{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:29:38Z","timestamp":1725582578376},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207686"},{"type":"electronic","value":"9783642207693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20769-3_2","type":"book-chapter","created":{"date-parts":[[2011,4,29]],"date-time":"2011-04-29T09:47:20Z","timestamp":1304070440000},"page":"15-26","source":"Crossref","is-referenced-by-count":0,"title":["Implementability of the Identity Management Part in Pfitzmann\/Hansen\u2019s Terminology for a Complex Digital World"],"prefix":"10.1007","author":[{"given":"Manuela","family":"Berg","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Borcea-Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Soziale Systeme: Grundriss einer allgemeinen Theorie","author":"N. Luhmann","year":"1987","unstructured":"Luhmann, N.: Soziale Systeme: Grundriss einer allgemeinen Theorie. Suhrkamp Verlag, Frankfurt am Main (1987)"},{"key":"2_CR2","first-page":"205","volume":"37","author":"S. Clau\u00df","year":"2001","unstructured":"Clau\u00df, S., K\u00f6hntopp, M.: Identity management and its support of multilateral security. Computer Networks, Special Issue on Electronic Business Systems\u00a037, 205\u2013219 (2001)","journal-title":"Computer Networks, Special Issue on Electronic Business Systems"},{"key":"2_CR3","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (2010) http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml (Version v0.34 of August 10, 2010)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.2307\/3481326","volume":"90","author":"D.J. Solove","year":"2002","unstructured":"Solove, D.J.: Conceptualizing Privacy. California Law Review\u00a090, 1087\u20131155 (2002)","journal-title":"California Law Review"},{"key":"2_CR5","doi-asserted-by":"crossref","DOI":"10.7591\/9781501721243","volume-title":"In Pursuit of Privacy: Law, Ethics and the Rise of Technology","author":"J.W. DeCew","year":"1997","unstructured":"DeCew, J.W.: In Pursuit of Privacy: Law, Ethics and the Rise of Technology. Cornell University Press, Ithica (1997)"},{"key":"2_CR6","unstructured":"Borcea-Pfitzmann, K., Pekarek, M., Poetzsch, S.: Model of Multilateral Interactions. Technical report, EU Project PrimeLife Heartbeat (2009)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"key":"2_CR8","unstructured":"Bundesdatenschutzgesetz (1990) (version 14.08.2009)"},{"key":"2_CR9","volume-title":"Privacy and Freedom","author":"A.F. Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"2_CR10","first-page":"105","volume":"26","author":"R. Seman\u010d\u00edk","year":"2007","unstructured":"Seman\u010d\u00edk, R.: Basic Properties of the Persona Model. Computing and Informatics\u00a026, 105\u2013121 (2007)","journal-title":"Computing and Informatics"},{"issue":"2","key":"2_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1177\/0165551506070706","volume":"33","author":"J. Rowley","year":"2007","unstructured":"Rowley, J.: The wisdom hierarchy: representations of the DIKW hierarchy. Journal of Information Science\u00a033(2), 163\u2013180 (2007), doi:10.1177\/0165551506070706","journal-title":"Journal of Information Science"},{"key":"2_CR12","unstructured":"DIN ISO\/IEC 2382-1 Information technology \u2013 Vocabulary \u2013 Part 1: Fundamental Terms (1993)"},{"key":"2_CR13","first-page":"3","volume":"16","author":"R.L. Ackoff","year":"1989","unstructured":"Ackoff, R.L.: From data to wisdom. Journal of Applied Systems Analysis\u00a016, 3\u20139 (1989)","journal-title":"Journal of Applied Systems Analysis"},{"key":"2_CR14","volume-title":"Working Knowledge","author":"T.H. Davenport","year":"1998","unstructured":"Davenport, T.H., Prusak, L.: Working Knowledge. Harvard Business School Press, Boston (1998)"},{"key":"2_CR15","unstructured":"Bellinger, G., Castro, D., Mills, A.: Data, Information, Knowledge, and Wisdom (2004), http:\/\/www.systems-thinking.org\/dikw\/dikw.htm (accessed at July 1, 2010)"},{"key":"2_CR16","volume-title":"The Presentation of Self in Everyday Life","author":"E. Goffman","year":"1959","unstructured":"Goffman, E.: The Presentation of Self in Everyday Life. Anchor Books, New York (1959)"},{"key":"2_CR17","first-page":"8590","volume-title":"First Workshop on Mobile Computing Systems and Applications","author":"B. Schilit","year":"1994","unstructured":"Schilit, B., Adams, R., Want, R.: Context-Aware Computing Applications. In: First Workshop on Mobile Computing Systems and Applications, p. 8590. IEEE, Los Alamitos (1994)"},{"key":"2_CR18","first-page":"119","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as Contextual Privacy. Washington Law Review\u00a079, 119\u2013158 (2004)","journal-title":"Washington Law Review"},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1524\/itit.2011.0622","volume":"53","author":"A. Pfitzmann","year":"2011","unstructured":"Pfitzmann, A., Borcea-Pfitzmann, K., Berg, M.: Privacy 3.0:= Data Minimization + User-Control of Data Disclosure + Contextual Integrity. it \u2013 Information Technology\u00a053(1), 34\u201340 (2011)","journal-title":"it \u2013 Information Technology"},{"key":"2_CR20","unstructured":"G\u00fcrses, S.: Multilateral Privacy Requirements Analysis in Online Social Network Services. Dissertation, Katholieke Universiteit Leuven (2010)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20769-3_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:30Z","timestamp":1606186830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20769-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207686","9783642207693"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20769-3_2","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}