{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T16:01:08Z","timestamp":1720713668845},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1007\/s11623-011-0150-7","type":"journal-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T14:19:56Z","timestamp":1314800396000},"source":"Crossref","is-referenced-by-count":2,"title":["Staatlicher Zugang zur digitalen Identit\u00e4t"],"prefix":"10.1007","volume":"35","author":[{"given":"Phillip W.","family":"Brunst","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,1]]},"reference":[{"key":"150_CR1","unstructured":"Adar, User 4XXXXX9: Anonymizing Query Logs, abrufbar unter: http:\/\/www.cond.org\/loganon.html ."},{"key":"150_CR2","unstructured":"Albrecht, JurPC 2011, Web-Dok. 59\/2011."},{"key":"150_CR3","unstructured":"B\u00e4umler, DuD 2003, 160 ff."},{"key":"150_CR4","unstructured":"Bohrer, MittBayNot 2005, 460 ff."},{"key":"150_CR5","unstructured":"Borchers, c\u2019t 2011, Heft 11, 78 ff."},{"key":"150_CR6","unstructured":"Borges, NJW 2010, 3334 ff."},{"key":"150_CR7","doi-asserted-by":"crossref","unstructured":"Brodowski, JR 2009, 402 ff.","DOI":"10.1515\/JURU.2009.402"},{"key":"150_CR8","unstructured":"Brunst, Anonymit\u00e4t im Internet. Rechtliche und tats\u00e4chliche Rahmenbedingungen, 2009."},{"key":"150_CR9","unstructured":"Buermeyer \/ B\u00e4cker, HRRS 2009, 433 ff."},{"key":"150_CR10","unstructured":"Kurz \/ Rieger, Stellungnahme des Chaos Computer Clubs zur Vorratsdatenspeicherung, abrufbar unter: http:\/\/213.73.89.124\/vds\/VDSfinal18.pdf ."},{"key":"150_CR11","unstructured":"Danezis \/ G\u00fcrses, Illusionen der Kontrolle. Ein kritischer Blick auf den technischen Datenschutz, in: Heinrich B\u00f6ll Stiftung (Hrsg.), #public_life. Digitale Intimit\u00e4t, die Privatsph\u00e4re und das Netz, S. 87\u201397, 2011."},{"key":"150_CR12","unstructured":"Fritsch \/ Ro\u00dfnagel \/ Schwenke \/ Stadler, DuD 2005, 592 ff."},{"key":"150_CR13","unstructured":"Gercke \/ Brunst, Praxishandbuch Internetstrafrecht, 2009."},{"key":"150_CR14","doi-asserted-by":"crossref","unstructured":"Gonzalez \/ Hidalgo \/ Barabasi, Nature 2008, 779 ff.","DOI":"10.1038\/nature06958"},{"key":"150_CR15","unstructured":"Kudlich, HFR 2007, 202 ff."},{"key":"150_CR16","unstructured":"Noller, Post-Privacy \u2014 ist das Zeitalter des Datenschutzes endg\u00fcltig vorbei?, abrufbar unter: http:\/\/www.predictive-behavioral-targeting.de\/2010\/02\/post-privacy-istdas-zeitalter-des-datenschutzes-endgultigvorbei\/ ."},{"key":"150_CR17","unstructured":"O\u2019Reilly, Facebook\u2019s face recognition strategy may be just the ticket, abrufbar unter: http:\/\/radar.oreilly.com\/2011\/06\/facebookface-recognition.html ."},{"key":"150_CR18","doi-asserted-by":"crossref","unstructured":"Pohl, DuD 2007, 684-688 ff.","DOI":"10.1007\/s11623-007-0224-8"},{"key":"150_CR19","unstructured":"Polenz, MMR 2010, 671 ff."},{"key":"150_CR20","unstructured":"Prantl, SZ 2011, 14.06.2011, 5 ff."},{"key":"150_CR21","unstructured":"Ro\u00dfnagel, NJW 2011, 1473 ff."},{"key":"150_CR22","unstructured":"Spoenle, jurisPR-ITR 2010, 6\/2010 Anm. 5."},{"key":"150_CR23","unstructured":"Rei\u00dfmann, \u201cPrivatsph\u00e4re ist sowas von Eighties\u201d. Interview mit Julia Schramm, abrufbar unter: http:\/\/www.spiegel.de\/netzwelt\/netzpolitik\/0,1518,749831,00.html ."},{"key":"150_CR24","unstructured":"Warnecke, MMR 2010, 227 ff."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0150-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0150-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0150-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0150-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T13:16:59Z","timestamp":1560518219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0150-7"}},"subtitle":["Erosion der Anonymit\u00e4t im Internet"],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":24,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2011,9]]}},"alternative-id":["150"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0150-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9]]},"article-number":"618"}}