{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:47:26Z","timestamp":1743072446496,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_40","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"567-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Law Infringements in Social Live Streaming Services"],"prefix":"10.1007","author":[{"given":"Franziska","family":"Zimmer","sequence":"first","affiliation":[]},{"given":"Kaja J.","family":"Fietkiewicz","sequence":"additional","affiliation":[]},{"given":"Wolfgang G.","family":"Stock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"40_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-20367-6_19","volume-title":"Social Computing and Social Media","author":"AD Beldad","year":"2015","unstructured":"Beldad, A.D., Koehorst, R.: It\u2019s not about the risks, I\u2019m just used to doing it: disclosure of personal information on Facebook among adolescent dutch users. In: Meiselwitz, G. (ed.) SCSM 2015. LNCS, vol. 9182, pp. 185\u2013195. Springer, Cham (2015). doi:10.1007\/978-3-319-20367-6_19"},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-02774-1_16","volume-title":"Online Communities and Social Computing","author":"PB Brandtz\u00e6g","year":"2009","unstructured":"Brandtz\u00e6g, P.B., Heim, J.: Why people use social networking sites. In: Ozok, A.A., Zaphiris, P. (eds.) OCSC 2009. LNCS, vol. 5621, pp. 143\u2013152. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-02774-1_16"},{"key":"40_CR3","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1016\/j.chb.2010.07.028","volume":"27","author":"CMK Cheung","year":"2011","unstructured":"Cheung, C.M.K., Chiu, P.Y., Lee, M.K.O.: Online social networks: why do students use Facebook? Comput. Hum. Behav. 27, 1337\u20131343 (2011). doi:10.1016\/j.chb.2010.07.028","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"40_CR4","first-page":"469","volume":"39","author":"M Edelmann","year":"2015","unstructured":"Edelmann, M.: From meerkat to periscope: does intellectual property law prohibit the live streaming of commercial sporting events? Colum. J.L. Arts 39(4), 469\u2013495 (2015)","journal-title":"Colum. J.L. Arts"},{"key":"40_CR5","unstructured":"Educause Learning Initiative: 7 Things You Should Know About Ustream (2008). https:\/\/library.educause.edu"},{"key":"40_CR6","unstructured":"Fichet, E., Robinson, J., Dailey, D., Starbird, K.: Eyes on the ground: emerging practices in Periscope use during crisis events. In: Tapia, A., Antunes, P., Ba\u00f1uls, V.A., Moore, K., Porto, J. (eds.) ISCRAM 2016, Conference Proceedings \u2013 13th International Conference on Information Systems for Crisis Response and Management, pp. 1\u201310. Federal University of Rio de Janeiro, Rio de Janeiro (2016)"},{"key":"40_CR7","doi-asserted-by":"publisher","unstructured":"Fietkiewicz, K.J., Lins, E., Baran, K.S., Stock, W.S.: Inter-generational comparison of social media use: investigating the online behavior of different generational cohorts. In: Proceedings of the 49th Hawaii International Conference on System Sciences, pp. 3829\u20133838. IEEE Press, Washington (2016). doi:10.1109\/HICSS.2016.477","DOI":"10.1109\/HICSS.2016.477"},{"key":"40_CR8","unstructured":"G\u00f6rmann, M.: YouNow: Wo sich Teenies \u00fcber Spanner freuen (2015). http:\/\/www.rosenheim24.de"},{"issue":"4","key":"40_CR9","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1037\/ppm0000013","volume":"2","author":"DN Greenwood","year":"2013","unstructured":"Greenwood, D.N.: Fame, Facebook, and Twitter: how attributed about fame predict frequency and nature of social media use. Psychol. Pop. Media Cult. 2(4), 222\u2013236 (2013). doi:10.1037\/ppm0000013","journal-title":"Psychol. Pop. Media Cult."},{"key":"40_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.chb.2013.07.055","volume":"30","author":"EE Hollenbaugh","year":"2013","unstructured":"Hollenbaugh, E.E., Ferris, A.L.: Facebook self-disclosure: examine the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50\u201358 (2013)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"40_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.26524\/jms.2015.1","volume":"1","author":"A Honka","year":"2015","unstructured":"Honka, A., Frommelius, N., Mehlem, A., Tolles, J.N., Fietkiewicz, K.J.: How safe is YouNow? An empirical study on possible law infringements in Germany and the United States. JMSS 1(1), 1\u201317 (2015)","journal-title":"JMSS"},{"issue":"9","key":"40_CR12","first-page":"1277","volume":"15","author":"HF Hsieh","year":"2005","unstructured":"Hsieh, H.F., Shannon, S.E.: Three approaches to qualitative content analysis. QHR 15(9), 1277\u20131288 (2005)","journal-title":"QHR"},{"key":"40_CR13","unstructured":"Kehn, D.: IBM Acquires Ustream (2016). https:\/\/www.ibm.com"},{"issue":"5","key":"40_CR14","doi-asserted-by":"publisher","first-page":"2605","DOI":"10.1007\/s11135-013-9910-9","volume":"48","author":"D Kim","year":"2014","unstructured":"Kim, D., Kim, J.-H., Nam, Y.: How does industry use social networking sites? An analysis of corporate dialogic uses of Facebook, Twitter, YouTube, and LinkedIn by industry type. Qual. Quant. 48(5), 2605\u20132614 (2014)","journal-title":"Qual. Quant."},{"key":"40_CR15","first-page":"365","volume":"22","author":"Y Kim","year":"2010","unstructured":"Kim, Y., Sohn, D., Choi, S.M.: Cultural differences in motivations for using social networking sites: a comparative study of American and Korean college students. Comput. Hum. Behav. 22, 365\u2013372 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR16","volume-title":"Content Analysis: An Introduction to Its Methodology","author":"K Krippendorff","year":"2004","unstructured":"Krippendorff, K.: Content Analysis: An Introduction to Its Methodology, 2nd edn. Sage, Thousand Oaks (2004)","edition":"2"},{"key":"40_CR17","unstructured":"K\u00fchl, E.: Seht her, ich bin beliebt! (2015). http:\/\/www.zeit.de"},{"key":"40_CR18","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.chb.2010.12.009","volume":"27","author":"K-Y Lin","year":"2011","unstructured":"Lin, K.-Y., Lu, H.P.: Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27, 1152\u20131161 (2011)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR19","doi-asserted-by":"publisher","unstructured":"Linde, F., Stock, W.G.: Information Markets. A Strategic Guideline for the I-Commerce. De Gruyter Saur, Berlin, New York (2011). doi:10.1002\/asi.22619","DOI":"10.1002\/asi.22619"},{"issue":"1","key":"40_CR20","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1177\/1461444810365313","volume":"13","author":"AE Marwick","year":"2010","unstructured":"Marwick, A.E., Boyd, D.: I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media Soc. 13(1), 114\u2013133 (2010)","journal-title":"New Media Soc."},{"key":"40_CR21","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.wneu.2016.03.019","volume":"92","author":"R Maugeri","year":"2016","unstructured":"Maugeri, R., Giammalva, R.G., Iacopino, D.G.: On the shoulders of giants, with a smartphone: periscope in neurosurgery. World Neurosurg. 92, 569\u2013570 (2016). doi:10.1016\/j.wneu.2016.03.019","journal-title":"World Neurosurg."},{"key":"40_CR22","unstructured":"McLain, T.: IBM cloud video services: a revolution in streaming video (2016). http:\/\/www.ustream.tv"},{"issue":"1","key":"40_CR23","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1177\/107769900007700107","volume":"77","author":"SJ McMillan","year":"2000","unstructured":"McMillan, S.J.: The microscope and the moving target: the challenge of applying content analysis to the World Wide Web. JMCQ 77(1), 80\u201398 (2000). doi:10.1177\/107769900007700107","journal-title":"JMCQ"},{"key":"40_CR24","unstructured":"P\u00f6tters, S.: EUGH-Urteil zu Exklusivlizenzen f\u00fcr TV-Sport\u00fcbertragungen. JuraExamen. Online Zeitschrift f\u00fcr Jurastudium, Staatsexamen und Referendariat, 21 October 2011. http:\/\/www.juraexamen.info"},{"key":"40_CR25","unstructured":"Rugg, A., Burroughs, B.: Periscope, live-streaming and mobile video culture. In: Geo-blocking and Global Video Culture (Theory on Demand; 18), pp. 64\u201373. Institute of Network Culture, Amsterdam (2016)"},{"issue":"2","key":"40_CR26","doi-asserted-by":"publisher","first-page":"06","DOI":"10.1633\/JISTaP.2016.4.2.1","volume":"4","author":"K Scheibe","year":"2016","unstructured":"Scheibe, K., Fietkiewicz, K.J., Stock, W.G.: Information behavior on social live streaming services. JISTP 4(2), 06\u201320 (2016). doi:10.1633\/JISTaP.2016.4.2.1","journal-title":"JISTP"},{"issue":"2","key":"40_CR27","first-page":"312","volume":"93","author":"DR Stewart","year":"2016","unstructured":"Stewart, D.R., Littau, J.: Up, Periscope: mobile streaming video technologies, privacy in public, and the right to record. JMCQ 93(2), 312\u2013331 (2016)","journal-title":"JMCQ"},{"key":"40_CR28","doi-asserted-by":"publisher","unstructured":"Stohr, D., Li, T., Wilk, S., Santini, S., Effelsberg, W.: An analysis of the YouNow live streaming platform. In: IEEE 40th Local Computer Networks Conference Workshops, pp. 673\u2013679. IEEE, New York (2015). doi:10.1109\/LCNW.2015.7365913","DOI":"10.1109\/LCNW.2015.7365913"},{"key":"40_CR29","unstructured":"Tempesta, E.: New live streaming app Periscope is already on its way to becoming a parent\u2019s worst nightmare following numerous reports of sexual harassment and bullying. Daily Mail\/MailOnline, 3 April 2015. http:\/\/www.dailymail.co.uk"},{"key":"40_CR30","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1016\/j.chb.2012.03.018","volume":"28","author":"LP Tosun","year":"2012","unstructured":"Tosun, L.P.: Motives for Facebook use and expressing \u201ctrue self\u201d on the internet. Comput. Hum. Behav. 28, 1510\u20131517 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR31","unstructured":"Vallance, C.: The danger with streaming and driving. BBC Magazine, 31 March 2016. http:\/\/www.bbc.com"},{"key":"40_CR32","unstructured":"Wagner, K.: Meerkat is ditching the livestream \u2013 and chasing a video social network instead. Recode, 4 March 2016. http:\/\/www.recode.net"},{"key":"40_CR33","unstructured":"Zota, V.: Me, myself & YouNow. YouNow \u2013 finde das Talent im Heuhaufen. c\u2019t 13, 81 (2015)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:02:27Z","timestamp":1625104947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}