{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:50:30Z","timestamp":1649112630115},"reference-count":17,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"3","license":[{"start":{"date-parts":[[2014,4,19]],"date-time":"2014-04-19T00:00:00Z","timestamp":1397865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1365\/s40702-014-0032-1","type":"journal-article","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T12:19:38Z","timestamp":1397823578000},"page":"330-338","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["E-Mail-Forensik \u2013 Grenzen und M\u00f6glichkeiten aus Sicht des Datenschutzes"],"prefix":"10.1365","volume":"51","author":[{"given":"Sven","family":"Raak","sequence":"first","affiliation":[]},{"given":"Anke","family":"Sch\u00fcll","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2014,4,19]]},"reference":[{"key":"32_CR1","unstructured":"Ashford W (2013) Ernst & Young email keyword analysis identifies fraudsters. http:\/\/www.computerweekly.com\/news\/2240175638\/Ernst-Young-email-keyword-analysis-identifies-ID-fraudsters . Zugegriffen: 28. Jan. 2013"},{"issue":"34","key":"32_CR2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/s11623-010-0040-4","volume":"2","author":"M B\u00e4cker","year":"2010","unstructured":"B\u00e4cker M, Freiling FC, Schmitt S (2010) Selektion vor der Sicherung: Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien. Datenschutz und Datensicherheit 2(34):80\u201385","journal-title":"Datenschutz und Datensicherheit"},{"key":"32_CR3","first-page":"78","volume-title":"Defining a standard for reporting digital evidence items in computer forensic tools. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 53","author":"H Bariki","year":"2011","unstructured":"Bariki H, Hashmi M, Baggili I et al (2011) Defining a standard for reporting digital evidence items in computer forensic tools. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 53. Springer, Heidelberg, S\u00a078\u201395"},{"issue":"2","key":"32_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11416-006-0018-9","volume":"1","author":"V Broucek","year":"2006","unstructured":"Broucek V, Turner P (2006) Winning the battles, losing the war? Rethinking methodology for forensic computing research. J Comp Virol 1(2):3\u201312","journal-title":"J Comp Virol"},{"key":"32_CR5","volume-title":"Internet und Arbeitsrecht","author":"W D\u00e4ubler","year":"2013","unstructured":"D\u00e4ubler W (2013) Internet und Arbeitsrecht, 4.\u00a0Aufl. Bund-Verlag, Frankfurt a.\u00a0M.","edition":"4."},{"issue":"33","key":"32_CR6","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s11623-009-0026-2","volume":"3","author":"W Dolle","year":"2009","unstructured":"Dolle W (2009) Computer-Forensik in der Praxis \u2013 Mit Open-Source-Werkzeugen die Aufkl\u00e4rung von Computerkriminalit\u00e4t unterst\u00fctzen. Datenschutz und Datensicherheit 3(33):183\u2013188","journal-title":"Datenschutz und Datensicherheit"},{"issue":"1","key":"32_CR7","first-page":"1","volume":"1","author":"H Fleischer","year":"2008","unstructured":"Fleischer H (2008) Corporate Compliance im aktienrechtlichen Unternehmensverbund. Corporate Compliance Zeitschrift 1(1):1\u20136","journal-title":"Corporate Compliance Zeitschrift"},{"issue":"289","key":"32_CR8","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/BF03340773","volume":"50","author":"K Fochler","year":"2013","unstructured":"Fochler K, Schmidt AH, Paffrath R (2013) IT-Revision 3.0 \u2013 Herausforderungen f\u00fcr die interne IT-Revision. HMD \u2013 Praxis der Wirtschaftsinformatik 50(289):20\u201330","journal-title":"HMD \u2013 Praxis der Wirtschaftsinformatik"},{"issue":"34","key":"32_CR9","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11623-010-0036-0","volume":"2","author":"R Grimm","year":"2010","unstructured":"Grimm R (2010) Wissen, was passiert ist. Datenschutz und Datensicherheit 2(34):71","journal-title":"Datenschutz und Datensicherheit"},{"issue":"34","key":"32_CR10","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/s11623-010-0041-3","volume":"2","author":"R Grimm","year":"2010","unstructured":"Grimm R, P\u00e4hler D (2010) E-Mail-Forensik. Datenschutz und Datensicherheit 2(34):86\u201389","journal-title":"Datenschutz und Datensicherheit"},{"issue":"5","key":"32_CR11","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.diin.2009.01.004","volume":"3\u20134","author":"R Hadjidj","year":"2009","unstructured":"Hadjidj R, Debbabi M, Lounis H, Iqbal F, Szporer A, Benredjem D (2009) Towards an integrated e-mail forensic analysis framework. Digital Investigation 3\u20134(5):124\u2013137","journal-title":"Digital Investigation"},{"issue":"9","key":"32_CR12","first-page":"594","volume":"12","author":"S Hanloser","year":"2009","unstructured":"Hanloser S (2009) Die BDSG-Novelle II: Neuregelungen zum Kunden- und Arbeitnehmerdatenschutz. MultiMedia und Recht 12(9):594\u2013599","journal-title":"MultiMedia und Recht"},{"issue":"34","key":"32_CR13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11623-010-0039-x","volume":"2","author":"D Heinson","year":"2010","unstructured":"Heinson D, Yannikos Y, Franke F, Winter C, Schneider M (2010) Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen. Datenschutz und Datensicherheit 2(34):75\u201379","journal-title":"Datenschutz und Datensicherheit"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Rowe R, Creamer G, Hershkop S, Stolfo SJ (2007) Automated social hierarchy detection through email network analysis. In: Proc. of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis. ACM. S\u00a0109\u2013117","DOI":"10.1145\/1348549.1348562"},{"key":"32_CR15","volume-title":"Bundesdatenschutzgesetz, Erg\u00e4nzbarer Kommentar nebst einschl\u00e4gigen Rechtsvorschriften, Erg\u00e4nzungslieferung 5\/2012","author":"H-J Schaffland","year":"2012","unstructured":"Schaffland H-J, Wiltfang N (2012) Bundesdatenschutzgesetz, Erg\u00e4nzbarer Kommentar nebst einschl\u00e4gigen Rechtsvorschriften, Erg\u00e4nzungslieferung 5\/2012. Erich Schmidt Verlag, Berlin"},{"issue":"3","key":"32_CR16","first-page":"88","volume":"6","author":"B Scheben","year":"2013","unstructured":"Scheben B, Klos C (2013) Analyse von Chatprotokollen und E-Mails \u2013 Was ist erlaubt? Was ist verwertbar? Corporate Compliance Zeitschrift 6(3):88\u201393","journal-title":"Corporate Compliance Zeitschrift"},{"issue":"6","key":"32_CR17","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/1149121.1149125","volume":"2","author":"SJ Stolfo","year":"2006","unstructured":"Stolfo SJ, Hershkop S, Hu Ch-W, Lo W-J (2006) Behavior-based modeling and its application to email analysis. ACM Transactions on Internet Technology 2(6):187\u2013221","journal-title":"ACM Transactions on Internet Technology"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0032-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-014-0032-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0032-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T17:21:22Z","timestamp":1565371282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-014-0032-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,19]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1365\/s40702-014-0032-1","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,19]]}}}