
{  
   "types" : {
      "Bookmark" : {
         "pluralLabel" : "Bookmarks"
      },
      "Publication" : {
         "pluralLabel" : "Publications"
      },
      "GoldStandardPublication" : {
         "pluralLabel" : "GoldStandardPublications"
      },
      "GoldStandardBookmark" : {
         "pluralLabel" : "GoldStandardBookmarks"
      },
      "Tag" : {
         "pluralLabel" : "Tags"
      },
      "User" : {
         "pluralLabel" : "Users"
      },
      "Group" : {
         "pluralLabel" : "Groups"
      },
      "Sphere" : {
         "pluralLabel" : "Spheres"
      }
   },
   
   "properties" : {
      "count" : {
         "valueType" : "number"
      },
      "date" : {
         "valueType" : "date"
      },
      "changeDate" : {
         "valueType" : "date"
      },
      "url" : {
         "valueType" : "url"
      },
      "id" : {
         "valueType" : "url"
      },
      "tags" : {
         "valueType" : "item"
      },
      "user" : {
         "valueType" : "item"
      }      
   },
   
   "items" : [
   	  
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/628a5c3bcee1ae54c868577b86a0b96a/droessler",
         "tags" : [
            "bsi","computer","e-mail","email","it","pgp","sicherheit","verschlüsselung"
         ],
         
         "intraHash" : "628a5c3bcee1ae54c868577b86a0b96a",
         "label" : "BSI für Bürger - E-Mail Verschlüsselung",
         "user" : "droessler",
         "description" : "Verschlüsselt kommunizieren per E-Mail",
         "date" : "2019-07-29 23:34:29",
         "changeDate" : "2019-07-29 21:34:29",
         "count" : 1,
         "url" : "https://www.bsi-fuer-buerger.de/BSIFB/DE/Empfehlungen/Verschluesselung/EMail_Verschluesselung/email_verschluesselung_node.html"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/12967037269ed29777225a5d26b0b076/droessler",
         "tags" : [
            "algorithm","algorithmen","automatisierung","computer","datenverarbeitung","entscheidung","ethik","intelligenz","it","ki","künstliche","politik","watch"
         ],
         
         "intraHash" : "12967037269ed29777225a5d26b0b076",
         "label" : "AlgorithmWatch",
         "user" : "droessler",
         "description" : "AlgorithmWatch ist eine gemeinnützige Organisation mit dem Ziel, Prozesse algorithmischer Entscheidungsfindung zu betrachten und einzuordnen, die eine gesellschaftliche Relevanz haben \u2013 die also entweder menschliche Entscheidungen vorhersagen oder vorbestimmen, oder Entscheidungen automatisiert treffen.",
         "date" : "2019-07-14 17:25:03",
         "changeDate" : "2019-07-14 15:26:33",
         "count" : 1,
         "url" : "https://algorithmwatch.org/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/9e19bad6c3d7d49b2763f1e3072fd80a/droessler",
         "tags" : [
            "ccc","cccs","chaos","club","computer","datenschutz","it-sicherheit","privacy","sicherheit","software","stuttgart","überwachung"
         ],
         
         "intraHash" : "9e19bad6c3d7d49b2763f1e3072fd80a",
         "label" : "CCC Stuttgart - Startseite",
         "user" : "droessler",
         "description" : "Der Chaos Computer Club Stuttgart e.V. ist der Stuttgarter Ableger des Chaos Computer Club e.V. (CCC) aus Hamburg, der seit 1986 durch Aufdeckung technischer Lücken (\u201ESparkassenhack\u201C, \u201EHack-a-Bike\u201C, Nedap-Wahlcomputer) bekannt ist.",
         "date" : "2018-12-17 00:28:33",
         "changeDate" : "2018-12-16 23:29:13",
         "count" : 1,
         "url" : "https://www.cccs.de/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/3f19209aedf24d74ed61a65c3b8da7f2/droessler",
         "tags" : [
            "arbeitsbedigungen","computer","computermaus","fair","maus","menschenrechte","rohstoffe","unternehmen"
         ],
         
         "intraHash" : "3f19209aedf24d74ed61a65c3b8da7f2",
         "label" : "Die Faire Maus | Nager IT",
         "user" : "droessler",
         "description" : "Die Faire Computermaus. Für menschenwürdige Arbeitsbedingungen in den Fabriken der Computerindustrie.",
         "date" : "2018-11-18 20:40:30",
         "changeDate" : "2018-11-18 19:40:30",
         "count" : 1,
         "url" : "https://www.nager-it.de/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/0240d539d1a4a7984650cd2a4504f999/droessler",
         "tags" : [
            "bsi","bundesamt","computer","der","für","in","informationstechnik","it","it-sicherheit","malware","schadsoftware","sicherheit","software"
         ],
         
         "intraHash" : "0240d539d1a4a7984650cd2a4504f999",
         "label" : "BSIFB - Startseite BSI für Bürger",
         "user" : "droessler",
         "description" : "BSI für Bürger ist ein kostenloses Informationsangebot des Bundesamtes für Sicherheit in der Informationstechnik.",
         "date" : "2018-01-04 20:45:40",
         "changeDate" : "2018-01-04 19:47:06",
         "count" : 1,
         "url" : "https://www.bsi-fuer-buerger.de/BSIFB/DE/Home/home_node.html"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/1f34790ec3cd2c7657588f9cb2729293/droessler",
         "tags" : [
            "computer","digitalisierung","kalifornien","politik","roboter","silicon","technokratie","technologie","usa","valley","zukunft","zukunftsforschung"
         ],
         
         "intraHash" : "1f34790ec3cd2c7657588f9cb2729293",
         "label" : "Welcome to Singularity University",
         "user" : "droessler",
         "description" : "Our mission is to educate, inspire, and empower leaders to apply exponential technologies to address humanity's grand challenges. ",
         "date" : "2017-08-07 23:58:51",
         "changeDate" : "2017-08-07 21:58:51",
         "count" : 1,
         "url" : "https://su.org/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/d34532c257a06d3fded9c088b11bdf2d/droessler",
         "tags" : [
            "ccc","chaos","club","computer","ddr","informatik","information","magnetische","netzpolitik","politik","signalspeicherung","speichertechnologie"
         ],
         
         "intraHash" : "d34532c257a06d3fded9c088b11bdf2d",
         "label" : "Horst Völz",
         "user" : "droessler",
         "description" : "",
         "date" : "2017-05-04 01:23:45",
         "changeDate" : "2017-05-03 23:23:45",
         "count" : 1,
         "url" : "http://www.horstvoelz.de/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/44263438dcdf441ae718384beb282c83/droessler",
         "tags" : [
            "analyse","computer","demokratie","fake","kritik","media","medien","meinung","politik","social","soziale","wahlen","öffentliche"
         ],
         
         "intraHash" : "44263438dcdf441ae718384beb282c83",
         "label" : "botswatch",
         "user" : "droessler",
         "description" : "",
         "date" : "2017-02-14 19:27:07",
         "changeDate" : "2017-02-14 18:27:07",
         "count" : 1,
         "url" : "http://botswatch.de/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/9f5174deb96f74b7ef54324ecd645f7c/droessler",
         "tags" : [
            "cloud","computer","internet","nextcloud","owncloud"
         ],
         
         "intraHash" : "9f5174deb96f74b7ef54324ecd645f7c",
         "label" : "Nextcloud",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-06-18 13:16:44",
         "changeDate" : "2016-06-18 11:16:44",
         "count" : 1,
         "url" : "https://nextcloud.com/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/7810e31b91299d68336bb65d4912d314/droessler",
         "tags" : [
            "computer","datenschutz","internet","owncloud","server","spreedbox","videokonferenz"
         ],
         
         "intraHash" : "7810e31b91299d68336bb65d4912d314",
         "label" : "Spreed.ME \u2013 Spreedbox",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-06-18 13:12:54",
         "changeDate" : "2016-06-18 11:12:54",
         "count" : 1,
         "url" : "https://www.spreed.me/spreedbox/?lang=de"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/a3110929fe2943b5feef93065d65c195/droessler",
         "tags" : [
            "computer","datenschutz","it","konferenz","netzpolitik","no","politik","sicherheit","spy","surveillance","überwachung"
         ],
         
         "intraHash" : "a3110929fe2943b5feef93065d65c195",
         "label" : "No-Spy | Die Konferenz",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-06-18 10:29:54",
         "changeDate" : "2016-06-18 08:29:54",
         "count" : 1,
         "url" : "https://no-spy.org/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/63cc0fd42d6d8940ba5fe80b8f770e70/droessler",
         "tags" : [
            "computer","ddr"
         ],
         
         "intraHash" : "63cc0fd42d6d8940ba5fe80b8f770e70",
         "label" : "K 1840 \u2013 Wikipedia",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-01-13 02:20:17",
         "changeDate" : "2016-01-13 01:20:17",
         "count" : 1,
         "url" : "https://de.wikipedia.org/wiki/K_1840"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2c2479ddae2366a3501bd67e81848a3a0/droessler",         
         "tags" : [
            "algorithm","algorithmen","communication","computer","macht","politik","science"
         ],
         
         "intraHash" : "c2479ddae2366a3501bd67e81848a3a0",
         "interHash" : "be0a94e5352aa7c8d26aa7014a9122fe",
         "label" : "Algorithmic Regimes: Methods, Interactions, and Politics",
         "user" : "droessler",
         "description" : "",
         "date" : "2024-07-08 17:00:27",
         "changeDate" : "2024-07-08 17:04:31",
         "count" : 1,
         "pub-type": "collection",
         "publisher":"Amsterdam University Press",
         "year": "2024", 
         "url": "http://www.jstor.org/stable/jj.11895528", 
         
         "author": [ 
            "Juliane Jarke","Bianca Prietl","Simon Egbert","Yana Boeva","Hendrik Heuer","Maike Arnold"
         ],
         "authors": [
         	
            	{"first" : "Juliane",	"last" : "Jarke"},
            	{"first" : "Bianca",	"last" : "Prietl"},
            	{"first" : "Simon",	"last" : "Egbert"},
            	{"first" : "Yana",	"last" : "Boeva"},
            	{"first" : "Hendrik",	"last" : "Heuer"},
            	{"first" : "Maike",	"last" : "Arnold"}
         ],
         "abstract": "Algorithms have risen to become one, if not the central technology for producing, circulating, and evaluating knowledge in multiple societal arenas. In this book, scholars from the social sciences, humanities, and computer science argue that this shift has, and will continue to have, profound implications for how knowledge is produced and what and whose knowledge is valued and deemed valid. To attend to this fundamental change, the authors propose the concept of algorithmic regimes and demonstrate how they transform the epistemological, methodological, and political foundations of knowledge production, sensemaking, and decision-making in contemporary societies. Across sixteen chapters, the volume offers a diverse collection of contributions along three perspectives on algorithmic regimes: the methods necessary to research and design algorithmic regimes, the ways in which algorithmic regimes reconfigure sociotechnical interactions, and the politics engrained in algorithmic regimes.",
         "urldate" : "2024-07-08",
         
         "bibtexKey": "jarke2024algorithmic"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/220ed412086ede754668bc27dda71570d/droessler",         
         "tags" : [
            "Compilers","Computer","Interpreters","Languages","Open","Programming","markdown","pandoc","programming","science","scientific","software","source","writing"
         ],
         
         "intraHash" : "20ed412086ede754668bc27dda71570d",
         "interHash" : "d29bf5bb39fc7d90398a5cb1a87497b2",
         "label" : "Introducing Markdown and Pandoc: using Markup Language and Document Converter",
         "user" : "droessler",
         "description" : "",
         "date" : "2022-02-16 16:57:26",
         "changeDate" : "2022-02-16 15:57:26",
         "count" : 1,
         "pub-type": "book",
         "series": "Springer eBooks. Professional and Applied Computing","publisher":"Apress","address":"New York",
         "year": "2019", 
         "url": "http://dx.doi.org/10.1007/978-1-4842-5149-2", 
         
         "author": [ 
            "Thomas Mailund"
         ],
         "authors": [
         	
            	{"first" : "Thomas",	"last" : "Mailund"}
         ],
         "note": "1 Online-Ressource (IX, 139 Seiten)","abstract": "1: The Beginner's Guide to Markdown and Pandoc -- 2: Why Use Markdown and Pandoc -- 3: Writing Markdown -- 4: Pandoc Markdown Extensions -- 5: Translating Documents -- 6: Math and Computer Programming Languages -- 7: Cross-referencing -- 8: Metadata -- 9: Using Templates -- 10: Preprocessing -- 11: Filters -- 12: Conclusions",
         "isbn" : "9781484251492",
         
         "language" : "Englisch",
         
         "bibtexKey": "mailund2019introducing"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2775a85e41d798f3dd24162e6fc965621/droessler",         
         "tags" : [
            "Computer","Mathematics","englisch","latex","latex-kurs","mathematik","schreiben","science","wissenschaftliches"
         ],
         
         "intraHash" : "775a85e41d798f3dd24162e6fc965621",
         "interHash" : "745b3dfa9f708b8196d855347999fe36",
         "label" : "More Math Into LaTeX",
         "user" : "droessler",
         "description" : "",
         "date" : "2020-12-17 15:13:49",
         "changeDate" : "2020-12-17 14:20:17",
         "count" : 1,
         "pub-type": "book",
         "series": "SpringerLink. Bücher","publisher":"Springer","address":"Cham",
         "year": "2016", 
         "url": "http://swbplus.bsz-bw.de/bsz461145707cov.htm", 
         
         "author": [ 
            "George Grätzer"
         ],
         "authors": [
         	
            	{"first" : "George",	"last" : "Grätzer"}
         ],
         "note": "Online-Ressource (XXX, 609 p. 76 illus., 23 illus. in color, online resource)",
         "isbn" : "9783319237961",
         
         "language" : "Englisch",
         
         "bibtexKey": "graetzer2016latex"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2c88eb3ee8131d3b59ae26da22f478b81/droessler",         
         "tags" : [
            "cloud","computer","cyberangriff","cybercrime","giesen","gießen","hacker","hessenbox","it-sicherheit","sicherheit","software","uni"
         ],
         
         "intraHash" : "c88eb3ee8131d3b59ae26da22f478b81",
         "interHash" : "964355ace7a3cdd9ec57bb631ccce1e2",
         "label" : "Cyberangriff: Gießen ist off",
         "user" : "droessler",
         "description" : "",
         "date" : "2019-12-19 15:50:01",
         "changeDate" : "2019-12-19 14:50:01",
         "count" : 1,
         "pub-type": "article",
         "journal": "ZEIT online",
         "year": "2019", 
         "url": "https://www.zeit.de/campus/2019-12/cyberangriff-giessen-justus-liebig-universitaet-internet-offline/komplettansicht?print", 
         
         "author": [ 
            "Carla Baum"
         ],
         "authors": [
         	
            	{"first" : "Carla",	"last" : "Baum"}
         ],
         
         "bibtexKey": "baum2019cyberangriff"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2686d595ee1375c91097b0ba2adf4ff9d/droessler",         
         "tags" : [
            "computer","internet","it","it-sicherheit","passwort","passwörter","sicherheit","verschlüsselung"
         ],
         
         "intraHash" : "686d595ee1375c91097b0ba2adf4ff9d",
         "interHash" : "f8ab3b2dbd8c9b582ec76e7c2d208ac5",
         "label" : "IT-Sicherheit: Sogar \"ji32k7au4a83\" ist ein mieses Passwort",
         "user" : "droessler",
         "description" : "",
         "date" : "2019-03-11 17:14:17",
         "changeDate" : "2019-03-11 16:14:17",
         "count" : 1,
         "pub-type": "article",
         "journal": "Süddeutsche Zeitung",
         "year": "2019", 
         "url": "https://www.sueddeutsche.de/digital/sichere-passwoerter-jikaua-1.4355234", 
         
         "author": [ 
            "Simon Hurtz"
         ],
         "authors": [
         	
            	{"first" : "Simon",	"last" : "Hurtz"}
         ],
         
         "bibtexKey": "hurtz2019itsicherheit"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2bef4ffe7c29508947206d8e2018b83a4/droessler",         
         "tags" : [
            "computer","gesellschaft","luhmann","soziologie"
         ],
         
         "intraHash" : "bef4ffe7c29508947206d8e2018b83a4",
         "interHash" : "bfc349704d3a634c25ff45f81d3adc81",
         "label" : "Niklas Luhmanns Aktualität : Macht der Computer die Gesellschaft unsichtbar?",
         "user" : "droessler",
         "description" : "",
         "date" : "2018-05-12 22:30:43",
         "changeDate" : "2018-05-12 20:30:43",
         "count" : 1,
         "pub-type": "article",
         "journal": "Frankfurter Allgemeine",
         "year": "2018", 
         "url": "http://www.faz.net/aktuell/feuilleton/hoch-schule/niklas-luhmann-macht-der-computer-die-gesellschaft-unsichtbar-15217893.html?printPagedArticle=true#void", 
         
         "author": [ 
            "Gerald Wagner"
         ],
         "authors": [
         	
            	{"first" : "Gerald",	"last" : "Wagner"}
         ],
         "abstract": "Vor zwanzig Jahren schrieb Niklas Luhmann mit \u201EDie Gesellschaft der Gesellschaft\u201C das Opus Magnum der Systemtheorie. Leben wir heute noch in der funktional differenzierten Sozialform, die er dort beschrieb?",
         "bibtexKey": "wagner2018niklas"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/23baccbb4c6821be7be734ad05c7a48df/droessler",         
         "tags" : [
            "computer","datensicherheit","internet","passwort","passwörter","sicherheit","software"
         ],
         
         "intraHash" : "3baccbb4c6821be7be734ad05c7a48df",
         "interHash" : "eba9b6a7301d3a60d084a379785454f5",
         "label" : "Warum es keine gute Idee ist, Passwörter regelmäßig zu ändern",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-08-03 23:45:26",
         "changeDate" : "2016-11-25 10:30:24",
         "count" : 1,
         "pub-type": "article",
         "journal": "Süddeutsche Zeitung",
         "year": "2016", 
         "url": "http://www.sueddeutsche.de/digital/2.220/it-sicherheit-warum-es-keine-gute-idee-ist-passwoerter-regelmaessig-zu-aendern-1.3106648", 
         
         "author": [ 
            "Simon Hurtz"
         ],
         "authors": [
         	
            	{"first" : "Simon",	"last" : "Hurtz"}
         ],
         
         "timestamp" : "2016-08-03 11:45:26",
         
         "username" : "droessler",
         
         "intrahash" : "3baccbb4c6821be7be734ad05c7a48df",
         
         "file" : ":2016-08-03_passwörter.pdf:PDF",
         
         "interhash" : "eba9b6a7301d3a60d084a379785454f5",
         
         "groups" : "public",
         
         "bibtexKey": "Hurtz2016"

      }
	  
   ]
}
