Sicherheit als Grundsatz Eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der Cybersicherheit

In its basic rights doctrine, security takes on various different guises. However, the understandings of security as a legitimate aim, as a positive obligation to protect, or even as a fundamental right, do not do justice to its special need to be treated differently. How, then, might security be fu...

Full description

Saved in:
Bibliographic Details
Main Author: Leuschner, Sebastian (auth)
Format: Electronic Book Chapter
Published: Mohr Siebeck 2018
Series:Internet und Gesellschaft
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_31583
005 20210210
003 oapen
006 m o d
007 cr|mn|---annan
008 20210210s2018 xx |||||o ||| 0|deu d
020 |a j.ctv9hj8ws 
020 |a 9783161568435 
040 |a oapen  |c oapen 
024 7 |a 10.2307/j.ctv9hj8ws  |c doi 
041 0 |a deu 
042 |a dc 
100 1 |a Leuschner, Sebastian  |4 auth 
245 1 0 |a Sicherheit als Grundsatz  |b Eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der Cybersicherheit 
260 |b Mohr Siebeck  |c 2018 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Internet und Gesellschaft 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a In its basic rights doctrine, security takes on various different guises. However, the understandings of security as a legitimate aim, as a positive obligation to protect, or even as a fundamental right, do not do justice to its special need to be treated differently. How, then, might security be fundamentally re-thought? 
536 |a Knowledge Unlatched 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode 
546 |a German 
653 |a Law 
653 |a Security 
653 |a European Fundamental Rights Law 
653 |a Cyber Security 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/27412/1/1002597.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/27412/1/1002597.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/27412/1/1002597.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/31583  |7 0  |z DOAB: description of the publication