{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:00:15Z","timestamp":1743033615407,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":5,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_21","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"249-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["What now? Data Retention Scenarios After the ECJ Ruling"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Guarino","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"21_CR111","unstructured":"[CSCG14] CEN-CENELEC-ETSI Cyber Security Coordination Group: \u201cRecommendations for a Strategy on European Cyber Security Standardisation\u201d, 2014 (http:\/\/www.cscg.focusict.de)"},{"key":"21_CR112","unstructured":"[ECJ14] European Court of Justice: \u201cJudgment of the Court of 8 April 2014 in joined cases C-293\/12 and C-594\/12\u201d"},{"key":"21_CR113","unstructured":"[EU06] \u201cDirective 2006\/24\/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provisions of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC\u201d. In: \u201cOfficial Journal of the European Union\u201d 13.4.2006"},{"key":"21_CR114","doi-asserted-by":"crossref","unstructured":"[Guar13] Guarino, Alessandro: \u201cDigital Forensics as a Big Data Challenge\u201d. In: \u201cISSE 2013 Securing Electronic Business Processes\u201d, Springer, 2013, p. 197-203.","DOI":"10.1007\/978-3-658-03371-2_17"},{"key":"21_CR115","doi-asserted-by":"crossref","unstructured":"[Masy14] Masys, Anthony (ed.): \u201cNetworks and Network Analysis for Defence and Security (Lecture Notes in Social Networks)\u201d, Springer, 2014.","DOI":"10.1007\/978-3-319-04147-6"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T19:15:11Z","timestamp":1676661311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_21","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}