Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/dud:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/dud/AppeltG24, author = {Dominik Appelt and Ines Geissler}, title = {Datenschutzsensibilisierung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {125--127}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1892-8}, doi = {10.1007/S11623-023-1892-8}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/AppeltG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BarchnickiM24, author = {Sebastian Barchnicki and Arbnor Memeti}, title = {,,Basispaket Cybersicherheit"}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {16--20}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1873-y}, doi = {10.1007/S11623-023-1873-Y}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BarchnickiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BleckmannBGKM24, author = {Felix Bleckmann and Christopher Boysen and Anika Gehlen and Felix Ku{\ss}maul and Nils Michael}, title = {Mit Sicherheit Vertrauen schaffen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {222--226}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1913-2}, doi = {10.1007/S11623-024-1913-2}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BleckmannBGKM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BollS24, author = {Alina Boll and Annika Selzer}, title = {Die Datenschutz-Vorsorge {(DS-V)}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {44--48}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1878-6}, doi = {10.1007/S11623-023-1878-6}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BollS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BollS24a, author = {Alina Boll and Sarah Stummer}, title = {Erste Schritte im Rahmen der Datenschutz-Vorsorge}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {118--124}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1891-9}, doi = {10.1007/S11623-023-1891-9}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BollS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BollSS24, author = {Alina Boll and Sarah Stummer and Annika Selzer}, title = {Datenschutz-Vorsorge}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {172--176}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1902-x}, doi = {10.1007/S11623-023-1902-X}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BollSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BosseDGSS24, author = {Christian K. Bosse and Florian Dehling and Eduard C. Groen and Simone Salemi and Hartmut Schmitt}, title = {Auf dem Weg zu gebrauchstauglichen Datenschutzl{\"{o}}sungen f{\"{u}}r digitale {\"{O}}kosysteme}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {82--88}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1886-6}, doi = {10.1007/S11623-023-1886-6}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BosseDGSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner24, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {50--59}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1880-z}, doi = {10.1007/S11623-023-1880-Z}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner24a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {190--196}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1906-6}, doi = {10.1007/S11623-023-1906-6}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DehlingLWF24, author = {Florian Dehling and Stefanie Ludborzs and Andreas We{\ss}ner and Rodrigo Falc{\~{a}}o}, title = {Konzepte f{\"{u}}r gebrauchstaugliche Datenschutzfunktionen in digitalen {\"{O}}kosystemen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {95--102}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1888-4}, doi = {10.1007/S11623-023-1888-4}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DehlingLWF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dehning24, author = {Oliver Dehning}, title = {Transparenz in der IT-Supply-Chain}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {25--30}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1875-9}, doi = {10.1007/S11623-023-1875-9}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dehning24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dukek24, author = {Martin Dukek}, title = {Ransomware-as-a-Service}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {153--157}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1898-2}, doi = {10.1007/S11623-023-1898-2}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dukek24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EntschewB24, author = {Enrico Entschew and Paul van Brouwershaven}, title = {QWACs in the context of the trust spaces of the browsers and eIDAS 2.0}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {246--250}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1918-x}, doi = {10.1007/S11623-024-1918-X}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EntschewB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fehenberger24, author = {Tobias Fehenberger}, title = {Kryptoagilit{\"{a}}t: Ist die Zeit gekommen?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {21--24}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1874-x}, doi = {10.1007/S11623-023-1874-X}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fehenberger24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FethR24, author = {Denis Feth and Bernd Rauch}, title = {Datentreuh{\"{a}}nder in der Praxis}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {103--109}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1889-3}, doi = {10.1007/S11623-023-1889-3}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FethR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FethSI24, author = {Denis Feth and Hartmut Schmitt and Luigi Lo Iacono}, title = {Daten{\"{o}}konomie trifft Datenschutz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {73}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1883-9}, doi = {10.1007/S11623-023-1883-9}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FethSI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox24, author = {Dirk Fox}, title = {Checks and Balances}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {149}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1896-4}, doi = {10.1007/S11623-023-1896-4}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fuchs24, author = {Thomas Fuchs}, title = {EuGH-Urteil zu KI-Entscheidungen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {76}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1884-8}, doi = {10.1007/S11623-023-1884-8}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fuchs24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GajekLS24, author = {Sebastian Gajek and S{\"{o}}ren Langenberg and Christian St{\"{u}}ble}, title = {Confidential Cloud Computing}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {31--36}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1876-8}, doi = {10.1007/S11623-023-1876-8}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GajekLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geissler24, author = {Ines Geissler}, title = {Virtuelles Weiterleben}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {164--168}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1900-z}, doi = {10.1007/S11623-023-1900-Z}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Geissler24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrancF24, author = {Franziska Granc and Arno Fiedler}, title = {Mit Interoperabilit{\"{a}}t zur Europ{\"{a}}ischen Souver{\"{a}}nit{\"{a}}t?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {217--221}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1912-3}, doi = {10.1007/S11623-024-1912-3}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrancF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber24, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {69--72}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1882-x}, doi = {10.1007/S11623-023-1882-X}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gruber24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber24a, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {205--208}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1908-4}, doi = {10.1007/S11623-023-1908-4}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gruber24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HannekeBSH24, author = {Bj{\"{o}}rn Hanneke and Lorenz Baum and Christian H. Schunck and Oliver Hinz}, title = {Privatsph{\"{a}}renfreundliche Plattformgesch{\"{a}}ftsmodelle}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {89--94}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1887-5}, doi = {10.1007/S11623-023-1887-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HannekeBSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kamp24, author = {Meike Kamp}, title = {Herausgabe von Mitgliederlisten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {212}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1910-5}, doi = {10.1007/S11623-024-1910-5}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kamp24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber24, author = {Ulrich Kelber}, title = {{IWGDPT} Gemeinsames Statement zur Berlin Group}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {152}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1897-3}, doi = {10.1007/S11623-023-1897-3}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lapp24, author = {Thomas Lapp}, title = {Sichere europ{\"{a}}ische elektronische Identit{\"{a}}ten - eIDAS 2.0}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {213--216}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1911-4}, doi = {10.1007/S11623-024-1911-4}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lapp24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LichtG24, author = {Christoph Licht and Ludwig Gramlich}, title = {Datenschutz bei Meldestellen nach dem Hinweisgeberschutzgesetz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {37--43}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1877-7}, doi = {10.1007/S11623-023-1877-7}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LichtG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LiptakW24, author = {Patrick Liptak and Andreas Wand}, title = {The {PSD2} model as a prototype of trustworthy interface authentication}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {241--245}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1917-y}, doi = {10.1007/S11623-024-1917-Y}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LiptakW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LorenzF24, author = {Ingo Lorenz and Dirk Fox}, title = {Ein Reifegradmodell f{\"{u}}r die Datenschutzorganisation}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {183--187}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1904-8}, doi = {10.1007/S11623-023-1904-8}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LorenzF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen24, author = {Kim Nguyen}, title = {Ein sicheres und vertrauensw{\"{u}}rdiges ID-{\"{O}}kosystem - ein wichtiges Ziel f{\"{u}}r Europa!}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {209}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1909-y}, doi = {10.1007/S11623-024-1909-Y}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nguyen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri24, author = {Thomas Petri}, title = {Informationelle Selbstbestimmung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {128--129}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1893-7}, doi = {10.1007/S11623-023-1893-7}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann24, author = {Norbert Pohlmann}, title = {Aktuelle Herausforderungen der IT-Sicherheit}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1869-7}, doi = {10.1007/S11623-023-1869-7}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann24a, author = {Norbert Pohlmann}, title = {Die Notwendigkeit von neuen IT-Sicherheitskonzepten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {5--10}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1871-0}, doi = {10.1007/S11623-023-1871-0}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR24, author = {Norbert Pohlmann and Helmut Reimer}, title = {Regulierung und B{\"{u}}rokratie}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {49}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1879-5}, doi = {10.1007/S11623-023-1879-5}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer24, author = {Helmut Reimer}, title = {DuD Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {60--69}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1881-y}, doi = {10.1007/S11623-023-1881-Y}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer24a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {197--205}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1907-5}, doi = {10.1007/S11623-023-1907-5}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SalemiH24, author = {Simone Salemi and Ajla Hajric}, title = {K{\"{o}}nnen Datensch{\"{u}}tzer aus Konzepten des sexuellen Konsenses lernen?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {177--182}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1903-9}, doi = {10.1007/S11623-023-1903-9}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SalemiH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmittSI24, author = {Hartmut Schmitt and Christian H. Schunck and Luigi Lo Iacono}, title = {Daten{\"{o}}konomie in digitalen {\"{O}}kosystemen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {77--81}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1885-7}, doi = {10.1007/S11623-023-1885-7}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchmittSI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchulmannW24, author = {Haya Schulmann and Michael Waidner}, title = {Wie Deutschland zur Cybernation wird}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {11--15}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1872-z}, doi = {10.1007/S11623-023-1872-Z}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchulmannW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchwalmM24, author = {Steffen Schwalm and Kersten Mueller}, title = {Qualifizierte Ledger - der Durchbruch f{\"{u}}r Blockchain}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {227--231}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1914-1}, doi = {10.1007/S11623-024-1914-1}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchwalmM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SeegebarthBK24, author = {Christian Seegebarth and Paul Bastian and Micha Kraus}, title = {Enabling attribute attestations}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {237--240}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1916-z}, doi = {10.1007/S11623-024-1916-Z}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SeegebarthBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SpechtRiemenschneiderH24, author = {Louisa Specht{-}Riemenschneider and Bernadette Heineking}, title = {Datenverarbeitung in sicheren Verarbeitungsumgebungen am Beispiel von MRT-Gehirnscans}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {110--117}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1890-x}, doi = {10.1007/S11623-023-1890-X}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SpechtRiemenschneiderH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SteffesZ24, author = {Bianca Steffes and Anna Zichler}, title = {Deepfakes in Videoverhandlungen vor Gericht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {158--163}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1899-1}, doi = {10.1007/S11623-023-1899-1}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SteffesZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld24, author = {Marie{-}Theres Tinnefeld}, title = {Kunstfreiheit und Pers{\"{o}}nlichkeitsschutz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {169--171}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1901-y}, doi = {10.1007/S11623-023-1901-Y}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wand24, author = {Andreas Wand}, title = {Die geldw{\"{a}}scherechtliche Identifizierung durch eIDAS-Mittel}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {232--236}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1915-0}, doi = {10.1007/S11623-024-1915-0}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wand24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WegenerG24, author = {Christoph Wegener and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {268--272}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1921-2}, doi = {10.1007/S11623-024-1921-2}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WegenerG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert24, author = {Thilo Weichert}, title = {Ausl{\"{a}}nderzentralregister}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {3}, pages = {188--189}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1905-7}, doi = {10.1007/S11623-023-1905-7}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Weichert24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24, title = {45. Informationsfreiheitskonferenz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {1}, pages = {4}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1870-1}, doi = {10.1007/S11623-023-1870-1}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24a, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {130--137}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1894-6}, doi = {10.1007/S11623-023-1894-6}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24b, title = {DuD Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {2}, pages = {138--148}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1895-5}, doi = {10.1007/S11623-023-1895-5}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24c, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {251--260}, year = {2024}, url = {https://doi.org/10.1007/s11623-023-1919-1}, doi = {10.1007/S11623-023-1919-1}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X24d, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {48}, number = {4}, pages = {261--268}, year = {2024}, url = {https://doi.org/10.1007/s11623-024-1920-3}, doi = {10.1007/S11623-024-1920-3}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X24d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BahriniMSM23, author = {Mehrdad Bahrini and Thomas M{\"{u}}nder and Karsten Sohr and Rainer Malaka}, title = {Verst{\"{a}}ndliche Informationssicherheit in Smarthome-Netzen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {350--353}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1775-z}, doi = {10.1007/S11623-023-1775-Z}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BahriniMSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bauer23, author = {Paul Bauer}, title = {Zero Trust f{\"{u}}r eine robuste Cyberresilienz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {609--612}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1829-2}, doi = {10.1007/S11623-023-1829-2}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bauer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Baum23, author = {Gerhart Baum}, title = {Die Verteidigung der Demokratie in Zeiten des Epochenbruchs}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {574--577}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1821-x}, doi = {10.1007/S11623-023-1821-X}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Baum23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Becker23, author = {Friedrich{-}Philipp Becker}, title = {Umgang mit Gesch{\"{a}}ftsgeheimnissen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {167--168}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1738-4}, doi = {10.1007/S11623-023-1738-4}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Becker23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bergt23, author = {Matthias Bergt}, title = {Wann ist eine Auftragsverarbeitung eine Auftragsverarbeitung?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {169--172}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1739-3}, doi = {10.1007/S11623-023-1739-3}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bergt23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bernzen23, author = {Anna K. Bernzen}, title = {Daten gegen digitale Produkte}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {761--765}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1859-9}, doi = {10.1007/S11623-023-1859-9}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bernzen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BlaicherS23, author = {Christian Blaicher and Friederike Schellhas{-}Mende}, title = {Datenschutzrechtliche Gestaltung von E-Mail-Tracking und -Profiling}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {269--274}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1760-6}, doi = {10.1007/S11623-023-1760-6}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BlaicherS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann23, author = {Dominik Bleckmann}, title = {Gesch{\"{a}}ftsgeheimnis - Das Pendant zum Datenschutz?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {89--95}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1723-y}, doi = {10.1007/S11623-023-1723-Y}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann23a, author = {Dominik Bleckmann}, title = {Compliance und {KRITIS}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {545--547}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1815-8}, doi = {10.1007/S11623-023-1815-8}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BohlenderDV23, author = {Mark Bohlender and Heike Dietmann and Melanie Volkamer}, title = {Cookie-Nutzung nach Inkrafttreten des {TTDSG}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {283--288}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1762-4}, doi = {10.1007/S11623-023-1762-4}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BohlenderDV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Boll23, author = {Alina Boll}, title = {Ohne Cybersicherheit kein Datenschutz, ohne Datenschutz keine Cybersicherheit?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {346--349}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1774-0}, doi = {10.1007/S11623-023-1774-0}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Boll23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BressnerGR23, author = {Steven Bressner and Natascha Gaden and Jakob Riediger}, title = {Der Cyber Resilience Act}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {327--331}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1770-4}, doi = {10.1007/S11623-023-1770-4}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BressnerGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner23, author = {Benedikt Buchner}, title = {DuDRecht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {110--118}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1727-7}, doi = {10.1007/S11623-023-1727-7}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner23a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {376--382}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1780-2}, doi = {10.1007/S11623-023-1780-2}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner23b, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {521--526}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1810-0}, doi = {10.1007/S11623-023-1810-0}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner23c, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {657--666}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1839-0}, doi = {10.1007/S11623-023-1839-0}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner23d, author = {Benedikt Buchner}, title = {Der Schutz von Minderj{\"{a}}hrigen in der Daten{\"{o}}konomie}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {756--760}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1855-0}, doi = {10.1007/S11623-023-1855-0}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner23d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BuscherHSZGDSSW23, author = {Maximilian B{\"{u}}scher and Gerrit Hornung and Stephan Schindler and Paul Zurawski and Amina Gutjahr and Indra Spiecker genannt D{\"{o}}hmann and Annika Selzer and Sarah Stummer and Thomas Wilmer}, title = {Abschreckungseffekte und {\"{U}}berwachungsgef{\"{u}}hl im Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {503--512}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1807-8}, doi = {10.1007/S11623-023-1807-8}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BuscherHSZGDSSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad23, author = {Conrad Sebastian Conrad}, title = {Datenschutz bei Live-Ortung {\&} GPS-Tracking von Besch{\"{a}}ftigten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {548--552}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1816-7}, doi = {10.1007/S11623-023-1816-7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DausP23, author = {Lucas Daus and Philipp Przybylski}, title = {Business Continuity Management und Informationssicherheit}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {416--419}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1789-6}, doi = {10.1007/S11623-023-1789-6}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DausP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DietrichSEP23, author = {Andr{\'{e}} Dietrich and Christopher Schmidt and Nico Enghardt and Tobias Philipp}, title = {Lazily-Verifiable {SAT} Proof Checker in {SPARK} 2014}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {487--491}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1804-y}, doi = {10.1007/S11623-023-1804-Y}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DietrichSEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dolle23, author = {Wilhelm Dolle}, title = {Nachhaltiger Aufbau eines {ISMS}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {393}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1783-z}, doi = {10.1007/S11623-023-1783-Z}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dolle23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DurmusE23, author = {Erdem Durmus and Jens Engelhardt}, title = {Die Rechtm{\"{a}}{\ss}igkeit der Verarbeitung von Vertreter- und Ansprechpartnerdaten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {160--166}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1737-5}, doi = {10.1007/S11623-023-1737-5}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DurmusE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EngelbrechtGGRSS23, author = {Stefan Engelbrecht and Jens Gerber and Michael Gyollai and Philipp Joachim Rosch and Cord C. Schulz and Annika Selzer}, title = {Digitalisierung in Deutschland}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {343--345}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1773-1}, doi = {10.1007/S11623-023-1773-1}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EngelbrechtGGRSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Folkers23, author = {Elena Folkerts}, title = {Konzerninterner Austausch von Besch{\"{a}}ftigtendaten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {69--72}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1719-7}, doi = {10.1007/S11623-023-1719-7}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Folkers23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Folkerts23, author = {Elena Folkerts}, title = {Publisher Erratum zu: Konzerninterner Austausch von Besch{\"{a}}ftigtendaten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {314}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1742-8}, doi = {10.1007/S11623-023-1742-8}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Folkerts23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Frankenstein23, author = {Ronny Frankenstein}, title = {{BSI} IT-Grundschutz - Arbeitswerkzeug f{\"{u}}r ganzheitliche Informationssicherheit}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {410--415}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1788-7}, doi = {10.1007/S11623-023-1788-7}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Frankenstein23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Freiberg23, author = {Ann{-}Kathrin Freiberg}, title = {Lebenderkennung - Schutz f{\"{u}}r die biometrische Identit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {11--14}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1708-2}, doi = {10.1007/S11623-022-1708-2}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Freiberg23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FrickSZ23, author = {Raphael Antonius Frick and Martin Steinebach and Sascha Zmudzinski}, title = {Deepfakes, Dall-E {\&} Co}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {203--208}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1746-4}, doi = {10.1007/S11623-023-1746-4}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FrickSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FuhrR23, author = {David Fuhr and Dror{-}John R{\"{o}}cher}, title = {0 Trust, 100 {\%} Trust Anchor}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {633--637}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1834-5}, doi = {10.1007/S11623-023-1834-5}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FuhrR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GartnerS23, author = {Tanya G{\"{a}}rtner and Annika Selzer}, title = {Angemessene technische und organisatorische Ma{\ss}nahmen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {289--294}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1763-3}, doi = {10.1007/S11623-023-1763-3}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GartnerS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GartnerS23a, author = {Tanya G{\"{a}}rtner and Annika Selzer}, title = {Metrikensysteme als Beitrag zur Umsetzung des risikobasierten Ansatzes}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {367--371}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1778-9}, doi = {10.1007/S11623-023-1778-9}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GartnerS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerpottM23, author = {Torsten J. Gerpott and Tobias Mikolas}, title = {Auskunftsbegehren nach Art. 15 {DS-GVO} in der Praxis}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {361--366}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1777-x}, doi = {10.1007/S11623-023-1777-X}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerpottM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gramlich23, author = {Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {126--129}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1729-5}, doi = {10.1007/S11623-023-1729-5}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gramlich23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gramlich23a, author = {Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {390--392}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1782-0}, doi = {10.1007/S11623-023-1782-0}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gramlich23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichG23, author = {Ludwig Gramlich and Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {256--260}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1755-3}, doi = {10.1007/S11623-023-1755-3}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichG23a, author = {Ludwig Gramlich and Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {465--468}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1798-5}, doi = {10.1007/S11623-023-1798-5}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichG23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grimm23, author = {R{\"{u}}diger Grimm}, title = {K{\"{u}}nstliche Intelligenz {(KI)} zur Abwehr von Cyber-Angriffen und Cyber-Angriffe auf {KI}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {197}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1743-7}, doi = {10.1007/S11623-023-1743-7}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Grimm23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GroothiusS23, author = {Florian Groothius and Olga Stepanova}, title = {Bu{\ss}geldpraxis der {CNIL} und der deutschen Aufsichtsbeh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {295--298}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1764-2}, doi = {10.1007/S11623-023-1764-2}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GroothiusS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gunay23, author = {Buket G{\"{u}}nay}, title = {Biometrische Daten aus der Perspektive der {DSGVO}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {96--99}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1724-x}, doi = {10.1007/S11623-023-1724-X}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gunay23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Halvani23, author = {Oren Halvani}, title = {M{\"{o}}glichkeiten zur Erkennung von Hate Speech}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {209--214}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1747-3}, doi = {10.1007/S11623-023-1747-3}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Halvani23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HansenP23, author = {Marit Hansen and Thomas Probst}, title = {Souver{\"{a}}ne Sicherheit, Zero Trust und das Datenschutzrecht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {623--628}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1832-7}, doi = {10.1007/S11623-023-1832-7}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HansenP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HartmannKW23, author = {Marcus Hartmann and Tatiana Kulminskaya and Monika Wojtowicz}, title = {Chief Data Officer: Bindeglied in der Organisation um den Wert von Daten zu maximieren}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {446--449}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1795-8}, doi = {10.1007/S11623-023-1795-8}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HartmannKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HelmkeLS23, author = {Jan Torben Helmke and Hendrik Link and Hans{-}Hermann Schild}, title = {Zertifizierungskriterien f{\"{u}}r Verarbeitungst{\"{a}}tigkeiten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {100--107}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1725-9}, doi = {10.1007/S11623-023-1725-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HelmkeLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HesselPTV23, author = {Stefan Hessel and Karin Potel and Hendrik T{\"{o}}pper and Lea Vietze}, title = {Datenschutz bei Hinweisgebersystemen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {440--445}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1794-9}, doi = {10.1007/S11623-023-1794-9}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HesselPTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hummert23, author = {Christian Hummert}, title = {Cyberagentur: Der besondere Weg zur digitalen Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {425--428}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1791-z}, doi = {10.1007/S11623-023-1791-Z}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hummert23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JassA0WWCFS23, author = {Philipp Jass and Hamzih Abukhashab and Carsten Thomas and Peter Woltersdorf and Michael Weber and Mirko Conrad and Ines Fey and Harald Sch{\"{u}}lzke}, title = {CertML: Initial Steps Towards Using N-Version Neural Networks for Improving {AI} Safety}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {483--486}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1803-z}, doi = {10.1007/S11623-023-1803-Z}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JassA0WWCFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KarabogaFERF23, author = {Murat Karaboga and Nula Frei and Frank Ebbers and Sophia Rovelli and Michael Friedewald}, title = {Emotions- und Krankheitserkennung mittels biometrischer Verfahren}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {553--559}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1817-6}, doi = {10.1007/S11623-023-1817-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KarabogaFERF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber23, author = {Ulrich Kelber}, title = {Medizinische Forschung mit Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {6}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1706-4}, doi = {10.1007/S11623-022-1706-4}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber23a, author = {Ulrich Kelber}, title = {Petersberger Erkl{\"{a}}rung zur datenschutzkonformen Verarbeitung von Gesundheitsdaten in der wissenschaftlichen Forschung}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {42--45}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1714-4}, doi = {10.1007/S11623-022-1714-4}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KellerP23, author = {Hubert B. Keller and Erhard Pl{\"{o}}dereder}, title = {Sicherheit trotz {KI}}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {469--470}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1799-4}, doi = {10.1007/S11623-023-1799-4}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KellerP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KellySV23, author = {Una M. Kelly and Luuk J. Spreeuwers and Raymond N. J. Veldhuis}, title = {De-Identifikation von Gesichtsbildern}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {27--30}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1711-7}, doi = {10.1007/S11623-022-1711-7}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KellySV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker23, author = {Dennis{-}Kenji Kipker}, title = {Die Evolution des Cybersecurity-Rechts: Vom Kernkraftwerk bis zur elektrischen Zahnb{\"{u}}rste}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {321}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1768-y}, doi = {10.1007/S11623-023-1768-Y}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerM23, author = {Dennis{-}Kenji Kipker and Sebastian Mayr}, title = {Zur Unabh{\"{a}}ngigkeit des {BSI}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {790--795}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1864-z}, doi = {10.1007/S11623-023-1864-Z}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Klages23, author = {Falko D. Klages}, title = {Konzernprivilegien in Compliance-Management-Systemen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {86--88}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1722-z}, doi = {10.1007/S11623-023-1722-Z}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Klages23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KleberW23, author = {Stephan Kleber and Patrick Wachter}, title = {A Strategy to Evaluate Test Time Evasion Attack Feasibility}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {478--482}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1802-0}, doi = {10.1007/S11623-023-1802-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KleberW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Knittl23, author = {Silvia Knittl}, title = {Zero Trust: Die letzte Bastion f{\"{u}}r die IT-Sicherheit deutscher Beh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {617--622}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1831-8}, doi = {10.1007/S11623-023-1831-8}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Knittl23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kohn23, author = {Matthias Kohn}, title = {Automatisierte Analyse von Datenschutzerkl{\"{a}}rungen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {149--153}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1735-7}, doi = {10.1007/S11623-023-1735-7}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kohn23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kohpeiss23, author = {Marcel Kohpei{\ss}}, title = {Verpflichtung zur intelligenten Angriffserkennung?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {220--224}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1749-1}, doi = {10.1007/S11623-023-1749-1}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kohpeiss23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kolberg23, author = {Jascha Kolberg}, title = {Fairness von Biometrischen Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {15--21}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1709-1}, doi = {10.1007/S11623-022-1709-1}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kolberg23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KopmannHZ23, author = {Samuel Kopmann and Hauke Heseding and Martina Zitterbart}, title = {Toward Joining DDoS Mitigation and Image Segmentation}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {475--477}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1801-1}, doi = {10.1007/S11623-023-1801-1}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KopmannHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kreutziger23, author = {Sascha Kreutziger}, title = {Datenschutz und Informationssicherheit - eng verzahnt mit einem {GRC} Tool}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {420--424}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1790-0}, doi = {10.1007/S11623-023-1790-0}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kreutziger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kubis23, author = {Marcel Kubis}, title = {Informationelle Selbstbestimmung bei datengetriebenen Gesch{\"{a}}ftsmodellen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {766--770}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1860-3}, doi = {10.1007/S11623-023-1860-3}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kubis23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann23, author = {Dieter Kugelmann}, title = {Neue Inhalte zu {KI} und ChatGPT}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {202}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1745-5}, doi = {10.1007/S11623-023-1745-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KugelmannG23, author = {Dieter Kugelmann and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {812--816}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1868-8}, doi = {10.1007/S11623-023-1868-8}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KugelmannG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhlingB23, author = {J{\"{u}}rgen K{\"{u}}hling and Benedikt Buchner}, title = {R{\"{u}}ckschlag f{\"{u}}r Meta beim EuGH}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {519--520}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1809-6}, doi = {10.1007/S11623-023-1809-6}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KuhlingB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhlingB23a, author = {J{\"{u}}rgen K{\"{u}}hling and Benedikt Buchner}, title = {Daten gegen Leistung - auf dem Weg zu einer Kommerzialisierungsfairness?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {745}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1857-y}, doi = {10.1007/S11623-023-1857-Y}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KuhlingB23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhlingS23, author = {J{\"{u}}rgen K{\"{u}}hling and Paul M. Schwartz}, title = {Daten gegen Leistung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {749--755}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1854-1}, doi = {10.1007/S11623-023-1854-1}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KuhlingS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LoberR23, author = {Lena Isabell L{\"{o}}ber and Alexander Ro{\ss}nagel}, title = {Konkretisierung von Privacy by Design durch Anforderungs- und Entwurfsmuster}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {137--143}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1733-9}, doi = {10.1007/S11623-023-1733-9}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LoberR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MaierR23, author = {Anatol Maier and Christian Riess}, title = {Zuverl{\"{a}}ssigkeit von {KI} in der Multimedia-Forensik}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {215--219}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1748-2}, doi = {10.1007/S11623-023-1748-2}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MaierR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MakrushinD23, author = {Andrey Makrushin and Jana Dittmann}, title = {Synthetische Daten in der Biometrie}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {22--26}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1710-8}, doi = {10.1007/S11623-022-1710-8}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MakrushinD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Maseberg23, author = {S{\"{o}}nke Maseberg}, title = {KRITIS-Regularien}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {541--544}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1814-9}, doi = {10.1007/S11623-023-1814-9}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Maseberg23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester23, author = {Britta Alexandra Mester}, title = {Konzerndatenverarbeitung als Herausforderung f{\"{u}}r den Datenschutz}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {65}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1717-9}, doi = {10.1007/S11623-023-1717-9}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mester23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester23a, author = {Britta Alexandra Mester}, title = {Datenschutz in Krisenzeiten - Konvergenz nutzen!}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {537}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1812-y}, doi = {10.1007/S11623-023-1812-Y}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MesterO23, author = {Britta Alexandra Mester and Ebru {\"{O}}zt{\"{u}}rk}, title = {Joint Controllership im Unternehmensverbund}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {73--80}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1720-1}, doi = {10.1007/S11623-023-1720-1}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MesterO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Milde23, author = {Thomas Milde}, title = {Macht Zero Trust wirklich sicher?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {641--647}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1836-3}, doi = {10.1007/S11623-023-1836-3}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Milde23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MullmannVV23, author = {Dirk M{\"{u}}llmann and Maxime Veit and Melanie Volkamer}, title = {Weiterleitungs-URLs in E-Mails}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {275--282}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1761-5}, doi = {10.1007/S11623-023-1761-5}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MullmannVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NaakeS23, author = {Lutz Naake and Denise Semmler}, title = {ISMS-Pr{\"{u}}fung f{\"{u}}r KRITIS-Betreiber}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {406--409}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1787-8}, doi = {10.1007/S11623-023-1787-8}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/NaakeS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/OldemeyerT23, author = {Klaus Oldemeyer and Marie{-}Theres Tinnefeld}, title = {Antisemitismus: Krisen und Ver{\"{a}}nderungen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {108--109}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1726-8}, doi = {10.1007/S11623-023-1726-8}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/OldemeyerT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Orak23, author = {Berna Orak}, title = {Eine Digitalisierungsstrategie ab initio zum Scheitern verurteilt?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {571--573}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1820-y}, doi = {10.1007/S11623-023-1820-Y}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Orak23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pollithy23, author = {Alexander Pollithy}, title = {Die Zul{\"{a}}ssigkeit automatisierten Spielerscoutings im Leistungssport nach Ma{\ss}gabe des Art. 22 {DS-GVO}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {776--780}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1861-2}, doi = {10.1007/S11623-023-1861-2}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pollithy23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rathgeb23, author = {Christian Rathgeb}, title = {Biometrie - eine Frage des Vertrauens?}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1704-6}, doi = {10.1007/S11623-022-1704-6}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rathgeb23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RathgebMTNK23, author = {Christian Rathgeb and Johannes Merkle and Benjamin Tams and Matthias Neu and Ulrike Korte}, title = {Multi-biometrische Kryptosysteme}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {31--36}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1712-6}, doi = {10.1007/S11623-022-1712-6}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RathgebMTNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RehbohmK23, author = {Thomas Rehbohm and Peter Lutz Kalmbach}, title = {Herausforderungen der f{\"{o}}deralen Cybersicherheit vs. {\"{A}}nderung in der Bund-L{\"{a}}nder Gewaltenteilung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {338--342}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1772-2}, doi = {10.1007/S11623-023-1772-2}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RehbohmK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RehbohmM23, author = {Thomas Rehbohm and Frank Moses}, title = {F{\"{o}}derale Cybersicherheitsarchitektur und Informationssicherheitsmanagement im Kontext der NIS-2-Richtlinie}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {648--655}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1837-2}, doi = {10.1007/S11623-023-1837-2}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RehbohmM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reich23, author = {Lara Reich}, title = {Social Media Accounts nach dem Erbfall}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {781--784}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1862-1}, doi = {10.1007/S11623-023-1862-1}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reich23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer23, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {119--126}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1728-6}, doi = {10.1007/S11623-023-1728-6}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer23a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {383--390}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1781-1}, doi = {10.1007/S11623-023-1781-1}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer23b, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {527--536}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1811-z}, doi = {10.1007/S11623-023-1811-Z}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer23c, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {667--676}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1840-7}, doi = {10.1007/S11623-023-1840-7}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW23, author = {Helmut Reimer and Christoph Wegener}, title = {Digitalisierung: Der lange Weg von der Idee zur marktf{\"{a}}higen L{\"{o}}sung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {656}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1838-1}, doi = {10.1007/S11623-023-1838-1}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rockstroh23, author = {Sebastian Rockstroh}, title = {EU-Cybersicherheitsrecht f{\"{u}}r Produkte}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {332--337}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1771-3}, doi = {10.1007/S11623-023-1771-3}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rockstroh23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel23, author = {Alexander Ro{\ss}nagel}, title = {F{\"{u}}nf Jahre Datenschutz-Grundverordnung - gemischte Bilanz}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {474}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1800-2}, doi = {10.1007/S11623-023-1800-2}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RossnagelWH23, author = {Alexander Ro{\ss}nagel and Stephanie Wetzstein and Katja Horlbeck}, title = {Unionsrechtliche Vorgaben f{\"{u}}r das Recht des Besch{\"{a}}ftigtendatenschutzes}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {429--434}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1792-y}, doi = {10.1007/S11623-023-1792-Y}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RossnagelWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchenkelM23, author = {Johanna Schenkel and Christian Mainka}, title = {Die Financial-grade {API} {(FAPI)}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {154--159}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1736-6}, doi = {10.1007/S11623-023-1736-6}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchenkelM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schiek23, author = {Lennart Schiek}, title = {Schadensersatz ohne Schaden nach der DSGVO?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {144--148}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1734-8}, doi = {10.1007/S11623-023-1734-8}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schiek23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schild23, author = {Hans{-}Hermann Schild}, title = {Unterlassungsanspruch nach der DS-GVO?}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {513--518}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1808-7}, doi = {10.1007/S11623-023-1808-7}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schild23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schild23a, author = {Hans{-}Hermann Schild}, title = {Durchsetzung der {DSGVO} bei grenz{\"{u}}berschreitenden Datenschutzbeschwerden}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {565--570}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1819-4}, doi = {10.1007/S11623-023-1819-4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schild23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchildC23, author = {Hans{-}Hermann Schild and Conrad Sebastian Conrad}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {315--320}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1767-z}, doi = {10.1007/S11623-023-1767-Z}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchildC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schlegel23, author = {Daniela Schlegel}, title = {Das Recht auf L{\"{o}}schen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {560--564}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1818-5}, doi = {10.1007/S11623-023-1818-5}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schlegel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmidS23, author = {Christian Schmid and Cajetan Sp{\"{a}}th}, title = {Zur Monetarisierbarkeit der (weniger personalisierten, aber) gleichwertigen Alternative}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {771--775}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1856-z}, doi = {10.1007/S11623-023-1856-Z}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchmidS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schuster23, author = {Felix Schuster}, title = {Confidential Computing}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {638--640}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1835-4}, doi = {10.1007/S11623-023-1835-4}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schuster23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schwichtenberg23, author = {Simon Schwichtenberg}, title = {Die {\"{U}}berwachungsgesellschaft und die Selbstbelastungsfreiheit}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {372--375}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1779-8}, doi = {10.1007/S11623-023-1779-8}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schwichtenberg23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seiter23, author = {Stefan R. Seiter}, title = {Die Auftragsverarbeitung im Konzerngebilde}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {81--85}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1721-0}, doi = {10.1007/S11623-023-1721-0}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Seiter23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SelzerDB23, author = {Annika Selzer and Indra Spiecker genannt D{\"{o}}hmann and Alina Boll}, title = {Datenschutzvorsorge in der offensiven Cybersicherheitsforschung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {785--789}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1863-0}, doi = {10.1007/S11623-023-1863-0}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SelzerDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ShulmanW23, author = {Haya Schulmann and Michael Waidner}, title = {Aktive Cyberabwehr}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {497--502}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1806-9}, doi = {10.1007/S11623-023-1806-9}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ShulmanW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Speichert23, author = {Horst Speichert}, title = {DSGVO-Haftungs- und Sicherheitsrisiken durch Protokoll- und Diagnosedaten im IT-Betrieb}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {229--232}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1751-7}, doi = {10.1007/S11623-023-1751-7}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Speichert23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/StadlerS23, author = {Tobias Stadler and Michaela Schmitz}, title = {Datenschutzrechtliche Verantwortlichkeit bei Videokonferenzdiensten}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {435--439}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1793-x}, doi = {10.1007/S11623-023-1793-X}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/StadlerS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Steinebach23, author = {Martin Steinebach}, title = {Erkennung von Kindesmissbrauch in Medien}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {225--228}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1750-8}, doi = {10.1007/S11623-023-1750-8}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Steinebach23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Strobel23, author = {Stefan Strobel}, title = {Zero Trust}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {629--632}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1833-6}, doi = {10.1007/S11623-023-1833-6}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Strobel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/StroblK23, author = {Bernhard Strobl and Bernhard Kohn}, title = {Kontaktlose Fingerprintaufnahme}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {7--10}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1707-3}, doi = {10.1007/S11623-022-1707-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/StroblK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stummer23, author = {Sarah Stummer}, title = {Personenbezogenheit vs. Anonymit{\"{a}}t}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {354--360}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1776-y}, doi = {10.1007/S11623-023-1776-Y}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stummer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Thiel23, author = {Barbara Thiel}, title = {Pr{\"{u}}fung von Medienwebseiten in Niedersachsen abgeschlossen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {608}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1828-3}, doi = {10.1007/S11623-023-1828-3}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Thiel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld23, author = {Marie{-}Theres Tinnefeld}, title = {Pers{\"{o}}nlichkeitsrechte im Schatten des Todes}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {796--797}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1865-y}, doi = {10.1007/S11623-023-1865-Y}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldP23, author = {Marie{-}Theres Tinnefeld and Thomas Petri}, title = {Nachruf: Spiros Simitis}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {267}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1758-0}, doi = {10.1007/S11623-023-1758-0}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ullrich23, author = {Steffen Ullrich}, title = {{ISMS} und Digitale Nachhaltigkeit}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {397--400}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1785-x}, doi = {10.1007/S11623-023-1785-X}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ullrich23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ullrich23a, author = {Steffen Ullrich}, title = {Zero Trust im Gesundheitswesen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {613--616}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1830-9}, doi = {10.1007/S11623-023-1830-9}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ullrich23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener23, author = {Christoph Wegener}, title = {(Kein) Vertrauen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {10}, pages = {605}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1827-4}, doi = {10.1007/S11623-023-1827-4}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeissmannL23, author = {Paul Weissmann and Hanna Lurz}, title = {Das {ISMS} als Herzst{\"{u}}ck des KRITIS-Betreibers}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {401--405}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1786-9}, doi = {10.1007/S11623-023-1786-9}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WeissmannL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WiewiorowskiL23, author = {Wojciech Wiewi{\'{o}}rowski and Juhan Lepassaar}, title = {Pairing up Cybersecurity and Data Protection efforts: {EDPS} and {ENISA} sign Memorandum of Understanding}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {2}, pages = {68}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1718-8}, doi = {10.1007/S11623-023-1718-8}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WiewiorowskiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WilmsTNB23, author = {Leo Wilms and Arndt von Twickel and Matthias Neu and Christian Berghoff}, title = {Quantifying Attribution-based Explainable {AI} for Robustness Evaluations}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {8}, pages = {492--496}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1805-x}, doi = {10.1007/S11623-023-1805-X}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WilmsTNB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wolff23, author = {Daniel Wolff}, title = {KI-Biases im Gesundheitswesen}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {37--41}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1713-5}, doi = {10.1007/S11623-022-1713-5}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wolff23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23, title = {Nachhaltige Cybersecurity?}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1705-5}, doi = {10.1007/S11623-022-1705-5}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23a, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {46--54}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1715-3}, doi = {10.1007/S11623-022-1715-3}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23aa, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {798--805}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1866-x}, doi = {10.1007/S11623-023-1866-X}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X23aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23ab, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {806--812}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1867-9}, doi = {10.1007/S11623-023-1867-9}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X23ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23b, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {47}, number = {1}, pages = {55--64}, year = {2023}, url = {https://doi.org/10.1007/s11623-022-1716-2}, doi = {10.1007/S11623-022-1716-2}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23c, title = {App {\"{U}}berwachung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {129}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1730-z}, doi = {10.1007/S11623-023-1730-Z}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23d, title = {Cybersecurity: Gemeinsam sind wir stark?}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {133--134}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1731-y}, doi = {10.1007/S11623-023-1731-Y}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23e, title = {2023: Vorsitz in {DSK} und {IFK}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {135--136}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1732-x}, doi = {10.1007/S11623-023-1732-X}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23f, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {173--185}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1740-x}, doi = {10.1007/S11623-023-1740-X}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23g, title = {Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {3}, pages = {186--196}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1741-9}, doi = {10.1007/S11623-023-1741-9}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23h, title = {{OZG} - Gesetzgebung in Not}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {201}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1744-6}, doi = {10.1007/S11623-023-1744-6}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23i, title = {Beschl{\"{u}}sse der Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden des Bundes und der L{\"{a}}nder}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {233--237}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1752-6}, doi = {10.1007/S11623-023-1752-6}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23j, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {238--248}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1753-5}, doi = {10.1007/S11623-023-1753-5}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23k, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {4}, pages = {249--256}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1754-4}, doi = {10.1007/S11623-023-1754-4}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23l, title = {Buhmann {DSGVO}}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {261}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1756-2}, doi = {10.1007/S11623-023-1756-2}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23m, title = {Informationelle Selbstbestimmung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {265--266}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1757-1}, doi = {10.1007/S11623-023-1757-1}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23n, title = {{EDSA:} Stellungnahme zum Entwurf des Angemessenheitsbeschlusses zum {EU} - {US} Data Privacy Framework}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {268}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1759-z}, doi = {10.1007/S11623-023-1759-Z}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23o, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {299--305}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1765-1}, doi = {10.1007/S11623-023-1765-1}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23p, title = {DuD-Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {5}, pages = {306--314}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1766-0}, doi = {10.1007/S11623-023-1766-0}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23q, title = {Nutzung von Gesundheitsdaten braucht Vertrauen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {6}, pages = {325--326}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1769-x}, doi = {10.1007/S11623-023-1769-X}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23r, title = {105. Tagung der Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden am 10. / 11 Mai 2023}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {396}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1784-y}, doi = {10.1007/S11623-023-1784-Y}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23s, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {450--457}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1796-7}, doi = {10.1007/S11623-023-1796-7}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23t, title = {DuD-Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {7}, pages = {458--465}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1797-6}, doi = {10.1007/S11623-023-1797-6}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23u, title = {Umgang mit Identit{\"{a}}tsdiebstahl - Erkennen, Reagieren, Vorbeugen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {540}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1813-x}, doi = {10.1007/S11623-023-1813-X}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23v, title = {Gef{\"{a}}hrdung Kritischer Infrastrukturen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {578}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1822-9}, doi = {10.1007/S11623-023-1822-9}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23w, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {579--591}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1823-8}, doi = {10.1007/S11623-023-1823-8}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23x, title = {DuD Report}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {592--600}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1824-7}, doi = {10.1007/S11623-023-1824-7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23y, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {9}, pages = {601--604}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1825-6}, doi = {10.1007/S11623-023-1825-6}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X23y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X23z, title = {Geplante Chatkontrolle f{\"{u}}hrt zu einer unverh{\"{a}}ltnism{\"{a}}{\ss}igen, anlasslosen Massen{\"{u}}berwachung}, journal = {Datenschutz und Datensicherheit (dud)}, volume = {47}, number = {12}, pages = {748}, year = {2023}, url = {https://doi.org/10.1007/s11623-023-1858-x}, doi = {10.1007/S11623-023-1858-X}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X23z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AhrensH22, author = {Maximilian Ahrens and Wieland Holfelder}, title = {Innovative souver{\"{a}}ne Cloud-L{\"{o}}sungen durch integrierte Transparenz- und Kontrollmechanismen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {627--631}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1671-y}, doi = {10.1007/S11623-022-1671-Y}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AhrensH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AndresenD22, author = {S{\"{u}}nje Andresen and Stephan Dreyer}, title = {Die Rolle der Eltern bei der datenschutzrechtlichen Einwilligung f{\"{u}}r ihre Kinder}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {361--366}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1620-9}, doi = {10.1007/S11623-022-1620-9}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AndresenD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Aretz22, author = {Christian Aretz}, title = {Der Souver{\"{a}}n in der Krise}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {40--44}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1558-y}, doi = {10.1007/S11623-022-1558-Y}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Aretz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BerningerR22, author = {Marc Berninger and Bastian Raunecker}, title = {Kapitalmarktseitige Konsequenzen von Rechtsverst{\"{o}}{\ss}en gegen die {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {164--173}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1582-y}, doi = {10.1007/S11623-022-1582-Y}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BerningerR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BessantS22, author = {Claire Bessant and Maximilian Schnebbe}, title = {Does the {GDPR} offer a solution to the 'problem' of sharenting?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {352--356}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1618-3}, doi = {10.1007/S11623-022-1618-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BessantS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brozio22, author = {Volker Brozio}, title = {Interessenkonflikt des betrieblichen Datenschutzbeauftragten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {684}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1682-8}, doi = {10.1007/S11623-022-1682-8}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Brozio22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BruhnRWZ22, author = {Jens Bruhn and Alexander Ro{\ss}nagel and Rouven Wachhaus and Volker Zimmer}, title = {Datenschutz{\"{u}}berpr{\"{u}}fungen im IT-Labor von Aufsichtsbeh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {685--689}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1683-7}, doi = {10.1007/S11623-022-1683-7}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BruhnRWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {243--252}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1597-4}, doi = {10.1007/S11623-022-1597-4}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22a, author = {Benedikt Buchner}, title = {Kinder im Netz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {333}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1613-8}, doi = {10.1007/S11623-022-1613-8}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22b, author = {Benedikt Buchner}, title = {Forschungsdaten effektiver nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {555--560}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1658-8}, doi = {10.1007/S11623-022-1658-8}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22c, author = {Benedikt Buchner}, title = {Digital Health}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {729}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1693-5}, doi = {10.1007/S11623-022-1693-5}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BurgdorfJ22, author = {Milan Burgdorf and Kai Jendria}, title = {{ISO} 27002 revisited}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {301--304}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1607-6}, doi = {10.1007/S11623-022-1607-6}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BurgdorfJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BurgfriedR22, author = {Matthias Burgfried and Andreas Reckert{-}Lodde}, title = {Die Deutsche Verwaltungscloud-Strategie}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {611--615}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1668-6}, doi = {10.1007/S11623-022-1668-6}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BurgfriedR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Caspers22, author = {Thomas Caspers}, title = {Souver{\"{a}}ne Clouds f{\"{u}}r den {\"{o}}ffentlichen Sektor}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {601}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1665-9}, doi = {10.1007/S11623-022-1665-9}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Caspers22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CejvanovicDHS22, author = {Jasmina Cejvanovic and Ann{-}Kristin Derst and Maik Horz and Steffen Schwalm}, title = {Rechtssicheres ersetzendes Scannen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {432--438}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1634-3}, doi = {10.1007/S11623-022-1634-3}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CejvanovicDHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CoesterP22, author = {Ulla Coester and Norbert Pohlmann}, title = {Vertrauensw{\"{u}}rdigkeit schafft Vertrauen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {233--238}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1594-7}, doi = {10.1007/S11623-022-1594-7}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CoesterP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dochow22, author = {Carsten Dochow}, title = {Opt-ionen f{\"{u}}r die elektronische Patientenakte}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {747--755}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1697-1}, doi = {10.1007/S11623-022-1697-1}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dochow22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DoubravaS22, author = {Clemens Doubrava and Vera Sikes}, title = {Cloud-Paradigma in der {\"{o}}ffentlichen Verwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {605--610}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1667-7}, doi = {10.1007/S11623-022-1667-7}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DoubravaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DurmusES22, author = {Erdem Durmus and Jens Engelhardt and Annika Selzer}, title = {Kontrollen bei Auftragsverarbeitern}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {487--492}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1645-0}, doi = {10.1007/S11623-022-1645-0}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DurmusES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dyroff22, author = {Daniel Dyroff}, title = {Lebenszyklusmanagement von digitalen Zertifikaten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {225--226}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1592-9}, doi = {10.1007/S11623-022-1592-9}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dyroff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EinzingerRF22, author = {Christoph Einzinger and Christian R{\"{u}}ckert and Felix C. Freiling}, title = {Datenminimierung in der Netzwerkforensik}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {149--155}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1580-0}, doi = {10.1007/S11623-022-1580-0}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EntschewHBN22, author = {Enrico Entschew and Kirk Hall and Chris Bailey and Kim Nguyen}, title = {A New eIDAS Beginning for QWACs}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {217--224}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1591-x}, doi = {10.1007/S11623-022-1591-X}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EntschewHBN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber22, author = {Eberhard von Faber}, title = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {45--51}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1559-x}, doi = {10.1007/S11623-022-1559-X}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Faber22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber22a, author = {Eberhard von Faber}, title = {Zw{\"{o}}lf Prinzipien f{\"{u}}r systematische IT-Service-Security}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {703--706}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1687-3}, doi = {10.1007/S11623-022-1687-3}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Faber22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FeldmannS22, author = {Marius Feldmann and Matthias Sutter}, title = {Open-Source-L{\"{o}}sungen zur Automatisierung des Deployments und Betriebs von Clouds}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {637--639}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1673-9}, doi = {10.1007/S11623-022-1673-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FeldmannS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerG22, author = {Arno Fiedler and Franziska Granc}, title = {Nationale und europ{\"{a}}ische Sicht auf eIDAS 2.0 - Aufwand und Nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {27--31}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1556-0}, doi = {10.1007/S11623-022-1556-0}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FiedlerG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerGN22, author = {Arno Fiedler and Ernst{-}G{\"{u}}nter Giessmann and Kim Nguyen}, title = {Die Bedeutung von {PKI} - Gestern, Heute und Morgen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {209--214}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1589-4}, doi = {10.1007/S11623-022-1589-4}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerGN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Folkerts22, author = {Elena Folkerts}, title = {Wirklich freiwillig?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {77--80}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1565-z}, doi = {10.1007/S11623-022-1565-Z}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Folkerts22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22, author = {Dirk Fox}, title = {Pr{\"{u}}fstand}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {133}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1576-9}, doi = {10.1007/S11623-022-1576-9}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22a, author = {Dirk Fox}, title = {Zero Trust}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {174--175}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1583-x}, doi = {10.1007/S11623-022-1583-X}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22b, author = {Dirk Fox}, title = {Warnung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {265}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1600-0}, doi = {10.1007/S11623-022-1600-0}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22c, author = {Dirk Fox}, title = {Das Prinzip Verantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {681}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1681-9}, doi = {10.1007/S11623-022-1681-9}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Freye22, author = {Merle Freye}, title = {Die Datenschutzerkl{\"{a}}rungen von Gesundheits-Apps}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {762--766}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1698-0}, doi = {10.1007/S11623-022-1698-0}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Freye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FriedewaldRBGHB22, author = {Michael Friedewald and Alexander Ro{\ss}nagel and Tamer Bile and Christian L. Geminn and Marit Hansen and Felix Bieker and Murat Karaboga}, title = {Zur Einf{\"{u}}hrung einer {\"{U}}berwachungs-Gesamtrechnung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {572--577}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1661-0}, doi = {10.1007/S11623-022-1661-0}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FriedewaldRBGHB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gassner22, author = {Ulrich M. Gassner}, title = {Forschung und Innovation im europ{\"{a}}ischen Gesundheitsdatenraum}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {739--746}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1696-2}, doi = {10.1007/S11623-022-1696-2}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gassner22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GeisslerPSW22, author = {Ines Geissler and Ulrich Pordesch and Annika Selzer and Thomas Wilmer}, title = {Auswahl cloudbasierter Dienste}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {690--694}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1684-6}, doi = {10.1007/S11623-022-1684-6}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GeisslerPSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GeminnT22, author = {Christian Geminn and Marie{-}Theres Tinnefeld}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {327--332}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1612-9}, doi = {10.1007/S11623-022-1612-9}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GeminnT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Glemser22, author = {Tobias Glemser}, title = {{OWASP} Top 10}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {695--698}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1685-5}, doi = {10.1007/S11623-022-1685-5}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Glemser22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gotz22, author = {Isabell G{\"{o}}tz}, title = {Lach' doch mal!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {357--360}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1619-2}, doi = {10.1007/S11623-022-1619-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gotz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gramlich22, author = {Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {261--264}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1599-2}, doi = {10.1007/S11623-022-1599-2}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gramlich22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichP22, author = {Ludwig Gramlich and Ronald Petrlic}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {532--536}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1653-0}, doi = {10.1007/S11623-022-1653-0}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GreteK22, author = {Patrick Grete and Carsten Kestermann}, title = {Cloud Computing im Spannungsfeld von Souver{\"{a}}nit{\"{a}}t, Cybersicherheit und {\"{O}}konomie}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {632--636}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1672-x}, doi = {10.1007/S11623-022-1672-X}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GreteK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GruberF22, author = {Jan Gruber and Felix C. Freiling}, title = {Fighting Evasive Malware}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {284--290}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1604-9}, doi = {10.1007/S11623-022-1604-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GruberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HamacherKLBHSMW22, author = {Kay Hamacher and Tobias Kussel and Tatiana von Landesberger and Tom Baumgartl and Markus H{\"{o}}hn and Simone Scheithauer and Michael Marschollek and Antje Wulff}, title = {Fallzahlen, Re-Identifikation und der technische Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {143--148}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1579-6}, doi = {10.1007/S11623-022-1579-6}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HamacherKLBHSMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen22, author = {Marit Hansen}, title = {{ULD:} 40. T{\"{a}}tigkeitsbericht 2021}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {268}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1601-z}, doi = {10.1007/S11623-022-1601-Z}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen22a, author = {Marit Hansen}, title = {Deutschlands Plan zur St{\"{a}}rkung der B{\"{u}}rgerrechte im digitalen Raum}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {550--554}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1657-9}, doi = {10.1007/S11623-022-1657-9}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen22b, author = {Marit Hansen}, title = {E-Rezept-Verfahren: maschinenlesbare Codes sch{\"{u}}tzen!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {604}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1666-8}, doi = {10.1007/S11623-022-1666-8}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HillebrandSP22, author = {Annette Hillebrand and Jana Stuck and Pirmin Puhl}, title = {Vertrauen in Datenverarbeitung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {493--498}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1646-z}, doi = {10.1007/S11623-022-1646-Z}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HillebrandSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hofmann22, author = {Sebastian Hofmann}, title = {Forschungsklausel statt Broad Consent}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {756--761}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1691-7}, doi = {10.1007/S11623-022-1691-7}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Hofmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Horlbeck22, author = {Katja Horlbeck}, title = {Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {567--571}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1660-1}, doi = {10.1007/S11623-022-1660-1}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Horlbeck22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hornung22, author = {Gerrit Hornung}, title = {KI-Regulierung im Mehrebenensystem}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {561--566}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1659-7}, doi = {10.1007/S11623-022-1659-7}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hornung22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HornungSSZ22, author = {Gerrit Hornung and Matthias S{\"{o}}llner and Jan{-}Philipp Stroscher and Eva{-}Maria Zahn}, title = {Kollaboration im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {384--389}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1625-4}, doi = {10.1007/S11623-022-1625-4}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HornungSSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JoeB22, author = {Alicia Joe and Benedikt Buchner}, title = {Kinder als digitales Freiwild}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {381--383}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1624-5}, doi = {10.1007/S11623-022-1624-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JoeB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JohnR22, author = {Nicolas John and Justin Rennert}, title = {Cookieless Tracking: Neue M{\"{o}}glichkeiten unter dem TTDSG?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {643--648}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1675-7}, doi = {10.1007/S11623-022-1675-7}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JohnR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Joos22, author = {Harald Joos}, title = {Hochskalierbares Cloud Computing mit nationalen Hyperscalern f{\"{u}}r die Verwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {699--702}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1686-4}, doi = {10.1007/S11623-022-1686-4}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Joos22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JoosM22, author = {Daniel Joos and Kristof Meding}, title = {Anforderungen bei der Einf{\"{u}}hrung und Entwicklung von {KI} zur Gew{\"{a}}hrleistung von Fairness und Diskriminierungsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {376--380}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1623-6}, doi = {10.1007/S11623-022-1623-6}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JoosM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JoosN22, author = {Daniel Joos and Peter N{\"{a}}gele}, title = {Verarbeitung personenbezogener Echtdaten zur Netz- und Informationssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {578--583}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1662-z}, doi = {10.1007/S11623-022-1662-Z}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JoosN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber22, author = {Ulrich Kelber}, title = {Die {DSK} st{\"{a}}rkt die informationelle Selbstbestimmung und der {EDSA} gibt den Betroffenenrechten der {DSGVO} einen verbindlichen Rahmen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {136}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1577-8}, doi = {10.1007/S11623-022-1577-8}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber22a, author = {Ulrich Kelber}, title = {Koordinierte Durchsetzung durch 22 Aufsichtsbeh{\"{o}}rden zur Nutzung von Cloud-Diensten durch den {\"{o}}ffentlichen Sektor}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {200}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1587-6}, doi = {10.1007/S11623-022-1587-6}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kelber22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber22b, author = {Ulrich Kelber}, title = {Mastodon: Datenschutzfreundliche Twitter-Alternative}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {412}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1630-7}, doi = {10.1007/S11623-022-1630-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kelber22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Koch22, author = {Manuel Koch}, title = {Telematikinfrastruktur 2.0 - Verhindern von missbr{\"{a}}uchlicher Profilbildung durch {PET}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {427--431}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1633-4}, doi = {10.1007/S11623-022-1633-4}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Koch22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KronkeT22, author = {Christoph Kr{\"{o}}nke and Elissa Tschachler}, title = {Ein Opt-out f{\"{u}}r die elektronische Patientenakte (ePA)}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {419--426}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1632-5}, doi = {10.1007/S11623-022-1632-5}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KronkeT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kudra22, author = {Andre Kudra}, title = {Self-Sovereign Identity {(SSI)} in Deutschland}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {22--26}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1555-1}, doi = {10.1007/S11623-022-1555-1}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kudra22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KudraSS22, author = {Andre Kudra and Christian Seegebarth and Steffen Schwalm}, title = {Ein digitaler Vertrauensraum f{\"{u}}r Identit{\"{a}}ten und Dienste - Europa ist auf dem richtigen Weg}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {9--11}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1552-4}, doi = {10.1007/S11623-022-1552-4}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KudraSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KunzW22, author = {Thomas Kunz and Ulrich Waldmann}, title = {ML-basierte Unterst{\"{u}}tzung von L{\"{o}}sch- und Aufbewahrungspflichten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {649--653}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1676-6}, doi = {10.1007/S11623-022-1676-6}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KunzW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KusberSKE22, author = {Tomasz Kusber and Steffen Schwalm and Ulrike Korte and Mario Engel}, title = {Langfristige Beweissicherheit und Vertrauensw{\"{u}}rdigkeit digitaler Unterlagen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {32--39}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1557-z}, doi = {10.1007/S11623-022-1557-Z}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KusberSKE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kutscher22, author = {Nadia Kutscher}, title = {Sharenting als familialer Alltag}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {346--351}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1617-4}, doi = {10.1007/S11623-022-1617-4}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kutscher22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LangK22, author = {Simon Lang and Ralf Kneuper}, title = {Datenschutz und Informationssicherheit in Gaia-X}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {778--781}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1692-6}, doi = {10.1007/S11623-022-1692-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LangK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LefferW22, author = {Lena Leffer and Michelle Weber}, title = {Technische und strafrechtliche Implikationen des unbemerkten Einsatzes von AirTags}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {137--142}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1578-7}, doi = {10.1007/S11623-022-1578-7}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LefferW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LehrDKV22, author = {Franz Lehr and Heike Dietmann and Chiara Krisam and Melanie Volkamer}, title = {Manipulative Designs von Cookies}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {296--300}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1606-7}, doi = {10.1007/S11623-022-1606-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LehrDKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LeichtH22, author = {Maximilian Leicht and Stefan Hessel}, title = {Datenschutzrechtliche Verantwortlichkeit in der Forschung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {305--309}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1608-5}, doi = {10.1007/S11623-022-1608-5}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LeichtH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Liptak22, author = {Patrick Liptak}, title = {Ein neuer Rahmen f{\"{u}}r eine europ{\"{a}}ische digitale Identit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {18--21}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1554-2}, doi = {10.1007/S11623-022-1554-2}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Liptak22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester22, author = {Britta Alexandra Mester}, title = {Besch{\"{a}}ftigtendatenschutz - Digitale Arbeitswelten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {73}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1563-1}, doi = {10.1007/S11623-022-1563-1}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mester22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mollik22, author = {Mirko Mollik}, title = {Blockchain als sicheres Register}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {201--208}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1588-5}, doi = {10.1007/S11623-022-1588-5}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mollik22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MosesS22, author = {Frank Moses and Kurt Sandkuhl}, title = {Mit {CISIS12} ein {ISMS} aufbauen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {654--659}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1677-5}, doi = {10.1007/S11623-022-1677-5}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MosesS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MullerRWWH22, author = {Robin M{\"{u}}ller and Julius Ruppert and Katharina Will and Lukas W{\"{u}}steney and Tobias Heer}, title = {Analyzing the Software Patch Discipline Across Different Industries and Countries}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {269--275}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1602-y}, doi = {10.1007/S11623-022-1602-Y}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MullerRWWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen22, author = {Kim Nguyen}, title = {Sichere elektronische Identit{\"{a}}t - ein Ziel f{\"{u}}r Europa!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1549-z}, doi = {10.1007/S11623-022-1549-Z}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nguyen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PeeckhausS22, author = {Martin Peeckhaus and Klaus Schmeh}, title = {Benutzerfreundliche Mail-Verschl{\"{u}}sselung bei einer Bundesbeh{\"{o}}rde}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {444--447}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1636-1}, doi = {10.1007/S11623-022-1636-1}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PeeckhausS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri22, author = {Thomas Petri}, title = {Die prim{\"{a}}re und sekund{\"{a}}re Nutzung elektronischer Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {413--418}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1631-6}, doi = {10.1007/S11623-022-1631-6}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri22a, author = {Thomas Petri}, title = {Rechtsprechung zur {DS-GVO} in den Jahren 2021-2022}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {767--773}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1699-z}, doi = {10.1007/S11623-022-1699-Z}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann22, author = {Norbert Pohlmann}, title = {Vertrauensw{\"{u}}rdige IT-Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {197}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1586-7}, doi = {10.1007/S11623-022-1586-7}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR22, author = {Norbert Pohlmann and Helmut Reimer}, title = {Cyber-Sicherheit - gemeinsam Grenzen {\"{u}}berwinden}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {242}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1596-5}, doi = {10.1007/S11623-022-1596-5}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RehbohmKCS22, author = {Thomas Rehbohm and Robin Kemmerich and Clemens H. Cap and Kurt Sandkuhl}, title = {Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische Studie in deutschen Kommunen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {448--454}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1637-0}, doi = {10.1007/S11623-022-1637-0}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RehbohmKCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer22, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {253--260}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1598-3}, doi = {10.1007/S11623-022-1598-3}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer22a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {717--724}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1689-1}, doi = {10.1007/S11623-022-1689-1}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rosenberger22, author = {Nadine Rosenberger}, title = {Bewerberscreening unter Geltung der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {87--92}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1567-x}, doi = {10.1007/S11623-022-1567-X}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rosenberger22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22, author = {Alexander Ro{\ss}nagel}, title = {Verbessert die Ampel-Koalition den Datenschutz?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {537--538}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1654-z}, doi = {10.1007/S11623-022-1654-Z}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22a, author = {Alexander Ro{\ss}nagel}, title = {Datenschutzanforderungen an Videokonferenzsysteme}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {543--544}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1655-y}, doi = {10.1007/S11623-022-1655-Y}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22b, author = {Alexander Ro{\ss}nagel}, title = {Internationaler Datentransfer}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {545--549}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1656-x}, doi = {10.1007/S11623-022-1656-X}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22c, author = {Alexander Ro{\ss}nagel}, title = {Festakt im Hessischen Landtag: 50 Jahre Datenschutz in Hessen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {732}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1694-4}, doi = {10.1007/S11623-022-1694-4}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22d, author = {Alexander Ro{\ss}nagel}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {797--800}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1703-7}, doi = {10.1007/S11623-022-1703-7}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RossnagelGJM22, author = {Alexander Ro{\ss}nagel and Christian L. Geminn and Paul C. Johannes and Johannes K. M. M{\"{u}}ller}, title = {Auswirkungen ausl{\"{a}}ndischer Gesetzgebung auf die deutsche Cybersicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {156--163}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1581-z}, doi = {10.1007/S11623-022-1581-Z}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RossnagelGJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossow22, author = {Olaf Rossow}, title = {Datenschutz beim Betriebsrat}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {81--86}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1566-y}, doi = {10.1007/S11623-022-1566-Y}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossow22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossow22a, author = {Olaf Rossow}, title = {Arbeitgeber und das Fernmeldegeheimnis nach dem {TTDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {93--97}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1568-9}, doi = {10.1007/S11623-022-1568-9}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossow22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SaatjohannIGNSK22, author = {Christoph Saatjohann and Fabian Ising and Matthias Gierlings and Dominik Noss and Sascha Schimmler and Alexander Klemm and Leif Grundmann and Tilman Frosch and Sebastian Schinzel}, title = {Sicherheit medizintechnischer Protokolle im Krankenhaus}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {276--283}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1603-x}, doi = {10.1007/S11623-022-1603-X}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SaatjohannIGNSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Salemi22, author = {Simone Salemi}, title = {Chancen und Risiken von {PIMS} nach {\textsection} 26 {TTDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {505--510}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1648-x}, doi = {10.1007/S11623-022-1648-X}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Salemi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchaarschmidtSS22, author = {Konstantin Schaarschmidt and Martin Schallbruch and Stefan Schuck}, title = {Digitale Brieftaschen f{\"{u}}r sichere Identit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {12--17}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1553-3}, doi = {10.1007/S11623-022-1553-3}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchaarschmidtSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schellhas-Mende22, author = {Friederike Schellhas{-}Mende and Nils Wiedemann and Nicolas Blum}, title = {Videokonferenzsysteme als Telekommunikationsdienst}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {291--295}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1605-8}, doi = {10.1007/S11623-022-1605-8}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schellhas-Mende22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmehE22, author = {Klaus Schmeh and Matthias Edelhoff}, title = {{S/MIME} und {PGP} im selben Client}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {439--443}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1635-2}, doi = {10.1007/S11623-022-1635-2}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchmehE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnebbe22, author = {Maximilian Schnebbe}, title = {Minderj{\"{a}}hrigenschutz in der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {367--370}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1621-8}, doi = {10.1007/S11623-022-1621-8}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnebbe22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchurmannB22, author = {Kathrin Sch{\"{u}}rmann and Jan O. Baier}, title = {Schadensersatzanspr{\"{u}}che im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {103--106}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1570-2}, doi = {10.1007/S11623-022-1570-2}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchurmannB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seegebarth22, author = {Christian Seegebarth}, title = {eIDAS-Novellierung 2021 - erste Analyse des Proposals}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {5--8}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1551-5}, doi = {10.1007/S11623-022-1551-5}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Seegebarth22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SelzerS22, author = {Annika Selzer and Sarah Stummer}, title = {Hat die h{\"{a}}ufige Videotelefonie in Corona-Zeiten Einfluss auf unser Privatsph{\"{a}}reverst{\"{a}}ndnis genommen?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {774--777}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1700-x}, doi = {10.1007/S11623-022-1700-X}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SelzerS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stapf22, author = {Ingrid Stapf}, title = {Das Recht auf eine offene Zukunft}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {339--345}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1616-5}, doi = {10.1007/S11623-022-1616-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stapf22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld22, author = {Marie{-}Theres Tinnefeld}, title = {Grundrechtsschutz: Antworten auf pandemiebedingte Einschr{\"{a}}nkungen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {336--337}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1614-7}, doi = {10.1007/S11623-022-1614-7}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/UrbanG22, author = {Manuela Urban and Kurt Garloff}, title = {Sovereign Cloud Stack}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {616--621}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1669-5}, doi = {10.1007/S11623-022-1669-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/UrbanG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Vasquez22, author = {Sheila Vasquez}, title = {Privacy by Design und das autonome Fahrzeug}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {98--102}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1569-8}, doi = {10.1007/S11623-022-1569-8}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Vasquez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Vassilaki22, author = {Irini E. Vassilaki}, title = {Anleitung zu sexuellem Missbrauch von Kindern gem. {\textsection} 176e StGB}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {107--110}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1571-1}, doi = {10.1007/S11623-022-1571-1}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Vassilaki22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert22, author = {Thilo Weichert}, title = {Anmerkung zum Urteil des {OVG} Schleswig-Holstein vom 25.11.2021 - Unzul{\"{a}}ssigkeit einer Facebook-Fanpage}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {239--241}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1595-6}, doi = {10.1007/S11623-022-1595-6}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert22a, author = {Thilo Weichert}, title = {Die Ernennung von Mitgliedern nach Art. 53 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {371--375}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1622-7}, doi = {10.1007/S11623-022-1622-7}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert22b, author = {Thilo Weichert}, title = {Was das Abtreibungsrecht in den {USA} mit Datenschutz zu tun hat}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {511--515}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1649-9}, doi = {10.1007/S11623-022-1649-9}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeichertGG22, author = {Thilo Weichert and Ludwig Gramlich and Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {724--728}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1690-8}, doi = {10.1007/S11623-022-1690-8}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeichertGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weiss22, author = {Andreas Weiss}, title = {Gaia-X - Grundlagen f{\"{u}}r den Aufbau f{\"{o}}derierter, digitaler {\"{O}}kosysteme nach europ{\"{a}}ischen Regeln}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {227--232}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1593-8}, doi = {10.1007/S11623-022-1593-8}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weiss22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Welz22, author = {Georges Welz}, title = {Ein neuer sicherer Hafen in der Cloud - auch f{\"{u}}r staatliche Verschlusssachen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {622--626}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1670-z}, doi = {10.1007/S11623-022-1670-Z}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Welz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wichmann22, author = {Markus Wichmann}, title = {TeleTrusT European Bridge {CA}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {215--216}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1590-y}, doi = {10.1007/S11623-022-1590-Y}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wichmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Will22, author = {Michael Will}, title = {E-Mail-Accounts im Visier von Cyberkriminellen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {485--486}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1644-1}, doi = {10.1007/S11623-022-1644-1}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Will22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wolff22, author = {Daniel Wolff}, title = {KI-Biases im Gesundheitswesen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {733--738}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1695-3}, doi = {10.1007/S11623-022-1695-3}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wolff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wonnemann22, author = {Claus Wonnemann}, title = {Cyber-Security entlang der IoT-Lieferkette}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {455--458}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1638-z}, doi = {10.1007/S11623-022-1638-Z}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wonnemann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22, title = {Verarbeitungen des Datums , , Impfstatus" von Besch{\"{a}}ftigten durch die Arbeitgeberin oder den Arbeitgeber}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {4}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1550-6}, doi = {10.1007/S11623-022-1550-6}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22a, title = {{\"{O}}ffentliche Verwaltung - Digitalisierung 2022}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {52}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1560-4}, doi = {10.1007/S11623-022-1560-4}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22aa, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {584--591}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1663-y}, doi = {10.1007/S11623-022-1663-Y}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ab, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {592--600}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1664-x}, doi = {10.1007/S11623-022-1664-X}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ac, title = {Hyperscaler - die Globalisierung von Cloud-Diensten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {660}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1678-4}, doi = {10.1007/S11623-022-1678-4}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ad, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {661--671}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1679-3}, doi = {10.1007/S11623-022-1679-3}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ae, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {671--680}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1680-x}, doi = {10.1007/S11623-022-1680-X}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22af, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {707--716}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1688-2}, doi = {10.1007/S11623-022-1688-2}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ag, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {782--790}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1701-9}, doi = {10.1007/S11623-022-1701-9}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ah, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {791--797}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1702-8}, doi = {10.1007/S11623-022-1702-8}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22ah.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22b, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {53--63}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1561-3}, doi = {10.1007/S11623-022-1561-3}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22c, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {64--72}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1562-2}, doi = {10.1007/S11623-022-1562-2}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22d, title = {{DSK:} Neue Orientierungshilfe f{\"{u}}r Anbieter: innen von Telemedien}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {76}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1564-0}, doi = {10.1007/S11623-022-1564-0}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22e, title = {Whistleblowing - Fehlende Umsetzung einer EU-Richtlinie}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {111--112}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1572-0}, doi = {10.1007/S11623-022-1572-0}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22f, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {113--121}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1573-z}, doi = {10.1007/S11623-022-1573-Z}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22g, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {122--128}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1574-y}, doi = {10.1007/S11623-022-1574-Y}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22h, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {128--132}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1575-x}, doi = {10.1007/S11623-022-1575-X}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22i, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {176--186}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1584-9}, doi = {10.1007/S11623-022-1584-9}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22j, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {187--196}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1585-8}, doi = {10.1007/S11623-022-1585-8}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22k, title = {103. Datenschutzkonferenz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {310--311}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1609-4}, doi = {10.1007/S11623-022-1609-4}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22l, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {312--318}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1610-y}, doi = {10.1007/S11623-022-1610-Y}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22m, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {319--327}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1611-x}, doi = {10.1007/S11623-022-1611-X}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22n, title = {Information zur Nutzung von Facebook-Fanpages}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {338}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1615-6}, doi = {10.1007/S11623-022-1615-6}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22o, title = {Einwilligung eines Kindes}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {390}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1626-3}, doi = {10.1007/S11623-022-1626-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22p, title = {Einwilligung eines Kindes}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {391--398}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1627-2}, doi = {10.1007/S11623-022-1627-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22q, title = {DuD Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {399--408}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1628-1}, doi = {10.1007/S11623-022-1628-1}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22r, title = {Digitalisierung ist kein Selbstzweck!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {409}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1629-0}, doi = {10.1007/S11623-022-1629-0}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22s, title = {Die Zeit f{\"{u}}r ein Besch{\"{a}}ftigtendatenschutzgesetz ist , , Jetzt"!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {459--460}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1639-y}, doi = {10.1007/S11623-022-1639-Y}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22t, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {461--470}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1640-5}, doi = {10.1007/S11623-022-1640-5}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22u, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {471--477}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1641-4}, doi = {10.1007/S11623-022-1641-4}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22v, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {477--480}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1642-3}, doi = {10.1007/S11623-022-1642-3}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22w, title = {Aufgel{\"{o}}ste Verantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {481}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1643-2}, doi = {10.1007/S11623-022-1643-2}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22x, title = {Mehr Rechtssicherheit f{\"{u}}r die IT-Sicherheitsforschung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {516--517}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1650-3}, doi = {10.1007/S11623-022-1650-3}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22y, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {518--525}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1651-2}, doi = {10.1007/S11623-022-1651-2}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22z, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {526--532}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1652-1}, doi = {10.1007/S11623-022-1652-1}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZendelZ22, author = {Oliver Zendel and Marianne Ziesmer}, title = {Geheimkommunikation mit moderner {IT}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {640--642}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1674-8}, doi = {10.1007/S11623-022-1674-8}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ZendelZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZunabovicG22, author = {Sandra Zunabovic and Rainer W. Gerling}, title = {IT-Sicherheit in der Arztpraxis}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {499--504}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1647-y}, doi = {10.1007/S11623-022-1647-Y}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ZunabovicG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Amend21, author = {Arlette Amend}, title = {Anwaltliche Geheimhaltungspflicht vs. Datenschutzaufsicht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {265--270}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1431-4}, doi = {10.1007/S11623-021-1431-4}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Amend21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Barth21, author = {Marlene Barth}, title = {A Case Study on Data Portability}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {190--197}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1416-3}, doi = {10.1007/S11623-021-1416-3}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Barth21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BartschW21, author = {Markus Bartsch and Markus Wagner}, title = {Automotive Security mit der On-Board Telematics Platform {(OTP)}}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {90--94}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1396-3}, doi = {10.1007/S11623-021-1396-3}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BartschW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Birk21, author = {Dominik Birk}, title = {Managed Security Services: Hilfe oder Herausforderung f{\"{u}}r die Informationssicherheit?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {676--679}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1513-3}, doi = {10.1007/S11623-021-1513-3}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Birk21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Blankertz21, author = {Aline Blankertz}, title = {Vertrauliche Datentreuhand}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {789--793}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1538-7}, doi = {10.1007/S11623-021-1538-7}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Blankertz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann21, author = {Dominik Bleckmann}, title = {Aus Schaden wird man klug - Warum {KRITIS} wichtig ist}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {577}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1492-4}, doi = {10.1007/S11623-021-1492-4}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Block21, author = {Helga Block}, title = {Zugriffe von Strafverfolgungsbeh{\"{o}}rden auf Corona-Kontaktlisten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {4}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1380-3}, doi = {10.1007/S11623-020-1380-3}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Block21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Boenisch21, author = {Franziska Boenisch}, title = {Privatsph{\"{a}}re und Maschinelles Lernen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {448--452}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1469-3}, doi = {10.1007/S11623-021-1469-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Boenisch21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BosseDW21, author = {Christian K. Bosse and Aljoscha Dietrich and Andreas We{\ss}ner}, title = {Selbstbewertungsinstrument f{\"{u}}r den betrieblichen Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {23--27}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1384-z}, doi = {10.1007/S11623-020-1384-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BosseDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Braun21, author = {Sven Braun}, title = {Kontrollen risikoreicher Verarbeitungen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {126--130}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1402-9}, doi = {10.1007/S11623-021-1402-9}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Braun21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BretthauerAB21, author = {Sebastian Bretthauer and Arno Appenzeller and Pascal Birnstill}, title = {Datensouver{\"{a}}nit{\"{a}}t f{\"{u}}r Patienten im Gesundheitswesen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {173--179}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1413-6}, doi = {10.1007/S11623-021-1413-6}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BretthauerAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {131--141}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1403-8}, doi = {10.1007/S11623-021-1403-8}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {272--283}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1433-2}, doi = {10.1007/S11623-021-1433-2}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21b, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {336--343}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1445-y}, doi = {10.1007/S11623-021-1445-Y}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21c, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {405--416}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1461-y}, doi = {10.1007/S11623-021-1461-Y}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21d, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {480--486}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1476-4}, doi = {10.1007/S11623-021-1476-4}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21e, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {553--562}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1488-0}, doi = {10.1007/S11623-021-1488-0}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner21e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21f, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {628--635}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1504-4}, doi = {10.1007/S11623-021-1504-4}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner21f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21g, author = {Benedikt Buchner}, title = {Widerrufbarkeit der Einwilligung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {831}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1545-8}, doi = {10.1007/S11623-021-1545-8}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner21g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner21h, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {832--841}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1546-7}, doi = {10.1007/S11623-021-1546-7}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner21h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BuchnerHHPKSS21, author = {Benedikt Buchner and Anna Christine Haber and Horst Karl Hahn and Fabian Prasser and Harald Kusch and Ulrich Sax and Carsten Oliver Schmidt}, title = {Das Modell der Datentreuhand in der medizinischen Forschung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {806--810}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1534-y}, doi = {10.1007/S11623-021-1534-Y}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BuchnerHHPKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CoesterP21, author = {Ulla Coester and Norbert Pohlmann}, title = {Vertrauen - ein elementarer Aspekt der digitalen Zukunft}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {120--125}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1401-x}, doi = {10.1007/S11623-021-1401-X}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/CoesterP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad21, author = {Conrad Sebastian Conrad}, title = {Die , , Verarbeitung" im Sinne der {DSGVO} - und die Realit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {603--608}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1499-x}, doi = {10.1007/S11623-021-1499-X}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DielKSS21, author = {Sarah Diel and Matthias Kohn and Janine Schleper and Annika Selzer}, title = {Datenschutzmetriken im Besch{\"{a}}ftigungsverh{\"{a}}ltnis}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {821--825}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1543-x}, doi = {10.1007/S11623-021-1543-X}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DielKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DietrichBS21, author = {Aljoscha Dietrich and Christian K. Bosse and Hartmut Schmitt}, title = {Kontrolle und {\"{U}}berwachung von Besch{\"{a}}ftigten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {5--10}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1381-2}, doi = {10.1007/S11623-020-1381-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DietrichBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Djeffal21, author = {Christian Djeffal}, title = {Art. 22 {DSGVO} als sozio-technische Gestaltungsnorm}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {529--533}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1484-4}, doi = {10.1007/S11623-021-1484-4}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Djeffal21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DopmannMFT21, author = {Christoph D{\"{o}}pmann and Matthias Marx and Hannes Federrath and Florian Tschorsch}, title = {Tor Relays an Universit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {320--325}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1442-1}, doi = {10.1007/S11623-021-1442-1}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DopmannMFT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DopmannMFT21a, author = {Christoph D{\"{o}}pmann and Matthias Marx and Hannes Federrath and Florian Tschorsch}, title = {Erratum zu: Tor Relays an Universit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {849}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1533-z}, doi = {10.1007/S11623-021-1533-Z}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DopmannMFT21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DreyerK21, author = {Bastian Dreyer and Gerhard Kramarz{-}von Kohout}, title = {Modernisierung der Telekommunikation}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {747--754}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1528-9}, doi = {10.1007/S11623-021-1528-9}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DreyerK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Eckhardt21, author = {Jens Eckhardt}, title = {Wann ist ein IoT-Ger{\"{a}}t datenschutzrelevant?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {107--113}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1399-0}, doi = {10.1007/S11623-021-1399-0}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Eckhardt21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Eichenhofer21, author = {Johannes Eichenhofer}, title = {Stand und Perspektiven einer Global Governance der Internet Privacy}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {159--162}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1410-9}, doi = {10.1007/S11623-021-1410-9}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Eichenhofer21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EscheMN21, author = {Marko Esche and Reinhard Meyer and Martin Nischwitz}, title = {Conformity assessment of measuring instruments with artificial intelligence}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {184--189}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1415-4}, doi = {10.1007/S11623-021-1415-4}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EscheMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber21, author = {Eberhard von Faber}, title = {Zur Zukunft des IT-Sicherheitsmanagements angesichts des Wandels von Technik und Serviceerbringung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {691--697}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1516-0}, doi = {10.1007/S11623-021-1516-0}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerGG21, author = {Arno Fiedler and Ernst{-}G{\"{u}}nter Giessmann and Franziska Granc}, title = {Rechtskonforme Pr{\"{u}}fung elektronischer Signaturen gestern und heute}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {654--658}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1509-z}, doi = {10.1007/S11623-021-1509-Z}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerTT21, author = {Arno Fiedler and Christoph Thiel and Christian Thiel}, title = {Verl{\"{a}}ssliche Personenidentifizierung mittels Techniken der K{\"{u}}nstlichen Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {462--466}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1472-8}, doi = {10.1007/S11623-021-1472-8}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FlieheB21, author = {Marc Fliehe and Elisa Brummel}, title = {Eckpunkte eines sicheren {\"{O}}kosystems f{\"{u}}r KI-Anwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {444--447}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1468-4}, doi = {10.1007/S11623-021-1468-4}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FlieheB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox21, author = {Dirk Fox}, title = {Umsetzungsfragen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {153}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1407-4}, doi = {10.1007/S11623-021-1407-4}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox21a, author = {Dirk Fox}, title = {Lesen bildet}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {293}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1436-z}, doi = {10.1007/S11623-021-1436-Z}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox21b, author = {Dirk Fox}, title = {Phishing}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {717}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1521-3}, doi = {10.1007/S11623-021-1521-3}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FoxT21, author = {Dirk Fox and Christian Titze}, title = {Phishing Awareness durch Gamification}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {727--732}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1524-0}, doi = {10.1007/S11623-021-1524-0}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FoxT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geminn21, author = {Christian L. Geminn}, title = {Datenschutz bei Sprachassistenten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {509--514}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1481-7}, doi = {10.1007/S11623-021-1481-7}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Geminn21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gisch21, author = {Mathias Gisch}, title = {F{\"{u}}hrungsinformationssysteme in der {\"{o}}ffentlichen Verwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {11--18}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1382-1}, doi = {10.1007/S11623-020-1382-1}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gisch21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gola21, author = {Peter Gola}, title = {Das Verbandssanktionengesetz-E und betriebliche Datenschutzbeauftragte}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {472--478}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1474-6}, doi = {10.1007/S11623-021-1474-6}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gola21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Golla21, author = {Sebastian Golla}, title = {Volatiles Datenschutzbu{\ss}geld}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {180--183}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1414-5}, doi = {10.1007/S11623-021-1414-5}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Golla21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber21, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {350--352}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1447-9}, doi = {10.1007/S11623-021-1447-9}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gruber21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen21, author = {Marit Hansen}, title = {Informationssicherheit: Aufgabe f{\"{u}}r die Datenschutzaufsicht?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {234--238}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1425-2}, doi = {10.1007/S11623-021-1425-2}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Hansen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HansenP21, author = {Marit Hansen and Thomas Probst}, title = {Die ambivalente Beziehung zwischen eGovernment und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {664--668}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1511-5}, doi = {10.1007/S11623-021-1511-5}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HansenP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeidrichW21, author = {Joerg Heidrich and Christoph Wegener}, title = {Dauerhaft sicher zu Hause}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {680--685}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1514-2}, doi = {10.1007/S11623-021-1514-2}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeidrichW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HofBB21, author = {Hans{-}Joachim Hof and Dominik Bayerl and Kevin Klaus Gomez Buquerin}, title = {{\"{U}}berwachung in modernen Fahrzeugen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {399--403}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1459-5}, doi = {10.1007/S11623-021-1459-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HofBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoffmannK21, author = {Hanna Hoffmann and Johannes Kevekordes}, title = {Das Right to Explanation}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {609--615}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1500-8}, doi = {10.1007/S11623-021-1500-8}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoffmannK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hohne21, author = {Marina Marie{-}Claire H{\"{o}}hne}, title = {Nachvollziehbare K{\"{u}}nstliche Intelligenz: Methoden, Chancen und Risiken}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {453--456}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1470-x}, doi = {10.1007/S11623-021-1470-X}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hohne21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/IaconoS21, author = {Luigi Lo Iacono and Hartmut Schmitt}, title = {Informationelle Selbstbestimmung am Arbeitsplatz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {1}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1379-9}, doi = {10.1007/S11623-020-1379-9}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/IaconoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jung21, author = {Marco M{\"{u}}ller{-}ter Jung}, title = {Datenschutz im Internet der Dinge}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {114--119}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1400-y}, doi = {10.1007/S11623-021-1400-Y}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Jung21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kammerloher21, author = {Dominik Kammerloher}, title = {Cybersecurity: Ein sicheres Fundament f{\"{u}}r den digitalen Staat}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {649--653}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1508-0}, doi = {10.1007/S11623-021-1508-0}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kammerloher21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KarlH21, author = {Wilfried Karl and Christian Hummert}, title = {Digitale Souver{\"{a}}nit{\"{a}}t: Die Rolle der ZITiS in der deutschen Cybersicherheitsarchitektur}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {223--228}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1423-4}, doi = {10.1007/S11623-021-1423-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KarlH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KastropP21, author = {Christian Kastrop and Dominic Ponattu}, title = {K{\"{u}}nstliche Intelligenz muss dem Gemeinwohl dienen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {434--437}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1466-6}, doi = {10.1007/S11623-021-1466-6}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KastropP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber21, author = {Ulrich Kelber}, title = {Zu {\"{u}}berarbeiteten Standarddatenschutzklauseln und zur Data-Mining Entscheidung des BVerfG}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {158}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1409-2}, doi = {10.1007/S11623-021-1409-2}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber21a, author = {Ulrich Kelber}, title = {K{\"{u}}nstliche Intelligenz im Bereich der Strafverfolgung und Gefahrenabwehr}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {780--782}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1536-9}, doi = {10.1007/S11623-021-1536-9}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kellermann21, author = {Gero Kellermann}, title = {Die Meinungsfreiheit als verfassungspolitische Herausforderung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {363--367}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1451-0}, doi = {10.1007/S11623-021-1451-0}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kellermann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerP21, author = {Dennis{-}Kenji Kipker and Sebastian Pape}, title = {Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {310--314}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1440-3}, doi = {10.1007/S11623-021-1440-3}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KipkerP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS21, author = {Dennis{-}Kenji Kipker and Dario Scholz}, title = {Das IT-Sicherheitsgesetz 2.0}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {40--45}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1387-9}, doi = {10.1007/S11623-020-1387-9}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KlausWLW21, author = {Marko Klaus and Dominik Wei{\ss}haar and Andreas Lang and Enrico Weide}, title = {Identifizierung relevanter Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {738--741}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1526-y}, doi = {10.1007/S11623-021-1526-Y}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KlausWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KneuperJ21, author = {Ralf Kneuper and Sven Jacobs}, title = {Softwaretest mit Originaldaten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {163--167}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1411-8}, doi = {10.1007/S11623-021-1411-8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KneuperJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KowalskiIM21, author = {Bernd Kowalski and Matthias Intemann and Tobias M{\"{u}}hlenbruch}, title = {Bedeutung des Cybersecurity Acts f{\"{u}}r die IT-Sicherheitszertifizierung in Deutschland und Europa}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {244--248}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1427-0}, doi = {10.1007/S11623-021-1427-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KowalskiIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KreutzerS21, author = {Michael Kreutzer and Markus Schneider}, title = {Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {249--253}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1428-z}, doi = {10.1007/S11623-021-1428-Z}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KreutzerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kroschwald21, author = {Steffen Kroschwald}, title = {K{\"{u}}nstliche Intelligenz im autonomen Auto}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {522--528}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1483-5}, doi = {10.1007/S11623-021-1483-5}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kroschwald21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann21, author = {Dieter Kugelmann}, title = {Ein Jahr Corona-Pandemie - Mehr Digitalisierung braucht effizienteren Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {297}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1437-y}, doi = {10.1007/S11623-021-1437-Y}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann21a, author = {Dieter Kugelmann}, title = {EU-Vorschlag zu K{\"{u}}nstlicher Intelligenz muss aus Datenschutz-Perspektive durchleuchtet werden}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {433}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1465-7}, doi = {10.1007/S11623-021-1465-7}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann21b, author = {Dieter Kugelmann}, title = {K{\"{u}}nstliche Intelligenz aus Sicht der Datenschutzaufsicht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {503--508}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1480-8}, doi = {10.1007/S11623-021-1480-8}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kuhling21, author = {J{\"{u}}rgen K{\"{u}}hling}, title = {Scoring, Plausibilisierung und Imputation}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {168--172}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1412-7}, doi = {10.1007/S11623-021-1412-7}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kuhling21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kuhling21a, author = {J{\"{u}}rgen K{\"{u}}hling}, title = {Der datenschutzrechtliche Rahmen f{\"{u}}r Datentreuh{\"{a}}nder}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {783--788}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1537-8}, doi = {10.1007/S11623-021-1537-8}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kuhling21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhlingB21, author = {J{\"{u}}rgen K{\"{u}}hling and Benedikt Buchner}, title = {Datentreuh{\"{a}}nder}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {777}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1535-x}, doi = {10.1007/S11623-021-1535-X}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KuhlingB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhneRZ21, author = {Christian Ricardo K{\"{u}}hne and Martin Rost and Stefan Zwierlein}, title = {Risiken in 3D}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {742--746}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1527-x}, doi = {10.1007/S11623-021-1527-X}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KuhneRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kunast21, author = {Renate K{\"{u}}nast}, title = {Hass im Netz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {368--370}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1452-z}, doi = {10.1007/S11623-021-1452-Z}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kunast21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lahmann21, author = {Henning Lahmann}, title = {Zur operativen Zusammenarbeit zwischen Staat und Wirtschaft in der Cybersicherheit in Deutschland}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {239--243}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1426-1}, doi = {10.1007/S11623-021-1426-1}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lahmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LeichtM21, author = {Maximilian Leicht and Frederik M{\"{o}}llers}, title = {Zur (Un-)Sicherheit von Zwei-Faktor-Authentifizierung via {SMS}}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {541--545}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1486-2}, doi = {10.1007/S11623-021-1486-2}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LeichtM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LewinskiH21, author = {Kai von Lewinski and Johanna H{\"{a}}hnle}, title = {Was informatisch richtig ist, kann auch juristisch recht sein}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {686--690}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1515-1}, doi = {10.1007/S11623-021-1515-1}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LewinskiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LipowiczS21, author = {Irena Lipowicz and Grazyna Szpor}, title = {Neue Aspekte der Desinformation}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {381--384}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1455-9}, doi = {10.1007/S11623-021-1455-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LipowiczS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LoberLDR21, author = {Lena Isabell L{\"{o}}ber and Sebastian Lange and Klaus David and Alexander Ro{\ss}nagel}, title = {Datenschutzfreundliche Algorithmen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {616--622}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1501-7}, doi = {10.1007/S11623-021-1501-7}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LoberLDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mangels21, author = {Fabian Mangels}, title = {{KRITIS} zu Zeiten einer Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {579--583}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1494-2}, doi = {10.1007/S11623-021-1494-2}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mangels21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Margraf21, author = {Marian Margraf}, title = {Systeme der K{\"{u}}nstlichen Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {429}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1464-8}, doi = {10.1007/S11623-021-1464-8}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Margraf21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MarkertB21, author = {Karla Markert and Konstantin B{\"{o}}ttinger}, title = {Robuste Lernverfahren}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {457--461}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1471-9}, doi = {10.1007/S11623-021-1471-9}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MarkertB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Martius21, author = {Kai Martius}, title = {{SINA:} IT-Sicherheit als Infrastruktur betrachtet}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {659--663}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1510-6}, doi = {10.1007/S11623-021-1510-6}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Martius21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester21, author = {Britta Alexandra Mester}, title = {{KRITIS} als Teil einer modernen Gesellschaft}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {573}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1491-5}, doi = {10.1007/S11623-021-1491-5}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester21a, author = {Britta Alexandra Mester}, title = {Kritische Infrastrukturen {(KRITIS)}}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {627}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1503-5}, doi = {10.1007/S11623-021-1503-5}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Milde21, author = {Thomas Milde}, title = {Business Continuity im F{\"{o}}deralismus}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {669--675}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1512-4}, doi = {10.1007/S11623-021-1512-4}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Milde21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mohle21, author = {Jan{-}Peter M{\"{o}}hle}, title = {Totalrevision des Schweizer Datenschutzgesetzes - Ende gut, alles gut?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {598--602}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1498-y}, doi = {10.1007/S11623-021-1498-Y}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mohle21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Molnar-Gabor21, author = {Fruzsina Moln{\'{a}}r{-}G{\'{a}}bor}, title = {Ausgestaltung der Einwilligung in die Datenspende f{\"{u}}r die Gesundheitsforschung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {799--805}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1540-0}, doi = {10.1007/S11623-021-1540-0}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Molnar-Gabor21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MorgensternPC21, author = {Maik Morgenstern and Olaf Pursche and Eric Clausing}, title = {Die Sicherheitslage im IoT-Umfeld}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {102--106}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1398-1}, doi = {10.1007/S11623-021-1398-1}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MorgensternPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Niewohner21, author = {Mario Niew{\"{o}}hner}, title = {NetzDG und Meinungsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {391--395}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1457-7}, doi = {10.1007/S11623-021-1457-7}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Niewohner21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Oettel21, author = {Maurice Oettel}, title = {Wesensdaten: Regulierungsl{\"{u}}cke im derzeitigen Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {623--626}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1502-6}, doi = {10.1007/S11623-021-1502-6}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Oettel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/OttmannPSSRF21, author = {Jenny Ottmann and Johannes Pollach and Nicole Scheler and Janine Schneider and Christian R{\"{u}}ckert and Felix C. Freiling}, title = {Zur Blackbox-Problematik im Bereich Mobilfunkforensik}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {546--552}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1487-1}, doi = {10.1007/S11623-021-1487-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/OttmannPSSRF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PetrlicD21, author = {Ronald Petrlic and Leo Dessani}, title = {E-Mail-Sicherheit auf dem Pr{\"{u}}fstand}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {534--540}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1485-3}, doi = {10.1007/S11623-021-1485-3}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PetrlicD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pfrang21, author = {Sebastian Pfrang}, title = {Aufz{\"{a}}hlung der datenschutzrechtlichen Grunds{\"{a}}tze gem{\"{a}}{\ss} Art. 5 {DS-GVO} in Betriebsvereinbarungen?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {396--398}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1458-6}, doi = {10.1007/S11623-021-1458-6}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pfrang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PilgermannSSW21, author = {Michael Pilgermann and Stefan Stein and Thomas Schrader and Simon Weber}, title = {Angriffserkennung beim Betrieb von {KRITIS} gem{\"{a}}{\ss} IT-Sicherheitsgesetz 2.0}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {733--737}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1525-z}, doi = {10.1007/S11623-021-1525-Z}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PilgermannSSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann21, author = {Norbert Pohlmann}, title = {Sicherheitsbedarf von IoT-Anwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {73}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1391-8}, doi = {10.1007/S11623-021-1391-8}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann21a, author = {Norbert Pohlmann}, title = {Chancen und Risiken von Smart Home}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {95--101}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1397-2}, doi = {10.1007/S11623-021-1397-2}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PolstTDF21, author = {Svenja Polst and Jan Tolsdorf and Florian Dehling and Denis Feth}, title = {Verarbeitung von Besch{\"{a}}ftigtendaten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {19--22}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1383-0}, doi = {10.1007/S11623-020-1383-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PolstTDF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PotthoffS21, author = {Tobias S. Potthoff and Dorothee Schrief}, title = {Gesch{\"{a}}ftsrelevanz Datenschutz spezifischer Zertifizierungen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {326--329}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1443-0}, doi = {10.1007/S11623-021-1443-0}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PotthoffS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Raji21, author = {Behrang Raji}, title = {Rechtliche Bewertung synthetischer Daten f{\"{u}}r KI-Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {303--309}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1439-9}, doi = {10.1007/S11623-021-1439-9}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Raji21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReichmannEBKMSB21, author = {Henrik Reichmann and Malte Elson and Nele Borgert and Dennis{-}Kenji Kipker and Rainer Malaka and Karsten Sohr and Mehrdad Bahrini}, title = {Erfahrbarer Datenschutz und IT-Sicherheit in Smart Home-Anwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {259--264}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1430-5}, doi = {10.1007/S11623-021-1430-5}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ReichmannEBKMSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21, author = {Helmut Reimer}, title = {Der Abnutzungseffekt gro{\ss}er Visionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {76--77}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1392-7}, doi = {10.1007/S11623-021-1392-7}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {142--148}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1404-7}, doi = {10.1007/S11623-021-1404-7}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21b, author = {Helmut Reimer}, title = {Herausforderungen durch neue Konzepte}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {271}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1432-3}, doi = {10.1007/S11623-021-1432-3}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21c, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {284--290}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1434-1}, doi = {10.1007/S11623-021-1434-1}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21d, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {344--350}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1446-x}, doi = {10.1007/S11623-021-1446-X}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21e, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {417--424}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1462-x}, doi = {10.1007/S11623-021-1462-X}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer21e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21f, author = {Helmut Reimer}, title = {{KI:} Zwischen Realit{\"{a}}t und Vision}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {479}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1475-5}, doi = {10.1007/S11623-021-1475-5}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer21f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21g, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {487--496}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1477-3}, doi = {10.1007/S11623-021-1477-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer21g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21h, author = {Helmut Reimer}, title = {Report 08-2021}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {563--569}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1489-z}, doi = {10.1007/S11623-021-1489-Z}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer21h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21i, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {636--644}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1505-3}, doi = {10.1007/S11623-021-1505-3}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer21i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer21j, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {842--849}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1547-6}, doi = {10.1007/S11623-021-1547-6}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer21j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RemyS21, author = {Jan Remy and Ralf Stettner}, title = {Cybersicherheit als Aufgabe der L{\"{a}}nder}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {254--258}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1429-y}, doi = {10.1007/S11623-021-1429-Y}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RemyS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Riemenschneider21, author = {Severin Riemenschneider and Marina Lutz}, title = {{\#}HateSpeech - Shitstorms als Kampfmittel organisierter Strukturen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {371--374}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1453-y}, doi = {10.1007/S11623-021-1453-Y}, timestamp = {Sun, 05 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Riemenschneider21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel21, author = {Alexander Ro{\ss}nagel}, title = {K{\"{u}}nstliche Intelligenz datenschutzrechtlich gestalten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {497--498}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1478-2}, doi = {10.1007/S11623-021-1478-2}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schafer21, author = {Burkhard Schafer}, title = {Death by a Thousand Cuts: Cumulative Data Effects and the Corbyn Affair}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {385--390}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1456-8}, doi = {10.1007/S11623-021-1456-8}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schafer21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schallbruch21, author = {Martin Schallbruch}, title = {Cybersicherheitsarchitektur - Gro{\ss}baustelle ohne Plan}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {217}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1420-7}, doi = {10.1007/S11623-021-1420-7}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schallbruch21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schallbruch21a, author = {Martin Schallbruch}, title = {Mehr Unabh{\"{a}}ngigkeit f{\"{u}}r das BSI?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {229--233}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1424-3}, doi = {10.1007/S11623-021-1424-3}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schallbruch21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schallbruch21b, author = {Martin Schallbruch}, title = {EU-Regulierung der K{\"{u}}nstlichen Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {438--443}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1467-5}, doi = {10.1007/S11623-021-1467-5}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schallbruch21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchindlerH21, author = {Stephan Schindler and Gerrit Hornung}, title = {Datenschutz bei der biometrischen Gesichtserkennung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {515--521}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1482-6}, doi = {10.1007/S11623-021-1482-6}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchindlerH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmittG21, author = {Hartmut Schmitt and Eduard C. Groen}, title = {Qualit{\"{a}}tsmodell zur F{\"{o}}rderung des Besch{\"{a}}ftigtendatenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {28--32}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1385-y}, doi = {10.1007/S11623-020-1385-Y}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchmittG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmittG21a, author = {Hartmut Schmitt and Eduard C. Groen}, title = {Erratum zu: Qualit{\"{a}}tsmodell zur F{\"{o}}rderung des Besch{\"{a}}ftigtendatenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {148}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1405-6}, doi = {10.1007/S11623-021-1405-6}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchmittG21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnebbe21, author = {Maximilian Schnebbe}, title = {{TTDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {404}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1460-z}, doi = {10.1007/S11623-021-1460-Z}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnebbe21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchraheS21, author = {Dominik Schrahe and Thomas St{\"{a}}dter}, title = {COVID-19-Impf- und -Testnachweise}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {315--319}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1441-2}, doi = {10.1007/S11623-021-1441-2}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchraheS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchulteS21, author = {Laura Schulte and Johanna Schmale}, title = {Vertragliche Absicherung internationaler Datentransfers}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {46--54}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1388-8}, doi = {10.1007/S11623-020-1388-8}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchulteS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchwartmannB21, author = {Rolf Schwartmann and Kristin Benedikt}, title = {Anerkannte Dienste der Einwilligungsverwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {811--815}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1541-z}, doi = {10.1007/S11623-021-1541-Z}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchwartmannB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SelzerT21, author = {Annika Selzer and Ingo J. Timm}, title = {Potenziale anonymer Datenverarbeitungen nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {816--820}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1542-y}, doi = {10.1007/S11623-021-1542-Y}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SelzerT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SelzerT21a, author = {Annika Selzer and Ingo J. Timm}, title = {Gestaltung eines Treuhand-Systems zum anonymen Datenaustausch in einer Smart-City-Umgebung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {826--830}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1544-9}, doi = {10.1007/S11623-021-1544-9}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SelzerT21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Smoltczyk21, author = {Maja Smoltczyk}, title = {Datenschutz ist kein Hindernis f{\"{u}}r digitalen Unterricht - Schulen brauchen Unterst{\"{u}}tzung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {222}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1422-5}, doi = {10.1007/S11623-021-1422-5}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Smoltczyk21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Specht-Riemenschneider21, author = {Louisa Specht{-}Riemenschneider and Lea Lorbach}, title = {Rechtsschutz gegen Pers{\"{o}}nlichkeitsrechtsverletzungen im Netz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {375--380}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1454-x}, doi = {10.1007/S11623-021-1454-X}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Specht-Riemenschneider21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Specht-Riemenschneider21a, author = {Louisa Specht{-}Riemenschneider and Lea Lorbach}, title = {Rechtsschutz gegen Pers{\"{o}}nlichkeitsrechtsverletzungen im Netz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {7}, pages = {467--471}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1473-7}, doi = {10.1007/S11623-021-1473-7}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Specht-Riemenschneider21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Steinrotter21, author = {Bj{\"{o}}rn Steinr{\"{o}}tter}, title = {Das Konzept einer datenaltruistischen Organisation}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {794--798}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1539-6}, doi = {10.1007/S11623-021-1539-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Steinrotter21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stradomsky21, author = {Christopher Stradomsky}, title = {{KRITIS} - Der Weg zum Audit}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {589--593}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1496-0}, doi = {10.1007/S11623-021-1496-0}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stradomsky21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Sunderman21, author = {Steffen Sunderman}, title = {Abdingbarkeit technischer oder organisatorischer Ma{\ss}nahmen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {594--597}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1497-z}, doi = {10.1007/S11623-021-1497-Z}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Sunderman21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tiedemann21, author = {Jan Tiedemann}, title = {Digitalisierung der industriellen Dinge}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {83--89}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1395-4}, doi = {10.1007/S11623-021-1395-4}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tiedemann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld21, author = {Marie{-}Theres Tinnefeld}, title = {Keine unbedingte Toleranz f{\"{u}}r Feinde der Freiheit!}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {359--362}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1450-1}, doi = {10.1007/S11623-021-1450-1}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB21, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Toleranz, Meinungsfreiheit und Pers{\"{o}}nlichkeitsschutz}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {353}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1448-8}, doi = {10.1007/S11623-021-1448-8}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TolsdorfDF21, author = {Jan Tolsdorf and Florian Dehling and Denis Feth}, title = {Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {33--39}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1386-x}, doi = {10.1007/S11623-020-1386-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TolsdorfDF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VolkamerBABLT21, author = {Melanie Volkamer and Benjamin Berens and Lukas Aldag and Milan Burgdorf and Andreas Lorenz and Marie{-}Claire Thiery}, title = {NoPhish-Challenge-Karten}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {721--726}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1523-1}, doi = {10.1007/S11623-021-1523-1}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/VolkamerBABLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener21, author = {Christoph Wegener}, title = {Digitalisierung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {645}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1506-2}, doi = {10.1007/S11623-021-1506-2}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert21, author = {Thilo Weichert}, title = {Aufbewahrung nach Handels- und Steuerrecht - oder L{\"{o}}schung?}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {755--757}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1529-8}, doi = {10.1007/S11623-021-1529-8}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Weichert21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wiest21, author = {Simon Wiest}, title = {{ENIGMA} {R.D.E}}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {298--302}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1438-x}, doi = {10.1007/S11623-021-1438-X}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wiest21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wilczek21, author = {Marc Wilczek}, title = {IoT - die untersch{\"{a}}tzte Gefahr f{\"{u}}r IT-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {79--82}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1394-5}, doi = {10.1007/S11623-021-1394-5}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wilczek21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Woitke21, author = {Annika Woitke}, title = {Pr{\"{u}}fgrundlagen nach {\textsection} 8a}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {584--588}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1495-1}, doi = {10.1007/S11623-021-1495-1}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Woitke21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wunsche21, author = {Kai E. W{\"{u}}nsche}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {290--292}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1435-0}, doi = {10.1007/S11623-021-1435-0}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wunsche21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {55--63}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1389-7}, doi = {10.1007/S11623-020-1389-7}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21a, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {1}, pages = {64--72}, year = {2021}, url = {https://doi.org/10.1007/s11623-020-1390-1}, doi = {10.1007/S11623-020-1390-1}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21b, title = {Betreiber von Webseiten ben{\"{o}}tigen Rechtssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {78}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1393-6}, doi = {10.1007/S11623-021-1393-6}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21c, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {2}, pages = {149--152}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1406-5}, doi = {10.1007/S11623-021-1406-5}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21d, title = {Gretchenfrage}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {157}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1408-3}, doi = {10.1007/S11623-021-1408-3}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21e, title = {Instrumente f{\"{u}}r Drittstaaten-Transfers}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {198}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1417-2}, doi = {10.1007/S11623-021-1417-2}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21f, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {199--207}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1418-1}, doi = {10.1007/S11623-021-1418-1}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21g, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {3}, pages = {208--216}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1419-0}, doi = {10.1007/S11623-021-1419-0}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21h, title = {Pandemie und Digitalisierung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {4}, pages = {221}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1421-6}, doi = {10.1007/S11623-021-1421-6}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21i, title = {Impfnachweis, Nachweis negativen Testergebnisses und Genesungsnachweis geh{\"{o}}ren gesetzlich geregelt!}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {357--358}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1449-7}, doi = {10.1007/S11623-021-1449-7}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21j, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {6}, pages = {425--428}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1463-9}, doi = {10.1007/S11623-021-1463-9}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21k, title = {40. Konferenz der Informationsfreiheitsbeauftragten vom 02. Juni 2021 - Entschlie{\ss}ungen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {502}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1479-1}, doi = {10.1007/S11623-021-1479-1}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21l, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {8}, pages = {570--572}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1490-6}, doi = {10.1007/S11623-021-1490-6}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21m, title = {Erg{\"{a}}nzende Pr{\"{u}}fungen und Ma{\ss}nahmen trotz neuer EU-Standardvertragsklauseln f{\"{u}}r Datenexporte n{\"{o}}tig}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {9}, pages = {578}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1493-3}, doi = {10.1007/S11623-021-1493-3}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21n, title = {L{\"{a}}nder{\"{u}}bergreifende Datenschutz-Pr{\"{u}}fung von Medien-Webseiten: Nachbesserungen n{\"{o}}tig}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {648}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1507-1}, doi = {10.1007/S11623-021-1507-1}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21o, title = {Kryptographie und Benutzerfreundlichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {698}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1517-z}, doi = {10.1007/S11623-021-1517-Z}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21p, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {699--705}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1518-y}, doi = {10.1007/S11623-021-1518-Y}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21q, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {706--713}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1519-x}, doi = {10.1007/S11623-021-1519-X}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21r, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {713--716}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1520-4}, doi = {10.1007/S11623-021-1520-4}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X21r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21s, title = {Berliner Aufsichtsbeh{\"{o}}rde konfrontiert Webseiten-Betreibende mit rechtswidrigem Tracking}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {720}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1522-2}, doi = {10.1007/S11623-021-1522-2}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21t, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {758--764}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1530-2}, doi = {10.1007/S11623-021-1530-2}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21u, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {765--772}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1531-1}, doi = {10.1007/S11623-021-1531-1}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21v, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {11}, pages = {772--776}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1532-0}, doi = {10.1007/S11623-021-1532-0}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X21w, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {12}, pages = {850--852}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1548-5}, doi = {10.1007/S11623-021-1548-5}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X21w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ziegler21, author = {Stephanie Ziegler}, title = {Typisierte Ma{\ss}nahmenpl{\"{a}}ne f{\"{u}}r IT-Sicherheit im Mittelstand}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {5}, pages = {330--335}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1444-z}, doi = {10.1007/S11623-021-1444-Z}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ziegler21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Atug20, author = {Manuel Atug}, title = {Zertifizierungen im Kontext KRITIScher Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {668--671}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1346-5}, doi = {10.1007/S11623-020-1346-5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Atug20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Baum20, author = {Gerhart Baum}, title = {Nachruf auf Burkhard Hirsch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {351--352}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1282-4}, doi = {10.1007/S11623-020-1282-4}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Baum20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckat20, author = {Alexander Bleckat}, title = {Anwendbarkeit der Datenschutzgrundverordnung auf k{\"{u}}nstliche Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {194--198}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1250-z}, doi = {10.1007/S11623-020-1250-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bleckat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BremertHKP20, author = {Benjamin Bremert and Marit Hansen and Barbara K{\"{o}}rffer and Sven Polenz}, title = {Pandemie und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {791--795}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1368-z}, doi = {10.1007/S11623-020-1368-Z}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BremertHKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Breyer20, author = {Jonas Breyer}, title = {Der neue {\textsection} 2 {BORA}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {189--193}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1249-5}, doi = {10.1007/S11623-020-1249-5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Breyer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner20, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {476--484}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1309-x}, doi = {10.1007/S11623-020-1309-X}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner20a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {544--554}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1322-0}, doi = {10.1007/S11623-020-1322-0}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner20b, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {685--699}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1351-8}, doi = {10.1007/S11623-020-1351-8}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bungeroth20, author = {Christian Bungeroth}, title = {Vertrauen in Programme f{\"{u}}r IT-Sicherheit aufbauen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {240--244}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1259-3}, doi = {10.1007/S11623-020-1259-3}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bungeroth20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ChenHK20, author = {Jihong Chen and Lu Han and Dennis{-}Kenji Kipker}, title = {An Introduction into the New Chinese Data Protection Legal Framework}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {52--57}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1222-3}, doi = {10.1007/S11623-019-1222-3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ChenHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Coester20, author = {Ulla Coester}, title = {Vertrauensw{\"{u}}rdige {KI} - zwischen Anspruch und Wirklichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {245--249}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1260-x}, doi = {10.1007/S11623-020-1260-X}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Coester20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CoesterF20, author = {Ulla Coester and Bernd Fuhlert}, title = {Gesichtserkennung - eine Frage der Ethik?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {48--51}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1221-4}, doi = {10.1007/S11623-019-1221-4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/CoesterF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad20, author = {Conrad Sebastian Conrad}, title = {Datenschutz bei Zukunftsmodellen: Nur mit Einwilligung m{\"{o}}glich?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {611--616}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1334-9}, doi = {10.1007/S11623-020-1334-9}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DickhautJRL20, author = {Ernestine Dickhaut and Andreas Janson and Alexander Ro{\ss}nagel and Jan Marco Leimeister}, title = {Interdisziplin{\"{a}}re Anforderungsmuster f{\"{u}}r smarte pers{\"{o}}nliche Assistenten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {579--583}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1328-7}, doi = {10.1007/S11623-020-1328-7}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DickhautJRL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DickhautTJ20, author = {Ernestine Dickhaut and Laura Friederike Thies and Andreas Janson}, title = {Die Kodifizierung von Gestaltungswissen in interdisziplin{\"{a}}ren Entwurfsmustern}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {584--588}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1329-6}, doi = {10.1007/S11623-020-1329-6}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DickhautTJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dix20, author = {Alexander Dix}, title = {Die deutsche Corona Warn-App - ein gelungenes Beispiel f{\"{u}}r Privacy by Design?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {779--785}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1366-1}, doi = {10.1007/S11623-020-1366-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dix20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DolleHC20, author = {Wilhelm Dolle and Julian Herlinghaus and Marian Corbe}, title = {Sinn und Unsinn von Zertifizierungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {641--644}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1340-y}, doi = {10.1007/S11623-020-1340-Y}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DolleHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FahrmannA20, author = {Jan F{\"{a}}hrmann and Clemens Arzt}, title = {Polizeilicher Umgang mit personenbezogenen Daten in der Corona-Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {801--805}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1370-5}, doi = {10.1007/S11623-020-1370-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FahrmannA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerD20, author = {Arno Fiedler and Christian Drews}, title = {Vertrauen in der digitalen Welt auf , , Treu und Glauben"}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {231--235}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1257-5}, doi = {10.1007/S11623-020-1257-5}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FiedlerD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox20, author = {Dirk Fox}, title = {Offene Herausforderungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {81}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1227-y}, doi = {10.1007/S11623-020-1227-Y}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox20a, author = {Dirk Fox}, title = {Beben}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {497}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1312-2}, doi = {10.1007/S11623-020-1312-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox20b, author = {Dirk Fox}, title = {Die Praxis sollte das Ergebnis des Nachdenkens sein. Hermann Hesse}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {709}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1353-6}, doi = {10.1007/S11623-020-1353-6}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FrankB20, author = {Guido Frank and Thomas Becker}, title = {Aus dem Nirwana}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {456--461}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1305-1}, doi = {10.1007/S11623-020-1305-1}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FrankB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FreyeKEM20, author = {Merle Freye and Dennis{-}Kenji Kipker and Rindstone B. Ezekiel and Doreen F. Mwamlangala}, title = {Strengthening protection of personal data in the health sector: a comparative analysis of the Tanzanian and German eHealth system}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {393--397}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1291-3}, doi = {10.1007/S11623-020-1291-3}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FreyeKEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FrickeL20, author = {Frank Fricke and Philipp L{\"{o}}hr}, title = {Datenschutzrechtliche Zul{\"{a}}ssigkeitspr{\"{u}}fungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {169--171}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1245-9}, doi = {10.1007/S11623-020-1245-9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FrickeL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geminn20, author = {Christian L. Geminn}, title = {Betroffenenrechte verbessern}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {307--311}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1273-5}, doi = {10.1007/S11623-020-1273-5}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Geminn20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GeminnSWAV20, author = {Christian L. Geminn and Jessica M. Szczuka and Carina Weber and Andr{\'{e}} Artelt and Lina Varonina}, title = {Kinder als Nutzende smarter Sprachassistenten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {606--610}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1333-x}, doi = {10.1007/S11623-020-1333-X}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GeminnSWAV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerlingGHP20, author = {Rainer W. Gerling and Sebastian Gerling and Stefan Hessel and Ronald Petrlic}, title = {Stand der Technik bei Videokonferenzen - und die Interpretation der Aufsichtsbeh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {740--747}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1359-0}, doi = {10.1007/S11623-020-1359-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerlingGHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Glatzner20, author = {Florian Glatzner}, title = {Profilbildung und algorithmenbasierte Entscheidungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {312--315}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1274-4}, doi = {10.1007/S11623-020-1274-4}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Glatzner20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GohrKS20, author = {Aron Gohr and Dominik Klein and Werner Schindler}, title = {Verr{\"{a}}terischer Stromverbrauch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {431--435}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1300-6}, doi = {10.1007/S11623-020-1300-6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GohrKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gomez-BarreroKB20, author = {Marta Gomez{-}Barrero and Jascha Kolberg and Christoph Busch}, title = {Erkennung von Pr{\"{a}}sentationsangriffen auf Fingerabdruck Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {26--31}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1217-0}, doi = {10.1007/S11623-019-1217-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gomez-BarreroKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grafenstein20, author = {Max von Grafenstein}, title = {Innovationsoffener Datenschutz durch Folgenabsch{\"{a}}tzungen und Technikgestaltung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {172--175}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1246-8}, doi = {10.1007/S11623-020-1246-8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Grafenstein20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichK20, author = {Ludwig Gramlich and Kerstin Kreul}, title = {Novellierung des Post-Datenschutzes in Deutschland}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {469--474}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1307-z}, doi = {10.1007/S11623-020-1307-Z}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grethel20, author = {Monika Grethel}, title = {Einsatz von WhatsApp durch saarl{\"{a}}ndische Kommunen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {148}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1240-1}, doi = {10.1007/S11623-020-1240-1}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Grethel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrubeHSS20, author = {Tim Grube and Alexander Heinrich and Jan{-}Philipp Stroscher and Sabrina Schomberg}, title = {Datensicherheit von Corona-Apps nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {501--505}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1314-0}, doi = {10.1007/S11623-020-1314-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrubeHSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber20, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {492--496}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1311-3}, doi = {10.1007/S11623-020-1311-3}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gruber20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GuhrKM20, author = {Alisha G{\"{u}}hr and Irene Karper and S{\"{o}}nke Maseberg}, title = {Der lange Weg zur Akkreditierung nach Art. 42 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {649--653}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1342-9}, doi = {10.1007/S11623-020-1342-9}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GuhrKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Haas20, author = {Werner Haas}, title = {Sicherheit auf Sand gebaut?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {441--445}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1302-4}, doi = {10.1007/S11623-020-1302-4}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Haas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HamacherKKS20, author = {Kay Hamacher and Stefan Katzenbeisser and Tobias Kussel and Sebastian Stammler}, title = {Genomische Daten und der Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {87--93}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1229-9}, doi = {10.1007/S11623-020-1229-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HamacherKKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeckmannST20, author = {Benjamin Heckmann and Florian Schweighart and Markus Tasch}, title = {{JOINED-VIV:} Umsetzung der {DSGVO} mittels {SDM} und unter Einbindung des {BSI} IT-Grundschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {663--667}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1345-6}, doi = {10.1007/S11623-020-1345-6}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeckmannST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Henniger20, author = {Olaf Henniger}, title = {Neue Normen f{\"{u}}r biometrische Datenaustauschformate}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {43--47}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1220-5}, doi = {10.1007/S11623-019-1220-5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Henniger20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HesselP20, author = {Stefan Hessel and Karin Potel}, title = {Zur Notwendigkeit einer Data Breach Notification bei Datentr{\"{a}}gerverschl{\"{u}}sselung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {94--97}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1230-3}, doi = {10.1007/S11623-020-1230-3}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HesselP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeuftF20, author = {Matthias Heuft and Dirk Feldhusen}, title = {Angriffe auf Chips in Reisep{\"{a}}ssen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {436--440}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1301-5}, doi = {10.1007/S11623-020-1301-5}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeuftF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HobertB20, author = {Sebastian Hobert and Florian Berens}, title = {Chatbot-basierte Lernsysteme als k{\"{u}}nstliche Tutoren in der Lehre}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {594--599}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1331-z}, doi = {10.1007/S11623-020-1331-Z}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HobertB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HobertB20a, author = {Sebastian Hobert and Florian Berens}, title = {Chatbot-basierte Lernsysteme alsk{\"{u}}nstliche Tutoren in der Lehre}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {600--605}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1332-y}, doi = {10.1007/S11623-020-1332-Y}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HobertB20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoerenP20, author = {Thomas Hoeren and Stefan Pinelli}, title = {Datenschutz im neuen chinesischen Zivilgesetzbuch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {678--680}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1348-3}, doi = {10.1007/S11623-020-1348-3}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoerenP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JahnelGW20, author = {Tina Jahnel and Ansgar Gerhardus and Julian Wienert}, title = {Digitales Contact Tracing: Dilemma zwischen Datenschutz und Public Health Nutzenbewertung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {786--790}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1367-0}, doi = {10.1007/S11623-020-1367-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JahnelGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JaspersJ20, author = {Andreas Jaspers and Tobias Jacquemain}, title = {Datenschutz-Grundverordnung - Praxiserfahrungen und Evaluation}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {297--301}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1271-7}, doi = {10.1007/S11623-020-1271-7}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JaspersJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jelinek20, author = {Andrea Jelinek}, title = {{FAQ} on the judgment of the Court of Justice of the European Union in Case {C-311/18} - Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {681--683}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1349-2}, doi = {10.1007/S11623-020-1349-2}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jelinek20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JohnW20, author = {Nicolas John and Maximilian Wellmann}, title = {Datenschutzrechtliche Fragestellungen zur Auswahl von Videokonferenztools}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {506--510}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1315-z}, doi = {10.1007/S11623-020-1315-Z}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JohnW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber20, author = {Ulrich Kelber}, title = {BfDI verh{\"{a}}ngt Geldbu{\ss}en gegen Telekommunikationsdienstleister}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {85--86}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1228-x}, doi = {10.1007/S11623-020-1228-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber20a, author = {Ulrich Kelber}, title = {Nicht Daten sind der Rohstoff des 21. Jahrhunderts, sondern Vertrauen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {226--227}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1255-7}, doi = {10.1007/S11623-020-1255-7}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber20b, author = {Ulrich Kelber}, title = {BfDI zu Folgen der Gesetzgebung des {PDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {640}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1339-4}, doi = {10.1007/S11623-020-1339-4}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kelber20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker20, author = {Dennis{-}Kenji Kipker}, title = {{EU} Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {263--265}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1264-6}, doi = {10.1007/S11623-020-1264-6}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kipker20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker20a, author = {Dennis{-}Kenji Kipker}, title = {{EU} Cybersecurity Act and Certification Schemes: an up-to-date progress report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {390--392}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1290-4}, doi = {10.1007/S11623-020-1290-4}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerB20, author = {Dennis{-}Kenji Kipker and Benedikt Buchner}, title = {Digitale Herausforderungen der Corona-Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {773--775}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1364-3}, doi = {10.1007/S11623-020-1364-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Klink-StraubS20, author = {Judith Klink{-}Straub and Tobias Straub}, title = {Der Auskunftsanspruch bei Pr{\"{u}}fungsunterlagen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {672--677}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1347-4}, doi = {10.1007/S11623-020-1347-4}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Klink-StraubS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KnieperT20, author = {Thomas Knieper and Marie{-}Theres Tinnefeld}, title = {Politische Satiren und Karikaturen - eine Bastion offener Demokratien?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {375--380}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1287-z}, doi = {10.1007/S11623-020-1287-Z}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KnieperT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KnuchelE20, author = {Christian Knuchel and Nico Ebert}, title = {DSGVO-konformes L{\"{o}}schen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {126--127}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1235-y}, doi = {10.1007/S11623-020-1235-Y}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KnuchelE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KochPW20, author = {Manuel Koch and Andrea Pawils and Enrico Weide}, title = {Das Standard-Datenschutzmodell in der Telematikinfrastruktur}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {104--110}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1232-1}, doi = {10.1007/S11623-020-1232-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KochPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Krasemann20, author = {Henry Krasemann}, title = {Der aktuelle Stand der Datenschutz- Zertifizierung und Akkreditierung in Deutschland und Europa}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {645--648}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1341-x}, doi = {10.1007/S11623-020-1341-X}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Krasemann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann20, author = {Dieter Kugelmann}, title = {Kann und darf das Handy gegen Corona helfen?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {350}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1281-5}, doi = {10.1007/S11623-020-1281-5}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann20a, author = {Dieter Kugelmann}, title = {Rolle, Strategien, Aktionsplan 2020}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {430}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1299-8}, doi = {10.1007/S11623-020-1299-8}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann20b, author = {Dieter Kugelmann}, title = {Neue Welle von Schadsoftware - Anstieg von Datenpannen in diesen Tagen aufgrund von Phishing Mails}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {500}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1313-1}, doi = {10.1007/S11623-020-1313-1}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugler20, author = {Dennis K{\"{u}}gler}, title = {Expedition in den Nanokosmos}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {425}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1297-x}, doi = {10.1007/S11623-020-1297-X}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugler20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuglerR20, author = {Dennis K{\"{u}}gler and Helmut Reimer}, title = {Was tun? Sicherheitsl{\"{u}}cken in Hardware}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {475}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1308-y}, doi = {10.1007/S11623-020-1308-Y}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KuglerR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kuhling20, author = {J{\"{u}}rgen K{\"{u}}hling}, title = {Privatheit am Arbeitsplatz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {182--188}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1248-6}, doi = {10.1007/S11623-020-1248-6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kuhling20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KusS20, author = {Mehmet Kus and Karsten Sohr}, title = {Praktische Erfahrungen und Ans{\"{a}}tze f{\"{u}}r {\^{a}}Security by Design' auf Basis der STRIDE-Methodik}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {750--754}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1361-6}, doi = {10.1007/S11623-020-1361-6}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KusS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Labusga20, author = {Jan{-}Hendrik Labusga}, title = {Die Fristberechnung beim Data Breach}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {735--739}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1358-1}, doi = {10.1007/S11623-020-1358-1}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Labusga20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lower20, author = {Daniel L{\"{o}}wer}, title = {Vertrauen im E-Commerce}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {236--239}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1258-4}, doi = {10.1007/S11623-020-1258-4}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lower20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MaierFW20, author = {Dominik Christian Maier and Fabian Franzen and Manuela Wagner}, title = {Mehr schlecht als Recht: Grauzone Sicherheitsforschung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {511--517}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1316-y}, doi = {10.1007/S11623-020-1316-Y}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MaierFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MargrafB20, author = {Marian Margraf and Nicolas Buchmann}, title = {Gew{\"{a}}hrleistung langfristiger Sicherheit f{\"{u}}r Breeder-Dokumente durch Biometrie und Blockchain-Technologie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {32--37}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1218-z}, doi = {10.1007/S11623-019-1218-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MargrafB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Martin20, author = {Nicholas Martin}, title = {Corona-Eind{\"{a}}mmung in Taiwan}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {815--818}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1373-2}, doi = {10.1007/S11623-020-1373-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Martin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MartinMSFH20, author = {Nicholas Martin and Britta Alexandra Mester and Ina Schiering and Michael Friedewald and Dara Hallinan}, title = {Datenschutz-Folgenabsch{\"{a}}tzung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {149--153}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1241-0}, doi = {10.1007/S11623-020-1241-0}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MartinMSFH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MartinSF20, author = {Nicholas Martin and Ina Schiering and Michael Friedewald}, title = {Methoden der Datenschutz-Folgenabsch{\"{a}}tzung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {154--160}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1242-z}, doi = {10.1007/S11623-020-1242-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MartinSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MayerBDSV20, author = {Peter Mayer and Fabian Ballreich and Reyhan D{\"{u}}zg{\"{u}}n and Christian Schwartz and Melanie Volkamer}, title = {Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {522--527}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1318-9}, doi = {10.1007/S11623-020-1318-9}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MayerBDSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MerkleRSB20, author = {Johannes Merkle and Christian Rathgeb and Ulrich Scherhag and Christoph Busch}, title = {Morphing-Angriffe}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {38--42}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1219-y}, doi = {10.1007/S11623-019-1219-Y}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MerkleRSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester20, author = {Britta Alexandra Mester}, title = {Datenschutz-Folgenabsch{\"{a}}tzung - Chance des Datenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {145}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1239-7}, doi = {10.1007/S11623-020-1239-7}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mester20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Miller20, author = {Felix Miller}, title = {Root-of-Trust-Architekturen als Open-Source-Hardware und deren Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {451--455}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1304-2}, doi = {10.1007/S11623-020-1304-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Miller20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NagelePS20, author = {Peter N{\"{a}}gele and Ronald Petrlic and Frank Schemmel}, title = {Die Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {719--728}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1356-3}, doi = {10.1007/S11623-020-1356-3}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/NagelePS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen20, author = {Kim Nguyen}, title = {Vertrauen ist die Basis f{\"{u}}r Digitale Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {221}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1253-9}, doi = {10.1007/S11623-020-1253-9}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nguyen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen20a, author = {Kim Nguyen}, title = {Der Lebenszyklus von Souver{\"{a}}nit{\"{a}}t und Vertrauen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {228--230}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1256-6}, doi = {10.1007/S11623-020-1256-6}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nguyen20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Niekrenz20, author = {Elisabeth Niekrenz}, title = {E-Evidence-Verordnung: Datenzugriff durch Strafverfolgungbeh{\"{o}}rden aus dem Ausland?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {535--536}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1320-2}, doi = {10.1007/S11623-020-1320-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Niekrenz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Oettel20, author = {Maurice Oettel}, title = {Smart Human und der Schutz der Gedanken}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {386--389}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1289-x}, doi = {10.1007/S11623-020-1289-X}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Oettel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Oettel20a, author = {Maurice Oettel}, title = {Datensparsame Daten{\"{u}}bertragbarkeit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {819--823}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1374-1}, doi = {10.1007/S11623-020-1374-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Oettel20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri20, author = {Thomas Petri}, title = {Rechtsprechung zur {DSGVO} in den Jahren 2019 - 2020 - eine Auswahl}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {810--814}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1372-3}, doi = {10.1007/S11623-020-1372-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pollmann20, author = {Maren Pollmann}, title = {Weltweites Vergessenwerden? Zur r{\"{a}}umlichen Reichweite des Rechts auf Auslistung bei Suchmaschinen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {365--368}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1285-1}, doi = {10.1007/S11623-020-1285-1}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pollmann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PrietzRS20, author = {Christian Prietz and Martin Rost and Julia Stoll}, title = {Pr{\"{u}}fverfahren zur datenschutzrechtlichen Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {654--658}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1343-8}, doi = {10.1007/S11623-020-1343-8}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PrietzRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rathgeb20, author = {Christian Rathgeb}, title = {Neue Herausforderungen f{\"{u}}r biometrische Technologien}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1211-6}, doi = {10.1007/S11623-019-1211-6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rathgeb20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20, author = {Helmut Reimer}, title = {Der Unterschied}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {429}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1298-9}, doi = {10.1007/S11623-020-1298-9}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {485--491}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1310-4}, doi = {10.1007/S11623-020-1310-4}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20b, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {555--564}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1323-z}, doi = {10.1007/S11623-020-1323-Z}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20c, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {700--708}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1352-7}, doi = {10.1007/S11623-020-1352-7}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW20, author = {Helmut Reimer and Christoph Wegener}, title = {Datenschutz in Krisenzeiten oder Krise des Datenschutzes?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {684}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1350-9}, doi = {10.1007/S11623-020-1350-9}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reinhardt20, author = {J{\"{o}}rn Reinhardt}, title = {, , Recht auf Vergessen" auf Franz{\"{o}}sisch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {361--364}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1284-2}, doi = {10.1007/S11623-020-1284-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reinhardt20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RiebeHDLRFR20, author = {Thea Riebe and Jasmin Haunschild and Felix Divo and Matthias Lang and Gerbert Roitburd and Jonas Franken and Christian Reuter}, title = {Die Vorratsdatenspeicherung in Europa}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {316--321}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1275-3}, doi = {10.1007/S11623-020-1275-3}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RiebeHDLRFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Roosendaal20, author = {Arnold Roosendaal}, title = {DPIAs in practice - a strategic instrument for compliance}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {166--168}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1244-x}, doi = {10.1007/S11623-020-1244-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Roosendaal20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel20, author = {Alexander Ro{\ss}nagel}, title = {Evaluation nutzen!}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {281--283}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1267-3}, doi = {10.1007/S11623-020-1267-3}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel20a, author = {Alexander Ro{\ss}nagel}, title = {Evaluation der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {287--292}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1269-1}, doi = {10.1007/S11623-020-1269-1}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel20b, author = {Alexander Ro{\ss}nagel}, title = {Smarte Pers{\"{o}}nliche Assistenten gestalten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {565--566}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1324-y}, doi = {10.1007/S11623-020-1324-Y}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RostW20, author = {Martin Rost and Sebastian Welke}, title = {{SDM} 2.0 und {ITIL} 4 , , verschr{\"{a}}nkt"}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {258--262}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1263-7}, doi = {10.1007/S11623-020-1263-7}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RostW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchieringMFMS20, author = {Ina Schiering and Britta Alexandra Mester and Michael Friedewald and Nicholas Martin}, title = {Datenschutz-Risiken partizipativ identifizieren und analysieren}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {161--165}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1243-y}, doi = {10.1007/S11623-020-1243-Y}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchieringMFMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schlegel20, author = {Daniela Schlegel}, title = {Vertrauenskrise in die digitale Welt?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {254--257}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1262-8}, doi = {10.1007/S11623-020-1262-8}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schlegel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schleipfer20, author = {Stefan Schleipfer}, title = {Ende-zu-Ende-Verschl{\"{u}}sselung von E-Mails}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {748--749}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1360-7}, doi = {10.1007/S11623-020-1360-7}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schleipfer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnebbe20, author = {Maximilian Schnebbe}, title = {Digitale Assistenzsysteme in der Industrie und Produktion}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {398--400}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1292-2}, doi = {10.1007/S11623-020-1292-2}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnebbe20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchraheS20, author = {Dominik Schrahe and Thomas St{\"{a}}dter}, title = {Gesundheits-Apps auf Rezept und Forschung mit Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {713--718}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1355-4}, doi = {10.1007/S11623-020-1355-4}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchraheS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchulteW20, author = {Laura Schulte and Tim Wambach}, title = {Zielkonflikte zwischen Datenschutz und IT-Sicherheit im Kontext der Aufkl{\"{a}}rung von Sicherheitsvorf{\"{a}}llen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {462--468}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1306-0}, doi = {10.1007/S11623-020-1306-0}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchulteW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schulz20, author = {Sebastian Schulz}, title = {Die Evaluation der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {302--306}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1272-6}, doi = {10.1007/S11623-020-1272-6}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schulz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seiter20, author = {Stefan R. Seiter}, title = {Wer bestimmt {\"{u}}ber uns?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {571}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1325-x}, doi = {10.1007/S11623-020-1325-X}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Seiter20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Sleiman20, author = {Mohamed Bou Sleiman}, title = {Das Corona-Virus - Ein Katalysator f{\"{u}}r Cyberkriminalit{\"{a}}t?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {806--809}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1371-4}, doi = {10.1007/S11623-020-1371-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Sleiman20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Smoltczyk20, author = {Maja Smoltczyk}, title = {Nach "Schrems II": Europa braucht digitale Eigenst{\"{a}}ndigkeit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {572}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1326-9}, doi = {10.1007/S11623-020-1326-9}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Smoltczyk20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SowaR20, author = {Aleksandra Sowa and Martin Rost}, title = {Die {ISO} 27701 und das {SDM-V2} im Lichte der Umsetzung der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {659--662}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1344-7}, doi = {10.1007/S11623-020-1344-7}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SowaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SpeithBEPP20, author = {Julian Speith and Steffen Becker and Maik Ender and Endres Puschner and Christof Paar}, title = {Hardware-Trojaner}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {446--450}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1303-3}, doi = {10.1007/S11623-020-1303-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Streinz20, author = {Rudolf Streinz}, title = {, , Recht auf Vergessenwerden" zwischen Unionsrecht und Verfassungsrecht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {353--360}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1283-3}, doi = {10.1007/S11623-020-1283-3}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Streinz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TamsS20, author = {Benjamin Tams and Michael Schwaiger}, title = {Die Bedeutung qualit{\"{a}}tsgesicherter biometrischer Daten f{\"{u}}r das {EU} Einreise-/Ausreisesystem {(EES)}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {23--25}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1216-1}, doi = {10.1007/S11623-019-1216-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TamsS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThielT20, author = {Christoph Thiel and Christian Thiel}, title = {Distributed Ledger Technologie {(DLT)} im Kontext europ{\"{a}}ischer Vertrauensdienste}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {250--253}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1261-9}, doi = {10.1007/S11623-020-1261-9}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ThielT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThiesDJRL020, author = {Laura Friederike Thies and Ernestine Dickhaut and Andreas Janson and Alexander Ro{\ss}nagel and Jan Marco Leimeister and Matthias S{\"{o}}llner}, title = {Die Simulationsstudie als Evaluationsmethode}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {589--593}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1330-0}, doi = {10.1007/S11623-020-1330-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ThiesDJRL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThiesJK020, author = {Laura Friederike Thies and Silke Jandt and Robin Knote and Matthias S{\"{o}}llner}, title = {Konflikt{\"{a}}re Anforderungen an smarte pers{\"{o}}nliche Assistenten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {573--578}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1327-8}, doi = {10.1007/S11623-020-1327-8}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ThiesJK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld20, author = {Marie{-}Theres Tinnefeld}, title = {Die Bedeutung von Informanten f{\"{u}}r Presse und Demokratie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {381--385}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1288-y}, doi = {10.1007/S11623-020-1288-Y}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB20, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Gundrechtliche Freiheiten in St{\"{o}}rf{\"{a}}llen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {345--346}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1280-6}, doi = {10.1007/S11623-020-1280-6}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TolsdorfBDFS20, author = {Jan Tolsdorf and Christian K. Bosse and Aljoscha Dietrich and Denis Feth and Hartmut Schmitt}, title = {Privatheit am Arbeitsplatz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {176--181}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1247-7}, doi = {10.1007/S11623-020-1247-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TolsdorfBDFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TonnissenT20, author = {Stefan T{\"{o}}nnissen and Frank Teuteberg}, title = {{DSGVO} und die Blockchain}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {322--327}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1276-2}, doi = {10.1007/S11623-020-1276-2}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TonnissenT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TwickelBB20, author = {Arndt von Twickel and Jennifer Breuer and Ralph Breithaupt}, title = {Vereinbarkeit von Biometrieforschung und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {9--15}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1214-3}, doi = {10.1007/S11623-019-1214-3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TwickelBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Uhl20, author = {Andreas Uhl}, title = {Venen Biometrie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {16--22}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1215-2}, doi = {10.1007/S11623-019-1215-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Uhl20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ulmenstein20, author = {Ulrich Freiherr von Ulmenstein}, title = {Datensouver{\"{a}}nit{\"{a}}t durch repr{\"{a}}sentative Rechtswahrnehmung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {528--534}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1319-8}, doi = {10.1007/S11623-020-1319-8}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ulmenstein20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke-Caprarese20, author = {Sven Venzke{-}Caprarese}, title = {Zur Praxistauglichkeit des Datenschutzes in der digitalen Kommunikation}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {796--800}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1369-y}, doi = {10.1007/S11623-020-1369-Y}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Venzke-Caprarese20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VogelgesangMS20, author = {Stephanie Vogelgesang and Frederik M{\"{o}}llers and Tim Schneider}, title = {Strafrechtliche Relevanz von AdCloaking}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {537--543}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1321-1}, doi = {10.1007/S11623-020-1321-1}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VogelgesangMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VolkamerH20, author = {Melanie Volkamer and Tobias Hilt}, title = {Sensibilisierung f{\"{u}}r Phishing und andere betr{\"{u}}gerische Nachrichten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {121--125}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1234-z}, doi = {10.1007/S11623-020-1234-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VolkamerH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VolkamerSB20, author = {Melanie Volkamer and Martina Angela Sasse and Franziska Boehm}, title = {Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {518--521}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1317-x}, doi = {10.1007/S11623-020-1317-X}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VolkamerSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner20, author = {Manuela Wagner}, title = {IT-Sicherheitsforschung in rechtlicher Grauzone}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {111--120}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1233-0}, doi = {10.1007/S11623-020-1233-0}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wagner20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener20, author = {Christoph Wegener}, title = {Papier ist geduldig}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {637}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1338-5}, doi = {10.1007/S11623-020-1338-5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert20, author = {Thilo Weichert}, title = {Die DSGVO, ein - ganz guter - Anfang}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {293--296}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1270-8}, doi = {10.1007/S11623-020-1270-8}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weik20, author = {Ramona Weik}, title = {Die Datenkopie nach Artikel 15 Abs. 3 {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {98--103}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1231-2}, doi = {10.1007/S11623-020-1231-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Weik20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeikD20, author = {Ramona Weik and Andreas Diehl}, title = {Die Beantwortung von Auskunftsersuchen nach Art. 15 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {729--734}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1357-2}, doi = {10.1007/S11623-020-1357-2}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeikD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Will20, author = {Michael Will}, title = {Brauchen wir eine Zentralisierung der Datenschutzaufsicht?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {369--374}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1286-0}, doi = {10.1007/S11623-020-1286-0}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Will20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20, title = {Trickkiste Biometrie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {5}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1212-5}, doi = {10.1007/S11623-019-1212-5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20a, title = {{DSK:} Standard-Datenschutzmodell {V2}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {6--8}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1213-4}, doi = {10.1007/S11623-019-1213-4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20aa, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {764--772}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1363-4}, doi = {10.1007/S11623-020-1363-4}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ab, title = {Bewertung der {DSK} zu MS-Office 365: Nachbesserungen geboten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {778}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1365-2}, doi = {10.1007/S11623-020-1365-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ac, title = {Cyber-Sicherheitsstrategie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {824}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1375-0}, doi = {10.1007/S11623-020-1375-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ad, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {825--834}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1376-z}, doi = {10.1007/S11623-020-1376-Z}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ae, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {835--841}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1377-y}, doi = {10.1007/S11623-020-1377-Y}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20af, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {841--844}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1378-x}, doi = {10.1007/S11623-020-1378-X}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20b, title = {98. {DSK} Trier, 06. - 07. November 2019, Entschlie{\ss}ungen und Empfehlungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {58--60}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1223-2}, doi = {10.1007/S11623-019-1223-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20c, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {61--71}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1224-1}, doi = {10.1007/S11623-019-1224-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20d, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {72--77}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1225-0}, doi = {10.1007/S11623-019-1225-0}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20e, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {77--80}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1226-z}, doi = {10.1007/S11623-019-1226-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20f, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {128--133}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1236-x}, doi = {10.1007/S11623-020-1236-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20g, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {134--140}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1237-9}, doi = {10.1007/S11623-020-1237-9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20h, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {141--144}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1238-8}, doi = {10.1007/S11623-020-1238-8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20i, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {199--211}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1251-y}, doi = {10.1007/S11623-020-1251-Y}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20j, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {212--220}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1252-x}, doi = {10.1007/S11623-020-1252-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20k, title = {Vorsicht - Glatteis!}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {225}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1254-8}, doi = {10.1007/S11623-020-1254-8}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20l, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {266--271}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1265-5}, doi = {10.1007/S11623-020-1265-5}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20m, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {272--280}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1266-4}, doi = {10.1007/S11623-020-1266-4}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20n, title = {Datenschutzrechtliche Informationen im Zusammenhang mit der Corona-Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {286}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1268-2}, doi = {10.1007/S11623-020-1268-2}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20o, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {328--334}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1277-1}, doi = {10.1007/S11623-020-1277-1}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20p, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {335--340}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1278-0}, doi = {10.1007/S11623-020-1278-0}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20q, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {341--344}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1279-z}, doi = {10.1007/S11623-020-1279-Z}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20r, title = {K{\"{u}}ndigung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {401}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1293-1}, doi = {10.1007/S11623-020-1293-1}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20s, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {402--412}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1294-0}, doi = {10.1007/S11623-020-1294-0}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20t, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {413--421}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1295-z}, doi = {10.1007/S11623-020-1295-Z}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20u, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {421--424}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1296-y}, doi = {10.1007/S11623-020-1296-Y}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20v, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {617--625}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1335-8}, doi = {10.1007/S11623-020-1335-8}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20w, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {626--632}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1336-7}, doi = {10.1007/S11623-020-1336-7}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20x, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {632--636}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1337-6}, doi = {10.1007/S11623-020-1337-6}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20y, title = {Registermodernisierung verfassungskonform umsetzen!}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {712}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1354-5}, doi = {10.1007/S11623-020-1354-5}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20z, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {755--763}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1362-5}, doi = {10.1007/S11623-020-1362-5}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AchenbachK19, author = {Dirk Achenbach and Stefan Krebs}, title = {Pilotprojekt Cyberwehr Baden-W{\"{u}}rttemberg}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {719--722}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1195-2}, doi = {10.1007/S11623-019-1195-2}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AchenbachK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AhmadHK19, author = {Jawad Ahmad and Detlef H{\"{u}}hnlein and Ulrike Korte}, title = {Sichere Digitalisierung mit {TR-RESISCAN} und {TR-ESOR}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {203--208}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1093-7}, doi = {10.1007/S11623-019-1093-7}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AhmadHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Aretz19, author = {Christian Aretz}, title = {Meine Daten, meine Kontrolle}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {13--16}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1053-2}, doi = {10.1007/S11623-019-1053-2}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Aretz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AuerbachSKT19, author = {Benedikt Auerbach and Mary Shnayien and Eike Kiltz and Anna Tuschling}, title = {Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {706--712}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1193-4}, doi = {10.1007/S11623-019-1193-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AuerbachSKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BeckerWPR19, author = {Steffen Becker and Carina Wiesen and Christof Paar and Nikol Rummel}, title = {Wie arbeiten Reverse Engineers?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {686--690}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1190-7}, doi = {10.1007/S11623-019-1190-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BeckerWPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Beissel19, author = {Stefan Bei{\ss}el}, title = {Evaluation von Security-Awareness-Ma{\ss}nahmen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {287--291}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1109-3}, doi = {10.1007/S11623-019-1109-3}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Beissel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BenderMR19, author = {Jens Bender and Bj{\"{o}}rn Metzler and Niels R{\"{a}}th}, title = {Neues vom Online-Ausweis}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {194--197}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1091-9}, doi = {10.1007/S11623-019-1091-9}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BenderMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann19, author = {Dominik Bleckmann}, title = {Anforderungen der Datenschutz-Grundverordnung an Labore}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {137--142}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1080-z}, doi = {10.1007/S11623-019-1080-Z}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BleckmannFHS19, author = {Felix Bleckmann and Guido Frank and Michael Hoppe and Thomas Schnattinger}, title = {Notifizierung von eID-Systemen gem{\"{a}}{\ss} eIDAS}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {189--193}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1090-x}, doi = {10.1007/S11623-019-1090-X}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BleckmannFHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Block19, author = {Helga Block}, title = {Technische Anforderungen an technische und organisatorische Ma{\ss}nahmen beim E-Mail-Versand}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {64}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1064-z}, doi = {10.1007/S11623-019-1064-Z}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Block19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Boehme-Nessler19, author = {Volker Boehme{-}Ne{\ss}ler}, title = {Gl{\"{a}}serne Prostituierte?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {342--346}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1119-1}, doi = {10.1007/S11623-019-1119-1}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Boehme-Nessler19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BonninghoffHKKN19, author = {Benedikt T. B{\"{o}}nninghoff and Steffen Hessler and Dorothea Kolossa and Kerstin Kucharczik and Robert M. Nickel and Karin Pittner}, title = {Autorschaftsanalyse}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {691--699}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1191-6}, doi = {10.1007/S11623-019-1191-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BonninghoffHKKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BorellS19, author = {Anne Borell and Stephan Schindler}, title = {Polizei und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {767--773}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1203-6}, doi = {10.1007/S11623-019-1203-6}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BorellS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BraunSHM19, author = {Daniel Braun and Elena Scepankova and Patrick Holl and Florian Matthes}, title = {The Potential of Customer-Centered LegalTech}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {760--766}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1202-7}, doi = {10.1007/S11623-019-1202-7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BraunSHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BrendelG19, author = {Jacqueline Brendel and Nina Gerber}, title = {Sichere Instant Messaging Apps}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {276--280}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1107-5}, doi = {10.1007/S11623-019-1107-5}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BrendelG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BreyerD19, author = {Jonas Breyer and Sven Duensing}, title = {Haftpflicht-Versicherungsschutz f{\"{u}}r Datenschutzbeauftragte nach der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {86--89}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1069-7}, doi = {10.1007/S11623-019-1069-7}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BreyerD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BuchmannE19, author = {Erik Buchmann and Susanne Eichhorn}, title = {Auskunftsersuchen nach Art. 15 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {65--70}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1065-y}, doi = {10.1007/S11623-019-1065-Y}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BuchmannE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner19, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {234--242}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1099-1}, doi = {10.1007/S11623-019-1099-1}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner19a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {723--731}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1196-1}, doi = {10.1007/S11623-019-1196-1}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner19b, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {793--800}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1208-1}, doi = {10.1007/S11623-019-1208-1}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buttarelli19, author = {Giovanni Buttarelli}, title = {{EDPS} calls for closer alignment between consumer and data protection rules in the {EU}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {6}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1051-4}, doi = {10.1007/S11623-019-1051-4}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buttarelli19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad19, author = {Conrad Sebastian Conrad}, title = {Freelancer als Auftragsverarbeiter?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {134--136}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1079-5}, doi = {10.1007/S11623-019-1079-5}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Conrad19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad19a, author = {Conrad Sebastian Conrad}, title = {Die Verantwortlichkeit in der Realit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {563--568}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1164-9}, doi = {10.1007/S11623-019-1164-9}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DammF19, author = {Frank Damm and Hans{-}Peter Fischer}, title = {Lieferkette: Wie Cyber-Security von ad{\"{a}}quater Zusammenarbeit abh{\"{a}}ngt}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {418--425}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1137-z}, doi = {10.1007/S11623-019-1137-Z}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DammF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DeiningerMB19, author = {Axel Deininger and Kai Martius and Sebastian Barchnicki}, title = {Perspektiven und zuk{\"{u}}nftige Entwicklung der deutschen IT-Sicherheitswirtschaft}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {652--655}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1182-7}, doi = {10.1007/S11623-019-1182-7}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DeiningerMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dunkel19, author = {Heiko D{\"{u}}nkel}, title = {Kollektiver Rechtsschutz bei Datenschutzrechtsverst{\"{o}}{\ss}en}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {483--487}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1148-9}, doi = {10.1007/S11623-019-1148-9}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dunkel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DurmusSP19, author = {Erdem Durmus and Annika Selzer and Ulrich Pordesch}, title = {Das L{\"{o}}schen nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {786--791}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1206-3}, doi = {10.1007/S11623-019-1206-3}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DurmusSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ertel19, author = {Sebastian Ertel}, title = {Wer sch{\"{u}}tzt uns eigentlich?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {125}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1076-8}, doi = {10.1007/S11623-019-1076-8}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Ertel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber19, author = {Eberhard von Faber}, title = {Null-Fehler-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {393}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1131-5}, doi = {10.1007/S11623-019-1131-5}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber19a, author = {Eberhard von Faber}, title = {IT-Sicherheit 5.0}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {397}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1132-4}, doi = {10.1007/S11623-019-1132-4}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber19b, author = {Eberhard von Faber}, title = {Methoden: , , Secured by definition'' und die Umsetzung von Prinzipien aus dem Qualit{\"{a}}tsmanagement}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {410--417}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1136-0}, doi = {10.1007/S11623-019-1136-0}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FaberK19, author = {Eberhard von Faber and Arndt Kohler}, title = {Die L{\"{u}}cke: Informationssicherheit in Systemen mit k{\"{u}}nstlicher Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {434--439}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1139-x}, doi = {10.1007/S11623-019-1139-X}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FaberK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FarkeRDG19, author = {Florian Farke and Jan Rensinghoff and Markus D{\"{u}}rmuth and Tobias Gostomzyk}, title = {Recht auf Vergessen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {681--685}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1189-0}, doi = {10.1007/S11623-019-1189-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FarkeRDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox19, author = {Dirk Fox}, title = {Der Teufel und die Details}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {61}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1063-0}, doi = {10.1007/S11623-019-1063-0}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox19a, author = {Dirk Fox}, title = {Bewegung im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {253}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1102-x}, doi = {10.1007/S11623-019-1102-X}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox19b, author = {Dirk Fox}, title = {Vom Wert des Fl{\"{u}}chtigen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {679}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1187-2}, doi = {10.1007/S11623-019-1187-2}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FriedewaldSM19, author = {Michael Friedewald and Ina Schiering and Nicholas Martin}, title = {Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {473--477}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1146-y}, doi = {10.1007/S11623-019-1146-Y}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FriedewaldSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerlM19, author = {Armin Gerl and Bianca Meier}, title = {The Layered Privacy Language Art. 12 - 14 {GDPR} Extension - Privacy Enhancing User Interfaces}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {747--752}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1200-9}, doi = {10.1007/S11623-019-1200-9}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerlM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gola19, author = {Peter Gola}, title = {Das Gesch{\"{a}}ftsgeheimnisgesetz und die Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {569--574}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1165-8}, doi = {10.1007/S11623-019-1165-8}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gola19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hagemeier19, author = {Heike Hagemeier}, title = {Kryptografie - heute und zuk{\"{u}}nftig}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {631--635}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1178-3}, doi = {10.1007/S11623-019-1178-3}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hagemeier19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hartge19, author = {Dagmar Hartge}, title = {Automatische Kennzeichenfahndung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {680}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1188-1}, doi = {10.1007/S11623-019-1188-1}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hartge19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeinemannS19, author = {Andreas Heinemann and Tobias Straub}, title = {Datenschutz muss benutzbar sein}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {7--12}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1052-3}, doi = {10.1007/S11623-019-1052-3}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HeinemannS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hellerbach19, author = {Amin Hellerbach}, title = {Abstrahlsicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {636--639}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1179-2}, doi = {10.1007/S11623-019-1179-2}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hellerbach19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HelmKMS19, author = {Alexander Helm and Laura Kocksch and Alexander May and Estrid S{\o}rensen}, title = {Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer Aushandlungsprozess}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {713--718}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1194-3}, doi = {10.1007/S11623-019-1194-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HelmKMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannLHA19, author = {Eckehard Hermann and Harald Lampesberger and Lena Heimberger and Michael Altenhuber}, title = {Authentizit{\"{a}}t und Integrit{\"{a}}t des Aufnahmekontextes von Bildern}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {281--286}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1108-4}, doi = {10.1007/S11623-019-1108-4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HermannLHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HonscheidH19, author = {Christoph H{\"{o}}nscheid and Christian Heinze}, title = {Hohe Datensicherheit und Usability sind kein Widerspruch}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {33--34}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1057-y}, doi = {10.1007/S11623-019-1057-Y}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HonscheidH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hornung19, author = {Gerrit Hornung}, title = {Implementierungsstrategien f{\"{u}}r effektiven Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {741--742}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1198-z}, doi = {10.1007/S11623-019-1198-Z}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hornung19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoudeauHW19, author = {Detlef Houdeau and Tina H{\"{u}}hnlein and Klaus{-}Dieter Wolfenstetter}, title = {Digitale Identit{\"{a}}t als Fundament der vertrauensw{\"{u}}rdigen Transformation}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {209--213}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1094-6}, doi = {10.1007/S11623-019-1094-6}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoudeauHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HuhnleinH19, author = {Tina H{\"{u}}hnlein and Detlef H{\"{u}}hnlein}, title = {Aufbruchsstimmung im eIDAS-{\"{O}}kosystem}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {185}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1088-4}, doi = {10.1007/S11623-019-1088-4}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HuhnleinH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HuhnleinKKR19, author = {Detlef H{\"{u}}hnlein and Ulrike Korte and Andreas K{\"{u}}hne and Andrea R{\"{o}}ck}, title = {Neue APIs f{\"{u}}r das eIDAS-{\"{O}}kosystem}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {198--202}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1092-8}, doi = {10.1007/S11623-019-1092-8}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HuhnleinKKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KellerH19, author = {Ivo Keller and Friedrich{-}L. Holl}, title = {Kriterien: Wie Security auch f{\"{u}}r Safety verantwortlich wird}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {426--433}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1138-y}, doi = {10.1007/S11623-019-1138-Y}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KellerH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker19, author = {Dennis{-}Kenji Kipker}, title = {2. DSAnpUG-EU und die Talfahrt des deutschen Datenschutzrechts}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {371--372}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1124-4}, doi = {10.1007/S11623-019-1124-4}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker19a, author = {Dennis{-}Kenji Kipker}, title = {Chinese Cybersecurity Law: Update zu den aktuellen Entwicklungen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {583--586}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1167-6}, doi = {10.1007/S11623-019-1167-6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker19b, author = {Dennis{-}Kenji Kipker}, title = {{EU} Cybersicherheitsregulierung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {792}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1207-2}, doi = {10.1007/S11623-019-1207-2}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerW19, author = {Dennis{-}Kenji Kipker and Michael Walkusz}, title = {Hersteller- und Verk{\"{a}}uferpflichten bei softwarebezogenen IT-Sicherheitsupdates}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {513--517}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1154-y}, doi = {10.1007/S11623-019-1154-Y}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KipkerW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KneuperM19, author = {Ralf Kneuper and Martin Macke}, title = {Rolle der Transportverschl{\"{u}}sselung f{\"{u}}r die sichere E-Mail-Kommunikation}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {76--80}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1067-9}, doi = {10.1007/S11623-019-1067-9}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KneuperM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KneuperP19, author = {Ralf Kneuper and Mark Perlitz}, title = {Datenschutz bei nutzungsbasierter Online-Werbung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {502--506}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1152-0}, doi = {10.1007/S11623-019-1152-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KneuperP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Koenig19, author = {Christian Koenig}, title = {Die Digitale Kopie von Briefsendungen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {551--558}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1162-y}, doi = {10.1007/S11623-019-1162-Y}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Koenig19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KohoutT19, author = {Gerhard Kramarz{-}von Kohout and Ren{\'{e}} Thiele}, title = {Projekt "SiReNE": Wie kann ein Notruf 110/112 m{\"{o}}glichst {\"{u}}berall helfen?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {90--96}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1070-1}, doi = {10.1007/S11623-019-1070-1}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KohoutT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KohoutT19a, author = {Gerhard Kramarz{-}von Kohout and Ren{\'{e}} Thiele}, title = {Notruf: {EU} schl{\"{a}}gt neues Kapitel auf}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {292--300}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1110-x}, doi = {10.1007/S11623-019-1110-X}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KohoutT19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kornwachs19, author = {Klaus Kornwachs}, title = {Smart Robots - Smart Ethics?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {332--341}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1118-2}, doi = {10.1007/S11623-019-1118-2}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kornwachs19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann19, author = {Dieter Kugelmann}, title = {Rahmenbedingungen f{\"{u}}r eine digitale Gesundheitsversorgung aktiv gestalten}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {398}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1133-3}, doi = {10.1007/S11623-019-1133-3}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhlingS19, author = {J{\"{u}}rgen K{\"{u}}hling and Florian Sackmann}, title = {Die Musterfeststellungsklage nach Datenschutzverst{\"{o}}{\ss}en - ein unkalkulierbares Risiko f{\"{u}}r Unternehmen?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {347--352}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1120-8}, doi = {10.1007/S11623-019-1120-8}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KuhlingS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KulykGVH19, author = {Oksana Kulyk and Nina Gerber and Melanie Volkamer and Annika Hilt}, title = {Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {81--85}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1068-8}, doi = {10.1007/S11623-019-1068-8}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KulykGVH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kunnert19, author = {Gerhard Kunnert}, title = {Das Aus f{\"{u}}r Social-/Media-Plug-ins?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {257--264}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1104-8}, doi = {10.1007/S11623-019-1104-8}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kunnert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KurthK19, author = {Helmut Kurth and Gerald Krummeck}, title = {Sicher bauen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {640--647}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1180-9}, doi = {10.1007/S11623-019-1180-9}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KurthK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LangeW19, author = {Vera Lange and Melanie Winkler}, title = {Rechtliche Grundlagen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {611--613}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1174-7}, doi = {10.1007/S11623-019-1174-7}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LangeW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LudemannP19, author = {Volker L{\"{u}}demann and Patrick Pokrant}, title = {Die Einwilligung beim Smart Metering}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {365--370}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1123-5}, doi = {10.1007/S11623-019-1123-5}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LudemannP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MaierB19, author = {Natalie Maier and Tamer Bile}, title = {Die Zertifizierung nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {478--482}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1147-x}, doi = {10.1007/S11623-019-1147-X}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MaierB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MaierLTRS19, author = {Natalie Maier and Sebastian Lins and Heiner Teigeler and Alexander Ro{\ss}nagel and Ali Sunyaev}, title = {Die Zertifizierung von Cloud-Diensten nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {225--229}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1097-3}, doi = {10.1007/S11623-019-1097-3}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MaierLTRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Makulilo19, author = {Alex B. Makulilo}, title = {Privacy under siege? {A} critical analysis of the tele-traffic monitoring system in Tanzania}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {361--364}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1122-6}, doi = {10.1007/S11623-019-1122-6}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Makulilo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Margraf19, author = {Marian Margraf}, title = {IT-Sicherheit und Datenschutz: Nutzergerecht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {1}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1049-y}, doi = {10.1007/S11623-019-1049-Y}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Margraf19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MartinF19, author = {Nicholas Martin and Michael Friedewald}, title = {Warum Unternehmen sich (nicht) an Recht und Gesetz halten}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {493--497}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1150-2}, doi = {10.1007/S11623-019-1150-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MartinF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mayr19, author = {Michael Mayr}, title = {Kompetenzen: Menschen entscheiden {\"{u}}ber den Erfolg}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {399--402}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1134-2}, doi = {10.1007/S11623-019-1134-2}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mayr19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MeissnerS19, author = {Christian Mei{\ss}ner and Klaus Peter S{\"{o}}llner}, title = {Smarte Mobilit{\"{a}}t mit FiftyFifty Taxi}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {230--233}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1098-2}, doi = {10.1007/S11623-019-1098-2}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MeissnerS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester19, author = {Britta Alexandra Mester}, title = {Auftrags(daten)verarbeitung - Nur eine {\"{A}}nderung der Bezeichnung?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {121}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1075-9}, doi = {10.1007/S11623-019-1075-9}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mester19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester19a, author = {Britta Alexandra Mester}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {249--252}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1101-y}, doi = {10.1007/S11623-019-1101-Y}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester19b, author = {Britta Alexandra Mester}, title = {Blockchain und Co. - Was bringt uns die Entwicklung der Technik?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {537}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1158-7}, doi = {10.1007/S11623-019-1158-7}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MesterS19, author = {Britta Alexandra Mester and Christoph Schnabel}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {807--812}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1210-7}, doi = {10.1007/S11623-019-1210-7}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MesterS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mino-Vasquez19, author = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez}, title = {The Protection of Genetic Data under the General Data Protection regulation}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {154--158}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1083-9}, doi = {10.1007/S11623-019-1083-9}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mino-Vasquez19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mueller19, author = {Johannes Karl Martin Mueller}, title = {Dateneigentum in der vierten industriellen Revolution?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {159--166}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1084-8}, doi = {10.1007/S11623-019-1084-8}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mueller19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NuskeORS19, author = {Niclas N{\"{u}}ske and Christian Olenberger and Daniel Rau and Fabian Schmied}, title = {Privacy Bots}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {28--32}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1056-z}, doi = {10.1007/S11623-019-1056-Z}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/NuskeORS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/OhlendorfSM19, author = {Tim Ohlendorf and Wolfgang Studier and Marian Margraf}, title = {Digitale Identit{\"{a}}ten auf dem Smartphone}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {17--22}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1054-1}, doi = {10.1007/S11623-019-1054-1}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/OhlendorfSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ozturk19, author = {Ebru {\"{O}}zt{\"{u}}rk}, title = {Arbeitnehmer{\"{u}}berlassung DS-GVO-konform l{\"{o}}sen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {143--148}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1081-y}, doi = {10.1007/S11623-019-1081-Y}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Ozturk19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PaeschkeFW19, author = {Manfred Paeschke and Walter Fumy and Andreas Wilke}, title = {Ensuring Security {\&} Trust in a Post-Quantum Environment}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {440--443}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1140-4}, doi = {10.1007/S11623-019-1140-4}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PaeschkeFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PetersenBMFB19, author = {Tom Petersen and Maximilian Blochberger and Tobias Mueller and Hannes Federrath and Christian{-}Alexander Behrendt}, title = {Sichere und datenschutzgerechte Umsetzung medizinischer Register}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {507--512}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1153-z}, doi = {10.1007/S11623-019-1153-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PetersenBMFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petrlic19, author = {Ronald Petrlic}, title = {Identit{\"{a}}tspr{\"{u}}fung bei elektronischen Auskunftsersuchen nach Art. 15 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {71--75}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1066-x}, doi = {10.1007/S11623-019-1066-X}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petrlic19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PfeifferS19, author = {Stefan Pfeiffer and Martin Seiffert}, title = {Security-Management-as-a-Service}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {23--27}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1055-0}, doi = {10.1007/S11623-019-1055-0}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PfeifferS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer19, author = {Helmut Reimer}, title = {Festakt: Amtswechsel beim BfDI}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {188}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1089-3}, doi = {10.1007/S11623-019-1089-3}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer19a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {243--249}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1100-z}, doi = {10.1007/S11623-019-1100-Z}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer19b, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {732--740}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1197-0}, doi = {10.1007/S11623-019-1197-0}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer19c, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {801--807}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1209-0}, doi = {10.1007/S11623-019-1209-0}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Riechert19, author = {Anne Riechert}, title = {Dateneigentum - ein unaufl{\"{o}}sbarer Interessenkonflikt?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {353--360}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1121-7}, doi = {10.1007/S11623-019-1121-7}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Riechert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Riess19, author = {Joachim Rie{\ss}}, title = {Innovationen der {DSGVO} in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {498--501}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1151-1}, doi = {10.1007/S11623-019-1151-1}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Riess19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RohdeS19, author = {Martina Rohde and Werner Schindler}, title = {K{\"{u}}nstliche Intelligenz in Evaluierung und Zulassung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {627--630}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1177-4}, doi = {10.1007/S11623-019-1177-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RohdeS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel19, author = {Alexander Ro{\ss}nagel}, title = {Unvollende Innovationen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {461--462}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1143-1}, doi = {10.1007/S11623-019-1143-1}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel19a, author = {Alexander Ro{\ss}nagel}, title = {Innovationen der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {467--472}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1145-z}, doi = {10.1007/S11623-019-1145-Z}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RossnagelW19, author = {Heiko Ro{\ss}nagel and Sven Wagner}, title = {LIGHTest}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {220--224}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1096-4}, doi = {10.1007/S11623-019-1096-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RossnagelW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost19, author = {Maria Christina Rost}, title = {Datenschutzsanktionen: scharfes Schwert oder Papiertiger?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {488--492}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1149-8}, doi = {10.1007/S11623-019-1149-8}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Salami19, author = {Emmanuel Salami}, title = {Nigerian data protection law}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {575--582}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1166-7}, doi = {10.1007/S11623-019-1166-7}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Salami19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schmale19, author = {Wolfgang Schmale}, title = {(Daten-)Schutz von Privatheit im digitalen Zeitalter}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {327--331}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1117-3}, doi = {10.1007/S11623-019-1117-3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schmale19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnebbe19, author = {Maximilian Schnebbe}, title = {DSB-Bestellpflicht und Datenschutzfolgeabsch{\"{a}}tzung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {373--374}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1125-3}, doi = {10.1007/S11623-019-1125-3}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnebbe19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchombergBJH19, author = {Sabrina Schomberg and Torben Jan Barev and Andreas Janson and Felix Hupfeld}, title = {Ansatz zur Umsetzung von Datenschutz nach der {DSGVO} im Arbeitsumfeld: Datenschutz durch Nudging}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {774--780}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1204-5}, doi = {10.1007/S11623-019-1204-5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchombergBJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchraheS19, author = {Dominik Schrahe and Thomas St{\"{a}}dter}, title = {Integration von Informationssicherheits- und Datenschutzmanagement}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {265--269}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1105-7}, doi = {10.1007/S11623-019-1105-7}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchraheS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schwabe19, author = {Sebastian Schw{\"{a}}be}, title = {Technische Umsetzung beim Webtracking}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {559--562}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1163-x}, doi = {10.1007/S11623-019-1163-X}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schwabe19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchwenkWH19, author = {J{\"{o}}rg Schwenk and Tobias Wich and Detlef H{\"{u}}hnlein}, title = {Moderne Vertrauensdienste f{\"{u}}r vertrauensw{\"{u}}rdige Transaktionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {214--219}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1095-5}, doi = {10.1007/S11623-019-1095-5}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchwenkWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seiter19, author = {Stefan R. Seiter}, title = {Auftragsverarbeitung nach der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {127--133}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1078-6}, doi = {10.1007/S11623-019-1078-6}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Seiter19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SimonM19, author = {Kai Simon and Cornelius Moucha}, title = {Sicherheit und Datenschutz im Lebenszyklus von Informationssystemen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {97--101}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1071-0}, doi = {10.1007/S11623-019-1071-0}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SimonM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SonnenbergB19, author = {Frank Sonnenberg and Thomas Borsch}, title = {Innovative Instrumente und Methoden der Zulassung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {619--626}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1176-5}, doi = {10.1007/S11623-019-1176-5}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SonnenbergB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SonnenbergBR19, author = {Frank Sonnenberg and Thomas Borsch and Martina Rohde}, title = {VS-Zulassung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {614--618}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1175-6}, doi = {10.1007/S11623-019-1175-6}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SonnenbergBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stach19, author = {Christoph Stach}, title = {Datenschutzkonzepte f{\"{u}}r Zeitreihendaten}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {753--759}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1201-8}, doi = {10.1007/S11623-019-1201-8}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stach19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Steinacker19, author = {Angelika Steinacker}, title = {Architekturen: Sicherheit im Internet der Dinge (IoT)}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {403--409}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1135-1}, doi = {10.1007/S11623-019-1135-1}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Steinacker19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stock-HomburgH19, author = {Ruth Stock{-}Homburg and Christian Holthaus}, title = {{CHOIVACY} - Ein mehrdimensionaler Ansatz zur Bewertung des Privacy-Managements von Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {35--40}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1058-x}, doi = {10.1007/S11623-019-1058-X}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Stock-HomburgH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stradomsky19, author = {Christopher Stradomsky}, title = {{TR-ESOR} vs. Blockchain}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {547--550}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1161-z}, doi = {10.1007/S11623-019-1161-Z}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stradomsky19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld19, author = {Marie{-}Theres Tinnefeld}, title = {70 Jahre Grundgesetz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {324--325}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1115-5}, doi = {10.1007/S11623-019-1115-5}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB19, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Recht und Ethik im digitalen Zeitalter}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {321}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1114-6}, doi = {10.1007/S11623-019-1114-6}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/UtzKHT19, author = {Christine Utz and Stephan Kolo{\ss}a and Thorsten Holz and Pierre Thielb{\"{o}}rger}, title = {Die {DSGVO} als internationales Vorbild?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {700--705}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1192-5}, doi = {10.1007/S11623-019-1192-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/UtzKHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke-Caprarese19, author = {Sven Venzke{-}Caprarese}, title = {Blockchain-Shops im Web3}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {541--546}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1160-0}, doi = {10.1007/S11623-019-1160-0}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Venzke-Caprarese19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wehrhahn-Aklender19, author = {Aljona Wehrhahn{-}Aklender}, title = {Verschlusssachen verarbeitende Cloud}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {648--651}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1181-8}, doi = {10.1007/S11623-019-1181-8}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wehrhahn-Aklender19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert19, author = {Thilo Weichert}, title = {Genetische Genealogie und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {149--153}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1082-x}, doi = {10.1007/S11623-019-1082-X}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Weichert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Welsch19, author = {G{\"{u}}nter Welsch}, title = {Fr{\"{u}}her war alles besser?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {605}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1171-x}, doi = {10.1007/S11623-019-1171-X}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Welsch19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wessels19, author = {Michael Wessels}, title = {Schmerzensgeld bei Verst{\"{o}}{\ss}en gegen die {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {781--785}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1205-4}, doi = {10.1007/S11623-019-1205-4}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wessels19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WichmannSP19, author = {Astrid Wichmann and M. Angela Sasse and Christof Paar}, title = {IT-Sicherheit ist mehr als Technik}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {673--674}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1186-3}, doi = {10.1007/S11623-019-1186-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WichmannSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19, title = {M{\"{a}}rchenhaft}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {5}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1050-5}, doi = {10.1007/S11623-019-1050-5}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19a, title = {Entschlie{\ss}ung und Orientierungshilfe}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {41--42}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1059-9}, doi = {10.1007/S11623-019-1059-9}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19aa, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {534--536}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1157-8}, doi = {10.1007/S11623-019-1157-8}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ab, title = {26. T{\"{a}}tigkeitsbericht 2018/2019}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {540}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1159-6}, doi = {10.1007/S11623-019-1159-6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ac, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {587--594}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1168-5}, doi = {10.1007/S11623-019-1168-5}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ad, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {595--600}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1169-4}, doi = {10.1007/S11623-019-1169-4}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ae, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {9}, pages = {600--604}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1170-y}, doi = {10.1007/S11623-019-1170-Y}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19af, title = {Die Awareness-Verschleierung?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {608--609}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1172-9}, doi = {10.1007/S11623-019-1172-9}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ag, title = {Br{\"{u}}ssel: Podiumsdiskussion zu Datenschutz und Wettbewerb am 10. Juli 2019}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {610}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1173-8}, doi = {10.1007/S11623-019-1173-8}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ah, title = {Beijing {AI} Principles}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {656}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1183-6}, doi = {10.1007/S11623-019-1183-6}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ah.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ai, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {657--662}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1184-5}, doi = {10.1007/S11623-019-1184-5}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ai.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19aj, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {663--672}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1185-4}, doi = {10.1007/S11623-019-1185-4}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19aj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19ak, title = {DSK-Zwischenkonferenz am 12. September 2019 in Mainz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {12}, pages = {746}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1199-y}, doi = {10.1007/S11623-019-1199-Y}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19ak.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19b, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {43--49}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1060-3}, doi = {10.1007/S11623-019-1060-3}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19c, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {50--57}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1061-2}, doi = {10.1007/S11623-019-1061-2}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19d, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {1}, pages = {57--60}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1062-1}, doi = {10.1007/S11623-019-1062-1}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19e, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {102--109}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1072-z}, doi = {10.1007/S11623-019-1072-Z}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19f, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {110--117}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1073-y}, doi = {10.1007/S11623-019-1073-Y}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19g, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {2}, pages = {117--120}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1074-x}, doi = {10.1007/S11623-019-1074-X}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19h, title = {{EDPS} Opinion 10/2018 on the Commission: Package on free and fair European elections}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {126}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1077-7}, doi = {10.1007/S11623-019-1077-7}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19i, title = {Joint Control}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {167}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1085-7}, doi = {10.1007/S11623-019-1085-7}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19j, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {168--174}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1086-6}, doi = {10.1007/S11623-019-1086-6}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19k, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {3}, pages = {175--184}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1087-5}, doi = {10.1007/S11623-019-1087-5}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X19k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19l, title = {{DSK} zu Daten{\"{u}}bermittlungen aus Deutschland in das Vereinigte K{\"{o}}nigreich Gro{\ss}britannien und Nordirland nach dem "Brexit"}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {256}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1103-9}, doi = {10.1007/S11623-019-1103-9}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19m, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {301--307}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1111-9}, doi = {10.1007/S11623-019-1111-9}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19n, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {308--313}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1112-8}, doi = {10.1007/S11623-019-1112-8}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19o, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {314--320}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1113-7}, doi = {10.1007/S11623-019-1113-7}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19p, title = {97. {DSK} am 3. und 4. April 2019 auf dem Hambacher Schloss}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {326}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1116-4}, doi = {10.1007/S11623-019-1116-4}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19q, title = {Hambacher Erkl{\"{a}}rung zur K{\"{u}}nstlichen Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {375--376}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1126-2}, doi = {10.1007/S11623-019-1126-2}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19r, title = {IT-Sicherheitsrecht 2.0}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {377}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1127-1}, doi = {10.1007/S11623-019-1127-1}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19s, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {378--383}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1128-0}, doi = {10.1007/S11623-019-1128-0}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19t, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {384--388}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1129-z}, doi = {10.1007/S11623-019-1129-Z}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19u, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {6}, pages = {388--392}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1130-6}, doi = {10.1007/S11623-019-1130-6}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19v, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {444--452}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1141-3}, doi = {10.1007/S11623-019-1141-3}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19w, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {453--460}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1142-2}, doi = {10.1007/S11623-019-1142-2}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19x, title = {Informationsfreiheit by Design}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {466}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1144-0}, doi = {10.1007/S11623-019-1144-0}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19y, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {518--526}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1155-x}, doi = {10.1007/S11623-019-1155-X}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X19z, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {8}, pages = {527--534}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1156-9}, doi = {10.1007/S11623-019-1156-9}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X19z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZanderSB19, author = {Tim Zander and Anne Steinbr{\"{u}}ck and Pascal Birnstill}, title = {Spieltheoretische Modellierung der Verarbeitung personenbezogener Daten}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {270--275}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1106-6}, doi = {10.1007/S11623-019-1106-6}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ZanderSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Banon18, author = {Miguel Ba{\~{n}}{\'{o}}n}, title = {Assurance and {IT} Development Paces and Challenges}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {407--410}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0968-3}, doi = {10.1007/S11623-018-0968-3}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Banon18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BarchnickiP18, author = {Sebastian Barchnicki and Norbert Pohlmann}, title = {Was IT-Sicherheitsindustrie und Anwender voneinander lernen k{\"{o}}nnen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {246--251}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0916-2}, doi = {10.1007/S11623-018-0916-2}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BarchnickiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BartelsB18, author = {Karsten U. Bartels and Merlin Backer}, title = {Die Ber{\"{u}}cksichtigung des Stands der Technik in der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {214--219}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0910-8}, doi = {10.1007/S11623-018-0910-8}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BartelsB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Benzmuller18, author = {Ralf Benzm{\"{u}}ller}, title = {Machine Learning und Virenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {224--230}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0912-6}, doi = {10.1007/S11623-018-0912-6}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Benzmuller18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BeyererMR18, author = {J{\"{u}}rgen Beyerer and J{\"{o}}rn M{\"{u}}ller{-}Quade and Ralf H. Reussner}, title = {Karlsruher Thesen zur Digitalen Souver{\"{a}}nit{\"{a}}t Europas}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {277--280}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0940-2}, doi = {10.1007/S11623-018-0940-2}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BeyererMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bieker18, author = {Felix Bieker}, title = {Die Risikoanalyse nach dem neuen EU-Datenschutzrecht und dem Standard-Datenschutzmodell}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {27--31}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0886-4}, doi = {10.1007/S11623-018-0886-4}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bieker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BiekerBH18, author = {Felix Bieker and Benjamin Bremert and Marit Hansen}, title = {Die Risikobeurteilung nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {492--496}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0986-1}, doi = {10.1007/S11623-018-0986-1}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BiekerBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BiekerBH18a, author = {Felix Bieker and Benjamin Bremert and Marit Hansen}, title = {Verantwortlichkeit und Einsatz von Algorithmen bei {\"{o}}ffentlichen Stellen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {608--612}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1010-5}, doi = {10.1007/S11623-018-1010-5}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BiekerBH18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BihlmayerEL18, author = {Thomas Bihlmayer and Philipp Ehmann and Henning Lesch}, title = {Kommissionsvorschlag zu e-Privacy verhindert Vereinheitlichung des Datenschutzes in Europa}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {241--245}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0915-3}, doi = {10.1007/S11623-018-0915-3}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BihlmayerEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BileGW18, author = {Tamer Bile and Ludwig Gramlich and Michael W{\"{a}}chter}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {266--270}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0920-6}, doi = {10.1007/S11623-018-0920-6}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BileGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bitkom18, author = {Bitkom}, title = {Digitale Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {294--300}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0944-y}, doi = {10.1007/S11623-018-0944-Y}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bitkom18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann18, author = {Dominik Bleckmann}, title = {Wahres Ungl{\"{u}}ck bringt der falsche Wahn}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {136--137}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0922-4}, doi = {10.1007/S11623-018-0922-4}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann18a, author = {Dominik Bleckmann}, title = {K{\"{u}}nstliche Intelligenz - Fluch oder Segen?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {539}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0994-1}, doi = {10.1007/S11623-018-0994-1}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BraunHB18, author = {Steffen Braun and Tobias Henzler and Anders Berg}, title = {Nutzeridentifikation mit mobilen Endger{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {673--679}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1023-0}, doi = {10.1007/S11623-018-1023-0}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BraunHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Breyer18, author = {Jonas Breyer}, title = {Verarbeitungsgrunds{\"{a}}tze und Rechenschaftspflicht nach Art. 5 {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {311--317}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0947-8}, doi = {10.1007/S11623-018-0947-8}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Breyer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BroadnaxLMMN18, author = {Brandon Broadnax and Bernhard L{\"{o}}we and Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, title = {Sicherheit auf festem Fundament}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {74--78}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0897-1}, doi = {10.1007/S11623-018-0897-1}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BroadnaxLMMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brockmann18, author = {Hans{-}Christian Brockmann}, title = {Effizientes und verantwortungsvolles Datenmanagement im Zeitalter der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {634--639}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1015-0}, doi = {10.1007/S11623-018-1015-0}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Brockmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Burri18, author = {Thomas Burri}, title = {K{\"{u}}nstliche Intelligenz und internationales Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {603--607}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1009-y}, doi = {10.1007/S11623-018-1009-Y}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Burri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad18, author = {Conrad Sebastian Conrad}, title = {Gilt das Vereinigte K{\"{o}}nigreich k{\"{u}}nftig als ein Drittland?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {159--160}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0928-y}, doi = {10.1007/S11623-018-0928-Y}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad18a, author = {Conrad Sebastian Conrad}, title = {Kann die K{\"{u}}nstliche Intelligenz den Menschen entschl{\"{u}}sseln? - Neue Forderungen zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {541--546}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0996-z}, doi = {10.1007/S11623-018-0996-Z}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad18b, author = {Conrad Sebastian Conrad}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {798--802}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1048-4}, doi = {10.1007/S11623-018-1048-4}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Conrad18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Debski18, author = {Andrzej Debski}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {400--402}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0965-6}, doi = {10.1007/S11623-018-0965-6}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Debski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DiepenbrockS18, author = {Andreas Diepenbrock and Sabine Sachweh}, title = {Ein konzeptionelles Rahmenwerk f{\"{u}}r die Integration Digitaler Souver{\"{a}}nit{\"{a}}t in Softwarearchitekturen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {281--285}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0941-1}, doi = {10.1007/S11623-018-0941-1}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DiepenbrockS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DreyerK18, author = {Bastian Dreyer and Gerhard Kramarz{-}von Kohout}, title = {Notruf 110 / 112: Technische Richtlinie Notrufverbindungen {(TR} Notruf) 2.0}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {510--517}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0989-y}, doi = {10.1007/S11623-018-0989-Y}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DreyerK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dullien18, author = {Thomas Dullien}, title = {Maschinelles Lernen und k{\"{u}}nstliche Intelligenz in der Informationssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {618--622}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1012-3}, doi = {10.1007/S11623-018-1012-3}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dullien18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DurigF18, author = {Markus D{\"{u}}rig and Matthias Fischer}, title = {Cybersicherheit in Kritischen Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {209--213}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0909-1}, doi = {10.1007/S11623-018-0909-1}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DurigF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtM18, author = {Jens Eckhardt and Konrad Menz}, title = {Datenschutz-Grundverordnung: Neuer Schutz - neue Spannungsverh{\"{a}}ltnisse}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {131--133}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0921-5}, doi = {10.1007/S11623-018-0921-5}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtM18a, author = {Jens Eckhardt and Konrad Menz}, title = {Bu{\ss}geldsanktionen der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {139--144}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0924-2}, doi = {10.1007/S11623-018-0924-2}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtM18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EsslingerM18, author = {Bernhard Esslinger and Hern{\^{a}}ni Marques}, title = {Verfahren und Implementationen von "pretty Easy privacy" (pEp)}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {101--105}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0901-9}, doi = {10.1007/S11623-018-0901-9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EsslingerM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FerrareseD18, author = {Barbara Ferrarese and Alexander Dix}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {59--62}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0892-6}, doi = {10.1007/S11623-018-0892-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FerrareseD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerT18, author = {Arno Fiedler and Christoph Thiel}, title = {Chancen europ{\"{a}}ischer Standards f{\"{u}}r die Zertifizierung?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {434--436}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0974-5}, doi = {10.1007/S11623-018-0974-5}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerTT18, author = {Arno Fiedler and Christian Thiel and Christoph Thiel}, title = {Umsetzung technischer Anforderungen der {DSGVO} mittels eIDAS-VO-konformer Vertrauensdienste}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {236--240}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0914-4}, doi = {10.1007/S11623-018-0914-4}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18, author = {Dirk Fox}, title = {Stand der Forschung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {63}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0893-5}, doi = {10.1007/S11623-018-0893-5}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18a, author = {Dirk Fox}, title = {Digitale Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {271}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0938-9}, doi = {10.1007/S11623-018-0938-9}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18b, author = {Dirk Fox}, title = {Modell und Wirklichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {667}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1020-3}, doi = {10.1007/S11623-018-1020-3}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18c, author = {Dirk Fox}, title = {Des Kaisers neue Kleider}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {671}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1021-2}, doi = {10.1007/S11623-018-1021-2}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FumyR18, author = {Walter Fumy and Helmut Reimer}, title = {Vertrauen ist gut ... Zertifizierung ist besser!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {403}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0966-5}, doi = {10.1007/S11623-018-0966-5}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FumyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geminn18, author = {Christian L. Geminn}, title = {Wissenschaftliche Forschung und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {640--646}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1016-z}, doi = {10.1007/S11623-018-1016-Z}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Geminn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerberZHEVH18, author = {Nina Gerber and Verena Zimmermann and Birgit Henhapl and Sinem Emer{\"{o}}z and Melanie Volkamer and Tobias Hilt}, title = {Nutzerwahrnehmung der Ende-zu-Ende-Verschl{\"{u}}sselung in WhatsApp}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {680--685}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1024-z}, doi = {10.1007/S11623-018-1024-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerberZHEVH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gerhold18, author = {Maximilian Gerhold}, title = {40 Jahre {CNIL} - Ein Blick auf den franz{\"{o}}sischen Gendarmen des Privatlebens}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {368--372}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0958-5}, doi = {10.1007/S11623-018-0958-5}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gerhold18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GollaHB18, author = {Sebastian J. Golla and Henning Hofmann and Matthias B{\"{a}}cker}, title = {Connecting the Dots}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {89--100}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0900-x}, doi = {10.1007/S11623-018-0900-X}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GollaHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Golland18, author = {Alexander Golland}, title = {Der r{\"{a}}umliche Anwendungsbereich der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {351--357}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0955-8}, doi = {10.1007/S11623-018-0955-8}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Golland18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GonscherowskiHR18, author = {Susan Gonscherowski and Marit Hansen and Martin Rost}, title = {Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {442--446}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0976-3}, doi = {10.1007/S11623-018-0976-3}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GonscherowskiHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichG18, author = {Ludwig Gramlich and Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {199--202}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0937-x}, doi = {10.1007/S11623-018-0937-X}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichP18, author = {Ludwig Gramlich and Thomas Petri}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {127--130}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0905-5}, doi = {10.1007/S11623-018-0905-5}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GramlichP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichP18a, author = {Ludwig Gramlich and Thomas Petri}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {663--666}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1019-9}, doi = {10.1007/S11623-018-1019-9}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GriesbeckG18, author = {Michael Griesbeck and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {590--594}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1005-2}, doi = {10.1007/S11623-018-1005-2}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GriesbeckG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HackenjosMR18, author = {Timon Hackenjos and Jeremias Mechler and Jochen Rill}, title = {IT-Sicherheit - ein rechtsfreier Raum?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {286--290}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0942-0}, doi = {10.1007/S11623-018-0942-0}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HackenjosMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen18, author = {Marit Hansen}, title = {Transparenz der Verwaltung auch beim Einsatz von Algorithmen und K{\"{u}}nstlicher Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {733}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1035-9}, doi = {10.1007/S11623-018-1035-9}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Hansen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hartmann18, author = {Mark Hartmann}, title = {Machine Learning und IT-Security}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {231--235}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0913-5}, doi = {10.1007/S11623-018-0913-5}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hartmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hemker18, author = {Thomas Hemker}, title = {Machen Maschinen die Welt sicherer?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {629--633}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1014-1}, doi = {10.1007/S11623-018-1014-1}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hemker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Henseler-UngerH18, author = {Iris Henseler{-}Unger and Annette Hillebrand}, title = {Aktuelle Lage der IT-Sicherheit in {KMU}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {686--690}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1025-y}, doi = {10.1007/S11623-018-1025-Y}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Henseler-UngerH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoerenV18, author = {Thomas Hoeren and Jonas V{\"{o}}lkel}, title = {Informationsabfrage {\"{u}}ber Domain-verantwortliche nach der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {161--164}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0929-x}, doi = {10.1007/S11623-018-0929-X}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoerenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoidnR18, author = {Dominik Hoidn and Alexander Ro{\ss}nagel}, title = {Anpassung des Sozialdatenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {487--491}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0985-2}, doi = {10.1007/S11623-018-0985-2}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoidnR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Holzel18, author = {Julian H{\"{o}}lzel}, title = {Anonymisierungstechniken und das Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {502--509}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0988-z}, doi = {10.1007/S11623-018-0988-Z}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Holzel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Humphreys18, author = {Edward Humphreys}, title = {The Future Landscape of {ISMS} Standards}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {421--423}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0971-8}, doi = {10.1007/S11623-018-0971-8}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Humphreys18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HusemannPS18, author = {Charlotte Husemann and Fabian Pittroff and Andreas D. Schulz}, title = {Fitness-Tracking als Informationsproblem}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {694--700}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1027-9}, doi = {10.1007/S11623-018-1027-9}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HusemannPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JakobiSS18, author = {Timo Jakobi and Gunnar Stevens and Anna{-}Magdalena Seufert}, title = {Privacy-By-Design f{\"{u}}r das Connected Car: Architekturen aus Verbrauchersicht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {704--707}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1029-7}, doi = {10.1007/S11623-018-1029-7}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/JakobiSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JakschD18, author = {Christian Jaksch and Gerrit von Daacke}, title = {Datenschutzbeauftragter und Datenschutz-Organisation unter der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {758--763}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1040-z}, doi = {10.1007/S11623-018-1040-Z}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/JakschD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jensen18, author = {Meiko Jensen}, title = {Zur Messbarkeit von Schutzzielen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {23--26}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0885-5}, doi = {10.1007/S11623-018-0885-5}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Jensen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KieselmannW18, author = {Olga Kieselmann and Arno Wacker}, title = {L{\"{o}}schen im Internet - rechtlich gefordert und technisch m{\"{o}}glich!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {437--441}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0975-4}, doi = {10.1007/S11623-018-0975-4}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KieselmannW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker18, author = {Dennis{-}Kenji Kipker}, title = {Stellungnahme der {EAID}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {252--253}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0917-1}, doi = {10.1007/S11623-018-0917-1}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker18a, author = {Dennis{-}Kenji Kipker}, title = {VPN-Tunnelabschaltung und "Chinese Cybersecurity Law"}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {574--575}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1001-6}, doi = {10.1007/S11623-018-1001-6}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS18, author = {Dennis{-}Kenji Kipker and Mattea Stelter}, title = {Datenschutz unter MiFID {II}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {364--367}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0957-6}, doi = {10.1007/S11623-018-0957-6}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KipkerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS18a, author = {Dennis{-}Kenji Kipker and Dario Scholz}, title = {{EU} Cybersecurity-Verordnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {701--703}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1028-8}, doi = {10.1007/S11623-018-1028-8}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS18b, author = {Dennis{-}Kenji Kipker and Dario Scholz}, title = {Cybersicherheit und Datenschutz in China}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {768--771}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1042-x}, doi = {10.1007/S11623-018-1042-X}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerS18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kohler18, author = {Thomas R. K{\"{o}}hler}, title = {Datenschutz im vernetzten Fahrzeug}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {376--379}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0960-y}, doi = {10.1007/S11623-018-0960-Y}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kohler18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KowalskiI18, author = {Bernd Kowalski and Matthias Intemann}, title = {Perspektiven der IT-Sicherheits-Zertifizierung f{\"{u}}r Europas M{\"{a}}rkte}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {415--419}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0970-9}, doi = {10.1007/S11623-018-0970-9}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KowalskiI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kranig18, author = {Thomas Kranig}, title = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht Verbindliche Datenschutzvorschriften {(BCR)} f{\"{u}}r die Allianz-Gruppe genehmigt}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {406}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0967-4}, doi = {10.1007/S11623-018-0967-4}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kranig18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann18, author = {Dieter Kugelmann}, title = {Die Anpassung der Fachgesetze an die {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {482--486}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0984-3}, doi = {10.1007/S11623-018-0984-3}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhnlRS18, author = {Christina K{\"{u}}hnl and Kerstin Rohrer and Nick Kai Schneider}, title = {Ein europ{\"{a}}ischer Gesundheitsdatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {735--740}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1036-8}, doi = {10.1007/S11623-018-1036-8}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KuhnlRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lachenmann18, author = {Matthias Lachenmann}, title = {Bodycams: Nutzung durch private Sicherheitsdienste}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {777--781}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1044-8}, doi = {10.1007/S11623-018-1044-8}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lachenmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lander18, author = {Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden des Bundes und der L{\"{a}}nder}, title = {Beschluss der {DSK} zu Facebook Fanpages D{\"{u}}sseldorf, 5. September 2018}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {672}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1022-1}, doi = {10.1007/S11623-018-1022-1}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lander18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LeitoldK18, author = {Herbert Leitold and Daniel Konrad}, title = {Erfahrungen aus eIDAS Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {429--433}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0973-6}, doi = {10.1007/S11623-018-0973-6}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LeitoldK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lorenz18, author = {Bernd Lorenz}, title = {Datenschutzrechtliche Fragen offener E-Mail-Verteiler}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {178--180}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0933-1}, doi = {10.1007/S11623-018-0933-1}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lorenz18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MarnauBH18, author = {Ninja Marnau and Pascal Berrang and Mathias Humbert}, title = {Anonymisierungsverfahren f{\"{u}}r genetische Daten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {83--88}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0899-z}, doi = {10.1007/S11623-018-0899-Z}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MarnauBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MayerKV18, author = {Peter Mayer and Alexandra Kunz and Melanie Volkamer}, title = {Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {307--310}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0946-9}, doi = {10.1007/S11623-018-0946-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MayerKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester18, author = {Britta Alexandra Mester}, title = {Haftungsrisiko i. S. d. {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {181}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0934-0}, doi = {10.1007/S11623-018-0934-0}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester18a, author = {Britta Alexandra Mester}, title = {Datenschutzrechtliche Herausforderung der "K{\"{u}}nstlichen Intelligenz" {(KI)}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {535}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0993-2}, doi = {10.1007/S11623-018-0993-2}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester18b, author = {Britta Alexandra Mester}, title = {K{\"{u}}nstliche Intelligenz {(KI)} in Zeiten des Datenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {576}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1002-5}, doi = {10.1007/S11623-018-1002-5}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mino-VasquezS18, author = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez and Peter Suhren}, title = {Liability for injuries according to {GDPR}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {151--155}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0926-0}, doi = {10.1007/S11623-018-0926-0}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mino-VasquezS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mitrakas18, author = {Andreas Mitrakas}, title = {The emerging {EU} framework on cybersecurity certification}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {411--414}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0969-2}, doi = {10.1007/S11623-018-0969-2}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mitrakas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Msumi18, author = {Mbiki M. Msumi}, title = {An Overview of eHealth Regulations in Tanzania}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {373--375}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0959-4}, doi = {10.1007/S11623-018-0959-4}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Msumi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NeumannRVKS18, author = {Stephan Neumann and Benjamin Reinheimer and Melanie Volkamer and Alexandra Kunz and Christian Schwartz}, title = {Effektiver Schutz vor betr{\"{u}}gerischen Nachrichten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {301--306}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0945-x}, doi = {10.1007/S11623-018-0945-X}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/NeumannRVKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen18, author = {Kim Nguyen}, title = {Certification of eIDAS trust services and new global transparency trends}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {424--428}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0972-7}, doi = {10.1007/S11623-018-0972-7}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nguyen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nordrhein-Westfalen18, author = {LfDI Nordrhein{-}Westfalen and Helga Block}, title = {Datenschutzkonferenz - Nordrhein-Westfalen {\"{u}}bernimmt Vorsitz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {138}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0923-3}, doi = {10.1007/S11623-018-0923-3}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nordrhein-Westfalen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nurnberger18, author = {Stefan N{\"{u}}rnberger}, title = {Datenverarbeitung im (vernetzten) Fahrzeug}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {79--82}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0898-0}, doi = {10.1007/S11623-018-0898-0}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nurnberger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri18, author = {Thomas Petri}, title = {Faire und transparente Verarbeitung, Informationsrechte und Rahmenbedingungen f{\"{u}}r ihre Beschr{\"{a}}nkung - zur Auslegung der Art. 12 ff. und 23 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {347--350}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0954-9}, doi = {10.1007/S11623-018-0954-9}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri18a, author = {Thomas Petri}, title = {Bitte weniger Hysterie im Umgang mit der Datenschutz-Grundverordnung!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {727--728}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1033-y}, doi = {10.1007/S11623-018-1033-Y}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri18b, author = {Thomas Petri}, title = {Kliniken melden Datenschutzverst{\"{o}}{\ss}e nach Art. 33 {DSGVO} - erste Erfahrungen einer Aufsichtsbeh{\"{o}}rde}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {753--757}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1039-5}, doi = {10.1007/S11623-018-1039-5}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petrlic18, author = {Ronald Petrlic}, title = {{HTTPS} im Lichte der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {691--693}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1026-x}, doi = {10.1007/S11623-018-1026-X}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petrlic18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pfrang18, author = {Sebastian Pfrang}, title = {Die "nicht-dateim{\"{a}}{\ss}ige" Verarbeitung von Besch{\"{a}}ftigtendaten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {380--382}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0961-x}, doi = {10.1007/S11623-018-0961-X}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pfrang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohle18, author = {J{\"{o}}rg Pohle}, title = {Zur Zeitdimension der Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {19--22}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0884-6}, doi = {10.1007/S11623-018-0884-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohle18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann18, author = {Norbert Pohlmann}, title = {Europa treibt die IT-Sicherheit voran}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {203}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0906-4}, doi = {10.1007/S11623-018-0906-4}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR18, author = {Norbert Pohlmann and Rene Riedel}, title = {Strafverfolgung darf die IT-Sicherheit im Internet nicht schw{\"{a}}chen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {37--44}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0888-2}, doi = {10.1007/S11623-018-0888-2}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pollmann18, author = {Maren Pollmann}, title = {Das Marktortprinzip in der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {383}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0962-9}, doi = {10.1007/S11623-018-0962-9}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pollmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Quiel18, author = {Philipp Quiel}, title = {Blockchain-Technologie im Fokus von Art. 8 {GRC} und {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {566--573}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1000-7}, doi = {10.1007/S11623-018-1000-7}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Quiel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer18, author = {Helmut Reimer}, title = {Online-Durchsuchung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {5}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0880-x}, doi = {10.1007/S11623-018-0880-X}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer18a, author = {Helmut Reimer}, title = {Gro{\ss}sprech: Vorreiter und Vorreiterrolle}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {207}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0907-3}, doi = {10.1007/S11623-018-0907-3}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerSB18, author = {Helmut Reimer and Peter Schaar and Helmut B{\"{a}}umler}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {465--470}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0980-7}, doi = {10.1007/S11623-018-0980-7}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW18, author = {Helmut Reimer and Christoph Wegener}, title = {K{\"{u}}nstliche Intelligenz: Vorsicht Hype!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {599--600}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1007-0}, doi = {10.1007/S11623-018-1007-0}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Riemer18, author = {Dieter Riemer}, title = {Die DONot - ein Nachruf}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {772--776}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1043-9}, doi = {10.1007/S11623-018-1043-9}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Riemer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RobrahnB18, author = {Rasmus Robrahn and Kirsten Bock}, title = {Schutzziele als Optimierungsgebote}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {7--11}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0882-8}, doi = {10.1007/S11623-018-0882-8}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RobrahnB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rocher18, author = {Dror{-}John R{\"{o}}cher}, title = {Cyber Threat Intelligence 101}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {623--628}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1013-2}, doi = {10.1007/S11623-018-1013-2}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rocher18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RohrKG18, author = {Sebastian Rohr and Dennis{-}Kenji Kipker and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {722--726}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1032-z}, doi = {10.1007/S11623-018-1032-Z}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RohrKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel18, author = {Alexander Ro{\ss}nagel}, title = {Nationale Anpassung des Datenschutzrechts}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {471--472}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0981-6}, doi = {10.1007/S11623-018-0981-6}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel18a, author = {Alexander Ro{\ss}nagel}, title = {Kontinuit{\"{a}}t oder Innovation?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {477--481}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0983-4}, doi = {10.1007/S11623-018-0983-4}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel18b, author = {Alexander Ro{\ss}nagel}, title = {Umsetzung der Unionsregelungen zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {741--745}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1037-7}, doi = {10.1007/S11623-018-1037-7}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost18, author = {Martin Rost}, title = {Schutzziele im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {1}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0879-3}, doi = {10.1007/S11623-018-0879-3}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rost18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost18a, author = {Martin Rost}, title = {Die Ordnung der Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {13--17}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0883-7}, doi = {10.1007/S11623-018-0883-7}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rost18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost18b, author = {Martin Rost}, title = {K{\"{u}}nstliche Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {558--565}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0999-9}, doi = {10.1007/S11623-018-0999-9}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RothmannB18, author = {Robert Rothmann and Benedikt Buchner}, title = {Der typische Facebook-Nutzer zwischen Recht und Realit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {342--346}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0953-x}, doi = {10.1007/S11623-018-0953-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RothmannB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Saive18, author = {David Saive}, title = {R{\"{u}}ckabwicklung von Blockchain-Transaktionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {764--767}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1041-y}, doi = {10.1007/S11623-018-1041-Y}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Saive18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schadt18, author = {Achim Schadt}, title = {Vernetzung im {OP} - Echtzeitdaten als {\"{a}}rztliche Dokumentation}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {169--173}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0931-3}, doi = {10.1007/S11623-018-0931-3}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schadt18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schael18, author = {Christopher Schael}, title = {K{\"{u}}nstliche Intelligenz in der modernen Gesellschaft}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {547--551}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0997-y}, doi = {10.1007/S11623-018-0997-Y}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schael18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schlehahn18, author = {Eva Schlehahn}, title = {Die Methodik des Standard-Datenschutzmodells im Bereich der {\"{o}}ffentlichen Sicherheit und Justiz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {32--36}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0887-3}, doi = {10.1007/S11623-018-0887-3}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schlehahn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchroderAW18, author = {Christian Schr{\"{o}}der and Amelie von Alten and Robert Weinhold}, title = {Stolpersteine der {DSGVO} f{\"{u}}r multinationale Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {746--752}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1038-6}, doi = {10.1007/S11623-018-1038-6}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchroderAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SparenbergP18, author = {Michael Sparenberg and Norbert Pohlmann}, title = {Cybersecurity made in {EU}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {220--223}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0911-7}, doi = {10.1007/S11623-018-0911-7}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SparenbergP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Steffen18, author = {Nils Steffen}, title = {Zivilrechtliche Haftung von Datenschutzbeauftragten f{\"{u}}r Bu{\ss}gelder}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {145--150}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0925-1}, doi = {10.1007/S11623-018-0925-1}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Steffen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Strauss18, author = {Stefan Strau{\ss}}, title = {Identifizierbarkeit in soziotechnischen Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {497--501}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0987-0}, doi = {10.1007/S11623-018-0987-0}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Strauss18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Supervisor18, author = {European Data Protection Supervisor}, title = {{EDPS} calls for consistency in {EU} approach to criminal records}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {68}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0895-3}, doi = {10.1007/S11623-018-0895-3}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Supervisor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tassi18, author = {Smaro Tassi}, title = {Das Verh{\"{a}}ltnis von Sach- und Datenhehlerei}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {165--168}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0930-4}, doi = {10.1007/S11623-018-0930-4}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tassi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Thiel18, author = {Barbara Thiel}, title = {Merkblatt f{\"{u}}r die Nutzung von "WhatsApp" in Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {601--602}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1008-z}, doi = {10.1007/S11623-018-1008-Z}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Thiel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld18, author = {Marie{-}Theres Tinnefeld}, title = {Vom Schwein und anderen Querschnittsmaterien in der Union}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {67}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0894-4}, doi = {10.1007/S11623-018-0894-4}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld18a, author = {Marie{-}Theres Tinnefeld}, title = {Herausforderungen im europ{\"{a}}ischen Kulturerbejahr 2018 - einige fragmentarische Betrachtungen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {339--341}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0952-y}, doi = {10.1007/S11623-018-0952-Y}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld18b, author = {Marie{-}Theres Tinnefeld}, title = {Joseph Weizenbaum und die Utopie vom ganzen Menschen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {733}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1034-x}, doi = {10.1007/S11623-018-1034-X}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB18, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Rechtskultur dank EU-Datenschutz?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {335}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0950-0}, doi = {10.1007/S11623-018-0950-0}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke-Caprarese18, author = {Sven Venzke{-}Caprarese}, title = {Haftungsrisiko Webtracking}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {156--158}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0927-z}, doi = {10.1007/S11623-018-0927-Z}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Venzke-Caprarese18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Vosshoff18, author = {Andrea Vo{\ss}hoff}, title = {Dialogkonferenz "Datenschutz f{\"{u}}r Kinder": Belange der Kinder st{\"{a}}rker ber{\"{u}}cksichtigen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {540}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0995-0}, doi = {10.1007/S11623-018-0995-0}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Vosshoff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WachterG18, author = {Michael W{\"{a}}chter and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {531--534}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0992-3}, doi = {10.1007/S11623-018-0992-3}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WachterG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WaltlV18, author = {Bernhard Waltl and Roland Vogl}, title = {Increasing Transparency in Algorithmic- Decision-Making with Explainable {AI}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {613--617}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1011-4}, doi = {10.1007/S11623-018-1011-4}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WaltlV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WaschetzkiS18, author = {Michael Waschetzki and Martin Steinebach}, title = {Digitale Wasserzeichen in der Kriminalistik}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {69--73}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0896-2}, doi = {10.1007/S11623-018-0896-2}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WaschetzkiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeberRKKSK18, author = {Arnd Weber and Steffen Reith and Michael Kasper and Dirk Kuhlmann and Jean{-}Pierre Seifert and Christoph Krau{\ss}}, title = {Souver{\"{a}}nit{\"{a}}t und die IT-Wertsch{\"{o}}pfungskette}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {291--293}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0943-z}, doi = {10.1007/S11623-018-0943-Z}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WeberRKKSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener18, author = {Christoph Wegener}, title = {Chancen und Risiken intelligenter Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {595}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1006-1}, doi = {10.1007/S11623-018-1006-1}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert18, author = {Thilo Weichert}, title = {Forensische DNA-Analysen und der Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {358--363}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0956-7}, doi = {10.1007/S11623-018-0956-7}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeidenhammerG18, author = {Detlef Weidenhammer and Rocco Gundlach}, title = {Wer kennt den "Stand der Technik"?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {106--110}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0902-8}, doi = {10.1007/S11623-018-0902-8}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeidenhammerG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wennemann18, author = {Thomas Wennemann}, title = {{TOM} und die Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {174--177}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0932-2}, doi = {10.1007/S11623-018-0932-2}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wennemann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wessels18, author = {Michael Wessels}, title = {Abmahnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {782}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1045-7}, doi = {10.1007/S11623-018-1045-7}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wessels18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wojak18, author = {Stefanie Wojak}, title = {Intelligente Kollektiv-Algorithmen in der Personalverwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {553--557}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0998-x}, doi = {10.1007/S11623-018-0998-X}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wojak18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18, title = {94. {DSK} am 08./09. November 2017 in Oldenburg}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {6}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0881-9}, doi = {10.1007/S11623-018-0881-9}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18a, title = {94. Datenschutz-Konferenz am 08./09. November 2017 in Oldenburg - Entschlie{\ss}ungen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {45--46}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0889-1}, doi = {10.1007/S11623-018-0889-1}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.