Surveillance as a Socio-Technical System: Behavioral Impacts and Self-Regulation in Monitored Environments
Abstract
1. Introduction
1.1. Theoretical Framework
1.2. Research Objectives
2. Materials and Methods
2.1. Participants
2.2. Design
2.3. Procedure
2.4. Data Analysis
2.4.1. Factor Analysis
2.4.2. Hypothesis Modeling
3. Results
4. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
Code | Item |
---|---|
Item 1 | In general, how interested are you in whether the space you are in is under video surveillance? |
Item 2 | To what extent do you know the conditions under which video surveillance cameras can be installed in a space? |
Item 3 | Have you ever requested information regarding the legality of installing video surveillance cameras in a specific space? |
Item 4 | Have you ever challenged the fact that you are being recorded by a video surveillance camera? |
Item 5 | Do you believe that video recordings are analyzed by those who conduct the surveillance? |
Item 6 | How likely do you think it is that, under normal conditions, you could be identified in a video recording? |
Item 7 | When entering a space that is under video surveillance, are you more attentive than usual to your gestures? |
Item 8 | Have there been situations where you refrained from making a gesture in a video-surveilled space for fear that it might be perceived as abnormal by those who have access to the recordings? |
Item 9 | Have you ever felt discomfort or pressure from being recorded while carrying out everyday activities (e.g., shopping, participating in recreational activities, etc.)? |
Item 10 | Do you believe that video surveillance changes the way you behave? |
Item 11 | In a video-surveilled space, have you ever felt the need to avoid the cameras’ field of view because you did not want it to be known that you were in that space? |
Item 12 | In a video-surveilled space, have you ever felt the need to avoid the cameras’ field of view because you did not want it to be known that you were participating in a certain activity or using a particular service? |
Item 13 | Have you ever felt discomfort or pressure from the possibility that, due to video surveillance, your lifestyle could be detected and analyzed? |
Item 14 | Would you feel safe if there were continuous video monitoring from the moment you leave your home until you return? |
Item 15 | To what extent do you agree with the statement: “Nowadays, everything you do is known anyway”? |
References
- Lyon, D. Surveillance Society: Monitoring Everyday Life; Open University Press: Buckingham, UK, 2001. [Google Scholar]
- Staples, W.G. Everyday Surveillance: Vigilance and Visibility in Postmodern Life, 2nd ed.; Rowman & Littlefield: Lanham, MD, USA, 2014. [Google Scholar]
- Lin, L.; Purnell, N. A world with a billion cameras watching you is just around the corner. Wall Str. J. 2019. Available online: https://www.wsj.com/articles/a-billion-surveillance-cameras-forecast-to-be-watching-within-two-years-11575565402 (accessed on 13 May 2025).
- Yesil, B. Video Surveillance: Power and Privacy in Everyday Life; LFB Scholarly Publishing: El Paso, TX, USA, 2010. [Google Scholar]
- Shapiro, A. Design, Control, Predict: Logistical Governance in the Smart City; University of Minnesota Press: Minneapolis, MN, USA, 2020. [Google Scholar]
- Lauer, J.; Lipartito, K. (Eds.) Surveillance Capitalism in America; University of Pennsylvania Press: Philadelphia, PA, USA, 2021. [Google Scholar]
- Bodie, M.T. The law of employee data: Privacy, property, governance. Ind. Law J. 2022, 97, 707–748. [Google Scholar]
- Rule, J.B. Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience; Oxford University Press: Oxford, UK, 2007. [Google Scholar]
- Macnish, K. The Ethics of Surveillance: An Introduction; Routledge: London, UK, 2017. [Google Scholar]
- Monahan, T. Crisis Vision: Race and the Cultural Production of Surveillance; Duke University Press: Durham, NC, USA, 2022. [Google Scholar]
- Jansen, A.M.; Giebels, E.; van Rompay, T.J.L.; Junger, M. The influence of the presentation of camera surveillance on cheating and pro-social behavior. Front. Psychol. 2018, 9, 1937. [Google Scholar] [CrossRef] [PubMed]
- Volosevici, D. Some Considerations on Video-Surveillance and Data Protection. Jus Civitas J. Soc. Legal Stud. 2018, 69, 7–14. [Google Scholar]
- Merrick, R.; Ryan, S. Data privacy governance in the age of GDPR. Risk Manag. 2019, 66, 38–43. [Google Scholar]
- Aas, K.F.; Gundhus, H.O.; Lomell, H.M. Technologies of Insecurity: The Surveillance of Everyday Life; Routledge-Cavendish: Abingdon, UK, 2009. [Google Scholar]
- Harding, J.M. Performance, Transparency, and the Cultures of Surveillance; University of Michigan Press: Ann Arbor, MI, USA, 2018. [Google Scholar]
- Ball, K. Surveillance in the workplace: Past, present, and future. Surveill. Soc. 2022, 20, 455–472. [Google Scholar] [CrossRef]
- European Data Protection Board (EDPB). Guidelines 3/2019 on Processing of Personal Data through Video Devices. 2019. Available online: https://edpb.europa.eu (accessed on 10 January 2025).
- Kaplan, S. To be a face in the crowd: Surveillance, facial recognition, and a right to obscurity. In Everyday Life in the Culture of Surveillance; Samuelsson, L., Cocq, C., Gelfgren, S., Enbom, J., Eds.; Nordicom, University of Gothenburg: Gothenburg, Sweden, 2023; pp. 45–66. [Google Scholar] [CrossRef]
- Reeves, J. Citizen Spies: The Long Rise of America’s Surveillance Society; New York University Press: New York, NY, USA, 2017. [Google Scholar]
- Norris, C.; Armstrong, G. The Maximum Surveillance Society: The Rise of CCTV; Berg: Oxford, UK, 1999. [Google Scholar]
- Alfino, M.; Mayes, G.R. Reconstructing the right to privacy. Soc. Theory Pract. 2003, 29, 1–18. Available online: https://www.jstor.org/stable/23559211 (accessed on 10 March 2025).
- Ahmad, M.A.; Baryannis, G.; Hill, R. Defining Complex Adaptive Systems: An Algorithmic Approach. Systems 2024, 12, 45. [Google Scholar] [CrossRef]
- Sobb, T.; Moustafa, N.; Turnbull, B. Responsible Resilience in Cyber–Physical–Social Systems: A New Paradigm for Emergent Cyber Risk Modeling. Future Internet 2025, 17, 282. [Google Scholar] [CrossRef]
- Zimmerman, B.; Lindberg, C.; Plsek, P. A Complexity Science Primer: What Is Complexity Science and Why Should I Learn About It; Adapted From: Edgeware: Lessons From Complexity Science for Health Care Leaders; VHA Inc.: Dallas, TX, USA, 1998. [Google Scholar]
- Hempel, L.; Toepfer, E. On the Threshold to Urban Panopticon? CCTV in European Cities and Assessing Its Social and Political Impacts; Working Paper No. 15; TU Berlin Centre for Technology and Society Technical: Berlin, Germany, 2004. [Google Scholar]
- Golda, T.; Guaia, D.; Wagner-Hartl, V. Perception of Risks and Usefulness of Smart Video Surveillance Systems. Appl. Sci. 2022, 12, 10435. [Google Scholar] [CrossRef]
- Bentham, J. Panopticon; T. Payne: London, UK, 1791. [Google Scholar]
- Haggerty, K.D.; Samatas, M. (Eds.) Surveillance and Democracy; Routledge: Abingdon, UK, 2010. [Google Scholar]
- Cohen, J.E. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice; Yale University Press: New Haven, CT, USA, 2012. [Google Scholar]
- Lyon, D. The Culture of Surveillance; Polity Press: Cambridge, UK, 2018. [Google Scholar]
- Arendt, H. The Human Condition; University of Chicago Press: Chicago, IL, USA, 1958. [Google Scholar]
- Monahan, T. Surveillance in the Time of Insecurity; Rutgers University Press: New Brunswick, NJ, USA, 2010. [Google Scholar]
- Barnard-Wills, D. Surveillance and Identity: Discourse, Subjectivity and the State; Ashgate: Farnham, UK, 2012. [Google Scholar]
- McCahill, M.; Finn, R.L. Surveillance, Capital and Resistance: Theorizing the Surveillance Subject; Routledge: London, UK, 2014. [Google Scholar]
- Rachels, J. Why privacy is important. Philos. Public Aff. 1975, 4, 323–333. Available online: http://www.jstor.org/stable/2265077 (accessed on 13 January 2025).
- Vélez, C. Privacy Is Power: Why and How You Should Take Back Control of Your Data; Melville House: Brooklyn, NY, USA, 2021. [Google Scholar]
- Ebert, I.; Wildhaber, I.; Adams-Prassl, J. Big data in the workplace: Privacy due diligence as a human rights-based approach to employee privacy protection. Big Data Soc. 2021, 8, 20539517211013051. [Google Scholar] [CrossRef]
- Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, L.; Cetin, F.; Basim, H.N. Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. J. Comput. Inf. Syst. 2022, 62, 82–97. [Google Scholar] [CrossRef]
- Schauer, F. Fear, Risk and the First Amendment: Unraveling the Chilling Effect; Faculty Publications, Boston University: Boston, MA, USA, 1978; Volume 879, Available online: https://scholarship.law.wm.edu/facpubs/879 (accessed on 13 January 2025).
- Solove, D.J. A taxonomy of privacy. Univ. Pa. Law Rev. 2006, 154, 477–488. [Google Scholar] [CrossRef]
- Solove, D.J. Understanding Privacy; Harvard University Press: Cambridge, MA, USA, 2008. [Google Scholar]
- Nissenbaum, H. Privacy in Context: Technology, Policy, and the Integrity of Social Life; Stanford University Press: Stanford, CA, USA, 2010. [Google Scholar]
- Marx, G.T. Windows into the Soul: Surveillance and Society in an Age of High Technology; University of Chicago Press: Chicago, IL, USA, 2016. [Google Scholar]
- Von Bertalanffy, L. General System Theory: Foundations, Development, Applications; George Braziller: New York, NY, USA, 1968. [Google Scholar]
- Von Bertalanffy, L. Perspectives on General System Theory: Scientific-Philosophical Studies; George Braziller: New York, NY, USA, 1975. [Google Scholar]
- Meadows, D.H. Thinking in Systems: A Primer; Wright, D., Ed.; Chelsea Green Publishing: White River Junction, VT, USA, 2008. [Google Scholar]
- Luhmann, N. Social Systems; Stanford University Press: Stanford, CA, USA, 1995. [Google Scholar]
- Luhmann, N. Introduction to Systems Theory; Barrett, P., Ed.; Polity Press: Cambridge, UK, 2013. [Google Scholar]
- Moeller, H.G. Luhmann Explained: From Souls to Systems; Open Court: Chicago, IL, USA, 2006. [Google Scholar]
- Foucault, M. Discipline and Punish: The Birth of the Prison; Sheridan, A., Translator; Pantheon Books: New York, NY, USA, 1977. [Google Scholar]
- Jackson, M. Critical Systems Thinking and the Management of Complexity; John Wiley & Sons: New York, NY, USA, 2019. [Google Scholar]
- Maturana, H.R.; Varela, F.J. The Tree of Knowledge: The Biological Roots of Human Understanding, 2nd ed.; Shambhala Publications: Boulder, CO, USA, 1992. [Google Scholar]
- Alvarez, J.T.; Ramírez Correa, P. Brief Review of Systems, Cybernetics, and Complexity. Complexity 2023, 2023, 8205320. [Google Scholar] [CrossRef]
- Kumar, S.; Bhowmik, B. Emergence, Evolution, and Applications of Cyber-Physical Systems in Smart Society. In Proceedings of the 2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 11–12 January 2024; pp. 1–8. [Google Scholar]
- European Parliament. General Data Protection Regulation (Regulation (EU) 2016/679). 2016. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN (accessed on 13 January 2025).
- Ogriseg, C. GDPR and Personal Data Protection in the Employment Context. Labour Law Issues 2017, 3, 1–24. [Google Scholar] [CrossRef]
- Kuner, C.; Bygrave, L.A.; Docksey, C.; Drechsler, L.; Tosoni, L. The EU General Data Protection Regulation: A Commentary/Update of Selected Articles; SSRN: Rochester, NY, USA, 2021. [Google Scholar] [CrossRef]
- Won, H.-M.; Lee, H.; Song, G.; Kim, Y.; Kwak, N. Reliable Data Collection Methodology for Face Recognition in Preschool Children. Sensors 2022, 22, 5842. [Google Scholar] [CrossRef] [PubMed]
- Der Landesbeauftragte für den Datenschutz Niedersachsen. LfD Niedersachsen Verhängt Bußgeld Über 10,4 Millionen Euro Gegen Notebooksbilliger.de. 2021. Available online: https://www.lfd.niedersachsen.de/startseite/infothek/presseinformationen/lfd-niedersachsen-verhangt-bussgeld-uber-10-4-millionen-euro-gegen-notebooksbilliger-de-196019.html (accessed on 7 February 2025).
- Kamarinou, D.; Van Alsenoy, B. Data protection law in the EU: Roles, responsibilities, and liability. Int. Data Priv. Law 2020, 10, 395–398. [Google Scholar] [CrossRef]
- de Hert, P.; Papakonstantinou, V. The new general data protection regulation: Still a sound system for the protection of individuals. Comput. Law Secur. Rev. 2016, 32, 179–194. [Google Scholar] [CrossRef]
- Nissenbaum, H. Protecting privacy in an information age: The problem of privacy in public. Law Philos. 1998, 17, 559–596. Available online: https://www.jstor.org/stable/3505189 (accessed on 13 January 2025).
- Lyon, D. Surveillance Studies: An Overview; Polity Press: Cambridge, UK, 2007. [Google Scholar]
- Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power; PublicAffairs: New York, NY, USA, 2019. [Google Scholar]
- Zhang, D.; Boerman, S.C.; Hendriks, H.; Araujo, T.; Voorveld, H. A Peek into Individuals’ Perceptions of Surveillance. In Advances in Advertising Research (Vol. XII); Vignolles, A., Waiguny, M.K., Eds.; European Advertising Academy, Springer Gabler: Wiesbaden, Germany, 2023; pp. 163–178. [Google Scholar] [CrossRef]
- Lyon, D. Surveillance Capitalism, Surveillance Culture and Data Politics. In Data Politics, 1st ed.; Bigo, D., Isin, E., Ruppert, E., Eds.; Routledge: London, UK, 2019; pp. 64–77. [Google Scholar] [CrossRef]
- Lankton, N.; McKnight, D.; Tripp, J. Technology, Humanness, and Trust: Rethinking Trust in Technology. J. Assoc. Inf. Syst. 2015, 16, 880–918. [Google Scholar] [CrossRef]
- Westin, A. Privacy and Freedom; Atheneum: New York, NY, USA, 1967. [Google Scholar]
- Manokha, I. Surveillance, Panopticism, and Self-Discipline in the Digital Age. Surveill. Soc. 2018, 16, 219–237. Available online: https://ojs.library.queensu.ca/index.php/surveillance-and-society/index (accessed on 22 April 2025). [CrossRef]
- Segijn, C.M.; Opree, S.J.; van Ooijen, I. The Validation of the Perceived Surveillance Scale. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2022, 16, 9. [Google Scholar] [CrossRef]
- Dencik, L.; Cable, J. Digital Citizenship and Surveillance: The Advent of Surveillance Realism—Public Opinion and Activist Responses to the Snowden Leaks. Int. J. Commun. 2017, 11, 763–781. [Google Scholar]
- Augusto, F.R.; Simões, M.J. To See and Be Seen, to Know and Be Known: Perceptions and Prevention Strategies on Facebook Surveillance. Soc. Sci. Inf. 2017, 56, 596–618. [Google Scholar] [CrossRef]
- Marx, G.T. What’s new about the “new surveillance”? Classifying for change and continuity. Surveill. Soc. 2002, 1, 9–29. [Google Scholar] [CrossRef]
- Henschke, A. Ethics in an Age of Surveillance: Personal Information and Virtual Identities; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar] [CrossRef]
- Ozili, P.K. The Acceptable R-Square in Empirical Modelling for Social Science Research. In Social Research Methodology and Publishing Results: A Guide to Non-Native English Speakers; IGI Global: Hershey, PA, USA, 2023; pp. 134–143. [Google Scholar]
- Bornewasser, M.; Kober, M. Videoüberwachung: Kriminalitätsreduzierung und gezielte Verdrängung. Bericht über eine Evaluationsmaßnahme in der Stadt Luxemburg [Video Surveillance: Crime Reduction and Targeted Displacement. Report on an Evaluation Measure in the City of Luxembourg]. Forum Krim. 2012, 2, 34–42. [Google Scholar]
- Bornewasser, M.; Schulz, F. Videoüberwachung öffentlicher Straßen und Plätze, Ergebnisse eines Pilotprojektes in Brandenburg. Ergebnisse der Evaluationsstudie im Land Brandenburg [Video Surveillance of Public Roads and Squares, Results of a Pilot Project in Brandenburg. Results of the Evaluation Study in the State of Brandenburg]. In Ergebnisse der Evaluationsstudie im Land Brandenburg; Bornewasser, M., Classen, C.D., Stolpe, I., Eds.; Verlag für Polizeiwissenschaft: Frankfurt am Main, Germany, 2008. [Google Scholar]
- Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; Podsakoff, N.P. Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies. J. Appl. Psychol. 2003, 88, 879–903. [Google Scholar] [CrossRef] [PubMed]
- Hu, L.T.; Bentler, P.M. Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria versus New Alternatives. Struct. Equ. Model. 1999, 6, 1–55. [Google Scholar] [CrossRef]
- Hayes, A.F. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach, 3rd ed.; The Guilford Press: New York, NY, USA, 2022. [Google Scholar]
- Mori, Y.; Tiiri, E.; Khanal, P.; Khakurel, J.; Mishina, K.; Sourander, A. Feeling Unsafe at School and Associated Mental Health Difficulties among Children and Adolescents: A Systematic Review. Children 2021, 8, 232. [Google Scholar] [CrossRef] [PubMed]
Model Fitting Information | Goodness-of-Fit | Pseudo R-Square | Test of Parallel Lines | |||||||
---|---|---|---|---|---|---|---|---|---|---|
Pearson | Deviance | |||||||||
Chi-Square | p | Chi-Square | p | Chi-Square | p | Nagelkerke | McFadden | Chi-Square | p | |
H1 | 250.056 | 0.000 | 157.414 | 0.194 | 136.190 | 0.644 | 0.507 | 0.148 | 15.945 | 0.143 |
H2 | 25.274 | 0.000 | 23.273 | 0.079 | 20.675 | 0.148 | 0.072 | 0.024 | 4.173 | 0.243 |
H3 | 5.473 | 0.019 | 60.130 | 0.095 | 63.758 | 0.052 | 0.015 | 0.004 | 16.552 | 0.122 |
H4a | 148.344 | 0.000 | 16.343 | 0.360 | 17.418 | 0.294 | 0.362 | 0.149 | 2.262 | 0.520 |
H4b | 186.090 | 0.000 | 31.383 | 0.008 | 22.599 | 0.093 | 0.432 | 0.185 | 2.619 | 0.454 |
H4c | 225.307 | 0.000 | 10.149 | 0.810 | 9.095 | 0.873 | 0.498 | 0.227 | 1.665 | 0.645 |
H4d | 246.532 | 0.000 | 95.672 | 0.321 | 76.715 | 0.840 | 0.531 | 0.248 | 5.836 | 0.442 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 3 | 1.240 | 0.235 | 27.843 | 0.000 | 0.780 | 1.701 |
4 | 1.910 | 0.233 | 67.304 | 0.000 | 1.454 | 2.366 | |
5 | 2.367 | 0.238 | 99.107 | 0.000 | 1.901 | 2.833 | |
6 | 3.079 | 0.254 | 146.917 | 0.000 | 2.581 | 3.577 | |
7 | 3.851 | 0.280 | 188.816 | 0.000 | 3.302 | 4.400 | |
8 | 4.512 | 0.307 | 215.587 | 0.000 | 3.910 | 5.115 | |
9 | 5.474 | 0.353 | 240.692 | 0.000 | 4.783 | 6.166 | |
10 | 6.416 | 0.404 | 252.747 | 0.000 | 5.625 | 7.207 | |
11 | 7.196 | 0.451 | 255.062 | 0.000 | 6.313 | 8.080 | |
12 | 7.873 | 0.495 | 252.922 | 0.000 | 6.903 | 8.843 | |
13 | 9.055 | 0.586 | 238.803 | 0.000 | 7.907 | 10.204 | |
14 | 9.562 | 0.635 | 226.624 | 0.000 | 8.317 | 10.806 | |
Location (β) | 0.603 | 0.042 | 201.783 | 0.000 | 0.520 | 0.686 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 1 | 0.493 | 0.332 | 2.206 | 0.138 | −0.158 | 1.144 |
2 | 1.419 | 0.337 | 17.697 | 0.000 | 0.758 | 2.079 | |
3 | 2.900 | 0.364 | 63.341 | 0.000 | 2.186 | 3.614 | |
4 | 4.652 | 0.428 | 118.229 | 0.000 | 3.814 | 5.491 | |
Location (β) | 0.534 | 0.104 | 26.381 | 0.000 | 0.330 | 0.738 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 3 | 0.022 | 0.366 | 0.004 | 0.952 | −0.695 | 0.739 |
4 | 0.553 | 0.366 | 2.273 | 0.132 | −0.166 | 1.271 | |
5 | 0.985 | 0.369 | 7.121 | 0.008 | 0.261 | 1.708 | |
6 | 1.361 | 0.372 | 13.374 | 0.000 | 0.632 | 2.091 | |
7 | 1.807 | 0.377 | 22.932 | 0.000 | 1.068 | 2.547 | |
8 | 2.198 | 0.383 | 32.887 | 0.000 | 1.447 | 2.950 | |
9 | 2.685 | 0.393 | 46.590 | 0.000 | 1.914 | 3.456 | |
10 | 3.077 | 0.405 | 57.779 | 0.000 | 2.284 | 3.871 | |
11 | 3.415 | 0.418 | 66.701 | 0.000 | 2.595 | 4.234 | |
12 | 3.767 | 0.437 | 74.417 | 0.000 | 2.911 | 4.622 | |
13 | 4.381 | 0.485 | 81.538 | 0.000 | 3.430 | 5.332 | |
14 | 4.748 | 0.528 | 80.971 | 0.000 | 3.714 | 5.782 | |
Location (β) | 0.222 | 0.096 | 5.349 | 0.021 | 0.034 | 0.411 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 1 | 1.396 | 0.202 | 47.604 | 0.000 | 0.999 | 1.792 |
2 | 2.726 | 0.238 | 131.022 | 0.000 | 2.259 | 3.192 | |
3 | 5.013 | 0.355 | 199.827 | 0.000 | 4.318 | 5.708 | |
4 | 6.086 | 0.419 | 210.951 | 0.000 | 5.265 | 6.907 | |
Location (β) 4a | 1.108 | 0.099 | 125.847 | 0.000 | 0.914 | 1.302 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 1 | 1.966 | 0.215 | 83.960 | 0.000 | 1.546 | 2.387 |
2 | 3.078 | 0.250 | 151.113 | 0.000 | 2.587 | 3.568 | |
3 | 5.100 | 0.354 | 207.192 | 0.000 | 4.405 | 5.794 | |
4 | 6.020 | 0.404 | 221.944 | 0.000 | 5.228 | 6.812 | |
Location (β) 4b | 1.291 | 0.105 | 151.503 | 0.000 | 1.085 | 1.496 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 1 | 2.110 | 0.228 | 85.910 | 0.000 | 1.664 | 2.556 |
2 | 3.658 | 0.281 | 169.428 | 0.000 | 3.108 | 4.209 | |
3 | 6.322 | 0.424 | 222.169 | 0.000 | 5.491 | 7.153 | |
4 | 7.591 | 0.497 | 233.520 | 0.000 | 6.617 | 8.564 | |
Location (β) 4c | 1.430 | 0.108 | 174.699 | 0.000 | 1.218 | 1.642 |
Estimate | SE | Wald Test | p | CI 95% | |||
---|---|---|---|---|---|---|---|
LL | UL | ||||||
Threshold (αj) | 1 | 2.491 | 0.249 | 100.458 | 0.000 | 2.004 | 2.979 |
2 | 4.104 | 0.306 | 179.881 | 0.000 | 3.504 | 4.703 | |
3 | 6.929 | 0.465 | 222.390 | 0.000 | 6.019 | 7.840 | |
4 | 8.259 | 0.544 | 230.645 | 0.000 | 7.193 | 9.325 | |
Location (β) 4d Item 9 | 1157 | 0.121 | 92.095 | 0.000 | 0.921 | 1.393 | |
Location (β) 4d Item 13 | 0.513 | 0.112 | 21.087 | 0.000 | 0.294 | 0.732 |
Estimate | Bias | SE | CI 95% | ||
---|---|---|---|---|---|
LL | UL | ||||
Location (β) 4a | 1.108 | 0.008 | 0.107 | 0.916 | 1.334 |
Estimate | Bias | SE | CI 95% | ||
---|---|---|---|---|---|
LL | UL | ||||
Location (β) 4b | 1.291 | 0.011 | 0.119 | 1.077 | 1.545 |
Estimate | Bias | SE | CI 95% | ||
---|---|---|---|---|---|
LL | UL | ||||
Location (β) 4c | 1.430 | 0.012 | 0.121 | 1.213 | 1.694 |
Estimate | Bias | SE | CI 95% | ||
---|---|---|---|---|---|
LL | UL | ||||
Location (β) 4d Item 9 | 1.157 | 0.010 | 0.140 | 0.896 | 1.442 |
Location (β) 4d Item 13 | 0.513 | 0.007 | 0.119 | 0.291 | 0.761 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Volosevici, D.; Isbasoiu, G.D. Surveillance as a Socio-Technical System: Behavioral Impacts and Self-Regulation in Monitored Environments. Systems 2025, 13, 614. https://doi.org/10.3390/systems13070614
Volosevici D, Isbasoiu GD. Surveillance as a Socio-Technical System: Behavioral Impacts and Self-Regulation in Monitored Environments. Systems. 2025; 13(7):614. https://doi.org/10.3390/systems13070614
Chicago/Turabian StyleVolosevici, Dana, and Gheorghe Dan Isbasoiu. 2025. "Surveillance as a Socio-Technical System: Behavioral Impacts and Self-Regulation in Monitored Environments" Systems 13, no. 7: 614. https://doi.org/10.3390/systems13070614
APA StyleVolosevici, D., & Isbasoiu, G. D. (2025). Surveillance as a Socio-Technical System: Behavioral Impacts and Self-Regulation in Monitored Environments. Systems, 13(7), 614. https://doi.org/10.3390/systems13070614