2022
DOI: 10.1007/s12144-022-02753-4
|View full text |Cite
|
Sign up to set email alerts
|

Public support for counterterrorism efforts using probabilistic computing technologies to decipher terrorist communication on the internet

Abstract: Advancements in big data analytics offer new avenues for the analysis and deciphering of suspicious activities on the internet. One promising new technology to increase the identification of terrorism threats is based on probabilistic computing. The technology promises to provide more efficient problem solutions in encryption and cybersecurity. Probabilistic computing technologies use large amounts of data, though, which raises potential privacy concerns. A study ( N = 1,023) was conduct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

4
13
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(17 citation statements)
references
References 43 publications
4
13
0
Order By: Relevance
“…Specifically, we tested four hypotheses derived from a social-identity framework (Tajfel & Turner, 1986) that describe the independent and combined effects of four factors on the acceptance of the use of personal information to prevent terrorist attacks: whether information is being gathered from members who belong to one’s own group (the in-group) or an out-group; whether the collected information is private or publicly available; and respondents’ national identity and overall sense of privacy regarding online information. The proposed hypotheses were supported in a recent study (see Reimer & Johnson, 2022) that used an MTurk (Amazon Mechanical Turk) sample of N = 1,023 participants and provided participants with a newspaper article describing a specific attack that was developed by Hinsz and Betts (2014). We aimed to extend on the study by Reimer and Johnson (2022) in the following ways: (1) test the hypotheses with a new sample of participants ( N = 1,204); (2) use a variety of different possible terrorist attacks that have been described in the literature (see Liu et al, 2019); (3) focus on the observed in-group favoritism regarding the surveillance of private information and compare the effect more closely to other effects of in-group favoritism.…”
Section: Introductionsupporting
confidence: 71%
See 4 more Smart Citations
“…Specifically, we tested four hypotheses derived from a social-identity framework (Tajfel & Turner, 1986) that describe the independent and combined effects of four factors on the acceptance of the use of personal information to prevent terrorist attacks: whether information is being gathered from members who belong to one’s own group (the in-group) or an out-group; whether the collected information is private or publicly available; and respondents’ national identity and overall sense of privacy regarding online information. The proposed hypotheses were supported in a recent study (see Reimer & Johnson, 2022) that used an MTurk (Amazon Mechanical Turk) sample of N = 1,023 participants and provided participants with a newspaper article describing a specific attack that was developed by Hinsz and Betts (2014). We aimed to extend on the study by Reimer and Johnson (2022) in the following ways: (1) test the hypotheses with a new sample of participants ( N = 1,204); (2) use a variety of different possible terrorist attacks that have been described in the literature (see Liu et al, 2019); (3) focus on the observed in-group favoritism regarding the surveillance of private information and compare the effect more closely to other effects of in-group favoritism.…”
Section: Introductionsupporting
confidence: 71%
“…In 2016, the U.S. government took Apple to the Federal court to try and force Apple to allow them into the private phone of an attacker in the mass at San Bernardino, California (Perlroth, 2019). Apple refused to fulfill the request, being concerned about this concession opening up a door of opportunity for the government to begin more and more invasive surveillance.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations