1,703
Views
0
CrossRef citations to date
0
Altmetric
Research Article

The power of a promise: whom do governments’ security justifications convince to accept surveillance?

ORCID Icon

References

  • Acquisti, A., L. K. John, and G. Loewenstein. 2013. “What Is Privacy Worth?” The Journal of Legal Studies 42 (2): 249–274.
  • Anderson, C. J., and Y. V. Tverdova. 2003. “Corruption, Political Allegiances, and Attitudes Toward Government in Contemporary Democracies.” American Journal of Political Science 47 (1): 91–109.
  • Aradau, C. 2014. “The Promise of Security: Resilience, Surprise and Epistemic Politics.” Resilience 2 (2): 73–87.
  • Baele, S. J., T. G. Coan, and O. C. Sterck. 2018. “Security Through Numbers? Experimentally Assessing the Impact of Numerical Arguments in Security Communication.” The British Journal of Politics and International Relations 20 (2): 459–476.
  • Bajc, V. 2007. “Introduction.” American Behavioral Scientist 50 (12): 1567–1591.
  • Bakir, V. 2015. “News, Agenda Building, and Intelligence Agencies.” The International Journal of Press/Politics 20 (2): 131–144.
  • Bali, V. 2009. “Tinkering Toward a National Identification System: An Experiment on Policy Attitudes.” Policy Studies Journal 37 (2): 233–255.
  • Beck, P. U. 1992. Risk Society: Towards a New Modernity. London: SAGE.
  • Bigo, D. 2012. “Security, Surveillance and Democracy.” In Routledge Handbook of Surveillance Studies, edited by K. Ball, K. D. Haggerty, and D. Lyon, 277–284. New York: Taylor & Francis.
  • Bischof, D. 2017. “New Graphic Schemes for Stata: Plotplain and Plottig.” The Stata Journal: Promoting Communications on Statistics and Stata 17 (3): 748–759.
  • Boese, V. A. 2019. “How (not) to Measure Democracy.” International Area Studies Review 22 (2): 95–127.
  • Bonilla, T. 2022. The Importance of Campaign Promises. Cambridge: Cambridge University Press.
  • Borah, P. 2011. “Conceptual Issues in Framing Theory: A Systematic Examination of a Decade’s Literature.” Journal of Communication 61 (2): 246–263.
  • Brettschneider, C. 2010. Democratic Rights: The Substance of Self-Government. Princeton; Oxford: Princeton University Press.
  • Brinson, M. E., and M. Stohl. 2012. “Media Framing of Terrorism: Implications for Public Opinion, Civil Liberties, and Counterterrorism Policies.” Journal of International and Intercultural Communication 5 (4): 270–290.
  • Budak, J., I.-D. Anić, and E. Rajh. 2013. “Public Attitudes Towards Privacy and Surveillance in Croatia.” Innovation: The European Journal of Social Science Research 26 (1–2): 100–118.
  • Budak, J., E. Rajh, V. Recher. 2017. “Citizens’ Privacy Concerns. Does National Culture Matter?” In Surveillance, Privacy and Security: Citizens’ Perspectives, edited by M. Friedewald, J. P. Burgess, and J. Cas. (eds), 36–51. London; New York: Routledge.
  • Buzan, B., O. Wæver, and J. D. Wilde. 1997. Security: A New Framework for Analysis. UK ed. Boulder. Colo: Lynne Rienner Publishers.
  • Campbell, D. 1992. Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: U of Minnesota Press.
  • Cayford, M., and W. Pieters. 2018. “The Effectiveness of Surveillance Technology: What Intelligence Officials are Saying.” The Information Society 34 (2): 88–103.
  • Chong, D. 1996. “Creating Common Frames of Reference on Political Issues.” In Political Persuasion and Attitude Change, edited by D. C. Mutz, R. A. Brody, and P. M. Sniderman, 196–224. Ann Arbor: University of Michigan Press.
  • Chong, D., and J. N. Druckman. 2007. “A Theory of Framing and Opinion Formation in Competitive Elite Environments.” Journal of Communication 57 (1): 99–118.
  • Chong, D., and J. N. Druckman. 2013. “Counterframing Effects.” The Journal of Politics 75 (1): 1–16.
  • Clarke, M. 1994. “Blind eye on the Street.” Police Review 5: 28–30.
  • Cook, J., and S. Lewandowsky. 2016. “Rational Irrationality: Modeling Climate Change Belief Polarization Using Bayesian Networks.” Topics in Cognitive Science 8 (1): 160–179.
  • Coppedge, M., J. Gerring, C. H. Knutsen, S. I. Lindberg, J. Teorell, D. Altman, M. Bernhard, et al. 2021. V-Dem Dataset v11.1. Available at: doi:10.23696/vdemds21.
  • Coppedge, M., Lindberg, S., Skaaning, S.E. and Teorell, J. 2016. “Measuring High Level Democratic Principles Using the V-Dem Data.” International Political Science Review 37 (5): 580–593.
  • Côté, A. 2016. “Agents Without Agency: Assessing the Role of the Audience in Securitization Theory.” Security Dialogue 47 (6): 541–558.
  • Cruz, C., P. Keefi, and C. Scartascini. 2016. The Database of Political Institutions 2015 (DPI2015). Available at: https://publications.iadb.org/en/database-political-institutions-2015-dpi2015.
  • Dandeker, C. 2005. “Surveillance and Military Transformation: Organizational Trends in Twenty-First-Century Armed Services.” In The New Politics of Surveillance and Visibility, edited by K. D. Haggerty, and R. Ericson, 225–249. Toronto: University of Toronto Press.
  • Davis, D. W., and B. D. Silver. 2004. “Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America.” American Journal of Political Science 48 (1): 28–46.
  • Degli Esposti, S., V. Pavone, E. Santiago-Gómez. 2017. “Citizens’ Privacy Concerns. Does National Culture Matter?” In Surveillance, Privacy and Security: Citizens’ Perspectives, edited by M. Friedewald, J. P. Burgess, and J. Cas. (eds), 71–90. London; New York: Routledge.
  • Dencik, L., and J. Cable. 2017. “Digital Citizenship and Surveillance. The Advent of Surveillance Realism. Public Opinion and Activist Responses to the Snowden Leaks.” International Journal of Communication 11: 763–781.
  • Dharshing, S., S. L. Hille, and R. Wüstenhagen. 2017. “The Influence of Political Orientation on the Strength and Temporal Persistence of Policy Framing Effects.” Ecological Economics 142: 295–305.
  • Dinev, T., M. Bellotto, P. Hart, V. Russo, I. Serra, et al. 2006. “Internet Users' Privacy Concerns and Beliefs About Government Surveillance.” Journal of Global Information Management 14 (4): 57–93.
  • Ditton, J., and E. Short. 1999. “Yes, it Works, no, it Doesn’t: Comparing the Effects of Open-Street CCTV in two Adjacent Scottish Town Centres.” In Surveillance of Public Space: CCTV, Street Lighting and Crime Prevention. Crime Prevention Studies, edited by K. Painter, and N. Tilley, 371–403. Monsey: Criminal Justice Press.
  • Elff, M., Heisig, J.P., Schaeffer, M. and Shikano, S. 2021. “Multilevel Analysis with Few Clusters: Improving Likelihood-Based Methods to Provide Unbiased Estimates and Accurate Inference.” British Journal of Political Science 51 (1): 412–426.
  • Fiske, S. T., and S. E. Taylor. 1984. Social Cognition. New York: Random House.
  • Fonio, C. 2011. “Surveillance Under Mussolini’s Regime.” Surveillance & Society 9 (1/2): 80–92.
  • Freedom House. 2016. Freedom on the Net 2016. Silencing the Messenger: Communication Apps Under Pressure. Available at: https://freedomhouse.org/sites/default/files/FOTN_2016_BOOKLET_FINAL.pdf.
  • Friedewald, M., J. P. Burgess, J. Čas, R. Bellanova, W. Peissl, et al (eds). 2017. Surveillance, Privacy and Security: Citizens’ Perspectives. London; New York: Routledge.
  • Friedewald, M., M. V. Lieshout, S. Rung, M. Ooms, J. Ypma, et al. 2015. “Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model.” In Privacy and Identity Management for the Future Internet in the Age of Globalisation, edited by J. Camenisch, S. Fischer-Hübner, and M. Hansen, 39–53. Heidelberg: Springer VS.
  • Fuchs, C. 2013. “Political Economy and Surveillance Theory.” Critical Sociology 39 (5): 671–687.
  • Garcia, B. E., and N. Geva. 2016. “Security Versus Liberty in the Context of Counterterrorism: An Experimental Approach.” Terrorism and Political Violence 28 (1). Routledge: 30–48.
  • Gellman, R., and P. Dixon. 2011. Online Privacy: A Reference Handbook. Santa Barbara, Denver, Oxford: ABC-CLIO.
  • Gelman, A. 2008. “Scaling Regression Inputs by Dividing by two Standard Deviations.” Statistics in Medicine 27 (15): 2865–2873.
  • Giddens, A. 1987. The Nation-State and Violence: Volume 2 of a Contemporary Critique of Historical Materialism. Berkeley: University of California Press.
  • Gill, S. 1995. “The Global Panopticon? The Neoliberal State, Economic Life, and Democratic Surveillance.” Alternatives: Global, Local, Political 20 (1): 1–49.
  • Gill, M., A. Rose, K. Collins, M. Hemming, et al. 2006. “Redeployable CCTV and Drug-Related Crime: A Case of Implementation Failure.” Drugs: Education, Prevention and Policy 13 (5): 451–460.
  • Goffman, E. 1974. Frame Analysis: An Essay on the Organization of Experience. Cambridge, MA: Harvard University Press.
  • Goffman, A. 2009. “On the Run: Wanted Men in a Philadelphia Ghetto.” American Sociological Review 74 (3): 339–357.
  • Golder, M., and J. Stramski. 2010. “Ideological Congruence and Electoral Institutions.” American Journal of Political Science 54 (1): 90–106.
  • Haggerty, K. D., and A. Gazso. 2005. “Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats.” The Canadian Journal of Sociology / Cahiers Canadiens de Sociologie 30 (2): 169–187.
  • Haider-Markel, D. P., and M. R. Joslyn. 2001. “Gun Policy, Opinion, Tragedy, and Blame Attribution: The Conditional Influence of Issue Frames.” The Journal of Politics 63 (2): 520–543.
  • Hallinan, D., M. Friedewald, and P. McCarthy. 2012. “Citizens’ Perceptions of Data Protection and Privacy in Europe.” Computer Law & Security Review 28 (3): 263–272.
  • Heisig, J. P., and M. Schaeffer. 2019. “Why You ShouldAlwaysInclude a Random Slope for the Lower-Level Variable Involved in a Cross-Level Interaction.” European Sociological Review 35 (2): 258–279.
  • Hofstede, G. 1980. Culture’s Consequences: International Differences in Work-Related Values. Beverly Hills: SAGE Publications.
  • Houston, D. J., N. R. Aitalieva, A. L. Morelock, and C. A. Shults. 2016. “Citizen Trust in Civil Servants: A Cross-National Examination.” International Journal of Public Administration 39 (14): 1203–1214.
  • Hox, J. J. 2010. Multilevel Analysis: Techniques and Applications. 2nd ed. New York: Routledge.
  • ISSP Research Group. 2018. International Social Survey Programme: Role of Government V - ISSP 2016. Available at: doi:10.4232/1.13052.
  • Jost, J. T., and O. Hunyady. 2005. “Antecedents and Consequences of System-Justifying Ideologies.” Current Directions in Psychological Science 14 (5): 260–265.
  • Jost, J. T., and J. L. Napier. 2011. “The Uncertainty-Threat Model of Political Conservatism.” In Extremism and the Psychology of Uncertainty, edited by M. A. Hogg, and D. L. Blaylock, 90–111. New York: John Wiley & Sons, Ltd.
  • Kaplan, S. A., J. N. Luchman, and L. Mock. 2013. “General and Specific Question Sequence Effects in Satisfaction Surveys: Integrating Directional and Correlational Effects.” Journal of Happiness Studies 14 (5): 1443–1458.
  • Klingemann, H.D., Volkens, A., Bara, J., Budge, I. and McDonald, M.D. 2006. Mapping Policy Preferences II: Estimates for Parties, Electors, and Governments in Eastern Europe, European Union, and OECD 1990-2003. Oxford: Oxford University Press.
  • Königs, P. 2022. “Government Surveillance, Privacy, and Legitimacy.” Philosophy & Technology 35 (1): 8.
  • Kunda, Z. 1990. “The Case for Motivated Reasoning.” Psychological Bulletin 108 (3): 480–498.
  • Laidler, K. 2008. Surveillance Unlimited: How We’ve Become the Most Watched People on Earth. Cambridge: Icon Books Ltd.
  • Laver, M., and I. Budge. 1992. Party Policy and Government Coalitions. New York, NY: Palgrave Macmillan.
  • LeBoeuf, R. A., and E. Shafir. 2003. “Deep Thoughts and Shallow Frames: On the Susceptibility to Framing Effects.” Journal of Behavioral Decision Making 16 (2): 77–92.
  • Lee, N.-J., D. M. McLeod, and D. V. Shah. 2008. “Framing Policy Debates.” Communication Research 35 (5): 695–718.
  • Levi, M., and L. Stoker. 2000. “Political Trust and Trustworthiness.” Annual Review of Political Science 3 (1): 475–507.
  • Los, M. 2003. “Crime in Transition: The Post-Communist State, Markets and Crime.” Crime, Crime, Law and Social Change 40 (2): 145–169.
  • Los, M. 2005. “Reshaping of Elites and the Privatization of Security: The Case of Poland.” The Journal of Power Institutions in Post-Soviet Societies 2. Available at: https://journals.openedition.org/pipss/351 (accessed 27 May 2022).
  • Luebcke, D. M., and S. Milton. 1994. “Locating the Victim: An Overview of Census-Taking, Tabulation Technology, and Persecution in Nazi Germany.” IEEE Annals of the History of Computing 16 (16): 25–39.
  • Lundell, K. 2012. “Civic Participation and Political Trust: The Impact of Compulsory Voting.” Representation 48 (2). Routledge: 221–234.
  • Lyon, D. 2009. “Surveillance, Power, and Everyday Life.” In The Oxford Handbook of Information and Communication Technologies, edited by C. Avgerou, R. Mansell, and D. Quah. (eds), 449–468. Oxford: Oxford University Press.
  • Lyon, D. 2015. “The Snowden Stakes: Challenges for Understanding Surveillance Today.” Surveillance & Society 13 (2): 139–152.
  • Marx, G. T. 2007. “Surveys and Surveillance.” In Envisioning the Survey Interview of the Future, edited by F. G. Conrad, and M. F. Schober. (eds), 254–266. New York: John Wiley & Sons, Ltd.
  • Maslow, A. H. 1943. “A Theory of Human Motivation.” Psychological Review 50 (4): 370–396.
  • McCulloch, J., and S. Pickering. 2009. “Pre-Crime and Counter-Terrorism: Imagining Future Crime in the 'War on Terror'.” British Journal of Criminology 49 (5): 628–645.
  • Menichelli, F. 2017. “Beyond the Trade-off Between Privacy and Security? Organizational Routines and Individual Strategies at the Security Check.” In Surveillance, Privacy and Security: Citizens’ Perspectives, edited by M. Friedewald, J. P. Burgess, and J. Cas. (eds), 91–103. London; New York: Routledge.
  • Merolla, J. L., and E. J. Zechmeister. 2009. Democracy at Risk: How Terrorist Threats Affect the Public. 1. Edition. Chicago: University of Chicago Press.
  • Nagy, V. 2017. “How to Silence the Lambs? Constructing Authoritarian Governance in Post-Transitional Hungary.” Surveillance & Society 15 (3/4): 447–455.
  • Nakhaie, R., and W. de Lint. 2013. “Trust and Support for Surveillance Policies in Canadian and American Opinion.” International Criminal Justice Review 23 (2): 149–169.
  • National Consortium for the Study of Terrorism and Responses to Terrorism. 2019. Global Terrorism Database. Available at: https://www.start.umd.edu/gtd/.
  • Norris, P., M. Kern, and M. Just. 2004. “Framing Terrorism.” In Framing Terrorism: The News Media, the Government and the Public, edited by P. Norris, M. Kern, and M. Just, 3–26. New York; London: Routledge.
  • Park, H. H., G. S. Oh, and S. Y. Paek. 2012. “Measuring the Crime Displacement and Diffusion of Benefit Effects of Open-Street CCTV in South Korea.” International Journal of Law, Crime and Justice 40 (3): 179–191.
  • Patil, S., Potoglou, D., Lu, H., Robinson, N. and Burge, P. 2014. “Trade-off Across Privacy, Security and Surveillance in the Case of Metro Travel in Europe.” Transportation Research Procedia 1 (1): 121–132.
  • Pavone, V., and S. Degli Esposti. 2012. “Public Assessment of new Surveillance-Oriented Security Technologies: Beyond the Trade-off Between Privacy and Security.” Public Understanding of Science 21 (5): 556–572.
  • Pavone, V., S. Degli Esposti, and E. Santiago-Gómez. 2015. Key factors affecting acceptance and acceptability of Surveillance-orientated Security Technologies (SOSTs). SurPRISE project, Deliverable 2.4. Available at: https://www.researchgate.net/publication/271700613_Key_factors_affecting_acceptance_and_acceptability_of_Surveillance-orientated_Security_Technologies_SOSTs.
  • Peceny, M., C. C. Beer, and S. Sanchez-Terry. 2002. “Dictatorial Peace?” American Political Science Review 96 (1): 15–26.
  • Petersen, J. K. 2012. Introduction to Surveillance Studies. Boca Raton: CRC Press.
  • Phillips, C. 1999. “A Review of CCTV Evaluations: Crime Reduction Effects and Attitudes To Its Use.” Crime Prevention Studies 10: 123–155.
  • Reddick, C. G., A. T. Chatfield, and P. A. Jaramillo. 2015. “Public Opinion on National Security Agency Surveillance Programs: A Multi-Method Approach.” Government Information Quarterly 32 (2): 129–141.
  • Remster, B., and R. Kramer. 2018. “Race, Space, and Surveillance: Understanding the Relationship Between Criminal Justice Contact and Institutional Involvement.” Socius: Sociological Research for a Dynamic World 4: 1–16.
  • Ryan, M. K. 2018. “Government Surveillance: Racism and Civic Virtue in the United States.” In Surveillance, Race, Culture, edited by S. Flynn, and A. Mackay, 43–59. Cham: Springer International Publishing.
  • Solove, D. J. 2008. “Data Mining and the Security-Liberty Debate.” The University of Chicago Law Review 74 (1): 343–362.
  • Spriggs, A., J. Argomaniz, M. Gill, and J. Bryan. 2005. Public Attitudes Towards CCTV: Results From the Pre-Intervention Public Attitude Survey Carried Out in Areas Implementing CCTV. Home Office Online Report 10/05. London: Home Office. Available at: http://doi.apa.org/get-pe-doi.cfm?doi=10.1037/e635042007-001 (accessed 7 August 2019).
  • Stoycheff, E., G. S. Burgess, and M. C. Martucci. 2018. “Online Censorship and Digital Surveillance: The Relationship Between Suppression Technologies and Democratization Across Countries.” Information, Communication & Society 23 (4): 474–490.
  • Svenonius, O., and F. Björklund. 2018. “Explaining Attitudes to Secret Surveillance in Post-Communist Societies.” East European Politics 34 (2): 123–151.
  • Trüdinger, E.-M. 2020. “Policy-Orientierungen.” In Politikwissenschaftliche Einstellungs- Und Verhaltensforschung. Handbuch Für Wissenschaft Und Studium, edited by T. Faas, O. W. Gabriel, and J. Maier, 309–325. Baden-Baden: Nomos.
  • Tsapogas, D.. 2017. “The Importance of Social and Political Context in Explaining Citizens’ Attitudes Towards Electronic Surveillance and Political Participation.” In Surveillance, Privacy and Security: Citizens’ Perspectives, edited by M. Friedewald, J. P. Burgess, and J. Cas. (eds), 212–232. London; New York: Routledge.
  • UNECE. 2015. Conference of European Statisticians. Recommendations for the 2020 Censuses of Population and Housing. New York; Geneva. Available at: https://www.unece.org/fileadmin/DAM/stats/publications/2015/ECECES41_EN.pdf.
  • van den Broek, T., M. Ooms, M. Friedewald, M. van Lieshout, and S. Rung. 2017. “Privacy and Security: Citizens’ Desires for an Equal Footing.” In Surveillance, Privacy and Security: Citizens’ Perspectives, edited by M. Friedewald, J. P. Burgess, and J. Cas, 15–35. London; New York: Routledge.
  • Viscusi, W. K., and R. J. Zeckhauser. 2003. “Sacrificing Civil Liberties to Reduce Terrorism Risks.” Journal of Risk and Uncertainty 26 (2/3): 99–120.
  • Volkens, A., T. Burst, W. Krause, P. Lehmann, T. Matthieß, N. Merz, S. Regel, B. Weßels, and L. Zehnter. 2020. Manifesto Data Collection. Manifesto Project (MRG/CMP/MARPOR). Berlin: Wissenschaftszentrum Berlin für Sozialforschung (WZB).
  • Vultee, F. 2010. “Securitization as Media Frame.” In Securitization Theory. How Security Problems Emerge and Dissolve, edited by T. Balzacq, 77–93. London: Routledge.
  • Waldron, J. 1987. “Theoretical Foundations of Liberalism.” The Philosophical Quarterly 37 (147): 127–150.
  • Watson, H., R. L. Finn, and D. Barnard-Wills. 2017. “A gap in the Market: The Conceptualisation of Surveillance, Security, Privacy and Trust in Public Opinion Surveys.” Surveillance & Society 15 (2): 269–285.
  • Weller, T. 2012. “The Information State: A Historical Perspective on Surveillance.” In Routledge Handbook of Surveillance Studies, edited by K. Ball, K. D. Haggerty, and D. Lyon, 57–63. London: Routledge.
  • Welsh, B. C., and D. P. Farrington. 2002. Crime Prevention Effects of Closed Circuit Television: A Systematic Review. Home Office Research Study 252. London: Home Office.
  • Wirth, J., C. Maier, and S. Laumer. 2019. “Justification of Mass Surveillance: A Quantitative Study.” Wirtschaftsinformatik 2019 proceedings. Available at: https://aisel.aisnet.org/wi2019/track11/papers/6.
  • Wæver, O. 1995. “Securitization and Desecuritization.” In On Security, edited by R. Lipschutz, 46–86. New York: Columbia University Press.