{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:57:35Z","timestamp":1774929455501,"version":"3.50.1"},"reference-count":113,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T00:00:00Z","timestamp":1680652800000},"content-version":"vor","delay-in-days":4,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010418","name":"Defence Science and Technology Laboratory","doi-asserted-by":"publisher","award":["R-DST-TFS\/D026"],"award-info":[{"award-number":["R-DST-TFS\/D026"]}],"id":[{"id":"10.13039\/100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["DISO"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Intelligence agencies have identified artificial intelligence (AI) as a key technology for maintaining an edge over adversaries. As a result, efforts to develop, acquire, and employ AI capabilities for purposes of national security are growing. This article reviews the ethical challenges presented by the use of AI for augmented intelligence analysis. These challenges have been identified through a qualitative systematic review of the relevant literature. The article identifies five sets of ethical challenges relating to intrusion, explainability and accountability, bias, authoritarianism and political security, and collaboration and classification, and offers a series of recommendations targeted at intelligence agencies to address and mitigate these challenges.<\/jats:p>","DOI":"10.1007\/s44206-023-00036-4","type":"journal-article","created":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T10:25:07Z","timestamp":1680690307000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["The Ethics of Artificial Intelligence for Intelligence Analysis: a Review of the Key Challenges with Recommendations"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9241-3037","authenticated-orcid":false,"given":"Alexander","family":"Blanchard","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mariarosaria","family":"Taddeo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,4,5]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Ad\u2019ha Aljunied, S. M. (2019). The securitization of cyberspace governance in Singapore. Asian Security,\u00a00(0), 1\u201320. https:\/\/doi.org\/10.1080\/14799855.2019.1687444","DOI":"10.1080\/14799855.2019.1687444"},{"key":"36_CR2","unstructured":"Ahluwalia, R. (2015). Press Release: UN special envoy for global education Gordon Brown calls 2015 the year of ending the violation of the rights of the child. The Office of the UN Special Envoy for Global Education.\u00a0https:\/\/educationenvoy.org\/press-release\/"},{"key":"36_CR3","volume-title":"Strategic intelligence management: National security imperatives and information and communications technologies","author":"B Akhgar","year":"2013","unstructured":"Akhgar, B., & Yates, S. (2013). Strategic intelligence management: National security imperatives and information and communications technologies (1st ed.). Elsevier\/Butterworth-Heinmann.","edition":"1"},{"key":"36_CR4","unstructured":"Alderton, M. (2017). NGA eyes analytic assistance: NGA has placed automation and machine learning at the top of its list of strategic priorities. Trajectory Magazine. 16 August 2017. https:\/\/staging.trajectorymagazine.com\/nga-eyes-analytic-assistance\/"},{"key":"36_CR5","unstructured":"Anderson, D. (2016). Report of the bulk powers review. London: Indepdent Reviewer of Terrorism Legislation. https:\/\/terrorismlegislationreviewer.independent.gov.uk\/wp-content\/uploads\/2016\/08\/Bulk-Powers-Review-final-report.pdf"},{"key":"36_CR6","unstructured":"Baber, C., Apperly, I., & McCormick, E. (2021). Understanding the problem of explanation when using AI In intelligence analysis. Centre for Research and Evidence on Security Threats.\u00a0https:\/\/crestresearch.ac.uk\/resources\/understanding-the-problem-of-explanation-when-using-ai-in-intelligence-analysis\/"},{"key":"36_CR7","unstructured":"Babuta, A., Oswald, M., & Janjeva, A. (2020).\u00a0Artificial Intelligence and UK national security: policy considerations. Occasional Paper. London: Royal United Services Institute for Defence Studies."},{"issue":"2","key":"36_CR8","first-page":"889","volume":"31","author":"Y Bathaee","year":"2017","unstructured":"Bathaee, Y. (2017). The artificial intelligence black box and the failure of intent and causation. Harvard Journal of Law & Technology (harvard JOLT), 31(2), 889\u2013938.","journal-title":"Harvard Journal of Law & Technology (harvard JOLT)"},{"key":"36_CR9","doi-asserted-by":"publisher","unstructured":"Bender, E. M., Gebru, T., McMillan-Major, A., & Shmitchell, S. (2021).\u00a0On the dangers of stochastic parrots: Can language models be too Big?. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, 610\u201323. FAccT \u201921. New York, NY, USA: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3442188.3445922","DOI":"10.1145\/3442188.3445922"},{"key":"36_CR10","unstructured":"Bender, E. M. (2022). On NYT Magazine on AI: Resist the urge to be impressed. Medium (blog). 2 May 2022. https:\/\/medium.com\/@emilymenonbender\/on-nyt-magazine-on-ai-resist-the-urge-to-be-impressed-3d92fd9a0edd"},{"key":"36_CR11","doi-asserted-by":"publisher","unstructured":"Bender, E. M., & Koller, A. (2020). Climbing towards NLU: On meaning, form, and understanding in the age of data. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 5185\u201398. Online: Association for Computational Linguistics. https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.463","DOI":"10.18653\/v1\/2020.acl-main.463"},{"key":"36_CR12","unstructured":"Bergadano, F. (1991). The problem of induction and machine learning. IJCAI\u201991: Proceedings of the 12th International Joint Conference on Artificial Intelligence,\u00a02."},{"issue":"2","key":"36_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/23738871.2016.1228990","volume":"1","author":"P Bernal","year":"2016","unstructured":"Bernal, P. (2016). Data gathering, surveillance and human rights: Recasting the debate. Journal of Cyber Policy, 1(2), 243\u2013264. https:\/\/doi.org\/10.1080\/23738871.2016.1228990","journal-title":"Journal of Cyber Policy"},{"key":"36_CR14","unstructured":"Biometrics and Surveillance Camera Commissioner. (2017). National surveillance camera strategy for England and Wales. Whitehall: Biometrics and Surveillance Camera Commissioner."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Blanchard, A. (2023). Autonomous force beyond armed conflict. Minds and Machines.","DOI":"10.2139\/ssrn.4340209"},{"key":"36_CR16","doi-asserted-by":"publisher","unstructured":"Blanchard, A., & Taddeo, M. (2022). Autonomous weapon systems and Jus Ad Bellum. AI & SOCIETY, March. https:\/\/doi.org\/10.1007\/s00146-022-01425-y","DOI":"10.1007\/s00146-022-01425-y"},{"key":"36_CR17","unstructured":"Booth, A. (2006). Brimful of STARLITE: Toward standards for reporting literature searches. Journal of the Medical Library Association: JMLA, 94(4), 421\u201329, e205."},{"key":"36_CR18","unstructured":"Bradley, M. M., & Lang P. J. (1999). Affective norms for English words (ANEW): Instruction manual and affective ratings. Technical report C-1, the center for research in psychophysiology."},{"key":"36_CR19","unstructured":"Brewster, T. (2021). Project Maven: Startups backed by Google, Peter Thiel, Eric Schmidt And James Murdoch are building AI And facial recognition surveillance tools for the Pentagon. Forbes. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/09\/08\/project-maven-startups-backed-by-google-peter-thiel-eric-schmidt-and-james-murdoch-build-ai-and-facial-recognition-surveillance-for-the-defense-department\/"},{"key":"36_CR20","unstructured":"Brundage, M., Garfinkel B., Avin S., Clark J., & Toner H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. Multiple Institutions. https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1802\/1802.07228.pdf"},{"issue":"1","key":"36_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-87709-7","volume":"11","author":"GM Campedelli","year":"2021","unstructured":"Campedelli, G. M., Bartulovic, M., & Carley, K. M. (2021). Learning future terrorist targets through temporal meta-graphs. Scientific Reports, 11(1), 1\u201315.","journal-title":"Scientific Reports"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Cath, C., Wachter, S., Mittelstadt, B., Taddeo, M., & Floridi, L. (2018). Artificial Intelligence and the \u201cGood Society\u201d: The US, EU, and UK Approach. Science and Engineering Ethics, 24(2), 505\u2013528.","DOI":"10.1007\/s11948-017-9901-7"},{"key":"36_CR23","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12549.001.0001","volume-title":"AI ethics","author":"M Coeckelbergh","year":"2020","unstructured":"Coeckelbergh, M. (2020). AI ethics. MIT Press."},{"key":"36_CR24","unstructured":"Cornille, C. (2021).\u00a0AI experts needed to lead \u201cProject Maven\u201d move within DOD. Bloomberg Government (blog).\u00a0https:\/\/about.bgov.com\/news\/ai-experts-needed-to-lead-project-maven-move-within-dod\/"},{"key":"36_CR25","unstructured":"Cummings, M., & Songpo L. (2019). HAL2019\u201302: Machine learning tools for informing transportation technology and policy. Humans and Autonomy Laboratory, Duke University. http:\/\/hal.pratt.duke.edu\/sites\/hal.pratt.duke.edu\/files\/u39\/HAL2019_2%5B1920%5D-min.pdf"},{"key":"36_CR26","unstructured":"Defense Technical Information Center (DTIC) - Department of Defense. (2013). Joint publication 2\u20130 - joint intelligence. https:\/\/web.archive.org\/web\/20160613010839\/http:\/\/www.dtic.mil\/doctrine\/new_pubs\/jp2_0.pdf"},{"key":"36_CR27","unstructured":"Director of National Intelligence. (2008). Vision 2015: A globally networked and integrated intelligence enterprise. Office of the Director of National Intelligence. https:\/\/www.dni.gov\/files\/documents\/Newsroom\/Reports%20and%20Pubs\/Vision_2015.pdf"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Dixon, A., & Birks, D. (2021). Improving policing with natural language processing. In Proceedings of the 1st Workshop on NLP for Positive Impact, 115\u201324.","DOI":"10.18653\/v1\/2021.nlp4posimpact-1.13"},{"issue":"4","key":"36_CR29","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1089\/big.2014.0046","volume":"2","author":"A Doyle","year":"2014","unstructured":"Doyle, A., Katz, G., Summers, K., Ackermann, C., Zavorin, I., Lim, Z., & Muthiah, S., et al. (2014). Forecasting significant societal events using the EMBERS streaming predictive analytics system. Big Data, 2(4), 185\u2013195. https:\/\/doi.org\/10.1089\/big.2014.0046","journal-title":"Big Data"},{"key":"36_CR30","unstructured":"Eggers, W. D., Matt G., & Neha M. (2019). Using AI to unleash the power of unstructured government data: Applications and examples of natural language processing (NLP) across government. Deloitte Insights. https:\/\/www2.deloitte.com\/xe\/en\/insights\/focus\/cognitive-technologies\/natural-language-processing-examples-in-government-data.html"},{"key":"36_CR31","unstructured":"Evans, M. (2021). Pentagon uses AI to predict enemy moves \u201cDays in Advance\u201d, Sec. World. https:\/\/www.thetimes.co.uk\/article\/pentagon-uses-ai-to-predict-enemy-moves-days-in-advance-bql5q5s9p"},{"key":"36_CR32","unstructured":"Fleming, J. (2019). Director\u2019s speech on cyber power - as delivered. GCHQ. https:\/\/www.gchq.gov.uk\/speech\/jeremy-fleming-fullerton-speech-singapore-2019"},{"issue":"3","key":"36_CR33","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s11229-010-9821-4","volume":"184","author":"L Floridi","year":"2012","unstructured":"Floridi, L. (2012). Semantic information and the network theory of account. Synthese, 184(3), 431\u2013454. https:\/\/doi.org\/10.1007\/s11229-010-9821-4","journal-title":"Synthese"},{"key":"36_CR34","doi-asserted-by":"publisher","unstructured":"Floridi, L., Cowls, J., King, T. C., & Taddeo, M. (2020). How to design AI for social good: Seven essential factors. Science and Engineering Ethics, 26(3), 1771\u20131796. https:\/\/doi.org\/10.1007\/s11948-020-00213-5","DOI":"10.1007\/s11948-020-00213-5"},{"key":"36_CR35","doi-asserted-by":"publisher","unstructured":"Floridi, L., Holweg, M., Taddeo, M., Silva, J. A.,\u00a0 M\u00f6kander, J., & Wen, Y. (2022). CapAI - A procedure for conducting conformity assessment of AI systems in line with the EU artificial intelligence act. SSRN Electronic Journal.\u00a0https:\/\/doi.org\/10.2139\/ssrn.4064091","DOI":"10.2139\/ssrn.4064091"},{"issue":"1","key":"36_CR36","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1093\/jicj\/mqab013","volume":"19","author":"L Freeman","year":"2021","unstructured":"Freeman, L. (2021). Weapons of war, tools of justice: Using artificial intelligence to investigate international crimes. Journal of International Criminal Justice, 19(1), 35\u201353. https:\/\/doi.org\/10.1093\/jicj\/mqab013","journal-title":"Journal of International Criminal Justice"},{"issue":"1","key":"36_CR37","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/arcp.1068","volume":"4","author":"D Gal","year":"2021","unstructured":"Gal, D., & Simonson, I. (2021). Predicting consumers\u2019 choices in the age of the internet, AI, and almost perfect tracking: Some things change, the key challenges do not. Consumer Psychology Review, 4(1), 135\u2013152. https:\/\/doi.org\/10.1002\/arcp.1068","journal-title":"Consumer Psychology Review"},{"issue":"1","key":"36_CR38","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1086\/427309","volume":"31","author":"P Galison","year":"2004","unstructured":"Galison, P. (2004). Removing knowledge. Critical Inquiry, 31(1), 229\u2013243.","journal-title":"Critical Inquiry"},{"key":"36_CR39","unstructured":"GCHQ. (2021). Pioneering a new national security: The ethics of artificial intelligence. GCHQ. https:\/\/www.gchq.gov.uk\/files\/GCHQAIPaper.pdf"},{"key":"36_CR40","doi-asserted-by":"publisher","unstructured":"Grant, M. J., & Booth, A. (2009). A typology of reviews: An analysis of 14 review types and associated methodologies: A typology of reviews, Maria J. Grant & Andrew Booth\u2019. Health Information & Libraries Journal, 26(2), 91\u2013108. https:\/\/doi.org\/10.1111\/j.1471-1842.2009.00848.x","DOI":"10.1111\/j.1471-1842.2009.00848.x"},{"key":"36_CR41","unstructured":"Harwell, D., & Dou, E. (2020). Huawei tested AI software that could recognize Uighur minorities and alert police, report says. Washington Post. https:\/\/www.washingtonpost.com\/technology\/2020\/12\/08\/huawei-tested-ai-software-that-could-recognize-uighur-minorities-alert-police-report-says\/"},{"key":"36_CR42","unstructured":"Heaven, W. D. (2021). DeepMind says its new language model can beat others 25 times its size. MIT Technology Review. https:\/\/www.technologyreview.com\/2021\/12\/08\/1041557\/deepmind-language-model-beat-others-25-times-size-gpt-3-megatron\/"},{"key":"36_CR43","doi-asserted-by":"crossref","unstructured":"Hepenstal, S., Zhang, L., Kodagoda, N., & Wong, B. W. (2020, March).\u00a0Pan: Conversational agent for criminal investigations. In Proceedings of the 25th International Conference on Intelligent User Interfaces Companion, 134\u201335.","DOI":"10.1145\/3379336.3381463"},{"key":"36_CR44","doi-asserted-by":"publisher","unstructured":"Holland, M. A. (2020). The black box, unlocked: Predictability and understandability in military AI. United Nations Institute for Disarmament Research. https:\/\/doi.org\/10.37559\/SecTec\/20\/AI1","DOI":"10.37559\/SecTec\/20\/AI1"},{"key":"36_CR45","unstructured":"Home Office. (2012). Definition of policing by consent. GOV.UK. https:\/\/www.gov.uk\/government\/publications\/policing-by-consent\/definition-of-policing-by-consent"},{"key":"36_CR46","unstructured":"Hume, D. (2009). A treatise of human nature. Edited by David Fate Norton. Reprint with corrections. Oxford Philosophical Texts. Oxford: Oxford University Press."},{"key":"36_CR47","unstructured":"IEEE. (2019). What is augmented intelligence?. https:\/\/digitalreality.ieee.org\/publications\/what-is-augmented-intelligence"},{"key":"36_CR48","unstructured":"Ish, D., Ettinger, J., & Ferris, C. (2021). Evaluating the effectiveness of artificial intelligence systems in intelligence analysis. RAND Corporation. https:\/\/www.rand.org\/pubs\/research_reports\/RRA464-1.html"},{"key":"36_CR49","unstructured":"Independent Surveillance Review. (2015). A democratic licence to operate: Report of the independent surveillance review. London: Royal United Services Institute for Defence Studies. https:\/\/static.rusi.org\/20150714_whr_2-15_a_democratic_licence_to_operate.pdf"},{"key":"36_CR50","unstructured":"Janjeva, A., Harris, A., & Byrne, J. (2022). The future of open source intelligence for UK national security. RUSI Occasional Paper. Whitehall: Royal United Services Institute for Defence Studies."},{"key":"36_CR51","unstructured":"Johnston, R. (2005). Analytic culture in the United States intelligence community: An ethnographic study. Central Intelligence Agency."},{"key":"36_CR52","unstructured":"Justice and Home Affairs Committee. (2022). Technology rules? The advent of new technologies in the justice system. HLPaper180. Westminster: The House of Lords."},{"key":"36_CR53","volume-title":"The 9\/11 commission report","author":"TH Kean","year":"2004","unstructured":"Kean, T. H. (2004). The 9\/11 commission report.\u00a0Washington DC: National Commission on Terrorist Attacks Upon the United States."},{"key":"36_CR54","unstructured":"Kelion, L. (2021). Huawei patent mentions use of Uighur-spotting tech. BBC News, 13 January 2021, sec. Technology. https:\/\/www.bbc.com\/news\/technology-55634388"},{"key":"36_CR55","unstructured":"Kniep, R. (2019). Another layer of opacity: How spies use AI and why we should talk about it. About:Intel (blog). 20 December 2019. https:\/\/aboutintel.eu\/how-spies-use-ai\/"},{"issue":"2","key":"36_CR56","doi-asserted-by":"publisher","first-page":"564","DOI":"10.5281\/zenodo.3709267","volume":"13","author":"ZI Khisamova","year":"2019","unstructured":"Khisamova, Z. I., Begishev, I. R., & Sidorenko, E. L. (2019). Artificial intelligence and problems of ensuring cyber security. International Journal of Cyber Criminology, 13(2), 564\u2013577. https:\/\/doi.org\/10.5281\/zenodo.3709267","journal-title":"International Journal of Cyber Criminology"},{"key":"36_CR57","unstructured":"Lo, C. (2015). Safer with data: Protecting Pakistan\u2019s schools with predictive analytics. Army Technology. 8 November 2015. https:\/\/www.army-technology.com\/features\/featuresafer-with-data-protecting-pakistans-schools-with-predictive-analytics-4713601\/"},{"key":"36_CR58","doi-asserted-by":"crossref","unstructured":"Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In Group Privacy, 139\u201358. Springer.","DOI":"10.1007\/978-3-319-46608-8_8"},{"key":"36_CR59","doi-asserted-by":"publisher","unstructured":"Marcum, R. A., Davis, C. H., Scott, G. J., & Nivin, T. W. (2017).\u00a0Rapid broad area search and detection of Chinese surface-to-air missile sites using deep convolutional neural networks. Journal of Applied Remote Sensing, 11(4), 042614. https:\/\/doi.org\/10.1117\/1.JRS.11.042614","DOI":"10.1117\/1.JRS.11.042614"},{"key":"36_CR60","unstructured":"Marin, M., & Freddie K. (2020). Using artificial intelligence to scale up human rights research: A case study on Darfur. Amnesty International. 6 July 2020. https:\/\/citizenevidence.org\/2020\/07\/06\/using-artificial-intelligence-to-scale-up-human-rights-research-a-case-study-on-darfur\/"},{"key":"36_CR61","unstructured":"McKendrick, K. (2019). Artificial intelligence prediction and counterterrorism. London: Chatham House. https:\/\/www.chathamhouse.org\/sites\/default\/files\/2019-08-07-AICounterterrorism.pdf"},{"key":"36_CR62","unstructured":"Ministry of Defence. (2018). Human-machine teaming (JCN 1\/18). https:\/\/www.gov.uk\/government\/publications\/human-machine-teaming-jcn-118"},{"key":"36_CR63","unstructured":"Mitchell, K., Mariani, J., Routh, A., Keyal, A., & Mirkow, A. (2019).\u00a0The future of intelligence analysis: A task-level view of the impact of artificial intelligence on intel analysis. Washington D.C.: Deloitte."},{"key":"36_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-021-09557-8","author":"J M\u00f6kander","year":"2021","unstructured":"M\u00f6kander, J., & Floridi, L. (2021). Ethics-based auditing to develop trustworthy AI. Minds and Machines, February. https:\/\/doi.org\/10.1007\/s11023-021-09557-8","journal-title":"Minds and Machines, February."},{"issue":"2","key":"36_CR65","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1037\/a0025792","volume":"18","author":"J Monahan","year":"2012","unstructured":"Monahan, J. (2012). The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2), 167.","journal-title":"Psychology, Public Policy, and Law"},{"key":"36_CR66","doi-asserted-by":"crossref","unstructured":"Morley, J., Cowls, J., Taddeo, M., & Floridi, L. (2020). Ethical guidelines for COVID-19 tracing apps. Nature, 582,\u00a029\u201331.","DOI":"10.1038\/d41586-020-01578-0"},{"key":"36_CR67","doi-asserted-by":"publisher","unstructured":"Ni, Y., Barzman, D., Bachtel, A., Griffey, M., Osborn, A., & Sorter, M. (2020).\u00a0Finding warning markers: Leveraging natural language processing and machine learning technologies to detect risk of school violence. International Journal of Medical Informatics, 139, 104137. https:\/\/doi.org\/10.1016\/j.ijmedinf.2020.104137","DOI":"10.1016\/j.ijmedinf.2020.104137"},{"key":"36_CR68","unstructured":"NSCAI. (2021). Final report. Washington DC: National Security Comission on Artificial Intelligence. https:\/\/www.nscai.gov\/wp-content\/uploads\/2021\/03\/Full-Report-Digital-1.pdf"},{"key":"36_CR69","unstructured":"Ofcom. (2019). Use of AI in online content moderation. Cambridge Consultants. https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0028\/157249\/cambridge-consultants-ai-content-moderation.pdf"},{"key":"36_CR70","unstructured":"Office of the Secretary of Defense. (2017). Department of Defense fiscal year (FY) 2017 request for additional appropriations. Department of Defense."},{"key":"36_CR71","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvvngtm","volume-title":"Principled spying: The ethics of secret intelligence","author":"D Omand","year":"2018","unstructured":"Omand, D., & Phythian, M. (2018). Principled spying: The ethics of secret intelligence. Oxford University Press."},{"key":"36_CR72","unstructured":"OpenAI. (2019). Better language models and their implications. OpenAI. 14 February 2019. https:\/\/openai.com\/blog\/better-language-models\/"},{"key":"36_CR73","unstructured":"OpenAI. (2021). GPT-3 Powers the Next Generation of Apps. OpenAI. 25 March 2021. https:\/\/openai.com\/blog\/gpt-3-apps\/"},{"issue":"2","key":"36_CR74","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1518\/001872097778543886","volume":"39","author":"R Parasuraman","year":"1997","unstructured":"Parasuraman, R., & Riley, V. (1997). Humans and automation: Use, misuse, disuse, abuse. Human Factors: THe Journal of the Human Factors and Ergonomics Society, 39(2), 230\u2013253. https:\/\/doi.org\/10.1518\/001872097778543886","journal-title":"Human Factors: THe Journal of the Human Factors and Ergonomics Society"},{"key":"36_CR75","unstructured":"Pellerin, C. (2017). Project Maven industry day pursues artificial intelligence for DoD challenges. U.S. Department of Defense. https:\/\/www.defense.gov\/News\/News-Stories\/Article\/Article\/1356172\/project-maven-industry-day-pursues-artificial-intelligence-for-dod-challenges\/"},{"key":"36_CR76","doi-asserted-by":"crossref","unstructured":"Pizzi, M., Romanoff, M., & Engelhardt, T. (2021). AI for humanitarian action: Human rights and ethics. International Committee of the Red Cross. http:\/\/international-review.icrc.org\/articles\/ai-humanitarian-action-human-rights-ethics-913","DOI":"10.1017\/S1816383121000011"},{"key":"36_CR77","unstructured":"Prakash, A. (2019). Algorithmic foreign policy: Artificial intelligence capable of predicting world events could radically change geopolitics. Scientific American. https:\/\/blogs.scientificamerican.com\/observations\/algorithmic-foreign-policy\/"},{"issue":"5","key":"36_CR78","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSEC.2019.2925649","volume":"17","author":"S Raaijmakers","year":"2019","unstructured":"Raaijmakers, S. (2019). Artificial intelligence for law enforcement: Challenges and opportunities. IEEE Security & Privacy, 17(5), 74\u201377.","journal-title":"IEEE Security & Privacy"},{"key":"36_CR79","unstructured":"Rae, J., Irving, G., & Weidinger, L. (2021).\u00a0Language modelling at scale: Gopher, ethical considerations, and retrieval. DeepMind. https:\/\/deepmind.com\/blog\/article\/language-modelling-at-scale"},{"key":"36_CR80","unstructured":"Rassler, D. (2021). Data, AI, and the future of U.S. counterterrorism: Buildiing an action plan. CTC Sentinel."},{"key":"36_CR81","doi-asserted-by":"publisher","unstructured":"Roberts, H., Cowls, J., Morley, J., Taddeo, M., Wang, V., & Floridi, L. (2020). The Chinese approach to artificial intelligence: An analysis of policy, ethics, and regulation. AI & SOCIETY, June. https:\/\/doi.org\/10.1007\/s00146-020-00992-2","DOI":"10.1007\/s00146-020-00992-2"},{"key":"36_CR82","volume-title":"Uncomfortable ground truths: Predictive analytics and national security","author":"HM Roff","year":"2020","unstructured":"Roff, H. M. (2020a). Uncomfortable ground truths: Predictive analytics and national security.\u00a0Washington DC: Brookings Institute."},{"key":"36_CR83","unstructured":"Roff, H. M. (2020b). Forecasting and predictive analytics: A critical look at the basic building blocks of a predictive model. Brookings (blog). 11 September 2020b. https:\/\/www.brookings.edu\/techstream\/forecasting-and-predictive-analytics-a-critical-look-at-the-basic-building-blocks-of-a-predictive-model\/"},{"key":"36_CR84","unstructured":"Rudin, C., & Mit S. (2013). Predictive policing: Using machine learning to detect patterns of crime. Wired, 22 August 2013. https:\/\/www.wired.com\/insights\/2013\/08\/predictive-policing-using-machine-learning-to-detect-patterns-of-crime\/"},{"issue":"5","key":"36_CR85","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","volume":"1","author":"C Rudin","year":"2019","unstructured":"Rudin, C. (2019). Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nature Machine Intelligence, 1(5), 206\u2013215.","journal-title":"Nature Machine Intelligence"},{"key":"36_CR86","unstructured":"Ryan, M., & Van Antwerp, S. (2019). AI-enabled human rights monitoring. London: Amnesty International. https:\/\/s3.amazonaws.com\/element-ai-website-bucket\/ai-enabled-human-rights-monitoring-wp.pdf"},{"issue":"15","key":"36_CR87","doi-asserted-by":"publisher","first-page":"8398","DOI":"10.1073\/pnas.1915006117","volume":"117","author":"MJ Salganik","year":"2020","unstructured":"Salganik, M. J., Lundberg, I., Kindel, A. T., Ahearn, C. E., Al-Ghoneim, K., Almaatouq, A., Altschul, D. M., Brand, J. E., Carnegie, N. B., & Compton, R. J. (2020). Measuring the predictability of life outcomes with a scientific mass collaboration. Proceedings of the National Academy of Sciences, 117(15), 8398\u20138403.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"36_CR88","volume-title":"AI in the UK: Ready, willing and able?","author":"Select Committee on Artificial Intelligence","year":"2018","unstructured":"Select Committee on Artificial Intelligence. (2018). AI in the UK: Ready, willing and able?\u00a0London: House of Lords."},{"key":"36_CR89","unstructured":"Serious Fraud Office. (2020). The use of artificial intelligence to combat public sector fraud. London: International Public Sector Fraud Forum. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/865721\/Artificial_intelligence_13_Feb.pdf"},{"key":"36_CR90","doi-asserted-by":"publisher","unstructured":"Taddeo, M. (2017). Trusting digital technologies correctly. Minds and Machines, 27(4), 565\u2013568. https:\/\/doi.org\/10.1007\/s11023-017-9450-5","DOI":"10.1007\/s11023-017-9450-5"},{"key":"36_CR91","doi-asserted-by":"publisher","unstructured":"Taddeo, M. (2019). Three ethical challenges of applications of artificial intelligence in cybersecurity. Minds and Machines, 29(2), 187\u2013191. https:\/\/doi.org\/10.1007\/s11023-019-09504-8","DOI":"10.1007\/s11023-019-09504-8"},{"key":"36_CR92","doi-asserted-by":"publisher","unstructured":"Taddeo, M., & Blanchard, A. (2022a). Accepting moral responsibility for the actions of autonomous weapons systems\u2014a moral gambit. Philosophy & Technology, 35(3), 78.https:\/\/doi.org\/10.1007\/s13347-022-00571-x","DOI":"10.1007\/s13347-022-00571-x"},{"key":"36_CR93","doi-asserted-by":"publisher","unstructured":"Taddeo, M., & Blanchard, B. (2022b). A comparative analysis of the definitions of autonomous weapons systems. Science and Engineering Ethics, 28(5), 37. https:\/\/doi.org\/10.1007\/s11948-022-00392-3","DOI":"10.1007\/s11948-022-00392-3"},{"key":"36_CR94","doi-asserted-by":"publisher","unstructured":"Taddeo, M., McCutcheon, T., & Floridi L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557\u2013560. https:\/\/doi.org\/10.1038\/s42256-019-0109-1","DOI":"10.1038\/s42256-019-0109-1"},{"key":"36_CR95","doi-asserted-by":"publisher","unstructured":"Taddeo, M., McNeish, D., Blanchard, A., & Edgar E. (2021). Ethical principles for artificial intelligence in national defence. Philosophy & Technology, October. https:\/\/doi.org\/10.1007\/s13347-021-00482-3","DOI":"10.1007\/s13347-021-00482-3"},{"key":"36_CR96","unstructured":"Taddeo, M., Ziosi, M., Tsamados, A., Gilli, L., & Kurapati, S. (2022). Artificial Intelligence for National Security: The Predictability Problem. Centre for Digital Ethics (CEDE) Research Paper."},{"issue":"4","key":"36_CR97","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11023-019-09508-4","volume":"29","author":"P Timmers","year":"2019","unstructured":"Timmers, P. (2019). Ethics of AI and cybersecurity when sovereignty is at stake. Minds and Machines, 29(4), 635\u2013645. https:\/\/doi.org\/10.1007\/s11023-019-09508-4","journal-title":"Minds and Machines"},{"key":"36_CR98","unstructured":"Tisne, M. (2021). Collective Data rights can stop big tech from obliterating privacy. MIT Technology Review. https:\/\/www.technologyreview.com\/2021\/05\/25\/1025297\/collective-data-rights-big-tech-privacy\/"},{"key":"36_CR99","unstructured":"Techjournalist. (2020). Open-source satellite data to investigate Xinjiang concentration camp. Medium (blog). 30 September 2020. https:\/\/techjournalism.medium.com\/open-source-satellite-data-to-investigate-xinjiang-concentration-camps-2713c82173b6"},{"key":"36_CR100","doi-asserted-by":"publisher","unstructured":"Tsamados, A., Aggarwal, N., Cowls, J., Morley, J., Roberts, H., Taddeo, M., & Floridi, L. (2021). The ethics of algorithms: Key problems and solutions. AI & SOCIETY, February. https:\/\/doi.org\/10.1007\/s00146-021-01154-8","DOI":"10.1007\/s00146-021-01154-8"},{"key":"36_CR101","unstructured":"United Nations High Commissioner for Human Rights. (2014). The right to privacy in the digital age: annual report of the United Nations High Commissioner for human rights and reports of the Office of the High Commissioner and the Secretary-General. A\/HRC\/27\/37. Geneva, Switzeland: United Nations Human Rights Council."},{"key":"36_CR102","unstructured":"United Nations High Commissioner for Human Rights. (2021). The right to privacy in the digital age: Annual report of the United Nations High Commissioner for human rights and reports of the Office of the High Commissioner and the Secretary-General. A\/HRC\/48\/31. Geneva, Switzeland: United Nations Human Rights Council."},{"key":"36_CR103","unstructured":"U.S Navy. (2019). Automated multi-system course of action analysis using artificial intelligence. https:\/\/www.navysbir.com\/n19_1\/N191-034.htm"},{"key":"36_CR104","unstructured":"Vegt, I., Van Der, B. K., & Paul G. (2022). Linguistic threat assessment: Challenges and opportunities. Centre for Research and Evidence on Security Threats. https:\/\/crestresearch.ac.uk\/comment\/linguistic-threat-assessment-challenges-and-opportunities\/"},{"issue":"6","key":"36_CR105","doi-asserted-by":"publisher","first-page":"2975","DOI":"10.1007\/s11948-020-00254-w","volume":"26","author":"HM Verhelst","year":"2020","unstructured":"Verhelst, H. M., Stannat, A. W., & Mecacci, G. (2020). Machine learning against terrorism: How big data collection and analysis influences the privacy-security dilemma. Science and Engineering Ethics, 26(6), 2975\u20132984. https:\/\/doi.org\/10.1007\/s11948-020-00254-w","journal-title":"Science and Engineering Ethics"},{"key":"36_CR106","doi-asserted-by":"publisher","unstructured":"Vieth, K., & Thorsten W. (2019). Data-driven intelligence oversight. Recommendations for a system update. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.3505906","DOI":"10.2139\/ssrn.3505906"},{"key":"36_CR107","unstructured":"Vincent, B. (2019). How the CIA is working to ethically deploy artificial intelligence\u201d. NextGov. https:\/\/www.nextgov.com\/emerging-tech\/2019\/05\/how-cia-working-ethically-deploy-artificial-intelligence\/157395\/"},{"issue":"6","key":"36_CR108","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1080\/02684527.2021.1946952","volume":"36","author":"KM Vogel","year":"2021","unstructured":"Vogel, K. M., Reid, G., Kampe, C., & Jones, P. (2021). The impact of ai on intelligence analysis: Tackling issues of collaboration, algorithmic transparency, accountability, and management. Intelligence and National Security, 36(6), 827\u2013848.","journal-title":"Intelligence and National Security"},{"key":"36_CR109","unstructured":"Walch, K. (2020). How AI is finding patterns and anomalies in your data. Forbes. https:\/\/www.forbes.com\/sites\/cognitiveworld\/2020\/05\/10\/finding-patterns-and-anomalies-in-your-data\/"},{"key":"36_CR110","first-page":"4","volume":"90","author":"C Weinbaum","year":"2018","unstructured":"Weinbaum, C., & Shanahan, J. N. T. (2018). Intelligence in a data-driven age. Joint Force Quarterly, 90, 4\u20139.","journal-title":"Joint Force Quarterly"},{"key":"36_CR111","unstructured":"West, D. M. (2021). Using AI and machine learning to reduce government fraud. Brookings (blog). 10 September 2021. https:\/\/www.brookings.edu\/research\/using-ai-and-machine-learning-to-reduce-government-fraud\/"},{"key":"36_CR112","unstructured":"Wooldridge, M. J. (2020). The road to conscious machines: The story of AI."},{"key":"36_CR113","unstructured":"Zhu, M. (2020). An algorithmic jury: Using artificial intelligence to predict recidivism rates. Yale Scientific. https:\/\/www.yalescientific.org\/2020\/05\/an-algorithmic-jury-using-artificial-intelligence-to-predict-recidivism-rates\/"}],"container-title":["Digital Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44206-023-00036-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44206-023-00036-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44206-023-00036-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T19:07:45Z","timestamp":1729192065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44206-023-00036-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":113,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["36"],"URL":"https:\/\/doi.org\/10.1007\/s44206-023-00036-4","relation":{},"ISSN":["2731-4650","2731-4669"],"issn-type":[{"value":"2731-4650","type":"print"},{"value":"2731-4669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"26 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"12"}}