{"id":27438,"date":"2016-04-28T15:53:36","date_gmt":"2016-04-28T13:53:36","guid":{"rendered":"https:\/\/www.hiig.de\/en\/?page_id=27438"},"modified":"2020-09-09T10:48:10","modified_gmt":"2020-09-09T08:48:10","slug":"schriftenreihe-internet-und-gesellschaft","status":"publish","type":"page","link":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/","title":{"rendered":"Book Series Internet und Gesellschaft"},"content":{"rendered":"<h1>\n\t<\/h1>\n\t<p>Here you find the publications of the book series &#8220;Internet und Gesellschaft&#8221;. <a href=\"https:\/\/www.hiig.de\/en\/jeanette-hofmann\/\">Jeanette Hofmann<\/a>, <a href=\"https:\/\/www.hiig.de\/en\/matthias-kettemann\/\">Matthias C. Kettemann<\/a>, <a href=\"https:\/\/www.hiig.de\/en\/bjoern-scheuermann\/\">Bj\u00f6rn Scheuermann<\/a>, <a href=\"https:\/\/www.hiig.de\/en\/thomas-schildhauer\/\">Thomas Schildhauer<\/a> und <a href=\"https:\/\/www.hiig.de\/en\/wolfgang-schulz\/\">Wolfgang Schulz<\/a>\u00a0are the publishers of this series.<\/p>\n\t<p>Publications in the book series<\/p>\n<p>&nbsp;<\/p>\n\n\t\t<div id=\"currentYear\" class=\"hiig-schriftenreihe\">\n\t\t\t\n\t\t\t<div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/autonome-mobilitaet-und-datenschutz\/\" title=\"Autonome Mobilit\u00e4t und Datenschutz\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.31.44.png 482w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Ogunrinde, H. (2025). Autonome Mobilit\u00e4t und Datenschutz. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a044<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: doi.org\/10.1628\/978-3-16-164531-0 <a href=\"https:\/\/www.hiig.de\/en\/publication\/autonome-mobilitaet-und-datenschutz\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/netz-gedaechtnis-und-recht\/\" title=\"Netz-Ged\u00e4chtnis und Recht\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/12\/Bildschirmfoto-2025-12-08-um-15.33.54.png 484w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Schimke, A. (2025). Netz-Ged\u00e4chtnis und Recht. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a043<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: https:\/\/doi.org\/10.1628\/978-3-16-164604-1 <a href=\"https:\/\/www.hiig.de\/en\/publication\/netz-gedaechtnis-und-recht\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/social-media-accounts-verstorbener-personen\/\" title=\"Social-Media-Accounts verstorbener Personen\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-2.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Herzing, A. (2025). Social-Media-Accounts verstorbener Personen. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 42<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: doi.org\/10.1628\/978-3-16-164577-8 <a href=\"https:\/\/www.hiig.de\/en\/publication\/social-media-accounts-verstorbener-personen\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/recht-der-digitalisierung-ii\/\" title=\"Recht der Digitalisierung II\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large3.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Anzenberger, P., & Schwaighofer, K. (2025). Recht der Digitalisierung II. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 41<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: https:\/\/doi.org\/10.1628\/978-3-16-162590-9 <a href=\"https:\/\/www.hiig.de\/en\/publication\/recht-der-digitalisierung-ii\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/recht-der-digitalisierung-i\/\" title=\"Recht der Digitalisierung I\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-1.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Kettemann, M. C. (Ed.) (2025). Recht der Digitalisierung I. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 40<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: doi.org\/10.1628\/978-3-16-162588-6 <a href=\"https:\/\/www.hiig.de\/en\/publication\/recht-der-digitalisierung-i\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/verbraucherschutz-und-grundrechte-in-digitalen-maerkten\/\" title=\"Verbraucherschutz und Grundrechte in digitalen M\u00e4rkten\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2025\/06\/large2.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Kirk, A. (2025). Verbraucherschutz und Grundrechte in digitalen M\u00e4rkten. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 39<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: https:\/\/doi.org\/10.1628\/978-3-16-164347-7 <a href=\"https:\/\/www.hiig.de\/en\/publication\/verbraucherschutz-und-grundrechte-in-digitalen-maerkten\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/der-zugriff-auf-elektronische-daten-im-strafprozess\/\" title=\"Der Zugriff auf elektronische Daten im Strafprozess\"><img loading=\"lazy\" decoding=\"async\" width=\"119\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.53.31-119x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.53.31-119x180.png 119w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.53.31-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.53.31-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.53.31-239x360.png 239w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.53.31.png 356w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Peters, E. (2026). Der Zugriff auf elektronische Daten im Strafprozess. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a039<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/der-zugriff-auf-elektronische-daten-im-strafprozess\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/freedom-of-expression-in-the-platform-society\/\" title=\"Freedom of Expression in the Platform Society\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2-386x579.png 386w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/11\/large2.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Pirang, A. (2024). Freedom of Expression in the Platform Society. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 38<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/freedom-of-expression-in-the-platform-society\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/eine-frage-der-ehre\/\" title=\"Eine Frage der Ehre\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort-386x579.png 386w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/eine-frage-der-ehre_wienfort.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Wienfort, N. (2024). Eine Frage der Ehre. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 37<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: 10.1628\/978-3-16-163733-9 <a href=\"https:\/\/www.hiig.de\/en\/publication\/eine-frage-der-ehre\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/dark-patterns-und-die-innere-sphaere-der-grundrechte\/\" title=\"Dark Patterns und die innere Sph\u00e4re der Grundrechte\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl-386x579.png 386w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/dark-patterns-und-die-innere-sphaere-der-grundrechte_weinzierl.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Weinzierl, Q. (2024). Dark Patterns und die innere Sph\u00e4re der Grundrechte. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a036<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: 10.1628\/978-3-16-163429-1 <a href=\"https:\/\/www.hiig.de\/en\/publication\/dark-patterns-und-die-innere-sphaere-der-grundrechte\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/personal-data-as-an-economic-asset\/\" title=\"Personal Data as an Economic Asset\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud-386x579.png 386w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/personal-data-as-an-economic-asset_jaud.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Jaud, P. (2024). Personal Data as an Economic Asset. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a035<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: 10.1628\/978-3-16-163407-9 <a href=\"https:\/\/www.hiig.de\/en\/publication\/personal-data-as-an-economic-asset\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/das-sharenting-in-der-zivilrechtsdogmatik\/\" title=\"Das Sharenting in der Zivilrechtsdogmatik\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/das-sharenting-in-der-zivilrechtsdogmatik_starz.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Starz, K. T. (2024). Das Sharenting in der Zivilrechtsdogmatik. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a034<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: 10.1628\/978-3-16-163577-9 <a href=\"https:\/\/www.hiig.de\/en\/publication\/das-sharenting-in-der-zivilrechtsdogmatik\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/regulierung-trotz-nichtwissen-epistemisches-vertrauen-als-handlungsressource-und-methode-im-recht\/\" title=\"Regulierung trotz Nichtwissen\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/regulierung-trotz-nichtwissen_bloecher.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Bl\u00f6cher, J. R. (2024). Regulierung trotz Nichtwissen. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a033<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: 10.1628\/978-3-16-163435-2 <a href=\"https:\/\/www.hiig.de\/en\/publication\/regulierung-trotz-nichtwissen-epistemisches-vertrauen-als-handlungsressource-und-methode-im-recht\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/social-bots-digitale-manipulation-und-verfassungsrecht\/\" title=\"Social Bots\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr-387x579.png 387w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2024\/07\/Social-bots-duerr.png 480w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">D\u00fcrr, P. (2024). Social Bots. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol.\u00a032<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. DOI: 10.1628\/978-3-16-163386-7 <a href=\"https:\/\/www.hiig.de\/en\/publication\/social-bots-digitale-manipulation-und-verfassungsrecht\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/metamorphosen-des-globalen-rechts\/\" title=\"Metamorphosen des globalen Rechts\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Metamorphosen-des-globalen-Rechts-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Metamorphosen-des-globalen-Rechts-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Metamorphosen-des-globalen-Rechts-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Metamorphosen-des-globalen-Rechts-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Metamorphosen-des-globalen-Rechts-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Metamorphosen-des-globalen-Rechts.png 357w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Campos, R. (2023). Metamorphosen des globalen Rechts. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 31<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/metamorphosen-des-globalen-rechts\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/intensivere-drittwirkung\/\" title=\"Intensivere Drittwirkung\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.19.17-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.19.17-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.19.17-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.19.17-34x50.png 34w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.19.17-242x360.png 242w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.19.17.png 360w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Heldt, A. (2023). Intensivere Drittwirkung. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 30<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/intensivere-drittwirkung\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/die-rechtswirklichkeit-der-datenschutzrechtlichen-einwilligung\/\" title=\"Die Rechtswirklichkeit der datenschutzrechtlichen Einwilligung\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Die-Rechtswirklichkeit-der-datenschutzrechtlichen-Einwilligung-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Die-Rechtswirklichkeit-der-datenschutzrechtlichen-Einwilligung-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Die-Rechtswirklichkeit-der-datenschutzrechtlichen-Einwilligung-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Die-Rechtswirklichkeit-der-datenschutzrechtlichen-Einwilligung-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Die-Rechtswirklichkeit-der-datenschutzrechtlichen-Einwilligung-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/10\/Die-Rechtswirklichkeit-der-datenschutzrechtlichen-Einwilligung.png 357w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Rothmann, R. (2023). Die Rechtswirklichkeit der datenschutzrechtlichen Einwilligung. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 29<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/die-rechtswirklichkeit-der-datenschutzrechtlichen-einwilligung\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/rechtsfragen-algorithmischer-preisdiskriminierung\/\" title=\"Rechtsfragen algorithmischer Preisdiskriminierung\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.32.05-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.32.05-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.32.05-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.32.05-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.32.05-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/05\/Bildschirm\u00adfoto-2023-05-15-um-16.32.05.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">R\u00fctzel, F. (2023). Rechtsfragen algorithmischer Preisdiskriminierung. In Hofmann, J., Kettemann, M. C., Scheuermann, B., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 28<\/em>. T\u00fcbingen, Germany: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/rechtsfragen-algorithmischer-preisdiskriminierung\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/datenschutz-minderjaehriger\/\" title=\"Datenschutz Minderj\u00e4hriger\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/05\/Datenschutz-Minderjaehriger-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/05\/Datenschutz-Minderjaehriger-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/05\/Datenschutz-Minderjaehriger-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/05\/Datenschutz-Minderjaehriger-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/05\/Datenschutz-Minderjaehriger-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/05\/Datenschutz-Minderjaehriger.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Schrader, J. (2021). Datenschutz Minderj\u00e4hriger. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 24<\/em>, <em>24<\/em>. T\u00fcbingen: Hofmann, J., Scheuermann, B., Schildhauer, T., & Schulz, W. <a href=\"https:\/\/www.hiig.de\/en\/publication\/datenschutz-minderjaehriger\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/informationsintermediaere\/\" title=\"Informationsintermedi\u00e4re\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29110_00_detail-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29110_00_detail-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29110_00_detail-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29110_00_detail-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29110_00_detail-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29110_00_detail.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Schiff, A. (2021). Informationsintermedi\u00e4re. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 23<\/em>, <em>23<\/em>. T\u00fcbingen: Hofmann, J., Scheuermann, B., Schildhauer, T., & Schulz, W. <a href=\"https:\/\/www.hiig.de\/en\/publication\/informationsintermediaere\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/der-monetaere-wert-von-daten-im-privatrecht\/\" title=\"Der monet\u00e4re Wert von Daten im Privatrecht\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29758_00_detail-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29758_00_detail-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29758_00_detail-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29758_00_detail-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29758_00_detail-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/08\/29758_00_detail.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Nissen, R. M. (2021). Der monet\u00e4re Wert von Daten im Privatrecht. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 22<\/em>, <em>22<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/der-monetaere-wert-von-daten-im-privatrecht\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/rechtsrealismus-und-digitalwirtschaft\/\" title=\"Rechtsrealismus und Digitalwirtschaft\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27716_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27716_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27716_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27716_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27716_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27716_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Klein, U. (2020). Rechtsrealismus und Digitalwirtschaft. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 19<\/em>, <em>19<\/em>. T\u00fcbingen: Hofmann, J., Scheuermann, B., Schildhauer, T., & Schulz, W. <a href=\"https:\/\/www.hiig.de\/en\/publication\/rechtsrealismus-und-digitalwirtschaft\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/die-lizenzierung-von-daten\/\" title=\"Die Lizenzierung von Daten\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27461_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27461_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27461_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27461_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27461_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27461_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Schur, N. (2020). Die Lizenzierung von Daten. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 20<\/em>, <em>20<\/em>. T\u00fcbingen: Hofmann, J., Scheuermann, B., Schildhauer, T., & Schulz, W. <a href=\"https:\/\/www.hiig.de\/en\/publication\/die-lizenzierung-von-daten\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/privatheit-durch-bargeld\/\" title=\"Privatheit durch Bargeld?\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27805_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27805_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27805_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27805_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27805_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/27805_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Eibl, J. (2020). Privatheit durch Bargeld? In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 21<\/em>, <em>21<\/em>. T\u00fcbingen: Hofmann, J., Scheuermann, B., Schildhauer, T., & Schulz, W. <a href=\"https:\/\/www.hiig.de\/en\/publication\/privatheit-durch-bargeld\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/staat-und-verfassung-in-der-digitalen-konstellation\/\" title=\"Staat und Verfassung in der Digitalen Konstellation\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/27364_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/27364_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/27364_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/27364_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/27364_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/27364_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Pernice, I. (2020). Staat und Verfassung in der Digitalen Konstellation. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 18<\/em>, <em>18<\/em>. T\u00fcbingen: Hofmann, J., Scheuermann, B., Schildhauer, T., & Schulz, W. <a href=\"https:\/\/www.hiig.de\/en\/publication\/staat-und-verfassung-in-der-digitalen-konstellation\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/souveraenitaetsfragmente\/\" title=\"Souver\u00e4nit\u00e4tsfragmente\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24558_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24558_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24558_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24558_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24558_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24558_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Steinbach, J. (2019). Souver\u00e4nit\u00e4tsfragmente. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 17<\/em>, <em>17<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/souveraenitaetsfragmente\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/der-schutz-privater-informationen-bei-cloud-computing\/\" title=\"Der Schutz \u00bbprivater\u00ab Informationen bei Cloud Computing\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24441_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24441_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24441_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24441_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24441_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24441_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Busching, M. (2019). Der Schutz \u00bbprivater\u00ab Informationen bei Cloud Computing. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 16<\/em>, <em>16<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/der-schutz-privater-informationen-bei-cloud-computing\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/regulierung-in-zeiten-der-digitalwirtschaft\/\" title=\"Regulierung in Zeiten der Digitalwirtschaft\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24433_00_detail.jpg-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24433_00_detail.jpg-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24433_00_detail.jpg-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24433_00_detail.jpg-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24433_00_detail.jpg-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/24433_00_detail.jpg.png 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Kr\u00f6nke, C., (Hrsg.) (2019). Regulierung in Zeiten der Digitalwirtschaft. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 15<\/em>, <em>15<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/regulierung-in-zeiten-der-digitalwirtschaft\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/regulierung-der-blockchains\/\" title=\"Regulierung der Blockchains\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12277_00_detail-120x180.jpg\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12277_00_detail-120x180.jpg 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12277_00_detail-40x60.jpg 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12277_00_detail-33x50.jpg 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12277_00_detail-240x360.jpg 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12277_00_detail.jpg 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Hofert, E. (2018). Regulierung der Blockchains. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 14<\/em>, <em>14<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/regulierung-der-blockchains\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/zugangsfreiheit-und-aufmerksamkeitsregulierung\/\" title=\"Zugangsfreiheit und Aufmerksamkeitsregulierung\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12072_00_detail-120x180.jpg\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12072_00_detail-120x180.jpg 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12072_00_detail-40x60.jpg 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12072_00_detail-33x50.jpg 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12072_00_detail-240x360.jpg 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/07\/12072_00_detail.jpg 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Mengden, M. (2018). Zugangsfreiheit und Aufmerksamkeitsregulierung. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 13<\/em>, <em>13<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/zugangsfreiheit-und-aufmerksamkeitsregulierung\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/remixe-auf-hosting-plattformen-eine-urheberrechtliche-untersuchung-filmischer-remixe-zwischen-grundrechtsrelevanten-schranken-und-inhaltefiltern-2\/\" title=\"Remixe auf Hosting-Plattformen Eine urheberrechtliche Untersuchung filmischer Remixe zwischen grundrechtsrelevanten Schranken und Inhaltefiltern\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail-120x180.jpg\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"Remixe auf Hosting-Plattformen\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail-120x180.jpg 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail-40x60.jpg 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail-200x300.jpg 200w, https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail-33x50.jpg 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail-240x360.jpg 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2018\/06\/11877_00_detail.jpg 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Maier, H. (2018). Remixe auf Hosting-Plattformen Eine urheberrechtliche Untersuchung filmischer Remixe zwischen grundrechtsrelevanten Schranken und Inhaltefiltern. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 11<\/em>, <em>11<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/remixe-auf-hosting-plattformen-eine-urheberrechtliche-untersuchung-filmischer-remixe-zwischen-grundrechtsrelevanten-schranken-und-inhaltefiltern-2\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/sicherheit-als-grundsatz\/\" title=\"Sicherheit als Grundsatz\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-535x800.png 535w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-685x1024.png 685w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-600x897.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-201x300.png 201w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06-624x933.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.45.06.png 718w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Leuschner, S. (2018). Sicherheit als Grundsatz. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft<\/em>, <em>10<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/sicherheit-als-grundsatz\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/digitale-bildnisse\/\" title=\"Digitale Bildnisse\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-536x800.png 536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-686x1024.png 686w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-600x896.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-201x300.png 201w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50-624x932.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.50.png 718w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Herbort, N. E. (2017). Digitale Bildnisse. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 8<\/em>, <em>8<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/digitale-bildnisse\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/virtuelles-hausrecht\/\" title=\"Virtuelles Hausrecht?\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-537x800.png 537w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-688x1024.png 688w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-34x50.png 34w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-242x360.png 242w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-600x893.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-201x300.png 201w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43-624x929.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.44.43.png 720w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Piras, G. (2016). Virtuelles Hausrecht? In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 7<\/em>, <em>7<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/virtuelles-hausrecht\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/informationelle-freiheit-und-staatliche-sicherheit\/\" title=\"Informationelle Freiheit und staatliche Sicherheit\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-536x800.png 536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-686x1024.png 686w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-34x50.png 34w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-600x895.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-201x300.png 201w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47-624x931.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.47.47.png 720w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Kipker, D. (2016). Informationelle Freiheit und staatliche Sicherheit. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 4<\/em>, <em>4<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/informationelle-freiheit-und-staatliche-sicherheit\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/computerkriminalitaet-im-europaeischen-strafrecht\/\" title=\"Computerkriminalit\u00e4t im Europ\u00e4ischen Strafrecht\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover-120x180.jpg\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover-120x180.jpg 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover-40x60.jpg 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover-200x300.jpg 200w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover-33x50.jpg 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover-240x360.jpg 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/11\/Computerkriminalita\u0308t-im-Europa\u0308ischen-Strafrecht-Cover.jpg 358w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Haase, A. (2017). Computerkriminalit\u00e4t im Europ\u00e4ischen Strafrecht. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 9<\/em>, <em>9<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/computerkriminalitaet-im-europaeischen-strafrecht\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/der-abschreckungseffekt-auf-die-grundrechtsausuebung\/\" title=\"Der Abschreckungseffekt auf die Grundrechtsaus\u00fcbung\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-535x800.png 535w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-685x1024.png 685w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-600x897.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-201x300.png 201w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22-624x933.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/12\/Bildschirmfoto-2017-12-27-um-12.39.22.png 718w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Staben, J. (2016). Der Abschreckungseffekt auf die Grundrechtsaus\u00fcbung. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 6<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/der-abschreckungseffekt-auf-die-grundrechtsausuebung\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/das-konzept-der-einwilligung-in-der-datenschutzrechtlichen-realitaet\/\" title=\"Das Konzept der Einwilligung in der datenschutzrechtlichen Realit\u00e4t\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-536x800.png 536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-685x1024.png 685w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-600x896.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21-624x931.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.21.png 718w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Radlanski, P. (2016). Das Konzept der Einwilligung in der datenschutzrechtlichen Realit\u00e4t. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 5<\/em>, <em>5<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/das-konzept-der-einwilligung-in-der-datenschutzrechtlichen-realitaet\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/datenschutzrechtliche-fragen-des-personenbezugs\/\" title=\"Datenschutzrechtliche Fragen des Personenbezugs\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-536x800.png 536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-686x1024.png 686w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-34x50.png 34w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-600x895.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-201x300.png 201w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41-624x930.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.58.41.png 720w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Haase, M. S. (2015). Datenschutzrechtliche Fragen des Personenbezugs. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 3<\/em>, <em>3<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/datenschutzrechtliche-fragen-des-personenbezugs\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/privatheit-wider-willen\/\" title=\"Privatheit wider Willen?\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-120x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-120x180.png 120w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-532x800.png 532w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-681x1024.png 681w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-240x360.png 240w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-600x902.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-199x300.png 199w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05-624x937.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.59.05.png 716w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">Sandfuchs, B. (2015). Privatheit wider Willen? In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 2<\/em>, <em>2<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/privatheit-wider-willen\/\">Publication details<\/a><\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/die-matrix-des-datenschutzes\/\" title=\"Die Matrix des Datenschutzes\"><img loading=\"lazy\" decoding=\"async\" width=\"121\" height=\"180\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-121x180.png\" class=\"attachment-publication_thumb size-publication_thumb wp-post-image responsively-lazy\" alt=\"\" srcset=\"\/wp-content\/uploads\/2019\/04\/placeholder_400.png\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-121x180.png 121w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-40x60.png 40w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-536x800.png 536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-685x1024.png 685w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-33x50.png 33w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-241x360.png 241w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-600x896.png 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19-624x931.png 624w, https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/04\/Bildschirmfoto-2016-08-23-um-15.53.19.png 718w\" \/><\/a><\/div><div class=\"col-sm-9\"><p class=\"publication-APA\">von Lewinski, K. (2014). Die Matrix des Datenschutzes. In Hofmann, J., Pernice, I., Schildhauer, T., & Schulz, W. (Eds.), <em>Internet und Gesellschaft: Vol. 1<\/em>, <em>1<\/em>. T\u00fcbingen: Mohr Siebeck. <a href=\"https:\/\/www.hiig.de\/en\/publication\/die-matrix-des-datenschutzes\/\">Publication details<\/a><\/p><\/div><\/div>\t\t<\/div>\n\t\n\t<h3>HIIG Publications<\/h3>\n<p>Find more publications <a href=\"https:\/\/www.hiig.de\/en\/publications\/\">here<\/a>.<\/p>\n<h3>\n\t\tOur Journals\n\t<\/h3>\n\t<h3>Keep in touch<\/h3>\n<p>Subscribe to our <a href=\"https:\/\/www.hiig.de\/en\/newsletter-registration\/\">newsletters<\/a>.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fschriftenreihe-internet-und-gesellschaft%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Book%20Series%20Internet%20und%20Gesellschaft https%3A%2F%2Fwww.hiig.de%2Fen%2Fschriftenreihe-internet-und-gesellschaft%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fschriftenreihe-internet-und-gesellschaft%2F&subject=Book%20Series%20Internet%20und%20Gesellschaft\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Here you find the publications of the book series &#8220;Internet und Gesellschaft&#8221;. The directors of the Humboldt Institute of Internet and Society are the publishers of this series. The publications are ranked by year of publication and author.<\/p>\n","protected":false},"author":29,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-27438","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Book Series Internet und Gesellschaft &#8211; HIIG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Book Series Internet und Gesellschaft &#8211; HIIG\" \/>\n<meta property=\"og:description\" content=\"Here you find the publications of the book series &quot;Internet und Gesellschaft&quot;. The directors of the Humboldt Institute of Internet and Society are the publishers of this series. The publications are ranked by year of publication and author.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-09T08:48:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Book Series Internet und Gesellschaft &#8211; HIIG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/","og_locale":"en_US","og_type":"article","og_title":"Book Series Internet und Gesellschaft &#8211; HIIG","og_description":"Here you find the publications of the book series \"Internet und Gesellschaft\". The directors of the Humboldt Institute of Internet and Society are the publishers of this series. The publications are ranked by year of publication and author.","og_url":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/","og_site_name":"HIIG","article_modified_time":"2020-09-09T08:48:10+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/","url":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/","name":"Book Series Internet und Gesellschaft &#8211; HIIG","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"datePublished":"2016-04-28T13:53:36+00:00","dateModified":"2020-09-09T08:48:10+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/schriftenreihe-internet-und-gesellschaft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Book Series Internet und Gesellschaft"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/27438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=27438"}],"version-history":[{"count":12,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/27438\/revisions"}],"predecessor-version":[{"id":70419,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/27438\/revisions\/70419"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=27438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}