Skip to main content
Top

2017 | OriginalPaper | Chapter

The Ambiguous Relation Between Privacy and Security in German Cyber Politics

A Discourse Analysis of Governmental and Parliamentary Debates

Authors : Katharina Dimmroth, Wolf J. Schünemann

Published in: Privacy, Data Protection and Cybersecurity in Europe

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Edward Snowden’s revelations regarding the NSA surveillance activities globally reignited debates on the tension between freedom and security. Within those debates, the issues of cybersecurity and data protection are oftentimes part of the same meta-narrative even as they represent differing aspects in the question of how much freedom must be relinquished in order to guarantee a state’s security. This chapter sets out to disentangle the discourses of cybersecurity and data protection in German governmental and parliamentary discourse post-Snowden. To achieve this, we analysed both government and parliamentary documents using the Sociology of Knowledge Approach to Discourse (SKAD). Aside from a meta-narrative of cyber anxiety, we found that problem definitions are used in governmental and parliamentary discourse on cybersecurity and data protection in very similar ways. The frames and narratives regarding proposed solutions offer distinctions, as parliamentary speakers tend to emphasise the importance of privacy and data protection over cybersecurity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Stuxnet is the name of a very sophisticated malware (worm) that was detected in 2010. The worm infected systems across the world but had Iraninan facilities for the enrichment of Uranium as prime target. The attribution shared by many experts is to the US and Israel.
 
Literature
go back to reference Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (pp. 1–30). London: Routledge. Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (pp. 1–30). London: Routledge.
go back to reference Berger, P. L., & Luckmann, T. (1969). Die gesellschaftliche Konstruktion der Wirklichkeit. Eine Theorie der Wissenssoziologie. Frankfurt: Fischer. Berger, P. L., & Luckmann, T. (1969). Die gesellschaftliche Konstruktion der Wirklichkeit. Eine Theorie der Wissenssoziologie. Frankfurt: Fischer.
go back to reference Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner. Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner.
go back to reference de Maizière, T. (2014, June 23). Rede des Bundesministers des Innern bei der Konferenz für Datenschutz und Datensicherheit (DuD). de Maizière, T. (2014, June 23). Rede des Bundesministers des Innern bei der Konferenz für Datenschutz und Datensicherheit (DuD).
go back to reference de Maizière, T. (2015, May 23). Rede des Bundesministers des Innern zum Entwurf des IT-Sicherheitsgesetzes, Berlin. de Maizière, T. (2015, May 23). Rede des Bundesministers des Innern zum Entwurf des IT-Sicherheitsgesetzes, Berlin.
go back to reference Deutscher Bundestag. (2013a, June 26). Plenarprotokoll. Stenografischer Bericht der 249. Sitzung der 17. Wahlperiode. Deutscher Bundestag. (2013a, June 26). Plenarprotokoll. Stenografischer Bericht der 249. Sitzung der 17. Wahlperiode.
go back to reference Deutscher Bundestag. (2013b, November 18). Stenografischer Bericht der 2. Sitzung der 18. Wahlperiode, Berlin. Deutscher Bundestag. (2013b, November 18). Stenografischer Bericht der 2. Sitzung der 18. Wahlperiode, Berlin.
go back to reference Deutscher Bundestag. (2014, January 15). Plenarprotokoll. Stenografischer Bericht der 7. Sitzung der 18 Wahlperiode. Deutscher Bundestag. (2014, January 15). Plenarprotokoll. Stenografischer Bericht der 7. Sitzung der 18 Wahlperiode.
go back to reference Deutscher Bundestag. (2015, June 12). Plenarprotokoll. Stenografischer Bericht der 110. Sitzung der 18. Wahlperiode. Deutscher Bundestag. (2015, June 12). Plenarprotokoll. Stenografischer Bericht der 110. Sitzung der 18. Wahlperiode.
go back to reference Diaz-Bone, R., Bührmann, A. D., Rodríguez, E. G., Schneider, W., Kendall, G., & Tirado, F. (2007). The field of Foucaultian discourse analysis. Forum: Qualitative Social Research (FQS) (No. 2, Art. 30), 8. Diaz-Bone, R., Bührmann, A. D., Rodríguez, E. G., Schneider, W., Kendall, G., & Tirado, F. (2007). The field of Foucaultian discourse analysis. Forum: Qualitative Social Research (FQS) (No. 2, Art. 30), 8.
go back to reference Ederer, M. (2014, December 4). Rede von Staatssekretär Markus Ederer beim Cyber Cooperation Summit. Ederer, M. (2014, December 4). Rede von Staatssekretär Markus Ederer beim Cyber Cooperation Summit.
go back to reference Foucault, M. (2002). Archaeology of knowledge. Routledge classics. London: Routledge. Foucault, M. (2002). Archaeology of knowledge. Routledge classics. London: Routledge.
go back to reference Friedrich, H.-P. (2013, November 30). Diese Daten helfen uns. Interview mit Bundesinnenminister Dr. Hans-Peter Friedrich. Friedrich, H.-P. (2013, November 30). Diese Daten helfen uns. Interview mit Bundesinnenminister Dr. Hans-Peter Friedrich.
go back to reference Gabrielatos, C. (2007). Selecting query terms to build a specialized corpus from a restricted-access database. ICAME Journal, 31, 5–43. Gabrielatos, C. (2007). Selecting query terms to build a specialized corpus from a restricted-access database. ICAME Journal, 31, 5–43.
go back to reference Glaser, B. G., Strauss, A. L., & Paul, A. T. (2010). Grounded theory: Strategien qualitativer Forschung. Programmbereich Gesundheit (3rd ed.). Bern: Huber. Glaser, B. G., Strauss, A. L., & Paul, A. T. (2010). Grounded theory: Strategien qualitativer Forschung. Programmbereich Gesundheit (3rd ed.). Bern: Huber.
go back to reference Guitton, C. (2013). Cyber insecurity as a national threat: Overreaction from Germany, France and the UK? European Security, 20(1), 21–35.CrossRef Guitton, C. (2013). Cyber insecurity as a national threat: Overreaction from Germany, France and the UK? European Security, 20(1), 21–35.CrossRef
go back to reference Habermas, J. (1984). The theory of communicative action. London: Heinemann. Habermas, J. (1984). The theory of communicative action. London: Heinemann.
go back to reference Habermas, J. (1996). Between facts and norms: Contributions to a discourse theory of law and democracy. Oxford: Polity Press. Habermas, J. (1996). Between facts and norms: Contributions to a discourse theory of law and democracy. Oxford: Polity Press.
go back to reference Herschinger, E., & Renner, J. (Eds.). (2014). Innovative Forschung: Vol. 1. Diskursforschung in den Internationalen Beziehungen. Baden-Baden: Nomos Verl.-Ges. Herschinger, E., & Renner, J. (Eds.). (2014). Innovative Forschung: Vol. 1. Diskursforschung in den Internationalen Beziehungen. Baden-Baden: Nomos Verl.-Ges.
go back to reference Jasmontaite, L., & Pavel Burloiu, V. (2017). Lithuania and Romania to introduce cybersecurity laws. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer. Jasmontaite, L., & Pavel Burloiu, V. (2017). Lithuania and Romania to introduce cybersecurity laws. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer.
go back to reference Keller, R. (2008). Wissenssoziologische Diskursanalyse. Grundlegung eines Forschungsprogramms (2nd ed.). Wiesbaden: VS Verl. für Sozialwissenschaften. Keller, R. (2008). Wissenssoziologische Diskursanalyse. Grundlegung eines Forschungsprogramms (2nd ed.). Wiesbaden: VS Verl. für Sozialwissenschaften.
go back to reference Keller, R. (2013). Doing discourse research: An introduction for social scientists. London: Sage.CrossRef Keller, R. (2013). Doing discourse research: An introduction for social scientists. London: Sage.CrossRef
go back to reference Riedel, N. (2015, May 18). Cyber security as a dimension of security policy. Talk at Chatam House, London. Riedel, N. (2015, May 18). Cyber security as a dimension of security policy. Talk at Chatam House, London.
go back to reference Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar. What everyone needs to know. Oxford: Oxford University Press. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar. What everyone needs to know. Oxford: Oxford University Press.
go back to reference Steiger, S. (2017). The unshaken role of GCHQ. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer. Steiger, S. (2017). The unshaken role of GCHQ. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer.
go back to reference Steiger, S., Schünemann, W. J., & Dimmroth, K. (2017). Outrage without consequences? Post-Snowden discourses and governmental practice in Germany. Media and Communication, 5(1). doi:10.17645/mac.v5i1.814. Steiger, S., Schünemann, W. J., & Dimmroth, K. (2017). Outrage without consequences? Post-Snowden discourses and governmental practice in Germany. Media and Communication, 5(1). doi:10.​17645/​mac.​v5i1.​814.
go back to reference Steinmeier, F.-W. (2014a, June 12). Digital society at stake—Europe and the future of the internet. Talk at 7th European Dialogue on Internet Governance, New York. Steinmeier, F.-W. (2014a, June 12). Digital society at stake—Europe and the future of the internet. Talk at 7th European Dialogue on Internet Governance, New York.
go back to reference Steinmeier, F.-W. (2014b, June 27). Rede von Außenminister Frank-Walter Steinmeier beim Transatlantischen Cyber-Dialog, Berlin. Steinmeier, F.-W. (2014b, June 27). Rede von Außenminister Frank-Walter Steinmeier beim Transatlantischen Cyber-Dialog, Berlin.
go back to reference Tiainen, M. (2017). Solving the surveillance problem. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer. Tiainen, M. (2017). Solving the surveillance problem. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer.
go back to reference Weiland, V. (2017). Analysing the French discourse about “surveillance and data protection” in the context of the NSA scandal. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer. Weiland, V. (2017). Analysing the French discourse about “surveillance and data protection” in the context of the NSA scandal. In W. J. Schünemann & M.-B. Baumann (Eds.), Privacy, data protection and cybersecurity in Europe. Cham: Springer.
Metadata
Title
The Ambiguous Relation Between Privacy and Security in German Cyber Politics
Authors
Katharina Dimmroth
Wolf J. Schünemann
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-53634-7_7