{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T18:45:13Z","timestamp":1778006713985,"version":"3.51.4"},"reference-count":75,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T00:00:00Z","timestamp":1538956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Villanova Waterhouse Family Institute"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2019,3]]},"abstract":"<jats:p>The Panopticon is a popular metaphor in discussions about mass surveillance. Drawing on deterrence theory and chilling effects, we provide two empirical tests of this analogy to examine whether perceptions of online government surveillance suppress or entirely eradicate an array of sensitive online activities. Study 1 indicates that surveillance significantly deters individuals\u2019 intentions to engage in illegal offenses, an effect that extends to political, but not privacy-protective behaviors. Study 2 retests the pervasiveness of this effect with a sample of Muslims who reside in the United States. Results indicate that restrictive chilling effects are not specific to any one online population, experimental stimuli, or political context. Implications for US political and social systems are discussed.<\/jats:p>","DOI":"10.1177\/1461444818801317","type":"journal-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:42:53Z","timestamp":1539052973000},"page":"602-619","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":56,"title":["Privacy and the Panopticon: Online mass surveillance\u2019s deterrence and chilling effects"],"prefix":"10.1177","volume":"21","author":[{"given":"Elizabeth","family":"Stoycheff","sequence":"first","affiliation":[{"name":"Wayne State University, USA"}]},{"given":"Juan","family":"Liu","sequence":"additional","affiliation":[{"name":"Cleveland State University, USA"}]},{"given":"Kai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kunto","family":"Wibowo","sequence":"additional","affiliation":[{"name":"Wayne State University, USA"}]}],"member":"179","published-online":{"date-parts":[[2018,10,8]]},"reference":[{"key":"bibr1-1461444818801317","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding","author":"Altman I","year":"1975"},{"key":"bibr2-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2011.00233.x"},{"key":"bibr3-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-014-9236-3"},{"key":"bibr4-1461444818801317","unstructured":"Balko R (2016) Surprise! NSA data will soon routinely be used for domestic policing that has nothing to do with terrorism. The Washington Post, 10 March. Available at: https:\/\/www.washingtonpost.com\/news\/the-watch\/wp\/2016\/03\/10\/surprise-nsa-data-will-soon-routinely-be-used-for-domestic-policing-that-has-nothing-to-do-with-terrorism\/?utm_term=.2cf7297e41d9"},{"key":"bibr5-1461444818801317","unstructured":"Bamford J (2015) The great debate: why NSA surveillance is worse than you\u2019ve ever imagined. Reuters, 11 May. Available at: http:\/\/blogs.reuters.com\/great-debate\/2015\/05\/11\/if-yourenot-outraged-about-the-nsa-surveillance-heres-why-you-should-be\/"},{"key":"bibr6-1461444818801317","volume-title":"Panopticon: Or, the Inspection-House. Containing the Idea of a New Principle of Construction Applicable to Any Sort of Establishment, in Which Persons of Any Description Are to Be Kept Under Inspection, Etc","author":"Bentham J","year":"1791"},{"key":"bibr7-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2016.1228990"},{"key":"bibr8-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpr057"},{"key":"bibr9-1461444818801317","first-page":"818","volume":"9","author":"Bod\u00f3 B","year":"2015","journal-title":"International Journal of Communication"},{"key":"bibr10-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/0093650212449353"},{"key":"bibr11-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2016.1251329"},{"key":"bibr12-1461444818801317","first-page":"1527","volume":"3","author":"Brignall T","year":"2002","journal-title":"Theory & Science"},{"key":"bibr13-1461444818801317","first-page":"1117","volume-title":"The International Encyclopedia of Digital Communication and Society","author":"Brown I","year":"2015"},{"key":"bibr14-1461444818801317","first-page":"136","volume-title":"Testing Structural Equation Models","author":"Browne MW","year":"1993"},{"key":"bibr15-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4604_6"},{"key":"bibr16-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/1077699016640224"},{"key":"bibr17-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4604_6"},{"key":"bibr18-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.2.284"},{"key":"bibr19-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/1077699016640224"},{"key":"bibr20-1461444818801317","unstructured":"Clarke RA, Morell MJ, Stone GR, et al. (2013) Liberty and security in a changing world. Report and recommendations of the President\u2019s Review Group on Intelligence and Communications Technologies, 12 December. Available at: https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf"},{"key":"bibr21-1461444818801317","first-page":"3","volume":"59","author":"Deleuze G","year":"1992","journal-title":"October"},{"key":"bibr22-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.09.002"},{"key":"bibr23-1461444818801317","volume-title":"The Age of Surveillance","author":"Donner F","year":"1980"},{"key":"bibr24-1461444818801317","doi-asserted-by":"publisher","DOI":"10.3375\/043.036.0205"},{"key":"bibr25-1461444818801317","volume-title":"Discipline and Punish: The Birth of the Prison","author":"Foucault M","year":"1977"},{"key":"bibr26-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-016-0219-1"},{"key":"bibr27-1461444818801317","unstructured":"Gao G (2015) What Americans think about NSA surveillance, national security and privacy. Pew Research Center, 29 May. Available at: http:\/\/www.pewresearch.org\/fact-tank\/2015\/05\/29\/what-americans-think-about-nsa-surveillance-national-security-and-privacy\/"},{"key":"bibr28-1461444818801317","unstructured":"Gellman B, Tate J, Soltani A (5 July 2014) In NSA-intercepted data, those not targeted far outnumber the foreigners who are. Washington Post. Retrieved from: https:\/\/www.washingtonpost.com\/world\/national-security\/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are\/2014\/07\/05\/8139adf8-045a-11e4-8572-4b1b969b6322_story.html?utm_term=.0d07a012798b"},{"key":"bibr29-1461444818801317","volume-title":"Crime, Punishment and Deterrence","author":"Gibbs JP","year":"1975"},{"key":"bibr30-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.1753"},{"key":"bibr31-1461444818801317","unstructured":"Green E (2015) The objectification of Muslims in America. The Atlantic, 22 November. Available at: https:\/\/www.theatlantic.com\/politics\/archive\/2015\/11\/paris-attacks-muslims-america-trump\/417069\/"},{"key":"bibr32-1461444818801317","volume-title":"No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State","author":"Greenwald G","year":"2014"},{"key":"bibr33-1461444818801317","unstructured":"Greenwald G, Hussain M (2014) Meet the Muslim-American leaders the FBI and NSA have been spying on. The Intercept, 9 July. Available at: https:\/\/theintercept.com\/2014\/07\/09\/under-surveillance\/"},{"key":"bibr34-1461444818801317","first-page":"23","volume-title":"Theorizing Surveillance: The Panopticon and Beyond","author":"Haggerty KD","year":"2006"},{"key":"bibr35-1461444818801317","doi-asserted-by":"publisher","DOI":"10.4159\/9780674915077"},{"key":"bibr36-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"bibr37-1461444818801317","unstructured":"Karaganis J, Renkema L (2013) Copy culture in the U.S. & Germany. Report, The American Assembly, Columbia University, New York. Available at: http:\/\/piracy.americanassembly.org\/wp-content\/uploads\/2013\/01\/Copy-Culture.pdf"},{"key":"bibr38-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/14781158.2011.540092"},{"key":"bibr39-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743582"},{"key":"bibr40-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-012-9170-z"},{"key":"bibr41-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/0894439305278871"},{"key":"bibr42-1461444818801317","unstructured":"Lee TB (2013) Here\u2019s everything we know about PRISM to date. The Washington Post, 12 June. Available at: https:\/\/www.washingtonpost.com\/news\/wonk\/wp\/2013\/06\/12\/heres-everything-we-know-about-prism-to-date\/?utm_term=.b205ff740dab"},{"key":"bibr43-1461444818801317","doi-asserted-by":"publisher","DOI":"10.3828\/idpr.24.4.3"},{"key":"bibr44-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092699"},{"key":"bibr45-1461444818801317","volume-title":"Surveillance after Snowden","author":"Lyon D","year":"2015"},{"key":"bibr46-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.1.2.130"},{"key":"bibr47-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.097"},{"key":"bibr48-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/000312240607100105"},{"key":"bibr49-1461444818801317","doi-asserted-by":"publisher","DOI":"10.4135\/9781526401816"},{"key":"bibr50-1461444818801317","doi-asserted-by":"publisher","DOI":"10.2307\/2110816"},{"key":"bibr51-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211418338"},{"key":"bibr52-1461444818801317","first-page":"117","volume":"31","author":"Penney J","year":"2016","journal-title":"Berkley Technology Law Journal"},{"key":"bibr53-1461444818801317","doi-asserted-by":"publisher","DOI":"10.14763\/2017.2.692"},{"key":"bibr54-1461444818801317","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy. Dialectics of Disclosure","author":"Petronio S","year":"2002"},{"issue":"1","key":"bibr55-1461444818801317","first-page":"236","volume":"82","author":"Prior M","year":"2018","journal-title":"Public Opinion Quarterly"},{"key":"bibr56-1461444818801317","unstructured":"Rainie L (2016) The state of privacy in post-Snowden America. Pew Research Center, 21 September. Available at: http:\/\/www.pewresearch.org\/fact-tank\/2016\/09\/21\/the-state-of-privacy-in-america\/"},{"key":"bibr57-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2015.01.003"},{"key":"bibr58-1461444818801317","unstructured":"Savage C (2017) N.S.A. halts collection of Americans\u2019 emails about foreign targets. The New York Times, 28 April. Available at: https:\/\/www.nytimes.com\/2017\/04\/28\/us\/politics\/nsa-surveillance-terrorism-privacy.html"},{"key":"bibr59-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/19312458.2015.1118446"},{"key":"bibr60-1461444818801317","first-page":"685","volume":"58","author":"Schauer F","year":"1978","journal-title":"Boston University Law Review"},{"key":"bibr61-1461444818801317","volume-title":"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World","author":"Schneier B","year":"2015"},{"key":"bibr62-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/0093650205279209"},{"key":"bibr63-1461444818801317","first-page":"1264","volume":"72","author":"Solove D","year":"2004","journal-title":"George Washington Law Review"},{"key":"bibr64-1461444818801317","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-010-0039-7"},{"key":"bibr65-1461444818801317","volume-title":"The Culture of Surveillance: Discipline and Social Control in the United States","author":"Staples W","year":"1997"},{"key":"bibr66-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/1077699016630255"},{"key":"bibr67-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1177\/2059799116672879"},{"key":"bibr68-1461444818801317","author":"Stoycheff E","year":"2018","journal-title":"Information, Communication & Society"},{"key":"bibr69-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2017.1350278"},{"key":"bibr70-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12052"},{"key":"bibr71-1461444818801317","unstructured":"Thiessen MA (2013) Leaks, not the NSA programs, deserve condemnation. The Washington Post, 10 June. Available at: https:\/\/www.washingtonpost.com\/opinions\/marc-thiessen-leaks-not-the-nsa-programs-deserve-condemnation\/2013\/06\/10\/e91d09ac-d1c9-11e2-a73e-826d299ff459_story.html?hpid=z4&utm_term=.c393932088bb"},{"key":"bibr72-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1080\/1467271032000090143"},{"key":"bibr73-1461444818801317","unstructured":"United States v. Jones (2012) Available at: https:\/\/www.law.cornell.edu\/supremecourt\/text\/10-1259 (accessed 23 January 2012)."},{"key":"bibr74-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1093\/ijpor\/edr037"},{"key":"bibr75-1461444818801317","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195326215.001.0001"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444818801317","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444818801317","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444818801317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:47:34Z","timestamp":1777693654000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444818801317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,8]]},"references-count":75,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["10.1177\/1461444818801317"],"URL":"https:\/\/doi.org\/10.1177\/1461444818801317","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,8]]}}}