IDEAS home Printed from https://ideas.repec.org/a/eee/teinso/v44y2016icp39-47.html
   My bibliography  Save this article

Consideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others

Author

Listed:
  • Straub, Jeremy

Abstract

This paper considers the use of a non-recallable control technology (either for craft control or to command weaponized software) as a deterrent or threat mechanism by state and non-state actors. It considers the efficacy of this approach in modern war fighting (including in limited war-like scenarios), comparing it to the mutual assured destruction phenomenon created by atomic weaponry and the Zanryū Nipponhei (‘Japanese holdout’) scenario. The deterrent, immediate and long-term impacts of the non-recallable control technology are considered from a warfighting perspective. The ethical and societal implications of the development of this technology and the proverbial opening of Pandora's Box that its development represents are also considered.

Suggested Citation

  • Straub, Jeremy, 2016. "Consideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others," Technology in Society, Elsevier, vol. 44(C), pages 39-47.
  • Handle: RePEc:eee:teinso:v:44:y:2016:i:c:p:39-47
    DOI: 10.1016/j.techsoc.2015.12.003
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0160791X15000974
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.techsoc.2015.12.003?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Nye, Joseph S., 2011. "Nuclear Lessons for Cyber Security?," Scholarly Articles 8052146, Harvard Kennedy School of Government.
    2. Weiwei Zhan & Wei Wang & Nengcheng Chen & Chao Wang, 2014. "Efficient UAV Path Planning with Multiconstraints in a 3D Large Battlefield Environment," Mathematical Problems in Engineering, Hindawi, vol. 2014, pages 1-12, February.
    3. Kshetri, Nir, 2005. "Pattern of global cyber war and crime: A conceptual framework," Journal of International Management, Elsevier, vol. 11(4), pages 541-562, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Anania, Emily C. & Rice, Stephen & Pierce, Matthew & Winter, Scott R. & Capps, John & Walters, Nathan W. & Milner, Mattie N., 2019. "Public support for police drone missions depends on political affiliation and neighborhood demographics," Technology in Society, Elsevier, vol. 57(C), pages 95-103.
    2. Rosch-Grace, Dominic & Straub, Jeremy, 2022. "Analysis of the likelihood of quantum computing proliferation," Technology in Society, Elsevier, vol. 68(C).
    3. Gómez de Ágreda, Ángel, 2020. "Ethics of autonomous weapons systems and its applicability to any AI systems," Telecommunications Policy, Elsevier, vol. 44(6).
    4. Straub, Jeremy, 2019. "Mutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios," Technology in Society, Elsevier, vol. 59(C).
    5. Lavazza, Andrea & Farina, Mirko, 2023. "Leveraging autonomous weapon systems: realism and humanitarianism in modern warfare," Technology in Society, Elsevier, vol. 74(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Margit Schratzenstaller-Altzinger, 2018. "Implikationen der Digitalisierung für den öffentlichen Sektor," WIFO Monatsberichte (monthly reports), WIFO, vol. 91(12), pages 863-869, December.
    2. Arayankalam, Jithesh & Krishnan, Satish, 2021. "Relating foreign disinformation through social media, domestic online media fractionalization, government's control over cyberspace, and social media-induced offline violence: Insights from the agenda," Technological Forecasting and Social Change, Elsevier, vol. 166(C).
    3. George Saridakis & Zaheer Khan & Gary Knight & Bochra Idris & Jay Mitra & Huda Khan, 2024. "A Look into the Future: The Impact of Metaverse on Traditional Theories and Thinking in International Business," Management International Review, Springer, vol. 64(4), pages 597-632, August.
    4. Jun Zhuo & Mengmeng Hao & Fangyu Ding & Jiping Dong & Dong Jiang & Shuai Chen, 2024. "The spatiotemporal patterns and driving factors of cybercrime in the UK during the COVID-19 pandemic," Palgrave Communications, Palgrave Macmillan, vol. 11(1), pages 1-10, December.
    5. Straub, Jeremy, 2019. "Mutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios," Technology in Society, Elsevier, vol. 59(C).
    6. Julia Bock-Schappelwein & Michael Böheim & Elisabeth Christen & Stefan Ederer & Matthias Firgo & Klaus Friesenbichler & Werner Hölzl & Mathias Kirchner & Angela Köppl & Agnes Kügler & Christine Mayrhu, 2018. "Politischer Handlungsspielraum zur optimalen Nutzung der Vorteile der Digitalisierung für Wirtschaftswachstum, Beschäftigung und Wohlstand," WIFO Studies, WIFO, number 61256.
    7. Yadong Luo, 2022. "A general framework of digitization risks in international business," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 53(2), pages 344-361, March.
    8. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    9. Ryan Shandler & Daphna Canetti, 2024. "Introduction: Cyber-conflict – Moving from speculation to investigation," Journal of Peace Research, Peace Research Institute Oslo, vol. 61(1), pages 3-9, January.
    10. Fleury, Afonso & Fleury, Maria Tereza Leme & Oliveira, Luis & Leao, Pablo, 2024. "Going digital EMNEs: The role of digital maturity capability," International Business Review, Elsevier, vol. 33(4).
    11. Cuervo-Cazurra, Alvaro & Dieleman, Marleen & Hirsch, Paul & Rodrigues, Suzana B. & Zyglidopoulos, Stelios, 2021. "Multinationals’ misbehavior," Journal of World Business, Elsevier, vol. 56(5).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:teinso:v:44:y:2016:i:c:p:39-47. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/technology-in-society .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.