{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T19:39:19Z","timestamp":1648928359273},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s11623-009-0160-x","type":"journal-article","created":{"date-parts":[[2009,10,29]],"date-time":"2009-10-29T20:09:11Z","timestamp":1256846951000},"page":"616-619","source":"Crossref","is-referenced-by-count":0,"title":["Datenschutzrechtlich gesicherte arzt-Patienten-Kommunikation"],"prefix":"10.1007","volume":"33","author":[{"given":"J\u00f6rg","family":"Schulte","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Westphal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,31]]},"reference":[{"key":"160_CR1","unstructured":"B\u00f6rner, F.; Sengpiel, M.; Rath, M.; Z\u00f6llkau, Y.; Strunk, G. (2002): Der Internet Rechtsberater: Rechtsfragen und steuerliche Gestaltungsm\u00f6glichkeiten, 2. Aufl., K\u00f6ln."},{"key":"160_CR2","doi-asserted-by":"crossref","unstructured":"Eckert, C. (2006): IT-Sicherheit. 4. Aufl., M\u00fcnchen.","DOI":"10.1524\/9783486595970"},{"key":"160_CR3","unstructured":"Gola, P.; Klug, C. (2003): Grundz\u00fcge des Datenschutzrechts, M\u00fcnchen."},{"key":"160_CR4","unstructured":"Jonsen, A.; Siegler, M.; Winslade, W. (2006): Klinische Ethik eine praktische Hilfe zur ethischen Entscheidungsfindung, 5. Aufl., K\u00f6ln."},{"key":"160_CR5","unstructured":"Kannengiesser, C.; Kannengiesser, M. (2007): PHP5 \/ MySQL 5 Master Edition, 1. Aufl., Poing."},{"key":"160_CR6","unstructured":"Reese, G.; Yarger, R. J.; King, T. (2003): MySQL \u2014 Einsatz und Programmierung, K\u00f6ln."},{"key":"160_CR7","unstructured":"Reng, C.; Debold, P.; Specker, C.; Pommerening, K. (2006): Generische L\u00f6sungen zum Datenschutz f\u00fcr die Forschungsnetze in der Medizin, Berlin."},{"key":"160_CR8","first-page":"605","volume":"26","author":"J. Schulte","year":"2002","unstructured":"Schulte, J.; Wehrmann, R.; Wellbrock, R. (2002): Das Datenschutzkonzept des Kompetenznetzes Parkinson, Datenschutz und Datensicherheit (DuD) 26, S. 605\u2013610.","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"key":"160_CR9","unstructured":"Witt, B. (2008): Datenschutz kompakt und verst\u00e4ndlich, Wiesbaden."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-009-0160-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-009-0160-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-009-0160-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:20:56Z","timestamp":1559398856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-009-0160-x"}},"subtitle":["Vernetzung von onkologisch arbeitenden \u00c4rzten"],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":9,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["160"],"URL":"https:\/\/doi.org\/10.1007\/s11623-009-0160-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}