@article{Hornung2008i, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {6e1dec3f9b055a8e9d80d16f46732e59}, intrahash = {e3998750dc1f2f2d433788cc274e8d4c}, pages = {249-264}, title = {Datenschutz im Gefüge der Grundrechte und ihrem gesellschaftlichen Wandel, in: Gaycken}, year = 2008 } @article{Rossnagel2008h, author = {Roßnagel, Alexander}, editor = {Roßnagel, Alexander}, interhash = {b1bb9738bdaff23b9224509f19d12cf3}, intrahash = {3bf8b84b1ecd8af451f7568c0aa5142a}, pages = {24-30}, title = {Fremderzeugung von qualifizierten Signaturen? }, year = 2008 } @article{Rossnagel2009, author = {Roßnagel, Alexander}, editor = {Roßnagel, Alexander}, interhash = {7f1eeef4399c555ce59bbe5e4a41ae03}, intrahash = {4cb24ee56ecf218c4dd127c4c8b87c0c}, title = {Digitale Rechteverwaltung – Eine gelungene Allianz von Recht und Technik?}, year = 2009 } @article{Gitter2008, author = {Gitter, Rotraud}, editor = {Gitter, Rotraud}, interhash = {39f24df231f472b990607109a04ea153}, intrahash = {bc8e7af0b54013d32ef90c23f61cadbc}, pages = {279-286}, title = {Die Haftung der Betreiber von Web 2.0-Plattformen}, year = 2008 } @article{Hornung2008e, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {bac5364dfb89f9fc32dcddeaa499e8ee}, intrahash = {37833f0eeb353cd803ee798424db9fdb}, title = {Besprechung von BGH, Beschluss vom 14.1.2008 }, year = 2008 } @article{Gitter2008a, author = {Gitter, Rotraud}, editor = {Gitter, Rotraud}, interhash = {7dbad6e8f53bade9482fcc55299f4d9b}, intrahash = {601522d77f0b98d692382dd85d54056f}, title = {Long-term retention in e-voting – Legal requirements and technical implementation, in: Krimmer, R./Grimm}, year = 2008 } @article{Rossnagel2008g, author = {Hackel, Siegfried and Roßnagel, Alexander}, editor = {Roßnagel, Siegfried Hackel Alexander}, interhash = {0e533ee11b6a3e79ca85932ad23dc6ae}, intrahash = {1beea11269bf977a91ee1536fb57425b}, pages = {199-207}, title = {Aufbewahrung elektronischer Dokumente}, year = 2008 } @article{Hornung2008d, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {fa69d9557506ff074205707b5cc13425}, intrahash = {1c44e02cd4292334e1841b45cafb6ee8}, pages = {668-669}, title = {Besprechung von BGH, Beschluss vom 15.7.2008}, year = 2008 } @article{Hornung2008a, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {f2b4ca3fcf038eea65bc2a04f4166817}, intrahash = {14e895fb0c431eff51ae989a123a859c}, pages = {585-586}, title = {Besprechung von OLG Frankfurt, Urteil vom 1.7.2008 }, year = 2008 } @article{Hornung2008f, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {62aa42a91c7d07e370333e9914b3932a}, intrahash = {03089666622fa8049b15c20a7ba052c7}, title = {Buchbesprechung von Puschke, Jens: Die kumulative Anordnung von Informationsbeschaffungsmaßnahmen im Rahmen der Strafverfolgung}, year = 2008 } @article{Hornung2008h, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {e6b8826a66c379606c78c54b44e5af0e}, intrahash = {ef5c8ec782383a786556c7416ad14fe4}, title = {Ein neues Grundrecht – der verfas¬sungsrechtliche Schutz der „Vertraulichkeit und Integrität informationstechnischer Systeme“ }, year = 2008 } @article{Hornung2008c, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {9199b624d58fd45470579143a0628f07}, intrahash = {27e0b5d596a9dd1d56cc35c3cba0068d}, title = {Datenschutz im Gefüge der Grundrechte und ihrem gesellschaftlichen Wandel, in: Gaycken, S./Kurz, C.}, year = 2008 } @article{Hornung2008, author = {Hornung, Gerrit}, editor = {Hornung, Gerrit}, interhash = {05dad48d3c134c8438a8b149a5bc880b}, intrahash = {407710e6d7bcc01d3f8c956bd55a6f66}, month = {October}, title = {Rezension von Borchers, Die Einführung des elektronischen Gesundheitskarte in das deutsche Gesundheitswesen}, year = 2008 } @article{Hornung2008g, author = {Hornung, Gerrit}, interhash = {ce5e5aafc0f45034dadeb0d0b5ba4ccf}, intrahash = {7627a5b63966fd4530f1974c35d6703a}, pages = {1088-1093}, title = {Systems and Data Protection Legislation in Germany}, year = 2008 } @article{Jandt2008b, author = {Jandt, Silke}, editor = {Jandt, Silke}, interhash = {b16eeb708f6712a71e72f9f433000593}, intrahash = {4fa787c862646417a4c989e2b0a49978}, title = {Vertrauen im Mobile Commerce – Vorschläge für die rechtsverträgliche Gestaltung von Location Based Services}, year = 2008 } @article{Jandt2008a, author = {Jandt, Silke}, editor = {Jandt, Silke}, interhash = {4eb5b62cf68f3f4303062334189bb1bd}, intrahash = {6302e4e312d95e7131163980ccc92036}, pages = {664-669}, title = {Grenzenloser Mobile Commerce – Schutzwirkung und Durchsetzbarkeit datenschutzrechtlicher Ansprüche gegenüber ausländischen Diensteanbietern}, year = 2008 } @article{Knopp2008a, author = {Knopp, Michael}, editor = {Knopp, Michael}, interhash = {69c05548ddd313c0bd5a646a35894f5d}, intrahash = {7d9729f785e2dcee319b7c5bbd34e870}, pages = 518, title = {Elektronische Transaktionen - Anforderungen des Datenschutzes bei der Umsetzung der Dienstleistungsrichtlinie}, year = 2008 } @article{Knopp2008, author = {Knopp, Michael}, editor = {Knopp, Michael}, interhash = {604960ae2b6ae2a0f7df393f0ed61e59}, intrahash = {2cfaad341b4780a66c17e56d0317d58a}, pages = 156, title = {Digitalfotos als Beweismittel}, year = 2008 } @article{Knopp2008b, author = {Knopp, Michael}, editor = {Knopp, Michael}, interhash = {5ce547bce653a7ab560f50dc06cf38fb}, intrahash = {5601e4b957348a70cb7dae9a5c05ad44}, title = {Besprechung von LG München, Urteil vom 21.5.2008 }, year = 2008 } @article{Rossnagel2008v, author = {Jandt, Silke and Roßnagel, Alexander}, editor = {Roßnagel, Silke Jandt Alexander}, interhash = {35a1d508b4af1723bf55a20415c4c872}, intrahash = {61a4ee1847f93a1ce54f66e6f25d7a16}, title = {Handlungsleitfaden zum Scannen von Papierdokumenten}, year = 2008 }