{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T04:40:15Z","timestamp":1685076015882},"reference-count":4,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11623-023-1775-z","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:01:47Z","timestamp":1685034107000},"page":"350-353","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Verst\u00e4ndliche Informationssicherheit in Smarthome-Netzen"],"prefix":"10.1007","volume":"47","author":[{"given":"Mehrdad","family":"Bahrini","sequence":"first","affiliation":[]},{"given":"Thomas","family":"M\u00fcnder","sequence":"additional","affiliation":[]},{"given":"Karsten","family":"Sohr","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Malaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,25]]},"reference":[{"key":"1775_CR1","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11623-021-1430-5","volume":"45","author":"H Reichmann","year":"2021","unstructured":"Henrik Reichmann, Malte Elson, Nele Borgert, Dennis-Kenji Kipker, Rainer Malaka, Karsten Sohr and Mehrdad Bahrini. Erfahrbarer Datenschutz und IT-Sicherheit in Smart Home-Anwendungen. Datenschutz Datensich 45, 259\u2013264 (2021). https:\/\/doi.org\/10.1007\/s11623-021-1430-5","journal-title":"Datenschutz Datensich"},{"key":"1775_CR2","series-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201820)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313831.3376255","volume-title":"Smart Home Beyond the Home: A Case for Community-Based Access Control","author":"M Tabassum","year":"2020","unstructured":"Madiha Tabassum, Jess Kropczynski, Pamela Wisniewski, and Heather Richter Lipford. 2020. Smart Home Beyond the Home: A Case for Community-Based Access Control. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201820). Association for Computing Machinery, New York, NY, USA, 1\u201312. https:\/\/doi.org\/10.1145\/3313831.3376255"},{"issue":"3","key":"1775_CR3","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1080\/02701367.1999.10608047","volume":"70","author":"AP Turner","year":"1999","unstructured":"Adrian P. Turner & Thomas J. Martinek (1999) An Investigation into Teaching Games for Understanding: Effects on Skill, Knowledge, and Game Play, Research Quarterly for Exercise and Sport, 70:3, 286-296, https:\/\/doi.org\/10.1080\/02701367.1999.10608047","journal-title":"Research Quarterly for Exercise and Sport"},{"key":"1775_CR4","series-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI \u201819)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3290605.3300428","volume-title":"Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes","author":"Yaxing Yao","year":"2019","unstructured":"Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI \u201819). Association for Computing Machinery, New York, NY, USA, Paper 198, 1\u201312. https:\/\/doi.org\/10.1145\/3290605.3300428"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1775-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1775-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1775-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:38:28Z","timestamp":1685036308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1775-z"}},"subtitle":["Herausforderungen, L\u00f6sungen und Ausblick"],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":4,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1775"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1775-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5]]},"assertion":[{"value":"25 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}