{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T09:11:24Z","timestamp":1666602684091},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T00:00:00Z","timestamp":1589932800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T00:00:00Z","timestamp":1589932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Fachhochschule Dortmund"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2020,6]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Datenschutz ist Vertrauenssache: Ein Kunde vertraut dem Anbieter einer digitalen Dienstleistung personenbezogene und pers\u00f6nliche Daten an und hofft, dass dieser sie erfolgreich besch\u00fctzt und der Versuchung widersteht, sie zu unlauteren Zwecken zu missbrauchen. Dieses Vertrauen wird immer wieder entt\u00e4uscht. Sammelt eine Firma zentral gro\u00dfe Mengen personenbezogener Daten ihrer Kunden, so bilden diese den Schatz der Firma, der ggf. verkauft oder gestohlen werden kann.<\/jats:p><jats:p>Der einzige sichere Schutz gegen solche Versuchungen besteht darin, eine zentrale Datenansammlung zu vermeiden. Technisch gibt es die M\u00f6glichkeit dazu, indem man f\u00fcr Kommunikation und Datenhaltung dezentrale, vertrauensw\u00fcrdige Peer-to-Peer-Software (P2P) verwendet.<\/jats:p><jats:p>Im GI-Radar 249 hat die Gesellschaft f\u00fcr Informatik im Oktober 2019 eine Umfrage zu verschiedenen solchen Technologien durchgef\u00fchrt. Herzlichen Dank den 148 Teilnehmer*innen, die den Fragebogen vollst\u00e4ndig ausgef\u00fcllt haben!<\/jats:p><jats:p>In diesem Artikel werden zun\u00e4chst drei Initiativen, dann einige Technologien und zuletzt die Ergebnisse der Umfrage vorgestellt.<\/jats:p>","DOI":"10.1007\/s00287-020-01271-6","type":"journal-article","created":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T06:02:56Z","timestamp":1589954576000},"page":"203-210","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Vertrauensw\u00fcrdige Kommunikation: Ergebnisse einer Umfrage"],"prefix":"10.1007","volume":"43","author":[{"given":"Andrea","family":"Herrmann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,20]]},"reference":[{"key":"1271_CR1","unstructured":"https:\/\/larrysanger.org\/2019\/06\/declaration-of-digital-independence\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR2","unstructured":"https:\/\/webisours.github.io\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR3","unstructured":"https:\/\/indieweb.org\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR4","unstructured":"https:\/\/friendi.ca\/, https:\/\/friendica-wiki.de\/doku.php. Zugegriffen: 23.03.2020"},{"key":"1271_CR5","unstructured":"https:\/\/diasporafoundation.org\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR6","doi-asserted-by":"crossref","unstructured":"https:\/\/mastodon.social. Zugegriffen: 23.03.2020","DOI":"10.37500\/IJESSR.2020.3033"},{"key":"1271_CR7","unstructured":"https:\/\/fediverse.party\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR8","unstructured":"https:\/\/the-federation.info\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR9","unstructured":"https:\/\/matrix.org\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR10","unstructured":"https:\/\/about.riot.im\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR11","unstructured":"https:\/\/jami.net\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR12","unstructured":"https:\/\/beta.u.is\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR13","unstructured":"https:\/\/openbazaar.org\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR14","unstructured":"https:\/\/openbazaar.com\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR15","unstructured":"Dfinity.org. Zugegriffen: 23.03.2020"},{"key":"1271_CR16","unstructured":"https:\/\/www.scion-architecture.net\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR17","unstructured":"https:\/\/pszal.github.io\/papers\/SCION-book.pdf. Zugegriffen: 23.03.2020"},{"key":"1271_CR18","unstructured":"https:\/\/straightway.github.io\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR19","unstructured":"https:\/\/zotlabs.org\/page\/hubzilla\/hubzilla-project. Zugegriffen: 23.03.2020"},{"key":"1271_CR20","unstructured":"https:\/\/hub.libranet.de\/page\/hucope\/hubzilla_pitch_lvee-2017_theses_de. Zugegriffen: 23.03.2020"},{"key":"1271_CR21","unstructured":"https:\/\/xmpp.org\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR22","unstructured":"https:\/\/de.wikipedia.org\/wiki\/Extensible_Messaging_and_Presence_Protocol. Zugegriffen: 23.03.2020"},{"key":"1271_CR23","unstructured":"https:\/\/www.freie-messenger.de\/sys_xmpp\/conversations\/. Zugegriffen: 23.03.2020"},{"key":"1271_CR24","unstructured":"https:\/\/de.wikipedia.org\/wiki\/Conversations_(Instant_Messenger). Zugegriffen: 23.03.2020"}],"container-title":["Informatik Spektrum"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-020-01271-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00287-020-01271-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-020-01271-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T08:46:23Z","timestamp":1666601183000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00287-020-01271-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,20]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["1271"],"URL":"https:\/\/doi.org\/10.1007\/s00287-020-01271-6","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,20]]},"assertion":[{"value":"20 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}