Show simple item record

dc.contributor.authorMayer, Michael Johnen_GB
dc.date.accessioned2023-11-13T07:11:12Z
dc.date.accessioned2023-11-30T07:28:01Z
dc.date.available2023-11-13T07:11:12Z
dc.date.available2023-11-30T07:28:01Z
dc.date.issued2023-11-29
dc.identifier.citationMayer. Trusting machine intelligence: artificial intelligence and human-autonomy teaming in military operations. Defense and Security Analysis. 2023en_GB
dc.identifier.urihttp://hdl.handle.net/20.500.12242/3231
dc.descriptionMayer, Michael John. Trusting machine intelligence: artificial intelligence and human-autonomy teaming in military operations. Defense and Security Analysis 2023 s. 521-538en_GB
dc.description.abstractContinuous advances in artificial intelligence has enabled higher levels of autonomy in military systems. As the role of machine-intelligence expands, effective co-operation between humans and autonomous systems will become an increasingly relevant aspect of future military operations. Successful human-autonomy teaming (HAT) requires establishing appropriate levels of trust in machine-intelligence, which can vary according to the context in which HAT occurs. The expansive body of literature on trust and automation, combined with newer contributions focused on autonomy in military systems, forms the basis of this study. Various aspects of trust within three general categories of machine intelligence applications are examined. These include data integration and analysis, autonomous systems in all domains, and decision-support applications. The issues related to appropriately calibrating trust levels varies within each category, as do the consequences of poorly aligned trust and potential mitigation measures.en_GB
dc.language.isoenen_GB
dc.subjectKunstig intelligensen_GB
dc.subjectAutonomien_GB
dc.titleTrusting machine intelligence: artificial intelligence and human-autonomy teaming in military operationsen_GB
dc.date.updated2023-11-13T07:11:12Z
dc.identifier.cristinID2193366
dc.identifier.doi10.1080/14751798.2023.2264070
dc.source.issn1475-1798
dc.source.issn1475-1801
dc.type.documentJournal article
dc.relation.journalDefense and Security Analysis


Files in this item

This item appears in the following Collection(s)

Show simple item record