{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T07:18:11Z","timestamp":1697267891496},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2013,6,14]],"date-time":"2013-06-14T00:00:00Z","timestamp":1371168000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1007\/s11623-013-0173-3","type":"journal-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T10:03:38Z","timestamp":1371117818000},"page":"434-439","source":"Crossref","is-referenced-by-count":5,"title":["Crowdsourcing and cloudsourcing CCTV surveillance"],"prefix":"10.1007","volume":"37","author":[{"given":"Burkhard","family":"Schafer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,14]]},"reference":[{"key":"173_CR1","first-page":"29","volume-title":"Police Review","author":"M Clarke","year":"1994","unstructured":"Clarke, M. (1994), \u201cBlind eye on the street?\u201d, Police Review, August, pp.29\u201339."},{"key":"173_CR2","doi-asserted-by":"publisher","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"L Cohen","year":"1979","unstructured":"Cohen, L., Felson, M. (1979), \u201cSocial change and crime rate trends: a routine activities approach\u201d, American Sociological Review, Vol. 44 pp.588\u2013608","journal-title":"American Sociological Review"},{"key":"173_CR3","first-page":"417","volume-title":"Proc. IEEE IDAACS","author":"A C Davies","year":"2005","unstructured":"Davies, A. C., & Velastin, S. A. (2005). A progress review of intelligent CCTV surveillance systems. Proc. IEEE IDAACS, 417\u2013423; for a legal analysis see also Gerrit Hornung und Monika Desoi, \u201eSmart Cameras\u201c und automatische Verhaltensanalyse, Kommunikation und Recht, 153\u2013158, M\u00e4rz 2011."},{"key":"173_CR4","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1348\/000712600161907","volume":"91","author":"G Davies","year":"2000","unstructured":"Davies, G., Thasen, S. (2000), \u201cClosed circuit television: how effective an identification air?\u201d, British Journal of Psychology, Vol. 91 pp.411\u2013426","journal-title":"British Journal of Psychology"},{"key":"173_CR5","volume-title":"Real Time Computer Surveillance for Crime Detection","author":"L Davis","year":"2001","unstructured":"Davis, L. (2001), Real Time Computer Surveillance for Crime Detection, National Institute of Justice, Washington, DC"},{"issue":"1","key":"173_CR6","first-page":"37","volume":"28","author":"N Fyfe","year":"1996","unstructured":"Fyfe, N. (1996), \u201cCity watching: closed circuit television surveillance in public spaces\u201d, Area, Vol. 28 No.1, pp.37\u201346.","journal-title":"Area"},{"key":"173_CR7","volume-title":"A Special Constable: a study of the police reserve","author":"M L Gill","year":"1990","unstructured":"Gill, M. L., & Mawby, R. I. (1990). A Special Constable: a study of the police reserve. Aldershot: Avebury"},{"issue":"4","key":"173_CR8","first-page":"283","volume":"10","author":"N Groombridge","year":"1994","unstructured":"Groombridge, N., Murji, K. (1994), \u201cAs easy as AB and CCTV\u201d, Policing, Vol. 10 No.4, pp.283\u2013290","journal-title":"Policing"},{"key":"173_CR9","volume-title":"Police Powers in Canada: The Evolution and Practice of Authority","author":"D J Guth","year":"1994","unstructured":"Guth, D J. (1994). \u201cThe Traditional Common Law Constable, 1235\u20131829: From Bracton to the Fieldings to Canada\u201d. In Macleod, R.C.; Schneiderman, David. Police Powers in Canada: The Evolution and Practice of Authority. Toronto: University of Toronto Press"},{"key":"173_CR10","volume-title":"Wertsch\u00f6pfung durch webbasierte kollektive Intelligenz","author":"H Ickler","year":"2012","unstructured":"Ickler, H. (2012). Wertsch\u00f6pfung durch webbasierte kollektive Intelligenz. BoD-Books on Demand."},{"key":"173_CR11","volume-title":"In Proceeding of the 16th International Academic MindTrek Conference (MindTrek\u2019 12)","author":"H Kai","year":"2012","unstructured":"Kai H. and Juho H. (2012) Defining gamification: a service marketing perspective. In Proceeding of the 16th International Academic MindTrek Conference (MindTrek\u2019 12). ACM, New York, NY, USA"},{"key":"173_CR12","first-page":"1","volume-title":"Lunar and Planetary Science","author":"B Kanefsky","year":"2001","unstructured":"Kanefsky, Bob, Barlow, N. and Gulick, V. (2001) \u201cCan distributed volunteers accomplish massive data analysis tasks.\u201d Lunar and Planetary Science 1"},{"key":"173_CR13","volume-title":"Symposium on Usable Privacy and Security (SOUPS)(Redmond, WA","author":"P G Kelley","year":"2010","unstructured":"Kelley, P. G. (2010). Conducting usable privacy & security studies with amazon\u2019s mechanical turk. In Symposium on Usable Privacy and Security (SOUPS)(Redmond, WA."},{"key":"173_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2390803.2390817","volume-title":"In Proceedings of the ACM multimedia 2012 workshop on Crowdsourcing for multimedia","author":"P Korshunov","year":"2012","unstructured":"Korshunov, P., Cai, S., & Ebrahimi, T. (2012) Crowdsourcing approach for evaluation of privacy filters in video surveillance. In Proceedings of the ACM multimedia 2012 workshop on Crowdsourcing for multimedia (pp. 35\u201340). ACM."},{"key":"173_CR15","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1017\/S0020589300058656","volume":"45.01","author":"P Legrand","year":"1996","unstructured":"Legrand, P. \u201cEuropean legal systems are not converging.\u201d International and Comparative Law Quarterly 45.01 (1996): 52\u201381","journal-title":"International and Comparative Law Quarterly"},{"key":"173_CR16","volume-title":"Geoforum","author":"T Monahan","year":"2013","unstructured":"Monahan, T, and Mokos, JT, (2013). \u201cCrowdsourcing urban surveillance: The development of homeland security markets for environmental sensor networks.\u201d Geoforum"},{"key":"173_CR17","first-page":"210","volume-title":"The Maximum Surveillance Society: The Rise of CCTV","author":"C Norris","year":"1999","unstructured":"Norris, C., Armstrong, G. (1999), The Maximum Surveillance Society: The Rise of CCTV, Berg, Oxford, p. 210\u2013211"},{"issue":"11","key":"173_CR18","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s11623-008-0172-y","volume":"32","author":"M-T Tinnefeld","year":"2008","unstructured":"Tinnefeld, M-T.\/ Rauhofer, J. \u201aWhistleblower: Verantwortliche Mitarbeiter oder Denunzianten? Fragen im Feld von Ethikrichtlinien, des Datenschutzes und der Mitbestimmung\u201c (2008) Datenschutz und Datensicherheit Vol. 32, No. 11, pp. 717\u2013723","journal-title":"Datenschutz und Datensicherheit"},{"key":"173_CR19","unstructured":"Rawlings, P: Policing before the Police. In T. Newborn, Handbook of Policing, Wilan Publishing, Cullompton, (2009) p. 47\u201372"},{"key":"173_CR20","unstructured":"Schafer, B. \u201aSchlafwandelnd in den \u00fcberwachungsstaat? \u2018(2009) Datenschutz und Datensicherheit Vol. 8 pp 483\u2013489"},{"key":"173_CR21","unstructured":"Schafer, B. \u2018All changed, changed utterly? Privacy protection in post-Labour Britain\u2019 (2011) Datenschutz und Datensicherheit Vol 35 pp.634\u2013638"},{"key":"173_CR22","first-page":"129","volume-title":"Transcarceration: Essays in the Sociology of Social Control","author":"N South","year":"1987","unstructured":"South, N. (1987), \u201cThe security and surveillance of the environment\u201d, in Lowman, J., Menzies, R., Pays, T. (Eds), Transcarceration: Essays in the Sociology of Social Control, Gower, Aldershot, pp.129\u201352."},{"key":"173_CR23","first-page":"78","volume":"13","author":"R Surette","year":"1985","unstructured":"Surette, R. (1985), \u201cVideo street patrol: media technology and street crime\u201d, Journal of Police Science and Administration, Vol. 13 pp.78\u201385","journal-title":"Journal of Police Science and Administration"},{"key":"173_CR24","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1108\/13639510510581039","volume":"28","author":"R Surette","year":"2005","unstructured":"Surette, R. (2005) \u201cThe thinking eye: Pros and cons of second generation CCTV surveillance systems\u201d, Policing: An International Journal of Police Strategies & Management, Vol. 28 Iss: 1, pp.152\u2013173","journal-title":"Policing: An International Journal of Police Strategies & Management"},{"key":"173_CR25","first-page":"127","volume-title":"7th Int. Conf. on Road Traffic Monitoring and Control, London","author":"J H Velastin","year":"1994","unstructured":"Velastin, J. H. Yin, A. C. Davies, M. A. Vicencio-Silva, R. E. Allsop A. Penn, \u201cAutomated measurement of crowd density and motion using image processing,\u201d 7th Int. Conf. on Road Traffic Monitoring and Control, London, 1994, pp. 127\u2013132"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0173-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0173-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0173-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0173-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:36Z","timestamp":1559398956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0173-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,14]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["173"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0173-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,14]]}}}