Loading…

The Effects of Security Threats on Antecedents of Police Legitimacy: Findings from a Quasi-Experiment in Israel

Objectives: Examine the relative importance of “police performance” and “procedural justice” as antecedents of police legitimacy in situations of acute security threats, in comparison to situations of “no threat.” Method: A unique security situation in Israel allowed for a natural experiment. Using...

Full description

Saved in:
Bibliographic Details
Published in:The journal of research in crime and delinquency 2013-02, Vol.50 (1), p.3-32
Main Authors: Jonathan-Zamir, Tal, Weisburd, David
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Objectives: Examine the relative importance of “police performance” and “procedural justice” as antecedents of police legitimacy in situations of acute security threats, in comparison to situations of “no threat.” Method: A unique security situation in Israel allowed for a natural experiment. Using survey data and a multivariate regression approach, the authors compare the importance of “procedural justice” and “police performance” in “Sderot,” an Israeli town facing immediate security threats, with other Israeli communities that did not suffer from specific security threats at the time. Results: As expected, assessments of police performance did increase in importance for the public under threat. At the same time and contrary to the authors' hypothesis, evaluations of procedural justice did not decline in importance, and, what is more, procedural justice remained the primary antecedent of police legitimacy in both conditions. Conclusions: There does not seem to be a zero-sum game between “police performance” and “procedural justice” in predicting police legitimacy. Moreover, procedural justice is consistently the primary antecedent of police legitimacy, even when the public is faced with the stressful situation of immediate security threats. The authors encourage future research to replicate their analysis in different settings and particularly under different conditions of security threats.
ISSN:0022-4278
1552-731X
DOI:10.1177/0022427811418002