{"id":"https://openalex.org/W1492960599","doi":"https://doi.org/10.1007/978-3-8348-9283-6_9","title":"Freedom and Security \u2014 Responses to the Threat of International Terrorism","display_name":"Freedom and Security \u2014 Responses to the Threat of International Terrorism","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1492960599","doi":"https://doi.org/10.1007/978-3-8348-9283-6_9","mag":"1492960599"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_9","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064119971","display_name":"Marie-Theres Tinnefeld","orcid":null},"institutions":[{"id":"https://openalex.org/I174004417","display_name":"Munich University of Applied Sciences","ror":"https://ror.org/012k1v959","country_code":"DE","type":"education","lineage":["https://openalex.org/I174004417"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Marie-Theres Tinnefeld","raw_affiliation_strings":["University of Applied Sciences Munich, Germany","University of Applied Sciences Munich"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Munich, Germany","institution_ids":["https://openalex.org/I174004417"]},{"raw_affiliation_string":"University of Applied Sciences Munich","institution_ids":["https://openalex.org/I174004417"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5064119971"],"corresponding_institution_ids":["https://openalex.org/I174004417"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06903141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"93","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12921","display_name":"European Criminal Justice and Data Protection","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12921","display_name":"European Criminal Justice and Data Protection","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9609000086784363,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.6005363464355469},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.5964928269386292},{"id":"https://openalex.org/keywords/dignity","display_name":"Dignity","score":0.5898022055625916},{"id":"https://openalex.org/keywords/human-rights","display_name":"Human rights","score":0.5597034692764282},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.5046747922897339},{"id":"https://openalex.org/keywords/right-to-privacy","display_name":"Right to privacy","score":0.4968290627002716},{"id":"https://openalex.org/keywords/the-right-to-privacy","display_name":"The Right to Privacy","score":0.49078497290611267},{"id":"https://openalex.org/keywords/fundamental-rights","display_name":"Fundamental rights","score":0.47655609250068665},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4700319468975067},{"id":"https://openalex.org/keywords/legislature","display_name":"Legislature","score":0.4682142734527588},{"id":"https://openalex.org/keywords/democracy","display_name":"Democracy","score":0.45526885986328125},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.44677379727363586},{"id":"https://openalex.org/keywords/constitutional-court","display_name":"Constitutional court","score":0.44302308559417725},{"id":"https://openalex.org/keywords/german","display_name":"German","score":0.4130278527736664},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.1563946008682251},{"id":"https://openalex.org/keywords/constitution","display_name":"Constitution","score":0.14421701431274414}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.6005363464355469},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.5964928269386292},{"id":"https://openalex.org/C2778745096","wikidata":"https://www.wikidata.org/wiki/Q274782","display_name":"Dignity","level":2,"score":0.5898022055625916},{"id":"https://openalex.org/C169437150","wikidata":"https://www.wikidata.org/wiki/Q8458","display_name":"Human rights","level":2,"score":0.5597034692764282},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.5046747922897339},{"id":"https://openalex.org/C18414002","wikidata":"https://www.wikidata.org/wiki/Q8354932","display_name":"Right to privacy","level":2,"score":0.4968290627002716},{"id":"https://openalex.org/C14587133","wikidata":"https://www.wikidata.org/wiki/Q7760779","display_name":"The Right to Privacy","level":3,"score":0.49078497290611267},{"id":"https://openalex.org/C95691615","wikidata":"https://www.wikidata.org/wiki/Q3237872","display_name":"Fundamental rights","level":3,"score":0.47655609250068665},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4700319468975067},{"id":"https://openalex.org/C83009810","wikidata":"https://www.wikidata.org/wiki/Q11204","display_name":"Legislature","level":2,"score":0.4682142734527588},{"id":"https://openalex.org/C555826173","wikidata":"https://www.wikidata.org/wiki/Q7174","display_name":"Democracy","level":3,"score":0.45526885986328125},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.44677379727363586},{"id":"https://openalex.org/C2778645526","wikidata":"https://www.wikidata.org/wiki/Q32766","display_name":"Constitutional court","level":3,"score":0.44302308559417725},{"id":"https://openalex.org/C154775046","wikidata":"https://www.wikidata.org/wiki/Q188","display_name":"German","level":2,"score":0.4130278527736664},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.1563946008682251},{"id":"https://openalex.org/C2776154427","wikidata":"https://www.wikidata.org/wiki/Q7755","display_name":"Constitution","level":2,"score":0.14421701431274414},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_9","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.44999998807907104,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1981775908","https://openalex.org/W2026230033","https://openalex.org/W2156127264","https://openalex.org/W2616332126","https://openalex.org/W6821197736"],"related_works":["https://openalex.org/W136501727","https://openalex.org/W3192227156","https://openalex.org/W3196396064","https://openalex.org/W4200132053","https://openalex.org/W2919794490","https://openalex.org/W3175527458","https://openalex.org/W2958659617","https://openalex.org/W4283761796","https://openalex.org/W2931303696","https://openalex.org/W2895660331"],"abstract_inverted_index":{"The":[0,46,110,166],"September":[1],"11":[2],"attacs":[3],"have":[4,72],"led":[5],"to":[6,22,34,50,73,169,175,222,256],"a":[7,77,156,173,210],"number":[8],"of":[9,15,38,43,57,94,97,103,107,120,132,160,164,179,192,216,227,245,252],"changes":[10],"in":[11,32,40,54,75],"the":[12,16,36,41,55,87,92,95,98,118,129,146,151,176,193,198,214,218,224,232,242,258],"legislative":[13],"framework":[14],"EU":[17,69],"member":[18,70],"states.":[19],"Governments":[20],"intended":[21],"react":[23],"quickly,":[24],"powerfully":[25],"and":[26,64,101,135,143,162,186,189,205,249],"with":[27],"high":[28],"public":[29,33],"visibility":[30],"reactions":[31],"justify":[35],"power":[37],"technology":[39,182],"interests":[42],"national":[44,78],"security.":[45],"new":[47,157],"goal":[48],"is":[49,91],"search":[51,102],"terrorist":[52],"activity":[53],"ocean":[56],"telecommunications":[58,141],"data":[59,79],"retained":[60],"by":[61,66,82,128,183],"communications":[62],"providers":[63],"accessed":[65],"intelligence":[67],"authorities.":[68],"states":[71],"put":[74],"place":[76],"retention":[80],"law":[81],"March":[83],"2009.":[84],"In":[85,148,230],"Germany,":[86],"most":[88],"recent":[89],"problem":[90],"question":[93],"legality":[96],"secret":[99,188],"online-surveillance":[100],"IT-Sytems,":[104],"especially":[105],"concerning":[106],"individual\u2019s":[108],"PCs.":[109],"German":[111,153,233],"Federal":[112],"Constitutional":[113],"Court":[114,154,234],"has":[115,168],"held,":[116],"that":[117],"area":[119],"governmental":[121],"authority":[122],"for":[123,145],"intervention":[124],"must":[125],"be":[126,170,223],"limited":[127],"constitutional":[130],"protection":[131],"human":[133,158,203],"dignity":[134],"fundamental":[136],"rights":[137,204],"like":[138],"information":[139,181,228,260],"privacy,":[140],"secrecy":[142],"respect":[144],"home.":[147],"February":[149],"2008":[150],"highest":[152],"created":[155],"right":[159],"confidentially":[161],"integrity":[163],"IT-Systems.":[165],"decision":[167],"understood":[171],"as":[172,238],"reaction":[174],"widespread":[177],"use":[178],"invisible":[180],"legal":[184],"authorities":[185],"their":[187],"comprehensive":[190],"surveillance":[191],"citizens.":[194],"This":[195],"article":[196],"highlights":[197],"critical":[199],"question,":[200],"whether":[201],"civilization,":[202],"democracy":[206],"can":[207],"survive":[208],"at":[209],"time,":[211],"when,":[212],"after":[213],"rise":[215],"terrorism":[217],"security":[219],"principle":[220],"seems":[221],"primary":[225],"arbiter":[226],"society.":[229,261],"particular":[231],"decisions":[235],"will":[236],"serve":[237],"convincing":[239],"evidence":[240],"on":[241],"real":[243],"strength":[244],"balance":[246],"between":[247],"freedom":[248],"security,":[250],"both":[251],"which":[253],"are":[254],"claimed":[255],"defend":[257],"open":[259]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
