{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T19:39:39Z","timestamp":1649187579999},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1988,4,1]],"date-time":"1988-04-01T00:00:00Z","timestamp":575856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[1988,4]]},"DOI":"10.1007\/bf01891378","type":"journal-article","created":{"date-parts":[[2005,7,5]],"date-time":"2005-07-05T09:22:05Z","timestamp":1120555325000},"page":"141-149","source":"Crossref","is-referenced-by-count":2,"title":["The Strategic Computing Program at four years: Implications and intimations"],"prefix":"10.1007","volume":"2","author":[{"given":"Chris Hables","family":"Gray","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF01891378_CR1","unstructured":"DARPA (1983).Strategic Computing. Department of Defense,"},{"key":"BF01891378_CR2","unstructured":"DARPA (1987).Strategic Computing Third Annual Report. Department of Defense,"},{"key":"BF01891378_CR3","unstructured":"Deitchman, S. (1985).Weapons, Platforms, and the New Armed Services: Issues in Science and Technology. 83\u2013107."},{"key":"BF01891378_CR4","unstructured":"Donovan, Col. J. UCMC Ret. (1970).Militarism USA."},{"key":"BF01891378_CR5","unstructured":"Dreyfus, H and S.L. Dreyfus, (1986).Mind over Machine, The Free Press."},{"issue":"6","key":"BF01891378_CR6","first-page":"39","volume":"19","author":"P. Edwards","year":"1985","unstructured":"Edwards, P. (1985). Border Wars: the Science and Politics of Artificial Intelligence,Radical America. 19, 6. 39\u201350.","journal-title":"Radical America"},{"key":"BF01891378_CR7","unstructured":"Ford, D. (1985).The Button: The Pentagon's Strategic Command and Control System. Simon and Schuster."},{"key":"BF01891378_CR8","unstructured":"Foucault, M. (1980).Power\/Knowledge. Pantheon."},{"key":"BF01891378_CR9","unstructured":"Gibson, J. (1986).The Perfect War: Technowar in Vietnam. Atlantic Monthly Press."},{"key":"BF01891378_CR10","unstructured":"Gray, C. (1987a).Artificial Intelligence and Real War. 1987 Conference of the Society for the Social Studies of Science, November, Worcester, Mass."},{"key":"BF01891378_CR11","unstructured":"Gray, C. (1987b).The Rhetoric of Military Artificial Intelligence. 5th Annual Student Pugwash Conference, Stanford University."},{"key":"BF01891378_CR12","unstructured":"Guralnik, David (ed.) (1970).Webster's New World Dictionary of the American Language. World Publishing."},{"key":"BF01891378_CR13","first-page":"65","volume":"80","author":"D. Haraway","year":"1985","unstructured":"Haraway, D. (1985). Manifesto for Cyborgs,Socialist Review. 80. 65\u2013107.","journal-title":"Socialist Review"},{"key":"BF01891378_CR14","unstructured":"Hunt, J. and J. Blair (eds)Leadership on the Future Battlefield. University of Texas."},{"key":"BF01891378_CR15","unstructured":"Janowitz, M. (1960).The Professional Soldier. The Free Press."},{"key":"BF01891378_CR16","unstructured":"Klare, M. (1972).War Without End: American Planning of the Next Vietnams. Alfred Knopf."},{"key":"BF01891378_CR17","unstructured":"Lifton, R. (1970).Boundaries: Psychological Man in Revolution. Random House."},{"key":"BF01891378_CR18","unstructured":"Marshal, S. (1947).Men Against Fire. William Morrow & Co."},{"key":"BF01891378_CR19","unstructured":"Melman, S. (1974).The Permanent War Economy."},{"key":"BF01891378_CR20","unstructured":"Ornstein, S. et al. (1984).Strategic Computing, Bulletin Of The Atomic Scientists. December."},{"key":"BF01891378_CR21","unstructured":"Parnas, D. (1985). Software Aspects of Strategic Defense Systems.American Scientist. Sept\u2013Oct."},{"key":"BF01891378_CR22","unstructured":"Possony, S. and E. Pournelle (1970).The Strategy of Technology."},{"key":"BF01891378_CR23","unstructured":"Pringle, P. & W. Arkin (1983).SIOP: Nuclear War From the Inside. Sphere Books Ltd. London."},{"issue":"1","key":"BF01891378_CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/BF01905889","volume":"1","author":"G. Pullum","year":"1987","unstructured":"Pullum, G. (1987). Natural Language Interfaces and Strategic Computing,AI & Society. 1,1. 47\u201358.","journal-title":"AI & Society"},{"issue":"2","key":"BF01891378_CR25","doi-asserted-by":"crossref","first-page":"57","DOI":"10.2307\/464758","volume":"14","author":"Z. Sofia","year":"1984","unstructured":"Sofia, Z. (1984). Exterminating Fetuses,Diacritics. 14,2. 57\u201359.","journal-title":"Diacritics"},{"key":"BF01891378_CR26","unstructured":"Smith, B. (1985).Limits of Correctness in Computers. Report No CSLI-85-36, Center for the Study of Language and Information."},{"key":"BF01891378_CR27","unstructured":"Thompson, E. (1980). Notes on Exterminism: The Last Stage of Civilization,New Left Review. 20, May\u2013June."},{"key":"BF01891378_CR28","unstructured":"Turkle, S. (1984).The Second Self. Simon & Schuster."},{"key":"BF01891378_CR29","unstructured":"Virilio, P. & S. Lotringer (1983).Pure War. Semiotext."},{"key":"BF01891378_CR30","unstructured":"Weick, K. (1985). A Stress Analysis of Future Battlefields, in Hunt and BlairLeadership on the Future Battlefield. University of Texas."},{"key":"BF01891378_CR31","unstructured":"Winograd, T. (1987).Strategic Computing Research and the Universities. Stanford University Department of Computer Science, Report No STAN-CS-87-1160."},{"key":"BF01891378_CR32","unstructured":"Winograd, T. (1988). Computers and Rationality: The Myths and Realities, in Gordon (ed.)Microelectronics In Transition. University of California Press."}],"container-title":["AI &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01891378.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01891378\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01891378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:30:40Z","timestamp":1557487840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01891378"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,4]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1988,4]]}},"alternative-id":["BF01891378"],"URL":"https:\/\/doi.org\/10.1007\/bf01891378","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[1988,4]]}}}