{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T17:54:53Z","timestamp":1648749293835},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/s11623-007-0267-x","type":"journal-article","created":{"date-parts":[[2007,11,19]],"date-time":"2007-11-19T21:40:39Z","timestamp":1195508439000},"page":"827-834","source":"Crossref","is-referenced-by-count":0,"title":["Realisierung, Grenzen und Risiken der \u201eOnline-Durchsuchung\u201c"],"prefix":"10.1007","volume":"31","author":[{"given":"Dirk","family":"Fox","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"267_CR1","unstructured":"07]_Bundesministerium des Inneren: Fragenkatalog der SPD-Bundestagsfraktion, AG Kultur und Medien, AG Neue Medien. 22.08.2007 http:\/\/netzpolitik.org\/wp-upload\/fragen-onlinedurchsuchung-SPD.pdf"},{"key":"267_CR2","unstructured":"07]_Bundesministerium des Inneren: Fragenkatalog des Bundesministeriums der Justiz. 22.08.2007 http:\/\/netzpolitik.org\/wp-upload\/fragen-onlinedurchsuchung-BMJ.pdf"},{"key":"267_CR3","unstructured":"07]_Buermeyer, Ulf: Die \u201eOnline-Durchsuchung\u201c. Technischer Hintergrund des verdeckten hoheitlichen Zugriffs auf Computersysteme. HRRS, April 2007, S. 154\u2013166. http:\/\/www.hrr-strafrecht.de\/hrr\/archive\/07-04\/index.php?sz=8"},{"key":"267_CR4","unstructured":"07]_Hansen, Markus; Pfitzmann, Andreas: Online-Durchsuchung. Technische Grundlagen von Online-Durchsuchung und\u2014Beschlagnahme. DRiZ, August 2007, S. 225\u2013228. http:\/\/www.heymanns.com\/servlet\/PB\/menu\/1226897\/index.html"},{"key":"267_CR5","doi-asserted-by":"crossref","unstructured":"07]_Pohl, Hartmut: Zur Technik der heimlichen Online-Durchsuchung. DuD, 9\/2007, S. 684\u2013688.","DOI":"10.1007\/s11623-007-0224-8"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0267-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0267-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0267-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:26Z","timestamp":1559398106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0267-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":5,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0267-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}