h1

h2

h3

h4

h5
h6


001     993532
005     20251022120153.0
024 7 _ |2 ISBN
|a 978-3-031-68023-6
024 7 _ |2 ISBN
|a 978-3-031-68024-3
024 7 _ |2 ISBN
|a 978-3-031-68025-0
024 7 _ |2 ISSN
|a 0302-9743
024 7 _ |2 ISSN
|a 1611-3349
024 7 _ |2 SCOPUS
|a SCOPUS:2-s2.0-85200990722
024 7 _ |2 WOS
|a WOS:001292734100002
024 7 _ |2 doi
|a 10.1007/978-3-031-68024-3_2
037 _ _ |a RWTH-2024-08805
041 _ _ |a English
100 1 _ |0 P:(DE-82)855362
|a Löbel, Alexander
|b 0
|e Corresponding author
|u rwth
111 2 _ |a 12. Annual Privacy Forum
|c Karlstad,
|d 2024-09-04 - 2024-09-05
|g APF 2024
|w Sweden
245 _ _ |a Access Your Data... if You Can: An Analysis of Dark Patterns Against the Right of Access on Popular Websites
|h online, print
260 _ _ |a Cham, Switzerland
|b Springer
|c 2024
295 1 0 |a Privacy technologies and policy : 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, September 4–5, 2024 : proceedings / Meiko Jensen, Cédric Lauradoux, Kai Rannenberg editors
300 _ _ |a 23-47
336 7 _ |0 33
|2 EndNote
|a Conference Paper
336 7 _ |0 PUB:(DE-HGF)7
|2 PUB:(DE-HGF)
|a Contribution to a book
336 7 _ |0 PUB:(DE-HGF)8
|2 PUB:(DE-HGF)
|a Contribution to a conference proceedings
|b contrib
|m contrib
336 7 _ |2 BibTeX
|a INPROCEEDINGS
336 7 _ |2 DRIVER
|a conferenceObject
336 7 _ |2 DataCite
|a Output Types/Conference Paper
336 7 _ |2 ORCID
|a CONFERENCE_PAPER
490 0 _ |a Lecture notes in computer science
|v 14831
536 _ _ |0 G:(NRW)005-2201-0014
|a NRW 005-2201-0014 - North-Rhine Westphalia Experts in Research on Digitalisation - NERD II (005-2201-0014)
|c 005-2201-0014
|x 0
588 _ _ |a Dataset connected to CrossRef Book Series, Journals: publications.rwth-aachen.de
591 _ _ |a Germany
650 _ 0 |a Application software
650 _ 0 |a Computer networks
650 _ 0 |a Computer systems
650 _ 0 |a Computers and civilization
650 _ 0 |a Cryptography
650 _ 0 |a Data encryption (Computer science)
650 _ 0 |a Data protection
700 1 _ |0 P:(DE-82)IDM04013
|a Schäfer, René
|b 1
|u rwth
700 1 _ |0 0000-0003-4352-6777
|a Püschel, Hanna
|b 2
700 1 _ |0 P:(DE-82)993652
|a Güney, Esra
|b 3
|u rwth
700 1 _ |0 P:(DE-82)IDM05900
|a Meyer, Ulrike Michaela
|b 4
|u rwth
909 C O |o oai:publications.rwth-aachen.de:993532
|p VDB
910 1 _ |0 I:(DE-588b)36225-6
|6 P:(DE-82)855362
|a RWTH Aachen
|b 0
|k RWTH
910 1 _ |0 I:(DE-588b)36225-6
|6 P:(DE-82)IDM04013
|a RWTH Aachen
|b 1
|k RWTH
910 1 _ |0 I:(DE-588b)36225-6
|6 P:(DE-82)993652
|a RWTH Aachen
|b 3
|k RWTH
910 1 _ |0 I:(DE-588b)36225-6
|6 P:(DE-82)IDM05900
|a RWTH Aachen
|b 4
|k RWTH
914 1 _ |y 2024
915 _ _ |0 StatID:(DE-HGF)0200
|2 StatID
|a DBCoverage
|b SCOPUS
|d 2023-09-03
915 _ _ |0 StatID:(DE-HGF)0420
|2 StatID
|a Nationallizenz
|d 2023-09-03
|w ger
920 1 _ |0 I:(DE-82)123520_20140620
|k 123520
|l Lehr- und Forschungsgebiet IT-Sicherheit
|x 0
920 1 _ |0 I:(DE-82)120000_20140620
|k 120000
|l Fachgruppe Informatik
|x 1
920 1 _ |0 I:(DE-82)122710_20140620
|k 122710
|l Lehrstuhl für Medieninformatik und Mensch-Computer-Interaktion (Informatik 10)
|x 2
980 _ _ |a I:(DE-82)120000_20140620
980 _ _ |a I:(DE-82)122710_20140620
980 _ _ |a I:(DE-82)123520_20140620
980 _ _ |a UNRESTRICTED
980 _ _ |a VDB
980 _ _ |a contb
980 _ _ |a contrib


LibraryCollectionCLSMajorCLSMinorLanguageAuthor
Marc 21