg, Wiesbaden.
    • Scherer, M. U. (2015). Regulating artificial intelligence systems: Risks, challenges, competencies, and strategies. Harv. JL & Tech.29, 353.‏
    • Sfar, A. R., Chtourou, Z., & Challal, Y. (2017, February). A systemic and cognitive vision for IoT security: A case study of military live simulation and security challenges. In 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C) (pp. 101-105). IEEE.‏
    • Simone, S. (2020). Ten Predictions for Big Data in 2020.  www.dbta.com.
    • Spiegeleire, D. Maas, M. and Sweijs, T. (2017). Artificial Intelligence. And the future of defense. The Hague Centre for Strategic Studies. (HCSS).
    • SPiNN program. (2020). Researchers to infuse DSP with neural network kernels to enhance performance of radar and communications available at www.militaryaerospace.com.
    • Svenmarck, P., Luotsinen, L., Nilsson, M., & Schubert, J. (2018, May). Possibilities and challenges for artificial intelligence in military applications. In Proceedings of the NATO Big Data and Artificial Intelligence for Military Decision Making Specialists’ Meeting.‏
    • Takai, M. (2012). DoD Cloud Computing Strategy. Department of Defense Chief Information Officer.
    • Wik, M. W. (2002). Revolution in information affairs: Tactical and strategic implications of Information Warfare and Information Operations. A. Jones, GL Kovacic h & PG Luzwick (eds.), Global informafion warfare, 579-628.‏
    • Wik, M. W. (2002). Revolution in information affairs: Tactical and strategic implications of Information Warfare and Information Operations. A. Jones, GL Kovacic h & PG Luzwick (eds.), Global informafion warfare, 579-628.‏
    • Yuan, S. (2020). How China is using AI and big data to fight the coronavirus. Al Jazeera1.‏
    • Zhao, Z., Klemas, V. V., Zheng, Q., & Yan, X. H. (2003). Satellite observation of internal solitary waves converting polarity. Geophysical Research Letters30(19).