{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T20:07:20Z","timestamp":1649016440594},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1007\/s11623-011-0084-0","type":"journal-article","created":{"date-parts":[[2011,5,20]],"date-time":"2011-05-20T19:58:31Z","timestamp":1305921511000},"page":"346-350","source":"Crossref","is-referenced-by-count":0,"title":["Informationelle Selbstbestimmung und narrativistische Rezeption"],"prefix":"10.1007","volume":"35","author":[{"given":"Sandro","family":"Gaycken","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"84_CR1","doi-asserted-by":"crossref","unstructured":"Clarke, R. (1988), \u201cInformation Technology and Dataveillance\u201d, in: Dunlop & Kling, Communications of the ACM, Vol. 31 No.5, New York.","DOI":"10.1145\/42411.42413"},{"key":"84_CR2","volume-title":"\u00dcberwachen und Strafen","author":"M. Foucault","year":"1994","unstructured":"Foucault, M. (1994), \u00dcberwachen und Strafen. Die Geburt des Gef\u00e4ngnisses, Frankfurt am Main."},{"issue":"3","key":"84_CR3","doi-asserted-by":"crossref","first-page":"234","DOI":"10.24908\/ss.v1i3.3338","volume":"1","author":"D. Wood","year":"2003","unstructured":"Wood, D. (2003), \u201cFoucault and Panopticism Revisited (Issue)\u201d, in: Surveillance & Society 1(3), S. 234\u2013239.","journal-title":"Surveillance & Society"},{"key":"84_CR4","first-page":"865","volume":"28","author":"A. Abramovsky","year":"1996","unstructured":"Abramovsky, A. & Edelstein, J. (1996), \u201cCameras in the Jury Room \u2014 An Unnecessary and Dangerous Precedent\u201d, in: 28 Ariz. St. L. J. 865.","journal-title":"Ariz. St. L. J."},{"key":"84_CR5","doi-asserted-by":"crossref","unstructured":"Wiegerling, K. (2010), Philosophie intelligenter Welten, i.E.","DOI":"10.30965\/9783846751008"},{"key":"84_CR6","doi-asserted-by":"crossref","unstructured":"Gaycken, S. (2007), \u201cCounter-Development\u201d, in: International Journal of Technology, Knowledge and Society, Vol. 2\/1, Cambridge.","DOI":"10.18848\/1832-3669\/CGP\/v03i01\/55705"},{"key":"84_CR7","unstructured":"Luhmann, N. (1968), Vertrauen, Stuttgart."},{"key":"84_CR8","doi-asserted-by":"crossref","unstructured":"Klumpp, D. et al (2008), Informationelles Vertrauen f\u00fcr die Informationsgesellschaft, Berlin.","DOI":"10.1007\/978-3-540-77670-3"},{"key":"84_CR9","unstructured":"Kubicek, H. (2008), \u201eVertrauen durch Sicherheit \u2014 Vertrauen in Sicherheit\u201d, in: Klumpp, D. et al, Informationelles Vertrauen f\u00fcr die Informationsgesellschaft, Berlin."},{"issue":"3","key":"84_CR10","first-page":"253","volume":"49","author":"H. Simon","year":"1959","unstructured":"Simon, H. (1959), \u201eTheories of decision making in economics and behavioural science\u201d, in: American Economic Review, Vol. 49, No. 3, S. 253\u2013283.","journal-title":"American Economic Review"},{"key":"84_CR11","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","volume":"185","author":"A. Tversky","year":"1974","unstructured":"Tversky, A. & Kahneman, D. (1974), \u201cJudgment under uncertainty: Heuristics and biases\u201d, in: Science 185, S. 1124\u20131131.","journal-title":"Science"},{"key":"84_CR12","doi-asserted-by":"crossref","unstructured":"Klein, C. & Martinez, M. (2009), Wirklichkeitserz\u00e4hlungen, Stuttgart.","DOI":"10.1007\/978-3-476-05228-5"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0084-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0084-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0084-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0084-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T11:00:24Z","timestamp":1592564424000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0084-0"}},"subtitle":["Zur Konstruktion informationellen Vertrauens"],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["84"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0084-0","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]}}}