The artificial intelligence security zugzwang
Lampis Alevizos
Additional contact information
Lampis Alevizos: Head of Cyber Defence, Volvo Group, The Netherlands
Cyber Security: A Peer-Reviewed Journal, 2025, vol. 9, issue 1, 88-106
Abstract:
In chess, zugzwang describes a scenario where any move worsens the player’s position. Organisations face a similar dilemma right now at the intersection of artificial intelligence (AI) and cyber security. AI adoption creates an inevitable paradox: delaying it poses strategic risks, rushing it introduces poorly understood vulnerabilities, and even incremental adoption leads to cascading complexities. In this paper we formalise this challenge as the AI security zugzwang — a phenomenon whereby security leaders must make decisions under conditions of inevitable risk. Grounded in game theory, security economics and organisational decision theory, we characterise AI security zugzwang through three key properties: forced movement, predictable vulnerability creation and temporal pressure. Additionally, we develop a taxonomy to categorise forced-move scenarios across AI adoption, implementation, operational and governance contexts and provide corresponding strategic mitigations. Our framework is supported by a practical decision flowchart, demonstrated through a real-world example of Copilot adoption, thereby showing how security leaders can manage zugzwang positions balancing risk and innovation. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.
Keywords: AI cyber security; zugzwang; security decision making; cyber security strategy; forced security moves; innovation (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/9649/download/ (application/pdf)
https://hstalks.com/article/9649/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:9:i:1:p:88-106
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().