| 001 | 993532 | ||
| 005 | 20251022120153.0 | ||
| 024 | 7 | _ | |2 ISBN |a 978-3-031-68023-6 |
| 024 | 7 | _ | |2 ISBN |a 978-3-031-68024-3 |
| 024 | 7 | _ | |2 ISBN |a 978-3-031-68025-0 |
| 024 | 7 | _ | |2 ISSN |a 0302-9743 |
| 024 | 7 | _ | |2 ISSN |a 1611-3349 |
| 024 | 7 | _ | |2 SCOPUS |a SCOPUS:2-s2.0-85200990722 |
| 024 | 7 | _ | |2 WOS |a WOS:001292734100002 |
| 024 | 7 | _ | |2 doi |a 10.1007/978-3-031-68024-3_2 |
| 037 | _ | _ | |a RWTH-2024-08805 |
| 041 | _ | _ | |a English |
| 100 | 1 | _ | |0 P:(DE-82)855362 |a Löbel, Alexander |b 0 |e Corresponding author |u rwth |
| 111 | 2 | _ | |a 12. Annual Privacy Forum |c Karlstad, |d 2024-09-04 - 2024-09-05 |g APF 2024 |w Sweden |
| 245 | _ | _ | |a Access Your Data... if You Can: An Analysis of Dark Patterns Against the Right of Access on Popular Websites |h online, print |
| 260 | _ | _ | |a Cham, Switzerland |b Springer |c 2024 |
| 295 | 1 | 0 | |a Privacy technologies and policy : 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, September 4–5, 2024 : proceedings / Meiko Jensen, Cédric Lauradoux, Kai Rannenberg editors |
| 300 | _ | _ | |a 23-47 |
| 336 | 7 | _ | |0 33 |2 EndNote |a Conference Paper |
| 336 | 7 | _ | |0 PUB:(DE-HGF)7 |2 PUB:(DE-HGF) |a Contribution to a book |
| 336 | 7 | _ | |0 PUB:(DE-HGF)8 |2 PUB:(DE-HGF) |a Contribution to a conference proceedings |b contrib |m contrib |
| 336 | 7 | _ | |2 BibTeX |a INPROCEEDINGS |
| 336 | 7 | _ | |2 DRIVER |a conferenceObject |
| 336 | 7 | _ | |2 DataCite |a Output Types/Conference Paper |
| 336 | 7 | _ | |2 ORCID |a CONFERENCE_PAPER |
| 490 | 0 | _ | |a Lecture notes in computer science |v 14831 |
| 536 | _ | _ | |0 G:(NRW)005-2201-0014 |a NRW 005-2201-0014 - North-Rhine Westphalia Experts in Research on Digitalisation - NERD II (005-2201-0014) |c 005-2201-0014 |x 0 |
| 588 | _ | _ | |a Dataset connected to CrossRef Book Series, Journals: publications.rwth-aachen.de |
| 591 | _ | _ | |a Germany |
| 650 | _ | 0 | |a Application software |
| 650 | _ | 0 | |a Computer networks |
| 650 | _ | 0 | |a Computer systems |
| 650 | _ | 0 | |a Computers and civilization |
| 650 | _ | 0 | |a Cryptography |
| 650 | _ | 0 | |a Data encryption (Computer science) |
| 650 | _ | 0 | |a Data protection |
| 700 | 1 | _ | |0 P:(DE-82)IDM04013 |a Schäfer, René |b 1 |u rwth |
| 700 | 1 | _ | |0 0000-0003-4352-6777 |a Püschel, Hanna |b 2 |
| 700 | 1 | _ | |0 P:(DE-82)993652 |a Güney, Esra |b 3 |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)IDM05900 |a Meyer, Ulrike Michaela |b 4 |u rwth |
| 909 | C | O | |o oai:publications.rwth-aachen.de:993532 |p VDB |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)855362 |a RWTH Aachen |b 0 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM04013 |a RWTH Aachen |b 1 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)993652 |a RWTH Aachen |b 3 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM05900 |a RWTH Aachen |b 4 |k RWTH |
| 914 | 1 | _ | |y 2024 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0200 |2 StatID |a DBCoverage |b SCOPUS |d 2023-09-03 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0420 |2 StatID |a Nationallizenz |d 2023-09-03 |w ger |
| 920 | 1 | _ | |0 I:(DE-82)123520_20140620 |k 123520 |l Lehr- und Forschungsgebiet IT-Sicherheit |x 0 |
| 920 | 1 | _ | |0 I:(DE-82)120000_20140620 |k 120000 |l Fachgruppe Informatik |x 1 |
| 920 | 1 | _ | |0 I:(DE-82)122710_20140620 |k 122710 |l Lehrstuhl für Medieninformatik und Mensch-Computer-Interaktion (Informatik 10) |x 2 |
| 980 | _ | _ | |a I:(DE-82)120000_20140620 |
| 980 | _ | _ | |a I:(DE-82)122710_20140620 |
| 980 | _ | _ | |a I:(DE-82)123520_20140620 |
| 980 | _ | _ | |a UNRESTRICTED |
| 980 | _ | _ | |a VDB |
| 980 | _ | _ | |a contb |
| 980 | _ | _ | |a contrib |
| Library | Collection | CLSMajor | CLSMinor | Language | Author |
|---|