{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T12:52:38Z","timestamp":1677761558812},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11623-018-1024-z","type":"journal-article","created":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T07:01:23Z","timestamp":1541833283000},"page":"680-685","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Nutzerwahrnehmung der Ende-zu-Ende-Verschl\u00fcsselung in WhatsApp"],"prefix":"10.1007","volume":"42","author":[{"given":"Nina","family":"Gerber","sequence":"first","affiliation":[]},{"given":"Verena","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"Birgit","family":"Henhapl","sequence":"additional","affiliation":[]},{"given":"Sinem","family":"Emer\u00f6z","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Hilt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,10]]},"reference":[{"key":"1024_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65","volume-title":"Obstacles to the Adoption of Secure Communication Tools","author":"R. Abu-Salma","year":"2017","unstructured":"Abu-Salma, R., Sasse, M. A., Bonneau, J., Danilova, A., Naiakshina, A. and Smith, M. (2017). \u201cObstacles to the Adoption of Secure Communication Tools\u201d. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2017). Washington, DC: IEEE Computer Society, pp. 137\u2013153."},{"key":"1024_CR2","volume-title":"Proceedings of the Eleventh Symposium on Usable Privacy and Security (SOUPS 2015)","author":"E. Atwater","year":"2015","unstructured":"Atwater, E., Bocovich, C., Hengartner, U., Lank, E. and Goldberg, I. (2015). \u201cLeading Johnny to Water: Designing for Usability and Trust.\u201d In: Proceedings of the Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). Ottawa: USENIX Association, pp. 69\u201388. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/atwater."},{"key":"1024_CR3","volume-title":"Facebook to Acquire WhatsApp","author":"Facebook Inc.","year":"2014","unstructured":"Facebook Inc. (2014). Facebook to Acquire WhatsApp. URL: \n                    https:\/\/doi.org\/newsroom.fb.com\/news\/2014\/02\/facebook-to-acquire-whatsapp\n                    \n                   (abgerufen am 30.05.2017)."},{"key":"1024_CR4","volume-title":"Echos of History: Understanding German Data Protection","author":"A. Freude","year":"2016","unstructured":"Freude, A. and Freude, T. (2016). Echos of History: Understanding German Data Protection. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/www.bfna.org\/publication\/newpolitik\/echos-of-history-understanding-german-data-protection\n                    \n                  (abgerufen am 25.08.2017)."},{"key":"1024_CR5","volume-title":"Poster vorgestellt bei: The First European Symposium on Security and Privacy","author":"A. Naiakshina","year":"2016","unstructured":"Naiakshina, A., Danilova, A., Dechand, S., Krol, K., Sasse, A. and Smith, M. (2016). \u201cMental Models\u2013User understanding of messaging and encryption.\u201d Poster vorgestellt bei: The First European Symposium on Security and Privacy (Euro S&P 2016)."},{"key":"1024_CR6","volume-title":"Open Whisper Systems","author":"Open Whisper Systems 2013\u20132016","year":"2016","unstructured":"Open Whisper Systems 2013\u20132016 (2016). Open Whisper Systems. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/whispersystems.org\n                    \n                   (abgerufen am 30.05.2017)."},{"key":"1024_CR7","volume-title":"Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS 2013)","author":"S. Ruoti","year":"2013","unstructured":"Ruoti, S., Kim, N, Burgon, B., Van Der Horst, T. and K. Seamons. (2013). \u201cConfused Johnny: When Automatic Encryption Leads to Confusion and Mistakes.\u201d In: Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS 2013). New York: ACM, pp. 51\u201369."},{"key":"1024_CR8","volume-title":"WhatsApp accounts almost completely unprotected","author":"The H Security","year":"2012","unstructured":"The H Security (2012). WhatsApp accounts almost completely unprotected. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/www.h-online.com\/security\/news\/item\/WhatsApp-accounts-almost-completely-unprotected-1708545.html\n                    \n                   (abgerufen am 30.08.2017)."},{"key":"1024_CR9","volume-title":"Number of monthly active WhatsApp users worldwide from April 2013 to July 2017 (in millions)","author":"Statista","year":"2017","unstructured":"Statista (2017). Number of monthly active WhatsApp users worldwide from April 2013 to July 2017 (in millions). Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/www.statista.com\/statistics\/260819\/number-of-monthly-active-whatsapp-users\/\n                    \n                  (abgerufen am 30.08.2017)."},{"key":"1024_CR10","volume-title":"Basics of Qualitative Research: Grounded Theory Procedures and Techniques","author":"A. Strauss","year":"1990","unstructured":"Strauss, A. and J. Corbin (1990). Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Newbury Park, California: Sage Publications."},{"key":"1024_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511557842","volume-title":"Qualitative analysis for social scientists","author":"A. Strauss","year":"1987","unstructured":"Strauss, A. (1987). Qualitative analysis for social scientists. New York, NY: Cambridge University Press."},{"key":"1024_CR12","volume-title":"End-to-End Encryption","author":"WhatsApp Inc.","year":"2016","unstructured":"WhatsApp Inc. (2016a). End-to-End Encryption. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/blog.whatsapp.com\/10000618\/end-to-end-encryption\n                    \n                   (abgerufen am 30.08.2017)."},{"key":"1024_CR13","volume-title":"WhatsApp Encryption Overview","author":"WhatsApp Inc.","year":"2016","unstructured":"WhatsApp Inc. (2016b). WhatsApp Encryption Overview. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf\n                    \n                   (abgerufen am 30.05.2017)."},{"key":"1024_CR14","volume-title":"WhatsApp Privacy Policy","author":"WhatsApp Inc.","year":"2016","unstructured":"WhatsApp Inc. (2016c). WhatsApp Privacy Policy. Verf\u00fcgbar unter: \n                    https:\/\/doi.org\/www.whatsapp.com\/legal\/#privacy-policy\n                    \n                   abgerufen am 30.08.2017)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-1024-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-1024-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-1024-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,10]],"date-time":"2019-11-10T00:03:24Z","timestamp":1573344204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-1024-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":14,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["1024"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-1024-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"10 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}