{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:45:04Z","timestamp":1725417904525},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1988,7,1]],"date-time":"1988-07-01T00:00:00Z","timestamp":583718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[1988,7]]},"DOI":"10.1007\/bf01908547","type":"journal-article","created":{"date-parts":[[2005,7,28]],"date-time":"2005-07-28T14:28:15Z","timestamp":1122560895000},"page":"245-255","source":"Crossref","is-referenced-by-count":6,"title":["The closed world: Systems discourse, military strategy and post WWII American historical consciousness"],"prefix":"10.1007","volume":"2","author":[{"given":"Paul N","family":"Edwards","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF01908547_CR1","unstructured":"Flamm, K. (1987).Creating the Computer and Targeting Technology. Brooking Institution."},{"key":"BF01908547_CR2","unstructured":"See Edwards, P. (1985). Border Wars: The Science and Politics of Artificial Intelligence.Radical America. 19."},{"key":"BF01908547_CR3","unstructured":"Also see Edwards, P. and R. Gordon (forthcoming). Defense Research and High Technology, in Edwards and Gordon (eds.)Strategic Computing: Defense Research and High Technology. Columbia University Press."},{"key":"BF01908547_CR4","unstructured":"Jacky, J. (forthcoming). Software Engineers and Hackers: Programming and Military Computing, in Edwards and Gordon op. cit."},{"key":"BF01908547_CR5","unstructured":"See the many articles on this topic in theCPSR Newsletter, Computer Professionals for Social Responsibility, Palo Alto, California."},{"key":"BF01908547_CR6","doi-asserted-by":"crossref","unstructured":"Also see Pullum, G. (forthcoming). Natural Language Interfaces and Strategic Computing, in Edwards and Gordon, op. cit., available in a somewhat different form inAI & Society. 1,1. 47\u201358.","DOI":"10.1007\/BF01905889"},{"key":"BF01908547_CR7","unstructured":"See Chapman, G. The New generation of High Tech Weapons, and Edwards, P., Computers and Weapons systems: An Historical Overview. Both in Bellin and Chapman (eds.)Computers in Battle. Harcourt, Brace, Jovanovitch."},{"key":"BF01908547_CR8","unstructured":"Also see Gibson, J. (1986).The Perfect War: Technowar in Vietnam. Atlantic Monthly Press, and van Creveld, M. (1985).Command in War. Harvard University Press."},{"key":"BF01908547_CR9","unstructured":"Harry S. Truman, cited in Ambrose, S. (1985).Rise to Globalism. Penguin. 86."},{"key":"BF01908547_CR10","unstructured":"Ambrose, ibid. 87."},{"key":"BF01908547_CR11","unstructured":"Huntington, S. (1981).American Politics: The Promise of Disharmony. Belknap Press."},{"key":"BF01908547_CR12","unstructured":"Ambrose, op. cit. xiv."},{"key":"BF01908547_CR13","unstructured":"See, for example, the lionizing of science and scientists in James Phinney Baxter's history of the Office of Scientific Research and Development,Scientists Against Time. (1946). Little, Brown."},{"key":"BF01908547_CR14","unstructured":"See Flamm, op. cit., and Edwards, Computers and Military systems. Op. cit."},{"key":"BF01908547_CR15","unstructured":"Compare Baritz, L. (1985).Backfire. Ballantine."},{"key":"BF01908547_CR16","unstructured":"On containment doctrine see Gaddis. J.L. (1982).Strategies of Containment. Oxford University Press."},{"key":"BF01908547_CR17","unstructured":"Ambrose, op. cit. 80."},{"key":"BF01908547_CR18","doi-asserted-by":"crossref","unstructured":"Jacobs, J.F. (1983).SAGE Overview. Annals of the History of Computing. 5.","DOI":"10.1109\/MAHC.1983.10101"},{"key":"BF01908547_CR19","unstructured":"Kaplan. op. cit."},{"key":"BF01908547_CR20","unstructured":"Winograd, T. and F. Flores (1986).Understanding Computers and Cognition. Ablex. 98."},{"key":"BF01908547_CR21","unstructured":"For other aspects of the discussion in this section see Edwards, P. (1986).Artificial Intelligence and High Technology War: The Perspective of the Formal Machine. Silicon Valley Research Group Working Paper 6."},{"key":"BF01908547_CR22","unstructured":"Edwards, P. (forthcoming).The Army and the Microworld: Computers and the Militarized Politics of Gender Signs, also published as Silicon Valley Research Group working Paper 8. Both papers are available from the Silicon Valley Research Group, University of California, Santa Cruz."},{"key":"BF01908547_CR23","unstructured":"See Jacky, op. cit."},{"key":"BF01908547_CR24","unstructured":"Kaplan, op. cit. p336."},{"key":"BF01908547_CR25","unstructured":"McNamara, cited in ibid. 336."},{"key":"BF01908547_CR26","unstructured":"Westmoreland, cited in Baritz, op. cit. 35."},{"key":"BF01908547_CR27","unstructured":"DARPA (1987).Strategic Computing: Second Annual Report. DARPA."},{"key":"BF01908547_CR28","unstructured":"DARPA (1983).Strategic Computing \u2014 New Generation Computing Technology: A Strategic Plan for its Development and Application to Critical Problems in Defense. DARPA. 3."},{"key":"BF01908547_CR29","unstructured":"See Gray, C.H. (unpublished ms. 1987).Artificial Intelligence and Real War. History of Consciousness Program, University of California, Santa Cruz."}],"container-title":["AI &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01908547.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01908547\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01908547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T11:33:07Z","timestamp":1586345587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01908547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,7]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1988,7]]}},"alternative-id":["BF01908547"],"URL":"https:\/\/doi.org\/10.1007\/bf01908547","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[1988,7]]}}}