{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:34:51Z","timestamp":1725528891311},"publisher-location":"Wiesbaden","reference-count":10,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_9","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"93-98","source":"Crossref","is-referenced-by-count":0,"title":["Freedom and Security \u2014 Responses to the Threat of International Terrorism"],"prefix":"10.1007","author":[{"given":"Marie-Theres","family":"Tinnefeld","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Albrecht, Hans-J\u00f6rg et al.: \u00dcberwachung der Telekommunikation nach den \u00a7\u00a7 100a, 100b StPO und anderer verdeckter Ermittlungsma\u00dfnahmen (Legal Reality and Effiency of the Surveillance of Telecommunication under \u201e\u201c 100a, 100b of the Criminal Procedure Code and other Concealed Measures for Investigations), Max-Planck Studie (MPI Study), Institutsverlag."},{"key":"9_CR2","unstructured":"Dempsey, James and Flint, Lara: Commercial Data and National Security, 72 Geo Wash L. Rev., 1459\u20131467."},{"key":"9_CR3","unstructured":"Lee, Ronald D., Schwartz, Paul M.: Heymann: Terrorism, Freedom. And Security: Winning Without War, Michigan L. Rev. Vol. 103, No. 6, 1446\u20131482"},{"key":"9_CR4","unstructured":"Petri, B. Thomas, Das Urteil des Bundesverfassungsgerichts zur \u201eOnline-Durchsuchung\u201c, 7 Datenschutz und Datensicherheit, is printing"},{"key":"9_CR5","unstructured":"Papier, Hans-J\u00fcrgen: Der Zweck des Staates ist die Wahrung der Freiheit. \u00dcber das Spannungsverh\u00e4ltnis von Freiheit und Sicherheit aus verfassungsrechtlicher Sicht \u2014 Ein Vortrag auf der Tagung \u201eFreiheit und Sicherheit \u2014 Verfassungspolitische Dimensionen der Akademie f\u00fcr Politische Bildung Tutzing am 30. Mai, available at http\/\/www.welt.de\/papier"},{"key":"9_CR6","unstructured":"Schneier, Bruce, Why Data Mining Won\u2019t Stop Terror, (Wired on March 9, 2006) avoided under: http:\/\/www.wired.com\/politics\/security\/commentary\/security matters\/2006\/03\/70357"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Tinnefeld, Marie-Theres: Freiheitsrechte vs. staatliche Trojaner. Anmerkungen zum \u201eangstbasierten\u201c pr\u00e4ventiv-autorit\u00e4ren Sicherheitsstaat, 1 Datenschutz und Datensicherheit, 7\u201312","DOI":"10.1007\/s11623-008-0004-0"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Warren, Samuel D. Brandeis, Louis D.: The Right to Privacy; 4 Harv. L. Rev. 193\u2013197 (1890)","DOI":"10.2307\/1321160"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Watney, Murdoch: The Legal Konflict between Security and Privacy in Adressing Crime and Terrorism on the Internet, Pohlmann, Norbert, Reimer, Helmut, Schneider, Wolfgang (ED.), ISSE\/SECURE 2007, 26\u201337","DOI":"10.1007\/978-3-8348-9418-2_3"},{"key":"9_CR10","unstructured":"Westin, Alan F., Privacy and Freedom, 1967"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:23:04Z","timestamp":1606134184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_9","relation":{},"subject":[]}}