Public support for counterterrorism efforts using probabilistic computing technologies to decipher terrorist communication on the internet

Curr Psychol. 2022 Mar 2:1-15. doi: 10.1007/s12144-022-02753-4. Online ahead of print.

Abstract

Advancements in big data analytics offer new avenues for the analysis and deciphering of suspicious activities on the internet. One promising new technology to increase the identification of terrorism threats is based on probabilistic computing. The technology promises to provide more efficient problem solutions in encryption and cybersecurity. Probabilistic computing technologies use large amounts of data, though, which raises potential privacy concerns. A study (N = 1,023) was conducted to survey public support for using probabilistic computing technologies to increase counterterrorism efforts. Overall, strong support was found for the use of publicly available personal information (e.g., personal websites). Regarding private personal information (e.g., online conversations), respondents perceived it to be more appropriate to use information from out-group members (non-American citizens) than from in-group members (American citizens). In line with a social-identity account, this form of in-group favoritism was strongest among respondents displaying a combination of strong national identities and strong privacy concerns.

Keywords: Counterterrorism; Ingroup favoritism; Privacy concerns; Social identity theory.