{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:51:59Z","timestamp":1752360719787},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T00:00:00Z","timestamp":1328054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s11623-012-0023-8","type":"journal-article","created":{"date-parts":[[2012,2,2]],"date-time":"2012-02-02T09:21:51Z","timestamp":1328174511000},"page":"88-91","source":"Crossref","is-referenced-by-count":6,"title":["Spuren im Netz"],"prefix":"10.1007","volume":"36","author":[{"given":"R\u00fcdiger","family":"Grimm","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,3]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"R. Grimm\/ D. P\u00e4hler: E-Mail-Forensik, DuD 2010, S. 86\u201389.","DOI":"10.1007\/s11623-010-0041-3"},{"key":"23_CR2","unstructured":"Marit K\u00f6hntopp\/ Kristian K\u00f6hntopp: Datenspuren im Internet; Computer und Recht (CR) 2000, S. 248\u2013257."},{"key":"23_CR3","doi-asserted-by":"publisher","DOI":"10.1524\/9783486593334","volume-title":"Data Mining: Verfahren, Prozesse, Anwendungsarchitektur","author":"H. Petersohn","year":"2005","unstructured":"Helge Petersohn: Data Mining: Verfahren, Prozesse, Anwendungsarchitektur, Oldenbourg Verlag, M\u00fcnchen 2005."},{"key":"23_CR4","unstructured":"ZEIT Politik. Heinrich Wefing: Ich sehe was, was Du nicht siehst. Darf Google mehr wissen als der Staat? DIE ZEIT Nr. 11, 11.3.2010, Politik, S. 3."},{"key":"23_CR5","unstructured":"G. Wondracek\/ T. Holz\/ E. Kirda\/ C. Kruegel: A Practical Attack to De-Anonymize Social Network Users, Technical Report TR-iSecLab-0110-001."},{"key":"23_CR6","unstructured":"M. Wichert: Web-Cookies \u2014 Mythos und Wirklichkeit, DuD 1998, S 273\u2013276."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0023-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0023-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0023-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0023-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T00:49:00Z","timestamp":1561250940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0023-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2]]},"references-count":6,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0023-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2]]}}}