Araştırma Makalesi
BibTex RIS Kaynak Göster

The concept of smartwar: A theoretical framework

Yıl 2024, Sayı: 13, 35 - 57, 30.06.2024

Öz

With the exponential developments in information technologies “Smart” as a one-size-fits-all has bocome a popular term nowadays in literature and media. Smartphones, smart watches, smart devices, smart technology, smart weapons, and smart war… Besides, these developments have given rise to the debate as “Has the concept of war been changed?”, “What does smart war mean to humanity?”, “What are the benefits and risks of artificial intelligence-based technology in warfare”, “What is the type of war humankind experiences today?”, “Has the dynamics of war changed?”, etc. Hence, the advances in technology have started to influence the nature of war. Although the term “smart war” become popular, it is realized that a few studies have been conducted on this concept. There are many studies on artificial intelligence in warfare, electronic warfare, autonomous weapon systems, drones, smart weapons, unmanned aerial vehicles (UAVs), robot soldiers, etc. but a gap in the literature is the lack of a comprehensive work that examines the similarities of the conflicts in terms of strategies, weapons, and actors in the age of IT. This study is conducted to fill this gap in the literature. The purpose of this study is to examine modern conflicts that arise with the exponential developments in IT and put forward a theoretical framework that explains the smart war concept. For this purpose, the answer to the research question “How can the smart war concept be defined?” was examined by adopting an exploratory approach and following grounded theory methodology. As a result, a theoretical framework that explains the smart war concept in four dimensions -antecedents, actors, technologies, and strategies introduced. Further, the framework was evaluated through real-world cases of conflict.

Kaynakça

  • Ackoff, R.(1989). From data to wisdom. Journal of Applied Systems Analysis,16(1), 3-9.
  • Akcan, E. (2015). The “Occupy” Turn in the global city paradigm: The architecture of AK Party’s Istanbul and Gezi Movement.” Journal of the Ottoman and Turkish Studies Association 2(2), 359–378.
  • Akçay, N. (2020, Aug 18). ABD-Çin mücadelesinin arka planı: Teknoloji savaşları. Retrieved May 15, 2023, from https://www.indyturk.com/node/228641/t%C3%BCrkiyeden-sesler/abd-%C3%A7inm%C3%BCcadelesinin-arka-plan%C4%B1-teknoloji-sava%C5%9Flar%C4%B1
  • Alibaba (2023, Apr 11). Alibaba cloud unveils new AI model to support enterprises’ intelligence transformation. Retrieved May 15, 2023 fromhttps://www.alibabagroup.com/en-US/document1582482069362049024
  • Alvarez-Junco, M.(2022). “smart war? .” [LinkedIn Post]Retrieved May 15, 2023 from https://www.linkedin.com/posts/manuel-alvarez-junco-6b57201a_smart-war-activity-6904709108692566016-1TXI/
  • Andrews, C. (2012). Smart warfare. Engineering & Technology,7(6), 56-59.
  • Anonymous Hackers (2023). Is Anonymous a group of hackers? [Blog post]Retrieved Aug 15, 2023 from https://www.anonymoushackers.net/anonymous-news/is-anonymous-a-group-of-hackers/
  • Arkin, W. M. (1999). In praise of heavy bombs. The Bulletin of the Atomic Scientists, 55(4): 80.
  • Aytekin, E. (2022, Dec 26). Çin, 2022'de ABD'nin ‘çip savaşının’ etkilerini hissetti [Press Release] Retrieved May 15, 2023 from https://www.aa.com.tr/tr/dunya/cin-2022de-abdnin-cip-savasinin-etkilerinihissetti/2772866
  • Baban, E. & Güzel, E. (2015). Digital activism and social movements: How the World perceives the Gezi Movement. Amity Journal of Media and Communication Studies 5(1-2), 16-26.
  • BBC (2023, May 31). 10. yılında Gezi Parkı eylemleri: Gün gün neler yaşandı? [Press Release]. Retrieved Aug15, 2023 from https://www.bbc.com/turkce/articles/cv21rz7lykdo
  • Biography (2019). Edward Snowden. Biography. Retrieved Aug15, 2023 from https://www.biography.com/activists/edward-snowden
  • Blomquist, K. (2022). In Pursuit of (Soft) Power: Chinese artificial intelligence governance in an age of great power competition (Master’s thesis). University of Oxford, Oxford.
  • Bourgeois, D.T., Smith, J.L., Wang, S. and Mortati, J. (2019). Information Systems for Business and Beyond. Open Text Books.
  • Chang, E. Y. (2023). LLM Debate on the Middle East Conflict: Is it resolvable? Technical report, Stanford: Stanford University Infolab. Retrieved Nov 15, 2023 from https://www.researchgate.net/publication/374556828_LLM_Debate_on_the_Middle_East_Conflict_Is_It_Resolvable
  • Cıvaoğlu, G. (2022, Jan 15). Yeşiladamlar [Press Release] Retrieved Aug 15, 2023 fromhttps://www.milliyet.com.tr/yazarlar/guneri-civaoglu/yesil-adamlar-6681391 Cybervie. (2023). The Anonymous Hacker's Grup [Blog post] Retrieved Nov 15, 2023 from https://www.cybervie.com/blog/theanonymous-hackers-group/
  • Çavuş, S. & Öztürk, M. (2021). Kovid-19’un ABD-Çin ilişkilerine etkisini Trump’ın Twitter’daki hakikat ötesi siyaseti üzerinden okumak. Gümüşhane Üniversitesi Sosyal Bilimler Dergisi,12(2), 389-403.
  • Daylight, E. G. (2015). Towards a historical notion of ‘Turing-the father of computer science’. History and Philosophy of Logic, 36(3), 205-228.
  • DoD. (2023). DoD Cyber workforce strategy implementation plan 2023-2027. Department of Defence Office of Republication and Security Review. Retrieved October 17, 2023 from https://media.defense.gov/2023/Aug/03/2003274088/-1/-1/1/2023-2027-DOD-CYBER-WORKFORCE-STRATEGY-IMPLEMENTATION-PLAN.PDF
  • Euronews (2021, Jan 10). Twitter, Çin'in ABD Büyükelçiliği'nin Uygur kadınlarına yönelik paylaşımını kaldırdı [Press Release] Retrieved May 15, 2023 from https://tr.euronews.com/2021/01/10/twitter-cin-in-abd-buyukelciligi-nin-uygur-kadinlarina-yonelik-paylasimini-kaldirdi
  • Farris, K. (2000). Chinese views on information warfare. Defense Intelligence Journal,10(1), 38.
  • FBI (2023). The Unabomber. Retrieved Nov 15, 2023 from https://www.fbi.gov/history/famous-cases/unabomber
  • Fowler, J. (2023). Hacker group Anonymous and others targeting Russian data [blog post] Retrieved Jan 10, 2024 from https://www.websiteplanet.com/blog/cyberwarfare-ukraine-anonymous/
  • Gambetti, Z. (2014). Occupy Gezi as politics of the body. In Umut Özkırımlı (Ed.) The Making of a Protest Movement in Turkey: #Occupygezi (pp. 89-102). Palgrave-Pivot.
  • Gierow, H.J.J.(2015). Cyber Security in China: Internet Security, Protectionism and Competitiveness: New Challenges to Western Businesses. China Monitor, (22), Retrieved Aug 15, 2023 from https://merics.org/sites/default/files/2020-05/150407_MERICS%20China%20Monitor%2022_en.pdf
  • Glaser, B. and Strauss A.L. (2017). Grounded theory: the discovery of grounded theory. New York, Routledge.
  • Goldstine, H H. & Goldstine, A.(1946). The electronic numerical integrator and computer (ENIAC). Mathematical Tables and Other Aids to Computation,2(15), 97-110.
  • Günyol, A.& Yılmaz, E. (2023, Aug 8). Çip çekişmesinde Çin'den yeni hamle. [Press Release] Retrieved Nov 15, 2023 from https://www.aa.com.tr/tr/dunya/cip-cekismesinde-cinden-yeni-hamle/2963421
  • History.com (2020). The space race. history.com. Retrieved Aug 15, 2023 from https://www.history.com/topics/cold-war/space-race
  • Hocaoğlu, M.F.&Genç, İ. (2019). Smart combat simulations in terms of industry 4.0. In M. Gunal (Ed.), Simulation for industry 4.0 (pp. 247-273), Springer, Cham.
  • Hodge, C.C. (2000) Casual war: NATO's intervention in Kosovo. Ethics & International Affairs 14, 39-54.
  • Hoffman, F.G. (2009). Hybrid warfare and challenges. JFQ, 52, 34-48. Retrieved May 15, 2023 from https://apps.dtic.mil/sti/pdfs/ADA516871.pdf
  • Holpuch, A. (2023, Jul 25). TikTok introduces text-only posts [Press Release]. Retrieved Nov 15, 2023 from https://www.nytimes.com/2023/07/25/technology/tiktok-text-posts.html
  • Huddleston, Jr., T. (2022, Mar 25). 4chan trolling to launching cyberattacks on Russia [Press Release] Retrieved May 15, 2023 from https://www.cnbc.com/2022/03/25/what-is-anonymous-the-group-went-from-4chan-to-cyberattacks-on-russia.html
  • IMDb (2014). Citizenfour. Retrieved May 15, 2023 from https://www.imdb.com/title/tt4044364/
  • IMDb (2016). Snowden. Retrieved May 15, 2023 from https://www.imdb.com/title/tt3774114/
  • IMDb (2017). Manhunt: Unabomber. Retrieved May 15, 2023 from https://www.imdb.com/video/vi2297083929/?playlistId=tt5618256&ref_=tt_ov_vi
  • Imran, L. B., Farhan, M., Latif, RMA. & Rafiq, A. (2018). Design of an IoT based warfare car robot using sensor network connectivity. ICFNDS'18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. Amman, Jordan: Assoc Comp Machinery.
  • Josan, A. & Voicu, C.(2015). Hybrid wars in the age of asymmetric conflicts. Review of the Air Force Academy 1(28), 49-52.
  • Kacynski, T. J. (2023). The Unabomber manifesto: industrial society and its future. BoD-Books on Demand.
  • Kacynski, T.J. (2009). Letter to a Turkish anarchist. The Anarchist Library. Retrieved May 25, 2023 fromhttps://theanarchistlibrary.org/library/ted-kaczynski-letter-to-a-turkish-anarchist
  • Kemaloğlu, İ. (2016). 21. Yüzyılın başında Rusya Federasyonu. Marmara Türkiyat Araştırmaları,3(2): 1-14.
  • Kharpal, A. (2023, Jun 1). Alibaba begins rollout of its ChatGPT-style tech as China AI race heats up [Press Release]. Retrieved Nov 15, 2023 from https://www.cnbc.com/2023/06/01/alibaba-rolls-out-chatgpt-style-tech-as-china-ai-race-heats-up.html
  • Kiss, P.A. (2014). Winning wars amongst the people: case studies in asymmetric conflict. University of Nebraska Press.
  • Konak, A. (2019). Kırım’ınilhakıilesonuçlananukraynakriziveekonomiketkileri.Uluslararası AfroAvrasyaAraştırmalarıDergisi,4(8), 80-93.
  • Laudon, Kenneth C, & Jane P Laudon (2022).Management information systems: managing the digital firm (Global Edition). 17. Pearson Education Limited.
  • Lukasik, S.J. (2011). Why the Arpanet was built. IEEE Annals of the History of Computing,33(3), 4-21.
  • McCarthy, J, Minsky, ML., Rochester, N. and Shannon, C.E. (2006). A proposal for the Dartmouth summer research project on artificial intelligence, August 31, 1955. AI Magazine,27(4), 12- 14.
  • MNSBC (2022). Hacker group Anonymous declares 'cyber war' on Putin's Russia [Video] Retrieved May 15, 2023 from https://www.youtube.com/watch?v=gkrDIjGP4_w
  • Moor, J. (2006). The Dartmouth College artificial intelligence conference: The next fifty years. AI Magazine,27(4), 87-91.
  • Moore, M. (2021, Jul 8). White House Brushes off Deleted Taiwan Tweet as an ‘Honest Mistake’ [Press Release].Retrieved May 15, 2023 from https://nypost.com/2021/07/08/white-house-calls-deleted-taiwan-tweet-an-honest-mistake/
  • Murphy, M. (2023, Jun 10). Unabomber Ted Kaczynski found dead in US prison cell [Press release] Retrieved Nov 15, 2023 fromhttps://www.bbc.com/news/world-us-canada-65867291
  • National Science Foundation (2023). Chips and Science. National Science Foundation. Retrieved Dec 15, 2023 from https://new.nsf.gov/chips#what
  • Netflix (2017). Manhunt: Unabomber. Retrieved May 15, 2023 from https://www.netflix.com/tr/title/80176878
  • Netflix (2018). Unabomber - In his own words. Netflix. Retrieved May 15, 2023 from https://www.netflix.com/tr/title/81002216
  • Nye, J.S. (2009). Get smart: combining hard and soft power. Foreign Affairs,88(4), 160-163. Normand, R. (2001). Sanctions against Iraq: Is it genocide? Guild Prac. 58, 27.
  • Nye, J.S. (2019). Soft power and public diplomacy revisited. The Hague Journal of Diplomacy,14, 7-20.
  • Nye, J.S. (2023). State smart power strategies. In Soft power and great-power competition: China and globalisation (pp.21-28). Singapore: Springer.
  • Oktay, M. (2023, Aug 4). Pentagon: Siber altyapımızı güçlendirecek yeni bir program başlattık. [Press Release]. Retrieved Nov 15, 2023, from https://www.aa.com.tr/tr/dunya/pentagon-siber-altyapimizi-guclendirecekyeni-bir-program-baslattik/2961001
  • OpenAI (2022, Nov 30). Introducing ChatGPT [Blog post]. Retrieved May 15, 2023 from https://openai.com/blog/chatgpt
  • Pathak, A.D., Saran, D., Mishra, S., Hitesh, M.,Bathula, S. & Sahu, K.K.(2021). Smart war on COVID-19 and global pandemics. In Chhabi Rani Panigrahi, BibudhenduPati, MamataRath, RajkumarBuyya (Eds.) Computational Modeling And Data Analysisin COVID-19 Research (p.28), CRC Press.
  • Perry, D.G., Blumenthal, S.H.&Hinden, RM.(1988). The ARPANET and the DARPA Internet. Library Hi Tech, 6(2), 51-62.
  • Pitrelli, M. (2022, Jul 29). Hacktivist group Anonymous is using six top techniques to ‘embarrass’ Russia [Press Release]. Retrieved from May 15, 2023 from https://www.cnbc.com/2022/07/28/how-is-anonymous-attacking-russia-the-top-six-ways-ranked-.html
  • Preußger, P. (2023, Apr 3). Visions of a smart war? image and ethics of autonomous weapon systems [Blog post], Retrieved Aug 26, 2023 from Philipp Preußger // Visions of a Smart War? Image and Ethics of Autonomous Weapon Systems — SchauflerLab@TU Dresden — TU Dresden (tu-dresden.de).
  • Qi, H. (2021). Smart’ warfare and China–U.S. stability: strengths, myths, and risks China International Strategy Review, (3), 278–299.
  • Ray, M. (2023a). Edward Snowden.Retrieved Dec 25, 2023 from https://www.britannica.com/biography/Edward-Snowden.
  • Ray, M. (2023b). Ted Kaczynski. Britannica Retrieved Dec 25, 2023 from https://www.britannica.com/biography/Ted-Kaczynski
  • Renz, B. (2016). Russia and ‘Hybrid Warfare’. Contemporary Politics, 22(3), 283-300.
  • Robinson, A. (2014, Oct 18). The enduring enigma of Alan Turing. Retrieved Jul 18, 2023 from https://www.thelancet.com/action/showPdf?pii=S0140-6736%2814%2961854-7
  • Rosenberg, P. (2013, Sep 10). Obama’s error: Getting beyond the ‘smart war’ syndrome. Retrieved Jun 27, 2023 from https://www.aljazeera.com/opinions/2013/9/10/obamas-error-getting-beyond-the-smart-war-syndrome
  • Rowe, J. C. (1991). The "Vietnam Effect" in the Persian Gulf War. Cultural Critique Autumn, (19), 121-139.
  • Sample, I. (2003). US Gambles on a 'smart' war - the military is relying on precision weapons to both win the war in Iraq and help prevent politically damning civilian casualties. But the technology is far from fail-safe. New Scientist, 177(2387), 6-7.
  • Schneider, G.P. (2017). Electronic commerce. Boston: Cengage Learning.
  • SCIO (2022). Jointly Build a community with a shared future in cyberspace—the State Council Information Office of the People's Republic of China. Retrieved May 15, 2023 from http://english.scio.gov.cn/node_8033411.html
  • Sezgin, F. (2014). Edward Snowden olayı’nın ABD-Rusya ilişkileri üzerindeki etkisi. Uluslararası Yönetim ve Sosyal Araştırmalar Dergisi,1(1): 24-31.
  • Simons, A. (2012, Apr 27). Soft war = Smart war? Think again. Retrieved May 15, 2023 from https://www.fpri.org/article/2012/04/soft-war-smart-war-think-again/
  • Singh, K., and Kalia, S. (2020, Jul 7). Pompeo says U.S. looking at banning Chinese social media apps, including TikTok [Press Release]Retrieved May 15, 2023 from https://www.reuters.com/article/us-usatiktok-china-pompeo-idUSKBN2480DF
  • Schmitt, M.N. (1999). The principle of discrimination in 21st-century warfare. Yale Human Rights and Development Journal,2(1), 143-182.
  • Swaine, M.D. (2013). Chinese Views on cybersecurity in foreign relations. China Leadership Monitor, no. 42. Retrieved May 15, 2023 from https://carnegieendowment.org/files/CLM42MS.pdf
  • The Guardian (2023, Feb 23). Edward Snowden documentary citizen four wins oscar. Retrieved May 15, 2023 fromhttps://www.theguardian.com/film/2015/feb/23/edward-snowden-documentary-citizenfour-wins-oscar
  • The White House (2023). National cybersecurity strategy. Washington. Retrieved May 15, 2023 from https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
  • Thornton, R. (2007). Asymmetric warfare: threat and response in the twenty-first century. Polity.
  • Turing, A.M. (1937). On computable numbers, with an application to the Entscheidungsproblem. Proc. Lond. Math. Soc. 42(2), 230-265.
  • Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59(236), 433-460.
  • Turing, A.M. (1937). On computable numbers, with an application to the Entscheidungsproblem. Proc. Lond. Math. Soc,.42(2), 230-265.
  • Tüysüzoğlu, G. (2013, Jul 16). Post-modern bir casusluk hikayesinin kahramanı: Edward Snowden [Blog post]. Retrieved May 15, 2023 from https://www.tuicakademi.org/post-modern-bir-casusluk-hikayesinin-kahramani-edward-snowden/
  • Tzu, S. (1963). The Art of War (Translated by Samuel B Griffith). USA: Oxford University Press. University of Oxford (2021, May 11). Fanatic fans or fake followers? Chinese diplomats and their social media networks. Retrieved May 15, 2023 from https://www.ox.ac.uk/news/2021-05-11-fanatic-fans-or-fake-followers-chinese-diplomats-and-their-social-media-networks
  • Vatikiotis, P.&Yörük, ZF. (2016). Gezi movement and the networked public sphere: A comparative analysis in global context. Social Media + Society, July-September, 1-12.
  • Warden, J. (2008). War modeling & simulation. Let's start at the end - a very good place to start. Venturist. Retrieved May 15, 2023 from https://apps.dtic.mil/sti/citations/ADA501007
  • Warren, D.C. (2017). Ted Kaczynski: evil or insane? The Cupola. Retrieved May 15, 2023 from https://cupola.gettysburg.edu/cgi/viewcontent.cgi?article=1650&context=student_scholarship
  • Weik, M.H. (1961). The ENIAC Story. Ordnance,45(244), 571-575.
  • Wither, J.K. (2016). Making Sense of Hybrid Warfare. Connections: The Quarterly Journal,15(2), 73-87.
  • Wolfswinkel, JF, Furtmueller, E. & Wilderom, CPM. (2011). Using grounded theory as a method for rigorously reviewing literature. European Journal of Information Systems,22(1), 45-55.
  • Yan, G. (2020). The impact of artificial intelligence on hybrid warfare. Small Wars & Insurgencies, 31(4), 898-917.
  • Yeon-Bong, J. (2019). A Study on Implications of U. S. Army Revolution in Military Affairs(RMA) to ROK Army RMA. 군사연구, 147, 285-314. Retrieved May 15, 2023 from https://www.dbpia.co.kr/Journal/articleDetail?nodeId=NODE09239789.
  • Yıldızoğlu, E. (2020, Jul 14). ABD ve Çin arasındaki 'yeni soğuk savaş' dünya için ne kadar büyük bir risk? Retrieved May 15, 2023 from https://www.bbc.com/turkce/haberler-dunya-53404403.
  • Zhu, Z. (2020, May 15). Interpreting China’s ‘wolf-warrior diplomacy’. Retrieved May 15, 2023 fromhttps://thediplomat.com/2020/05/interpreting-chinas-wolf-warrior-diplomacy/

Akıllı savaş kavramı: Teorik bir çerçeve

Yıl 2024, Sayı: 13, 35 - 57, 30.06.2024

Öz

Bilgi teknolojilerinde yaşanan üstel gelişmelerle birlikte "akıllı" kelimesi günümüzde literatürde ve medyada popüler bir terim haline gelmiştir. Akıllı telefonlar, akıllı saatler, akıllı cihazlar, akıllı teknoloji, akıllı silahlar ve akıllı savaş... Ayrıca bu gelişmeler "Savaş kavramı değişti mi?", "Akıllı savaş insanlık için ne anlama geliyor?", "Savaşta yapay zeka temelli teknolojinin faydaları ve riskleri nelerdir?", "İnsanlığın bugün deneyimlediği savaş türü nedir?", "Savaşın dinamikleri değişti mi?" gibi tartışmalara da yol açmıştır.Dolayısıyla, teknolojideki ilerlemeler savaşın doğasını da etkilemeye başlamıştır. "Akıllı savaş" terimi popüler hale gelse de bu kavram üzerine çok az çalışma yapıldığı görülmektedir. Savaşta yapay zeka, elektronik savaş, otonom silah sistemleri, insansız hava araçları (İHA), akıllı silahlar, robot askerler vb. konularda pek çok çalışma bulunmakla birlikte, bilişim çağında çatışmaların strateji, silah ve aktörler açısından benzerliklerini inceleyen kapsamlı bir çalışmanın bulunmaması literatürde bir boşluk olarak belirlenmiştir. Bu çalışma, literatürdeki bu boşluğu doldurmak için yapılmıştır. Bu çalışmanın amacı, bilişim teknolojilerindeki üstel gelişmelerle birlikte ortaya çıkan modern çatışmaları incelemek ve akıllı savaş kavramını açıklayan teorik bir çerçeve ortaya koymaktır. Bu amaçla, "Akıllı savaş kavramı nasıl tanımlanabilir?" araştırma sorusunun cevabı keşifsel bir yaklaşım benimsenerek ve gömülü teori metodolojisi izlenerek incelenmiştir. Sonuç olarak akıllı savaş konseptini dört boyutta açıklayan teorik bir çerçeve ortaya konulmuştur: Öncüller, aktörler, teknolojiler ve stratejiler. Ayrıca, geliştirilen çerçeve, gerçek dünyadaki çatışma vakaları üzerinden değerlendirilmiştir.

Kaynakça

  • Ackoff, R.(1989). From data to wisdom. Journal of Applied Systems Analysis,16(1), 3-9.
  • Akcan, E. (2015). The “Occupy” Turn in the global city paradigm: The architecture of AK Party’s Istanbul and Gezi Movement.” Journal of the Ottoman and Turkish Studies Association 2(2), 359–378.
  • Akçay, N. (2020, Aug 18). ABD-Çin mücadelesinin arka planı: Teknoloji savaşları. Retrieved May 15, 2023, from https://www.indyturk.com/node/228641/t%C3%BCrkiyeden-sesler/abd-%C3%A7inm%C3%BCcadelesinin-arka-plan%C4%B1-teknoloji-sava%C5%9Flar%C4%B1
  • Alibaba (2023, Apr 11). Alibaba cloud unveils new AI model to support enterprises’ intelligence transformation. Retrieved May 15, 2023 fromhttps://www.alibabagroup.com/en-US/document1582482069362049024
  • Alvarez-Junco, M.(2022). “smart war? .” [LinkedIn Post]Retrieved May 15, 2023 from https://www.linkedin.com/posts/manuel-alvarez-junco-6b57201a_smart-war-activity-6904709108692566016-1TXI/
  • Andrews, C. (2012). Smart warfare. Engineering & Technology,7(6), 56-59.
  • Anonymous Hackers (2023). Is Anonymous a group of hackers? [Blog post]Retrieved Aug 15, 2023 from https://www.anonymoushackers.net/anonymous-news/is-anonymous-a-group-of-hackers/
  • Arkin, W. M. (1999). In praise of heavy bombs. The Bulletin of the Atomic Scientists, 55(4): 80.
  • Aytekin, E. (2022, Dec 26). Çin, 2022'de ABD'nin ‘çip savaşının’ etkilerini hissetti [Press Release] Retrieved May 15, 2023 from https://www.aa.com.tr/tr/dunya/cin-2022de-abdnin-cip-savasinin-etkilerinihissetti/2772866
  • Baban, E. & Güzel, E. (2015). Digital activism and social movements: How the World perceives the Gezi Movement. Amity Journal of Media and Communication Studies 5(1-2), 16-26.
  • BBC (2023, May 31). 10. yılında Gezi Parkı eylemleri: Gün gün neler yaşandı? [Press Release]. Retrieved Aug15, 2023 from https://www.bbc.com/turkce/articles/cv21rz7lykdo
  • Biography (2019). Edward Snowden. Biography. Retrieved Aug15, 2023 from https://www.biography.com/activists/edward-snowden
  • Blomquist, K. (2022). In Pursuit of (Soft) Power: Chinese artificial intelligence governance in an age of great power competition (Master’s thesis). University of Oxford, Oxford.
  • Bourgeois, D.T., Smith, J.L., Wang, S. and Mortati, J. (2019). Information Systems for Business and Beyond. Open Text Books.
  • Chang, E. Y. (2023). LLM Debate on the Middle East Conflict: Is it resolvable? Technical report, Stanford: Stanford University Infolab. Retrieved Nov 15, 2023 from https://www.researchgate.net/publication/374556828_LLM_Debate_on_the_Middle_East_Conflict_Is_It_Resolvable
  • Cıvaoğlu, G. (2022, Jan 15). Yeşiladamlar [Press Release] Retrieved Aug 15, 2023 fromhttps://www.milliyet.com.tr/yazarlar/guneri-civaoglu/yesil-adamlar-6681391 Cybervie. (2023). The Anonymous Hacker's Grup [Blog post] Retrieved Nov 15, 2023 from https://www.cybervie.com/blog/theanonymous-hackers-group/
  • Çavuş, S. & Öztürk, M. (2021). Kovid-19’un ABD-Çin ilişkilerine etkisini Trump’ın Twitter’daki hakikat ötesi siyaseti üzerinden okumak. Gümüşhane Üniversitesi Sosyal Bilimler Dergisi,12(2), 389-403.
  • Daylight, E. G. (2015). Towards a historical notion of ‘Turing-the father of computer science’. History and Philosophy of Logic, 36(3), 205-228.
  • DoD. (2023). DoD Cyber workforce strategy implementation plan 2023-2027. Department of Defence Office of Republication and Security Review. Retrieved October 17, 2023 from https://media.defense.gov/2023/Aug/03/2003274088/-1/-1/1/2023-2027-DOD-CYBER-WORKFORCE-STRATEGY-IMPLEMENTATION-PLAN.PDF
  • Euronews (2021, Jan 10). Twitter, Çin'in ABD Büyükelçiliği'nin Uygur kadınlarına yönelik paylaşımını kaldırdı [Press Release] Retrieved May 15, 2023 from https://tr.euronews.com/2021/01/10/twitter-cin-in-abd-buyukelciligi-nin-uygur-kadinlarina-yonelik-paylasimini-kaldirdi
  • Farris, K. (2000). Chinese views on information warfare. Defense Intelligence Journal,10(1), 38.
  • FBI (2023). The Unabomber. Retrieved Nov 15, 2023 from https://www.fbi.gov/history/famous-cases/unabomber
  • Fowler, J. (2023). Hacker group Anonymous and others targeting Russian data [blog post] Retrieved Jan 10, 2024 from https://www.websiteplanet.com/blog/cyberwarfare-ukraine-anonymous/
  • Gambetti, Z. (2014). Occupy Gezi as politics of the body. In Umut Özkırımlı (Ed.) The Making of a Protest Movement in Turkey: #Occupygezi (pp. 89-102). Palgrave-Pivot.
  • Gierow, H.J.J.(2015). Cyber Security in China: Internet Security, Protectionism and Competitiveness: New Challenges to Western Businesses. China Monitor, (22), Retrieved Aug 15, 2023 from https://merics.org/sites/default/files/2020-05/150407_MERICS%20China%20Monitor%2022_en.pdf
  • Glaser, B. and Strauss A.L. (2017). Grounded theory: the discovery of grounded theory. New York, Routledge.
  • Goldstine, H H. & Goldstine, A.(1946). The electronic numerical integrator and computer (ENIAC). Mathematical Tables and Other Aids to Computation,2(15), 97-110.
  • Günyol, A.& Yılmaz, E. (2023, Aug 8). Çip çekişmesinde Çin'den yeni hamle. [Press Release] Retrieved Nov 15, 2023 from https://www.aa.com.tr/tr/dunya/cip-cekismesinde-cinden-yeni-hamle/2963421
  • History.com (2020). The space race. history.com. Retrieved Aug 15, 2023 from https://www.history.com/topics/cold-war/space-race
  • Hocaoğlu, M.F.&Genç, İ. (2019). Smart combat simulations in terms of industry 4.0. In M. Gunal (Ed.), Simulation for industry 4.0 (pp. 247-273), Springer, Cham.
  • Hodge, C.C. (2000) Casual war: NATO's intervention in Kosovo. Ethics & International Affairs 14, 39-54.
  • Hoffman, F.G. (2009). Hybrid warfare and challenges. JFQ, 52, 34-48. Retrieved May 15, 2023 from https://apps.dtic.mil/sti/pdfs/ADA516871.pdf
  • Holpuch, A. (2023, Jul 25). TikTok introduces text-only posts [Press Release]. Retrieved Nov 15, 2023 from https://www.nytimes.com/2023/07/25/technology/tiktok-text-posts.html
  • Huddleston, Jr., T. (2022, Mar 25). 4chan trolling to launching cyberattacks on Russia [Press Release] Retrieved May 15, 2023 from https://www.cnbc.com/2022/03/25/what-is-anonymous-the-group-went-from-4chan-to-cyberattacks-on-russia.html
  • IMDb (2014). Citizenfour. Retrieved May 15, 2023 from https://www.imdb.com/title/tt4044364/
  • IMDb (2016). Snowden. Retrieved May 15, 2023 from https://www.imdb.com/title/tt3774114/
  • IMDb (2017). Manhunt: Unabomber. Retrieved May 15, 2023 from https://www.imdb.com/video/vi2297083929/?playlistId=tt5618256&ref_=tt_ov_vi
  • Imran, L. B., Farhan, M., Latif, RMA. & Rafiq, A. (2018). Design of an IoT based warfare car robot using sensor network connectivity. ICFNDS'18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. Amman, Jordan: Assoc Comp Machinery.
  • Josan, A. & Voicu, C.(2015). Hybrid wars in the age of asymmetric conflicts. Review of the Air Force Academy 1(28), 49-52.
  • Kacynski, T. J. (2023). The Unabomber manifesto: industrial society and its future. BoD-Books on Demand.
  • Kacynski, T.J. (2009). Letter to a Turkish anarchist. The Anarchist Library. Retrieved May 25, 2023 fromhttps://theanarchistlibrary.org/library/ted-kaczynski-letter-to-a-turkish-anarchist
  • Kemaloğlu, İ. (2016). 21. Yüzyılın başında Rusya Federasyonu. Marmara Türkiyat Araştırmaları,3(2): 1-14.
  • Kharpal, A. (2023, Jun 1). Alibaba begins rollout of its ChatGPT-style tech as China AI race heats up [Press Release]. Retrieved Nov 15, 2023 from https://www.cnbc.com/2023/06/01/alibaba-rolls-out-chatgpt-style-tech-as-china-ai-race-heats-up.html
  • Kiss, P.A. (2014). Winning wars amongst the people: case studies in asymmetric conflict. University of Nebraska Press.
  • Konak, A. (2019). Kırım’ınilhakıilesonuçlananukraynakriziveekonomiketkileri.Uluslararası AfroAvrasyaAraştırmalarıDergisi,4(8), 80-93.
  • Laudon, Kenneth C, & Jane P Laudon (2022).Management information systems: managing the digital firm (Global Edition). 17. Pearson Education Limited.
  • Lukasik, S.J. (2011). Why the Arpanet was built. IEEE Annals of the History of Computing,33(3), 4-21.
  • McCarthy, J, Minsky, ML., Rochester, N. and Shannon, C.E. (2006). A proposal for the Dartmouth summer research project on artificial intelligence, August 31, 1955. AI Magazine,27(4), 12- 14.
  • MNSBC (2022). Hacker group Anonymous declares 'cyber war' on Putin's Russia [Video] Retrieved May 15, 2023 from https://www.youtube.com/watch?v=gkrDIjGP4_w
  • Moor, J. (2006). The Dartmouth College artificial intelligence conference: The next fifty years. AI Magazine,27(4), 87-91.
  • Moore, M. (2021, Jul 8). White House Brushes off Deleted Taiwan Tweet as an ‘Honest Mistake’ [Press Release].Retrieved May 15, 2023 from https://nypost.com/2021/07/08/white-house-calls-deleted-taiwan-tweet-an-honest-mistake/
  • Murphy, M. (2023, Jun 10). Unabomber Ted Kaczynski found dead in US prison cell [Press release] Retrieved Nov 15, 2023 fromhttps://www.bbc.com/news/world-us-canada-65867291
  • National Science Foundation (2023). Chips and Science. National Science Foundation. Retrieved Dec 15, 2023 from https://new.nsf.gov/chips#what
  • Netflix (2017). Manhunt: Unabomber. Retrieved May 15, 2023 from https://www.netflix.com/tr/title/80176878
  • Netflix (2018). Unabomber - In his own words. Netflix. Retrieved May 15, 2023 from https://www.netflix.com/tr/title/81002216
  • Nye, J.S. (2009). Get smart: combining hard and soft power. Foreign Affairs,88(4), 160-163. Normand, R. (2001). Sanctions against Iraq: Is it genocide? Guild Prac. 58, 27.
  • Nye, J.S. (2019). Soft power and public diplomacy revisited. The Hague Journal of Diplomacy,14, 7-20.
  • Nye, J.S. (2023). State smart power strategies. In Soft power and great-power competition: China and globalisation (pp.21-28). Singapore: Springer.
  • Oktay, M. (2023, Aug 4). Pentagon: Siber altyapımızı güçlendirecek yeni bir program başlattık. [Press Release]. Retrieved Nov 15, 2023, from https://www.aa.com.tr/tr/dunya/pentagon-siber-altyapimizi-guclendirecekyeni-bir-program-baslattik/2961001
  • OpenAI (2022, Nov 30). Introducing ChatGPT [Blog post]. Retrieved May 15, 2023 from https://openai.com/blog/chatgpt
  • Pathak, A.D., Saran, D., Mishra, S., Hitesh, M.,Bathula, S. & Sahu, K.K.(2021). Smart war on COVID-19 and global pandemics. In Chhabi Rani Panigrahi, BibudhenduPati, MamataRath, RajkumarBuyya (Eds.) Computational Modeling And Data Analysisin COVID-19 Research (p.28), CRC Press.
  • Perry, D.G., Blumenthal, S.H.&Hinden, RM.(1988). The ARPANET and the DARPA Internet. Library Hi Tech, 6(2), 51-62.
  • Pitrelli, M. (2022, Jul 29). Hacktivist group Anonymous is using six top techniques to ‘embarrass’ Russia [Press Release]. Retrieved from May 15, 2023 from https://www.cnbc.com/2022/07/28/how-is-anonymous-attacking-russia-the-top-six-ways-ranked-.html
  • Preußger, P. (2023, Apr 3). Visions of a smart war? image and ethics of autonomous weapon systems [Blog post], Retrieved Aug 26, 2023 from Philipp Preußger // Visions of a Smart War? Image and Ethics of Autonomous Weapon Systems — SchauflerLab@TU Dresden — TU Dresden (tu-dresden.de).
  • Qi, H. (2021). Smart’ warfare and China–U.S. stability: strengths, myths, and risks China International Strategy Review, (3), 278–299.
  • Ray, M. (2023a). Edward Snowden.Retrieved Dec 25, 2023 from https://www.britannica.com/biography/Edward-Snowden.
  • Ray, M. (2023b). Ted Kaczynski. Britannica Retrieved Dec 25, 2023 from https://www.britannica.com/biography/Ted-Kaczynski
  • Renz, B. (2016). Russia and ‘Hybrid Warfare’. Contemporary Politics, 22(3), 283-300.
  • Robinson, A. (2014, Oct 18). The enduring enigma of Alan Turing. Retrieved Jul 18, 2023 from https://www.thelancet.com/action/showPdf?pii=S0140-6736%2814%2961854-7
  • Rosenberg, P. (2013, Sep 10). Obama’s error: Getting beyond the ‘smart war’ syndrome. Retrieved Jun 27, 2023 from https://www.aljazeera.com/opinions/2013/9/10/obamas-error-getting-beyond-the-smart-war-syndrome
  • Rowe, J. C. (1991). The "Vietnam Effect" in the Persian Gulf War. Cultural Critique Autumn, (19), 121-139.
  • Sample, I. (2003). US Gambles on a 'smart' war - the military is relying on precision weapons to both win the war in Iraq and help prevent politically damning civilian casualties. But the technology is far from fail-safe. New Scientist, 177(2387), 6-7.
  • Schneider, G.P. (2017). Electronic commerce. Boston: Cengage Learning.
  • SCIO (2022). Jointly Build a community with a shared future in cyberspace—the State Council Information Office of the People's Republic of China. Retrieved May 15, 2023 from http://english.scio.gov.cn/node_8033411.html
  • Sezgin, F. (2014). Edward Snowden olayı’nın ABD-Rusya ilişkileri üzerindeki etkisi. Uluslararası Yönetim ve Sosyal Araştırmalar Dergisi,1(1): 24-31.
  • Simons, A. (2012, Apr 27). Soft war = Smart war? Think again. Retrieved May 15, 2023 from https://www.fpri.org/article/2012/04/soft-war-smart-war-think-again/
  • Singh, K., and Kalia, S. (2020, Jul 7). Pompeo says U.S. looking at banning Chinese social media apps, including TikTok [Press Release]Retrieved May 15, 2023 from https://www.reuters.com/article/us-usatiktok-china-pompeo-idUSKBN2480DF
  • Schmitt, M.N. (1999). The principle of discrimination in 21st-century warfare. Yale Human Rights and Development Journal,2(1), 143-182.
  • Swaine, M.D. (2013). Chinese Views on cybersecurity in foreign relations. China Leadership Monitor, no. 42. Retrieved May 15, 2023 from https://carnegieendowment.org/files/CLM42MS.pdf
  • The Guardian (2023, Feb 23). Edward Snowden documentary citizen four wins oscar. Retrieved May 15, 2023 fromhttps://www.theguardian.com/film/2015/feb/23/edward-snowden-documentary-citizenfour-wins-oscar
  • The White House (2023). National cybersecurity strategy. Washington. Retrieved May 15, 2023 from https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
  • Thornton, R. (2007). Asymmetric warfare: threat and response in the twenty-first century. Polity.
  • Turing, A.M. (1937). On computable numbers, with an application to the Entscheidungsproblem. Proc. Lond. Math. Soc. 42(2), 230-265.
  • Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59(236), 433-460.
  • Turing, A.M. (1937). On computable numbers, with an application to the Entscheidungsproblem. Proc. Lond. Math. Soc,.42(2), 230-265.
  • Tüysüzoğlu, G. (2013, Jul 16). Post-modern bir casusluk hikayesinin kahramanı: Edward Snowden [Blog post]. Retrieved May 15, 2023 from https://www.tuicakademi.org/post-modern-bir-casusluk-hikayesinin-kahramani-edward-snowden/
  • Tzu, S. (1963). The Art of War (Translated by Samuel B Griffith). USA: Oxford University Press. University of Oxford (2021, May 11). Fanatic fans or fake followers? Chinese diplomats and their social media networks. Retrieved May 15, 2023 from https://www.ox.ac.uk/news/2021-05-11-fanatic-fans-or-fake-followers-chinese-diplomats-and-their-social-media-networks
  • Vatikiotis, P.&Yörük, ZF. (2016). Gezi movement and the networked public sphere: A comparative analysis in global context. Social Media + Society, July-September, 1-12.
  • Warden, J. (2008). War modeling & simulation. Let's start at the end - a very good place to start. Venturist. Retrieved May 15, 2023 from https://apps.dtic.mil/sti/citations/ADA501007
  • Warren, D.C. (2017). Ted Kaczynski: evil or insane? The Cupola. Retrieved May 15, 2023 from https://cupola.gettysburg.edu/cgi/viewcontent.cgi?article=1650&context=student_scholarship
  • Weik, M.H. (1961). The ENIAC Story. Ordnance,45(244), 571-575.
  • Wither, J.K. (2016). Making Sense of Hybrid Warfare. Connections: The Quarterly Journal,15(2), 73-87.
  • Wolfswinkel, JF, Furtmueller, E. & Wilderom, CPM. (2011). Using grounded theory as a method for rigorously reviewing literature. European Journal of Information Systems,22(1), 45-55.
  • Yan, G. (2020). The impact of artificial intelligence on hybrid warfare. Small Wars & Insurgencies, 31(4), 898-917.
  • Yeon-Bong, J. (2019). A Study on Implications of U. S. Army Revolution in Military Affairs(RMA) to ROK Army RMA. 군사연구, 147, 285-314. Retrieved May 15, 2023 from https://www.dbpia.co.kr/Journal/articleDetail?nodeId=NODE09239789.
  • Yıldızoğlu, E. (2020, Jul 14). ABD ve Çin arasındaki 'yeni soğuk savaş' dünya için ne kadar büyük bir risk? Retrieved May 15, 2023 from https://www.bbc.com/turkce/haberler-dunya-53404403.
  • Zhu, Z. (2020, May 15). Interpreting China’s ‘wolf-warrior diplomacy’. Retrieved May 15, 2023 fromhttps://thediplomat.com/2020/05/interpreting-chinas-wolf-warrior-diplomacy/
Toplam 97 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Askeri Sosyoloji
Bölüm Araştırma Makaleleri
Yazarlar

Orkun Öz 0000-0003-0855-1635

Aslıhan Ünal 0000-0001-5896-8880

Yayımlanma Tarihi 30 Haziran 2024
Gönderilme Tarihi 11 Mayıs 2024
Kabul Tarihi 12 Haziran 2024
Yayımlandığı Sayı Yıl 2024 Sayı: 13

Kaynak Göster

APA Öz, O., & Ünal, A. (2024). The concept of smartwar: A theoretical framework. NOSYON: Uluslararası Toplum Ve Kültür Çalışmaları Dergisi(13), 35-57.

19848   19580  19581 2070320899259912602531874