{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:30:37Z","timestamp":1717201837613},"reference-count":0,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>In Zeiten wachsender Datenmengen und eines zunehmenden Interesses an Open Data steht die Frage im\n   Raum: \u201cWie viel Offenheit ist m\u00f6glich?\u201d Zentrale Zielsetzung jeder Ver\u00f6ffentlichung\n   von Daten als Open Data ist deren Anonymit\u00e4t. Nur dann liegen die Daten au\u00dferhalb des Geltungsbereichs\n   der Datenschutz-Grundverordnung. Die steigende Verf\u00fcgbarkeit von personenbezogenen Zusatzinformationen\n   aus \u00f6ffentlichen Quellen wie sozialen Medien erschweren allerdings die Anonymisierung, weil mit zunehmender\n   Datenmenge auch die M\u00f6glichkeiten einer Verkn\u00fcpfung von Daten (Data Linkage) zunehmen und damit\n   auch das Risiko einer m\u00f6glichen Re-Identifizierung steigt. Die Ver\u00f6ffentlichung von anonymisierten\n   Daten erfordert daher aufgrund des unumkehrbaren Charakters eine umfassende Analyse der Re-Identifizierungsrisiken.\n  <\/jats:p>","DOI":"10.1007\/s11623-024-1925-y","type":"journal-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T12:02:27Z","timestamp":1717156947000},"page":"378-382","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Wie viel Open Data kann es geben?"],"prefix":"10.1007","volume":"48","author":[{"given":"Elena","family":"M\u00e4rz","sequence":"first","affiliation":[]},{"given":"Johann","family":"Guggumos","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Wilhelm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,31]]},"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-024-1925-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-024-1925-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-024-1925-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T12:18:32Z","timestamp":1717157912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-024-1925-y"}},"subtitle":["Data Linkage und Re-Identifizierungsrisiken"],"short-title":[],"issued":{"date-parts":[[2024,5,31]]},"references-count":0,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1925"],"URL":"https:\/\/doi.org\/10.1007\/s11623-024-1925-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,31]]},"assertion":[{"value":"31 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}