{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T16:16:40Z","timestamp":1674490600164},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,6,1]],"date-time":"2011-06-01T00:00:00Z","timestamp":1306886400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s11623-011-0099-6","type":"journal-article","created":{"date-parts":[[2011,6,10]],"date-time":"2011-06-10T09:13:52Z","timestamp":1307697232000},"page":"403-407","source":"Crossref","is-referenced-by-count":3,"title":["Grenzen des \u201edigitalen Radiergummis\u201c"],"prefix":"10.1007","volume":"35","author":[{"given":"Hannes","family":"Federrath","sequence":"first","affiliation":[]},{"given":"Karl-Peter","family":"Fuchs","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Herrmann","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Maier","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Scheuer","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,11]]},"reference":[{"key":"99_CR1","unstructured":"FOCUS Online: Innenminister de Maizi\u00e8re will \u201edigitalen Radiergummi\u201c, 22.06.2010. http:\/\/www.focus.de\/digital\/digital-news\/internetinnenminister-de-maiziere-will-digitalen-radiergummi_aid_522418.html"},{"key":"99_CR2","doi-asserted-by":"crossref","unstructured":"Viktor Mayer-Schoenberger: Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing. Working Paper, John F. Kennedy School of Government, Harvard University, 2007.","DOI":"10.2139\/ssrn.976541"},{"key":"99_CR3","unstructured":"Viktor Mayer-Schoenberger: Delete: die Tugend des Vergessens in digitalen Zeiten. Berlin University Press, 2010."},{"key":"99_CR4","unstructured":"Lawrence Lessig: Code: And Other Laws of Cyberspace. Version 2.0, New York, Basic Books, 2006."},{"key":"99_CR5","unstructured":"Alessandro Acquisti, Leslie John, George Loewenstein: What is privacy worth? In: Privacy Papers for Policy Makers, 2009, S. 5\u20137."},{"key":"99_CR6","unstructured":"Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy: Vanish: Increasing Data Privacy with Self-Destructing Data. In: Proceedings of the USENIX Security Symposium, Berkeley, USENIX Association, 2009, S. 299\u2013316."},{"key":"99_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-05437-2_2","volume-title":"iNet-Sec 2009 \u2014 Open Research Problems in Network Security, IFIP AICT 309","author":"C. J. Hernandez-Castro","year":"2009","unstructured":"Carlos Javier Hernandez-Castro, Arturo Ribagorda: Remotely Telling Humans and Computers Apart: An Unsolved Problem. In: iNet-Sec 2009 \u2014 Open Research Problems in Network Security, IFIP AICT 309, Berlin, Springer, 2009, S. 9\u201326."},{"key":"99_CR8","doi-asserted-by":"crossref","unstructured":"Bradley T. Tennis: Privacy and Identity in a Networked World. In: Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices, Hershey, IGI Global, 2011, S. 1\u201318.","DOI":"10.4018\/978-1-60960-083-9.ch001"},{"key":"99_CR9","unstructured":"Peter Welchering: Was im Netz steht, bleibt \u2014 verschl\u00fcsselt oder nicht. In: Frankfurter Allgemeine Zeitung, 18.01.2011, Nr. 14, S. T1."},{"key":"99_CR10","first-page":"215","volume-title":"\u00d6konomie der Musikindustrie","author":"W. Buhse","year":"2008","unstructured":"Willms Buhse, Dirk G\u00fcnnewig: Digital Rights Management. In: \u00d6konomie der Musikindustrie, 2. Auflage, Wiesbaden, Deutscher Universit\u00e4tsverlag, 2008, S. 215\u2013228.","edition":"2. Auflage"},{"key":"99_CR11","unstructured":"Varinia Bernau: Dolmetscher Digitaler Radiergummi. In: S\u00fcddeutsche Zeitung, 09.02.2011, S. 24."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0099-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0099-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0099-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0099-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T16:05:13Z","timestamp":1560269113000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0099-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":11,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["99"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0099-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6]]}}}