Perception of Surveillance: An Empirical Study in Turkey, USA, and China



Similar documents
The effects of CCTV on Crime What Works Briefing

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Riverside Community College District Policy No General Institution

Selected Findings from the Indicators of School Crime and Safety: 2014

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

In 2014, U.S. residents age 12 or older experienced

The Illinois Uniform Crime Reporting Program

Criminal Offenses - On campus

Hopkinsville Community College, Main Campus. The Michael Minger Act Report for 2010 Activity Reported for Calendar Year 2009

This report provides the executive summary for Indicators of School Crime and Safety: 2014.

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)

In 2013, U.S. residents age 12 or older experienced

Capstone Project Minnesota State University Crime and Victimization Survey

Campus Violence and Mental Health

Training Courses Catalog 2015

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

2015 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus ( ) User ID: C

CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA

2014 Campus Safety and Security Survey. Screening Questions

STALKING REALITIES AND RESPONSES

CRIMINAL JUSTICE. CJ 0002 CRIME, LAW, AND PUBLIC POLICY 3 cr. CJ 0110 CRIMINOLOGY 3 cr. CJ 0130 CORRECTIONAL PHILOSOPHY: THEORY AND PRACTICE 3 cr.

School Safety in Virginia

Quantitative research findings on RAPE in Kenya between Dec.30 th 2007 to June 30 th Estimated Statistics of Rape & pedophilia 40,500.

Campus Violence Prevention An Integrated Approach to Threat Assessment and Case Management

Increasing Safety at the Courthouse for Victims of Domestic Violence

Policy Instruments & (Side)-Effects

CRIL does not maintain a police or security department Crime Statistics Disclosure Criminal Homicide

Campus Safety and Security Survey 2015

Pentecostal Views on Violent Crises in Plateau State: Pilot Study Report NPCRC Technical Report #N1101

Examining Science and Engineering Students Attitudes Toward Computer Science

Model for E-Learning in Higher Education of Agricultural Extension and Education in Iran

Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014

SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS. Harry S Truman College

Crime in Arkansas 2001

I missed some important pros/cons or I included unnecessary information in my outline.

Federico Beauty Institute. Campus Safety and Security Handbook

Crime in Missouri 2012

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Assistant Professor/Instructor, Criminology, College of Arts and Sciences University of South Florida St. Petersburg, present

CRIMINAL RECORD AND ABUSE HISTORY VERIFICATION

Moscow subway cars to have CCTV

Public Assessments and Public Attitudes toward Israel Prison Service 2013

Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace

Lane Kirkland Gillespie

Assoc. Prof. Dr. Huseyin A. KANIBIR

FAQ: Crime Reporting and Statistics

How To Teach A Diversity Lesson In West Virginia

CRIMINAL JUSTICE.

The Safe and Drug-Free Schools and Communities Quality Data Management Project

Taking a Bite Out of Crime: 46 Years of Utah Crime Statistics

10 Victims and the law 57

The rate of hospitalizations due to assaultive injuries by spouse or partner (E976.3) per 100,000 females (13 and over)

John Andrew Hansen Department of Criminology and Criminal Justice Western Carolina University Belk 410-G Cullowhee, NC

A GUIDE TO CRIMINAL INJURIES COMPENSATION

CRIME STATISTICS. The U.S., Major Cities and Detroit. Presentation to. Leadership Detroit

ROLE OF CCTV IN BUSINESS ORGANIZATION: A CASE STUDY

TECHNICAL EDUCATION CENTER OSCEOLA ST. CLOUD ANNUAL SECURITY REPORT

Keywords: domestic violence offenders; police attitudes; justice system; victim safety

College Safety Offices ECC

Curriculum Vitae. JAMIE ANN SNYDER, Ph.D. Assistant Professor of Criminal Justice

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

CRJ 410 Criminal Justice Management Information System Location TBD Session/Semester TBD

Lessons Learned and Key Recommendations from the Virginia Tech Tragedy

Wisconsin Anti-Bullying Center

OCPS Tech Centers Orlando Campus. Annual Security Report

John Andrew Hansen Department of Criminology and Criminal Justice University of South Carolina Columbia, SC

Privacy vs. security a given trade-off?

When Students Make Threats

SUMMARY VIOLENCE AGAINST WOMEN STATISTICS:

SUMMARY VIOLENCE AGAINST WOMEN STATISTICS:

WORKPLACE VIOLENCE PREVENTION. Definition. Definition Cont d. Health Care and Social Service Workers

MICHIGAN JEWISH INSTITUTE Policy and Procedure Manual

(C) A statement of current policies concerning campus law enforcement, including--

Scope of Workplace Violence Program 2, 3. Types of Workplace Violence Events 4, 5. Preventative Measures 6, 7. Responding to Workplace Violence 8, 9

VIEWS OF STUDENTS IN THE DEPARTMENT OF RECREATION AND SPORT MANAGEMENT ON DISTANCE EDUCATION

FEDE DOMESTIC VIOLENCE STATUTES AND ELEMENTS FOR FEDERAL PROSECUTION

Violent Crime in Massachusetts

AN EXPLORATION OF THE ATTITUDE AND LEARNING EFFECTIVENESS OF BUSINESS COLLEGE STUDENTS TOWARDS GAME BASED LEARNING

WILLIAM C. SNYDER Syracuse University College of Law E. I. White Hall, Room 268 Syracuse, NY

ASSISTIVE TECHNOLOGIES FOR STUDENTS WITH DISABILITIES: A SURVEY OF ACCESS AND USE IN TURKISH UNIVERSITIES

The Strategic Assessment of the St. Louis Region

Criminal Background Checks for Higher Education. Background Check 101

Moscow subway cars to have CCTV

INTIMATE PARTNER VIOLENCE

Offered at the Thunder Bay Campus

Dear Student: A paper copy of this report may be printed from the website, or may be requested by contacting your campus Business Office.

THE MOST PREFERRED FREE SERVICE USED BY STUDENTS

ITT Technical Institute, Orlando, Florida Safety and Security Policies with Crime Statistics Report CRIME STATISTICS

During 2010, U.S. residents age 12 or

2014 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus ( ) User ID: C

KNOWLEDGE AND PERCEPTIONS OF VIRGINIA SECONDARY AGRICULTURE EDUCATORS TOWARD THE AGRICULTURAL TECHNOLOGY PROGRAM AT VIRGINIA TECH

Violent Crime in Ohio s Primary and Secondary Schools

EUROBAROMETER 70 PUBLIC OPINION IN THE EUROPEAN UNION AUTUMN Standard Eurobarometer 70 / Autumn 2008 TNS Opinion & Social

Truett-McConnell College. Annual Campus Safety and Security Report 2013

Students Home News Administration Students

MARKETING STRATEGIES FOR RECRUITING 4-H MEMBERS IN WEST VIRGINIA. Gary J. Wingenbach, Assistant Professor Mississippi State University

Victims of Crime. support and advice in Gloucestershire CRIMINAL JUSTICE SYSTEM

2014 Campus Safety and Security Survey. Screening Questions. Institution: Hebrew College ( ) User ID: C

v. Record No OPINION BY JUSTICE ELIZABETH B. LACY March 1, 2002 TRACTOR SUPPLY COMPANY

New York: Center of the World Teacher s Guide

Transcription:

International Journal of Business, Humanities and Technology Vol. 3 No. 4; April 2013 Perception of : An Empirical Study in Turkey, USA, and China Assoc. Prof. Dr. Mehmet Devrim Aydin Hacettepe University Economics and Administrative Sciences Faculty Department of Political Science and Public Administration 06532, Beytepe Ankara, Turkey. Assoc. Prof. Dr. Jane K. Miller University of Massachusetts Isenberg School of Management 121 Presidents Drive Amherst, MA, 01003 USA. Assoc. Prof. Dr. Yao Xiaojun Huazhong Agricultural University Foreign Language School 1 Shizishan Street, Hongshan District Wuhan, Hubei 430070, China Prof. Dr. Dogan Nadi Leblebici Hacettepe University Faculty of Economics and Administrative Sciences Department of Political Science and Public Administration 06800, Beytepe Ankara, Turkey. Assoc. Prof. Dr. Mete Yildiz Hacettepe University Faculty of Economics and Administrative Sciences Department of Political Science and Public Administration 06800, Beytepe Ankara, Turkey. Abstract Information Technology (IT) practices of governments today is under scrutiny due to some malpractices causing violation of citizens privacy. Especially, surveillance practices such as CCTV surveillance and surveillance of Internet and telephone traffic are seen as the most prevalent threats to civil rights and liberties. With a crosscultural survey covering three countries including Turkey, USA, and China, this study tries to find out how university students perceive various surveillance practices (CCTV, telephone and Internet surveillance) in their country. The survey was conducted with the participation of undergraduate business administration students from Turkey (Hacettepe University), USA (University of Massachusetts), and China (Huazhong Agricultural University). Results indicate that security campus, workplace, and streets are not perceived as a threat to civil rights and liberties. Nevertheless, surveillance of internet, e-mails and telephones is not positively evaluated by students. Keywords: Information Technology, Technologies, Privacy, Society 69

Center for Promoting Ideas, USA www.ijbhtnet.com 1. Introduction Information Technology (IT) transformation in government can be seen as a revolution in terms of quality and cost of public services. However, it is also a reality that governments use of IT may pose a threat to civil rights and liberties. In the last decade, there is an abundance of news in the media regarding with the continuing assault on citizens privacy arising from some Information Technology (IT) applications. The most critical part of IT use is related to surveillance activities. is the monitoring of the behavior, activities, or information for the purpose of influencing, managing, directing, or protecting (Lyon, 2007). In fact, surveillance is a highly complicated issue with its positive and negative sides. It generally involves observation of individuals or groups by government organizations. The word surveillance generally refers to observation from a distance by means of electronic equipment (such as closed circuit television- CCTV), or interception of electronically transmitted information (such as Internet traffic or phone calls). These surveillance categories (CCTV, Internet and telephone) will also be the subject of this study. In the empirical part, attitudes of students towards those technologies will be analyzed in depth. 2. From Terrorist Attacks to School Shootings: to Fight Against Violence In the last few decades, our world has witnessed a rising tendency in international terrorism all over the world. There have been important terror acts in western countries that caused a total paradigm change in security perception: Attack towards twin towers in the US on September 11th, 2001 and subway and bus bombings in London on July 7th, 2005 were the most important violent acts hurting innocent people in Western countries. After those events, the power of security forces in the developed world was increased significantly to fight against terrorism effectively. In addition to the threats arising from terrorism, there had been a rise of violent acts on the streets in urban life. University campuses are also among the places that are highly affected by such kind of criminal behavior. In terms of school violence, USA is one of the most influenced countries among all. Columbine and Virginia Tech massacres can be seen as milestones in this category. The Columbine High School massacre was a school shooting which occurred on April 20, 1999, at Columbine High School in Columbine, an unincorporated area of Jefferson County in the State of Colorado, USA. Two students murdered a total of 13 people and wounded 21 students (Toppo, 2009). The Virginia Tech massacre was another important event that has an affect on security paradigm in USA. It took place on April 16, 2007, on the campus of Virginia Polytechnic Institute and State University in Blacksburg, Virginia, United States. A student had killed 32 people and wounded 17 others in two separate attacks. The massacre was the deadliest shooting incident by a single gunman in US history (Virginia Tech Report, 2009). The United States Secret Service released a comprehensive study entitled Campus Attacks: Targeted Violence Affecting Institutions of Higher Education in 2010 (Drysdale, Modzeleski, and Simons, 2010). This study was done pursuant to the Virginia Tech incident and at the request of various departments within the federal government. According to report; 1. A total of 174 homicides or non-negligent manslaughter occurred from 2005 through 2008, 2. 13,842 forcible sex offenses occurred during this same time period, 3. 36% took place in administrative/academic/service buildings; 28% took place in residential buildings; 27% took place in parking lots or other campus grounds. Figures show the urgent need to curb crime by using all kinds of tools in hand effectively [see also School Crime and Violence Statistics published by National School Safety Center in USA (NSSC, 2010)]. At this point, there have been a natural increase in surveillance measures taken by the universities not only in USA only, but also all over the world and CCTV is one of the most prevalent surveillance technologies in university campuses today. Various aspects of CCTV use have been analyzed in many studies (Gras, 2005; Hempel and Töpfel, 2004; Hempel and Töpfel, 2009; Welsh and Farrington, 2007; ACLU, 2006; Urbaneye, 2004; Gill, 2003; McCahill and Norris, 2002a; McCahill and Norris, 2002b; McCahill, 2002; Norris and Armstrong, 1999; Norris, et al. 1998). 70

International Journal of Business, Humanities and Technology Vol. 3 No. 4; April 2013 The Urbaneye Project, one of the most significant of studies analyzing citizen attitudes towards CCTV, was conducted with the participation of approximately 1,000 respondents in five different European countries (Hempel and Töpfel, 2004). Most people have positive opinions towards CCTV at the banks, station platforms, shops, shopping malls, along motorways and on open streets. In contrast, some people express negative opinions towards CCTV in public toilet washrooms, changing and fitting rooms. Although the general characteristic of the spaces where CCTV is clearly opposed can be easily described as more intimate, it is difficult to find a common denominator for the locations where CCTV is supported. Some of those locations might be seen as monofunctional or less social, hence, intimidating spaces, such as station platforms. In the others, people might sympathize with the interests of property owners who might want to protect their assets. Or, people might simply recognize the power of facts when they support CCTV at the banks or in stations (Hempel and Töpfel, 2004: 43). When it comes to telephone and Internet surveillance, people again support the use of these technologies as long as security agencies comply with the laws and regulations. With a similar approach, in this study, we tried to understand the attitudes of students towards CCTV, telephone and Internet surveillance in their countries (Turkey, USA, and China). In the following part of the study, this empirical research is presented and findings are discussed. 3. Empirical Research To search the effects of surveillance practices, an empirical research was designed, and conducted with the participation of students from three countries; Turkey, USA, and China. 2.1. Purpose This study tries to find out how university students perceive various surveillance practices. In this framework, the research questions of the survey were given below: 1. Is electronic surveillance considered as a threat to privacy? 2. Is electronic surveillance considered as a tool for developing security of the citizens? 2.2 Study Group In this cross-cultural study, we tried to cover different cultures so as to demonstrate the cultural similarities and differences in perception of surveillance. In the study, Turkey represents a transition point or a bridge between the Eastern and Western cultures. China stands for eastern culture and USA represents Western culture. The survey was conducted with the participation of undergraduate business administration students from Turkey (Hacettepe University/Department of Business Administration/Ankara), USA (University of Massachusetts/Isenberg School of Management/Department of Management/Amherst), and China (Huazhong Agricultural University/Department of Business Administration/Wuhan). Selected universities are state universities with a focus of teaching and scientific research. They are at a similar size in terms of student numbers (Hacettepe University/Ankara: 36,112 undergraduate and graduate students, Massachusetts University/Amherst: 28,084 undergraduate and graduate students and Huazhong Agricultural University/Wuhan: 23,000 undergraduate and graduate students). Of total 249 students in the survey, 102 are Turkish, 87 are American, and 58 are Chinese. A total of 130 instruments were completed by males (52 %) and 119 were completed by females (48%). 2.3. Data Collection In the survey, students were asked questions about their perceptions on various IT practices of university administrators in the campuses; of employers in the private companies, and of the government officers in public sphere at students own country. Questionnaires were implemented during the first 15 minutes of class hours by the permission of course instructor. Students responded 16 questions. First part of the questionnaire (8 items) is about students perception about the threats to privacy arising from IT practices. Second part of questionnaire (8 items) is about students perception of usefulness of IT practices for citizens security. Questions were asked on the fivefold Likert Scale (1 means strongly disagree, and 5 means strongly agree ). 71

Center for Promoting Ideas, USA www.ijbhtnet.com 2.4. Reliability Statistical analysis indicates that Cronbach Alpha coefficient is 0.68 for the questionnaire (16 questions). 2.5. Findings Arithmetical means and One Way ANOVA test were used to explore answers to the research questions of the study. 2.5.1. IT as a Threat to Privacy First research question of the study is about the threat potential of electronic surveillance to privacy. Therefore, arithmetic means were calculated for different variables in the scale. Table 1 shows students perceptions of threat for privacy regarding different surveillance applications. Table 1. Electronic as a Threat to Privacy (Arithmetic s for All Three Countries Involved in the Survey)* Item No Item Content Deviation 1 of emails and telephones in the workplace by employers 3.39 1.27 2 by government over websites 3.36 1.15 3 by university over campus members Internet activities 3.26 1.16 4 the dormitories 3.06 1.52 5 of citizen s emails and telephones by government officials 3.02 1.26 6 the campus 2.79 1.27 7 the workplace 2.75 1.25 8 the streets 2.71 1.33 * range is between 1 and 5. 3.50 and higher values are assumed to show the existence of threat in students perception. However, table shows that all values are below 3.50. This indicates that electronic surveillance applications are not perceived as a threat to privacy in neither of the countries. Results also show that use of security campuses, workplaces, and streets is perceived as a less important threat to privacy when compared to surveillance of internet, e-mails and telephones ranking higher in the table above. Table 2 shows comparative results for three countries involved in the survey. There are statistically significant differences in four variables for three countries (p<0.05): 1. of e-mails and telephones in the workplace by employers is significant between USA-China and Turkey-China. 2. the workplace is significant between USA-China. 3. the campus is significant between USA-China and Turkey-China. 4. the dormitories is significant between USA-China and Turkey-China. 72

International Journal of Business, Humanities and Technology Vol. 3 No. 4; April 2013 Table 2. Electronic as a Threat to Privacy (Comparison of Three Countries)* USA by government over websites by university over campus members' Internet activities of citizen's emails and telephones by government officials of emails and telephones in the workplace by employers the streets the dormitories the campus the workplace 3.46 1.12 3.33 1.02 3.15 1.28 3.12 1.18 2.65 1.22 2.56 1.26 2.53 1.20 2.44 1.00 TURKEY of emails and telephones in the workplace by employers by government over websites by university over campus members' Internet activities of citizen's emails and telephones by government officials the workplace the dormitories the campus the streets 3.37 1.32 3.20 1.27 3.08 1.26 2.98 1.25 2.80 1.47 2.78 1.40 2.74 1.36 2.60 1.47 * range is between 1 and 5. CHINA the dormitories of emails and telephones in the workplace by employers by university over campus members' Internet activities by government over websites the campus the workplace the streets of citizen's emails and telephones by government officials 4.31 1.40 3.86 1.19 3.48 1.16 3.47 0.94 3.26 1.11 3.14 1.08 2.98 1.22 2.91 1.26 Statistically significant differences at the four variables above show that Chinese students perceive cameras as a violation of their privacy more than American and Turkish students. There are no significant differences between perceptions of American and Turkish students in any of these four variables. 73

Center for Promoting Ideas, USA www.ijbhtnet.com 2.5.2. Electronic as a Tool for Developing of the Citizens? Second research question of the study is about security provision potential of electronic surveillance for citizens. Therefore, arithmetic means were calculated for different variables in the scale. Table 3 shows students perceptions of security provision potential of electronic surveillance applications. Table 3. Electronic as a Tool for Developing of the Citizens (Arithmetic s for All Three Countries Involved in the Survey)* Deviation Responsible usage develops civil rights and liberties 4.05 0.85 campus security in my university is necessary for preventing crime 3.58 0.98 Lawful usage of surveillance is not a threat to security of citizens 3.53 0.93 Governments should control Internet to prevent possible threats to security of citizens 3.49 1.12 control of Internet poses a threat to freedom of information 3.31 1.10 Government abuse of IT is low in my country 3.25 0.97 control of Internet poses a threat to freedom of thought 3.21 1.06 campus security in my university is sufficient for preventing crime 2.90 1.03 * range is between 1 and 5. 3.50 and above values are assumed to show a positive perception on security provision potential of electronic surveillance applications. Results show that electronic surveillance by formal authorities is perceived as a security enhancing measure in case of the existence of legal regulations. Furthermore, students are also positive about the control of internet by the governments for citizens security. Students from all three countries support IT security applications in their campuses. Table 4 shows comparative results for three countries involved in the survey. There are statistically significant differences in four variables for three countries (p<0.05). 1. Responsible usage develops civil rights and liberties is significant between USA-China and USA-Turkey. 2. Governments should control Internet to prevent possible threats to security of citizens is significant between USA-China and USA-Turkey. 3. Lawful usage of surveillance is not a threat to security of citizens is significant between USA-Turkey and China-Turkey. 4. control of Internet poses a threat to freedom of information is significant between USA- Turkey and China-Turkey. Students from three countries seem to be hesitant about government s abuse of IT in their own country with mean scores changing from 3.14 to 3.30. This result indicates that although there may be some malpractices, the level of disturbance related to IT abuse is not high in all three countries. 74

International Journal of Business, Humanities and Technology Vol. 3 No. 4; April 2013 Table 4. Electronic as a Tool for Developing of the Citizens (Comparison of Three Countries)* USA Responsible usage develops civil rights and liberties campus security in my university is necessary for preventing crime control of Internet poses a threat to freedom of information control of Internet poses a threat to freedom of thought Lawful usage of surveillance is not a threat to security of citizens Government abuse of IT is low in my country campus security in my university is sufficient for preventing crime Governments should control Internet to prevent possible threats to security of citizens 3.73 0.72 3.63 0.83 3.60 1.07 3.37 1.02 3.27 0.89 3.26 0.86 2.96 0.99 2.90 1.07 TURKEY Responsible usage develops civil rights and liberties Lawful usage of surveillance is not a threat to security of citizens Governments should control Internet to prevent possible threats to security of citizens campus security in my university is necessary for preventing crime Government abuse of IT is low in my country control of Internet poses a threat to freedom of thought control of Internet poses a threat to freedom of information campus security in my university is sufficient for preventing crime 4.23 0.95 3.91 0.87 3.67 1.06 3.55 1.10 3.30 1.08 3.05 1.19 2.97 1.17 2.78 1.08 * range is between 1 and 5. CHINA Responsible usage develops civil rights and liberties Governments should control Internet to prevent possible threats to security of citizens campus security in my university is necessary for preventing crime control of Internet poses a threat to freedom of information Lawful usage of surveillance is not a threat to security of citizens control of Internet poses a threat to freedom of thought Government abuse of IT is low in my country campus security in my university is sufficient for preventing crime 4.24 0.71 4.07 0.90 3.57 0.98 3.44 0.86 3.28 0.87 3.24 0.82 3.14 0.93 3.02 0.98 75

Center for Promoting Ideas, USA www.ijbhtnet.com 4. Conclusion With a cross-cultural survey covering three countries (Turkey, USA, and China), this study tries to find out how university students perceive various IT practices in their own country and finally it aims at developing a general framework that will help prevent unethical use of IT. Results indicate that IT applications in public service are not perceived as an important threat to civil rights and liberties by students. In addition, security campus, workplace, and streets are not perceived as a threat to civil rights and liberties, as well. Nevertheless, surveillance of internet, e-mails and telephones is not positively evaluated by students. Only surveillance of internet for the sake of citizens security is partly approved. References ACLU (2006). & Wiretapping. American Civil Liberties Union/ACLU web site, [Online] Available: http://www.aclu.org/privacy/spying/index.html (February 12, 2013) Drysdale, D. A., Modzeleski, W. and A. B. Simons (2010). Campus attacks: Targeted violence affecting institutions of higher education. United States Secret Service, United States Department of Education and Federal Bureau of Investigation, Washington, D.C., April 2010, [Online] Available: http://www2.ed.gov/admins/lead/safety/campus-attacks.pdf (February 12, 2013) Gill, M. (2003). CCTV. Leicester: Perpetuity Press. Gras, Marianna L. (2004). The Legal Regulation of CCTV in Europe. and Society, 2, no 2/3, 171-192. Hempel, L. and E. Töpfel (2004). CCTV in Europe: Final Report. Urbaneye Project web site, [Online] Available: http://www.urbaneye.net/results/ue_wp15.pdf (February 12, 2013) Hempel, L. and Töpfel, E. (2009). The Consensus: Reviewing the Politics of CCTV in Three European Country. European Journal of Criminology, 5, no 2, 157-177. Lyon, D. (2007). Studies: An Overview. Cambridge: Polity Press. McCahill, M. (2002). The Web: The Rise of Visual in an English City. Cullompton: Willan. McCahill, M. and C. Norris (2002a). CCTV in Britain. European Union Urbaneye Project web site, Working Paper No: 3, [Online] Available: http://www.urbaneye.net/results/ue_wp3.pdf (February 12, 2013) McCahill, M. and C. Norris (2002b). CCTV in London. European Union Urbaneye Project web site, Working Paper No: 6, [Online] Available: http://www.urbaneye.net/results/ue_wp6.pdf (February 12, 2013) Norris, C. and Armstrong, G. (1999). CCTV and the Social Structuring of. In K. Painter and N. Tilley (eds.): of Public Space: CCTV, Street Lighting and Crime Prevention, Monsey, NY: Criminal Justice Press. Norris, C., Moran, J., and Armstrong, G. (1998)., Closed Circuit Television and Social Control. Aldershot: Ashgate. NSSC (2010). School Crime and Violence Statistics. National School Safety Center, [Online] Available: http://www.schoolsafety.us/media-resources/school-crime-and-violence-statistics (February 12, 2013). Toppo, G. (2009) 10 years later, the real story behind Columbine. USAToday, [Online] Available: http://usatoday30.usatoday.com/news/nation/2009-04-13-columbine-myths_n.htm (February 12, 2013) Urbaneye (2004) On the Threshold to Urban Panopticon? Urbaneye Project web site, [Online] Available: http://www.urbaneye.net/ (February 12, 2013) Virginia Tech Report (2009) Mass Shootings at Virginia Tech: Addendum to the Report of the Review Pane. [Online] Available: http://www.governor.virginia.gov/tempcontent/techpanelreportdocs/vt_addendum_12-2-2009.pdf (February 12, 2013) Welsh, B. C. and Farrington, D.P. (2007) Closed-circuit television surveillance and crime prevention: a systematic review. Stockholm: Swedish National Council for Crime Prevention. 76