{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:33:04Z","timestamp":1743013984581,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417059"},{"type":"electronic","value":"9783319417066"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41706-6_3","type":"book-chapter","created":{"date-parts":[[2016,7,2]],"date-time":"2016-07-02T11:54:11Z","timestamp":1467460451000},"page":"85-95","source":"Crossref","is-referenced-by-count":1,"title":["Why Do We Need Data Privacy?"],"prefix":"10.1007","author":[{"given":"Volker","family":"Klingspor","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,3]]},"reference":[{"key":"3_CR1","unstructured":"BVerfGE 65, 1; Az. 1 BvR 209, 269, 362, 420, 440, 484\/83 (1983)"},{"key":"3_CR2","unstructured":"Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation) (2012). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52012PC0011&from=EN"},{"key":"3_CR3","unstructured":"Alter, A.: Your E-Book is reading you. Wall Street J. (2012). http:\/\/www.wsj.com\/articles\/SB10001424052702304870304577490950051438304"},{"issue":"1","key":"3_CR4","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1177\/001391657600800102","volume":"8","author":"I Altman","year":"1976","unstructured":"Altman, I.: Privace: a conceptual analysis. Environ. Behav. 8(1), 7\u201329 (1976)","journal-title":"Environ. Behav."},{"key":"3_CR5","unstructured":"Anderson, C.: The end of theory: the data deluge makes the scientific method obsolete. Wired 16(7) (2008)"},{"key":"3_CR6","unstructured":"Anderson, N.: \u201cAnonymized\u201d data really isn\u2019t - and here\u2019s why not. Ars Technica (2009). http:\/\/arstechnica.com\/tech-policy\/2009\/09\/your-secrets-live-online-in-databases-of-ruin\/"},{"key":"3_CR7","first-page":"515","volume-title":"INFORMATIK 2014: Big Data - Komplexit\u00e4t meistern","author":"T Br\u00e4uchle","year":"2014","unstructured":"Br\u00e4uchle, T.: Die datenschutzrechtliche Einwilligung in Smart Metering Systemen - Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht. In: P\u00f6dereder, E., Grunske, L., Schneider, E., Ull, D. (eds.) INFORMATIK 2014: Big Data - Komplexit\u00e4t meistern, pp. 515\u2013526. Lecture Notes in Informatics, Gesellschaft f\u00fcr Informatik (2014)"},{"key":"3_CR8","unstructured":"Dambeck, H.: Verschollene Mitsch\u00e4ler: B\u00e4rgel und Creditreform retten Klassentreffen. Spiegel online (2006). http:\/\/www.spiegel.de\/netzwelt\/web\/verschollene-mitschueler-buergel-und-creditreform-retten-klassentreffen-a-452447.html"},{"key":"3_CR9","unstructured":"Eikenberg, R.: Spion im Wohnzimmer - Privacy und Sicherheit bei Internet-f\u00e4higen TVs. c\u2019t (4) (2014)"},{"key":"3_CR10","unstructured":"Erickson, M.: Pre-crime detection system now being tested in the U.S. (2012). http:\/\/bigthink.com\/think-tank\/pre-crime-detection-system-now-being-tested-in-the-us"},{"key":"3_CR11","unstructured":"IBM: Memphis police department reduces crime rates with IBM predictive analytics software (2010). http:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/32169.wss"},{"key":"3_CR12","unstructured":"Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: How we won the kaggle social network challenge. CoRR abs\/1102.4374 (2011). http:\/\/arxiv.org\/abs\/1102.4374"},{"key":"3_CR13","unstructured":"Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset. CoRR abs\/cs\/0610105 (2006). http:\/\/arxiv.org\/abs\/cs\/0610105"},{"key":"3_CR14","unstructured":"R\u00f6ssler, B.: Der Wert des Privaten. suhrkamp taschenbuch (2001)"},{"key":"3_CR15","unstructured":"Statista: Anzahl der Smartphone-Nutzer in Deutschland in den Jahren 2009 bis 2014. http:\/\/de.statista.com\/statistik\/daten\/studie\/198959\/umfrage\/anzahl-der-smartphonenutzer-in-deutschland-seit-2010"},{"key":"3_CR16","unstructured":"Statista: Prognose zum weltweiten Bestand an Smartphones von 2008 bis 2017. http:\/\/de.statista.com\/statistik\/daten\/studie\/312258\/umfrage\/weltweiter-bestand-an-smartphones\/"},{"key":"3_CR17","unstructured":"Sweeney, L.: Simple demographics often identify people uniquely. In: Data privacy working paper. Carnegie Mellon University (2000)"},{"key":"3_CR18","unstructured":"Trepte, S.: Privatsph\u00e4re aus psychologischer Sicht. In: Schmidt, J.H., Weichert, T. (eds.) Datenschutz - Grundlagen, Entwicklungen und Kontroversen, pp. 59\u201366. Bundeszentrale f\u00fcr politische Bildung (2012)"},{"key":"3_CR19","unstructured":"Tufekci, Z.: Ein Datensatz mit X. The European (3) (2013). http:\/\/www.theeuropean.de\/zeynep-tufekci\/7065-gefahren-von-big-data"},{"key":"3_CR20","unstructured":"Wrobel, S.: Big Data Analytics - Vom Maschinellen Lernen zur Data Science. In: Pl\u00f6dereder, E., Grunske, L., Schneider, E., Ull, D. (eds.) INFORMATIK 2014: Big Data - Komplexit\u00e4t meistern, p. 53. Lecture Notes in Informatics, Gesellschaft f\u00fcr Informatik (2014)"}],"container-title":["Lecture Notes in Computer Science","Solving Large Scale Learning Tasks. Challenges and Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41706-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:41:35Z","timestamp":1498311695000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41706-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417059","9783319417066"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41706-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}