Justification of Mass Surveillance: A Quantitative Study

Online mass surveillance by governmental organizations is omnipresent. Even though this results in a loss of privacy and further negative outcomes for individuals, a majority is justifying mass surveillance. Understanding, why this is the case is among others important for individuals, who want to decrease justification of mass surveillance. Therefore, this study aims to uncover the factors that drive this justification. Drawing on system justification theory we consider mass surveillance to be a political arrangement. Five factors were identified that potentially drive individuals’ justification of mass surveillance which are among others, perceived privacy control or perceived security. A quantitative study was carried out and the results support most of our hypotheses. With our results, we contribute to the privacy-related area in the domain of IS, by indicating that individuals consider mass surveillance not necessarily to be bad and by giving advice on how to alter the level of justification.

[1]  Steven L. Neuberg,et al.  Personal Need for Structure: Individual Differences in the Desire for Simple Structure , 1993 .

[2]  Andrew Schwarz,et al.  Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.

[3]  Gurpreet Dhillon,et al.  A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..

[4]  Jakob Wirth,et al.  Dependent Variables in the Privacy-Related Field: A Descriptive Literature Review , 2018, HICSS.

[5]  Elia Zureik,et al.  Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons , 2010 .

[6]  Yongqiang Sun,et al.  Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences , 2015, Comput. Hum. Behav..

[7]  Cameron Anderson,et al.  Power, Approach, and Inhibition , 2003 .

[8]  Stefan Stieger,et al.  Internet users' perceptions of 'privacy concerns' and 'privacy actions' , 2007, Int. J. Hum. Comput. Stud..

[9]  Edward G. Carmines,et al.  Reliability and Validity Assessment , 1979 .

[10]  Aaron C. Kay,et al.  A sense of powerlessness fosters system justification: Implications for the legitimation of authority, hierarchy, and government , 2015 .

[11]  Sven Laumer,et al.  Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence , 2016, Eur. J. Inf. Syst..

[12]  J. Penney Chilling Effects: Online Surveillance and Wikipedia Use , 2016 .

[13]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[14]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[15]  Paul Benjamin Lowry,et al.  "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..

[16]  Heng Xu,et al.  The security-liberty balance: individuals' attitudes towards internet government surveillance , 2012, Electron. Gov. an Int. J..

[17]  Jerk,et al.  A TYPOLOGY OF PRIVACY , 2017 .

[18]  M. Sarstedt,et al.  A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .

[19]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[20]  J. Jost,et al.  Antecedents and Consequences of System-Justifying Ideologies , 2005 .

[21]  Elena Karahanna,et al.  Shackled to the Status Quo: The Inhibiting Effects of Incumbent System Habit, Switching Costs, and Inertia on New System Acceptance , 2012, MIS Q..

[22]  Brian A. Nosek,et al.  A Decade of System Justification Theory: Accumulated Evidence of Conscious and Unconscious Bolstering of the Status Quo , 2004 .

[23]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[24]  Christopher G. Reddick,et al.  Public opinion on National Security Agency surveillance programs: A multi-method approach , 2015, Gov. Inf. Q..

[25]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[26]  Bilian Ni Sullivan,et al.  Social Inequality and the Reduction of Ideological Dissonance on Behalf of the System: Evidence of Enhanced System Justification among the Disadvantaged , 2001 .

[27]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[28]  Henri Barki,et al.  An Exploratory Study on Behavioral and Emotional Coping with IT-Enabled Government Surveillance , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[29]  D. Campbell,et al.  Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.

[30]  Zhenhui Jiang,et al.  Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..

[31]  D'ArcyJohn,et al.  "Cargo Cult" science in traditional organization and information systems survey research , 2016 .

[32]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[33]  Garner Clancey Closed Circuit Television in Public Places , 2007 .

[34]  Y. Li,et al.  The world is a scary place: Individual differences in belief in a dangerous world predict specific intergroup prejudices , 2018 .

[35]  J. Jost,et al.  Twenty years of system justification theory: Introduction to the special issue on “Ideology and system justification processes” , 2014 .

[36]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[37]  Dana Ward,et al.  Right-Wing Authoritarianism , 1982 .

[38]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[39]  Dennis F. Galletta,et al.  What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..

[40]  Alexander Serenko,et al.  Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users , 2011, MIS Q..

[41]  Sven Laumer,et al.  THE INFLUENCE OF RESIGNATION ON THE PRIVACY CALCULUS IN THE CONTEXT OF SOCIAL NETWORKING SITES: AN EMPIRICAL ANALYSIS , 2018 .

[42]  skyrider [영어로 보는 과학] Surveillance Society , 2007 .