{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:26:08Z","timestamp":1742988368646,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":25,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_8","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"139-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Surveillance in Germany: Strategies and Counterstrategies"],"prefix":"10.1007","author":[{"given":"Gerrit","family":"Hornung","sequence":"first","affiliation":[]},{"given":"Ralf","family":"Bendrath","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/13600860902836869","volume":"23","author":"W. Abel","year":"2009","unstructured":"Abel, W. 2009. Agents, trojans and tags: The next generation of investigators. International Review of Law, Computers & Technology 23:99\u2013108.","journal-title":"International Review of Law, Computers & Technology"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abel, W., and B. Schafer. 2009. The German Constitutional Court on the right in confidentiality and integrity of information technology systems: A case report on BVerfG. NJW 2008, 822. SCRIPTed 6 (1): 106. http:\/\/www.law.ed.ac.uk\/ahrc\/script-ed\/vol6-1\/abel.asp\n                .","DOI":"10.2966\/scrip.060109.106"},{"key":"8_CR3","unstructured":"Adler, D. 2007. Stasi 2.0. dataloo.de, 14 April. http:\/\/www.dataloo.de\/stasi-20-525.html."},{"key":"8_CR4","unstructured":"Bendrath, R. 2001. Wie weiter mit dem Datenschutz? Telepolis, 24 October. http:\/\/www.heise.de\/tp\/r4\/artikel\/9\/9903\/1.html."},{"key":"8_CR5","volume-title":"The wealth of networks. How social production transforms markets and freedom.","author":"Y. Benkler","year":"2006","unstructured":"Benkler, Y. 2006. The wealth of networks. How social production transforms markets and freedom. New Haven, CT: Yale Univ. Press."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1628\/002268808785924137","volume":"63","author":"T. B\u00f6ckenf\u00f6rde","year":"2008","unstructured":"B\u00f6ckenf\u00f6rde, T. 2008. Auf dem Weg zur elektronischen Privatsph\u00e4re. Juristenzeitung 63:925\u2013939.","journal-title":"Juristenzeitung"},{"key":"8_CR7","first-page":"154","volume":"4","author":"U. Buermeyer","year":"2007","unstructured":"Buermeyer, U. 2007. Die Online-Durchsuchung. HRR-Strafrecht 4:154\u2013166. http:\/\/www.hrr-strafrecht.de\/hrr\/archiv\/07-04\/index.php?sz=8.","journal-title":"HRR-Strafrecht"},{"key":"8_CR8","first-page":"1","volume":"65","author":"Bundesverfassungsgericht","year":"1983","unstructured":"Bundesverfassungsgericht. 1983. Decision of 15 December 1983 (1BvR 209, 269, 362, 420, 440, 484\/83), decisions. vol. 65, 1\u201371.","journal-title":"decisions"},{"key":"8_CR9","first-page":"279","volume":"109","author":"Bundesverfassungsgericht","year":"2004","unstructured":"Bundesverfassungsgericht. 2004. Decision of 3 March 2004 (1 BvR 2378\/99 and 1 BvR 1084\/99), decisions, vol. 109, 279\u2013391. Also available online at http:\/\/www.bundesverfassungsgericht.de\/entscheidungen\/rs20040303_1bvr237898.html.","journal-title":"decisions"},{"key":"8_CR10","first-page":"274","volume":"120","author":"Bundesverfassungsgericht","year":"2008a","unstructured":"Bundesverfassungsgericht. 2008a. Decision of 27 Feburary 2008 (1 BvR 370\/07 and 1 BvR 595\/07), decisions, vol. 120, 274\u2013350. Also available online in English at http:\/\/www.bverfg.de\/en\/decisions\/rs20080227_1bvr037007en.html.","journal-title":"decisions"},{"key":"8_CR11","first-page":"378","volume":"120","author":"Bundesverfassungsgericht","year":"2008b","unstructured":"Bundesverfassungsgericht. 2008b. Decision of 11 March 2008 (1 BvR 2074\/05 and 1 BvR 1254\/07), decisions, vol. 120, 378\u2013433. Also available online at http:\/\/www.bundesverfassungsgericht.de\/entscheidungen\/rs20080311_1bvr207405.html.","journal-title":"decisions"},{"key":"8_CR12","unstructured":"Bundesverfassungsgericht. 2008c. Decision of 11 March 2008 (1 BvR 256\/08). Europ\u00e4ische Grundrechte Zeitschrift, 257\u2013265. Also available online at http:\/\/www.bundesverfassungsgericht.de\/entscheidungen\/rs20080311_1bvr025608.html."},{"key":"8_CR13","unstructured":"De Hert, P., K. de Vries, and S. Gutwirth. 2009. La limitation des \u2018perquisitions en ligne\u2019 par un renouvellement des droit fondamentaux\u201d, Note d\u2019observations sur Cour constitutionnelle f\u00e9d\u00e9rale allemande, 27 f\u00e9vrier 2008 (Online Dursuchung). Revue du droit des Technologies de l\u2019Information, Jurisprudence 34:89\u201392."},{"issue":"\/04","key":"8_CR14","first-page":"54","volume":"L105","author":"EU","year":"2006","unstructured":"EU. 2006. Directive 2006\/24\/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC. Official Journal L105 (13\/04\/2006):54\u201363.","journal-title":"Official Journal"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1628\/002268808786375406","volume":"21","author":"W. Hoffmann-Riem","year":"2008","unstructured":"Hoffmann-Riem, W. 2008. Der grundrechtliche Schutz der Vertraulichkeit und Integrit\u00e4t eigengenutzter informationstechnischer Systeme. Juristenzeitung 21:1009\u20131022.","journal-title":"Juristenzeitung"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"H\u00f6mig, D. 2009. \u201cNeues\u201d Grundrecht, neue Fragen? Zum Urteil des BVerfG zur Online-Durchsuchung, JURA. 207\u2013213.","DOI":"10.1515\/JURA.2009.207"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Hornung, G. 2007. Erm\u00e4chtigungsgrundlage f\u00fcr die \u2018Online-Durchsuchung\u2019? Datenschutz und Datensicherheit 31:575\u2013580. Also available online athttp:\/\/www.uni-kassel.de\/fb7\/oeff_recht\/publikationen\/pubOrdner\/publikation_2007_hornung_online_durchsuchung.pdf.","DOI":"10.1007\/s11623-007-0194-x"},{"key":"8_CR18","first-page":"299","volume":"5","author":"G. Hornung","year":"2008","unstructured":"Hornung, G. 2008. Ein neues Grundrecht. Der verfassungsrechtliche Schutz der \u201cVertraulichkeit und Integrit\u00e4t informationstechnischer Systeme\u201d. Computer und Recht 5:299\u2013306.","journal-title":"Computer und Recht"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.clsr.2008.11.002","volume":"25","author":"G. Hornung","year":"2009a","unstructured":"Hornung, G., and C. Schnabel. 2009a. Data protection in Germany I: The population census decision and the right to informational self-determination. Computer Law & Security Review 25 (1): 84\u201388.","journal-title":"Computer Law & Security Review"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.clsr.2009.02.008","volume":"25","author":"G. Hornung","year":"2009b","unstructured":"Hornung, G., and C. Schnabel. 2009b. Data protection in Germany II: Recent decisions on online-searching of computers, automatic number plate recognition and data retention. Computer Law & Security Review 25 (2): 115\u2013122.","journal-title":"Computer Law & Security Review"},{"key":"8_CR21","unstructured":"NBX. 2001. Stasi 2.0. Comment in Telepolis, 7 July. http:\/\/www.heise.de\/tp\/foren\/S-Stasi-2-0\/forum-18164\/msg-815528\/read\/."},{"volume-title":"Online-Durchsuchungen. Rechtliche und tats\u00e4chliche Konsequenzen des BVerfG-Urteils vom 27. Februar 2008.","year":"2008","key":"8_CR22","unstructured":"Roggan, F., ed. 2008. Online-Durchsuchungen. Rechtliche und tats\u00e4chliche Konsequenzen des BVerfG-Urteils vom 27. Februar 2008. Berlin: BWV."},{"key":"8_CR23","first-page":"3534","volume":"49","author":"A. Ro\u00dfnagel","year":"2008","unstructured":"Ro\u00dfnagel, A., and C. Schnabel. 2008. Das Grundrecht auf Gew\u00e4hrleistung der Vertraulichkeit und Integrit\u00e4t informationstechnischer Systeme und sein Einfluss auf das Privatrecht. Neue Juristische Wochenschrift 49:3534\u20133538.","journal-title":"Neue Juristische Wochenschrift"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Rouvroy, A., and Y. Poullet. 2009. The right to informational self-determination and the value of self-development. Reassessing the importance of privacy for democracy. In Reinventing data protection, eds. S. Gutwirth, Y. Poullet, P. De Hert, de C. Terwangne, S. Nouwt. New York: Springer: 45-76.","DOI":"10.1007\/978-1-4020-9498-9_2"},{"key":"8_CR25","volume-title":"Here comes everybody: The power of organizing without organizations.","author":"C. Shirky","year":"2008","unstructured":"Shirky, C. 2008. Here comes everybody: The power of organizing without organizations.\n                New York: Penguin."}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:47:40Z","timestamp":1720694860000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_8","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}