{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T02:08:36Z","timestamp":1648692516690},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,2]]},"DOI":"10.1007\/s11623-006-0023-7","type":"journal-article","created":{"date-parts":[[2006,6,24]],"date-time":"2006-06-24T03:15:27Z","timestamp":1151118927000},"page":"80-84","source":"Crossref","is-referenced-by-count":2,"title":["Datenschutzanforderungen an Digital Rights Management"],"prefix":"10.1007","volume":"30","author":[{"given":"Jan","family":"M\u00f6ller","sequence":"first","affiliation":[]},{"given":"Johann","family":"Bizer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Artikel 29-Gruppe, Arbeitspapier 104, http:\/\/europa.eu.int\/comm\/justice_home\/fsj\/privcy\/docs\/wpdocs\/2005\/wp104_de.pdf"},{"key":"23_CR2","volume-title":"Privacy4DRM, Datenschutzvertr\u00e4gliches und nutzungsfreundliches","author":"B. Bizer","year":"2005","unstructured":"Bizer, Grimm, Will et al.: Bizer, Johann \/ Grimm, R\u00fcdiger \/ M\u00f6ller, Jan \/ M\u00fcller, Michael \/ M\u00fcller, Anja \/ Jazdzejewski, Stefan \/ Puchta, Stefan \/ Will, Andreas, Privacy4DRM, Datenschutzvertr\u00e4gliches und nutzungsfreundliches, Digital Rights Management, Kiel Ilmenau 2005, http:\/\/www.datenschutzzentrum.de\/drm\/"},{"key":"23_CR3","unstructured":"Bizer, Johann in: Simitis, Spiros, Bundesdatenschutzgesetz, 5. Aufl. Baden-Baden 2003; BDSG, \u00a7 3 a."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Buhse, Willms, Wettbewerbsstrategien im Umfeld von Darknet und Digital Rights Management \u2014 Szenarien und Erl\u00f6smodelle f\u00fcr Onlinemusik, Wiesbaden 2004.","DOI":"10.1007\/978-3-322-81731-0"},{"key":"23_CR5","unstructured":"Federrath, Hannes, Digital Rights Management Systeme, http:\/\/www-sec.uni-regensburg.de\/publ\/2003\/2003-11-18BMJ.pdf"},{"key":"23_CR6","unstructured":"Federrath, Hannes, Scientific Evaluatuion of DRM Systems, http:\/\/www-sec.uni-regensburg.de\/publ\/2002\/FederrathDRM20020129.pdf"},{"key":"23_CR7","unstructured":"R\u00fcdiger Grimm, J\u00fcrgen N\u00fctzel, Musikvertrieb mit Potato Web Services, DuD 2005, 125 ff."},{"key":"23_CR8","first-page":"159","volume-title":"IT-Sicherheit geht alle an! Tagungsband zum 9","author":"M. Hansen","year":"2005","unstructured":"Hansen, Markus, M\u00f6ller, Jan, Digital Rights Management zwischen Sicherheit und informationeller Selbstbestimmung in: Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (Hrsg.): IT-Sicherheit geht alle an! Tagungsband zum 9. Deutschen IT-Sicherheitskongress des BSI, Gau-Algesheim 2005, 159\u2013171, online: http:\/\/www.datenschutzzentrum.de\/vortraege\/050510_hansen-moeller_bsi.htm"},{"key":"23_CR9","unstructured":"Konferenz der Datenschutzbeauftragten des Bundes und der L\u00e4nder vom 24.\/25.10.2002, Entschlie\u00dfung zur datenschutzgerechten Verg\u00fctung f\u00fcr digitale Privatkopien im neuen Urheberrecht."},{"key":"23_CR10","first-page":"125","volume":"3","author":"J. \/. N\u00fctzel","year":"2005","unstructured":"N\u00fctzel, J\u00fcrgen \/ Grimm, R\u00fcdiger, Musikvertrieb mit Potato Web Services, DuD 3\/2005, 125\u2013129.","journal-title":"DuD"},{"key":"23_CR11","unstructured":"Schaar, Peter: Datenschutz im Internet \u2014 Die Grundlagen, M\u00fcnchen, 2002."},{"key":"23_CR12","unstructured":"Christiane Schulzki-Haddouti, Digital Rights Management, http:\/\/www.uld-i.de\/themen\/drm\/"},{"key":"23_CR13","unstructured":"Doctorow, Cory, Microsoft DRM Talk http:\/\/www.craphound.com\/msftdrm.txt"},{"key":"23_CR14","unstructured":"von der Horst, Rutger, Die Musik, das Netz, mp3 und der Rest \u2014 Das up-date, Teil 1: http:\/\/www.virtuelle-kanzlei.de\/200402 , Teil 2: http:\/\/www.virtuelle-kanzlei.de\/200403"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0023-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0023-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0023-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:16Z","timestamp":1559412496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0023-7"}},"subtitle":["Rechtsdurchsetzung f\u00fcr Urheber und Verwerter kontra Datenschutz der Nutzer"],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0023-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2]]}}}