scispace - formally typeset
Journal ArticleDOI

Beyond the security paradox: Ten criteria for a socially informed security policy:

01 Aug 2018-Public Understanding of Science (SAGE Publications)-Vol. 27, Iss: 6, pp 638-654

...read more

Content maybe subject to copyright    Report

1
INDICATIVE VERSION: DO NOT CITE WITHOUT PERMISSION
FROM THE AUTHORS
Beyond the security paradox: ten criteria for a socially informed
security policy
Abstract
This paper investigates the normative and procedural criteria adopted by European
citizens to assess the acceptability of surveillance technologies. It draws on qualitative
data gathered at twelve citizen summits in nine European countries. The analysis
identifies ten criteria, generated by citizens themselves, for a socially informed security
policy. These criteria not only reveal the conditions, purposes and operation rules that
would make current European security policies and technologies more consistent with
citizens’ priorities. They also cast light on an interesting paradox: although people feel
safe in their daily lives, they believe security could, and should, be improved.
Keywords
Public engagement, surveillance technology, security, privacy preference

2
Introduction
Over the past twenty years, but especially since 9/11, security policies in western societies
have increasingly adopted pre-emptive measures which are reliant on Surveillance-
Oriented Security Technologies (SOSTs). This shift has had controversial consequences,
with scholars highlighting a variety of concerns they associate with pre-emptive security
and surveillance practices (Hoijtink, 2014, De Goede, 2014, De Goede and Randalls,
2009). As new SOSTs facilitate the collection, storage, processing and combination of
personal data by security agencies and commercial organizations, their impact on
established civil and political rights (Friedewald et al., 2010), social sorting (Strauß and
Nentwich, 2013, Lyon, 2007a), and on individual privacy (Lyon, 2002)
1
has been
criticized.
With so many concerns raised by technologies over which citizens have little
control, it would be reasonable to expect Public Engagement with Science (PES) studies
to have scrutinised how people assess these technologies and their implementation.
However, SOSTs have so far received relatively little attention (Martin and Donovan,
2014, Pavone and Degli Esposti, 2012). Inspired by an unquestioned acceptance of the
trade-off between privacy and security, early studies tend instead to consider the extent
to which citizens are willing to trade their privacy in exchange for greater security
(Bowyer, 2004, Jain et al., 2005, Strickland and Hunt, 2005). More recent studies have
focused on the decision-making process involved in the development and implementation
1
Many of these concerns have been recently confirmed by the scandals and abuses revealed by
whistleblowers like Assange, Snowden and Manning in LANDAU, S. 2013. Making sense from
Snowden: What's significant in the NSA surveillance revelations. IEEE Security & Privacy, 54-63,
LYON, D. 2014. Surveillance, snowden, and big data: capacities, consequences, critique. Big Data &
Society, 1, 2053951714541861, BAUMAN, Z., BIGO, D., ESTEVES, P., GUILD, E., JABRI, V.,
LYON, D. & WALKER, R. B. 2014. After Snowden: Rethinking the impact of surveillance.
International political sociology, 8, 121-144.

3
of SOSTs (Hempel et al., 2013, van Lieshout et al., 2013, Wright and Friedewald, 2013,
Wright et al., 2014, Michael Friedewald et al., 2017).
The present study hopes to contribute to this line of inquiry by focusing on an
interesting paradox: although people feel safe in their daily lives, they believe security
could, and should, be improved. Evidence of this paradox can be found in Eurobarometer
432Europeans’ attitudes towards security (EC, 2015). The report indicates that,
although the large majority of respondents consider their countries secure places (89
percent; n = 28,082), and agree on saying that their immediate neighbourhood, city, town
or village are safe places to live in (82 percent), a large percentage of them think that
security agencies are not doing enough to fight crimes such as corruption (52 percent),
human trafficking (47 percent), money laundering (46 percent), drug trafficking (41
percent), or cybercrime (40 percent), and that citizens (79 percent) and citizens
associations (64 percent) could also help and play a role in safeguarding public security.
Furthermore, the majority of European citizens (55 percent) consider that fundamental
rights and freedoms have been restricted as a result of current security policies. This
negative perception of the effect of security policies on individual freedoms seems to be
worse in 2015 than it was in 2011, when only 48 percent considered their liberties to have
been restricted for reasons related to the fight of crime and terrorism (EC, 2014). These
findings seem to suggest that current security policies and solutions are somehow
perceived as inadequate by citizens, whose demands, opinions and perceptions need to be
further explored and included in future security policies. In pursuing this objective, PES
studies can stimulate productive and insightful discussion about the politics and purposes
of science and technology (Stirling, 2008). They also have a role in producing new and
socially responsible knowledge that can underpin innovation (Owen et al., 2012),

4
governance (Macnaghten and Chilvers, 2014) and policy-making (Jasanoff, 2003,
Hagendijk and Irwin, 2006).
Through the adoption of an adapted version of the citizen summit methodology,
this paper analyses the multiple ways in which citizens interpret security and privacy and
assess and evaluate SOSTs. Drawing from qualitative data gathered at twelve citizen
summits in nine European countries, this article presents ten general criteria used by
citizens to assess the adequacy of SOSTs. On the one hand, the analysis confirms the
appropriateness of policy actions undertaken in the area of data protection; on the other
hand, it also suggests alternative normative and procedural principles, which could be
adopted in the design, deployment and management of security technologies and that can
increase the acceptability of future security solutions.
Exploring SOSTs from a public engagement perspective
Over the past twenty years, the concept of security has undergone multiple
reformulations. It has shifted from territorial integrity and national sovereignty to human
security and, after 9/11, to a new concept of homeland security. New security policies
have particularly encouraged pre-emptive security measures, enacted through the
development of data-intensive security technologies and public-private security
collaboration. These measures have been introduced within policy frameworks which
justify the restriction of individual privacy and freedom; a matter of political concern
(Beck and Lau, 2005, Richards, 2012, Cohen, 2014, Lyon, 2007b, Lyon, 2013,
Friedewald et al., 2010). Some scholars argue that new holistic security policies suffer
from a democratic deficit (Zwolski, 2012, Eriksen et al., 2003, Tonra, 2011); they aslo
tend to reduce democratic scrutiny in other policy domains by framing social problems

5
as security problems (Huysmans, 2006, Huysmans, 2000, Loader, 2002, Balzacq, 2010,
Balzacq, 2008). Several studies have shown how the security agenda increasingly
constructs migration, crime and social integration as existential threats, addressing them
in very narrow security terms and shifting attention away from the role played by social,
political and economic factors (Léonard, 2010, Karyotis, 2011, Boswell, 2007, Dover,
2008).
Security solutions which rely heavily on digital surveillance have been especially
criticized for different reasons. First, they privilege pre-emptive approaches based on
pattern discovery over forms of targeted and historically motivated tracking (Lyon, 2014).
Furthermore, their impact on crime reduction is contested (Welsh et al., 2015) and can
encourage crime displacement (Johnson et al., 2012). Finally, more recent studies of
privacy concerns demonstrate that most people feel resigned and powerless when
confronted with the current reality of mass dataveillance (Degli Esposti, 2014, Turow et
al., 2015).
Despite the relevancy of the topic and the need to investigate public perceptions of
security technologies, most studies in the area suffer the limitations of having replicated
policymaker discourses concerning the existence of a trade-off between privacy and
security (Strickland and Hunt, 2005). In framing security and privacy as interchangeable
goods, these studies have not explored, for instance, whether security technologies
actually address citizens’ security needs and priorities (Jain et al., 2005), how privacy is
conceptualized, or whether citizens actually frame the latter in opposition to security
(Strickland and Hunt, 2005). Furthermore, these studies have contributed to perpetuate
security policies that considerably reduce privacy without offering significant gains in
security (Mitchener-Nissen, 2014, Pavone et al., 2016). In fact, studies based on the



Citations
More filters

[...]

01 Jan 2018
TL;DR: The conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona.
Abstract: Presentacio sobre l'Oficina de Proteccio de Dades Personals de la UAB i la politica Open Science. Va formar part de la conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona

385 citations

[...]

01 Jan 1987

241 citations

Journal ArticleDOI

[...]

TL;DR: Lazaridis et al. as discussed by the authors described the security, insecurity, and migration in Europe as a result of an international conference hosted by the Unesco.
Abstract: Gabriella Lazaridis (ed.), SECURITY, INSECURITY AND MIGRATION IN EUROPE, Farnham: Ashgate, 2011, 328 pp., £65.00 (hard) This book emerged as a result of an international conference hosted by the Un...

10 citations

Journal ArticleDOI

[...]

TL;DR: Analyzing the recent investigation of public views on biobanking in the form of citizen-expert panels in the Austrian infrastructure of biobanks (BBMRI), this article traces this dynamic through citizens’ recurrent concerns that the research and consent practices related to biobank should be “appropriate.”
Abstract: While there is consensus on the essential importance of public engagement in further developments of biobanking, the related investigation of public views predominantly focused on the concerns expressed by the publics, and the concrete format of public engagement, without delving into the ways these concerns are constituted. In this paper, we synthetize recent research on public engagement in order to describe the constitution of respective concerns as ‘engagement of knowledges’. By shifting from ‘publics’ to ‘knowledges’, we draw attention to the interaction dynamic through which citizens embed the new knowledge they receive during expert interactions into the stock of knowledge they already possess. Analyzing our recent investigation of public views on biobanking in the form of citizen-expert panels (CEPs) in the Austrian infrastructure of biobanks (BBMRI.at), we trace this dynamic through citizens’ recurrent concerns that the research and consent practices related to biobanking should be “appropriate”.

10 citations


Cites background from "Beyond the security paradox: Ten cr..."

  • [...]

  • [...]

[...]

01 Jan 2019
TL;DR: This survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management and finds the willingness to share data during an imminent threat depends mostly on the type of data.
Abstract: Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63% and 67%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

6 citations


Cites background from "Beyond the security paradox: Ten cr..."

  • [...]

  • [...]


References
More filters
Book

[...]

01 Apr 2008
TL;DR: This chapter discusses how to design qualitative research, which involves sampling, selecting and access, and ethics in qualitative research.
Abstract: 1. What is qualitative research? 2. From an idea to a research question 3. How to design qualitative research 4. Sampling, selecting and access 5. Resources and stumbling blocks 6. Quality in qualitative research 7. Ethics in qualitative research 8. Verbal data 9. Ethnography and visual data 10. Analyzing qualitative data 11. Beyond method: Grounded Theory, Triangulation and Mixed Methods 12. Designing qualitative research: some conclusions

5,081 citations


"Beyond the security paradox: Ten cr..." refers methods in this paper

  • [...]

Journal ArticleDOI

[...]

TL;DR: In this article, the authors focus on the role of power in science and technology and identify key commonalities transcending the analysis/participation dichotomy, concluding that greater appreciation is required in both analytic and participatory appraisal to facilitate the opening up (rather than the closing down) of governance commitments on science and technologies.
Abstract: Discursive deference in the governance of science and technology is rebalancing from expert analysis toward participatory deliberation. Linear, scientistic conceptions of innovation are giving ground to more plural, socially situated understandings. Yet, growing recognition of social agency in technology choice is countered by persistently deterministic notions of technological progress. This article addresses this increasingly stark disjuncture. Distinguishing between appraisal and commitment in technology choice, it highlights contrasting implications of normative, instrumental, and substantive imperatives in appraisal. Focusing on the role of power, it identifies key commonalities transcending the analysis/participation dichotomy. Each is equally susceptible to instrumental framing for variously weak and strong forms of justification. To address the disjuncture, it is concluded that greater appreciation is requiredin both analytic and participatory appraisalto facilitating the opening up (rather than the closing down) of governance commitments on science and technology.

1,061 citations

Journal ArticleDOI

[...]

Jef Huysmans1
TL;DR: In this article, the authors deal with the question of how migration has developed into a security issue in western Europe and how the European integration process is implicated in it and how migration can be viewed as a threat to public order.
Abstract: This article deals with the question of how migration has developed into a security issue in western Europe and how the European integration process is implicated in it. Since the 1980s, the political construction of migration increasingly referred to the destabilizing effects of migration on domestic integration and to the dangers for public order it implied. The spillover of the internal market into a European internal security question mirrors these domestic developments at the European level. The Third Pillar on Justice and Home Affairs, the Schengen Agreements, and the Dublin Convention most visibly indicate that the European integration process is implicated in the development of a restrictive migration policy and the social construction of migration into a security question. However, the political process of connecting migration to criminal and terrorist abuses of the internal market does not take place in isolation. It is related to a wider politicization in which immigrants and asylum-seekers are portrayed as a challenge to the protection of national identity and welfare provisions. Moreover, supporting the political construction of migration as a security issue impinges on and is embedded in the politics of belonging in western Europe. It is an integral part of the wider technocratic and political process in which professional agencies ‐ such as the police and customs ‐ and political agents ‐ such as social

950 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • [...]

Journal ArticleDOI

[...]

TL;DR: In this paper, the authors challenge the de facto orthodoxy that has connected the deficit model and contextualist perspectives with quantitative and qualitative research methods respectively, pointing out the clear importance of knowledge as a determinant of attitudes toward science.
Abstract: The “deficit model” of public attitudes towards science has led to controversy over the role of scientific knowledge in explaining lay people’s attitudes towards science. In this paper we challenge the de facto orthodoxy that has connected the deficit model and contextualist perspectives with quantitative and qualitative research methods respectively. We simultaneously test hypotheses from both theoretical approaches using quantitative methodology. The results point to the clear importance of knowledge as a determinant of attitudes toward science. However, in contrast to the rather simplistic deficit model that has traditionally characterized discussions of this relationship, this analysis highlights the complex and interacting nature of the knowledge— attitude interface.

893 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • [...]

Book

[...]

01 Jan 2006
TL;DR: The book critically engages with theoretical developments in international relations and security studies to develop a fresh conceptual framework for studying security.
Abstract: The book critically engages with theoretical developments in international relations and security studies to develop a fresh conceptual framework for studying security. Contents 1. Politics of insecurity, technology and the political 2. Security framing: the question of the meaning of security 3. Displacing the spectre of the state in security studies: From referent objects to techniques of government 4. Securitizing migration: Freedom from existential threats and the constitution of insecure communities 5. European integration and societal insecurity 6. Freedom and security in the EU: A Foucaultian view on spill-over 7. Migration, securitization and the question of political community in the EU 8. De-securitizing migration: Security knowledge and concepts of the political 9. Conclusion: the politics of framing insecurity

890 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • [...]



Frequently Asked Questions (12)
Q1. What are the contributions in "Indicative version: do not cite without permission from the authors beyond the security paradox: ten criteria for a socially informed security policy" ?

This paper investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance technologies. 

The future of science governance: publics, policies, practices. Failure to collectively assess surveillance-oriented security technologies will inevitably lead to an absolute surveillance society. The potential of public participation to facilitate infrastructure decision-making: Lessons from the German and European legal planning system for electricity grid expansion. 

National and international regulations, transparency and private-public separation were fundamental criteria used by the large majority of participants to say how SOSTs should be managed. 

New security policies have particularly encouraged pre-emptive security measures, enacted through the development of data-intensive security technologies and public-private security collaboration. 

As a result of the increasing surveillance and of the progressive restriction of civil rights triggered by pre-emptive security polices based on SOSTs, several scholars have warned about the implications for democracy and for personal privacy. 

the majority of European citizens (55 percent) consider that fundamental rights and freedoms have been restricted as a result of current security policies. 

Utilities Policy, 42, 64-73.STIRLING, A. 2008. “Opening up” and “closing down” power, participation, and pluralism in the social appraisal of technology. 

Participants in Switzerland, Germany and Austria tended to frame privacy as a right to be left alone, as expressed by a note-taker in Germany: “citizens feel a chilling effect on their behaviour, deriving from the wish to be left alone. 

The idea of privacy-by-design (Cavoukian, 2011) was mentioned as a possible solution to design privacy-preserving SOSTs and, thus, protect citizens’ privacy: “the concept of “privacy by design” was mentioned, hoping that future technology developers would use their knowledge to increase privacy, instead of increasing surveillance” [Norway National Report, p. 23]. 

Through the adoption of an adapted version of the citizen summit methodology,this paper analyses the multiple ways in which citizens interpret security and privacy and assess and evaluate SOSTs. 

As new SOSTs facilitate the collection, storage, processing and combination of personal data by security agencies and commercial organizations, their impact on established civil and political rights (Friedewald et al., 2010), social sorting (Strauß and Nentwich, 2013, Lyon, 2007a), and on individual privacy (Lyon, 2002) 1 has been criticized. 

Despite these limitations, their study makes an important contribution to shed light on citizens’ perceptions of SOSTs and confirms the important role that participative exercises can play in increasing their understanding of how people frame complex policy issues.