{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,24]],"date-time":"2024-03-24T04:22:17Z","timestamp":1711254137686},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11623-014-0180-z","type":"journal-article","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T15:22:29Z","timestamp":1409066549000},"page":"536-544","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Mehrseitige, barrierefreie Sicherheit intelligenter Messsysteme"],"prefix":"10.1007","volume":"38","author":[{"given":"Gunnar","family":"Stevens","sequence":"first","affiliation":[]},{"given":"Timo","family":"Jakobi","sequence":"additional","affiliation":[]},{"given":"Kai-Oliver","family":"Detken","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,27]]},"reference":[{"key":"180_CR1","volume-title":"Evaluationsmethoden f\u00fcr benutzerzentrierte IT-Sicherheit","author":"O Kroll-Peters","year":"2010","unstructured":"O. Kroll-Peters, Evaluationsmethoden f\u00fcr benutzerzentrierte IT-Sicherheit, Berlin Institute of Technology, 2010."},{"key":"180_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-2440-0","volume-title":"Smart Meter Rollout: Praxisleitfaden zur Ausbringung intelligenter Z\u00e4hler","author":"C Aichele","year":"2013","unstructured":"C. Aichele, O. D. Doleski, M. Arzberger, S. Dieper, J. Dirnberger, H. Dornseifer, B. Fey, und R. Frank, Smart Meter Rollout: Praxisleitfaden zur Ausbringung intelligenter Z\u00e4hler. Springer, 2013."},{"key":"180_CR3","volume-title":"Smart metering","author":"M Wissner","year":"2009","unstructured":"M. Wissner, Smart metering. WIK, Wiss. Inst. f\u00fcr Infrastruktur und Kommunikationsdienste, 2009."},{"issue":"8","key":"180_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s11623-011-0133-8","volume":"35","author":"C Eckert","year":"2011","unstructured":"C. Eckert und C. Krau Sicherheit im Smart Grid, Datenschutz und Datensicherheit \u2014 DuD, Bd. 35, Nr. 8, S. 535\u2013541, 2011.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"key":"180_CR5","volume-title":"Securing the smart grid: next generation power grid security","author":"T F und","year":"2010","unstructured":"T. Flick und J. Morehouse, Securing the smart grid: next generation power grid security. Elsevier, 2010."},{"key":"180_CR6","volume-title":"Sicherheit im Smart Grid","author":"K J M\u00fcller","year":"2011","unstructured":"K. J. M\u00fcller, Sicherheit im Smart Grid, 2011."},{"issue":"8","key":"180_CR7","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/s11623-011-0132-9","volume":"35","author":"T Jeske","year":"2011","unstructured":"T. Jeske, Datenschutzfreundliches smart metering, Datenschutz und Datensicherheit \u2014 DuD, Bd. 35, Nr. 8, S. 530\u2013534, 2011.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"6","key":"180_CR8","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11623-010-0107-2","volume":"34","author":"K J M\u00fcller","year":"2010","unstructured":"K. J. M\u00fcller, Gewinnung von Verhaltensprofilen am intelligenten Stromz\u00e4hler, Datenschutz und Datensicherheit - DuD, Bd. 34, Nr. 6, S. 359\u2013364, 2010.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"180_CR9","first-page":"1193","volume-title":"Cultivating energy literacy: results from a longitudinal living lab study of a home energy management system","author":"T Schwartz","year":"2013","unstructured":"T. Schwartz, S. Denef, G. Stevens, L. Ramirez, und V. Wulf, Cultivating energy literacy: results from a longitudinal living lab study of a home energy management system, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2013, S. 1193\u20131202."},{"issue":"2","key":"180_CR10","first-page":"12","volume":"20","author":"T Schwartz","year":"2013","unstructured":"T. Schwartz, G. Stevens, L. Ramirez, und V. Wulf, Uncovering practices of making energy consumption accountable: A phenomenological inquiry, ACM Trans. Comput.-Hum. Interact. TOCHI, Bd. 20, Nr. 2, S. 12, 2013.","journal-title":"ACM Trans. Comput.-Hum. Interact. TOCHI"},{"issue":"8","key":"180_CR11","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s11623-011-0127-6","volume":"35","author":"D F und","year":"2011","unstructured":"D. Fox und K. J. M\u00fcller, Viele Daten um Nichts, Datenschutz und Datensicherheit \u2014 DuD, Bd. 35, Nr. 8, S. 515\u2013516, Aug. 2011.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"1","key":"180_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s11623-012-0006-9","volume":"36","author":"G H und","year":"2012","unstructured":"G. Hornung und K. Fuchs, Nutzerdaten im Smart Grid\u2014zur Notwendigkeit einer differenzierten grundrechtlichen Bewertung, Datenschutz und Datensicherheit \u2014 DuD, Bd. 36, Nr. 1, S. 20\u201325, 2012.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"6","key":"180_CR13","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s11623-012-0153-z","volume":"36","author":"M Rost","year":"2012","unstructured":"M. Rost, Standardisierte Datenschutzmodellierung, Datenschutz und Datensicherheit \u2014 DuD, Bd. 36, Nr. 6, S. 433\u2013438, 2012.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"6","key":"180_CR14","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s11623-010-0108-1","volume":"34","author":"M Karg","year":"2010","unstructured":"M. Karg, Datenschutzrechtliche Rahmenbedingungen beim Einsatz intelligenter Z\u00e4hler, Datenschutz und Datensicherheit \u2014 DuD, Bd. 34, Nr. 6, S. 365\u2013372, 2010.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"8","key":"180_CR15","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/s11623-011-0134-7","volume":"35","author":"D Laupichler","year":"2011","unstructured":"D. Laupichler, S. Vollmer, H. Bast, und M. Intemann, Das BSI-Schutzprofil: Anforderungen an den Datenschutz und die Datensicherheit f\u00fcr Smart Metering Systeme, Datenschutz und Datensicherheit \u2014 DuD, Bd. 35, Nr. 8, S. 542\u2013546, 2011.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"3","key":"180_CR16","first-page":"216","volume":"36","author":"H Reimer","year":"2012","unstructured":"H. Reimer, Smart Meter\u2014Smarter Datenschutz in intelligenten Stromnetzen, Datenschutz und Datensicherheit \u2014 DuD, Bd. 36, Nr. 3, S. 216\u2013216, 2012.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"6","key":"180_CR17","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/s11623-010-0115-2","volume":"34","author":"D Fox","year":"2010","unstructured":"D. Fox, Smart meter, Datenschutz und Datensicherheit \u2014 DuD, Bd. 34, Nr. 6, S. 408\u2013408, 2010.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"6","key":"180_CR18","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11623-010-0109-0","volume":"34","author":"A R und","year":"2010","unstructured":"A. Ro\u00dfnagel und S. Jandt, Datenschutzkonformes Energieinformationsnetz, Datenschutz und Datensicherheit \u2014 DuD, Bd. 34, Nr. 6, S. 373\u2013378, 2010.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"key":"180_CR19","first-page":"27","volume-title":"Proceedings of the 1996 workshop on New security paradigms","author":"M E Z und","year":"1996","unstructured":"M. E. Zurko und R. T. Simon, User-centered security, in Proceedings of the 1996 workshop on New security paradigms, 1996, S. 27\u201333."},{"key":"180_CR20","first-page":"16","volume":"99","author":"A W und","year":"1999","unstructured":"A. Whitten und J. D. Tygar, Why Johnny can\u2019t encrypt: A usability evaluation of PGP 5.0, in Proceedings of the 8th USENIX Security Symposium, 1999, Bd. 99, S. 16.","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"180_CR21","volume-title":"Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilit\u00e4t der Kommunikationseinheit eines intelligenten Messsystems","author":"BSI","year":"2013","unstructured":"BSI, Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilit\u00e4t der Kommunikationseinheit eines intelligenten Messsystems, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Bonn, 2013."},{"key":"180_CR22","volume-title":"Technische Richtlinie BSI TR-03109-2 Smart Meter Gateway Anforderungen an die Funktionalit\u00e4t und Interoperabilit\u00e4t des Sicherheitsmoduls","author":"BSI","year":"2013","unstructured":"BSI, Technische Richtlinie BSI TR-03109-2 Smart Meter Gateway Anforderungen an die Funktionalit\u00e4t und Interoperabilit\u00e4t des Sicherheitsmoduls, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Bonn, 2013."},{"key":"180_CR23","volume-title":"Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)","author":"BSI","year":"2013","unstructured":"BSI, Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP), Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Bonn, 2013."},{"key":"180_CR24","volume-title":"Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)","author":"BSI","year":"2013","unstructured":"BSI, Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Bonn, 2013."},{"key":"180_CR25","unstructured":"Physikalisch-Technische Bundesanstalt, PTB-A 50.8. Nov. 2013."},{"issue":"8","key":"180_CR26","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s11623-011-0135-6","volume":"35","author":"K J M\u00fcller","year":"2011","unstructured":"K. J. M\u00fcller, Verordnete Sicherheit\u2014das Schutzprofil f\u00fcr das Smart Metering Gateway, Datenschutz und Datensicherheit \u2014 DuD, Bd. 35, Nr. 8, S. 547\u2013551, 2011.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"10","key":"180_CR27","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1007\/s11623-012-0243-y","volume":"36","author":"C W und","year":"2012","unstructured":"C. Wass und T. Kurz, Digitale Hilfsmittel f\u00fcr mehr Transparenz bei der Verarbeitung personenbezogener Daten, Datenschutz und Datensicherheit \u2014 DuD, Bd. 36, Nr. 10, S. 748\u2013752, 2012.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"issue":"5","key":"180_CR28","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s11623-011-0085-z","volume":"35","author":"M Rost","year":"2011","unstructured":"M. Rost, Datenschutz in 3D, Datenschutz und Datensicherheit \u2014 DuD, Bd. 35, Nr. 5, S. 351\u2013354, 2011.","journal-title":"Datenschutz und Datensicherheit \u2014 DuD"},{"key":"180_CR29","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-322-84953-3_3","volume-title":"Mehrseitige Sicherheit in offenen Netzen","author":"A Pfitzmann","year":"2000","unstructured":"A. Pfitzmann, A. Schill, A. Westfeld, und G. Wolf, Einleitung, in Mehrseitige Sicherheit in offenen Netzen, Vieweg+Teubner Verlag, 2000, S. 5\u201314."},{"key":"180_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-89553-0","volume-title":"Konfliktmanagement bei Groupware","author":"V Wulf","year":"1997","unstructured":"V. Wulf, Konfliktmanagement bei Groupware. Springer, 1997."},{"key":"180_CR31","first-page":"17","volume-title":"Context Conscious. Act. Theory Hum.-Comput. Interact.","author":"K Kuutti","year":"1996","unstructured":"K. Kuutti, Activity theory as a potential framework for human-computer interaction research, Context Conscious. Act. Theory Hum.-Comput. Interact., S. 17\u201344, 1996."},{"key":"180_CR32","doi-asserted-by":"publisher","DOI":"10.14361\/9783839405703","volume-title":"Subjekt","author":"A Reckwitz","year":"2008","unstructured":"A. Reckwitz, Subjekt. transcript Verlag, 2008."},{"issue":"5","key":"180_CR33","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s00287-013-0724-x","volume":"36","author":"F Kerkmann","year":"2013","unstructured":"F. Kerkmann, Web Accessibility, Inform.-Spektrum, Bd. 36, Nr. 5, S. 455\u2013460, Okt. 2013.","journal-title":"Inform.-Spektrum"},{"key":"180_CR34","volume-title":"Orientierungshilfe datenschutzgerechtes Smart Metering","author":"BFDI","year":"2012","unstructured":"BFDI, Orientierungshilfe datenschutzgerechtes Smart Metering, 2012. Verf\u00fcgbar unter: http:\/\/www.bfdi.bund.de\/SharedDocsPublikationen\/Entschliessungssammlung\/DSBundLaender\/Orientierungshilfe_SmartMeter.html?nn=408920 . [Zugegriffen: 07. Feb. 2014]."},{"key":"180_CR35","first-page":"B1","volume":"18","author":"R Petrlic","year":"2010","unstructured":"R. Petrlic, A privacy-preserving concept for smart grids, Sicherh. Vernetzten Syst., Bd. 18, S. B1\u2013B14, 2010.","journal-title":"Sicherh. Vernetzten Syst."},{"key":"180_CR36","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1145\/1978942.1979252","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Y A Strengers","year":"2011","unstructured":"Y. A. Strengers, Designing eco-feedback systems for everyday life, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011, S. 2135\u20132144."},{"key":"180_CR37","first-page":"2006","volume":"486","author":"S Darby","year":"2006","unstructured":"S. Darby, The effectiveness of feedback on energy consumption, Rev. DEFRA Lit. Metering Billing Direct Disp., Bd. 486, S. 2006, 2006.","journal-title":"Rev. DEFRA Lit. Metering Billing Direct Disp."},{"key":"180_CR38","volume-title":"Laudatio BigBrother Award 2008 in der Kategorie \u201aTechnik\u2018","author":"R Tangens","year":"2008","unstructured":"R. Tangens, Laudatio BigBrother Award 2008 in der Kategorie \u201aTechnik\u2018, 2008. Verf\u00fcgbar unter: http:\/\/www.bigbrotherawards.de\/2008\/.tec?set_language=de . [Zugegriffen: 10. M\u00e4rz 2014]."},{"key":"180_CR39","first-page":"116","volume-title":"Econ. J.","author":"W B Arthur","year":"1989","unstructured":"W. B. Arthur, Competing technologies, increasing returns, and lock-in by historical events, Econ. J., S. 116\u2013131, 1989."},{"key":"180_CR40","volume-title":"Big Data: A Revolution that Will Transform how We Live, Work, and Think","author":"V M-S und","year":"2013","unstructured":"V. Mayer-Sch\u00f6nberger und K. Cukier, Big Data: A Revolution that Will Transform how We Live, Work, and Think. Houghton Mifflin Harcourt, 2013."},{"key":"180_CR41","first-page":"488","volume-title":"Q. J. Econ.","author":"G A Akerlof","year":"1970","unstructured":"G. A. Akerlof, The market for? lemons\u2019: Quality uncertainty and the market mechanism, Q. J. Econ., S. 488\u2013500, 1970."},{"issue":"6","key":"180_CR42","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s11623-012-0155-x","volume":"36","author":"S Gerhager","year":"2012","unstructured":"S. Gerhager, Informationssicherheit im zuk\u00fcnftigen Smart Grid, Datenschutz Datensicherheit-DuD, Bd. 36, Nr. 6, S. 445\u2013451, 2012.","journal-title":"Datenschutz Datensicherheit-DuD"},{"issue":"5","key":"180_CR43","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.intcom.2005.03.002","volume":"17","author":"J A und","year":"2005","unstructured":"J. Abascal und C. Nicolle, Moving towards inclusive design guidelines for socially and ethically aware HCI, Interact. Comput., Bd. 17, Nr. 5, S. 484\u2013505, 2005.","journal-title":"Interact. Comput."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0180-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0180-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0180-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0180-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T15:53:03Z","timestamp":1650037983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0180-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["180"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0180-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}