The Public Perception of Cyber-surveillance Before and After Edward Snowden’s Surveillance Revelations
The article contextualizes contemporary cyber-surveillance practices in the light of Edward Snowden’s revelations of massive espionage by intelligences services and shows the results of an online survey on the public perceptions of privacy in public telecommunication networks in Slovenia. The results relate to types and frequency of victimization; self-reported study on violating of the privacy of others; concern for the protection of one’s own privacy; perception of those carrying out surveillance; the value of privacy; views on abrogated data retention regulation; and awarness of personal data protection remedies.
Despite growing distrust of large internet corporations and – after Edward Snowden’s revelations – Intelligence agencies, the findings indicate a low degree of awareness and care for the protection of personal data. In regard to the perception of primary subjects of surveillance, 56 percent of respondents chose internet corporations as the greatest threat to their privacy, followed by telecommunications companies (25 percent), and shops with loyalty programs (23 percent). According to chi-square and Cramer's coefficient calculations, gender correlation is weak, but men feel more threatened by foreign intelligence services and the Slovene Intelligence and Security Agency. By comparing responses before and after the Datagate affair, we noted that prior to this date, only a handful of people felt threatened by foreign or domestic intelligence agencies. An increased feeling of threat after this date is evident in men as well as women.
BALL, K., & SNIDER, L. (eds.) (2013) The Surveillance-Industrial Complex: A Political Economy Of Surveillance. New York: Routledge.
DEN BOER, M., JANSSENS, J., VANDERBEKEN, T., EASTON, M., MOELKER, R. (2010). Epilogue, Concluding Notes On The Convergence Between Military And Police Roles. In EASTON, M., DEN BOER, M., JANSSENS, J., MOELKER, R. & VANDERBEKEN T. (eds.). Blurring Military And Police Roles. The Hague: Eleven International Publishing.
DREDGE, S. (2004) Twitter: why #SoggyFries make for a tasty future in big-data revenue. The Guardian. [Online] 5th November 2014. Available from: http://www.theguardian.com/technology/2014/nov/05/twitter-soggyfries-big-data-advertising. [Accessed: 15th January 2015].
LUTTERBECK, D. (2005) Blurring The Dividing Line: The Convergence Of Internal And External Security In Western Europe. European Security. 14 (2). p.231–253. https://doi.org/10.1080/09662830500336193
LYON, D. (2001) Surveillance Society: Monitoring Everyday Life. Philadelphia: Open University Press.
LYON, D. (2003) Surveillance after September 11. Cambridge: Polity Press.
NISSENBAUM, H. (2004) Privacy As Contextual Integrity. Washington Law Review. 79 (1). p.119–158.
NOCERA, J. (2014) The Wild West Of Privacy. The New York Times. [Online] 24th February. Available from:
http://www.nytimes.com/2014/02/25/opinion/nocera-the-wild-west-of-privacy.html?_r=1. [Accessed: 7th January 2015].
PEČAR, J. (1991) Neformalno nadzorstvo: kriminološki in sociološki pogledi. Radovljica: Didakta.
RASHID, F.Y. (2014) Surveillance is the Business Model of the Internet. Schneier on Security. [Online] 9th April. Available from:
https://www.schneier.com/news/archives/2014/04/surveillance_is_the.html. [Accessed: 14th December 2014].
SCHNEIER, B. (2012) When It Comes To Security, We’re Back To Feudalism. Schneier on Security. [Online] 26th November. Available from: https://www.schneier.com/essays/archives/2012/11/when_it_comes_to_sec.html. [Accessed: 12th December 2014].
SCHNEIER, B. (2013) The Battle For Power On The Internet. The Atlantic. [Online] 24th October. Available from:
http://www.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the-internet/280824/. [Accessed: 26th January 2015].
SLOVENIA. Electronic Communications Act. The Official Gazette of the Republic of Slovenia, no. 109/12, 110/13, 40/14 & 54/14 - ZIN-B.
SOLOVE, D. (2007) “I’ve Got Nothing To Hide” And Other Misunderstandings Of Privacy. San Diego Law Review. [Online] SSRN Database 44, p. 745. Available from: http://ssrn.com/abstract=998565. [Accessed: 12th August 2015].
VERVAELE, J. (2005) Terrorism And Information Sharing Between The Intelligence And Law Enforcement Communities in the US and the Netherlands: Emergency Criminal Law? Utrecht Law Review. 1 (1), p. 1–27.
ZAVRŠNIK, A. (2013) Blurring The Line Between Law Enforcement And Intelligence. Journal of Contemporary European Research. [Online] 9 (1). p.182–202. Available from: http://www.jcer.net/index.php/jcer/article/view/452. [Accessed: 15th January 2015].
Copyright (c) 2015 Masaryk University Journal of Law and Technology