scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Beyond the security paradox: Ten criteria for a socially informed security policy:

TL;DR: The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy that reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens’ priorities.
Abstract: This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data...

Summary (4 min read)

Introduction

  • Over the past twenty years, but especially since 9/11, security policies in western societies have increasingly adopted pre-emptive measures which are reliant on SurveillanceOriented Security Technologies .
  • The present article tries to overcome these shortcomings by applying an adapted version of a specific type of public engagement method, the citizen summit (Bedsted et al. 2011).
  • Furthermore, in spite of producing more evidence of a security paradox (Eurobarometer 2015) the qualitative methods deployed by the paper demonstrate that there is more to be understood in relation to citizen assessments of SOSTs.
  • From the analysis of the qualitative data gathered across the twelve citizen summits, a set of common criteria emerged.

Normative criteria

  • The acceptability of SOSTs was often linked to the normative context in which the technologies are operated.
  • National and international regulations, transparency and private-public separation were fundamental criteria used by the large majority of participants to say how SOSTs should be managed.

Transparency and accountability

  • Many participants perceived that SOSTs are used in situations in which information, transparency and responsibility are poor or missing.
  • They suggested that SOSTs should only be introduced after providing detailed and accessible information about operation modes, operators, rules, domains and purposes to the public: “the use of SOSTs is opaque, responsible authorities are not known to the public.
  • Several groups made a concrete suggestion to create a “My page”, where one can see a list of everyone who have stored your personal data, and a log of when it is used.
  • Such action would help ensure that clear responsibilities could be identified when things go wrong: “Transparency here is absolutely essential: people want to know what data are being collected, who is responsible for them and what purposes they are intended for” [Swiss National Report, p. 36].
  • Furthermore, surveillance technologies should only be used when it is necessary: “evidence is needed before initiating surveillance and greater transparency from companies and authorities on what the surveillance is used for” [Recommendation, Danish Citizen Summit].

Public-private separation

  • Transparency of operations and international regulations were deemed crucial but not sufficient requirements.
  • The involvement of private actors in security operations and in the management and use of SOSTs generated particular anxiety (Zedner, 2006).
  • They suggested the establishment of such bodies on an international or European level 8 [Norwegian National Report, p. 26].
  • The outsourcing of the security function to private firms was considered especially problematic: “No security services should be outsourced to private companies!” [Postcard, UK Citizen Summit].
  • In circumstances where the involvement of private actors is absolutely necessary, stricter requirements were considered necessary to ensure transparency and accountability.

Data protection criteria

  • Characterised by high 8 Effectively, European and National security agencies have to comply with the new European Directive on Data Protection (2016).
  • Level of secrecy, they considered necessary to inform the public about how security agencies operate and respect people’s rights.
  • Information on how data protection rights, for instance, are safeguarded during police investigation can help diminish citizens’ concerns about the data privacy.
  • The purpose and conditions under which people’s data were processed in security investigations represented a very relevant and controversial theme.
  • Blanket surveillance was especially criticised not only for its impact on privacy and human rights, but also for its effectiveness.

Purpose limitation

  • SOSTs should not be used for operating mass government surveillance, but only for targeting clearly defined threats and within the scope of specific investigations.
  • “Participants argued towards more control of surveillance activities and the demand for justified reasons for surveillance in order to target real suspects and criminals instead of the general public” [Austria National Report, p.33].
  • Mass surveillance was considered detrimental as it undermines citizens’ perceived safety and their trust in security operators.
  • “By vast dragnet surveillance activities of governmental institutions, the trust in the state would get undermined because citizens perceive themselves subjected to a blanket suspicion.
  • Broad surveillance measures involving large parts of the population are seen as disproportionate function or mission creep” [German National Report, p.31].

Data collection limitation

  • Concerns were expressed on the type of data gathered.
  • Some types of data, such as those related to location or bodily appearance, were considered less sensitive than others, such as those related to personal communication.
  • Whenever possible, it was argued, security actions should target the least sensitive data in the least sensitive spaces, as this comment reveals: “[a]t some tables participants expressed that they found location as a less sensitive type of data than for example the content of their communication, which can be accessed through deep packet inspection” [Norway National Report p. 28].
  • Thus, the implementation of basic data management norms, such as EU data protection principles, was recognised by citizens as an important criterium determining the acceptability of SOSTs.
  • “We need clear rules concerning the limits on use and collection of personal data by technological means.the authors.

Technology deployment criteria

  • Concerns about the ways in which technologies are designed and deployed were also addressed by citizens.
  • The cost of developing and implementing new surveillance devices was a highly relevant issue, which was discussed in conjunction with themes related to alternative security measures and solutions to complement or improve SOSTs, such as the adoption of privacy-by-design principles in the design phase.

Cost-effectiveness

  • Since tax payers’ money is involved in the acquisition and deployment of SOSTs, it is not surprising that participants wanted to receive more information about the appropriateness, costs and impact of SOSTs: “I have no problems with smart CCTV but the use of it, the running costs, the legitimacy and the effectiveness of it needs to be carefully monitored.
  • And the watchers made accountable” [Postcard, UK Citizen Summit].
  • As most of these technologies are developed, implemented and operated by public institutions, the presentation of exhaustive cost-benefit analyses was considered absolutely necessary—.
  • Very concerned about the future” (UK postcard).
  • Others pointed out that SOSTs need to be supervised and operated by qualified staff—“maintaining the human factor, that is to say, not replacing humans for robots in processes and their uses” (Spanish recommendation).

Alternative security approaches

  • In designing new security solutions, social, cultural and economic causes of crime and terrorism should never be forgotten (UN, 2007), and humans should be considered part of the solutions, not only part of the problem—in terms of, for example, criminals or suspects.
  • Participants also suggested that SOSTs should be used to support, not to replace, the work of human operators.
  • Right to access, modify and delete data … they allow monitored individuals to access, modify and remove their own data.
  • Whilst their purposes may change, these changes need to be explicitly discussed and publicly approved.
  • Non-technological alternatives and security measures not based on surveillance … they work and operate in combination with non-technological measures and social strategies addressing the social and economic causes of insecurity.

5. Conclusion

  • Increasing reliance on security policies that use SOSTs has sparked lively debate about their acceptance.
  • DREWER, D. Europol’s data protection framework as an asset in the fight against cybercrime.
  • Engaging with science and technology in contemporary Europe, also known as Public deliberation and governance.
  • The European Union and the securitization of migration.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

1
INDICATIVE VERSION: DO NOT CITE WITHOUT PERMISSION
FROM THE AUTHORS
Beyond the security paradox: ten criteria for a socially informed
security policy
Abstract
This paper investigates the normative and procedural criteria adopted by European
citizens to assess the acceptability of surveillance technologies. It draws on qualitative
data gathered at twelve citizen summits in nine European countries. The analysis
identifies ten criteria, generated by citizens themselves, for a socially informed security
policy. These criteria not only reveal the conditions, purposes and operation rules that
would make current European security policies and technologies more consistent with
citizens’ priorities. They also cast light on an interesting paradox: although people feel
safe in their daily lives, they believe security could, and should, be improved.
Keywords
Public engagement, surveillance technology, security, privacy preference

2
Introduction
Over the past twenty years, but especially since 9/11, security policies in western societies
have increasingly adopted pre-emptive measures which are reliant on Surveillance-
Oriented Security Technologies (SOSTs). This shift has had controversial consequences,
with scholars highlighting a variety of concerns they associate with pre-emptive security
and surveillance practices (Hoijtink, 2014, De Goede, 2014, De Goede and Randalls,
2009). As new SOSTs facilitate the collection, storage, processing and combination of
personal data by security agencies and commercial organizations, their impact on
established civil and political rights (Friedewald et al., 2010), social sorting (Strauß and
Nentwich, 2013, Lyon, 2007a), and on individual privacy (Lyon, 2002)
1
has been
criticized.
With so many concerns raised by technologies over which citizens have little
control, it would be reasonable to expect Public Engagement with Science (PES) studies
to have scrutinised how people assess these technologies and their implementation.
However, SOSTs have so far received relatively little attention (Martin and Donovan,
2014, Pavone and Degli Esposti, 2012). Inspired by an unquestioned acceptance of the
trade-off between privacy and security, early studies tend instead to consider the extent
to which citizens are willing to trade their privacy in exchange for greater security
(Bowyer, 2004, Jain et al., 2005, Strickland and Hunt, 2005). More recent studies have
focused on the decision-making process involved in the development and implementation
1
Many of these concerns have been recently confirmed by the scandals and abuses revealed by
whistleblowers like Assange, Snowden and Manning in LANDAU, S. 2013. Making sense from
Snowden: What's significant in the NSA surveillance revelations. IEEE Security & Privacy, 54-63,
LYON, D. 2014. Surveillance, snowden, and big data: capacities, consequences, critique. Big Data &
Society, 1, 2053951714541861, BAUMAN, Z., BIGO, D., ESTEVES, P., GUILD, E., JABRI, V.,
LYON, D. & WALKER, R. B. 2014. After Snowden: Rethinking the impact of surveillance.
International political sociology, 8, 121-144.

3
of SOSTs (Hempel et al., 2013, van Lieshout et al., 2013, Wright and Friedewald, 2013,
Wright et al., 2014, Michael Friedewald et al., 2017).
The present study hopes to contribute to this line of inquiry by focusing on an
interesting paradox: although people feel safe in their daily lives, they believe security
could, and should, be improved. Evidence of this paradox can be found in Eurobarometer
432Europeans’ attitudes towards security (EC, 2015). The report indicates that,
although the large majority of respondents consider their countries secure places (89
percent; n = 28,082), and agree on saying that their immediate neighbourhood, city, town
or village are safe places to live in (82 percent), a large percentage of them think that
security agencies are not doing enough to fight crimes such as corruption (52 percent),
human trafficking (47 percent), money laundering (46 percent), drug trafficking (41
percent), or cybercrime (40 percent), and that citizens (79 percent) and citizens
associations (64 percent) could also help and play a role in safeguarding public security.
Furthermore, the majority of European citizens (55 percent) consider that fundamental
rights and freedoms have been restricted as a result of current security policies. This
negative perception of the effect of security policies on individual freedoms seems to be
worse in 2015 than it was in 2011, when only 48 percent considered their liberties to have
been restricted for reasons related to the fight of crime and terrorism (EC, 2014). These
findings seem to suggest that current security policies and solutions are somehow
perceived as inadequate by citizens, whose demands, opinions and perceptions need to be
further explored and included in future security policies. In pursuing this objective, PES
studies can stimulate productive and insightful discussion about the politics and purposes
of science and technology (Stirling, 2008). They also have a role in producing new and
socially responsible knowledge that can underpin innovation (Owen et al., 2012),

4
governance (Macnaghten and Chilvers, 2014) and policy-making (Jasanoff, 2003,
Hagendijk and Irwin, 2006).
Through the adoption of an adapted version of the citizen summit methodology,
this paper analyses the multiple ways in which citizens interpret security and privacy and
assess and evaluate SOSTs. Drawing from qualitative data gathered at twelve citizen
summits in nine European countries, this article presents ten general criteria used by
citizens to assess the adequacy of SOSTs. On the one hand, the analysis confirms the
appropriateness of policy actions undertaken in the area of data protection; on the other
hand, it also suggests alternative normative and procedural principles, which could be
adopted in the design, deployment and management of security technologies and that can
increase the acceptability of future security solutions.
Exploring SOSTs from a public engagement perspective
Over the past twenty years, the concept of security has undergone multiple
reformulations. It has shifted from territorial integrity and national sovereignty to human
security and, after 9/11, to a new concept of homeland security. New security policies
have particularly encouraged pre-emptive security measures, enacted through the
development of data-intensive security technologies and public-private security
collaboration. These measures have been introduced within policy frameworks which
justify the restriction of individual privacy and freedom; a matter of political concern
(Beck and Lau, 2005, Richards, 2012, Cohen, 2014, Lyon, 2007b, Lyon, 2013,
Friedewald et al., 2010). Some scholars argue that new holistic security policies suffer
from a democratic deficit (Zwolski, 2012, Eriksen et al., 2003, Tonra, 2011); they aslo
tend to reduce democratic scrutiny in other policy domains by framing social problems

5
as security problems (Huysmans, 2006, Huysmans, 2000, Loader, 2002, Balzacq, 2010,
Balzacq, 2008). Several studies have shown how the security agenda increasingly
constructs migration, crime and social integration as existential threats, addressing them
in very narrow security terms and shifting attention away from the role played by social,
political and economic factors (Léonard, 2010, Karyotis, 2011, Boswell, 2007, Dover,
2008).
Security solutions which rely heavily on digital surveillance have been especially
criticized for different reasons. First, they privilege pre-emptive approaches based on
pattern discovery over forms of targeted and historically motivated tracking (Lyon, 2014).
Furthermore, their impact on crime reduction is contested (Welsh et al., 2015) and can
encourage crime displacement (Johnson et al., 2012). Finally, more recent studies of
privacy concerns demonstrate that most people feel resigned and powerless when
confronted with the current reality of mass dataveillance (Degli Esposti, 2014, Turow et
al., 2015).
Despite the relevancy of the topic and the need to investigate public perceptions of
security technologies, most studies in the area suffer the limitations of having replicated
policymaker discourses concerning the existence of a trade-off between privacy and
security (Strickland and Hunt, 2005). In framing security and privacy as interchangeable
goods, these studies have not explored, for instance, whether security technologies
actually address citizens’ security needs and priorities (Jain et al., 2005), how privacy is
conceptualized, or whether citizens actually frame the latter in opposition to security
(Strickland and Hunt, 2005). Furthermore, these studies have contributed to perpetuate
security policies that considerably reduce privacy without offering significant gains in
security (Mitchener-Nissen, 2014, Pavone et al., 2016). In fact, studies based on the

Citations
More filters
01 Jan 2018
TL;DR: The conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona.
Abstract: Presentacio sobre l'Oficina de Proteccio de Dades Personals de la UAB i la politica Open Science. Va formar part de la conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona

665 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide empirical research about the perspectives of citizens of Rotterdam, the Netherlands, on the emergent phenomenon of smart urban safety, which advocates advanced uses of digital technologies and data for urban safety management, and is gaining currency in thinking about urban futures.

15 citations

Journal ArticleDOI
TL;DR: Analyzing the recent investigation of public views on biobanking in the form of citizen-expert panels in the Austrian infrastructure of biobanks (BBMRI), this article traces this dynamic through citizens’ recurrent concerns that the research and consent practices related to biobank should be “appropriate.”
Abstract: While there is consensus on the essential importance of public engagement in further developments of biobanking, the related investigation of public views predominantly focused on the concerns expressed by the publics, and the concrete format of public engagement, without delving into the ways these concerns are constituted. In this paper, we synthetize recent research on public engagement in order to describe the constitution of respective concerns as ‘engagement of knowledges’. By shifting from ‘publics’ to ‘knowledges’, we draw attention to the interaction dynamic through which citizens embed the new knowledge they receive during expert interactions into the stock of knowledge they already possess. Analyzing our recent investigation of public views on biobanking in the form of citizen-expert panels (CEPs) in the Austrian infrastructure of biobanks (BBMRI.at), we trace this dynamic through citizens’ recurrent concerns that the research and consent practices related to biobanking should be “appropriate”.

15 citations


Cites background from "Beyond the security paradox: Ten cr..."

  • ...…for informed consent procedures, such an approach can help us follow the process of production of knowledge and its being sustained in a particular set of attitudes within a collective (as show Veenstra and Burnett (2014) for health practices, Pavone et al. (2017) for security practices)....

    [...]

  • ...On the other hand, the demand for security necessarily enhances the role of trust in the experts (as shown also by Pavone et al., 2017)....

    [...]

Journal ArticleDOI
TL;DR: Lazaridis et al. as discussed by the authors described the security, insecurity, and migration in Europe as a result of an international conference hosted by the Unesco.
Abstract: Gabriella Lazaridis (ed.), SECURITY, INSECURITY AND MIGRATION IN EUROPE, Farnham: Ashgate, 2011, 328 pp., £65.00 (hard) This book emerged as a result of an international conference hosted by the Un...

11 citations

References
More filters
Book
01 Apr 2008
TL;DR: This chapter discusses how to design qualitative research, which involves sampling, selecting and access, and ethics in qualitative research.
Abstract: 1. What is qualitative research? 2. From an idea to a research question 3. How to design qualitative research 4. Sampling, selecting and access 5. Resources and stumbling blocks 6. Quality in qualitative research 7. Ethics in qualitative research 8. Verbal data 9. Ethnography and visual data 10. Analyzing qualitative data 11. Beyond method: Grounded Theory, Triangulation and Mixed Methods 12. Designing qualitative research: some conclusions

5,480 citations


"Beyond the security paradox: Ten cr..." refers methods in this paper

  • ...The data were analysed using thematic data analysis, which is a flexible method for identifying, analysing and reporting themes within qualitative data (Marshall and Rossman, 2011)....

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors focus on the role of power in science and technology and identify key commonalities transcending the analysis/participation dichotomy, concluding that greater appreciation is required in both analytic and participatory appraisal to facilitate the opening up (rather than the closing down) of governance commitments on science and technologies.
Abstract: Discursive deference in the governance of science and technology is rebalancing from expert analysis toward participatory deliberation. Linear, scientistic conceptions of innovation are giving ground to more plural, socially situated understandings. Yet, growing recognition of social agency in technology choice is countered by persistently deterministic notions of technological progress. This article addresses this increasingly stark disjuncture. Distinguishing between appraisal and commitment in technology choice, it highlights contrasting implications of normative, instrumental, and substantive imperatives in appraisal. Focusing on the role of power, it identifies key commonalities transcending the analysis/participation dichotomy. Each is equally susceptible to instrumental framing for variously weak and strong forms of justification. To address the disjuncture, it is concluded that greater appreciation is requiredin both analytic and participatory appraisalto facilitating the opening up (rather than the closing down) of governance commitments on science and technology.

1,207 citations

Journal ArticleDOI
TL;DR: The concept of responsible research and innovation has gained increasing EU policy relevance in the last two years, in particular within the European Commission's Science in Society programme, in the context of the Horizon 2020 Strategy as mentioned in this paper.
Abstract: The term responsible (research and) innovation has gained increasing EU policy relevance in the last two years, in particular within the European Commission’s Science in Society programme, in the context of the Horizon 2020 Strategy. We provide a brief historical overview of the concept, and identify three distinct features that are emerging from associated discourses. The first is an emphasis on the democratic governance of the purposes of research and innovation and their orientation towards the ‘right impacts’. The second is responsiveness, emphasising the integration and institutionalisation of established approaches of anticipation, reflection and deliberation in and around research and innovation, influencing the direction of these and associated policy. The third concerns the framing of responsibility itself in the context of research and innovation as collective activities with uncertain and unpredictable consequences. Finally, we reflect on possible motivations for responsible innovation itself.

1,085 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...They also have a role in producing new and socially responsible knowledge that can underpin innovation (Owen et al., 2012), governance (Macnaghten and Chilvers, 2014) and policy-making (Hagendijk and Irwin, 2006; Jasanoff, 2003)....

    [...]

Journal ArticleDOI
Jef Huysmans1
TL;DR: In this article, the authors deal with the question of how migration has developed into a security issue in western Europe and how the European integration process is implicated in it and how migration can be viewed as a threat to public order.
Abstract: This article deals with the question of how migration has developed into a security issue in western Europe and how the European integration process is implicated in it. Since the 1980s, the political construction of migration increasingly referred to the destabilizing effects of migration on domestic integration and to the dangers for public order it implied. The spillover of the internal market into a European internal security question mirrors these domestic developments at the European level. The Third Pillar on Justice and Home Affairs, the Schengen Agreements, and the Dublin Convention most visibly indicate that the European integration process is implicated in the development of a restrictive migration policy and the social construction of migration into a security question. However, the political process of connecting migration to criminal and terrorist abuses of the internal market does not take place in isolation. It is related to a wider politicization in which immigrants and asylum-seekers are portrayed as a challenge to the protection of national identity and welfare provisions. Moreover, supporting the political construction of migration as a security issue impinges on and is embedded in the politics of belonging in western Europe. It is an integral part of the wider technocratic and political process in which professional agencies ‐ such as the police and customs ‐ and political agents ‐ such as social

1,044 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...…that new holistic security policies suffer from a democratic deficit (Eriksen et al., 2003; Tonra, 2011; Zwolski, 2012); they also tend to reduce democratic scrutiny in other policy domains by framing social problems as security problems (Balzacq, 2008, 2010; Huysmans, 2000, 2006; Loader, 2002)....

    [...]

Journal ArticleDOI
TL;DR: In this paper, the authors challenge the de facto orthodoxy that has connected the deficit model and contextualist perspectives with quantitative and qualitative research methods respectively, pointing out the clear importance of knowledge as a determinant of attitudes toward science.
Abstract: The “deficit model” of public attitudes towards science has led to controversy over the role of scientific knowledge in explaining lay people’s attitudes towards science. In this paper we challenge the de facto orthodoxy that has connected the deficit model and contextualist perspectives with quantitative and qualitative research methods respectively. We simultaneously test hypotheses from both theoretical approaches using quantitative methodology. The results point to the clear importance of knowledge as a determinant of attitudes toward science. However, in contrast to the rather simplistic deficit model that has traditionally characterized discussions of this relationship, this analysis highlights the complex and interacting nature of the knowledge— attitude interface.

1,004 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...However, they have also been criticised as the data gathered are often not sufficiently robust to feed scientific research and guide policy development (Sturgis, 2014; Sturgis and Allum, 2004)....

    [...]

Frequently Asked Questions (12)
Q1. What are the contributions in "Indicative version: do not cite without permission from the authors beyond the security paradox: ten criteria for a socially informed security policy" ?

This paper investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance technologies. 

The future of science governance: publics, policies, practices. Failure to collectively assess surveillance-oriented security technologies will inevitably lead to an absolute surveillance society. The potential of public participation to facilitate infrastructure decision-making: Lessons from the German and European legal planning system for electricity grid expansion. 

National and international regulations, transparency and private-public separation were fundamental criteria used by the large majority of participants to say how SOSTs should be managed. 

New security policies have particularly encouraged pre-emptive security measures, enacted through the development of data-intensive security technologies and public-private security collaboration. 

As a result of the increasing surveillance and of the progressive restriction of civil rights triggered by pre-emptive security polices based on SOSTs, several scholars have warned about the implications for democracy and for personal privacy. 

the majority of European citizens (55 percent) consider that fundamental rights and freedoms have been restricted as a result of current security policies. 

Utilities Policy, 42, 64-73.STIRLING, A. 2008. “Opening up” and “closing down” power, participation, and pluralism in the social appraisal of technology. 

Participants in Switzerland, Germany and Austria tended to frame privacy as a right to be left alone, as expressed by a note-taker in Germany: “citizens feel a chilling effect on their behaviour, deriving from the wish to be left alone. 

The idea of privacy-by-design (Cavoukian, 2011) was mentioned as a possible solution to design privacy-preserving SOSTs and, thus, protect citizens’ privacy: “the concept of “privacy by design” was mentioned, hoping that future technology developers would use their knowledge to increase privacy, instead of increasing surveillance” [Norway National Report, p. 23]. 

Through the adoption of an adapted version of the citizen summit methodology,this paper analyses the multiple ways in which citizens interpret security and privacy and assess and evaluate SOSTs. 

As new SOSTs facilitate the collection, storage, processing and combination of personal data by security agencies and commercial organizations, their impact on established civil and political rights (Friedewald et al., 2010), social sorting (Strauß and Nentwich, 2013, Lyon, 2007a), and on individual privacy (Lyon, 2002) 1 has been criticized. 

Despite these limitations, their study makes an important contribution to shed light on citizens’ perceptions of SOSTs and confirms the important role that participative exercises can play in increasing their understanding of how people frame complex policy issues.