Skip to main content

Why Do Established Democracies Violate Human Rights?

  • Chapter
  • First Online:

Abstract

Received wisdom holds that democracies pay more respect to physical integrity rights than do non-democracies. Time and again, however, political realities belie this so-called domestic democratic peace. Even high-capacity democracies engage in torture, political imprisonment, extrajudicial killings, and forced disappearances. Using data on 29 countries between 1995 and 2007, this chapter studies triggers of and remedies to human rights abuses in democratic regimes. Departing from the well-known threat-repression nexus, it hypothesizes that democracies disrespect physical integrity in response to violent political threats, e.g., riots and terrorism. However, the degree to which democratic governments exploit such challenges for human rights abuses depends on the strength of the judiciary. In the presence of strong, autonomous courts, the chapter hypothesizes, governments are confined to lawful action. Consequently, as the strength of the judiciary increases, violent threats should become less conducive to physical integrity violations. While the analysis supports the provocative effect of riots and terrorism, it yields scant evidence that strong judiciaries pacify government action. In conclusion, established democracies fight fire with fire, and they turn out to be more than occasional sinners.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This chapter strongly benefited from many critical comments and suggestions by Onawa Promise Lacewell, who also authored parts of an earlier draft. Furthermore, I would like to thank Julian Brückner, Heiko Giebler, Sascha Kneip, Alexander Petring, Aiko Wagner, Annika Werner, Bernhard Weßels, and Wolfgang Merkel who provided invaluable advice.

  2. 2.

    Note that equality is also widely regarded as a necessary condition (Dahl 1971, p. 2), respectively, “functional requirement” (Merkel et al. 2003, p. 41) of democracy.

  3. 3.

    Note that this interpretation boils down to an exclusively reactive take on government-sponsored physical integrity violations. It discards much detail of the behavioral reciprocity between political dissidents and governments. In other words, political dissent might precede as well as follow violent state coercion, implying a certain endogeneity of the research design. However, this analysis ultimately focuses on institutional remedies against government-sponsored physical integrity violations once behavioral threats have been identified. A reactive interpretation suffices for the problem at hand because even an endogenous relationship between political threats and government responses should still be moderated by political institutions.

  4. 4.

    The countries are Australia, Austria, Belgium, Canada, Costa Rica, Cyprus, the Czech Republic, Denmark, Finland, France, Germany, Hungary, Iceland, Ireland, Italy, Japan, Luxembourg, Malta, the Netherlands, New Zealand, Norway, Poland, Portugal, Slovenia, South Africa, Spain, Sweden, Switzerland, the UK, and the USA.

  5. 5.

    Given the importance of the CIRI data, some detail on the coding process is justified. Cingranelli and Richards take only violations into account where citizens come to harm by the hands of government agents within the internationally recognized borders of the state. This excludes human rights violations such as the events of Abu Ghraib in late 2003. Moreover, each violation is to be treated separately, even if there is only one victim. If, for example, a criminal suspect suffers lethal injuries from police brutality, the incidence will be counted as both torture and extrajudicial killing. In order to increase inter-coder reliability, Cingranelli and Richards instruct their coders to rely on numerical thresholds whenever possible. A score of 2 is to be awarded when there are no confirmed incidences, a score of 1 if there is at least one confirmed incident, and a score of 0 if there are at least 50 confirmed incidences of abuse. Finally, Cingranelli and Richards provide their coders with a list of keywords to judge the frequency of physical integrity violations, whenever the information is insufficient to apply the numerical thresholds (see Cingranelli and Richards 2008).

  6. 6.

    This aggregation strategy is subject to debate (McCormick and Mitchell 1997). Notwithstanding, Cingranelli and Richards (1999) as well as Fariss and Schnakenberg (2013) offer striking empirical evidence on the homogeneity of the index, and aggregation is thus justified.

  7. 7.

    The following definitions apply: (a) demonstrations (“Dissent collectively, publicly show negative feelings or opinions; rally, gather to protest a policy, action, or actor(s)”), (b) strikes (“Protest by refusing to work or cooperate until certain demands are met, [...]”), (c) riots (“Protest forcefully, in a potentially destructive manner, [...]”) (Schrodt 2012, 66ff.).

  8. 8.

    The set of state actors includes police forces, the government in terms of the executive and governing parties, the military, and the state intelligence agencies (Schrodt 2012, p. 93). Whenever one of these actors was coded as the source of political dissent, the event was excluded from the analysis.

  9. 9.

    South Africa skews the distribution of the dependent variable tremendously. As a precaution against potential problems during the estimation stage I log-transform the index in all subsequent models (see Fox and Weisberg 2011, p. 140).

  10. 10.

    To analyze possible trends, I used variance partition models with varying intercepts and varying slopes on t. I found positive statistically significant trends for the USA, Canada, New Zealand, Slovenia, and France. The most complex of these models reads y it  = β 0u[i] + β 1u[i] t it  E it . Here y it indicates the logged measurement of physical integrity violations in country i at time t, β 0u[i] is a short-hand notation for the country-varying intercept, and β 1u[i] denotes the by-country-varying coefficient on the trend indicator t it . Finally, E it denotes the error term. More detail is available from Table 13.3 in the appendix. Moreover, following advice from Rabe-Hesketh and Skrondal (2008, 473ff.) and Gelman and Hill (2006, 243f.), I ran additional cross-classified models. Such models group observations by countries and years simultaneously. They are sensitive to temporal influences that apply to individual observation years and affect all countries jointly. Once I introduced the linear trend, the grouping by observations years became redundant. Thus, my data offer little evidence of temporal influences that stick to particular observation years such as the 9/11 attacks. All models were estimated and inspected using the methods and techniques provided by Wickham (2009), Fox and Weisberg (2011), Bates et al. (2013), Pinheiro et al. (2013), and R Core Team (2013).

  11. 11.

    For detailed results, please refer to Table 13.4 in the Appendix.

  12. 12.

    The fully specified individual level model is:

    y it  = β 0i  + β 1i t it  + β 2 Threat Peace,it  + β 3 Threat Violent,it  + β 4 Inequality it  + β 5 Pop. Growth it  + β 6 War it  + E it ,

    with varying intercept (β 0i ) and slope (β 1i )

    β 0i  = γ 00 + γ 01 Rule of Law i  + γ 02 Electoral Competition i  + u 0i

    β 1i  = γ 10 + u 1i ,

    and cross-level interaction effect

    β 3 = γ 30 + γ 31 Rule of Law i .

    By convention cross-level interactions often include a varying slope for the focal predictor, i.e., β 2 in this case. Since there is little theoretical reason to believe that the effect of violent political threats differs by established democracy and additional testing proved this variance component insignificant, I do not include a varying slope for violent political threats.

  13. 13.

    See column IV of Table 13.4 in the Appendix.

References

  • Acemoglu, D., & Robinson, J. A. (2000). Democratization or repression? inequality, growth and development. European Economic Review, 44, 683–693.

    Article  Google Scholar 

  • Acemoglu, D., & Robinson, J. A. (2006). Economic origins of dictatorship and democracy. Cambridge/New York: Cambridge University Press.

    Google Scholar 

  • Alvarez, M., Cheibub, J. A., Przeworski, A., & Limongi, F. (1996). Classifying political regimes. Studies in Comparative International Development, 31(2), 3–36.

    Article  Google Scholar 

  • Amnesty International. (2006). Amnesty International report 2006: The state of the world’s human rights. London: Amnesty International Publications.

    Google Scholar 

  • Amnesty International. (2007). Amnesty International report 2007: The state of the world’s human rights. Witney, UK: The Alden Press.

    Google Scholar 

  • Amnesty International. (2008). Amnesty International report 2008: The state of the world’s human rights. London: Amnesty International Publications.

    Google Scholar 

  • Amnesty International. (2011). Amnesty International report 2011: The state of the world’s human rights. London: Amnesty International Publications.

    Google Scholar 

  • Arendt, H. (1972). Civil disobedience. In H. Arendt (Ed.), Crises of the republic (pp. 49–102). New York, NY: Harcourt Brace Jovanovich.

    Google Scholar 

  • Armstrong, D. A. (2009). Measuring the democracy-repression nexus. Electoral Studies, 28(3), 403–412.

    Article  Google Scholar 

  • Bates, D., Maechler, M., & Bolker, B. (2013). lme4: Linear mixed-effects models using s4 classes. Accessed April 11, 2017, from http://CRAN.R-project.org/package=lme4

  • Bueno de Mesquita, B., Downs, G. W., & Smith, A. (2005). Thinking inside the box: A closer look at democracy and human rights. International Studies Quarterly, 49(3), 439–457.

    Google Scholar 

  • Bühlmann, M., Merkel, W., Müller, L., & Weßels, B. (2012a). The democracy barometer: A new instrument to measure the quality of democracy and its potential for comparative research. European Political Science, 11(4), 519–536.

    Article  Google Scholar 

  • Bühlmann, M., Merkel, W., Müller, L., Giebler, H., & Weßels, B. (2012b). Demokratiebarometer: Ein neues Instrument zur Messung von Demokratiequalität. Zeitschrift für Vergleichende Politikwissenschaft, 6, 115–159.

    Article  Google Scholar 

  • Cheibub, J. A., Gandhi, J., & Vreeland, J. (2010). Democracy and dictatorship revisited. Public Choice, 143(1/2), 67–101.

    Article  Google Scholar 

  • Cingranelli, D. L., & Richards, D. L. (1999). Measuring the level, pattern, and sequence of government repect for physical integrity rights. International Studies Quarterly, 43(2), 407–417.

    Article  Google Scholar 

  • Cingranelli, D. L., & Richards, D. L. (2008). The cingranelli-richards (ciri) human rights data project coding manual: Manual version 2008.3.13. Accessed April 11, 2017, from http://www.humanrightsdata.org/documentation/ciri coding guide.pdf

  • Cingranelli, D. L., & Richards, D. L. (2013). The cingranelli-richards (ciri) human rights dataset: Dataset version: 2013.08.01. Accessed April 11, 2017, from http://www.humanrightsdata.org

  • Cingranelli, D. L., Richards, D. L., & Cingranelli, D. L. (2010). The Cingranelli and Richards (ciri) human rights data project. Human Rights Quarterly, 32(2), 401–424.

    Article  Google Scholar 

  • Collier, D., & Levitsky, S. (1997). Democracy with adjectives: Conceptual innovation in comparative research. World Politics, 49(3), 430–451.

    Article  Google Scholar 

  • Dahl, R. A. (1971). Polyarchy: Participation and opposition. New Haven, CT: Yale University Press.

    Google Scholar 

  • Dahl, R. A. (1989). Democracy and its critics. New Haven, CT: Yale University Press.

    Google Scholar 

  • Davenport, C. (1995). Multi-dimensional threat perception and state repression: An inquiry into why states apply negative sanctions. American Journal of Political Science, 39(3), 683–713.

    Article  Google Scholar 

  • Davenport, C. (1999). Human rights and the democratic proposition. Journal of Conflict Resolution, 43(1), 92–116.

    Article  Google Scholar 

  • Davenport, C. (2000). Introduction. In C. Davenport (Ed.), Paths to state repression (pp. 1–24). Lanham, MD: Rowman & Littlefield.

    Google Scholar 

  • Davenport, C. (2007a). State repression and political order. Annual Review of Political Science, 10(1), 1–23.

    Article  Google Scholar 

  • Davenport, C. (2007b). State repression and the domestic democratic peace. New York, NY: Cambridge University Press.

    Book  Google Scholar 

  • Davenport, C., & Armstrong, D. A. (2004). Democracy and the violation human rights: A statistical analysis from 1976 to 1996. American Journal of Political Science, 48(3), 538–554.

    Article  Google Scholar 

  • Davenport, C., & Inman, M. (2012). The state of repression research since the 1990s. Terrorism and Political Violence, 24(3), 619–634.

    Article  Google Scholar 

  • Downs, A. (1957). An economic theory of democracy. New York, NY: Harper.

    Google Scholar 

  • Earl, J. (2011). Political repression: Iron fists, velvet gloves, and diffuse control. Annual Review of Sociology, 37(1), 261–284.

    Article  Google Scholar 

  • Fariss, C. J., & Schnakenberg, K. E. (2013). Measuring mutual dependence between state repressive actions. Journal of Conflict Resolution, 58(6), 1003–1032. https://doi.org/10.1177/0022002713487314.

    Article  Google Scholar 

  • Fox, J., & Weisberg, S. (2011). An R companion to applied regression (2nd ed.). Beverly Hills, CA & London: Sage.

    Google Scholar 

  • Francisco, R. A. (1995). The relationship between coercion and protest: An empirical evaluation in three coercive states. Journal of Conflict Resolution, 39(2), 263–282.

    Article  Google Scholar 

  • Francisco, R. A. (1996). Coercion and protest: An empirical test in two democratic states. American Journal of Political Science, 40(4), 1179–1204.

    Article  Google Scholar 

  • Gartner, S., & Regan, P. (1996). Threat and repression: The non-linear relationship between government and opposition violence. Journal of Peace Research, 33(3), 273–287.

    Article  Google Scholar 

  • Gelman, A., & Hill, J. (2006). Applied regression and multilevel/hierarchical models. Cambridge/New York: Cambridge University Press.

    Book  Google Scholar 

  • Gurr, T. R. (1986). The political origins of state violence and terror: A theoretical analysis. In M. Stohl & G. A. Lopez (Eds.), Government violence and repression (pp. 45–72). New York, NY: Greenwood Press.

    Google Scholar 

  • Habermas, J. (2001). Between facts and norms. Contributions to a discourse theory of law and democracy. Cambridge, MA: The MIT Press.

    Google Scholar 

  • Henderson, C. W. (1993). Population pressures and political repression. Social Science Quarterly, 74(2), 322–333.

    Google Scholar 

  • Heston, A., Summers, R., & Aten, B. (2012). Pwt 7.1: Penn world table version 7.1. Accessed April 11, 2017, from http://pwt.econ.upenn.edu/php site/pwt index.php

  • Hidalgo, O. (2013). Der Leviathan zwischen “demokratischer” Zähmung und “totaler” Entgrenzung: Schmitte, Hobbes und der Ausnahmezustand als staatstheoretische Herausforderung. In R. Voigt (Ed.), Ausnahmezustand, Vol. 57 of Staatsverständnisse (pp. 58–84). Nomos: Baden-Baden.

    Chapter  Google Scholar 

  • Hobbes, T. (2010). Leviathan, or, The matter, form, & power of a common-wealth ecclesiastical and civil: edited by Ian Shapiro. Rethinking the Western tradition. New Haven, CT: Yale University Press.

    Google Scholar 

  • Hox, J. J. (2010). Multilevel analysis: Techniques and applications (2nd ed.). London: Routledge.

    Google Scholar 

  • Karl, T. L. (1986). Imposing Consent? Electoralism vs. Democratization in El Salvador. In P. Drake & E. Silva (Eds.), Elections and Democratization in Latin America, Vol. 1985, Center for Iberian and Latin American Studies (pp. 9–36). San Diego, CA: Center for US/Mexican Studies, University of California.

    Google Scholar 

  • Keesing’s. (2013a). Turkey: Anti-government protests. Keesing’s Record of World Events, 59, 52740.

    Google Scholar 

  • Keesing’s. (2013b). United states: Presidential revision of anti-terrorism strategy. Keesing’s Record of World Events, 59(5), 52655–52656.

    Google Scholar 

  • Keith, L. C. (2002). Constitutional provisions for individual human rights (1977–1996): Are they more than mere ‘window dressing?’. Political Research Quarterly, 55(1), 111–143.

    Google Scholar 

  • Kersting, W. (2007). Thomas Hobbes, Leviathan (1651). In M. Brocker (Ed.), Geschichte des politischen Denkens (pp. 212–225). Frankfurt am Main: Suhrkamp.

    Google Scholar 

  • King, J. C. (2000). Exploring the ameliorating effects of democracy on political repression: Cross-national evidence. In C. Davenport (Ed.), Paths to state repression (pp. 217–239). Lanham, MD: Rowman & Littlefield.

    Google Scholar 

  • Leetaru, K., & Schrodt, P. (2013). Gdelt: Global data on events, language, and tone, 1979–2012. Paper presented at the International studies association annual conference, April 2013, San Diego, CA. Accessed April 11, 2017, from http://gdelt.utdallas.edu/data/documentation/ISA.2013.GDELT.pdf

  • Lichbach, M. I. (1987). Deterrence or escalation? the puzzle of aggregate studies of repression and dissent. The Journal of Conflict Resolution, 31(2), 266–297.

    Article  Google Scholar 

  • Locke, J. (1988). Two treatises of government. Cambridge, MA: Cambridge University Press.

    Book  Google Scholar 

  • Mainwaring, S., Brinks, D., & Pérez-Linán, A. (2001). Classifying Political Regimes in Latin America, 1945–1999. Studies in Comparative International Development, 36(1), 37–65.

    Article  Google Scholar 

  • McCormick, J., & Mitchell, N. J. (1997). Human rights violations, umbrella concepts, and empirical analysis. World Politics, 49(4), 510–525.

    Article  Google Scholar 

  • Merkel, W. (2004). Embedded and defective democracies. Democratization, 11(5), 33–58.

    Article  Google Scholar 

  • Merkel, W. (2010). Systemtransformation: Eine Einführung in die Theorie und Empirie der Transformationsforschung. Wiesbaden: VS Verlag für Sozialwissenschaften.

    Google Scholar 

  • Merkel, W., Puhle, H.-J., Croissant, A., Eicher, C., & Thiery, P. (2003). Defekte Demokratien: Bd. 1: Theorie und Probleme. Wiesbaden: Westdeutscher Verlag.

    Book  Google Scholar 

  • Moore, W. H. (2000). The repression of dissent: A substitution model of government coercion. Journal of Conflict Resolution, 44(1), 107–127.

    Article  Google Scholar 

  • Pierskalla, J. H. (2010). Protest, deterrence, and escalation: The strategic calculus of government repression. Journal of Conflict Resolution, 54(1), 117–145.

    Article  Google Scholar 

  • Pinheiro, J., Bates, D., DebRoy, S., Sarkar, D., & R Core Team. (2013). nlme: Linear and nonlinear mixed effects models R package version 3.1–108.

    Google Scholar 

  • Poe, S. C., & Tate, C. N. (1994). Repression of the human right to personal integrity in 1980s: A global analysis. American Political Science Review, 88(4), 853–872.

    Article  Google Scholar 

  • Poe, S. C., Tate, C. N., & Keith, L. C. (1999). Repression of the human right to personal integrity revisited: A global cross-national study covering the years 1976–1993. International Studies Quarterly, 43(2), 291–313.

    Article  Google Scholar 

  • Poe, S. C., Tate, C. N., Keith, L. C., & Lanier, D. (2000). Domestic threats: The abuse of personal integrity. In C. Davenport (Ed.), Paths to state repression (pp. 27–70). Lanham, MD: Rowman & Littlefield.

    Google Scholar 

  • Przeworski, A. (1999). Minimalist conception of democracy: A defense. In I. Shapiro & C. Hacker-Cordón (Eds.), Democracy’s value (pp. 23–55). Cambridge: Cambridge University Press.

    Google Scholar 

  • Przeworski, A., Alvarez, M., Cheibub, J. A., & Limongi, F. (2000). Democracy and development: Material well-being in the world, 1950–1990. Cambridge/New York: Cambridge University Press.

    Book  Google Scholar 

  • R Core Team. (2013). R: A language and environment for statistical computing. Accessed April 11, 2017, from http://www.R-project.org/

  • Rabe-Hesketh, S., & Skrondal, A. (2008). Multilevel and longitudinal modeling using STATA (2nd ed.). College Station, TX: Stata Press Publication.

    Google Scholar 

  • Regan, P. M., & Henderson, E. A. (2002). Democracy, threats and political repression in developing countries: Are democracies internally less violent? Third World Quarterly, 23(1), 119–136.

    Article  Google Scholar 

  • Sarkees, M. R., & Wayman, F. W. (2010). Resort to war: A data guide to inter-state, extra-state, intra-state, and non-state wars, 1816–2007. Washington, DC: CQ Press.

    Google Scholar 

  • Schmitter, P. C., & Karl, T. L. (1996). What democracy is … and is not. In L. Diamond & M. F. Plattner (Eds.), The global resurgence of democracy (pp. 49–62). Baltimore, MD: Johns Hopkins University Press.

    Google Scholar 

  • Schrodt, P. A. (2012). Cameo: Conflict and mediation event observations event and actor codebook: Event data project. State College, PA: Department of Political Science, Pennsylvania State University, Pond Laboratory.

    Google Scholar 

  • Schumpeter, J. A. (1942). Capitalism, socialism, and democracy. New York, NY: Harper.

    Google Scholar 

  • Solt, F. (2013). The standardized world income inequality database. Accessed April 11, 2017, from http://hdl.handle.net/1902.1/11992

  • START. (2012). Global terrorism database: gtd 91to11 1012dist’. Accessed April 11, 2017, from http://www.start.umd.edu/gtd

  • Teorell, J., Charron, N., Dahlberg, S., Holmberg, S., Rothstein, B., Sundin, P., & Svensson, R. (2013). The quality of government dataset: Version 15may13. Accessed April 11, 2017, from http://www.qog.pol.gu.se

  • Tsebelis, G., & Sprague, J. (1989). Coercion and revolution: Variations on a predator-prey model. Mathematical and Computer Modeling, 12(4–5), 547–559.

    Article  Google Scholar 

  • U.S. Department of State (2004, February 25). Country reports on human rights practices: France. Accessed April 11, 2017, from http://www.state.gov/j/drl/rls/hrrpt/2003/27837.htm

  • Ware, J. (2013). Undercover soldiers ‘killed unarmed civilians in Belfast’. Accessed April 11, 2017, from http://www.bbc.co.uk/news/uk-24987465

  • Wickham, H. (2009). ggplot2: Elegant graphics for data analysis. New York, NY: Springer. Accessed April 11, 2017, from http://had.co.nz/ggplot2/book

  • Zanger, S. C. (2000). A global analysis of the effect of political regime changes on life integrity violations, 1977–93. Journal of Peace Research, 37(2), 213–233.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dag Tanneberg .

Editor information

Editors and Affiliations

Appendix

Appendix

Tables 13.2, 13.3, and 13.4

Table 13.2 Unstandardized sample distributions of time-varying variables
Table 13.3 Variance decomposition of logged physical integrity violations, 1995–2007
Table 13.4 The impact of political threats on logged physical integrity violations, 1995–2007

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tanneberg, D. (2018). Why Do Established Democracies Violate Human Rights?. In: Merkel, W., Kneip, S. (eds) Democracy and Crisis. Springer, Cham. https://doi.org/10.1007/978-3-319-72559-8_13

Download citation

Publish with us

Policies and ethics