{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T11:34:55Z","timestamp":1648726495023},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T00:00:00Z","timestamp":1177977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1007\/s11623-007-0135-8","type":"journal-article","created":{"date-parts":[[2007,5,10]],"date-time":"2007-05-10T01:10:18Z","timestamp":1178759418000},"page":"362-366","source":"Crossref","is-referenced-by-count":1,"title":["Vertrauen(skapseln) beim Online-Einkauf"],"prefix":"10.1007","volume":"31","author":[{"given":"Christel","family":"Kumbruck","sequence":"first","affiliation":[]},{"given":"Markus","family":"Sacher","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Stumpf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"135_CR1","unstructured":"Eurobarometer: European Union Public Opinion on Issues Relating to Business-to-Consumer E-Commerce. Brussels, 2005."},{"key":"135_CR2","unstructured":"Trusted Shops: Vertrauen als kritischer Erfolgsfaktor. Mehr Erfolg durch Online-G\u00fctesiegel? Vortrag Carsten Fr\u00f6hlich auf dem Internet World Kongress, 26. Oktober 2005, Hotel Dorint Sofitel Bayerpost, M\u00fcnchen."},{"key":"135_CR3","unstructured":"Castelfranchi, C. & Tan, Y.-H. (ed.): Trust and Deception in Virtual Societies. Introduction: Why Trust and Deception are Essential for Virtual Societies. Dordrecht: Kluwer Academic Publishers, 2001."},{"key":"135_CR4","first-page":"105","volume":"2","author":"C. Kumbruck","year":"2000","unstructured":"Kumbruck, C.: Digitale Signaturen und Vertrauen, Arbeit, 2, 105\u2013118, 2000.","journal-title":"Digitale Signaturen und Vertrauen, Arbeit"},{"key":"135_CR5","volume-title":"Vertrauen. Ein Mechanismus der Reduktion sozialer Komplexit\u00e4t","author":"N. Luhmann","year":"1989","unstructured":"Luhmann, N.: Vertrauen. Ein Mechanismus der Reduktion sozialer Komplexit\u00e4t, Stuttgart: Enke, 1989."},{"key":"135_CR6","volume-title":"Die Konsequenzen der Moderne","author":"A. Giddens","year":"1996","unstructured":"Giddens, A.: Die Konsequenzen der Moderne, Frankfurt\/M.: Suhrkamp, 1996."},{"key":"135_CR7","volume-title":"Recht der Multimedia-Dienste, Einl. SigG","author":"A. Ro\u00dfnagel","year":"1999","unstructured":"Ro\u00dfnagel, A., in Ro\u00dfnagel, A. (Hrsg.): Recht der Multimedia-Dienste, Einl. SigG, M\u00fcnchen: Beck, 1999."},{"key":"135_CR8","volume-title":"Datenschutz im Electronic Commerce","author":"A. Ro\u00dfnagel","year":"2003","unstructured":"Ro\u00dfnagel, A., in Ro\u00dfnagel, A., Banzhaf, J., Grimm, R. (Hrsg.): Datenschutz im Electronic Commerce, Heidelberg: Verlag Recht und Wirtschaft, 2003 Seite 225 ff."},{"key":"135_CR9","unstructured":"http:\/\/www.datenschutz-nord.de\/presse\/mitteilungen\/2005\/220805.html"},{"key":"135_CR10","doi-asserted-by":"crossref","unstructured":"Dierks, Tim and Allen, Christopher: The TLS Protocol Version 1.0, Internet Draft, 1999. http:\/\/www.ietf.org\/rfc\/rfc2246.txt .","DOI":"10.17487\/rfc2246"},{"key":"135_CR11","unstructured":"Pearson, Siani (ed.): Trusted Computing Platforms: TCPA Technology in Context, Prentice Hall PTR2003."},{"key":"135_CR12","unstructured":"Trusted Computing Group. Trusted Platform Module (TPM) Specifications. Technical Report. https:\/\/www.trustedcomputinggroup.org , 2006."},{"key":"135_CR13","unstructured":"Stumpf, Frederic, Tafreschi, Ralf, R\u00f6der, Patrick and Eckert, Claudia: \u201eA Robust Integrity Reporting Protocol for Remote Attestation\u201d, In: Proceedings of the 2nd Workshop on Advances in Trusted Computing, 2006, Tokyo."},{"key":"135_CR14","unstructured":"R\u00f6der, Patrick, Stumpf, Frederic, Grewe, Ralf and Eckert, Claudia: \u201eHades \u2014 Hardware Assisted Document Security\u201d, In: Proceedings of the 2nd Workshop on Advances in Trusted Computing, 2006, Tokyo."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0135-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0135-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0135-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:23Z","timestamp":1559412503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0135-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,5]]}},"alternative-id":["135"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0135-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,5]]}}}