{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T11:15:41Z","timestamp":1648725341209},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["LOG IN"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s40569-014-0028-y","type":"journal-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T09:37:15Z","timestamp":1419932235000},"page":"41-56","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Kostenlos ist nicht kostenfrei"],"prefix":"10.1007","volume":"34","author":[{"given":"Bettina","family":"Berendt","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gebhard","family":"Dettmar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cihan","family":"Demir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Peetz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,12,31]]},"reference":[{"key":"28_CR1","unstructured":"AKBSI - Arbeitskreis \u201eBildungsstandards\u201c der Gesellschaft f\u00fcr Informatik (Hrsg.): Grunds\u00e4tze und Standards f\u00fcr die Informatik in der Schule - Bildungsstandards Informatik f\u00fcr die Sekundarstufe I. Empfehlungen der Gesellschaft f\u00fcr Informatik e. V. vom 24. Januar 2008. In: LOG IN, 28. Jg. (2008), Nr. 150\/151, Beilage. \n                    http:\/\/www.gi.de\/fileadmin\/redaktion\/empfehlungen\/Bildungsstandards_2008.pdf"},{"key":"28_CR2","unstructured":"Andrews L: Auswertung pers\u00f6nlicher Informationen - Wie die Datensammel-Industrie hinter Facebook und Co. funktioniert. S\u00fcddeutsche. de, 10.02.2012. \n                    http:\/\/www.sueddeutsche.de\/digital\/auswertung-persoenlicher-informationen-wie-die-datensammel-industrie-hinter-facebook-und-co-funktioniert-1.1280573"},{"key":"28_CR3","unstructured":"Berendt B: Datenschutzbewusstsein (Foliensatz). 2012. \n                    http:\/\/people.cs.kuleuven.be\/~bettina.berendt\/Talks\/berendt_2012_datenschutzbewusstsein.ppt"},{"key":"28_CR4","unstructured":"Berendt B, Dettmar D: \u201cIf you\u2019re not paying for it, you\u2019re the product\u201d - Privacy in der Schulbildung - Eine Unterrichtsreihe und ihre Folgen. \n                    http:\/\/people.cs.kuleuven.be\/~bettina.berendt\/Privacybildung\/"},{"key":"28_CR5","unstructured":"Berthold O: Datenschutz und soziale Netzwerke. In: LOG IN, 30. Jg. (2010), Nr. 165, S.\u00a018\u201325."},{"key":"28_CR6","unstructured":"BSB - Beh\u00f6rde f\u00fcr Schule und Berufsbildung der Freien und Hansestadt Hamburg: Bildungsplan gymnasiale Oberstufe - Rahmenplan Politik\/Gesellschaft\/Wirtschaft. Hamburg: Landesinstitut f\u00fcr Lehrerbildung und Schulentwicklung, 2009. \n                    www.hamburg.de\/contentblob\/1475228\/data\/p-g-w-gyo"},{"key":"28_CR7","unstructured":"BVerG - Erster Senat des Bundesverfassungsgerichts: Urteil Az. 1 BvR 400\/51 (\u201eL\u00fcth-Urteil\u201c) vom 15. Januar 1958"},{"key":"28_CR8","unstructured":"BVerfG - Erster Senat des Bundesverfassungsgerichts: Urteil Az. 1 BvR 209\/83, 1 BvR 484\/83, 1 BvR 440\/83, 1 BvR 420\/83, 1 BvR 362\/83, 1 BvR 269\/83 (\u201eVolksz\u00e4hlungsurteil\u201c) vom 15. Dezember 1983"},{"key":"28_CR9","unstructured":"Council of Europe: Recommendation CM\/Rec (2010) 13 of the Committee of Ministers to member states on the protection of individuals with regard to automatic processing of personal data in the context of profiling. 23 November 2010. \n                    https:\/\/wcd.coe.int\/ViewDoc.jsp?id=1710949"},{"key":"28_CR10","unstructured":"Dettmar G: Knowledge Discovery in Databases. Teil I - Methodik und Anwendungsbereiche. 27. November 2002. \n                    http:\/\/www.community-of-knowledge.de\/beitrag\/knowledge-discoveryin-databases-teil-i-methodik-und-anwendungsbereiche\/"},{"key":"28_CR11","unstructured":"Dettmar G: PGW am KiWi - S1-4 PGW - Politik, Gesellschaft, Wirtschaft. 2013. \n                    http:\/\/www.schul-web.org\/geschichte\/kiwi\/pgw.html"},{"key":"28_CR12","unstructured":"Diethelm I, Koubek J, Witten H: IniK - Informatik im Kontext. Entwicklungen, Merkmale und Perspektiven. In: LOG IN, 31. Jg. (2011) , Nr. 169\/170, S.\u00a097\u2013105."},{"key":"28_CR13","unstructured":"Dreier H: Dimensionen der Grundrechte - Von der Wertordnungsjudikatur zu den objektiv-rechtlichen Grundrechtsgehalten. Reihe \u201eSchriftenreihe der juristischen Studiengesellschaft Hannover\u201c, Heft 23. Hannover: Juristische Studiengesellschaft, 1993. \n                    https:\/\/www.jura.uni-wuerzburg.de\/fileadmin\/02160100\/Elektronische_Texte\/Dimensionen_der_Grundrechte.pdf"},{"key":"28_CR14","unstructured":"European Commission - Article 29 Data Protection Working Party: Opinion 03\/2013 on purpose limitation. 00569\/13\/EN WP 203. 2. April 2013. \n                    http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp203_en"},{"key":"28_CR15","unstructured":"Facebook: facebook - Datenverwendungsrichtlinien. 2013 ff. \n                    https:\/\/www.facebook.com\/full_data_use_policy"},{"key":"28_CR16","unstructured":"Diese R. In der beschriebenen Durchf\u00fchrung der Reihe haben wir mit der Version vom 12.05.2012, der im September 2013 aktuellen Fassung, gearbeitet; es empfiehlt sich, die jeweils aktuelle zu verwenden."},{"key":"28_CR17","unstructured":"Graff B: Man erkennt uns, weil wir leben. S\u00fcddeutsche.de, 25.01.2010 (2010a). \n                    http:\/\/www.sueddeutsche.de\/digital\/identitaet-im-netz-man-erkennt-uns-weil-wir-leben-1.74743"},{"key":"28_CR18","unstructured":"Graff B: Der gl\u00e4serne B\u00fcrger 2.0 - Das neue Profil des Menschen. In: S\u00fcddeutsche Zeitung, 70. Jg. (05.\/06.06.2010), Nr. 126, (2010b)."},{"key":"28_CR19","unstructured":"Hinzmann P, H\u00fcttemann V, Wittke T, Schulte C: Mobilfunknetz - Was steckt dahinter? Potsdam: Workshop auf der Tagung der GIFIBBB, 06.03.2014. \n                    http:\/\/www.informatikdidaktik.de\/Fachgruppe\/tagung13\/ws2_2014"},{"key":"28_CR20","unstructured":"klicksafe: Datenschutz TIPPS f\u00fcr Jugendliche - So sind Deine Daten im Internet sicher. D\u00fcsseldorf: Landesanstalt f\u00fcr Medien Nordrhein-Westfalen, 2013. \n                    www.klicksafe.de\/fileadmin\/media\/documents\/pdf\/klicksafe_Materialien\/Jugendliche\/klicksafe_Flyer_Datenschutztipps_Jugend_2013"},{"key":"28_CR21","unstructured":"Kosinski M, Stillwell D, Graepel Th: Private traits and attributes are predictable from digital records of human behavior. In: Proceedings of the National Academy of Sciences, Vol.\u00a0110 (2013), Nr. 15, S.\u00a05802-5805. \n                    www.pnas.org\/content\/110\/15\/5802.full\n                    \n                  +html"},{"key":"28_CR22","unstructured":"Kotynek M, Levine R: Das Recht auf Vergessen. ZEIT Online, 10. Oktober 2013. \n                    http:\/\/www.zeit.de\/2013\/41\/privatsphaere-internet-datenschutz"},{"key":"28_CR23","unstructured":"Koubek J: Datenschutz und Pers\u00f6nlichkeitsrechte. In LOG IN, 34. Jg. (2014), Nr. 178\/179, S.\u00a021-26 (in diesem Heft)."},{"key":"28_CR24","volume-title":"Big Data - A Revolution That Will Transform How We Live, Work, and Think","author":"V Mayer-Sch\u00f6nberger","year":"2013","unstructured":"Mayer-Sch\u00f6nberger V, Cukier K (2013) Big Data - A Revolution That Will Transform How We Live, Work, and Think. John Murray, London"},{"key":"28_CR25","unstructured":"Meyer B: Terrorabwehr und Datenschutz. In: LOG IN, 34. Jg. (2014), Nr. 178\/179, S.\u00a057-63 (in diesem Heft)."},{"key":"28_CR26","unstructured":"Norddeutscher Rundfunk NDR-: Datenschutz und Datenverschwendung. NDR Extra 3 vom 07.03.2010. \n                    http:\/\/www.youtube.com\/watch?v=S06u4ugb0xc"},{"key":"28_CR27","unstructured":"Peetz T, Berendt B: A Tracker Manual for High School Teachers. Technical report. Leuven: KU Leuven, 2012. \n                    http:\/\/people.cs.kuleuven.be\/bettina.berendt\/SPION\/TrackerManual"},{"key":"28_CR28","unstructured":"SenBJS - Senatsverwaltung f\u00fcr Bildung, Jugend und Sport Berlin: Rahmenplan f\u00fcr die gymnasiale Oberstufe - Informatik (Gymnasien, Gesamtschulen mit gymnasialer Oberstufe, Berufliche Gymnasien, Kollegs, Abendgymnasien). Berlin: Oktoberdruck, 2006. \n                    www.berlin.de\/imperia\/md\/content\/sen-bildung\/unterricht\/lehrplaene\/sek2_informatik.pdf?start&ts=1283429474&file=sek2_informatik"},{"key":"28_CR29","unstructured":"SPION - Security and Privacy in Online Social Networks. 2011 ff. \n                    http:\/\/www.spion.me\/"},{"key":"28_CR30","unstructured":"Wassermann R: Aktivierung der wehrhaften Demokratie - Zum Antrag auf NPD-Verbot. In: NJW - Neue Juristische Wochenschrift, 54. Jg. (2000), Heft 51, S.\u00a03760\u20133762."}],"container-title":["LOG IN"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40569-014-0028-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40569-014-0028-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40569-014-0028-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40569-014-0028-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T21:19:25Z","timestamp":1600377565000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.springerprofessional.de\/doi\/10.1007\/s40569-014-0028-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["28"],"URL":"https:\/\/doi.org\/10.1007\/s40569-014-0028-y","relation":{},"ISSN":["0720-8642"],"issn-type":[{"value":"0720-8642","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"31 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}