{"viewingHint":"paged","service":[],"structures":[],"sequences":[{"canvases":[{"height":2339,"width":1653,"images":[{"resource":{"service":{"profile":"http://iiif.io/api/image/2/level2.json","@context":"http://iiif.io/api/image/2/context.json","@id":"https://noah.nrw/i3f/v20/4973184"},"format":"image/jpeg","height":1415,"width":1000,"@id":"https://noah.nrw/download/webcache/1000/4973184","@type":"dctypes:Image"},"on":"https://noah.nrw/i3f/v20/4281286/canvas/4973184","motivation":"sc:painting","@id":"https://noah.nrw/i3f/v20/4281286/annotation/4973184","@type":"oa:Annotation"}],"label":"[1]","@id":"https://noah.nrw/i3f/v20/4281286/canvas/4973184","@type":"sc:Canvas"},{"height":2339,"width":1653,"images":[{"resource":{"service":{"profile":"http://iiif.io/api/image/2/level2.json","@context":"http://iiif.io/api/image/2/context.json","@id":"https://noah.nrw/i3f/v20/4973185"},"format":"image/jpeg","height":1415,"width":1000,"@id":"https://noah.nrw/download/webcache/1000/4973185","@type":"dctypes:Image"},"on":"https://noah.nrw/i3f/v20/4281286/canvas/4973185","motivation":"sc:painting","@id":"https://noah.nrw/i3f/v20/4281286/annotation/4973185","@type":"oa:Annotation"}],"label":"[2]","@id":"https://noah.nrw/i3f/v20/4281286/canvas/4973185","@type":"sc:Canvas"}],"viewingHint":"paged","startCanvas":"https://noah.nrw/i3f/v20/4281286/canvas/4973184","viewingDirection":"left-to-right","label":"Current Page Order","@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://noah.nrw/i3f/v20/4281286/sequence/normal","@type":"sc:Sequence"}],"label":"Was ist das \"Grundrecht auf Integrit\u00e4t und Vertraulichkeit informationstechnischer Systeme\"?","thumbnail":{"width":304,"height":430,"@id":"https://noah.nrw/i3f/v21/4973184/full/304/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg"},"logo":{"@id":"https://noah.nrw/domainresource/static/graphics/connectors/viewerLogo.gif","service":{"profile":"http://iiif.io/api/image/2/level2.json","@context":"http://iiif.io/api/image/2/context.json","@id":""}},"@context":"http://iiif.io/api/presentation/2/context.json","seeAlso":{"format":"application/xml","@id":"https://noah.nrw/oai?verb=GetRecord&metadataPrefix=mets&identifier=4281286","label":"METS"},"@id":"https://noah.nrw/i3f/v20/4281286/manifest","@type":"sc:Manifest","metadata":[{"value":"Was ist das \"Grundrecht auf Integrit\u00e4t und Vertraulichkeit informationstechnischer Systeme\"?","label":"Titel"},{"value":"Hoeren, Thomas","label":"Verfasser"},{"value":"Hoeren, Thomas Johannes","label":"Verfasser"},{"value":"2008","label":"Erschienen"},{"value":"Deutsch","label":"Sprache"},{"value":"Multimedia und Recht (MMR) 11 (2008) 6, 365-366","label":"Bibl. Referenz"},{"value":"Aufsatz in einer Zeitschrift","label":"Dokumenttyp"},{"value":"Grundrecht / Integrit\u00e4t / Vertraulichkeit","label":"Schlagw\u00f6rter (DE)"},{"value":"urn:nbn:de:hbz:6-63349473584","label":"URN"}]}