{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:53:21Z","timestamp":1759964001588,"version":"3.41.2"},"reference-count":47,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T00:00:00Z","timestamp":1502668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2017,8,14]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study aims to analyse the impacts of Edward Snowden\u2019s revelations in Spain focusing on issues of privacy and state surveillance. This research takes into consideration the Spanish context from a multidimensional perspective: social, cultural, legal and political.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The paper reviews the Spanish privacy and state surveillance situation. Responses to a questionnaire were collected from 207 university students studying at Universitat Rovira i Virgili or Burgos University. The quantitative responses to the survey were statistically analysed as well as qualitative considerations of free-text answers.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The survey outcomes demonstrate that a majority of respondents are aware of Snowden\u2019s revelations, but only a few have even considered taking serious actions to improve their online privacy. One of the most relevant findings is that Spanish citizens find it acceptable to lose privacy and be subject to state surveillance if that provides a benefit in security.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The research points out the importance of privacy in a multicultural environment. A sensitised society is a keystone for the healthy and balanced development of state surveillance policy and practice.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title>\n<jats:p>Training programmes are a critical dimension to ensure awareness across society regarding privacy and digital technologies. Suitable educational policies and curricula at all levels should be fostered.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Privacy and state surveillance based on information and communication technologies is an emerging research topic with important consequences for social values and ethics. This study provides an overview of Spanish higher education students\u2019 attitudes in these areas.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jices-11-2016-0044","type":"journal-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T07:25:41Z","timestamp":1498634741000},"page":"265-282","source":"Crossref","is-referenced-by-count":1,"title":["Surveillance following Snowden: a major challenge in Spain"],"prefix":"10.1108","volume":"15","author":[{"given":"Andrew A.","family":"Adams","sequence":"first","affiliation":[]},{"given":"Mario","family":"Arias-Oliva","sequence":"additional","affiliation":[]},{"given":"Ana Mar\u00eda","family":"Lara Palma","sequence":"additional","affiliation":[]},{"given":"Kiyoshi","family":"Murata","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020120611260106300_ref001","unstructured":"ABC (2007), \u201cUn inspector asegura que persegu\u00edan a varios de los acusados desde enero de 2003\u201d, 21st March, available at: www.abc.es\/hemeroteca\/historico-21-03-2007\/abc\/Nacional\/un-inspector-asegura-que-perseguian-a-varios-de-los-acusados-desde-enero-de-2003_1632098197387.html (accessed 28 October 2016)."},{"issue":"1","key":"key2020120611260106300_ref002","first-page":"158","article-title":"Facebook code social network sites platform affordances and privacy","volume":"23","year":"2014","journal-title":"Journal of Law, Information and Science"},{"key":"key2020120611260106300_ref003","unstructured":"Arrieta, E. (2015), \u201c\u00bfNos esp\u00edan los gobiernos?\u201d, Diario Expansi\u00f3n, available at: www.expansion.com\/tecnologia\/2015\/05\/23\/555cc862ca474168478b45b8.html (accessed 23 May, 2015)."},{"key":"key2020120611260106300_ref004","unstructured":"Ballesteros, R. (2013), \u201cEl Centro de prospectiva de la guardia civil pronostica una sociedad v\u00eddeo vigilada antes de 2030\u201d, lainformacion.com, available at: http:\/\/noticias.lainformacion.com\/espana\/el-centro-de-prospectiva-de-la-guardia-civil-pronostica-una-sociedad-video-vigilada-antes-de-2030_WjlPAkMoqAYkoHoNbfb387\/ (accessed 15 January 2015)."},{"issue":"2","key":"key2020120611260106300_ref005","first-page":"6","article-title":"The ethics of unbreakable encryption: Rawlsian privacy and the San Bernardino iPhone","volume":"22","year":"2017","journal-title":"First Monday"},{"key":"key2020120611260106300_ref006","unstructured":"BBC News (2013), \u201cNSA surveillance: Spain demands US explains \u2018monitoring\u2019\u201d, 28 October, available at: www.bbc.com\/news\/world-europe-24708410 (accessed 31 October 2016)."},{"issue":"1","key":"key2020120611260106300_ref007","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1207\/s15427579jpfm0701_2","article-title":"The demographics of overconfidence","volume":"7","year":"2006","journal-title":"The Journal of Behavioral Finance"},{"key":"key2020120611260106300_ref008","unstructured":"Bonney, W. and Barnett, A. (2014), \u201c\u2018We had to wait for Snowden for proof\u2019, an exchange with NSA whistleblower William Binney\u201d, openDemocracy, 5th June, available at: www.opendemocracy.net\/william-binney-anthony-barnett\/%E2%80%9Cwe-had-to-wait-for-snowden-for-proof%E2%80%9D-exchange-with-william-binney (accessed 30 November 2016)."},{"key":"key2020120611260106300_ref009","unstructured":"Borger, J. (2013), \u201cGCHQ and European spy agencies worked together on mass surveillance\u201d, The Guardian, 1st November, available at: www.theguardian.com\/uk-news\/2013\/nov\/01\/gchq-europe-spy-agencies-mass-surveillance-snowden (accessed 28 October 2016)."},{"key":"key2020120611260106300_ref010","unstructured":"Bowcott, O. (2015), \u201cIntelligence officers given immunity from hacking laws, tribunal told\u201d, The Guardian, 15th May, available at: www.theguardian.com\/uk-news\/2015\/may\/15\/intelligence-officers-have-immunity-from-hacking-laws-tribunal-told (accessed 2 November 2015)."},{"key":"key2020120611260106300_ref011","unstructured":"Campbell, D. (2015), \u201cGCHQ and me: my life unmasking British eavesdroppers\u201d, The Intercept, 3rd August, available at: https:\/\/theintercept.com\/2015\/08\/03\/life-unmasking-british-eavesdroppers\/ (accessed 2 November 2016)."},{"issue":"5","key":"key2020120611260106300_ref012","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1080\/0140238042000283247","article-title":"The 2004 Spanish election: terrorism as a catalyst for change?","volume":"27","year":"2004","journal-title":"West European Politics"},{"year":"2015","key":"key2020120611260106300_ref013","article-title":"United States of secrets: how the NSA spying programs have changed since Snowden"},{"year":"2014","key":"key2020120611260106300_ref014","article-title":"Surveillance in Spain: a slowly developing debate amid political indifference"},{"key":"key2020120611260106300_ref015","unstructured":"CNI (2015), \u201cEl CNI, al servicio de Espa\u00f1a y de los espa\u00f1oles; Centro Nacional de Inteligencia\u201d, available at: www.cni.es\/es\/queescni\/historia\/elcni\/ (accessed 15 January 2015)."},{"key":"key2020120611260106300_ref016","unstructured":"Delle Femmine, L. (2014), \u201cEl gobierno espa\u00f1ol hace muy buen espionaje, entrevista a Eugene Kaspersky\u201d, available at: http:\/\/tecnologia.elpais.com\/tecnologia\/2014\/05\/05\/actualidad\/1399281568_671465.html (accessed 15 January 2015)."},{"article-title":"ECJ Joined Cases C-293\/12 and C-594\/12","year":"2012","author":"Digital Rights Ireland v. Minister for Communications","key":"key2020120611260106300_ref017"},{"article-title":"Directive 2006\/24\/EC of the European parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC","year":"2006","author":"Directive 2006\/24\/EC","key":"key2020120611260106300_ref018"},{"key":"key2020120611260106300_ref019","unstructured":"European Parliamentary Research Service (2015), \u201cMass surveillance, risk, opportunities and mitigation strategies report\u201d, available at: www.europarl.europa.eu\/RegData\/etudes\/STUD\/2015\/527409\/EPRS_STU%282015%29527409_REV1_EN.pdf (accessed 15 January 2015)."},{"key":"key2020120611260106300_ref020","unstructured":"FRONTEX (2016), \u201cWestern Mediterranean route: report from the European border and coastguard agency\u201d, available at: http:\/\/frontex.europa.eu\/trends-and-routes\/western-mediterranean-route\/ (accessed 28 November 2016)."},{"key":"key2020120611260106300_ref021","unstructured":"Galiacho, J.L. (2007), \u201cLas escuchas del CESID. Los esp\u00edas del gobierno grababan hasta al rey, 18 historias que cambiaron Espa\u00f1a\u201d, El Mundo, available at: www.elmundo.es\/especiales\/2007\/10\/comunicacion\/18elmundo\/cesid.html (accessed 15 January 2015)."},{"volume-title":"Breve Historia de Espa\u00f1a","year":"2012","key":"key2020120611260106300_ref022"},{"key":"key2020120611260106300_ref023","unstructured":"Government of the Principality of Asturias (2015), \u201cARCO rights\u201d, available at: https:\/\/sede.asturias.es\/portal\/site\/Asturias\/menuitem.fe57bf7c5fd38046e44f5310bb30a0a0\/?vgnextoid=290c7a0266719210VgnVCM10000097030a0aRCRD (accessed 15 January 2015)."},{"issue":"3","key":"key2020120611260106300_ref024","first-page":"1","article-title":"The politics of surveillance policy: UK regulatory dynamics after Snowden","volume":"5","year":"2016","journal-title":"Internet Policy Review"},{"key":"key2020120611260106300_ref025","unstructured":"INE (2014), \u201cNotas de presa: Encuesta sobre Equipamiento y uso de Tecnolog\u00edas de Informaci\u00f3n y Comunicaci\u00f3n en los Hogares\u201d, available at: www.ine.es\/prensa\/np864.pdf (accessed 15 January 2015)."},{"key":"key2020120611260106300_ref026","unstructured":"INTECO (2014), \u201cEstudio sobre la ciberseguridad y confianza de los hogares espa\u00f1oles\u201d, Instituto Nacional de Tecnolog\u00edas de Comunicaci\u00f3n, available at: www.ontsi.red.es\/ontsi\/sites\/default\/files\/ciberseguridad_y_confianza_en_los_hogares.pdf (accessed 15 January 2015)."},{"volume-title":"The Psychology of Cybercrime: Concepts and Principles, Igi Global","year":"2012","key":"key2020120611260106300_ref027"},{"issue":"3","key":"key2020120611260106300_ref028","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1097\/00000637-199609000-00006","article-title":"The seven deadly sins of statistical analysis","volume":"37","year":"1996","journal-title":"Annals of plastic surgery"},{"issue":"2","key":"key2020120611260106300_ref029","doi-asserted-by":"crossref","first-page":"151","DOI":"10.2307\/2574595","article-title":"Some observations on measurement and statistics","volume":"46","year":"1967","journal-title":"Social Forces"},{"volume-title":"Risks and Safety on the Internet: The Perspective of European Children: Full Findings and Policy Implications from the EU Kids Online Survey of 9-16 Year Olds and their Parents in 25 Countries","year":"2011","key":"key2020120611260106300_B1a"},{"key":"key2020120611260106300_ref030","unstructured":"Madden, M. (2014), \u201cPublic perceptions of privacy and security in the post-Snowden Era\u201d, available at: www.pewinternet.org\/2014\/11\/12\/public-privacy-perceptions\/ (accessed 21 March, 2017)."},{"issue":"2","key":"key2020120611260106300_ref031","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/15295036.2014.921320","article-title":"Crypto war II","volume":"31","year":"2014","journal-title":"Critical Studies in Media Communication"},{"issue":"3","key":"key2020120611260106300_ref032","article-title":"Following Snowden: a cross-cultural study on social impact of Snowden\u2019s revelations","volume":"15","year":"2017","journal-title":"Journal of Information, Communication and Ethics in Society"},{"key":"key2020120611260106300_ref033","unstructured":"Nash, E. (2006), \u201cMadrid bombers \u2018were inspired by Bin Laden address\u2019\u201d, The Independent, 7th November, available at: www.independent.co.uk\/news\/world\/europe\/madrid-bombers-were-inspired-by-bin-laden-address-423266.html (accessed 28 October 2016)."},{"key":"key2020120611260106300_ref034","unstructured":"National Crime Prevention Council (NCPC) (2007), \u201cTeens and Cyberbullying\u201d, available at: www.ncpc.org\/resources\/files\/pdf\/bullying\/Teens%20and%20Cyberbullying%20Research%20Study.pdf (accessed 17 November 2016)."},{"issue":"5","key":"key2020120611260106300_ref035","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/s10459-010-9222-y","article-title":"Likert scales, levels of measurement and the \u201claws\u201d of statistics","volume":"15","year":"2010","journal-title":"Advances in health sciences education"},{"issue":"5","key":"key2020120611260106300_ref036","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1177\/0963662510376886","article-title":"Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security","volume":"21","year":"2012","journal-title":"Public Understanding of Science"},{"issue":"4","key":"key2020120611260106300_ref037","doi-asserted-by":"crossref","first-page":"528","DOI":"10.24908\/ss.v12i4.4145","article-title":"Surveillance and student dissent: the case of the Franco dictatorship","volume":"12","year":"2014","journal-title":"Surveillance and Society"},{"volume-title":"Fear and Progress: Ordinary Lives in Franco\u2019s Spain, 1939-1975","year":"2009","key":"key2020120611260106300_ref038"},{"volume-title":"Nothing to Hide: The False Tradeoff Between Privacy and Security","year":"2011","key":"key2020120611260106300_ref039"},{"key":"key2020120611260106300_ref040","unstructured":"Spetalnick, M. and Holland, S. (2013), \u201cObama defends surveillance effort as \u2018trade-off\u2019 for security\u201d, Reuters, 7th June, available at: www.reuters.com\/article\/us-usa-security-records-idUSBRE9560VA20130608 (accessed 30 November, 2016)."},{"key":"key2020120611260106300_ref041","unstructured":"The Spanish Constitution (1978), available at: www.boe.es\/legislacion\/documentos\/ConstitucionINGLES.pdf (accessed 1 November 2016)."},{"key":"key2020120611260106300_ref042","unstructured":"Travis, A. (2016), \u201cUK security agencies unlawfully collected data for 17 years, court rules\u201d, The Guardian, 17th October, available at: https:\/\/www.theguardian.com\/world\/2016\/oct\/17\/uk-security-agencies-unlawfully-collected-data-for-decade (accessed 18 November 2016)."},{"key":"key2020120611260106300_ref043","unstructured":"Constituci\u00f3n Espa\u00f1ola (1978), \u201cBOE n\u00fam. 311, 29 de diciembre de 1978\u201d, available at: www.congreso.es\/consti\/index.htm (accessed 5 January 2015)."},{"key":"key2020120611260106300_ref044","unstructured":"Comisi\u00f3n Espa\u00f1ola de Ayuda al Refugiado (2016), \u201cInforme 2015. Las personas refugiadas en Espa\u00f1a y en Europa\u201d, available at: www.cear.es\/wp-content\/uploads\/2016\/06\/Informe_CEAR_2016.pdf (accessed 4 April 2017)."},{"journal-title":"Christian Science Monitor","article-title":"A private eye does an online search of us","year":"2009","key":"key2020120611260106300_ref045"},{"volume-title":"Asilo en Cifras (2008-2014)","year":"2016","author":"Spanish Government","key":"key2020120611260106300_ref046"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-11-2016-0044\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-11-2016-0044\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:52Z","timestamp":1753393132000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/15\/3\/265-282\/215122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,14]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,14]]}},"alternative-id":["10.1108\/JICES-11-2016-0044"],"URL":"https:\/\/doi.org\/10.1108\/jices-11-2016-0044","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2017,8,14]]}}}