Loading…
The Effects of Security Threats on Antecedents of Police Legitimacy: Findings from a Quasi-Experiment in Israel
Objectives: Examine the relative importance of “police performance” and “procedural justice” as antecedents of police legitimacy in situations of acute security threats, in comparison to situations of “no threat.” Method: A unique security situation in Israel allowed for a natural experiment. Using...
Saved in:
Published in: | The journal of research in crime and delinquency 2013-02, Vol.50 (1), p.3-32 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Objectives: Examine the relative importance of “police performance” and “procedural justice” as antecedents of police legitimacy in situations of acute security threats, in comparison to situations of “no threat.” Method: A unique security situation in Israel allowed for a natural experiment. Using survey data and a multivariate regression approach, the authors compare the importance of “procedural justice” and “police performance” in “Sderot,” an Israeli town facing immediate security threats, with other Israeli communities that did not suffer from specific security threats at the time. Results: As expected, assessments of police performance did increase in importance for the public under threat. At the same time and contrary to the authors' hypothesis, evaluations of procedural justice did not decline in importance, and, what is more, procedural justice remained the primary antecedent of police legitimacy in both conditions. Conclusions: There does not seem to be a zero-sum game between “police performance” and “procedural justice” in predicting police legitimacy. Moreover, procedural justice is consistently the primary antecedent of police legitimacy, even when the public is faced with the stressful situation of immediate security threats. The authors encourage future research to replicate their analysis in different settings and particularly under different conditions of security threats. |
---|---|
ISSN: | 0022-4278 1552-731X |
DOI: | 10.1177/0022427811418002 |