نویسندگان
چکیده
رشد فناوری در زمینه هوش مصنوعی، موجب تلاش¬هایی برای گذار پارادایمی در عرصۀ دیپلماسی شده است. بهرهگیری از ظرفیتهای کلان¬داده¬ها با هدف تأمین اهداف و منافع ملی و دست یازیدن به سطحی از مناسبات جهانی، پدیدهای است که با نام «دیپلماسی بیگ¬دیتا» مورد استفاده دولتها قرار میگیرد. دیپلماسی کلان¬داده به دستگاه دیپلماسی دولت¬ها امکان میدهد تا در مراودات دوجانبه و یا چندجانبه خود در سازمانهای بینالمللی که ماهیتاً سازمانهایی برای شکلدهی به همکاری بینالمللیاند، به پی¬جویی منافع و مطالبات خود و تعامل با نظام بین¬الملل مبادرت نمایند. سؤال پژوهش حاضر این است که شاخصههای دیپلماسی کلان¬داده در گذار پارادایمی مطالعات این حیطه چیست و نحوه تعامل بر اساس مولفه¬های مذکور در نظم جهانی چگونه صورت میگیرد؟ مقاله حاضر به روش تحلیلی-توصیفی و از طریق تحلیل محتوای کیفی منظومۀ دیجیتالیزۀ دیپلماسی فرضیه پژوهش را اینگونه مطرح میکند که شاخصههای دیپلماسی بیگ¬دیتا در ابعاد همپیشگی¬¬های علمی بینالمللی، تحقیقات مشترک علمی، شبکهسازی نخبگان و دانشمندان در سطوح منطقهای و جهانی به منصۀ ظهور رسیده است.
منابع
دیویس، لوید و رابرت جی پتمن(1396) دیپلماسی علم روزی نو یا صبحی کاذب؟ ترجمه جواد مشایخ، عفت نوروزی، سعیده صارمی، تهران: موسسه خدمات فرهنگی رسا.
فرهنگی، علی اکبر و دیگران (1393) دیپلماسی دیجیتال و روابط میان دولتها در جوامع معاصر. فصلنامه مطالعات رسانه، سال 9، شماره 24، بهار 1393.
روفینی، پیر برونو(1397) علم و دیپلماسی بعد جدیدی از روابط بین الملل، ترجمه سید مهدی قائمی، تهران: پژوهشکده مطالعات فرهنگی و اجتماعی.
ذولفقازاده، محمدمهدی و دیگران(1395) نقش دیپلماسی علم و فناوری در بهبود چالش های شرکت های دانش بنیان، فصلنامه رشد فناوری، سال 12، شماره 48.
صدوق، محمود، بنیادی نائینی، علی(1395) آشنایی با دیپلماسی علم و فناوری، تهران: نشر آینده پژوه.
ذولفقازاده، محمدمهدی و دیگران(1394) تجربه دیپلماسی علم و فناوری در دنیا: کاوشی در نهادها، اولویت ها و اقدام های چند کشور منتخب، سیاستنامه علم و فناوری، دوره 5، شماره 1.
موحدیان، احسان (1398) هوش مصنوعی و تأثیر آن بر امنیت و روابط بینالملل. وبسایت مؤسسه مطالعات و تحقیقات بینالمللی ابرار معاصر تهران. 22/مهر/1398.
Ittefaq, Muhammad (2019) “Digital Diplomacy via Social Networks: A Cross National Analysis of Governmental Usage of Facebook and Twitter for Digital Engagement”. Journal of Contemporary Eastern Asia Vol. 18, No. 1: 49-69.
Borg Psaila, Stephanie (2021) “AI and diplomacy”. Diplo foundation. 27 December 2021.
Chitty, Naren and Sabina Dias (2017) “Artificial Intelligence, Soft Power and Social Transformation”. Journal of Content, Community & Communication. Vol. 6 Year 3, December - 2017 [ISSN: 2395-7514 (Print)].
Allen, G., & Chan, T. (2017). “Artificial intelligence and national security”. https://www.belfercenter.org/sites/default/files/files/publication/AI%20NatSec%20-%20final.pdf. Accessed 18th Oct 2020.
Manor, I. (2017). “The digitalization of diplomacy: Toward clarification of a fractured terminology” (Working paper). https://digdipblog.files.wordpress.com/2017/08/the-digitalization-of- diplomacy-working-paper-number-1.pdf. Accessed 18th Oct 2020.
Hutchings, R., & Suri, J. (2020). “Modern diplomacy in practice” (p. xviii). London: Palgrave Macmillan.
Jönsson, C. (2018). “Diplomatic representation: States and beyond. In V. Stanzel (Ed.), New realities in foreign affairs: Diplomacy in the 21st century” (pp. 21–26). https://www.swp-berlin. org/fileadmin/contents/products/research_papers/2018RP11_sze.pdf. Accessed 18th Oct 2020.
Hocking, B., & Melissen, J. (2015). “Diplomacy in the digital age” (p. 29). https://www.clingendael.org/sites/default/files/pdfs/Digital_Diplomacy_in_the_Digital%20Age_Clingendael_ July2015.pdf. Accessed 18th Oct 2020.
Jacobson and et al (2018) “Data Diplomacy”. Geneva, Switzerland: DiploFoundation.
ITU News (2018) “Challenges and opportunities of artificial intelligence for good”. Available at https://news.itu.int/challenges-and-opportunities-of-artificial intelligence-for-good/ [accessed 29 November 2018].
Scott B, Heumann S, and Lorenz P (2018)“Artificial intelligence and foreign policy”. Stiftung Neue Verantwortung Policy Brief. Available at https://www.stiftung-nv.de/sites/default/files/ai_foreign_policy.pdf [accessed 6 December 2018].
Baylis, J., & Smith, S. (2001). “The globalization of world politics: An introduction to international relations” (2nd ed.). Oxford: Oxford University Press.
Kegli, J. R., Čarls, V., & Vitkof Judžin, R. (2004). Svetska politika Trend i transformacija. CSES, Diplomatska akademija, Beograd.
Dašić, D. Đ. (2008). Savremena diplomatija (Contemporary Diplomacy). Beograd: Delta Press.
Baptiste, Jean and Jeangène Vilmer (2016) “Autonomous Weapon Diplomacy: The Geneva Debates”. Uploaded on Cairn-int.info on 09/11/2016.
Aaron, G., & Rasmussen, R. (2017). Global Phishing Survey 2016: Trends and Domain Name Use, [online] http://www.apwg.org. Accessed, 20 April 2019.
Access Now. (2018). Human rights in the age of Artificial intelligence, [online]. www.accessnow. org. Accessed, 17 April 2019.
African, Union. (2019). African Digital Transformation Strategy, and African Union Communication and Advocacy Strategy among Major AU Initiatives in the Final Declaration of STCCICT3. African Union, African Union, 26 October 2019, https://au.int/en/pressreleases/20191026/ african-digital-transformation-strategy-and-african-union-communication-and
AI HELEG. (2018). Draft Ethics Guidelines for Trustworthy AI. European Commission’s High-Level Expert Group on AI, 18 December 2018. Retrieved from https://ec.europa.eu/ digital-single-market/en/news/draft-ethics-guidelines-trustworthy-ai
Allen, G., & Chan, T. (2017). Artificial Intelligence and National Security, BELFER Center Paper, [online]. https://www.belfercenter.org/sites/default/files/files/publication/AI%20Na tSec %20-%20final.pdf. Accessed, 20 April 2019.
Anti Phishing Working Group. (2017). APWG Global Phishing Survey: In 2016 The Number of Phishing Domain Names Reached All-Time High [online]. Available at: http://docs.apwg.org/ reports/APWG_Global_Phishing_Report_2015-2016.pdf. Accessed, 10 Mai. 2019.
Arthur, C. (2011). Egypt blocks social media websites in attempted clampdown on unrest Facebook, Google, Hotmail and Twitter among services blocked by government, [online], report users, https://www.theguardian.com/world/2011/jan/26/egypt-blocks-social-media- websites. Accessed, 20 April 2019.
Bhatnagar, S., & Talia Cotton, T. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation, February 2018. [online]. Available at: https://arxiv.org/ftp/arxiv/ papers/1802/1802.07228.pdf. Accessed, 1 Mai. 2019.
Burri, T. (2017). International Law and Artificial Intelligence, German yearbook of interna- tional law (Vol. 60, pp. 91–108). [online]. Available at: file://C:/Users/as4s/Downloads/ SSRN-id3060191.pdf. Accessed 14 April 2019.
Bush, Vannevar. (1945). As We May Think. The Atlantic Monthly. July 1945.
CaPrice 2018, Collective Awerness Platform for Privacy and Concerns and Expectations Caprice (2018), Some terrifying cyber crime statistics in 2018, [online]. Available at: https://www.caprice-community.net/some-terrifying-cyber-crime-statistics-in-2018/ [Accessed, 15 Apr. 2019].
Clinton, H. R. (2014). Hard choices. New York: Simon & Schuster.
Cole, S. (2018). Deep Voice’ Software Can Clone Anyone’s Voice With Just 3.7 Seconds of Audio, Usingsnippets of voices, Baidu's ‘Deep Voice’ can generate new speech, accents, and tones, Vice channel, [online]. Available at: https://www.vice.com/en_asia/article/3k799k/deep-voice- software-can-clone-anyones-voice-with-just-37-seconds-of-audio. Accessed, 11 Mai. 2019.
Collective Awerness Platform for Privacy and Concerns and Expectations Caprice (2018), Some terrifying cyber crime statistics in 2018, [online]. Available at: https://www.caprice-commu- nity.net/some-terrifying-cyber-crime-statistics-in-2018/ [Accessed, 15 Apr. 2019].
Council of Europe: 1353rd meeting, Ad hoc Committee on Artificial Intelligence (CAHAI), 2019, September 11. Retrieved from https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=0 9000016809737a1
Davison, N. (2016). A legal perspective: Autonomous weapon systems under international human- itarian law, Legal Division International Committee of the Red Cross, UNODA Occasional Papers, No. 30, [online]. Available at: www.icrc.org/en/document/autonomous-weapon-sys- tems-under-international-humanitarian-law. Accessed, 6 Mai. 2019.
DiploFoundation. (2019). Mapping the challenges and opportunities of artificial intelligence for the conduct of diplomacy, [online]. Available at: https://www.diplomacy.edu/AI-diplo-report. Accessed, 20 April 2019.
European Commission. DRAFT Ethics Guidelines for Trustworthy AI. European Commission’s High-Level.
European Commission, High-Level Expert Group on AI (AI HLEG). (2019). Policy and investment recommendations for trustworthy Artificial Intelligence, Report / Study. [online]. Available at: https://ec.europa.eu/digital-single-market/en/news/policy-and-investment-recommendations- trustworthy-artificial-intelligence. Accessed 15 August 2019.
European parliament. (2000). Charter of Fundamental Rights of the European Union, (2000/C 364/01). Official Journal of the European Communities, C 364/1. 18 Dec. 2000, www.europarl. europa.eu/charter/pdf/text_en.pdf
European Union. (2012). Consolidation version of the treaty on European Union. Official Journal of the European Union, C 326/17. 26 Oct. 2012, https://eur-lex.europa.eu/resource. html?uri=cellar:2bf140bf-a3f8-4ab2-b506fd71826e6da6.0023.02/DOC_1&format=PDF
Fukuyama, F. (2006). America at the crossroads, democracy, power and the neoconservative leg- acy. New Haven: Yale University Press.
G20 Insights. (2010). “G20 AI Principles”. Retrieved from: https://www.g20-insights.org/wp- content/uploads/2019/07/G20-Japan-AI-Principles.pdf.
G20Trade Ministers and Digital Economy. (2019). G20 Ministerial Statement on Trade and Digital Economy, [online]. Available at: https://www.mofa.go.jp/mofaj/files/000486596.pdf
G7. Charlevoix Common Vision for the Future of Artificial Intelligence. 9 June. 2018., Retrieved from http://www.g7.utoronto.ca/summit/2018charlevoix/ai-commitment.html
Greenberg, A. (2015). Hackers Remotely Kill a Jeep on the Highway-With Me in It. [online], https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway. Accessed, 20 April 2019.
Gregory, S. (2015). When Should We Share, Distressing Images? Seeing AylanKurdi, In: The iconic image on social media: a rapid research response to the death of AylanKurdi, Visual Social Media Lab. [online]. Available at: https://research.gold.ac.uk/14624/1/KURDI%20 REPORT.pdf. Accessed, 8 Mai. 2019.
Horowitz, M. C., Gregory C. A., Saravalle, E., Cho, A., Kara, F., & Scharre, P. (2018). Artificial Intelligence and International Security. [online]. https://s3.amazonaws.com/files.cnas.org/doc- uments/CNAS-AI-and-International-Security-July-2018_Final.pdf?mtime=20180709122303. Accessed 6 Mai. 2019.
Huawei. (2018). GCI Ranking table 2018, [online]. Available at: https://www.huawei.com/ minisite/gci/en/country-rankings.html. Accessed 3 August 2019.
International Committee of the Red Cross Geneva. (2017). Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems 13–17 November 2017, [online]. Geneva Statement of the International Committee of the Red Cross (ICRC). [online]. Available at: https://www.unog.ch/80256EDD006B8954/(httpA ssets)/7E2777BB078B1F8CC12582490037288D/file/2017_GGE+LAWS_Statement_ICRC. pdf. Accessed 20 April 2019.
Joost. N. Kok et al, (2017). Artificial Intelligence: Definition, Trends, Techniques, and Cases – Encyclopedia of Life Support Systems (EOLSS). [online]. Available at: http://www.eolss.net/ Sample-Chapters/C15/E6-44.pdf.
Kok, J. N., Boers, E. J. W., Kosters, W. A., van der Putten, P., & Mannes, P. (2017). Artificial Intelligence: Definition, Trends, Techniques, and Cases – Encyclopedia of Life Support Systems (EOLSS). [online]. Available at: http://www.eolss.net/Sample-Chapters/C15/E6-44. pdf
Next Wisdom Foundation. (2018). AI politics of dawn? The world’s first “AI mayor” candidate Michijin Matsuda, “AI is God Day” author Tetsuzo Matsumoto interview, FEATURE, [online]. Available at: http://nextwisdom.org/article/3200/?en#GOOGTRANS(JA|EN). Accessed 3 June 2019.
Noam, C. (2011). Egyptians Were Unplugged, and Uncowed, The New York Times, Feb.20, [online]. Available at: https://www.nytimes.com/2011/02/21/business/media/21link.html. Accessed 8 Mai. 2019.
OECD. (2019). OECD principles on AI, Available at: http://www.oecd.org/going-digital/ai/prin- ciples/. Accessed 5 July 2019
OECD. (2020). OECD AI Policy Observatory, An online hub for AI information, evidence, and policy options. [online]. Available at: https://www.oecd.org/going-digital/ai/about-the-oecd-ai- policy-observatory.pdf. Accessed 5 July 2020.
OECD. (2020). “OECD AI Policy Observatory”. Retrieved from: https://www.oecd.org/going- digital/ai/about-the-oecd-ai-policy-observatory.pdf.
Parkhill, C. (2015). On The Memefication of AylanKurdi, and the Power And Ethics of Sharing Photos, [online], Junkee. https://junkee.com/on-the-memefication-of-aylan-kurdi-and-the- power-and-ethics-of-sharing-photos/65078. Accessed 19 April 2019.
Phishlabs, (2018). 2018 Phishing Trends and Intelligence Report: Hacking the Human. [online]. Available at: https://info.phishlabs.com/2018_phishing_trends_and_-intelligence_report-0. Accessed 10 Mai. 2019.
Procter, M. L., & Yamada-Rice, D. (2015). Shoes of childhood: Exploring the emotional politics through which images become narrated on social. In F. Vis & O. Goriunova (Eds.), The iconic image on social media: A rapid research response to the death of Aylan Kurdi (pp. 57–60). Visual Social Media Lab. https://research.gold.ac.uk/14624/1/KURDI%20REPORT.pdf.
Rogers, S. (2015). What can search data tell us about how the story of AylanKurdi spread around the world?, In: The iconic image on social media: a rapid research response to the death of aylankurdi, Visual Social Media Lab, [online]. Available at: https://research.gold. ac.uk/14624/1/KURDI%20REPORT.pdf. Accessed 14 April 2019.
Roumate. F. (2019), Malicious use of Artificial Intelligence:New challenges for international relations and international psychological security. Retreived from Institut International de la recherche scientifique (institut-irs.com).
Sam. (2018) TThe virtual politician of the future. (politiciansam.nz).
Scharr, P. (2017). We’re Losing Our Chance to Regulate Killer Robots, Defense One. [online]. Available at: http://www.defenseone.com/ideas/2017/11/were-losing-our-chance-regulate- killer-robots/142517/. Accessed 8 Mai. 2019.
Symantec. (2018). Internet security threat report, Volume 23, [online]. Avalable at: https://www. symantec.com/.../symantec/.../reports/istr-23-2018en. Accessed 16 April 2019. Accessed 20 April 2019.
The White House. (2017). National Security Strategy of the United States of America, [online]. Available at https://www.whitehouse.gov/wp-content/uploads/2017/12/NSSFinal12-18- 2017-0905.pdf. Accessed 24 April 2019.
Turing, A. M. (1950) Computing Machinery and Intelligence. Mind 49: 433–460.
UNESCO. (2020). Draft Text for the Recommendation on Ethics of Artificial Intelligence, Retrieved from https://unesdoc.unesco.org/ark:/48223/pf0000373434
UNOG. (2001). The Convention on Certain Conventional Weapons, [online]. Avalable at: https:// www.unog.ch/80256EE600585943/(httpPages)/4F0DEF093B4860B4C1257180004B1B30. Accessed 7 April 2019.
Westcott, N. (2008). Digital Diplomacy: The Impact of the Internet on International Relations, Oxford Internet Institute, Research Report. [online]. Available at: https://www.oii.ox.ac.uk/ archive/downloads/publications/RR16.pdf. Accessed 8 Mai. 2019.
Adam Lowther, Curtis McGiffi (2019) "America Needs a "Dead Hand War on the Rocks, 16 August 2019, https://warontherocks.com/2019/08/america-needs-a-dead-hand/.
SIPRI report (2020) "Recent advances in artificial intelligence contribute to nuclear risk”. SIPRI, 22 June 2020, https://sipri.org/media/2020/recent-advancesartificial-intelligence-contribute-nuclear-risk-new-sipri-report.
Favaro, Marina (2021) “Weapons of Mass Distortion. A new approach to emerging technologies, risk reduction, and the global nuclear order”. King’s College London, June 2021, https://www.kcl.ac.uk/csss/assets/weapons-of-mass-distortion.pdf.
Carlsson, Peldán (2020) “Artificial Intelligence, Strategic Stability and Nuclear Risk”. SIPRI, June 2020, https://www.sipri.org/sites/default/files/2020 06/artificial_intelligence_strategic_stability_and_nuclear_risk.pdf.
Boulanin, Vincent and et al (2020) “Artificial Intelligence, Strategic Stability and Nuclear Risk”. SIPRI, June 2020, https://www.sipri.org/sites/default/files/2020-06/artificial_intelligence_strategic_stability_and_nuclear_risk.pdf.
Fung, Brian (2012) “Digital Diplomacy: Why It’s So Tough for Embassies to Get Social Media Right”. The Atlantic, October 17, 2012, https://www.theatlantic.com/international/ archive/2012/10/digital-diplomacy-why-its-so-tough-for-embassies-to-get-social-media-right/263744/.
Gallagher, Sean (2014) “The Sad, Strange Saga of Russia’s ‘Sergeant Selfie,’”. Ars Technica, August 14, 2014, https://arstechnica.com/information-technology/2014/08/ the-sad-strange-saga-of-russias-sergeant-selfie/.
Akin, Unver (2017) “What Twitter can tell us about the Jerusalem protests”. The Washington Post. 28 August 2017. www.washingtonpost.com/news/monkey-cage/ wp/2017/08/26/what-twitter-can-tell-us-about-the-jerusalem protests/?utm_term=.52f561258ead.
Will, Worley (2016) “Russians Stage ‘Retaliation Protest’ Outside British Embassy”. The Independent, November 4, 2016, www.independent.co.uk/news/world/europe/ russia-british-embassy-moscow-retaliation-protest-demonstration-aleppo-syria-a7398441.html.
Shearlaw, Maeve (2015) “Did the #bringbackourgirls Campaign Make a Difference in Nigeria?” The Guardian, April 14, 2015, sec. World news, https://www.theguardian.com/world/2015/apr/14/nigeria-bringbackourgirls-campaign-one-year-on.
Data-Pop Alliance (2015) “Big Data for Climate Change and Disaster Resilience: Realizing the Benefits for Developing Countries”.
European Parliament (2017) European Parliament resolution of 14 March 2017 on fundamental rights implications of big data: privacy, data protection, non-discrimination, security and law-enforcement (2016/2225(INI)). P8_TA (2017)0076.
Bernardo Huberman, Daniel M. Romero, and Fang W (2008). “Crowdsourcing, Attention and Productivity,” Journal of Information Science 35 (October 17, 2008), doi:10.2139/ssrn.1266996
Varol and et al (2017) “Online Human-Bot Interactions: Detection, Estimation, and Characterization” arXiv:1703.03107 [Cs], March 8, 2017.
Robert, Abel (2016) “And the country with the most bot infections is... Turkey”. SC Media. 5 October 2016.
Efe, Sevin (2017) “Traditional Meets Digital: Diplomatic Processes on Social Media”. Paper presented at the International Studies Association 2017 Annual Conference.
Kiggins, Ryan (2017) “Smartphone Guns Shooting Tweets”. University of Central Oklahoma, USA.
Ittefaq, M. (2019). “Digital diplomacy via social networks: A cross-national analysis of governmental usage of Facebook and Twitter for digital engagement”. Journal of Contemporary Eastern Asia, 18(1), 49–69.
Mandiberg, M. (2012). “Introduction. In The social media reader” (pp. 1–12). New York/London: New York University Press.
Sandre, A. (2012, October 17). “E-diplomacy beyond social media”. https://www.opencanada.org/ features/e-diplomacy-beyond-social-media/. Accessed 26 Oct 2020.
Scott, B., Heumann, S., & Lorenz, P. (2018). “Artificial intelligence and foreign policy”. Stiftung Neue Verantwortung.
Jacobson, Barbara Rosen and et al (2018) “Data Diplomacy: Updating diplomacy to the big data era”. Geneva, Switzerland: DiploFoundation.
کلیدواژهها