{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:56:49Z","timestamp":1648871809790},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2016,7,22]],"date-time":"2016-07-22T00:00:00Z","timestamp":1469145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s11623-016-0650-6","type":"journal-article","created":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T20:26:47Z","timestamp":1469046407000},"page":"523-527","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Einbettung von Drittinhalten im Web"],"prefix":"10.1007","volume":"40","author":[{"given":"Tim","family":"Wambach","sequence":"first","affiliation":[]},{"given":"Laura","family":"Schulte","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Knorr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,22]]},"reference":[{"key":"650_CR1","volume-title":"Evercookie","author":"S. Kamar","year":"2016","unstructured":"S. Kamar: Evercookie, http:\/\/samy.pl\/evercookie\/, abgerufen am 22.05.2016."},{"key":"650_CR2","volume-title":"Bayesian: Imputation for Anonymous Visits in CRM Data","author":"J. Novak","year":"2015","unstructured":"J. Novak, E. Feit, S. Jensen, E. Bradlow: Bayesian: Imputation for Anonymous Visits in CRM Data (2015)."},{"key":"650_CR3","first-page":"413","volume-title":"IEEE Symposium on Security and Privacy","author":"J. R. Mayer","year":"2012","unstructured":"J. R. Mayer, J. C. Mitchell: Third-Party Web Tracking: Policy and Technology. IEEE Symposium on Security and Privacy 2012: 413\u2013427."},{"key":"650_CR4","volume-title":"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites","author":"T. Libert","year":"2015","unstructured":"T. Libert: Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites. CoRR abs\/1511.00619 (2015)."},{"issue":"3","key":"650_CR5","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/2658983","volume":"58","author":"T. Libert","year":"2015","unstructured":"T. Libert: Privacy implications of health information seeking on the web. Commun. ACM 58(3): 68\u201377 (2015).","journal-title":"Commun. ACM"},{"key":"650_CR6","doi-asserted-by":"crossref","first-page":"138","DOI":"10.5220\/0005741301380145","volume-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","author":"T. Wambach","year":"2016","unstructured":"T. Wambach, K. Br\u00e4unlich (2016): Retrospective Study of Third-party Web Tracking. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy: 138\u2013145."},{"key":"650_CR7","volume-title":"Technische Pr\u00fcfung der Datenschutzerkl\u00e4rungen auf deutschen Hochschulwebseiten","author":"T. Wambach","year":"2015","unstructured":"T. Wambach, K. Knorr: Technische Pr\u00fcfung der Datenschutzerkl\u00e4rungen auf deutschen Hochschulwebseiten, Information Security Day (ISD) W\u00fcrzburg\u2013FHWS (2015)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0650-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-016-0650-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0650-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T14:51:53Z","timestamp":1498315913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-016-0650-6"}},"subtitle":["Eine technische und rechtliche Betrachtung"],"short-title":[],"issued":{"date-parts":[[2016,7,22]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["650"],"URL":"https:\/\/doi.org\/10.1007\/s11623-016-0650-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,22]]}}}