{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T17:20:24Z","timestamp":1712078424066},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1007\/s11623-008-0142-4","type":"journal-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T02:11:09Z","timestamp":1225159869000},"page":"597-600","source":"Crossref","is-referenced-by-count":2,"title":["Privacy im Social Web"],"prefix":"10.1007","volume":"32","author":[{"given":"Anja","family":"Beyer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcel","family":"Kirchner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gunther","family":"Kreuzberger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jens","family":"Schmeling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2008,10,29]]},"reference":[{"key":"142_CR1","volume-title":"Online-Lernen: Handbuch f\u00fcr das Lernen mit Internet","author":"T. Bernhardt","year":"2008","unstructured":"Bernhardt, Thomas \/ Kirchner, Marcel \/ Klosa, Oliver (2008): Konnektivit\u00e4t von Online-Anwendungen. In: Issing, L.J., Klimsa, P. (Hrsg.): Online-Lernen: Handbuch f\u00fcr das Lernen mit Internet. M\u00fcnchen: WV Oldenbourg (im Druck)"},{"key":"142_CR2","unstructured":"Holz, Patrick (2006): Was ist Web 2.0? Designvorlagen und Gesch\u00e4ftsmodelle f\u00fcr eine neue Software-Generation. URL: http:\/\/www.distinguish.de\/?page_id=36 [Abruf am 30.05.2008]"},{"key":"142_CR3","unstructured":"O\u2019Reilly, Tim (2005): What is Web 2.0? Design Patterns and Business Models for the Next Generation of Software. URL: http:\/\/www.oreilly.de\/artikel\/web20.html [Abruf am 30.05.2008]"},{"key":"142_CR4","unstructured":"St\u00e4dtler, Helge (2007): Was genau ist 2.0? URL: http:\/\/www.ifeb.uni-bremen.de\/wordpress_staedtler\/?p=235 [Abruf am 02.06.2008]"},{"key":"142_CR5","unstructured":"Deutschland online (2006): Social Web. URL: http:\/\/www.studie-deutschland-online.de\/do4\/6000.html [Abruf am 13.07.2008]"},{"key":"142_CR6","volume-title":"E-Learning 2.0 im Einsatz-\u201eDu bist der Autor!\u201c \u2014 Vom Nutzer zum WikiBlog-Caster","author":"T. Bernhardt","year":"2007","unstructured":"Bernhardt, Thomas \/ Kirchner, Marcel (2007): E-Learning 2.0 im Einsatz-\u201eDu bist der Autor!\u201c \u2014 Vom Nutzer zum WikiBlog-Caster. Boizenburg: VWH."},{"key":"142_CR7","unstructured":"Mosel, Stephan (2006): Hard facts zu Social Software: Chat-Interview mit Stephan Mosel. URL: http:\/\/www.e-teaching.org\/community\/socialsoftware25092006 [Abruf am 13.07.2008]"},{"key":"142_CR8","unstructured":"Entschlie\u00dfung der Datenschutzbeauftragten des Bundes und der L\u00e4nder vom 3.\/4. April 2008. URL: http:\/\/www.badenwuerttemberg.datenschutz.de\/lfd\/konf\/2008\/04_03_08.htm [Abruf am 21.07.08]"},{"key":"142_CR9","unstructured":"Beha, Heidi (2008): Identit\u00e4tsklau im Online-Netzwerk. URL: http:\/\/www.stern.de\/computertecnik\/internet\/:StudiVZ-Identit%E4tsklau-Online-Netzwerk\/626560.html [Abruf am 21.07.2008]"},{"key":"142_CR10","unstructured":"Grobholz, Mario\/ Eck, Klaus (2008): Im Spotlight: Gl\u00e4serner Internetnutzer \u2014 Das Web vergisst nichts. URL: http:\/\/www.pironet-ndh.com\/newsletter\/2008_04\/PNDH-News-letter-2008-04-Interview.html [Abruf am 15.07.2008]"},{"key":"142_CR11","unstructured":"Mai, Jochen: Klick, du bist tot \u2014 Wenn das Internet Karrieren kilt. Am 13.07.07 http:\/\/karrierebibel.de\/klick-du-bist-tot-wenndas-internet-karrieren-killt [Abruf am 15.07.2008]."},{"key":"142_CR12","unstructured":"Schaar, Peter: Striptease als Gewohnheitstier \u2014 Immer mehr Menschen entbl\u00f6\u00dfen sich im Netz. Was hilft dagegen? URL: http:\/\/www.bfdi.bund.de\/cln_027\/nn_531026\/sid_D8588B6C03F8FBF401547309691EF057\/DE\/Oeffentlichkeitsarbeit\/RedenUndInterviews\/2007\/SZW19Datenschutz.html [Abruf am 15.07.2008]."},{"key":"142_CR13","unstructured":"Patalong, Frank (2007). Todeines Teenagers. URL: http:\/\/www.spiegel.de\/netzwelt\/web\/0,1518,518042,00.html [Abruf am 21.07.2008]"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-008-0142-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-008-0142-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-008-0142-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:20:51Z","timestamp":1559398851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-008-0142-4"}},"subtitle":["Zum kompetenten Umgang mit pers\u00f6nlichen Daten im Web 2.0"],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":13,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["142"],"URL":"https:\/\/doi.org\/10.1007\/s11623-008-0142-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}