Khalil Sardarnia; Henghameh Alborzi
Abstract
The social and guild protests from 2017 onward are a turning point in Iran because of intrinsically and formal differences with the protests in past. This research has been done by street politics theory and exploration-content analysis method by emphasis a social- guild protesters and viewpoint of expert. ...
Read More
The social and guild protests from 2017 onward are a turning point in Iran because of intrinsically and formal differences with the protests in past. This research has been done by street politics theory and exploration-content analysis method by emphasis a social- guild protesters and viewpoint of expert. The authors try to answer this question: What are the differences between intrinsic and formal past protests the social and guild protests from 2017 onward and the past protests and why have been happened? The main findings of this study follow that: This protest intrinsically have been spontaneous- direct in street, leaderless, innovation in protest tactics, distrust to civic- guild assemblies, serial-continues horizontal relation whit other protests and so on. The information of this study shows that economic, political, social, motivational, environmental and legal variables respectively have been impact on this protest, but the economic variables have been in the most effectives.
International Relations
Seyed jalal Dehghani Firozabadi; Saeed Chehrazad
Abstract
IntroductionSome governments and organizations are preparing to exploit artificial intelligence (AI) in order to destabilize the world and benefit from numerous cyber-attacks. The rapid advancement of AI enables cybercriminals to amplify their destructive impact worldwide, as AI has the potential to ...
Read More
IntroductionSome governments and organizations are preparing to exploit artificial intelligence (AI) in order to destabilize the world and benefit from numerous cyber-attacks. The rapid advancement of AI enables cybercriminals to amplify their destructive impact worldwide, as AI has the potential to reshape and disrupt global conditions in the coming years. The primary objective of this research was to establish a comprehensive framework for critically evaluating the role of AI in facilitating unethical practices within the realm of security, both in theory and in practice. To lay the groundwork for the practical implementation of national security measures based on grounded theory requires adopting a problem-oriented perspective on terrorism, warfare, and conflict. A strategic instance of this approach is the concept of algorithmic national security which has the potential for creating and developing a new security order. This article aimed to contribute to the existing body of scientific literature, as there is currently a dearth of research in this field, thereby paving the way for future investigations. The primary objective of this research was to establish a comprehensive framework for critically evaluating the role of AI in facilitating unethical practices within the realm of security, both in theory and in practice. The present research aimed to develop a comprehensive framework for the critical evaluation of the role of AI in the unethical utilization of its functions in security matters, both in theory and in practice. In this line, the main question is: How can national security topics be problematized in light of AI hegemony and within the framework of terrorism, war, conflict, and defense?Materials and MethodsAdopting a descriptive–analytical approach, the present research relied on library research and documentary method to collect the data from various printed and electronic sources, including websites and magazines. Note-taking was used as a tool in data collection stage. In this study, AI and national security were considered as the independent and dependent variables, respectively.Results and DiscussionThe debate surrounding the use of AI and its autonomy on future battlefields has predominantly centered on the ethical implications of granting complete authority to independent and autonomous weapons, often referred to as killer robots, capable of making life or death decisions. Is it truly feasible for these systems to operate without any human intervention, or does their deployment potentially violate the principles of warfare and international humanitarian laws? Avoiding such a predicament necessitates that those involved in warfare differentiate between combatants and civilians on the battlefield, prioritizing the preservation of civilian lives and minimizing harm to them to the greatest extent possible.Proponents of this emerging technology argue that machines will eventually possess enough intelligence to distinguish themselves from humans. Conversely, opponents maintain that machines will never possess the capability to make such a fundamental distinction. They argue that machines lack the capacity to make split-second decisions in the heat of war or exhibit timely empathy. In response to these concerns, several human rights and humanitarian organizations have launched the Campaign to Stop Killer Robots, aiming to establish an international ban on the development and deployment of fully automated and autonomous weapon systems. In the meantime, a highly contentious debate is unfolding within the military sphere regarding the use of AI in the command and control systems governing how senior officers convey essential orders to their subordinate soldiers. Throughout history, generals and admirals have consistently sought to enhance the reliability of command and control systems to ensure the fullest realization of their strategic objectives.Nowadays, these systems are heavily relied upon to ensure the security of radio and satellite communication systems that connect headquarters to the front lines. However, strategists are concerned that in a future hyper-warfare environment, these systems could be vulnerable to disruptions caused by jamming, which would make the speed of military operations exceed commanders’ limited ability to receive battlefield reports, process data, and issue timely orders. It is important to go beyond these concerns and consider the practical definition of the uncertain fog of war, which is further complicated by the multiplication effect of AI and the potential for failure. Many military officers see a solution to this dilemma in relinquishing the control of machines to these systems. As stated in a report by the Congressional Research Service, AI algorithms can offer more reliable tools for real-time analysis of the battlefield and enable faster decision-making, thus being able to stay updated.ConclusionWe are currently witnessing a turning point in technology. The pace of advancements in AI is surpassing even the expert predictions. These breakthroughs offer significant advantages to humanity, enabling AI systems to tackle complex issues in medicine, the environment, and other fields. However, along with progress, there are also accompanying risks. The implications of AI for national security are becoming increasingly profound with each passing year. In this article, the aim was to assess the extent of these consequences in the years ahead. The findings indicate that AI is likely to highlight several, if not all, of the most challenging aspects of transformative military technologies. It thus becomes increasingly crucial to address its implications in examining how policymakers in the realm of national security respond to this technology.Unfortunately, AI carries the potential for risks comparable to those posed by previous technologies, and in some cases, its impact could be even more devastating, owing to the rapid pace of technological advancement and the intricate relationship between government and industry in the present era. While we appreciate the increasing number of high-quality AI reports published in recent years, we acknowledge that a certain degree of conservatism has somewhat impeded comprehensive analysis. In this article, the objective was to provide an honest description of the AI revolution as truly revolutionary rather than merely different. To address this challenge effectively, governments must approach the issue with ambition, emphasizing both research and development while considering its ramifications.The advancement of AI technology in the military, information technology, cybersecurity, and economic sectors over the next decade will lead to profound transformations worldwide. These changes are occurring at a faster pace than anticipated, and undoubtedly, they will present their own set of challenges, with implications extending to various aspects, including national security. AI introduces a level of complexity in the interactions between states, industries, and individuals, necessitating the deployment of skilled experts to respond quickly and effectively to the evolving landscape shaped by this phenomenon.
Majid Sharafkhani; Rahmat Hajimineh; Mohammad Reza Dehshiri
Abstract
From the time of mercantilism onwards, international trade has always been an arena of geopolitical rivalry, and the unipolar international order that emerged after the end of the cold war essentially created a special security architecture in the strategic Middle East so that it could maintain its status ...
Read More
From the time of mercantilism onwards, international trade has always been an arena of geopolitical rivalry, and the unipolar international order that emerged after the end of the cold war essentially created a special security architecture in the strategic Middle East so that it could maintain its status quo. Powers inevitably have to choose between two options to work within the framework or to challenge it. This paper examines the competition between the US and china in the form of strategic hedging and under the global value chain structure. The authors will seek to answer the question: What is china's middle east economic strategy in competition with the US? The research hypothesis is that China's middle East economic strategy in competing with the US is targeted influence through the most effective sections of the international value chain. The research findings are based on its explanatory-analytical method, that in the Middle East look, China according to the United States' efforts to build a unified trade front to counter Beijing's state-owned capitalism and in order to reduce its energy security risk, has focused on technology security at targeting growth in the value chain hierarchy and gaining a foothold at its highest levels.
Davoud Gharayagh-Zandi
Abstract
Actually political Science takes a look at the past and current political issues. As a course that could be required to be used in the policy process, it needs to be more practical and being feasible in order to policy process to getting ready to face with the issues in advance. Futures studies would ...
Read More
Actually political Science takes a look at the past and current political issues. As a course that could be required to be used in the policy process, it needs to be more practical and being feasible in order to policy process to getting ready to face with the issues in advance. Futures studies would be of help for the political science especially the public policy to predict the issues in future. In doing so to know how it could be useful to be enjoyed the futures studies in political science, it deams that it needs to provide a better understanding on the key concepts and the seven methods that use in the futures studies. By introducing how it could be applicatable to public policy, not only does it make a chance to rethinking on the political science but also does it envolve the course status in the actual policy process indeed.
Farhad Ghasemi
Abstract
The deterrence system has developed with the evolution of the international system and has experienced new forms. Facing the unstable and unpredictable challenges of the future, along with asymmetric threats in a nonlinear mechanism, is required to design a new analytical apparatus of deterrence and ...
Read More
The deterrence system has developed with the evolution of the international system and has experienced new forms. Facing the unstable and unpredictable challenges of the future, along with asymmetric threats in a nonlinear mechanism, is required to design a new analytical apparatus of deterrence and its conceptual and theoretical reconstruction. It forms the main purpose of the present article. In this regard, the fundamental question arises as to how in this model of the emerging international system, deterrence can be reconstructed conceptually and theoretically? The author intends to reconstruct it by using the method of deductive inference and focusing on theories of complexity and chaos, especially its basic principles such as the networked structure of the system, nonlinearity, sensitive dependence, and cascading failure. This study focuses on the dynamics of power and the mechanisms that turn it into a threat through nonlinear logic and its mechanisms and the principles emphasized by the theory of complexity and chaos. The author introduces nonlinear network deterrence to the field of strategic studies as an innovative and new concept. This pattern is a start point of the sixth wave of deterrence in International Relations. It will provide a new model for designing Iran's deterrence.