{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T12:40:12Z","timestamp":1685450412353},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,2,23]],"date-time":"2010-02-23T00:00:00Z","timestamp":1266883200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s12599-010-0093-9","type":"journal-article","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T09:24:50Z","timestamp":1266830690000},"page":"105-107","source":"Crossref","is-referenced-by-count":1,"title":["Can Web 2.0 Ever Forget?"],"prefix":"10.1007","volume":"2","author":[{"given":"J\u00fcrgen","family":"Karla","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,23]]},"reference":[{"key":"93_CR1","unstructured":"Ashley P, Hada S, Karjoth G, Powers C, Schunter M (2003) Enterprise privacy authorization language (EPAL 1.2). http:\/\/www.w3.org\/Submission\/2003\/SUBM-EPAL-20031110\/ . Accessed 2009-11-26"},{"issue":"1","key":"93_CR2","first-page":"3","volume":"2","author":"LJ Bannon","year":"2004","unstructured":"Bannon LJ (2004) Forgetting as \u201cA feature not a bug\u201d \u2013 the duality of memory and implications for ubiquitous computing. CoDesign International Journal of CoCreation in Design and the Arts 2(1):3\u201315","journal-title":"CoDesign International Journal of CoCreation in Design and the Arts"},{"issue":"1","key":"93_CR3","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/01972240252818216","volume":"18","author":"J-F Blanchette","year":"2002","unstructured":"Blanchette J-F, Johnson DG (2002) Data retention and the panoptic society: the social benefits of forgetfulness. The Information Society 18(1):33\u201345","journal-title":"The Information Society"},{"issue":"1","key":"93_CR4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/BF03248173","volume":"1","author":"M Koch","year":"2009","unstructured":"Koch M, Richter A (2009) Kollegen im Netz. Wirtschaftsinformatik & Management 1(1):59\u201363","journal-title":"Wirtschaftsinformatik & Management"},{"key":"93_CR5","volume-title":"Code und andere Gesetze des Cyberspace","author":"L Lessig","year":"2001","unstructured":"Lessig L (2001) Code und andere Gesetze des Cyberspace. Berlin-Verlag, Berlin"},{"key":"93_CR6","doi-asserted-by":"crossref","unstructured":"Mayer-Sch\u00f6nberger V (2007) Useful void \u2013 the art of forgetting in the age of ubiquitous computing. http:\/\/www.vmsweb.net\/attachments\/pdf\/Useful_Void.pdf .\u00a0Accessed 2009-07-25","DOI":"10.2139\/ssrn.976541"},{"key":"93_CR7","first-page":"9","volume-title":"Goodbye Privacy \u2013 Grundrechte in der digitalen Welt","author":"V Mayer-Sch\u00f6nberger","year":"2008","unstructured":"Mayer-Sch\u00f6nberger V (2008) N\u00fctzliches Vergessen. In: Reiter M, Wittmann-Tiwald M (eds) Goodbye Privacy \u2013 Grundrechte in der digitalen Welt. Linde, Wien, pp 9\u201315"},{"key":"93_CR8","unstructured":"Raguse M (2007) Verfallsdatum f\u00fcr Daten im Internet \u2013 Regulierung gefordert. http:\/\/www.datenschutz.de\/news\/detail\/?nid=2382 . Accessed 2009-06-05"},{"key":"93_CR9","volume-title":"Die Google-Falle \u2013 Die unkontrollierte Weltmacht im Internet","author":"G Reischl","year":"2008","unstructured":"Reischl G (2008) Die Google-Falle \u2013 Die unkontrollierte Weltmacht im Internet. Ueberreuter, Wien"},{"key":"93_CR10","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove DJ (2007) \u201cI\u2019ve got nothing to hide\u201d and other misunderstandings of privacy. San Diego Law Review 44:745\u2013772","journal-title":"San Diego Law Review"},{"key":"93_CR11","unstructured":"Sterbik-Lamina J, Peissl W, Cas J (2009) Privatsph\u00e4re 2.0 \u2013 Beeintr\u00e4chtigung der Privatsph\u00e4re in \u00d6sterreich. http:\/\/epub.oeaw.ac.at\/ita\/ita-projektberichte\/d2-2a53.pdf . Accessed 2009-11-26"},{"key":"93_CR12","volume-title":"Paralleluniversum Web 2.0 \u2013 Wie Online-Netzwerke unsere Gesellschaft ver\u00e4ndern","author":"HG Zeger","year":"2009","unstructured":"Zeger HG (2009) Paralleluniversum Web 2.0 \u2013 Wie Online-Netzwerke unsere Gesellschaft ver\u00e4ndern. Kremayr & Scheriau, Wien"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-010-0093-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12599-010-0093-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-010-0093-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T11:59:34Z","timestamp":1685447974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12599-010-0093-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,23]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["93"],"URL":"https:\/\/doi.org\/10.1007\/s12599-010-0093-9","relation":{},"ISSN":["1867-0202"],"issn-type":[{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,23]]}}}