{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T11:10:52Z","timestamp":1762945852544,"version":"3.45.0"},"reference-count":138,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-025-00439-x","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T11:08:27Z","timestamp":1762945707000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Human strategic innovation against AI systems - analyzing how humans develop and implement novel strategies that exploit AI limitations"],"prefix":"10.1007","volume":"5","author":[{"given":"Abdullahi","family":"Dattijo","sequence":"first","affiliation":[]},{"given":"Sungbae","family":"Jo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"issue":"1\u20132","key":"439_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0004-3702(01)00129-1","volume":"134","author":"M Campbell","year":"2002","unstructured":"Campbell M, Hoane AJ Jr, Hsu FH. Deep Blue. Artif Intell. 2002;134(1\u20132):57\u201383.","journal-title":"Artif Intell"},{"issue":"7587","key":"439_CR2","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver D, Huang A, Maddison CJ, Guez A, Sifre L, Van Den Driessche G, Schrittwieser J, Antonoglou I, Panneershelvam V, Lanctot M, Dieleman S, Grewe D, Nham J, Kalchbrenner N, Sutskever I, Lillicrap T, Leach M, Kavukcuoglu K, Graepel T, Hassabis D. Mastering the game of Go with deep neural networks and tree search. Nature. 2016;529(7587):484\u20139.","journal-title":"Nature"},{"key":"439_CR3","volume-title":"Behind Deep Blue: Building the computer that defeated the world chess champion","author":"FH Hsu","year":"2002","unstructured":"Hsu FH. Behind Deep Blue: Building the computer that defeated the world chess champion. Princeton University Press; 2002."},{"key":"439_CR4","volume-title":"Beyond Deep Blue: Chess in the stratosphere","author":"M Newborn","year":"2012","unstructured":"Newborn M. Beyond Deep Blue: Chess in the stratosphere. Springer; 2012."},{"issue":"6419","key":"439_CR5","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1126\/science.aar6404","volume":"362","author":"D Silver","year":"2018","unstructured":"Silver D, Hubert T, Schrittwieser J, Antonoglou I, Lai M, Guez A, Hassabis D. A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play. Science. 2018;362(6419):1140\u20134.","journal-title":"Science"},{"key":"439_CR6","unstructured":"Stewart R, Hinds G AI in military decision-making: Supporting humans, not replacing them. ICRC Humanitarian Law & Policy Blog. Retrieved from https:\/\/blogs.icrc.org\/law-and-policy\/2024\/08\/29\/artificial-intelligence-in-military-decision-making-supporting-humans-not-replacing-them\/ (2024)"},{"key":"439_CR7","unstructured":"DataCamp AI in decision-making: Transform your business strategy. Retrieved from https:\/\/www.datacamp.com\/blog\/ai-in-decision-making (2024)."},{"key":"439_CR8","unstructured":"Strategy Science. (2024). Artificial intelligence and strategic decision-making: Evidence from entrepreneurs and investors. Strategy Science, 9(2), 150-175."},{"key":"439_CR9","unstructured":"Wang TT, Gleave A, Tseng T, Pelrine K, Belrose N, Miller J, Russell S (2023) Adversarial policies beat superhuman Go AIs. In: Proceedings of the 40th International Conference on Machine Learning, 35655\u201335739 (2023)."},{"key":"439_CR10","unstructured":"FAR.AI Beyond the board: Exploring AI robustness through Go. Retrieved from https:\/\/far.ai\/post\/2024-06-go-defense\/ (2024)."},{"key":"439_CR11","volume-title":"Artificial intelligence: A modern approach","author":"S Russell","year":"2020","unstructured":"Russell S, Norvig P. Artificial intelligence: A modern approach. 4th ed. Pearson; 2020.","edition":"4"},{"issue":"1","key":"439_CR12","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2307\/1884852","volume":"69","author":"HA Simon","year":"1955","unstructured":"Simon HA. A behavioral model of rational choice. Q J Econ. 1955;69(1):99\u2013118.","journal-title":"Q J Econ"},{"key":"439_CR13","volume":"175","author":"H Ma","year":"2024","unstructured":"Ma H. The bounded intelligence of AI: superficiality and deceivability. J Bus Res. 2024;175: 114531.","journal-title":"J Bus Res"},{"key":"439_CR14","unstructured":"Gleave A, Dennis M, Wild C, Kant N, Levine S, Russell S. Adversarial policies: Attacking deep reinforcement learning. InL International Conference on Machine Learning, 3934\u20133944 (2020)."},{"key":"439_CR15","volume-title":"Dataset shift in machine learning","year":"2009","unstructured":"Qui\u00f1onero-Candela J, Sugiyama M, Schwaighofer A, Lawrence ND, editors. Dataset shift in machine learning. MIT Press; 2009."},{"issue":"2","key":"439_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0378-3758(00)00115-4","volume":"90","author":"H Shimodaira","year":"2000","unstructured":"Shimodaira H. Improving predictive inference under covariate shift by weighting the log-likelihood function. J Stat Plann Inference. 2000;90(2):227\u201344.","journal-title":"J Stat Plann Inference"},{"key":"439_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120392","volume":"162","author":"N Haefner","year":"2021","unstructured":"Haefner N, Wincent J, Parida V, Gassmann O. Artificial intelligence and innovation management: a review, framework, and research agenda. Technol Forecast Soc Change. 2021;162: 120392.","journal-title":"Technol Forecast Soc Change"},{"issue":"3","key":"439_CR18","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/s40685-020-00133-x","volume":"13","author":"A Trunk","year":"2020","unstructured":"Trunk A, Birkel H, Hartmann E. On the current state of combining human and artificial intelligence for strategic organizational decision making. Bus Res. 2020;13(3):875\u2013919.","journal-title":"Bus Res"},{"key":"439_CR19","volume-title":"Behavioral game theory: Experiments in strategic interaction","author":"CF Camerer","year":"2003","unstructured":"Camerer CF. Behavioral game theory: Experiments in strategic interaction. Princeton University Press; 2003."},{"issue":"1","key":"439_CR20","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.jet.2005.12.008","volume":"133","author":"TH Ho","year":"2007","unstructured":"Ho TH, Camerer CF, Chong JK. Self-tuning experience weighted attraction learning in games. J Econ Theor. 2007;133(1):177\u201398.","journal-title":"J Econ Theor"},{"issue":"6","key":"439_CR21","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.tics.2016.03.013","volume":"20","author":"G Pezzulo","year":"2016","unstructured":"Pezzulo G, Cisek P. Navigating the affordance landscape: Feedback control as a process model of behavior and cognition. Trends Cogn Sci. 2016;20(6):414\u201324.","journal-title":"Trends Cogn Sci"},{"issue":"3","key":"439_CR22","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1162\/0033553041502225","volume":"119","author":"CF Camerer","year":"2004","unstructured":"Camerer CF, Ho TH, Chong JK. A cognitive hierarchy model of games. Q J Econ. 2004;119(3):861\u201398.","journal-title":"Q J Econ"},{"key":"439_CR23","doi-asserted-by":"crossref","unstructured":"McIlroy-Young R, Sen S, Kleinberg J, Anderson A Aligning superhuman AI with human behavior: Chess as a model system. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 1677\u20131687 (2020) .","DOI":"10.1145\/3394486.3403219"},{"key":"439_CR24","volume-title":"Research methods in human-computer interaction","author":"J Lazar","year":"2017","unstructured":"Lazar J, Feng JH, Hochheiser H. Research methods in human-computer interaction. 2nd ed. Morgan Kaufmann; 2017.","edition":"2"},{"issue":"314","key":"439_CR25","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1080\/14786445008521796","volume":"41","author":"CE Shannon","year":"1950","unstructured":"Shannon CE. Programming a computer for playing chess. Phil Mag. 1950;41(314):256\u201375. https:\/\/doi.org\/10.1080\/14786445008521796.","journal-title":"Phil Mag"},{"key":"439_CR26","doi-asserted-by":"crossref","unstructured":"Kocsis L, Szepesv\u00e1ri C Bandit based Monte-Carlo planning. In: European Conference on Machine Learning (pp. 282\u2013293). Springer (2006).","DOI":"10.1007\/11871842_29"},{"key":"439_CR27","doi-asserted-by":"crossref","unstructured":"Coulom R, Efficient selectivity and backup operators in Monte-Carlo tree search. In International Conference on Computers and Games (pp. 72\u201383). Springer (2006).","DOI":"10.1007\/978-3-540-75538-8_7"},{"issue":"1","key":"439_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCIAIG.2012.2186810","volume":"4","author":"CB Browne","year":"2012","unstructured":"Browne CB, Powley E, Whitehouse D, Lucas SM, Cowling PI, Rohlfshagen P, Tavener S, Perez D, Samothrakis S, Colton S. A survey of Monte Carlo tree search methods. IEEE Trans Comput Intell AI Games. 2012;4(1):1\u201343.","journal-title":"IEEE Trans Comput Intell AI Games"},{"issue":"6374","key":"439_CR29","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1126\/science.aao1733","volume":"359","author":"N Brown","year":"2017","unstructured":"Brown N, Sandholm T. Superhuman AI for heads-up no-limit poker: Libratus beats top professionals. Science. 2017;359(6374):418\u201324. https:\/\/doi.org\/10.1126\/science.aao1733.","journal-title":"Science"},{"issue":"2","key":"439_CR30","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1207\/s15516709cog0102_2","volume":"1","author":"JA Feldman","year":"1977","unstructured":"Feldman JA. Decision theory and artificial intelligence II: The hungry monkey. Cogn Sci. 1977;1(2):158\u201392. https:\/\/doi.org\/10.1207\/s15516709cog0102_2.","journal-title":"Cogn Sci"},{"issue":"4","key":"439_CR31","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/S0167-2681(02)00076-3","volume":"49","author":"HA Simon","year":"2002","unstructured":"Simon HA. Artificial intelligence as a framework for understanding intuition. J Econ Behav Organ. 2002;49(4):567\u201381. https:\/\/doi.org\/10.1016\/S0167-2681(02)00076-3.","journal-title":"J Econ Behav Organ"},{"issue":"4","key":"439_CR32","doi-asserted-by":"publisher","first-page":"681","DOI":"10.3758\/s13421-014-0488-9","volume":"43","author":"H Markovits","year":"2015","unstructured":"Markovits H, Thompson VA, Brisson J. Metacognition and abstract reasoning. Mem Cognit. 2015;43(4):681\u201393. https:\/\/doi.org\/10.3758\/s13421-014-0488-9.","journal-title":"Mem Cognit"},{"key":"439_CR33","volume-title":"The development of thought: Equilibration of cognitive structures","author":"J Piaget","year":"1977","unstructured":"Piaget J. The development of thought: Equilibration of cognitive structures. Viking Press; 1977."},{"issue":"4","key":"439_CR34","first-page":"879","volume":"52","author":"VA Thompson","year":"1999","unstructured":"Thompson VA, Johnson-Laird PN. Reasoning about relations. Q J Exp Psychol. 1999;52(4):879\u2013904.","journal-title":"Q J Exp Psychol"},{"key":"439_CR35","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-1-349-20568-4_5","volume-title":"Utility and Probability","author":"HA Simon","year":"1990","unstructured":"Simon HA. Bounded rationality. In: Eatwell J, Milgate M, Newman P, editors. Utility and Probability. Palgrave Macmillan; 1990. p. 15\u20138."},{"issue":"3","key":"439_CR36","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/3241036","volume":"62","author":"J Pearl","year":"2019","unstructured":"Pearl J. The seven tools of causal inference, with reflections on machine learning. Commun ACM. 2019;62(3):54\u201360. https:\/\/doi.org\/10.1145\/3241036.","journal-title":"Commun ACM"},{"issue":"6","key":"439_CR37","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2417182122","volume":"122","author":"Y Zhong","year":"2025","unstructured":"Zhong Y. Out-of-distribution generalization via composition: a lens through induction heads in transformers. Proc Natl Acad Sci U S A. 2025;122(6): e2417182122. https:\/\/doi.org\/10.1073\/pnas.2417182122.","journal-title":"Proc Natl Acad Sci U S A"},{"key":"439_CR38","unstructured":"Liu J, Zhou Z, Yao J, Zhang X, Li L, Xu F, He J Towards out-of-distribution generalization: A survey. arXiv preprint arXiv:2108.13624 (2021)."},{"key":"439_CR39","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1146\/annurev-psych-113011-143750","volume":"64","author":"A Diamond","year":"2013","unstructured":"Diamond A. Executive functions. Annu Rev Psychol. 2013;64:135\u201368. https:\/\/doi.org\/10.1146\/annurev-psych-113011-143750.","journal-title":"Annu Rev Psychol"},{"key":"439_CR40","unstructured":"Spiro RJ, Coulson RL, Feltovich PJ, Anderson D (1988) Cognitive flexibility theory: Advanced knowledge acquisition in ill-structured domains. In: Patel V (Ed.), Proceedings of the 10th Annual Conference of the Cognitive Science Society (pp. 375\u2013383) Erlbaum."},{"key":"439_CR41","first-page":"57","volume-title":"Constructivism and the Technology of Instruction","author":"RJ Spiro","year":"1992","unstructured":"Spiro RJ, Feltovich PJ, Jacobson MJ, Coulson RL. Cognitive flexibility, constructivism and hypertext: Random access instruction for advanced knowledge acquisition in ill-structured domains. In: Duffy T, Jonassen D, editors. Constructivism and the Technology of Instruction. Erlbaum; 1992. p. 57\u201375."},{"key":"439_CR42","unstructured":"Palmer D, Kaplan S (n.d.). A framework for strategic innovation: Blending strategy and creative exploration to discover future business opportunities. InnovationPoint LLC"},{"key":"439_CR43","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.edurev.2014.03.001","volume":"12","author":"K Bohle Carbonell","year":"2014","unstructured":"Bohle Carbonell K, Stalmeijer RE, K\u00f6nings KD, Segers M, van Merri\u00ebnboer JJG. How experts deal with novel situations: A review of adaptive expertise. Educ Res Rev. 2014;12:14\u201329. https:\/\/doi.org\/10.1016\/j.edurev.2014.03.001.","journal-title":"Educ Res Rev"},{"key":"439_CR44","unstructured":"Wu DJ Accelerating self-play learning in Go. arXiv preprint arXiv:1902.10565 (2019)."},{"key":"439_CR45","unstructured":"Goodfellow I, Shlens J, Szegedy C Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"439_CR46","doi-asserted-by":"crossref","unstructured":"David OE, Netanyahu NS DeepChess: End-to-End Deep Neural Network for Automatic Learning in Chess. arXiv:1711.09667 (2016).","DOI":"10.1007\/978-3-319-44781-0_11"},{"key":"439_CR47","unstructured":"Sadler M, Regan N Game Changer: AlphaZero's Groundbreaking Chess Strategies and the Promise of AI. New In Chess (2019)."},{"key":"439_CR48","volume-title":"Fundamental Chess Endings","author":"K M\u00fcller","year":"2001","unstructured":"M\u00fcller K, Lamprecht F. Fundamental Chess Endings. Gambit Publications; 2001."},{"key":"439_CR49","doi-asserted-by":"crossref","unstructured":"McGrath T, Kapishnikov A, Toma\u0161ev N, Pearce A, Wattenberg M, Hassabis D, Kim B, Paquet U, Kramnik V. Acquisition of chess knowledge in AlphaZero. Proceedings of the National Academy of Sciences, 119(47) (2022).","DOI":"10.1073\/pnas.2206625119"},{"key":"439_CR50","unstructured":"Palo Alto Networks. What Is Adversarial AI in Machine Learning? (2024)."},{"key":"439_CR51","unstructured":"UC Berkeley Center for Long-Term Cybersecurity Adversarial Machine Learning. (2019)."},{"key":"439_CR52","unstructured":"Infosecurity Magazine Defenders and Attackers are Locked in an AI Arms Race (2025)."},{"key":"439_CR53","unstructured":"Specops Software. AI arms race: How AI will be used by cyber-attackers (and defenders) (2025)."},{"key":"439_CR54","doi-asserted-by":"crossref","unstructured":"Sharif M, Bhagavatula S, Bauer L, Reiter MK Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1528\u20131540 (2016).","DOI":"10.1145\/2976749.2978392"},{"key":"439_CR55","unstructured":"Carnegie Mellon University. CyLab researchers spoof state-of-the-art facial recognition algorithms with printable eyeglasses. ECE News (2016)."},{"key":"439_CR56","unstructured":"MIT News 3 Questions: Modeling adversarial intelligence to exploit AI's security vulnerabilities (2025)."},{"key":"439_CR57","unstructured":"BlackBerry. The AI Arms Race in Cybersecurity. Retrieved from BlackBerry Blog (2024)."},{"key":"439_CR58","unstructured":"Security Magazine AI arms race: Cybersecurity defenders in the age of evolving threats (2024)."},{"key":"439_CR59","unstructured":"International Monetary Fund Artificial Intelligence Can Make Markets More Efficient\u2014and More Volatile. IMF Blog (2024)."},{"key":"439_CR60","unstructured":"International Monetary Fund Global Financial Stability Report: Steadying the Course: Uncertainty, Artificial Intelligence, and Financial Stability (2024)."},{"key":"439_CR61","unstructured":"Sidley Austin LLP. Artificial Intelligence in Financial Markets: Systemic Risk and Market Abuse Concerns (2024)."},{"key":"439_CR62","unstructured":"European Central Bank The rise of artificial intelligence: benefits and risks for financial stability (2024)."},{"key":"439_CR63","unstructured":"New York Institute of Finance. \"Spoofing\" and Disruptive Futures Trading Practices (2024)."},{"key":"439_CR64","unstructured":"Wikipedia Algorithmic bias. https:\/\/en.wikipedia.org\/wiki\/Algorithmic_bias (2024)"},{"key":"439_CR65","unstructured":"Wikipedia. Spoofing (finance) (2024)."},{"key":"439_CR66","unstructured":"Finance Magnates CFTC Fines Algorithmic Trader $2.8 Million For Spoofing (2013)."},{"key":"439_CR67","unstructured":"Wikipedia contributors 2010 flash crash. Wikipedia. https:\/\/en.wikipedia.org\/wiki\/2010_flash_crash (2024)."},{"key":"439_CR68","unstructured":"U.S. Department of Justice. Eight Individuals Charged With Deceptive Trading Practices Executed on U.S. Commodities Markets (2025)."},{"key":"439_CR69","unstructured":"Investing.com Academy Black Swan Event Definition & Examples (2024)."},{"key":"439_CR70","unstructured":"Dan Rose AI Black Swans in Artificial Intelligence (2022)."},{"key":"439_CR71","unstructured":"Lumenova AI. (2024). Black Swan Events in AI: Understanding the Unpredicc."},{"key":"439_CR72","unstructured":"Association for Financial Professionals, The Role of AI in Forecasting and Where It Falls Short (2024)."},{"key":"439_CR73","unstructured":"EY How to factor geopolitical risk into technology strategy (2025)."},{"key":"439_CR74","unstructured":"Goldman Sachs The generative world order: AI, geopolitics, and power (2023)."},{"key":"439_CR75","unstructured":"VentureBeat. OpenAI Five defeats professional Dota 2 team, twice. https:\/\/venturebeat.com\/ai\/openai-five-defeats-a-team-of-professional-dota-2-players\/ (2019)"},{"key":"439_CR76","unstructured":"VentureBeat. DeepMind's AlphaStar Final beats 99.8% of human StarCraft 2 players. https:\/\/venturebeat.com\/ai\/deepminds-alphastar-final-beats-99-8-of-human-starcraft-2-players\/ (2019)"},{"key":"439_CR77","unstructured":"OpenAI. OpenAI Five. OpenAI Blog. https:\/\/openai.com\/five\/ (2021)"},{"key":"439_CR78","unstructured":"The Register OpenAI retires its Dota-2 playing bots after crushing e-sport pros one last time. https:\/\/www.theregister.com\/2019\/04\/15\/openai_retires_dota2\/ (2019)"},{"key":"439_CR79","unstructured":"LinuxGameNetwork. Dota 2 Open AI Five Arena concludes with a 99.4% winrate. https:\/\/www.linuxgame.net\/post\/10 (2019)"},{"key":"439_CR80","unstructured":"Player.One. OpenAI Five gets 99.4 percent winrate vs humans in Dota 2. https:\/\/www.player.one\/open-ai-five-99-4-winrate-vs-humans-dota-2-125751 (2019)."},{"issue":"7782","key":"439_CR81","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1038\/s41586-019-1724-z","volume":"575","author":"O Vinyals","year":"2019","unstructured":"Vinyals O, Babuschkin I, Czarnecki WM, Mathieu M, Dudzik A, Chung J, Silver D. Grandmaster level in StarCraft II using multi-agent reinforcement learning. Nature. 2019;575(7782):350\u20134. https:\/\/doi.org\/10.1038\/s41586-019-1724-z.","journal-title":"Nature"},{"key":"439_CR82","unstructured":"DeepMind AlphaStar: Grandmaster level in StarCraft II using multi-agent reinforcement learning. DeepMind Blog. https:\/\/deepmind.google\/discover\/blog\/alphastar-grandmaster-level-in-starcraft-ii-using-multi-agent-reinforcement-learning\/ (2019)."},{"key":"439_CR83","unstructured":"TechSpot A human player finally beat DeepMind's AlphaStar AI at StarCraft II. https:\/\/www.techspot.com\/news\/78431-human-player-finally-beat-deepmind-alphastar-ai-starcraft.html (2019)"},{"key":"439_CR84","unstructured":"Carnegie Mellon University, Carnegie Mellon artificial intelligence beats top poker pros. Carnegie Mellon University News. https:\/\/www.cmu.edu\/news\/stories\/archives\/2017\/january\/AI-beats-poker-pros.html (2017)"},{"key":"439_CR85","unstructured":"Koh PW, Sagawa S, Marklund H, Xie SM, Zhang M, Balsubramani A, Liang P WILDS: A benchmark of in-the-wild distribution shifts. In Proceedings of the 38th International Conference on Machine Learning (pp. 5637\u20135664) (2021)."},{"key":"439_CR86","unstructured":"Chess.com. Hikaru Nakamura crushes computer in blitz chess - Top 10 of the 2000s - Rybka vs. Nakamura, 2008. https:\/\/www.chess.com\/blog\/SamCopeland\/hikaru-nakamura-crushes-computer-in-blitz-chess-top-10-of-the-2000s-rybka-vs-nakamura-2008 (2019)."},{"key":"439_CR87","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161","volume-title":"Causality: Models, reasoning, and inference","author":"J Pearl","year":"2009","unstructured":"Pearl J. Causality: Models, reasoning, and inference. 2nd ed. Cambridge University Press; 2009.","edition":"2"},{"key":"439_CR88","unstructured":"Taleb NN The Black Swan: The Impact of the Highly Improbable. Random House (2007)."},{"key":"439_CR89","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083. (2018)."},{"key":"439_CR90","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D Towards evaluating the robustness of neural networks. arXiv preprint arXiv:1608.04644 (2016).","DOI":"10.1109\/SP.2017.49"},{"key":"439_CR91","unstructured":"Google Cloud What is Human-in-the-Loop (HITL) in AI & ML. Retrieved from https:\/\/cloud.google.com\/discover\/human-in-the-loop (2024)"},{"key":"439_CR92","unstructured":"Humans in the Loop Human-in-the-Loop pipelines for AI. Retrieved from https:\/\/humansintheloop.org\/ (2025)."},{"key":"439_CR93","unstructured":"Google AI Adversarial testing for generative AI. Machine Learning Guide. Retrieved from https:\/\/developers.google.com\/machine-learning\/guides\/adv-testing (2024)."},{"key":"439_CR94","unstructured":"IBM Research What is AI adversarial robustness? Retrieved from https:\/\/research.ibm.com\/blog\/securing-ai-workflows-with-adversarial-robustness (2022)."},{"key":"439_CR95","doi-asserted-by":"crossref","unstructured":"Jia W, Lu Z, Xu H, Yin J, Shi W, Liu L (2022) Fooling the eyes of autonomous vehicles: Robust physical adversarial examples against traffic sign recognition systems. In: Network and Distributed System Security Symposium.","DOI":"10.14722\/ndss.2022.24130"},{"key":"439_CR96","doi-asserted-by":"crossref","unstructured":"Wang N, Deng Y, Tao G, Chen S, Lu Y, Chen QA Revisiting physical-world adversarial attack on traffic sign recognition: A commercial systems perspective. arXiv preprint arXiv:2409.09860 (2024).","DOI":"10.14722\/ndss.2025.230090"},{"key":"439_CR97","unstructured":"IBM What is Explainable AI (XAI)? Retrieved from https:\/\/www.ibm.com\/think\/topics\/explainable-ai (2025)"},{"key":"439_CR98","unstructured":"IBM AI bias examples. https:\/\/www.ibm.com\/think\/topics\/shedding-light-on-ai-bias-with-real-world-examples (2025)"},{"key":"439_CR99","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta AB, D\u00edaz-Rodr\u00edguez N, Del Ser J, Bennetot A, Tabik S, Barbado A, Barredo Arrieta A, Garcia S, Gil-Lopez S, Molina D, Benjamins R, Chatila R, Herrera F. Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf Fusion. 2020;58:82\u2013115.","journal-title":"Inf Fusion"},{"key":"439_CR100","unstructured":"Mastercard Explainable AI: From black box to transparency. Brighterion AI. Retrieved from https:\/\/b2b.mastercard.com\/news-and-insights\/blog\/explainable-ai-from-black-box-to-transparency\/ (2024)"},{"key":"439_CR101","unstructured":"Distance Learning Institute Cognitive Flexibility Theory: Adapting knowledge for real-world problems. Retrieved from https:\/\/distancelearning.institute\/instructional-design\/cognitive-flexibility-theory-real-world-problems\/ (2024)"},{"key":"439_CR102","unstructured":"InstructionalDesign.org. Cognitive Flexibility Theory (Spiro, Feltovitch & Coulson). Retrieved from https:\/\/www.instructionaldesign.org\/theories\/cognitive-flexibility\/ (2018)."},{"key":"439_CR103","first-page":"163","volume-title":"Cognition, education, and multimedia","author":"RJ Spiro","year":"1990","unstructured":"Spiro RJ, Jehng JC. Cognitive flexibility and hypertext: Theory and technology for the nonlinear and multidimensional traversal of complex subject matter. In: Nix D, Spiro R, editors. Cognition, education, and multimedia. Lawrence Erlbaum Associates; 1990. p. 163\u2013205."},{"key":"439_CR104","first-page":"262","volume-title":"Child development and education in Japan","author":"G Hatano","year":"1986","unstructured":"Hatano G, Inagaki K. Two courses of expertise. In: Stevenson H, Azuma H, Hakuta K, editors. Child development and education in Japan. Freeman; 1986. p. 262\u201372."},{"key":"439_CR105","unstructured":"Schwartz DL, Bransford JD, Sears D Efficiency and innovation in transfer. Transfer of learning from a modern multidisciplinary perspective, 1\u201351 (2005)."},{"key":"439_CR106","unstructured":"Label Your Data Human in the Loop Machine Learning: The key to better models in 2025. Retrieved from https:\/\/labelyourdata.com\/articles\/human-in-the-loop-in-machine-learning (2025)"},{"key":"439_CR107","volume-title":"Case study research: Design and methods","author":"RK Yin","year":"2014","unstructured":"Yin RK. Case study research: Design and methods. 5th ed. Sage Publications; 2014.","edition":"5"},{"key":"439_CR108","unstructured":"Academic Writing UK The issue of generalizability in case study research. Retrieved from https:\/\/academic-writing.uk\/generalizability-case-studies\/ (2024)."},{"key":"439_CR109","unstructured":"Research Design Review Generalizability in case study research. Retrieved from https:\/\/researchdesignreview.com\/2020\/12\/08\/generalizability-case-study-research\/(2020)"},{"key":"439_CR110","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-45233-1_23","volume":"2795","author":"J Kjeldskov","year":"2003","unstructured":"Kjeldskov J, Graham C. A review of mobile HCI research methods. Human-Computer Interaction with Mobile Devices and Services. 2003;2795:317\u201335.","journal-title":"Human-Computer Interaction with Mobile Devices and Services"},{"issue":"1","key":"439_CR111","first-page":"1","volume":"13","author":"F Wenzel","year":"2022","unstructured":"Wenzel F, Schain M, Deshpande A, Neyshabur B, Sedghi H, Transtrum MK, Lakshminarayanan B. Assaying out-of-distribution generalization in transfer learning. Nat Commun. 2022;13(1):1\u201314.","journal-title":"Nat Commun"},{"key":"439_CR112","unstructured":"Neptune AI Adversarial machine learning: Defense strategies. Retrieved from https:\/\/neptune.ai\/blog\/adversarial-machine-learning-defense-strategies (2024)"},{"issue":"4","key":"439_CR113","first-page":"114","volume":"96","author":"HJ Wilson","year":"2018","unstructured":"Wilson HJ, Daugherty PR. Collaborative intelligence: Humans and AI are joining forces. Harv Bus Rev. 2018;96(4):114\u201323.","journal-title":"Harv Bus Rev"},{"key":"439_CR114","unstructured":"MIT Sloan When humans and AI work best together\u2014and when each is better alone. Retrieved from https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/when-humans-and-ai-work-best-together-and-when-each-better-alone (2025)"},{"key":"439_CR115","unstructured":"IBM What is Black Box AI and how does it work? Retrieved from https:\/\/www.ibm.com\/think\/topics\/black-box-ai (2024)."},{"key":"439_CR116","unstructured":"Built In What is Black Box AI? Retrieved from https:\/\/builtin.com\/articles\/black-box-ai (2024)"},{"key":"439_CR117","unstructured":"Invoca What is Black Box AI? Retrieved from https:\/\/www.invoca.com\/blog\/what-is-black-box-ai (2024)"},{"key":"439_CR118","unstructured":"Viso.ai Attack methods: What is adversarial machine learning? https:\/\/viso.ai\/deep-learning\/adversarial-machine-learning\/ (2023)"},{"key":"439_CR119","unstructured":"RAND Corporation. Money, markets, and machine learning: Unpacking the risks of adversarial AI. https:\/\/www.rand.org\/pubs\/commentary\/2023\/08\/money-markets-and-machine-learning-unpacking-the-risks.html (2023)"},{"key":"439_CR120","unstructured":"IEEE Spectrum. Slight street sign modifications can completely fool machine learning algorithms. https:\/\/spectrum.ieee.org\/slight-street-sign-modifications-can-fool-machine-learning-algorithms (2023)"},{"key":"439_CR121","unstructured":"Harvard Gazette How facial-recognition app poses threat to privacy, civil liberties. https:\/\/news.harvard.edu\/gazette\/story\/2023\/10\/how-facial-recognition-app-poses-threat-to-privacy-civil-liberties\/ (2023)."},{"key":"439_CR122","unstructured":"American Civil Liberties Union, When it comes to facial recognition, there is no such thing as a magic number. https:\/\/www.aclu.org\/news\/privacy-technology\/when-it-comes-to-facial-recognition-there-is-no-such-thing-as-a-magic-number (2024)"},{"key":"439_CR123","unstructured":"CBC News How can I mislead you? Air Canada found liable for chatbot's bad advice on bereavement rates. https:\/\/www.cbc.ca\/news\/canada\/british-columbia\/air-canada-chatbot-lawsuit-1.7116416 (2024)."},{"key":"439_CR124","unstructured":"World Economic Forum Research shows AI is often biased. Here's how to make algorithms work for all of us. https:\/\/www.weforum.org\/stories\/2021\/07\/ai-machine-learning-bias-discrimination\/ (2021)."},{"key":"439_CR125","unstructured":"Brookings Institution Algorithmic bias detection and mitigation: Best practices and policies to reduce consumer harms. https:\/\/www.brookings.edu\/articles\/algorithmic-bias-detection-and-mitigation-best-practices-and-policies-to-reduce-consumer-harms\/ (2023)"},{"key":"439_CR126","unstructured":"Berner C, Brockman G, Chan B, Cheung V, D\u0119biak P, Dennison C, Zhang S. Dota 2 with large-scale deep reinforcement learning. arXiv preprint arXiv:1912.06680 (2019)."},{"key":"439_CR127","volume-title":"The book of why: The new science of cause and effect","author":"J Pearl","year":"2018","unstructured":"Pearl J, Mackenzie D. The book of why: The new science of cause and effect. Basic Books; 2018."},{"key":"439_CR128","doi-asserted-by":"crossref","unstructured":"Tseng T, McLean E, Pelrine K, Wang TT, Gleave A Can Go AIs be adversarially robust? arXiv preprint arXiv:2406.12843 (2024).","DOI":"10.1609\/aaai.v39i26.34980"},{"key":"439_CR129","doi-asserted-by":"crossref","unstructured":"Leslie D Understanding artificial intelligence ethics and safety: A guide for the responsible design and implementation of AI systems in the public sector. The Alan Turing Institute (2019).","DOI":"10.2139\/ssrn.3403301"},{"key":"439_CR130","unstructured":"UNESCO Recommendation on the ethics of artificial intelligence. https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics (2021)"},{"key":"439_CR137","unstructured":"FAR AI. (2023, February 17). A new attack on KataGo. FAR AI Blog. Retrieved from https:\/\/www.far.ai\/news\/even-superhuman-go-ais-have-surprising-failure-modes"},{"key":"439_CR138","unstructured":"Alphanome.AI. (2024). Black Swan Events and the Role of AI in Financial Markets. Retrieved from https:\/\/www.alphanome.ai\/post\/black-swan-events-and-the-role-of-ai-in-financial-markets"},{"key":"439_CR139","doi-asserted-by":"crossref","unstructured":"Davenport, T., Guha, A., Grewal, D., & Bressgott, T. (2020). How artificial intelligence will change the future of marketing. Journal of the Academy of Marketing Science, 48(1), 24-42.","DOI":"10.1007\/s11747-019-00696-0"},{"key":"439_CR140","unstructured":"Shen, Z., Liu, J., Ye, N., Chen, K., & Cui, P. (2021). Towards Out-Of-Distribution Generalization: A Survey. arXiv preprint arXiv:2108.13624"},{"key":"439_CR141","doi-asserted-by":"crossref","unstructured":"Rieth, M., & Hagemann, V. (2023). Human-AI teams\u2014Challenges for a team-centered AI at work. Frontiers in Artificial Intelligence, 6, 1252897.","DOI":"10.3389\/frai.2023.1252897"},{"key":"439_CR142","doi-asserted-by":"crossref","unstructured":"Yin, M., et al. (2024). AI-mediated social support: the prospect of human\u2013AI collaboration. Journal of Computer-Mediated Communication, 30(4)","DOI":"10.1093\/jcmc\/zmaf013"},{"key":"439_CR143","unstructured":"Kong, W., et al. (2024). EXplainable Artificial Intelligence (XAI) for facilitating recognition of algorithmic bias: An experiment from imposed users' perspectives. Computers in Human Behavior, 151, 108035"},{"key":"439_CR144","unstructured":"Kulkarni, C., et al. (2024). Evaluating Human-AI Collaboration: A Review and Methodological Framework. arXiv preprint arXiv:2407.19098."}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00439-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00439-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00439-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T11:08:49Z","timestamp":1762945729000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00439-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":138,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["439"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00439-x","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"31 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"321"}}