{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T10:51:10Z","timestamp":1665658270476},"reference-count":24,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"6","license":[{"start":{"date-parts":[[2014,10,23]],"date-time":"2014-10-23T00:00:00Z","timestamp":1414022400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1365\/s40702-014-0086-0","type":"journal-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T03:47:29Z","timestamp":1413949649000},"page":"840-852","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Datenschutz in Zeiten von Big Data"],"prefix":"10.1365","volume":"51","author":[{"given":"Peter","family":"Schaar","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2014,10,23]]},"reference":[{"key":"86_CR1","unstructured":"Art. 29 Gruppe (Hrsg) (2010) Stellungnahme zu den Begriffen \u201efu?r die Verarbeitung Verantwortlicher\u201c und \u201eAuftragsverarbeiter\u201c, WP 169 v. 16.2.2010. http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2010\/wp169_de.pdf#h2-3 . Zugegriffen: 9. Sept. 2014"},{"key":"86_CR2","unstructured":"Art. 29 Working Party (Hrsg) (2013a) Opinion on purpose limitation, WP 203 vom 02.04.2013. http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp203_en.pdf"},{"key":"86_CR3","unstructured":"Art. 29 Working Party (Hrsg) (2013b) Google\u2019s privacy policy: European data protection authorities are coordinating their enforcement actions. Presseerkl\u00e4rung vom 27.02.2013"},{"key":"86_CR4","unstructured":"BfDI (Hrsg) (2012) Versto\u00df gegen \u00a7\u00a0201a Strafgesetzbuch, vgl. BfDI, 24. T\u00e4tigkeitsbericht (2011\u20132012), Nr. 3.3.3.4"},{"key":"86_CR5","unstructured":"BfDI (Hrsg) (2014) Was ist ein Scorewert? http:\/\/www.bfdi.bund.de\/DE\/Themen\/WirtschaftUndFinanzen\/VerbrSchutzAuskunfteien\/FAQAuskunfteienUndScoring\/Artikel\/WasIstEinScorewert.html?nn=4629210 . Zugegriffen: 8. Sept. 2014"},{"key":"86_CR6","unstructured":"Cavoukian A, El Emam K (2011) Dispelling the myths surrounding de-identification: anonymization remains a strong tool for protecting privacy, 2011. http:\/\/www.ipc.on.ca\/images\/Resources\/anonymization.pdf . Zugegriffen: 8. Sept. 2014"},{"key":"86_CR7","unstructured":"Cavoukian A, Jonas J (2012) Privacy by design in the age of big data. http:\/\/privacybydesign.ca\/content\/uploads\/2012\/06\/pbd-big_data.pdf . Zugegriffen: 01. Sept. 2014"},{"key":"86_CR8","unstructured":"CISCO (Hrsg) (2014) The Zettabyte Era \u2013 Trends and Analysis. http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/VNI_Hyperconnectivity_WP.html . Zugegriffen: 8. Sept. 2014"},{"key":"86_CR9","unstructured":"EU-Kommission (Hrsg) (2012) Art. 33 des Vorschlags f\u00fcr eine Verordnung zum Schutz nat\u00fcrlicher Personen bei der Verarbeitung personenbezogener Daten und zum freien Datenverkehr (Datenschutz-Grundverordnung)\/* KOM\/2012\/011 endg\u00fcltig \u2013 2012\/0011 (COD). http:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/HTML\/?uri=CELEX:52012PC0011&from=EN . Zugegriffen: 7. M\u00e4rz. 2014"},{"key":"86_CR10","unstructured":"Heise Online (Hrsg) (2014) In-Memory-BI: Datenanalyse auf der \u00dcberholspur. http:\/\/www.heise.de\/microsites\/big-data-so-beherrschen-sie-die-datenflut\/in-memory-bi-datenanalyse-auf-der-ueberholspur\/150\/304\/917\/1 . Zugegriffen: 8. Sept. 2014"},{"key":"86_CR11","volume-title":"Post-Privacy: Prima leben ohne Privatsph\u00e4re","author":"C Heller","year":"2011","unstructured":"Heller C (2011) Post-Privacy: Prima leben ohne Privatsph\u00e4re. C.H. Beck, M\u00fcnchen"},{"key":"86_CR12","volume-title":"Mehr Transparenz wagen!: Wie Facebook, Twitter & Co die Welt erneuern","author":"J Jarvis","year":"2012","unstructured":"Jarvis J (2012) Mehr Transparenz wagen!: Wie Facebook, Twitter & Co die Welt erneuern. Bastei-L\u00fcbbe, K\u00f6ln"},{"key":"86_CR13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1093\/idpl\/ips003","volume":"2","author":"C Kuner","year":"2012","unstructured":"Kuner C, Cate FH, Millard C, Svattesson DJ (2012) The challenge of big data for data protection. International Data Privacy Law 2:47\u201349","journal-title":"International Data Privacy Law"},{"key":"86_CR14","doi-asserted-by":"crossref","unstructured":"Lyon D (2014) Surveillance, snowden, and big data: capacities, consequences, critique. In: Big Data & Society, 2014. doi:10.1177\/2053951714541861","DOI":"10.1177\/2053951714541861"},{"key":"86_CR15","doi-asserted-by":"crossref","unstructured":"Mattern F, Fl\u00f6rkemeier C (2010) Vom Internet der Computer zum Internet der Dinge. In: Informatik-Spektrum, Bd.\u00a033. Springer, Heidelberg, S\u00a0107\u2013121","DOI":"10.1007\/s00287-010-0417-7"},{"key":"86_CR16","unstructured":"NSA (2012) SIGINT Strategy 2012\u20132016, 23 February 2012. http:\/\/s3.documentcloud.org\/documents\/838324\/2012-2016-sigint-strategy-23-feb-12.pdf . Zugegriffen: 20. Dez. 2013"},{"key":"86_CR17","unstructured":"PCLOB (Hrsg) (2014) Report on the Telephone Records Program conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court, 23.01.2014, S.\u00a011. http:\/\/www.pclob.gov\/Library\/215-Report_on_the_Telephone_Records_Program.pdf . Zugegriffen: 09. Sept. 2014"},{"key":"86_CR18","volume-title":"Executive office of the president, Big data: seizing opportunities, preserving values","author":"Podesta","year":"2014","unstructured":"Podesta et al (2014) Executive office of the president, Big data: seizing opportunities, preserving values. The White House, Washington"},{"key":"86_CR19","unstructured":"Polonetsky J, Tene O (2012) Privacy in the age of big data a time for big decisions, in: Stanford Law review 2012. http:\/\/www.stanfordlawreview.org\/online\/privacy-paradox\/big-data . Zugegriffen: 06. Sept. 2014"},{"key":"86_CR20","unstructured":"Polonetsky J, Tene O (2013) Privacy and Big Data, Making Ends Meet, aus. http:\/\/www.futureofprivacy.org\/big-data-privacy-workshop-paper-collection"},{"key":"86_CR21","unstructured":"Ro\u00dfnagel A, Pfitzmann A, Garstka H (2001) Modernisierung des Datenschutzrechts, 2001, S.\u00a067. http:\/\/www.bfdi.bund.de\/SharedDocs\/VortraegeUndArbeitspapiere\/2001GutachtenModernisierungDSRecht.pdf?__blob=publicationFile . Zugegriffen: 6. Sept. 2014"},{"key":"86_CR22","unstructured":"Schmidt E (2009) http:\/\/www.youtube.com\/watch?v=A6e7wfDHzew . Zugegriffen: 8. Sept. 2014"},{"key":"86_CR23","unstructured":"Spiegel Online (Hrsg) (2014) Gerichtsurteil zu Videokameras im Auto: Dashcams versto\u00dfen gegen Datenschutzgesetz. http:\/\/www.spiegel.de\/auto\/aktuell\/dashcam-videokamera-verstoesst-gegen-datenschutzgesetz-a-985756.html , 12.08.2014. Zugegriffen: 8. Sept. 2014"},{"key":"86_CR24","unstructured":"Zeit Online (Hrsg) (2014) Predictive Policing, Das BKA will in die Zukunft sehen. http:\/\/www.zeit.de\/digital\/datenschutz\/2014-03\/bka-data-mining-predictive-policing vom 17.03.2014. Zugegriffen: 08. Sept. 2014"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0086-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-014-0086-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0086-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T12:57:48Z","timestamp":1565960268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-014-0086-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,23]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["86"],"URL":"https:\/\/doi.org\/10.1365\/s40702-014-0086-0","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,23]]}}}