Authors
- Hatidža BerišaMilitary Academy, University of Defence, Veljka Lukića Kurjaka, 11042 Belgrade, Serbia
- Vanja CvetkovićScientific-Professional Society for Disaster Risk Management, Dimitrija Tucovića 121, 11040 Belgrade, Serbia
- Aleksandar PavićMilitary Academy, University of Defence, Veljka Lukića Kurjaka, 11042 Belgrade, Serbia
DOI:
https://doi.org/10.18485/ijdrm.2024.6.2.18
Keywords:
artificial intelligence, autonomy, superiority in cyberspace, hybrid threats, risks, management
Abstract
The crisis management system is a key element of a modern, reliable, effective, and sustainable security system. In contemporary settings, management functions are implemented through the capabilities of a command-information system. Consequently, most activities are conducted within cyberspace, meaning that management functions cannot be effectively executed without adequate telecommunications and information technology support. The primary target of hostile cyber activities is precisely the command-information system. Developing an optimal methodology for the use of command-information systems, as well as for prevention and protection against cyber-attacks, is among the most critical tasks for modern defence and security systems. One approach to enhancing risk management is through the application of artificial intelligence (AI). AI should ensure superiority in cyberspace, primarily at the national level, providing the foundation for executing legitimate and lawful cyber activities in a state’s defence system. This paper aims to explore the role and significance of artificial intelligence within the realm of cybersecurity by analyzing its implications for risk management in contemporary environments. Command in modern military operations, the nature of modern warfare risks, the protection of command-information systems, the autonomy of artificial intelligence in decision-making, and an understanding of cyber threats are factors through which the challenges of modern command systems can be understood.
References
Akter, R., Roy, T., & Aktar, R. (2023). The Challenges of Women in Post-disaster Health Manage-ment: A Study in Khulna District. International Journal of Disaster Risk Management, 5(1), 51-66.
Aleksandrina, M., Budiarti, D., Yu, Z., Pasha, F., & Shaw, R. (2019). Governmental Incentivization for SMEs’ Engagement in Disaster Resilience in Southeast Asia. International Journal of Disaster Risk Management, 1(1), 32-50.
Aljundi, I., Rawashdeh, M., Al-Fayoumi, M., Al-Badarneh, A., & Abu Al-Haija, Q. (2023). Protecting critical national infrastructures: An overview of cyber attacks and countermeasures.
Al-ramlawi, A., El-Mougher, M., & Al-Agha, M. (2020). The Role of Al-Shifa Medical Complex Ad-ministration in Evacuation & Sheltering Planning. International Journal of Disaster Risk Management, 2(2), 19-36.
Arreguín-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict. International Se-curity, 26(1), 93–128. http://www.jstor.org/stable/3092079.
Australian Strategic Policy Institute. (2024, March 22). The impact of artificial intelligence on cyber offence and defence. Retrieved March 22, 2024, from https://www.aspistrategist.org.au/the-impact-of-artificial-intelligence-on-cyber-offence-and-defence/.
Bulletin of the Atomic Scientists. (2021, April). Worried about the autonomous weapons of the future? Look at what’s already gone wrong. Retrieved March 17, 2024, from https://thebulletin.org/2021/04/worried-about-the-autonomous-weapons-of-the-future-look-at-whats-already-gone-wrong/.
Center for Strategic and International Studies (CSIS). (n.d.). Cyber operations during the Rus-so-Ukrainian war. Retrieved March 22, 2024, from https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war.
Command and Control: Future C2 Complexity. (n.d.). Retrieved March 22, 2024, from https://assets.publishing.service.gov.uk/media/65c4dde79c5b7f0012951b35/Command_Control_Future_C2_Complexity.pdf.
Cruz, R. D. D., & Ormilla, R. C. G. (2022). Disaster Risk Reduction Management Implementation in the Public Elementary Schools of the Department of Education, Philippines. International Journal of Disaster Risk Management, 4(2), 1-15.
Cvetković, V. & Šišović, V. (2023). Capacity building in Serbia for disaster and climate risk educa-tion. Disaster and Climate Risk Education Insights from Knowledge to Action, edited by: Ayse Yildiz and Rajib Shaw, book series Disaster Risk Reduction, Springer Nature Singapore Pte Ltd., 152 Beach Road.
Cvetković, V. (2019). Risk Perception of Building Fires in Belgrade. International Journal of Disaster Risk Management, 1(1), 81-91.
Cvetković, V. (2024). Empowering the Regional Network of Experts for Disaster Risk Management in the Western Balkans by the Scientific-Professional Society for Disaster Risk Management. Inter-national Scientific and Practical Conference: “International Experience in Emergency Risk Man-agement” in Moscow, Russia.
Cvetković, V. M., Tanasić, J., Ocal, A., Kešetović, Ž., Nikolić, N., & Dragašević, A. (2021). Capacity Development of Local Self-Governments for Disaster Risk Management. International Journal of Environmental Research and Public Health, 18(19), 10406.
Cvetković, V. M., & Šišović, V. (2024). Understanding the Sustainable Development of Community (Social) Disaster Resilience in Serbia: Demographic and Socio-Economic Impacts. Sustainability, 16(7), 2620.
Cvetković, V. M., Renner, R., Aleksova, B., & Lukić, T. (2024). Geospatial and Temporal Patterns of Natural and Man-Made (Technological) Disasters (1900–2024): Insights from Different So-cio-Economic and Demographic Perspectives. Applied Sciences, 14(18), 8129.
Cvetkovic, V. M., & Martinović, J. (2020). Innovative solutions for flood risk management. Interna-tional Journal of Disaster Risk Management, 2(2), 71-100.
Cvetković, V., Andrić, K., Ivanov, A. (2023). Comparative Analysis of Disaster Risk Management Systems in Germany, USA, Russia And China. Macedonia. International academic conference, Temporary security ripples or new world architecture of security, Dojran, N. Macedonia, September 4-7 2023.
Cvetković, V., Čvorović, M., & Beriša, H. (2023a). The Gender Dimension of Vulnerability in Disaster Caused by the Corona Virus (Covid-19). NBP, 28(2), 32-54.
Cvetković, V., Sudar, S., Ivanov, A. (2024). Harmonization of Soft Power and Institutional Skills: Montenegro’s Path to Accession to the European Union in the Environmental Sector. International Journal of Disaster Risk Management, 6(1), 41–74.
DNV. (2024, March 22). Recognizing the seven stages of a cyber attack. Retrieved March 22, 2024, from https://www.dnv.com/cybersecurity/cyber-insights/recognizing-the-seven-stages-of-a-cyber-attack/.
Doktrina Kopnene vojske [Doctrine of the Army]. (2012). Mеdija centar “Odbrana”, Beograd.
El-Mougher, M. M. (2022). Level of coordination between the humanitarian and governmental or-ganizations in Gaza Strip and its impact on the humanitarian interventions to the Internally Dis-placed People (IDPs) following May escalation 2021. International Journal of Disaster Risk Man-agement, 4(2), 15-45.
Fuentes, M. V. (2024, March 22). The future of cyber warfare. Medium. Retrieved March 22, 2024, from https://medium.com/@mikevfuentes/the-future-of-cyber-warfare-1ad1a9a66d0c.
Galán, C. (2018). Amenazas híbridas. Nuevas herramientas para viejas aspiraciones. Elcano Docu-mentos de Trabajo, 20/2018, 3.
Gentile, G., Shurkin, M., Evans, A. T., Grisé, M., Hvizda, M., & Jensen, R. (2021). A history of the Third Offset, 2014–2018. RAND Corporation. https://www.rand.org/pubs/research_reports/RRA454-1.html.
Goyal, N. (2019). Disaster governance and community resilience: The law and the role of SDMAs. International Journal of Disaster Risk Management, 1(2), 61-75.
Grimaila, M. R., & Fortson, L. W. (2007). Towards an information asset-based defensive cyber dam-age assessment process. In Proceedings IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2007).
Grozdanić, G., Cvetković, V. (2024). Exploring Multifaceted Factors Influencing Community Resili-ence to Earthquake-Induced Geohazards: Insights from Montenegro. Belgrade: Scien-tific-professional Society For Disaster Risk Management.
IEMED. (2024, March 22). Artificial intelligence, machine learning, and cyber command as a tool of war: A new method in the Mediterranean battlefield. Retrieved March 22, 2024, from https://www.iemed.org/publication/artificial-intelligence-machine-learning-and-cyber-command-as-a-tool-of-war-a-new-method-in-the-mediterranean-battlefield/.
Johnson, J. (2019). Artificial intelligence & future warfare: Implications for international security. Defense & Security Analysis, 35, 1-23. https://doi.org/10.1080/14751798.2019.1600800.
Johnson, J. (2023). Automating the OODA loop in the age of intelligent machines: Reaffirming the role of humans in command-and-control decision-making in the digital age. Defence Studies, 23(1), 43-67. https://doi.org/10.1080/14702436.2022.2102486.
Jovičić, R., Gostimirović, L., & Milašinović, S. (2024). Use of New Technologies in the Field of Protec-tion and Rescue During Disasters. International Journal of Disaster Risk Management, 6(1), 111–122.
Kachanov, S. (2021). Methodology for Building Automated Systems for Monitoring Engineering (Load-Bearing) Structures, and Natural Hazards to Ensure Comprehensive Safety of Buildings and Constructions. International Journal of Disaster Risk Management (IJDRM), 3(2), 1-10.
Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature re-view and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804.
LibreTexts. (2024, March 22). Types of attacks. Retrieved March 22, 2024, from https://eng.libretexts.org/Courses/Delta_College/Information_Security/01%3A_Information_Security_Defined/1.4_Attacks_-_Types_of_Attacks.
Manjak, M. M., & Miletić, S. M. (2011). Predlog koncepta komandno-informacionog sistema brigade KoV Vojske Srbije. Vojnotehnički glasnik, 59(2), 78-93. https://doi.org/10.5937/vojtehg1102078M.
Mayer, M. (2023). Trusting machine intelligence: Artificial intelligence and human-autonomy teaming in military operations. Defense & Security Analysis, 39(4), 521-538. https://doi.org/10.1080/14751798.2023.2264070.
Meerveld, H. W., Lindelauf, R. H. A., Postma, E. O., et al. (2023). The irresponsibility of not using AI in the military. Ethics and Information Technology, 25, 14. https://doi.org/10.1007/s10676-023-09683-0.
Military Africa. (2023, November). Artificial intelligence in the military. Retrieved March 22, 2024, from https://www.military.africa/2023/11/artificial-intelligence-in-the-military/.
Musman, S., Temin, A., Tanner, M., Fox, D., & Pridemore, B. (2010). Evaluating the impact of cyber attacks on missions.
Nedejkovic, S. (2015). Evropska strategija bezbednosti i sajber pretnje – znala za Srbiju. Beograd: Voјno delo. https://doi.org/10.5937/vojdelo.
Nikolić, N., Cvetković, V., Ivanov, A. (2023). Human resource management in environmental secu-rity. Belgrade: Scientific-Professional Society for Disaster Risk Management.
Ostojić, M., Karavidic, Z., & Projovic, D. (2017). Uticaj doktrine i koncepata na razvoj sposobnosti Vojske Srbije. Vojno delo, 69, 321-340. https://doi.org/10.5937/vojdelo17083210.
Payne, K. (2018). Artificial intelligence: A revolution in strategic affairs? Survival, 60(5), 7-32. https://doi.org/10.1080/00396338.2018.1518374.
Pirani Risk. (2024, March 16). Artificial intelligence to combat cyber attacks. Retrieved March 16, 2024, from https://www.piranirisk.com/blog/artificial-intelligence-to-combat-cyber-attacks.
RAND Corporation. (2022, November). Ukraine’s lessons for the future of hybrid warfare. Retrieved March 16, 2024, from https://www.rand.org/pubs/commentary/2022/11/ukraines-lessons-for-the-future-of-hybrid-warfare.html.
RAND Corporation. (n.d.). Reprints: RP223. Retrieved March 22, 2024, from https://www.rand.org/pubs/reprints/RP223.html.
Sanz-Caballero, S. (2023). The concepts and laws applicable to hybrid threats, with a special focus on Europe. Humanities and Social Sciences Communications, 10, 360. https://doi.org/10.1057/s41599-023-01864-y.
Scharre, P. (2016). Assessing and managing the risks of autonomous weapons. In Autonomous Weap-ons and Operational Risk: Ethical Autonomy Project (pp. 49–52). Center for a New American Security. http://www.jstor.org/stable/resrep06321.12.
Schraagen, J. M. (2023). Responsible use of AI in military systems: Prospects and challenges. Ergo-nomics, 66, 10.1080/00140139.2023.2278394.
SDI. (2024). The most useful military applications of AI. Retrieved March 22, 2024, from https://sdi.ai/blog/the-most-useful-military-applications-of-ai/#:~:text=Generative%20AI’s%20analysis%2C%20scenario%20generation,to%20help%20predict%20future%20attacks.
Singh, S., Singh, M., & Singh, D. (2011). A survey on network security and attack defense mechanism for wireless sensor networks. 1.
U.S. Department of Defense. (n.d.). Joint Publication (JP) 3-12, Joint Cyberspace Operations. Retrieved March 21, 2024, from https://irp.fas.org/doddir/dod/jp3_12.pdf.
U.S. Government Accountability Office (GAO). (n.d.). U.S. less prepared to fight cybercrime than it could be. Retrieved March 22, 2024, from https://www.gao.gov/blog/u.s.-less-prepared-fight-cybercrime-it-could-be.
Usai, A., Fiano, F., Messeni Petruzzelli, A., Paoloni, P., Farina Briamonte, M., & Orlando, B. (2021). Unveiling the impact of the adoption of digital technologies on firms’ innovation performance. Journal of Business Research, 133, 327-336.
Vuletić, D. (2017). Upotreba sajber prostora u kontekstu hibridnog ratovanja. Beograd: Voјno delo. https://doi.org/10.5937/vojdelo1707308V.
Weick, K. E., & Sutcliffe, K. M. (2015). Managing the unexpected: Sustained performance in a complex world (3rd ed.). Jossey-Bass.
Downloads
Published
2024-12-25
How to Cite
Beriša, H., Cvetković, V., & Pavić, A. (2024). Implications of Artificial Intelligence and Cyberspace on Risk Management Capabilities. International Journal of Disaster Risk Management, 6(2), 279–295. https://doi.org/10.18485/ijdrm.2024.6.2.18More Citation Formats
Issue
Vol. 6 No. 2 (2024): International Journal of Disaster Risk Management (IJDRM)
Section
Articles
License
Copyright (c) 2024 International Journal of Disaster Risk Management
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
International Journal of Disaster Risk Management (IJDRM) allows authors to deposit publisher’s version/PDF in an institutional repository, research gate, Academia.edu, and non-commercial subject-based repositories, or to publish it on Author’s personal website (including social networking sites) and/or departmental website, at any time after publication in compliance with the Creative Commons Attribution-NonCommercial – NoDerrivatives 4.0 (https://creativecommons.org/licenses/by-nc-nd/4.0/). The Publisher’s copyright and source must be acknowledged and a link must be made to the article’s DOI (HTML link).
Most read articles by the same author(s)
- Vladimir M. Cvetković, Saša Romanić, Hatidža Beriša, Religion Influence on Disaster Risk Reduction: A case study of Serbia , International Journal of Disaster Risk Management: Vol. 5 No. 1 (2023): International Journal of Disaster Risk Management (IJDRM)
- Nikola Vidović, Vladimir M. Cvetković, Hatidža Beriša, Optimising Disaster Resilience Through Advanced Risk Management and Financial Analysis of Critical Infrastructure in the Serbian Defence Industry , International Journal of Disaster Risk Management: Vol. 6 No. 2 (2024): International Journal of Disaster Risk Management (IJDRM)