Advertisement

„The Specter of Orwell“: Narrative nach Nineteen Eighty-Four in US-amerikanischen Privacy-Debatten der 1960er und 1970er Jahre

  • Benedikt Neuroth
Chapter

Zusammenfassung

In Debatten um Privatsphäre und Datenschutz in den Vereinigten Staaten von Amerika der 1960er und 1970er Jahre spielten Kommentatoren oftmals auf den Roman Nineteen Eighty-Four von George Orwell an. So tauchte die dystopische Figur eines Big Brother sowohl in der Diskussion über ein statistisches Datenzentrum, föderale Datenbestände, als auch die Gesetzgebung zum Datenschutz auf, und das fiktionale Jahr 1984 repräsentierte die Vorstellung einer nahenden Überwachungsgesellschaft. Der Beitrag untersucht, in welchem spezifischen Kontext Kommentatoren, Rechtswissenschaftler, aber auch Politiker auf literarische Motive zurückgegriffen haben. Mit Bezügen auf den Roman haben die Akteure soziale Prozesse und politische Aspekte in eine sinnhafte Erzählung eingebettet, so dass sich aus diesen Narrativen gesellschaftliche Konflikte und ihre Bearbeitung ablesen lassen. Damit stehen die sich an Nineteen Eighty-Four anschließenden Narrative in einem besonderen Verhältnis zur politischen Theorie.

Literatur

  1. Bentham, Jeremy. 1995. Panopticon letters. In The Panopticon writings, Hrsg. v. Miran Božovič, 29–96. London: Verso.Google Scholar
  2. Beverage, James. 1976. The Privacy Act of 1974. An overview. Duke Law Journal 1976 (2): 301–329.CrossRefGoogle Scholar
  3. Blumenberg, Hans. 2001. Arbeit am Mythos. Frankfurt a. M.: Suhrkamp.Google Scholar
  4. Blum, John M. 1991. Years of discord. American politics and society, 1961–1974. New York: Norton.Google Scholar
  5. Brin, David. 2005. The self-preventing prophecy. Or, how a dose of nightmare can help tame tomorrow’s perils. In On nineteen eighty-four. Orwell and our future, Hrsg. Abbott Gleason, Jack Goldsmith, und Martha C. Nussbaum, 222–230. Princeton: Princeton University Press.Google Scholar
  6. Conant, James. 2000. Freedom, cruelty, and truth. Rorty versus Orwell. In Rorty and his critics, Hrsg. Robert Brandom, 268–341. Malden: Blackwell.Google Scholar
  7. Cover, Robert M. 1983. Foreword. Nomos and narrative. Harvard Law Review 97 (1): 4–68.CrossRefGoogle Scholar
  8. Davidson, Bill. 1994. Jane Fonda. Eine intime Biographie. Berlin: Verlag Volk und Welt.Google Scholar
  9. Dolin, Kieran. 2007. A critical introduction to law and literature. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  10. Dunn, Edgar S. 1967. The idea of a national data center and the issue of personal privacy. The American Statistician 21 (1): 21–27.Google Scholar
  11. Firchow, Peter Edgerly. 2007. Modern Utopian fictions from H. G. Wells to Iris Murdoch. Washington, DC: Catholic University of America Press.Google Scholar
  12. Ford, Gerald R. 1977. Remarks at dedication ceremonies at the Stanford University School of Law. September 21, 1975, No. 577. In Public papers of the Presidents of the United States. Containing the public messages, speeches, and statements of the President (Bd. 2, Juli 21 to Dec 31, 1975), Hrsg. Gerald R. Ford, 1476–1481. Washington, DC: Government Printing Office.Google Scholar
  13. Fortunati, Vita. 1987. „It makes no difference“. A Utopia of simulation and transparency. In George Orwell’s 1984, Hrsg. Harold Bloom, 109–120. New York: Chelsea House.Google Scholar
  14. Foucault, Michel. 1976. Überwachen und Strafen. Die Geburt des Gefängnisses. Frankfurt a. M.: Suhrkamp.Google Scholar
  15. Goffman, Erving. 1973. Asyle. Über die soziale Situation psychiatrischer Patienten und anderer Insassen. Frankfurt a. M.: Suhrkamp.Google Scholar
  16. Hacking, Ian. 2004. Between Michel Foucault and Erving Goffman. Between discourse in the abstract and face-to-face interaction. Economy and society 33 (3): 277–302.CrossRefGoogle Scholar
  17. Harvard Law Review. 1968. Privacy and efficient government. Proposals for a national data center. Harvard Law Review 82 (2): 400–417.CrossRefGoogle Scholar
  18. Kutler, Stanley I. 1990. The wars of watergate. The last crisis of Richard Nixon. New York: Knopf.Google Scholar
  19. Lessig, Lawrence. 2005. On the internet and the benign invasions of nineteen eighty-four. In On nineteen eighty-four. Orwell and our future, Hrsg. Abbott Gleason, Jack Goldsmith, und Martha C. Nussbaum, 212–221. Princeton: Princeton University Press.Google Scholar
  20. Long, Edward V. 1966. The intruders. The invasion of privacy by government and industry. With a f oreword by Hubert H. Humphrey. New York: Praeger.Google Scholar
  21. Lyon, David. 1994. From big brother to the electronic panopticon, (Kap. 4). In The electronic eye. The rise of surveillance society, Hrsg. David Lyon, 57–80. Cambridge: Polity.Google Scholar
  22. Mannheim, Karl. 1985. Ideologie und Utopie. 7. Aufl. Frankfurt a. M.: Klostermann.Google Scholar
  23. Matusow, Allen J. 1984. The unraveling of America. A history of liberalism in the 1960s. New York: Harper & Row.Google Scholar
  24. Miller, Arthur R. 1969. Personal privacy in the computer age. The challenge of a new technology in an information-oriented society. Michigan Law Review 67 (6): 1089–1246.CrossRefGoogle Scholar
  25. Miller, Arthur R. 1971. The assault on privacy. Ann Arbor: University of Michigan Press.Google Scholar
  26. Orwell, George. 1998. Nineteen eighty-four. Uniform edition published 1950. London: Penguin Books.Google Scholar
  27. Packard, Vance. 1964. The naked society. New York: McKay.Google Scholar
  28. Packard, Vance. 1967. Don’t tell it to the computer. The New York Times, 8. Januar. 1967, 236.Google Scholar
  29. Posner, Richard A. 2000. Orwell versus Huxley. Economics, technology, privacy, and satire. Philosophy and Literature, 24, H. 1, 1–33, entspricht: Chicago, John M. Olin Law and Economics Working Paper No. 89 (2nd series).Google Scholar
  30. Posner, Richard A., 2009. Law and literature. 3. Aufl. Cambridge: Harvard University Press.Google Scholar
  31. Pyle, Christopher H. 1986. Military surveillance of civilian politics 1967–1970. New York: Garland.Google Scholar
  32. Regan, Priscilla M. 1995. Legislating privacy. Technology, social values, and public policy. Chapel Hill: University of North Carolina Press.Google Scholar
  33. Ronan, Thomas P. 1975. Certain legislation gets backers left and right. The New York Times, 17. Mai 1975, 12.Google Scholar
  34. Rorty, Richard. 1989. Contingency, irony, and solidarity. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  35. Rosenberg, Jerry M. 1969. The death of privacy. New York: Random House.Google Scholar
  36. Rule, James B. 1974. Private lives and public surveillance. Social control in the c omputer age. New York: Schocken.Google Scholar
  37. Schulman, Bruce J. 2001. The seventies. The great shift in American culture, society, and politics. New York: Free Press.Google Scholar
  38. Schwartz, Barry. 1968. The social psychology of privacy. American Journal of Sociology 73 (6): 741–752.CrossRefGoogle Scholar
  39. Sesser, Stanford N. 1968. Prying for pay. How credit bureaus collect and use data on millions of persons. The Wall Street Journal, 5. Februar 1968, 1.Google Scholar
  40. Shabecoff, Philip 1975. Ford sees peril of ‚Big Brother‘. The New York Times, 22. September 1975, 13.Google Scholar
  41. Shklar, Judith N. 1998. Nineteen eighty-four. Should political theory care? (Kap. 18). In Political thought and political thinkers, Hrsg. v. Hoffman, Stanley, 339–352. Chicago: University of Chicago Press.Google Scholar
  42. Smith, Robert E. 2000. Ben Franklin’s web site. Privacy and curiosity from Plymouth rock to the internet. Providence: Privacy Journal.Google Scholar
  43. Solove, Daniel J. 2001. Privacy and power. Computer databases and metaphors for information privacy. Stanford Law Review 53 (6): 1393–1462.CrossRefGoogle Scholar
  44. Solove, Daniel J. 2004. The digital person. Technology and privacy in the information age. New York: New York University Press.Google Scholar
  45. The New York Times. 1966. To preserve privacy. The New York Times, 9. August 1966, 36.Google Scholar
  46. U. S. House of Representatives. 1966. The computer and invasion of privacy. Hearings before a subcommittee o n government operations, 89th Congress 2nd session. Washington, DC: Government Printing Office.Google Scholar
  47. U. S. Senate. 1971. Federal data banks, computers and the bill of rights. Hearings before the subcommittee on constitutional rights of the committee on the judiciary, Part 1, 92nd Congress, 1st session. Washington, DC: Government Printing Office.Google Scholar
  48. U. S. Senate. 1974. Privacy. The collection, use, and computerization of personal data. Joint hearings before the ad hoc subcommittee on privacy and information systems of the committee on government operations and the subcommittee on constitutional rights of the committee on the judiciary, Part 1, Part 2, 93rd Congress, 2nd Session. Washington, DC: Government Printing Office.Google Scholar
  49. Veit, Walter. 1963. Toposforschung. Ein Forschungsbericht. Deutsche Vierteljahresschrift für Literaturwissenschaft und Geistesgeschichte 37 (1): 120–163.Google Scholar
  50. Ward, Ian. 1995. Law and literature. Possibilities and perspectives. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  51. Westin, Alan F. 1968. Privacy and freedom. New York: Atheneum.Google Scholar
  52. White, James Boyd. 1985. The legal imagination. Abridged ed. Chicago: University of Chicago Press.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden 2014

Authors and Affiliations

  1. 1.Lehrstuhl für die Geschichte Westeuropas und der transatlantischen BeziehungenHumboldt Universität zu BerlinBerlinDeutschland

Personalised recommendations