Construct Validity in Automated Counterterrorism Analysis

  • Adrian K. YEE*
  • *Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

2 Citations (Scopus)

Abstract

Governments and social scientists are increasingly developing machine learning methods to automate the process of identifying terrorists in real-time and predict future attacks. However, current operationalizations of ‘terrorist’ in artificial intelligence are difficult to justify given three issues that remain neglected: insufficient construct legitimacy, insufficient criterion validity, and insufficient construct validity. I conclude that machine learning methods should be at most used for the identification of singular individuals deemed terrorists and not for identifying possible terrorists from some more general class, nor to predict terrorist attacks more broadly, given intolerably high risks that result from such approaches.
Original languageEnglish
Pages (from-to)566-583
Number of pages18
JournalPhilosophy of Science
Volume92
Issue number3
Early online date27 Nov 2024
DOIs
Publication statusPublished - Jul 2025

Bibliographical note

I thank Andre Curtis-Trudel, Christopher Fuller, and Kenji Hayakawa for critical feedback on ideas in this paper. All errors, infelicities, and opinions are mine alone.

Publisher Copyright:
© The Author(s), 2025. Published by Cambridge University Press on behalf of the Philosophy of Science Association.

Funding

I acknowledge funding from the Hong Kong Catastrophic Risk Centre and two Hong Kong government grants: the Research Matching Grant Scheme #185249 and the Faculty Research Grant #101914 both identically titled “Machine Learning Models of Misinformation and Deceptive Media.”

Keywords

  • philosophy of science
  • terrosim
  • construct validity
  • machine learning
  • philosophy of artificial intelligence
  • political philosophy

Fingerprint

Dive into the research topics of 'Construct Validity in Automated Counterterrorism Analysis'. Together they form a unique fingerprint.

Cite this