Search dblp for Publications

export results for "stream:streams/journals/dud:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/dud/AppeltG24,
  author       = {Dominik Appelt and
                  Ines Geissler},
  title        = {Datenschutzsensibilisierung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {125--127},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1892-8},
  doi          = {10.1007/S11623-023-1892-8},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/AppeltG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BarchnickiM24,
  author       = {Sebastian Barchnicki and
                  Arbnor Memeti},
  title        = {,,Basispaket Cybersicherheit"},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {16--20},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1873-y},
  doi          = {10.1007/S11623-023-1873-Y},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BarchnickiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BleckmannBGKM24,
  author       = {Felix Bleckmann and
                  Christopher Boysen and
                  Anika Gehlen and
                  Felix Ku{\ss}maul and
                  Nils Michael},
  title        = {Mit Sicherheit Vertrauen schaffen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {222--226},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1913-2},
  doi          = {10.1007/S11623-024-1913-2},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BleckmannBGKM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BollS24,
  author       = {Alina Boll and
                  Annika Selzer},
  title        = {Die Datenschutz-Vorsorge {(DS-V)}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {44--48},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1878-6},
  doi          = {10.1007/S11623-023-1878-6},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BollS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BollS24a,
  author       = {Alina Boll and
                  Sarah Stummer},
  title        = {Erste Schritte im Rahmen der Datenschutz-Vorsorge},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {118--124},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1891-9},
  doi          = {10.1007/S11623-023-1891-9},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BollS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BollSS24,
  author       = {Alina Boll and
                  Sarah Stummer and
                  Annika Selzer},
  title        = {Datenschutz-Vorsorge},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {172--176},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1902-x},
  doi          = {10.1007/S11623-023-1902-X},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BollSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BosseDGSS24,
  author       = {Christian K. Bosse and
                  Florian Dehling and
                  Eduard C. Groen and
                  Simone Salemi and
                  Hartmut Schmitt},
  title        = {Auf dem Weg zu gebrauchstauglichen Datenschutzl{\"{o}}sungen
                  f{\"{u}}r digitale {\"{O}}kosysteme},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {82--88},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1886-6},
  doi          = {10.1007/S11623-023-1886-6},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BosseDGSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner24,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {50--59},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1880-z},
  doi          = {10.1007/S11623-023-1880-Z},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner24a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {190--196},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1906-6},
  doi          = {10.1007/S11623-023-1906-6},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DehlingLWF24,
  author       = {Florian Dehling and
                  Stefanie Ludborzs and
                  Andreas We{\ss}ner and
                  Rodrigo Falc{\~{a}}o},
  title        = {Konzepte f{\"{u}}r gebrauchstaugliche Datenschutzfunktionen in
                  digitalen {\"{O}}kosystemen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {95--102},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1888-4},
  doi          = {10.1007/S11623-023-1888-4},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DehlingLWF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dehning24,
  author       = {Oliver Dehning},
  title        = {Transparenz in der IT-Supply-Chain},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {25--30},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1875-9},
  doi          = {10.1007/S11623-023-1875-9},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dehning24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dukek24,
  author       = {Martin Dukek},
  title        = {Ransomware-as-a-Service},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {153--157},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1898-2},
  doi          = {10.1007/S11623-023-1898-2},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dukek24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EntschewB24,
  author       = {Enrico Entschew and
                  Paul van Brouwershaven},
  title        = {QWACs in the context of the trust spaces of the browsers and eIDAS
                  2.0},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {246--250},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1918-x},
  doi          = {10.1007/S11623-024-1918-X},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EntschewB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fehenberger24,
  author       = {Tobias Fehenberger},
  title        = {Kryptoagilit{\"{a}}t: Ist die Zeit gekommen?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {21--24},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1874-x},
  doi          = {10.1007/S11623-023-1874-X},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fehenberger24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FethR24,
  author       = {Denis Feth and
                  Bernd Rauch},
  title        = {Datentreuh{\"{a}}nder in der Praxis},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {103--109},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1889-3},
  doi          = {10.1007/S11623-023-1889-3},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FethR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FethSI24,
  author       = {Denis Feth and
                  Hartmut Schmitt and
                  Luigi Lo Iacono},
  title        = {Daten{\"{o}}konomie trifft Datenschutz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {73},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1883-9},
  doi          = {10.1007/S11623-023-1883-9},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FethSI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox24,
  author       = {Dirk Fox},
  title        = {Checks and Balances},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {149},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1896-4},
  doi          = {10.1007/S11623-023-1896-4},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fuchs24,
  author       = {Thomas Fuchs},
  title        = {EuGH-Urteil zu KI-Entscheidungen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {76},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1884-8},
  doi          = {10.1007/S11623-023-1884-8},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fuchs24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GajekLS24,
  author       = {Sebastian Gajek and
                  S{\"{o}}ren Langenberg and
                  Christian St{\"{u}}ble},
  title        = {Confidential Cloud Computing},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {31--36},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1876-8},
  doi          = {10.1007/S11623-023-1876-8},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GajekLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geissler24,
  author       = {Ines Geissler},
  title        = {Virtuelles Weiterleben},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {164--168},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1900-z},
  doi          = {10.1007/S11623-023-1900-Z},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Geissler24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrancF24,
  author       = {Franziska Granc and
                  Arno Fiedler},
  title        = {Mit Interoperabilit{\"{a}}t zur Europ{\"{a}}ischen Souver{\"{a}}nit{\"{a}}t?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {217--221},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1912-3},
  doi          = {10.1007/S11623-024-1912-3},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrancF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber24,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {69--72},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1882-x},
  doi          = {10.1007/S11623-023-1882-X},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber24a,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {205--208},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1908-4},
  doi          = {10.1007/S11623-023-1908-4},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HannekeBSH24,
  author       = {Bj{\"{o}}rn Hanneke and
                  Lorenz Baum and
                  Christian H. Schunck and
                  Oliver Hinz},
  title        = {Privatsph{\"{a}}renfreundliche Plattformgesch{\"{a}}ftsmodelle},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {89--94},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1887-5},
  doi          = {10.1007/S11623-023-1887-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HannekeBSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kamp24,
  author       = {Meike Kamp},
  title        = {Herausgabe von Mitgliederlisten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {212},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1910-5},
  doi          = {10.1007/S11623-024-1910-5},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kamp24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber24,
  author       = {Ulrich Kelber},
  title        = {{IWGDPT} Gemeinsames Statement zur Berlin Group},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {152},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1897-3},
  doi          = {10.1007/S11623-023-1897-3},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lapp24,
  author       = {Thomas Lapp},
  title        = {Sichere europ{\"{a}}ische elektronische Identit{\"{a}}ten
                  - eIDAS 2.0},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {213--216},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1911-4},
  doi          = {10.1007/S11623-024-1911-4},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lapp24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LichtG24,
  author       = {Christoph Licht and
                  Ludwig Gramlich},
  title        = {Datenschutz bei Meldestellen nach dem Hinweisgeberschutzgesetz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {37--43},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1877-7},
  doi          = {10.1007/S11623-023-1877-7},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LichtG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LiptakW24,
  author       = {Patrick Liptak and
                  Andreas Wand},
  title        = {The {PSD2} model as a prototype of trustworthy interface authentication},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {241--245},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1917-y},
  doi          = {10.1007/S11623-024-1917-Y},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LiptakW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LorenzF24,
  author       = {Ingo Lorenz and
                  Dirk Fox},
  title        = {Ein Reifegradmodell f{\"{u}}r die Datenschutzorganisation},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {183--187},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1904-8},
  doi          = {10.1007/S11623-023-1904-8},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LorenzF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen24,
  author       = {Kim Nguyen},
  title        = {Ein sicheres und vertrauensw{\"{u}}rdiges ID-{\"{O}}kosystem
                  - ein wichtiges Ziel f{\"{u}}r Europa!},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {209},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1909-y},
  doi          = {10.1007/S11623-024-1909-Y},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri24,
  author       = {Thomas Petri},
  title        = {Informationelle Selbstbestimmung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {128--129},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1893-7},
  doi          = {10.1007/S11623-023-1893-7},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann24,
  author       = {Norbert Pohlmann},
  title        = {Aktuelle Herausforderungen der IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1869-7},
  doi          = {10.1007/S11623-023-1869-7},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann24a,
  author       = {Norbert Pohlmann},
  title        = {Die Notwendigkeit von neuen IT-Sicherheitskonzepten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {5--10},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1871-0},
  doi          = {10.1007/S11623-023-1871-0},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR24,
  author       = {Norbert Pohlmann and
                  Helmut Reimer},
  title        = {Regulierung und B{\"{u}}rokratie},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {49},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1879-5},
  doi          = {10.1007/S11623-023-1879-5},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer24,
  author       = {Helmut Reimer},
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {60--69},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1881-y},
  doi          = {10.1007/S11623-023-1881-Y},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer24a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {197--205},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1907-5},
  doi          = {10.1007/S11623-023-1907-5},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SalemiH24,
  author       = {Simone Salemi and
                  Ajla Hajric},
  title        = {K{\"{o}}nnen Datensch{\"{u}}tzer aus Konzepten des sexuellen
                  Konsenses lernen?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {177--182},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1903-9},
  doi          = {10.1007/S11623-023-1903-9},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SalemiH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmittSI24,
  author       = {Hartmut Schmitt and
                  Christian H. Schunck and
                  Luigi Lo Iacono},
  title        = {Daten{\"{o}}konomie in digitalen {\"{O}}kosystemen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {77--81},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1885-7},
  doi          = {10.1007/S11623-023-1885-7},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchmittSI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulmannW24,
  author       = {Haya Schulmann and
                  Michael Waidner},
  title        = {Wie Deutschland zur Cybernation wird},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {11--15},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1872-z},
  doi          = {10.1007/S11623-023-1872-Z},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchulmannW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwalmM24,
  author       = {Steffen Schwalm and
                  Kersten Mueller},
  title        = {Qualifizierte Ledger - der Durchbruch f{\"{u}}r Blockchain},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {227--231},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1914-1},
  doi          = {10.1007/S11623-024-1914-1},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchwalmM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SeegebarthBK24,
  author       = {Christian Seegebarth and
                  Paul Bastian and
                  Micha Kraus},
  title        = {Enabling attribute attestations},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {237--240},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1916-z},
  doi          = {10.1007/S11623-024-1916-Z},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SeegebarthBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SpechtRiemenschneiderH24,
  author       = {Louisa Specht{-}Riemenschneider and
                  Bernadette Heineking},
  title        = {Datenverarbeitung in sicheren Verarbeitungsumgebungen am Beispiel
                  von MRT-Gehirnscans},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {110--117},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1890-x},
  doi          = {10.1007/S11623-023-1890-X},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SpechtRiemenschneiderH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SteffesZ24,
  author       = {Bianca Steffes and
                  Anna Zichler},
  title        = {Deepfakes in Videoverhandlungen vor Gericht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {158--163},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1899-1},
  doi          = {10.1007/S11623-023-1899-1},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SteffesZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld24,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Kunstfreiheit und Pers{\"{o}}nlichkeitsschutz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {169--171},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1901-y},
  doi          = {10.1007/S11623-023-1901-Y},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wand24,
  author       = {Andreas Wand},
  title        = {Die geldw{\"{a}}scherechtliche Identifizierung durch eIDAS-Mittel},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {232--236},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1915-0},
  doi          = {10.1007/S11623-024-1915-0},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wand24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WegenerG24,
  author       = {Christoph Wegener and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {268--272},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1921-2},
  doi          = {10.1007/S11623-024-1921-2},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WegenerG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert24,
  author       = {Thilo Weichert},
  title        = {Ausl{\"{a}}nderzentralregister},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {3},
  pages        = {188--189},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1905-7},
  doi          = {10.1007/S11623-023-1905-7},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24,
  title        = {45. Informationsfreiheitskonferenz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {1},
  pages        = {4},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1870-1},
  doi          = {10.1007/S11623-023-1870-1},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24a,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {130--137},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1894-6},
  doi          = {10.1007/S11623-023-1894-6},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24b,
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {2},
  pages        = {138--148},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1895-5},
  doi          = {10.1007/S11623-023-1895-5},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24c,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {251--260},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-023-1919-1},
  doi          = {10.1007/S11623-023-1919-1},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X24c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X24d,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {4},
  pages        = {261--268},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1920-3},
  doi          = {10.1007/S11623-024-1920-3},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X24d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BahriniMSM23,
  author       = {Mehrdad Bahrini and
                  Thomas M{\"{u}}nder and
                  Karsten Sohr and
                  Rainer Malaka},
  title        = {Verst{\"{a}}ndliche Informationssicherheit in Smarthome-Netzen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {350--353},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1775-z},
  doi          = {10.1007/S11623-023-1775-Z},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BahriniMSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bauer23,
  author       = {Paul Bauer},
  title        = {Zero Trust f{\"{u}}r eine robuste Cyberresilienz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {609--612},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1829-2},
  doi          = {10.1007/S11623-023-1829-2},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bauer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Baum23,
  author       = {Gerhart Baum},
  title        = {Die Verteidigung der Demokratie in Zeiten des Epochenbruchs},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {574--577},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1821-x},
  doi          = {10.1007/S11623-023-1821-X},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Baum23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Becker23,
  author       = {Friedrich{-}Philipp Becker},
  title        = {Umgang mit Gesch{\"{a}}ftsgeheimnissen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {167--168},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1738-4},
  doi          = {10.1007/S11623-023-1738-4},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Becker23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bergt23,
  author       = {Matthias Bergt},
  title        = {Wann ist eine Auftragsverarbeitung eine Auftragsverarbeitung?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {169--172},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1739-3},
  doi          = {10.1007/S11623-023-1739-3},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bergt23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bernzen23,
  author       = {Anna K. Bernzen},
  title        = {Daten gegen digitale Produkte},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {761--765},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1859-9},
  doi          = {10.1007/S11623-023-1859-9},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bernzen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BlaicherS23,
  author       = {Christian Blaicher and
                  Friederike Schellhas{-}Mende},
  title        = {Datenschutzrechtliche Gestaltung von E-Mail-Tracking und -Profiling},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {269--274},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1760-6},
  doi          = {10.1007/S11623-023-1760-6},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BlaicherS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann23,
  author       = {Dominik Bleckmann},
  title        = {Gesch{\"{a}}ftsgeheimnis - Das Pendant zum Datenschutz?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {89--95},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1723-y},
  doi          = {10.1007/S11623-023-1723-Y},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann23a,
  author       = {Dominik Bleckmann},
  title        = {Compliance und {KRITIS}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {545--547},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1815-8},
  doi          = {10.1007/S11623-023-1815-8},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BohlenderDV23,
  author       = {Mark Bohlender and
                  Heike Dietmann and
                  Melanie Volkamer},
  title        = {Cookie-Nutzung nach Inkrafttreten des {TTDSG}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {283--288},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1762-4},
  doi          = {10.1007/S11623-023-1762-4},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BohlenderDV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boll23,
  author       = {Alina Boll},
  title        = {Ohne Cybersicherheit kein Datenschutz, ohne Datenschutz keine Cybersicherheit?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {346--349},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1774-0},
  doi          = {10.1007/S11623-023-1774-0},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Boll23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BressnerGR23,
  author       = {Steven Bressner and
                  Natascha Gaden and
                  Jakob Riediger},
  title        = {Der Cyber Resilience Act},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {327--331},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1770-4},
  doi          = {10.1007/S11623-023-1770-4},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BressnerGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner23,
  author       = {Benedikt Buchner},
  title        = {DuDRecht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {110--118},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1727-7},
  doi          = {10.1007/S11623-023-1727-7},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner23a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {376--382},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1780-2},
  doi          = {10.1007/S11623-023-1780-2},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner23b,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {521--526},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1810-0},
  doi          = {10.1007/S11623-023-1810-0},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner23c,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {657--666},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1839-0},
  doi          = {10.1007/S11623-023-1839-0},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner23d,
  author       = {Benedikt Buchner},
  title        = {Der Schutz von Minderj{\"{a}}hrigen in der Daten{\"{o}}konomie},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {756--760},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1855-0},
  doi          = {10.1007/S11623-023-1855-0},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner23d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuscherHSZGDSSW23,
  author       = {Maximilian B{\"{u}}scher and
                  Gerrit Hornung and
                  Stephan Schindler and
                  Paul Zurawski and
                  Amina Gutjahr and
                  Indra Spiecker genannt D{\"{o}}hmann and
                  Annika Selzer and
                  Sarah Stummer and
                  Thomas Wilmer},
  title        = {Abschreckungseffekte und {\"{U}}berwachungsgef{\"{u}}hl
                  im Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {503--512},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1807-8},
  doi          = {10.1007/S11623-023-1807-8},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BuscherHSZGDSSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad23,
  author       = {Conrad Sebastian Conrad},
  title        = {Datenschutz bei Live-Ortung {\&} GPS-Tracking von Besch{\"{a}}ftigten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {548--552},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1816-7},
  doi          = {10.1007/S11623-023-1816-7},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DausP23,
  author       = {Lucas Daus and
                  Philipp Przybylski},
  title        = {Business Continuity Management und Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {416--419},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1789-6},
  doi          = {10.1007/S11623-023-1789-6},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DausP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DietrichSEP23,
  author       = {Andr{\'{e}} Dietrich and
                  Christopher Schmidt and
                  Nico Enghardt and
                  Tobias Philipp},
  title        = {Lazily-Verifiable {SAT} Proof Checker in {SPARK} 2014},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {487--491},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1804-y},
  doi          = {10.1007/S11623-023-1804-Y},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DietrichSEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dolle23,
  author       = {Wilhelm Dolle},
  title        = {Nachhaltiger Aufbau eines {ISMS}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {393},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1783-z},
  doi          = {10.1007/S11623-023-1783-Z},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dolle23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurmusE23,
  author       = {Erdem Durmus and
                  Jens Engelhardt},
  title        = {Die Rechtm{\"{a}}{\ss}igkeit der Verarbeitung von Vertreter-
                  und Ansprechpartnerdaten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {160--166},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1737-5},
  doi          = {10.1007/S11623-023-1737-5},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DurmusE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EngelbrechtGGRSS23,
  author       = {Stefan Engelbrecht and
                  Jens Gerber and
                  Michael Gyollai and
                  Philipp Joachim Rosch and
                  Cord C. Schulz and
                  Annika Selzer},
  title        = {Digitalisierung in Deutschland},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {343--345},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1773-1},
  doi          = {10.1007/S11623-023-1773-1},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EngelbrechtGGRSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Folkers23,
  author       = {Elena Folkerts},
  title        = {Konzerninterner Austausch von Besch{\"{a}}ftigtendaten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {69--72},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1719-7},
  doi          = {10.1007/S11623-023-1719-7},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Folkers23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Folkerts23,
  author       = {Elena Folkerts},
  title        = {Publisher Erratum zu: Konzerninterner Austausch von Besch{\"{a}}ftigtendaten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {314},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1742-8},
  doi          = {10.1007/S11623-023-1742-8},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Folkerts23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Frankenstein23,
  author       = {Ronny Frankenstein},
  title        = {{BSI} IT-Grundschutz - Arbeitswerkzeug f{\"{u}}r ganzheitliche
                  Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {410--415},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1788-7},
  doi          = {10.1007/S11623-023-1788-7},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Frankenstein23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Freiberg23,
  author       = {Ann{-}Kathrin Freiberg},
  title        = {Lebenderkennung - Schutz f{\"{u}}r die biometrische Identit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {11--14},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1708-2},
  doi          = {10.1007/S11623-022-1708-2},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Freiberg23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrickSZ23,
  author       = {Raphael Antonius Frick and
                  Martin Steinebach and
                  Sascha Zmudzinski},
  title        = {Deepfakes, Dall-E {\&} Co},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {203--208},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1746-4},
  doi          = {10.1007/S11623-023-1746-4},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FrickSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FuhrR23,
  author       = {David Fuhr and
                  Dror{-}John R{\"{o}}cher},
  title        = {0 Trust, 100 {\%} Trust Anchor},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {633--637},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1834-5},
  doi          = {10.1007/S11623-023-1834-5},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FuhrR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GartnerS23,
  author       = {Tanya G{\"{a}}rtner and
                  Annika Selzer},
  title        = {Angemessene technische und organisatorische Ma{\ss}nahmen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {289--294},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1763-3},
  doi          = {10.1007/S11623-023-1763-3},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GartnerS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GartnerS23a,
  author       = {Tanya G{\"{a}}rtner and
                  Annika Selzer},
  title        = {Metrikensysteme als Beitrag zur Umsetzung des risikobasierten Ansatzes},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {367--371},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1778-9},
  doi          = {10.1007/S11623-023-1778-9},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GartnerS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerpottM23,
  author       = {Torsten J. Gerpott and
                  Tobias Mikolas},
  title        = {Auskunftsbegehren nach Art. 15 {DS-GVO} in der Praxis},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {361--366},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1777-x},
  doi          = {10.1007/S11623-023-1777-X},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerpottM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich23,
  author       = {Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {126--129},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1729-5},
  doi          = {10.1007/S11623-023-1729-5},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gramlich23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich23a,
  author       = {Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {390--392},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1782-0},
  doi          = {10.1007/S11623-023-1782-0},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gramlich23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichG23,
  author       = {Ludwig Gramlich and
                  Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {256--260},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1755-3},
  doi          = {10.1007/S11623-023-1755-3},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichG23a,
  author       = {Ludwig Gramlich and
                  Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {465--468},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1798-5},
  doi          = {10.1007/S11623-023-1798-5},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichG23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grimm23,
  author       = {R{\"{u}}diger Grimm},
  title        = {K{\"{u}}nstliche Intelligenz {(KI)} zur Abwehr von Cyber-Angriffen
                  und Cyber-Angriffe auf {KI}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {197},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1743-7},
  doi          = {10.1007/S11623-023-1743-7},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Grimm23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GroothiusS23,
  author       = {Florian Groothius and
                  Olga Stepanova},
  title        = {Bu{\ss}geldpraxis der {CNIL} und der deutschen Aufsichtsbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {295--298},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1764-2},
  doi          = {10.1007/S11623-023-1764-2},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GroothiusS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gunay23,
  author       = {Buket G{\"{u}}nay},
  title        = {Biometrische Daten aus der Perspektive der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {96--99},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1724-x},
  doi          = {10.1007/S11623-023-1724-X},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gunay23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Halvani23,
  author       = {Oren Halvani},
  title        = {M{\"{o}}glichkeiten zur Erkennung von Hate Speech},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {209--214},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1747-3},
  doi          = {10.1007/S11623-023-1747-3},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Halvani23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HansenP23,
  author       = {Marit Hansen and
                  Thomas Probst},
  title        = {Souver{\"{a}}ne Sicherheit, Zero Trust und das Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {623--628},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1832-7},
  doi          = {10.1007/S11623-023-1832-7},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HansenP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HartmannKW23,
  author       = {Marcus Hartmann and
                  Tatiana Kulminskaya and
                  Monika Wojtowicz},
  title        = {Chief Data Officer: Bindeglied in der Organisation um den Wert von
                  Daten zu maximieren},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {446--449},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1795-8},
  doi          = {10.1007/S11623-023-1795-8},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HartmannKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HelmkeLS23,
  author       = {Jan Torben Helmke and
                  Hendrik Link and
                  Hans{-}Hermann Schild},
  title        = {Zertifizierungskriterien f{\"{u}}r Verarbeitungst{\"{a}}tigkeiten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {100--107},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1725-9},
  doi          = {10.1007/S11623-023-1725-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HelmkeLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HesselPTV23,
  author       = {Stefan Hessel and
                  Karin Potel and
                  Hendrik T{\"{o}}pper and
                  Lea Vietze},
  title        = {Datenschutz bei Hinweisgebersystemen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {440--445},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1794-9},
  doi          = {10.1007/S11623-023-1794-9},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HesselPTV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hummert23,
  author       = {Christian Hummert},
  title        = {Cyberagentur: Der besondere Weg zur digitalen Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {425--428},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1791-z},
  doi          = {10.1007/S11623-023-1791-Z},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hummert23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JassA0WWCFS23,
  author       = {Philipp Jass and
                  Hamzih Abukhashab and
                  Carsten Thomas and
                  Peter Woltersdorf and
                  Michael Weber and
                  Mirko Conrad and
                  Ines Fey and
                  Harald Sch{\"{u}}lzke},
  title        = {CertML: Initial Steps Towards Using N-Version Neural Networks for
                  Improving {AI} Safety},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {483--486},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1803-z},
  doi          = {10.1007/S11623-023-1803-Z},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JassA0WWCFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KarabogaFERF23,
  author       = {Murat Karaboga and
                  Nula Frei and
                  Frank Ebbers and
                  Sophia Rovelli and
                  Michael Friedewald},
  title        = {Emotions- und Krankheitserkennung mittels biometrischer Verfahren},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {553--559},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1817-6},
  doi          = {10.1007/S11623-023-1817-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KarabogaFERF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber23,
  author       = {Ulrich Kelber},
  title        = {Medizinische Forschung mit Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {6},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1706-4},
  doi          = {10.1007/S11623-022-1706-4},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber23a,
  author       = {Ulrich Kelber},
  title        = {Petersberger Erkl{\"{a}}rung zur datenschutzkonformen Verarbeitung
                  von Gesundheitsdaten in der wissenschaftlichen Forschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {42--45},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1714-4},
  doi          = {10.1007/S11623-022-1714-4},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KellerP23,
  author       = {Hubert B. Keller and
                  Erhard Pl{\"{o}}dereder},
  title        = {Sicherheit trotz {KI}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {469--470},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1799-4},
  doi          = {10.1007/S11623-023-1799-4},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KellerP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KellySV23,
  author       = {Una M. Kelly and
                  Luuk J. Spreeuwers and
                  Raymond N. J. Veldhuis},
  title        = {De-Identifikation von Gesichtsbildern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {27--30},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1711-7},
  doi          = {10.1007/S11623-022-1711-7},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KellySV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker23,
  author       = {Dennis{-}Kenji Kipker},
  title        = {Die Evolution des Cybersecurity-Rechts: Vom Kernkraftwerk bis zur
                  elektrischen Zahnb{\"{u}}rste},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {321},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1768-y},
  doi          = {10.1007/S11623-023-1768-Y},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerM23,
  author       = {Dennis{-}Kenji Kipker and
                  Sebastian Mayr},
  title        = {Zur Unabh{\"{a}}ngigkeit des {BSI}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {790--795},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1864-z},
  doi          = {10.1007/S11623-023-1864-Z},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klages23,
  author       = {Falko D. Klages},
  title        = {Konzernprivilegien in Compliance-Management-Systemen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {86--88},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1722-z},
  doi          = {10.1007/S11623-023-1722-Z},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Klages23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KleberW23,
  author       = {Stephan Kleber and
                  Patrick Wachter},
  title        = {A Strategy to Evaluate Test Time Evasion Attack Feasibility},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {478--482},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1802-0},
  doi          = {10.1007/S11623-023-1802-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KleberW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Knittl23,
  author       = {Silvia Knittl},
  title        = {Zero Trust: Die letzte Bastion f{\"{u}}r die IT-Sicherheit deutscher
                  Beh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {617--622},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1831-8},
  doi          = {10.1007/S11623-023-1831-8},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Knittl23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kohn23,
  author       = {Matthias Kohn},
  title        = {Automatisierte Analyse von Datenschutzerkl{\"{a}}rungen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {149--153},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1735-7},
  doi          = {10.1007/S11623-023-1735-7},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kohn23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kohpeiss23,
  author       = {Marcel Kohpei{\ss}},
  title        = {Verpflichtung zur intelligenten Angriffserkennung?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {220--224},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1749-1},
  doi          = {10.1007/S11623-023-1749-1},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kohpeiss23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kolberg23,
  author       = {Jascha Kolberg},
  title        = {Fairness von Biometrischen Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {15--21},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1709-1},
  doi          = {10.1007/S11623-022-1709-1},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kolberg23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KopmannHZ23,
  author       = {Samuel Kopmann and
                  Hauke Heseding and
                  Martina Zitterbart},
  title        = {Toward Joining DDoS Mitigation and Image Segmentation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {475--477},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1801-1},
  doi          = {10.1007/S11623-023-1801-1},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KopmannHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kreutziger23,
  author       = {Sascha Kreutziger},
  title        = {Datenschutz und Informationssicherheit - eng verzahnt mit einem {GRC}
                  Tool},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {420--424},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1790-0},
  doi          = {10.1007/S11623-023-1790-0},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kreutziger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kubis23,
  author       = {Marcel Kubis},
  title        = {Informationelle Selbstbestimmung bei datengetriebenen Gesch{\"{a}}ftsmodellen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {766--770},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1860-3},
  doi          = {10.1007/S11623-023-1860-3},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kubis23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann23,
  author       = {Dieter Kugelmann},
  title        = {Neue Inhalte zu {KI} und ChatGPT},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {202},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1745-5},
  doi          = {10.1007/S11623-023-1745-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KugelmannG23,
  author       = {Dieter Kugelmann and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {812--816},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1868-8},
  doi          = {10.1007/S11623-023-1868-8},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KugelmannG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingB23,
  author       = {J{\"{u}}rgen K{\"{u}}hling and
                  Benedikt Buchner},
  title        = {R{\"{u}}ckschlag f{\"{u}}r Meta beim EuGH},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {519--520},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1809-6},
  doi          = {10.1007/S11623-023-1809-6},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KuhlingB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingB23a,
  author       = {J{\"{u}}rgen K{\"{u}}hling and
                  Benedikt Buchner},
  title        = {Daten gegen Leistung - auf dem Weg zu einer Kommerzialisierungsfairness?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {745},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1857-y},
  doi          = {10.1007/S11623-023-1857-Y},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KuhlingB23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingS23,
  author       = {J{\"{u}}rgen K{\"{u}}hling and
                  Paul M. Schwartz},
  title        = {Daten gegen Leistung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {749--755},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1854-1},
  doi          = {10.1007/S11623-023-1854-1},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KuhlingS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LoberR23,
  author       = {Lena Isabell L{\"{o}}ber and
                  Alexander Ro{\ss}nagel},
  title        = {Konkretisierung von Privacy by Design durch Anforderungs- und Entwurfsmuster},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {137--143},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1733-9},
  doi          = {10.1007/S11623-023-1733-9},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LoberR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierR23,
  author       = {Anatol Maier and
                  Christian Riess},
  title        = {Zuverl{\"{a}}ssigkeit von {KI} in der Multimedia-Forensik},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {215--219},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1748-2},
  doi          = {10.1007/S11623-023-1748-2},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MaierR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MakrushinD23,
  author       = {Andrey Makrushin and
                  Jana Dittmann},
  title        = {Synthetische Daten in der Biometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {22--26},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1710-8},
  doi          = {10.1007/S11623-022-1710-8},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MakrushinD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Maseberg23,
  author       = {S{\"{o}}nke Maseberg},
  title        = {KRITIS-Regularien},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {541--544},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1814-9},
  doi          = {10.1007/S11623-023-1814-9},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Maseberg23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester23,
  author       = {Britta Alexandra Mester},
  title        = {Konzerndatenverarbeitung als Herausforderung f{\"{u}}r den Datenschutz},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {65},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1717-9},
  doi          = {10.1007/S11623-023-1717-9},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mester23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester23a,
  author       = {Britta Alexandra Mester},
  title        = {Datenschutz in Krisenzeiten - Konvergenz nutzen!},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {537},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1812-y},
  doi          = {10.1007/S11623-023-1812-Y},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MesterO23,
  author       = {Britta Alexandra Mester and
                  Ebru {\"{O}}zt{\"{u}}rk},
  title        = {Joint Controllership im Unternehmensverbund},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {73--80},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1720-1},
  doi          = {10.1007/S11623-023-1720-1},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MesterO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Milde23,
  author       = {Thomas Milde},
  title        = {Macht Zero Trust wirklich sicher?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {641--647},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1836-3},
  doi          = {10.1007/S11623-023-1836-3},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Milde23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MullmannVV23,
  author       = {Dirk M{\"{u}}llmann and
                  Maxime Veit and
                  Melanie Volkamer},
  title        = {Weiterleitungs-URLs in E-Mails},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {275--282},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1761-5},
  doi          = {10.1007/S11623-023-1761-5},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MullmannVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NaakeS23,
  author       = {Lutz Naake and
                  Denise Semmler},
  title        = {ISMS-Pr{\"{u}}fung f{\"{u}}r KRITIS-Betreiber},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {406--409},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1787-8},
  doi          = {10.1007/S11623-023-1787-8},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/NaakeS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OldemeyerT23,
  author       = {Klaus Oldemeyer and
                  Marie{-}Theres Tinnefeld},
  title        = {Antisemitismus: Krisen und Ver{\"{a}}nderungen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {108--109},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1726-8},
  doi          = {10.1007/S11623-023-1726-8},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/OldemeyerT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Orak23,
  author       = {Berna Orak},
  title        = {Eine Digitalisierungsstrategie ab initio zum Scheitern verurteilt?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {571--573},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1820-y},
  doi          = {10.1007/S11623-023-1820-Y},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Orak23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollithy23,
  author       = {Alexander Pollithy},
  title        = {Die Zul{\"{a}}ssigkeit automatisierten Spielerscoutings im Leistungssport
                  nach Ma{\ss}gabe des Art. 22 {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {776--780},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1861-2},
  doi          = {10.1007/S11623-023-1861-2},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pollithy23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rathgeb23,
  author       = {Christian Rathgeb},
  title        = {Biometrie - eine Frage des Vertrauens?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1704-6},
  doi          = {10.1007/S11623-022-1704-6},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rathgeb23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RathgebMTNK23,
  author       = {Christian Rathgeb and
                  Johannes Merkle and
                  Benjamin Tams and
                  Matthias Neu and
                  Ulrike Korte},
  title        = {Multi-biometrische Kryptosysteme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {31--36},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1712-6},
  doi          = {10.1007/S11623-022-1712-6},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RathgebMTNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RehbohmK23,
  author       = {Thomas Rehbohm and
                  Peter Lutz Kalmbach},
  title        = {Herausforderungen der f{\"{o}}deralen Cybersicherheit vs. {\"{A}}nderung
                  in der Bund-L{\"{a}}nder Gewaltenteilung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {338--342},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1772-2},
  doi          = {10.1007/S11623-023-1772-2},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RehbohmK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RehbohmM23,
  author       = {Thomas Rehbohm and
                  Frank Moses},
  title        = {F{\"{o}}derale Cybersicherheitsarchitektur und Informationssicherheitsmanagement
                  im Kontext der NIS-2-Richtlinie},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {648--655},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1837-2},
  doi          = {10.1007/S11623-023-1837-2},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RehbohmM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reich23,
  author       = {Lara Reich},
  title        = {Social Media Accounts nach dem Erbfall},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {781--784},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1862-1},
  doi          = {10.1007/S11623-023-1862-1},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reich23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer23,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {119--126},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1728-6},
  doi          = {10.1007/S11623-023-1728-6},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer23a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {383--390},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1781-1},
  doi          = {10.1007/S11623-023-1781-1},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer23b,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {527--536},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1811-z},
  doi          = {10.1007/S11623-023-1811-Z},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer23c,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {667--676},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1840-7},
  doi          = {10.1007/S11623-023-1840-7},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW23,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {Digitalisierung: Der lange Weg von der Idee zur marktf{\"{a}}higen
                  L{\"{o}}sung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {656},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1838-1},
  doi          = {10.1007/S11623-023-1838-1},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rockstroh23,
  author       = {Sebastian Rockstroh},
  title        = {EU-Cybersicherheitsrecht f{\"{u}}r Produkte},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {332--337},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1771-3},
  doi          = {10.1007/S11623-023-1771-3},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rockstroh23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel23,
  author       = {Alexander Ro{\ss}nagel},
  title        = {F{\"{u}}nf Jahre Datenschutz-Grundverordnung - gemischte Bilanz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {474},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1800-2},
  doi          = {10.1007/S11623-023-1800-2},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelWH23,
  author       = {Alexander Ro{\ss}nagel and
                  Stephanie Wetzstein and
                  Katja Horlbeck},
  title        = {Unionsrechtliche Vorgaben f{\"{u}}r das Recht des Besch{\"{a}}ftigtendatenschutzes},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {429--434},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1792-y},
  doi          = {10.1007/S11623-023-1792-Y},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RossnagelWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchenkelM23,
  author       = {Johanna Schenkel and
                  Christian Mainka},
  title        = {Die Financial-grade {API} {(FAPI)}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {154--159},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1736-6},
  doi          = {10.1007/S11623-023-1736-6},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchenkelM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schiek23,
  author       = {Lennart Schiek},
  title        = {Schadensersatz ohne Schaden nach der DSGVO?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {144--148},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1734-8},
  doi          = {10.1007/S11623-023-1734-8},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schiek23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schild23,
  author       = {Hans{-}Hermann Schild},
  title        = {Unterlassungsanspruch nach der DS-GVO?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {513--518},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1808-7},
  doi          = {10.1007/S11623-023-1808-7},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schild23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schild23a,
  author       = {Hans{-}Hermann Schild},
  title        = {Durchsetzung der {DSGVO} bei grenz{\"{u}}berschreitenden Datenschutzbeschwerden},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {565--570},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1819-4},
  doi          = {10.1007/S11623-023-1819-4},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schild23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchildC23,
  author       = {Hans{-}Hermann Schild and
                  Conrad Sebastian Conrad},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {315--320},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1767-z},
  doi          = {10.1007/S11623-023-1767-Z},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchildC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlegel23,
  author       = {Daniela Schlegel},
  title        = {Das Recht auf L{\"{o}}schen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {560--564},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1818-5},
  doi          = {10.1007/S11623-023-1818-5},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schlegel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmidS23,
  author       = {Christian Schmid and
                  Cajetan Sp{\"{a}}th},
  title        = {Zur Monetarisierbarkeit der (weniger personalisierten, aber) gleichwertigen
                  Alternative},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {771--775},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1856-z},
  doi          = {10.1007/S11623-023-1856-Z},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchmidS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schuster23,
  author       = {Felix Schuster},
  title        = {Confidential Computing},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {638--640},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1835-4},
  doi          = {10.1007/S11623-023-1835-4},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schuster23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schwichtenberg23,
  author       = {Simon Schwichtenberg},
  title        = {Die {\"{U}}berwachungsgesellschaft und die Selbstbelastungsfreiheit},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {372--375},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1779-8},
  doi          = {10.1007/S11623-023-1779-8},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schwichtenberg23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seiter23,
  author       = {Stefan R. Seiter},
  title        = {Die Auftragsverarbeitung im Konzerngebilde},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {81--85},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1721-0},
  doi          = {10.1007/S11623-023-1721-0},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Seiter23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerDB23,
  author       = {Annika Selzer and
                  Indra Spiecker genannt D{\"{o}}hmann and
                  Alina Boll},
  title        = {Datenschutzvorsorge in der offensiven Cybersicherheitsforschung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {785--789},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1863-0},
  doi          = {10.1007/S11623-023-1863-0},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SelzerDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ShulmanW23,
  author       = {Haya Schulmann and
                  Michael Waidner},
  title        = {Aktive Cyberabwehr},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {497--502},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1806-9},
  doi          = {10.1007/S11623-023-1806-9},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ShulmanW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Speichert23,
  author       = {Horst Speichert},
  title        = {DSGVO-Haftungs- und Sicherheitsrisiken durch Protokoll- und Diagnosedaten
                  im IT-Betrieb},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {229--232},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1751-7},
  doi          = {10.1007/S11623-023-1751-7},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Speichert23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/StadlerS23,
  author       = {Tobias Stadler and
                  Michaela Schmitz},
  title        = {Datenschutzrechtliche Verantwortlichkeit bei Videokonferenzdiensten},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {435--439},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1793-x},
  doi          = {10.1007/S11623-023-1793-X},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/StadlerS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steinebach23,
  author       = {Martin Steinebach},
  title        = {Erkennung von Kindesmissbrauch in Medien},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {225--228},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1750-8},
  doi          = {10.1007/S11623-023-1750-8},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Steinebach23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Strobel23,
  author       = {Stefan Strobel},
  title        = {Zero Trust},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {629--632},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1833-6},
  doi          = {10.1007/S11623-023-1833-6},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Strobel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/StroblK23,
  author       = {Bernhard Strobl and
                  Bernhard Kohn},
  title        = {Kontaktlose Fingerprintaufnahme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {7--10},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1707-3},
  doi          = {10.1007/S11623-022-1707-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/StroblK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stummer23,
  author       = {Sarah Stummer},
  title        = {Personenbezogenheit vs. Anonymit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {354--360},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1776-y},
  doi          = {10.1007/S11623-023-1776-Y},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stummer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Thiel23,
  author       = {Barbara Thiel},
  title        = {Pr{\"{u}}fung von Medienwebseiten in Niedersachsen abgeschlossen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {608},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1828-3},
  doi          = {10.1007/S11623-023-1828-3},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Thiel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld23,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Pers{\"{o}}nlichkeitsrechte im Schatten des Todes},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {796--797},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1865-y},
  doi          = {10.1007/S11623-023-1865-Y},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldP23,
  author       = {Marie{-}Theres Tinnefeld and
                  Thomas Petri},
  title        = {Nachruf: Spiros Simitis},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {267},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1758-0},
  doi          = {10.1007/S11623-023-1758-0},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ullrich23,
  author       = {Steffen Ullrich},
  title        = {{ISMS} und Digitale Nachhaltigkeit},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {397--400},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1785-x},
  doi          = {10.1007/S11623-023-1785-X},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ullrich23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ullrich23a,
  author       = {Steffen Ullrich},
  title        = {Zero Trust im Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {613--616},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1830-9},
  doi          = {10.1007/S11623-023-1830-9},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ullrich23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener23,
  author       = {Christoph Wegener},
  title        = {(Kein) Vertrauen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {10},
  pages        = {605},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1827-4},
  doi          = {10.1007/S11623-023-1827-4},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeissmannL23,
  author       = {Paul Weissmann and
                  Hanna Lurz},
  title        = {Das {ISMS} als Herzst{\"{u}}ck des KRITIS-Betreibers},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {401--405},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1786-9},
  doi          = {10.1007/S11623-023-1786-9},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WeissmannL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WiewiorowskiL23,
  author       = {Wojciech Wiewi{\'{o}}rowski and
                  Juhan Lepassaar},
  title        = {Pairing up Cybersecurity and Data Protection efforts: {EDPS} and {ENISA}
                  sign Memorandum of Understanding},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {2},
  pages        = {68},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1718-8},
  doi          = {10.1007/S11623-023-1718-8},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WiewiorowskiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WilmsTNB23,
  author       = {Leo Wilms and
                  Arndt von Twickel and
                  Matthias Neu and
                  Christian Berghoff},
  title        = {Quantifying Attribution-based Explainable {AI} for Robustness Evaluations},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {8},
  pages        = {492--496},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1805-x},
  doi          = {10.1007/S11623-023-1805-X},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WilmsTNB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wolff23,
  author       = {Daniel Wolff},
  title        = {KI-Biases im Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {37--41},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1713-5},
  doi          = {10.1007/S11623-022-1713-5},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wolff23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23,
  title        = {Nachhaltige Cybersecurity?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1705-5},
  doi          = {10.1007/S11623-022-1705-5},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23a,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {46--54},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1715-3},
  doi          = {10.1007/S11623-022-1715-3},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23aa,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {798--805},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1866-x},
  doi          = {10.1007/S11623-023-1866-X},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X23aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23ab,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {806--812},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1867-9},
  doi          = {10.1007/S11623-023-1867-9},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X23ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23b,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {47},
  number       = {1},
  pages        = {55--64},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-022-1716-2},
  doi          = {10.1007/S11623-022-1716-2},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23c,
  title        = {App {\"{U}}berwachung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {129},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1730-z},
  doi          = {10.1007/S11623-023-1730-Z},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23d,
  title        = {Cybersecurity: Gemeinsam sind wir stark?},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {133--134},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1731-y},
  doi          = {10.1007/S11623-023-1731-Y},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23e,
  title        = {2023: Vorsitz in {DSK} und {IFK}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {135--136},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1732-x},
  doi          = {10.1007/S11623-023-1732-X},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23f,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {173--185},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1740-x},
  doi          = {10.1007/S11623-023-1740-X},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23g,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {3},
  pages        = {186--196},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1741-9},
  doi          = {10.1007/S11623-023-1741-9},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23h,
  title        = {{OZG} - Gesetzgebung in Not},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {201},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1744-6},
  doi          = {10.1007/S11623-023-1744-6},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23i,
  title        = {Beschl{\"{u}}sse der Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden
                  des Bundes und der L{\"{a}}nder},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {233--237},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1752-6},
  doi          = {10.1007/S11623-023-1752-6},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23j,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {238--248},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1753-5},
  doi          = {10.1007/S11623-023-1753-5},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23k,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {4},
  pages        = {249--256},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1754-4},
  doi          = {10.1007/S11623-023-1754-4},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23l,
  title        = {Buhmann {DSGVO}},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {261},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1756-2},
  doi          = {10.1007/S11623-023-1756-2},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23m,
  title        = {Informationelle Selbstbestimmung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {265--266},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1757-1},
  doi          = {10.1007/S11623-023-1757-1},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23n,
  title        = {{EDSA:} Stellungnahme zum Entwurf des Angemessenheitsbeschlusses zum
                  {EU} - {US} Data Privacy Framework},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {268},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1759-z},
  doi          = {10.1007/S11623-023-1759-Z},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23o,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {299--305},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1765-1},
  doi          = {10.1007/S11623-023-1765-1},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23p,
  title        = {DuD-Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {5},
  pages        = {306--314},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1766-0},
  doi          = {10.1007/S11623-023-1766-0},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23q,
  title        = {Nutzung von Gesundheitsdaten braucht Vertrauen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {6},
  pages        = {325--326},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1769-x},
  doi          = {10.1007/S11623-023-1769-X},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23r,
  title        = {105. Tagung der Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden
                  am 10. / 11 Mai 2023},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {396},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1784-y},
  doi          = {10.1007/S11623-023-1784-Y},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23s,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {450--457},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1796-7},
  doi          = {10.1007/S11623-023-1796-7},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23t,
  title        = {DuD-Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {7},
  pages        = {458--465},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1797-6},
  doi          = {10.1007/S11623-023-1797-6},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23u,
  title        = {Umgang mit Identit{\"{a}}tsdiebstahl - Erkennen, Reagieren, Vorbeugen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {540},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1813-x},
  doi          = {10.1007/S11623-023-1813-X},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23v,
  title        = {Gef{\"{a}}hrdung Kritischer Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {578},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1822-9},
  doi          = {10.1007/S11623-023-1822-9},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23w,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {579--591},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1823-8},
  doi          = {10.1007/S11623-023-1823-8},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23x,
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {592--600},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1824-7},
  doi          = {10.1007/S11623-023-1824-7},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23y,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {9},
  pages        = {601--604},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1825-6},
  doi          = {10.1007/S11623-023-1825-6},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X23y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X23z,
  title        = {Geplante Chatkontrolle f{\"{u}}hrt zu einer unverh{\"{a}}ltnism{\"{a}}{\ss}igen,
                  anlasslosen Massen{\"{u}}berwachung},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {47},
  number       = {12},
  pages        = {748},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11623-023-1858-x},
  doi          = {10.1007/S11623-023-1858-X},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X23z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AhrensH22,
  author       = {Maximilian Ahrens and
                  Wieland Holfelder},
  title        = {Innovative souver{\"{a}}ne Cloud-L{\"{o}}sungen durch integrierte
                  Transparenz- und Kontrollmechanismen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {627--631},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1671-y},
  doi          = {10.1007/S11623-022-1671-Y},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AhrensH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AndresenD22,
  author       = {S{\"{u}}nje Andresen and
                  Stephan Dreyer},
  title        = {Die Rolle der Eltern bei der datenschutzrechtlichen Einwilligung f{\"{u}}r
                  ihre Kinder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {361--366},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1620-9},
  doi          = {10.1007/S11623-022-1620-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AndresenD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Aretz22,
  author       = {Christian Aretz},
  title        = {Der Souver{\"{a}}n in der Krise},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {40--44},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1558-y},
  doi          = {10.1007/S11623-022-1558-Y},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Aretz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BerningerR22,
  author       = {Marc Berninger and
                  Bastian Raunecker},
  title        = {Kapitalmarktseitige Konsequenzen von Rechtsverst{\"{o}}{\ss}en
                  gegen die {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {164--173},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1582-y},
  doi          = {10.1007/S11623-022-1582-Y},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BerningerR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BessantS22,
  author       = {Claire Bessant and
                  Maximilian Schnebbe},
  title        = {Does the {GDPR} offer a solution to the 'problem' of sharenting?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {352--356},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1618-3},
  doi          = {10.1007/S11623-022-1618-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BessantS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brozio22,
  author       = {Volker Brozio},
  title        = {Interessenkonflikt des betrieblichen Datenschutzbeauftragten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {684},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1682-8},
  doi          = {10.1007/S11623-022-1682-8},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Brozio22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BruhnRWZ22,
  author       = {Jens Bruhn and
                  Alexander Ro{\ss}nagel and
                  Rouven Wachhaus and
                  Volker Zimmer},
  title        = {Datenschutz{\"{u}}berpr{\"{u}}fungen im IT-Labor von Aufsichtsbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {685--689},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1683-7},
  doi          = {10.1007/S11623-022-1683-7},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BruhnRWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {243--252},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1597-4},
  doi          = {10.1007/S11623-022-1597-4},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22a,
  author       = {Benedikt Buchner},
  title        = {Kinder im Netz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {333},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1613-8},
  doi          = {10.1007/S11623-022-1613-8},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22b,
  author       = {Benedikt Buchner},
  title        = {Forschungsdaten effektiver nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {555--560},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1658-8},
  doi          = {10.1007/S11623-022-1658-8},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22c,
  author       = {Benedikt Buchner},
  title        = {Digital Health},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {729},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1693-5},
  doi          = {10.1007/S11623-022-1693-5},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BurgdorfJ22,
  author       = {Milan Burgdorf and
                  Kai Jendria},
  title        = {{ISO} 27002 revisited},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {301--304},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1607-6},
  doi          = {10.1007/S11623-022-1607-6},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BurgdorfJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BurgfriedR22,
  author       = {Matthias Burgfried and
                  Andreas Reckert{-}Lodde},
  title        = {Die Deutsche Verwaltungscloud-Strategie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {611--615},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1668-6},
  doi          = {10.1007/S11623-022-1668-6},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BurgfriedR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Caspers22,
  author       = {Thomas Caspers},
  title        = {Souver{\"{a}}ne Clouds f{\"{u}}r den {\"{o}}ffentlichen
                  Sektor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {601},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1665-9},
  doi          = {10.1007/S11623-022-1665-9},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Caspers22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CejvanovicDHS22,
  author       = {Jasmina Cejvanovic and
                  Ann{-}Kristin Derst and
                  Maik Horz and
                  Steffen Schwalm},
  title        = {Rechtssicheres ersetzendes Scannen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {432--438},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1634-3},
  doi          = {10.1007/S11623-022-1634-3},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CejvanovicDHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterP22,
  author       = {Ulla Coester and
                  Norbert Pohlmann},
  title        = {Vertrauensw{\"{u}}rdigkeit schafft Vertrauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {233--238},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1594-7},
  doi          = {10.1007/S11623-022-1594-7},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CoesterP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dochow22,
  author       = {Carsten Dochow},
  title        = {Opt-ionen f{\"{u}}r die elektronische Patientenakte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {747--755},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1697-1},
  doi          = {10.1007/S11623-022-1697-1},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dochow22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DoubravaS22,
  author       = {Clemens Doubrava and
                  Vera Sikes},
  title        = {Cloud-Paradigma in der {\"{o}}ffentlichen Verwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {605--610},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1667-7},
  doi          = {10.1007/S11623-022-1667-7},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DoubravaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurmusES22,
  author       = {Erdem Durmus and
                  Jens Engelhardt and
                  Annika Selzer},
  title        = {Kontrollen bei Auftragsverarbeitern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {487--492},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1645-0},
  doi          = {10.1007/S11623-022-1645-0},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DurmusES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dyroff22,
  author       = {Daniel Dyroff},
  title        = {Lebenszyklusmanagement von digitalen Zertifikaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {225--226},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1592-9},
  doi          = {10.1007/S11623-022-1592-9},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dyroff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EinzingerRF22,
  author       = {Christoph Einzinger and
                  Christian R{\"{u}}ckert and
                  Felix C. Freiling},
  title        = {Datenminimierung in der Netzwerkforensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {149--155},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1580-0},
  doi          = {10.1007/S11623-022-1580-0},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EntschewHBN22,
  author       = {Enrico Entschew and
                  Kirk Hall and
                  Chris Bailey and
                  Kim Nguyen},
  title        = {A New eIDAS Beginning for QWACs},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {217--224},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1591-x},
  doi          = {10.1007/S11623-022-1591-X},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EntschewHBN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber22,
  author       = {Eberhard von Faber},
  title        = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {45--51},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1559-x},
  doi          = {10.1007/S11623-022-1559-X},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Faber22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber22a,
  author       = {Eberhard von Faber},
  title        = {Zw{\"{o}}lf Prinzipien f{\"{u}}r systematische IT-Service-Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {703--706},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1687-3},
  doi          = {10.1007/S11623-022-1687-3},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Faber22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FeldmannS22,
  author       = {Marius Feldmann and
                  Matthias Sutter},
  title        = {Open-Source-L{\"{o}}sungen zur Automatisierung des Deployments
                  und Betriebs von Clouds},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {637--639},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1673-9},
  doi          = {10.1007/S11623-022-1673-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FeldmannS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerG22,
  author       = {Arno Fiedler and
                  Franziska Granc},
  title        = {Nationale und europ{\"{a}}ische Sicht auf eIDAS 2.0 - Aufwand
                  und Nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {27--31},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1556-0},
  doi          = {10.1007/S11623-022-1556-0},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerGN22,
  author       = {Arno Fiedler and
                  Ernst{-}G{\"{u}}nter Giessmann and
                  Kim Nguyen},
  title        = {Die Bedeutung von {PKI} - Gestern, Heute und Morgen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {209--214},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1589-4},
  doi          = {10.1007/S11623-022-1589-4},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerGN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Folkerts22,
  author       = {Elena Folkerts},
  title        = {Wirklich freiwillig?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {77--80},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1565-z},
  doi          = {10.1007/S11623-022-1565-Z},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Folkerts22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22,
  author       = {Dirk Fox},
  title        = {Pr{\"{u}}fstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {133},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1576-9},
  doi          = {10.1007/S11623-022-1576-9},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22a,
  author       = {Dirk Fox},
  title        = {Zero Trust},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {174--175},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1583-x},
  doi          = {10.1007/S11623-022-1583-X},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22b,
  author       = {Dirk Fox},
  title        = {Warnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {265},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1600-0},
  doi          = {10.1007/S11623-022-1600-0},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22c,
  author       = {Dirk Fox},
  title        = {Das Prinzip Verantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {681},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1681-9},
  doi          = {10.1007/S11623-022-1681-9},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Freye22,
  author       = {Merle Freye},
  title        = {Die Datenschutzerkl{\"{a}}rungen von Gesundheits-Apps},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {762--766},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1698-0},
  doi          = {10.1007/S11623-022-1698-0},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Freye22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FriedewaldRBGHB22,
  author       = {Michael Friedewald and
                  Alexander Ro{\ss}nagel and
                  Tamer Bile and
                  Christian L. Geminn and
                  Marit Hansen and
                  Felix Bieker and
                  Murat Karaboga},
  title        = {Zur Einf{\"{u}}hrung einer {\"{U}}berwachungs-Gesamtrechnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {572--577},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1661-0},
  doi          = {10.1007/S11623-022-1661-0},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FriedewaldRBGHB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gassner22,
  author       = {Ulrich M. Gassner},
  title        = {Forschung und Innovation im europ{\"{a}}ischen Gesundheitsdatenraum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {739--746},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1696-2},
  doi          = {10.1007/S11623-022-1696-2},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gassner22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeisslerPSW22,
  author       = {Ines Geissler and
                  Ulrich Pordesch and
                  Annika Selzer and
                  Thomas Wilmer},
  title        = {Auswahl cloudbasierter Dienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {690--694},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1684-6},
  doi          = {10.1007/S11623-022-1684-6},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GeisslerPSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeminnT22,
  author       = {Christian Geminn and
                  Marie{-}Theres Tinnefeld},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {327--332},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1612-9},
  doi          = {10.1007/S11623-022-1612-9},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GeminnT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Glemser22,
  author       = {Tobias Glemser},
  title        = {{OWASP} Top 10},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {695--698},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1685-5},
  doi          = {10.1007/S11623-022-1685-5},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Glemser22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gotz22,
  author       = {Isabell G{\"{o}}tz},
  title        = {Lach' doch mal!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {357--360},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1619-2},
  doi          = {10.1007/S11623-022-1619-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gotz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich22,
  author       = {Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {261--264},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1599-2},
  doi          = {10.1007/S11623-022-1599-2},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gramlich22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP22,
  author       = {Ludwig Gramlich and
                  Ronald Petrlic},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {532--536},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1653-0},
  doi          = {10.1007/S11623-022-1653-0},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GreteK22,
  author       = {Patrick Grete and
                  Carsten Kestermann},
  title        = {Cloud Computing im Spannungsfeld von Souver{\"{a}}nit{\"{a}}t,
                  Cybersicherheit und {\"{O}}konomie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {632--636},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1672-x},
  doi          = {10.1007/S11623-022-1672-X},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GreteK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GruberF22,
  author       = {Jan Gruber and
                  Felix C. Freiling},
  title        = {Fighting Evasive Malware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {284--290},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1604-9},
  doi          = {10.1007/S11623-022-1604-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GruberF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HamacherKLBHSMW22,
  author       = {Kay Hamacher and
                  Tobias Kussel and
                  Tatiana von Landesberger and
                  Tom Baumgartl and
                  Markus H{\"{o}}hn and
                  Simone Scheithauer and
                  Michael Marschollek and
                  Antje Wulff},
  title        = {Fallzahlen, Re-Identifikation und der technische Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {143--148},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1579-6},
  doi          = {10.1007/S11623-022-1579-6},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HamacherKLBHSMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22,
  author       = {Marit Hansen},
  title        = {{ULD:} 40. T{\"{a}}tigkeitsbericht 2021},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {268},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1601-z},
  doi          = {10.1007/S11623-022-1601-Z},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22a,
  author       = {Marit Hansen},
  title        = {Deutschlands Plan zur St{\"{a}}rkung der B{\"{u}}rgerrechte
                  im digitalen Raum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {550--554},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1657-9},
  doi          = {10.1007/S11623-022-1657-9},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22b,
  author       = {Marit Hansen},
  title        = {E-Rezept-Verfahren: maschinenlesbare Codes sch{\"{u}}tzen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {604},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1666-8},
  doi          = {10.1007/S11623-022-1666-8},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HillebrandSP22,
  author       = {Annette Hillebrand and
                  Jana Stuck and
                  Pirmin Puhl},
  title        = {Vertrauen in Datenverarbeitung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {493--498},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1646-z},
  doi          = {10.1007/S11623-022-1646-Z},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HillebrandSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hofmann22,
  author       = {Sebastian Hofmann},
  title        = {Forschungsklausel statt Broad Consent},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {756--761},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1691-7},
  doi          = {10.1007/S11623-022-1691-7},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Hofmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Horlbeck22,
  author       = {Katja Horlbeck},
  title        = {Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {567--571},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1660-1},
  doi          = {10.1007/S11623-022-1660-1},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Horlbeck22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hornung22,
  author       = {Gerrit Hornung},
  title        = {KI-Regulierung im Mehrebenensystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {561--566},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1659-7},
  doi          = {10.1007/S11623-022-1659-7},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hornung22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HornungSSZ22,
  author       = {Gerrit Hornung and
                  Matthias S{\"{o}}llner and
                  Jan{-}Philipp Stroscher and
                  Eva{-}Maria Zahn},
  title        = {Kollaboration im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {384--389},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1625-4},
  doi          = {10.1007/S11623-022-1625-4},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HornungSSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoeB22,
  author       = {Alicia Joe and
                  Benedikt Buchner},
  title        = {Kinder als digitales Freiwild},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {381--383},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1624-5},
  doi          = {10.1007/S11623-022-1624-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JoeB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JohnR22,
  author       = {Nicolas John and
                  Justin Rennert},
  title        = {Cookieless Tracking: Neue M{\"{o}}glichkeiten unter dem TTDSG?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {643--648},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1675-7},
  doi          = {10.1007/S11623-022-1675-7},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JohnR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Joos22,
  author       = {Harald Joos},
  title        = {Hochskalierbares Cloud Computing mit nationalen Hyperscalern f{\"{u}}r
                  die Verwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {699--702},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1686-4},
  doi          = {10.1007/S11623-022-1686-4},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Joos22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoosM22,
  author       = {Daniel Joos and
                  Kristof Meding},
  title        = {Anforderungen bei der Einf{\"{u}}hrung und Entwicklung von {KI}
                  zur Gew{\"{a}}hrleistung von Fairness und Diskriminierungsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {376--380},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1623-6},
  doi          = {10.1007/S11623-022-1623-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JoosM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoosN22,
  author       = {Daniel Joos and
                  Peter N{\"{a}}gele},
  title        = {Verarbeitung personenbezogener Echtdaten zur Netz- und Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {578--583},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1662-z},
  doi          = {10.1007/S11623-022-1662-Z},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JoosN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22,
  author       = {Ulrich Kelber},
  title        = {Die {DSK} st{\"{a}}rkt die informationelle Selbstbestimmung und
                  der {EDSA} gibt den Betroffenenrechten der {DSGVO} einen verbindlichen
                  Rahmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {136},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1577-8},
  doi          = {10.1007/S11623-022-1577-8},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22a,
  author       = {Ulrich Kelber},
  title        = {Koordinierte Durchsetzung durch 22 Aufsichtsbeh{\"{o}}rden zur
                  Nutzung von Cloud-Diensten durch den {\"{o}}ffentlichen Sektor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {200},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1587-6},
  doi          = {10.1007/S11623-022-1587-6},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22b,
  author       = {Ulrich Kelber},
  title        = {Mastodon: Datenschutzfreundliche Twitter-Alternative},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {412},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1630-7},
  doi          = {10.1007/S11623-022-1630-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koch22,
  author       = {Manuel Koch},
  title        = {Telematikinfrastruktur 2.0 - Verhindern von missbr{\"{a}}uchlicher
                  Profilbildung durch {PET}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {427--431},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1633-4},
  doi          = {10.1007/S11623-022-1633-4},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Koch22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KronkeT22,
  author       = {Christoph Kr{\"{o}}nke and
                  Elissa Tschachler},
  title        = {Ein Opt-out f{\"{u}}r die elektronische Patientenakte (ePA)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {419--426},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1632-5},
  doi          = {10.1007/S11623-022-1632-5},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KronkeT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kudra22,
  author       = {Andre Kudra},
  title        = {Self-Sovereign Identity {(SSI)} in Deutschland},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {22--26},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1555-1},
  doi          = {10.1007/S11623-022-1555-1},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kudra22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KudraSS22,
  author       = {Andre Kudra and
                  Christian Seegebarth and
                  Steffen Schwalm},
  title        = {Ein digitaler Vertrauensraum f{\"{u}}r Identit{\"{a}}ten
                  und Dienste - Europa ist auf dem richtigen Weg},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {9--11},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1552-4},
  doi          = {10.1007/S11623-022-1552-4},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KudraSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KunzW22,
  author       = {Thomas Kunz and
                  Ulrich Waldmann},
  title        = {ML-basierte Unterst{\"{u}}tzung von L{\"{o}}sch- und Aufbewahrungspflichten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {649--653},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1676-6},
  doi          = {10.1007/S11623-022-1676-6},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KunzW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KusberSKE22,
  author       = {Tomasz Kusber and
                  Steffen Schwalm and
                  Ulrike Korte and
                  Mario Engel},
  title        = {Langfristige Beweissicherheit und Vertrauensw{\"{u}}rdigkeit
                  digitaler Unterlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {32--39},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1557-z},
  doi          = {10.1007/S11623-022-1557-Z},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KusberSKE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutscher22,
  author       = {Nadia Kutscher},
  title        = {Sharenting als familialer Alltag},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {346--351},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1617-4},
  doi          = {10.1007/S11623-022-1617-4},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kutscher22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LangK22,
  author       = {Simon Lang and
                  Ralf Kneuper},
  title        = {Datenschutz und Informationssicherheit in Gaia-X},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {778--781},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1692-6},
  doi          = {10.1007/S11623-022-1692-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LangK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LefferW22,
  author       = {Lena Leffer and
                  Michelle Weber},
  title        = {Technische und strafrechtliche Implikationen des unbemerkten Einsatzes
                  von AirTags},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {137--142},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1578-7},
  doi          = {10.1007/S11623-022-1578-7},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LefferW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LehrDKV22,
  author       = {Franz Lehr and
                  Heike Dietmann and
                  Chiara Krisam and
                  Melanie Volkamer},
  title        = {Manipulative Designs von Cookies},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {296--300},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1606-7},
  doi          = {10.1007/S11623-022-1606-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LehrDKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeichtH22,
  author       = {Maximilian Leicht and
                  Stefan Hessel},
  title        = {Datenschutzrechtliche Verantwortlichkeit in der Forschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {305--309},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1608-5},
  doi          = {10.1007/S11623-022-1608-5},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LeichtH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Liptak22,
  author       = {Patrick Liptak},
  title        = {Ein neuer Rahmen f{\"{u}}r eine europ{\"{a}}ische digitale
                  Identit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {18--21},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1554-2},
  doi          = {10.1007/S11623-022-1554-2},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Liptak22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester22,
  author       = {Britta Alexandra Mester},
  title        = {Besch{\"{a}}ftigtendatenschutz - Digitale Arbeitswelten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {73},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1563-1},
  doi          = {10.1007/S11623-022-1563-1},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mester22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mollik22,
  author       = {Mirko Mollik},
  title        = {Blockchain als sicheres Register},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {201--208},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1588-5},
  doi          = {10.1007/S11623-022-1588-5},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mollik22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MosesS22,
  author       = {Frank Moses and
                  Kurt Sandkuhl},
  title        = {Mit {CISIS12} ein {ISMS} aufbauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {654--659},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1677-5},
  doi          = {10.1007/S11623-022-1677-5},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MosesS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MullerRWWH22,
  author       = {Robin M{\"{u}}ller and
                  Julius Ruppert and
                  Katharina Will and
                  Lukas W{\"{u}}steney and
                  Tobias Heer},
  title        = {Analyzing the Software Patch Discipline Across Different Industries
                  and Countries},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {269--275},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1602-y},
  doi          = {10.1007/S11623-022-1602-Y},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MullerRWWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen22,
  author       = {Kim Nguyen},
  title        = {Sichere elektronische Identit{\"{a}}t - ein Ziel f{\"{u}}r
                  Europa!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1549-z},
  doi          = {10.1007/S11623-022-1549-Z},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PeeckhausS22,
  author       = {Martin Peeckhaus and
                  Klaus Schmeh},
  title        = {Benutzerfreundliche Mail-Verschl{\"{u}}sselung bei einer Bundesbeh{\"{o}}rde},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {444--447},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1636-1},
  doi          = {10.1007/S11623-022-1636-1},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PeeckhausS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri22,
  author       = {Thomas Petri},
  title        = {Die prim{\"{a}}re und sekund{\"{a}}re Nutzung elektronischer
                  Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {413--418},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1631-6},
  doi          = {10.1007/S11623-022-1631-6},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri22a,
  author       = {Thomas Petri},
  title        = {Rechtsprechung zur {DS-GVO} in den Jahren 2021-2022},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {767--773},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1699-z},
  doi          = {10.1007/S11623-022-1699-Z},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann22,
  author       = {Norbert Pohlmann},
  title        = {Vertrauensw{\"{u}}rdige IT-Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {197},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1586-7},
  doi          = {10.1007/S11623-022-1586-7},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR22,
  author       = {Norbert Pohlmann and
                  Helmut Reimer},
  title        = {Cyber-Sicherheit - gemeinsam Grenzen {\"{u}}berwinden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {242},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1596-5},
  doi          = {10.1007/S11623-022-1596-5},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RehbohmKCS22,
  author       = {Thomas Rehbohm and
                  Robin Kemmerich and
                  Clemens H. Cap and
                  Kurt Sandkuhl},
  title        = {Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische
                  Studie in deutschen Kommunen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {448--454},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1637-0},
  doi          = {10.1007/S11623-022-1637-0},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RehbohmKCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer22,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {253--260},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1598-3},
  doi          = {10.1007/S11623-022-1598-3},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer22a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {717--724},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1689-1},
  doi          = {10.1007/S11623-022-1689-1},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rosenberger22,
  author       = {Nadine Rosenberger},
  title        = {Bewerberscreening unter Geltung der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {87--92},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1567-x},
  doi          = {10.1007/S11623-022-1567-X},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rosenberger22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Verbessert die Ampel-Koalition den Datenschutz?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {537--538},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1654-z},
  doi          = {10.1007/S11623-022-1654-Z},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Datenschutzanforderungen an Videokonferenzsysteme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {543--544},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1655-y},
  doi          = {10.1007/S11623-022-1655-Y},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22b,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Internationaler Datentransfer},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {545--549},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1656-x},
  doi          = {10.1007/S11623-022-1656-X},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22c,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Festakt im Hessischen Landtag: 50 Jahre Datenschutz in Hessen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {732},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1694-4},
  doi          = {10.1007/S11623-022-1694-4},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22d,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {797--800},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1703-7},
  doi          = {10.1007/S11623-022-1703-7},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelGJM22,
  author       = {Alexander Ro{\ss}nagel and
                  Christian L. Geminn and
                  Paul C. Johannes and
                  Johannes K. M. M{\"{u}}ller},
  title        = {Auswirkungen ausl{\"{a}}ndischer Gesetzgebung auf die deutsche
                  Cybersicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {156--163},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1581-z},
  doi          = {10.1007/S11623-022-1581-Z},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RossnagelGJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossow22,
  author       = {Olaf Rossow},
  title        = {Datenschutz beim Betriebsrat},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {81--86},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1566-y},
  doi          = {10.1007/S11623-022-1566-Y},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossow22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossow22a,
  author       = {Olaf Rossow},
  title        = {Arbeitgeber und das Fernmeldegeheimnis nach dem {TTDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {93--97},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1568-9},
  doi          = {10.1007/S11623-022-1568-9},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossow22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SaatjohannIGNSK22,
  author       = {Christoph Saatjohann and
                  Fabian Ising and
                  Matthias Gierlings and
                  Dominik Noss and
                  Sascha Schimmler and
                  Alexander Klemm and
                  Leif Grundmann and
                  Tilman Frosch and
                  Sebastian Schinzel},
  title        = {Sicherheit medizintechnischer Protokolle im Krankenhaus},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {276--283},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1603-x},
  doi          = {10.1007/S11623-022-1603-X},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SaatjohannIGNSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Salemi22,
  author       = {Simone Salemi},
  title        = {Chancen und Risiken von {PIMS} nach {\textsection} 26 {TTDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {505--510},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1648-x},
  doi          = {10.1007/S11623-022-1648-X},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Salemi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchaarschmidtSS22,
  author       = {Konstantin Schaarschmidt and
                  Martin Schallbruch and
                  Stefan Schuck},
  title        = {Digitale Brieftaschen f{\"{u}}r sichere Identit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {12--17},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1553-3},
  doi          = {10.1007/S11623-022-1553-3},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchaarschmidtSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schellhas-Mende22,
  author       = {Friederike Schellhas{-}Mende and
                  Nils Wiedemann and
                  Nicolas Blum},
  title        = {Videokonferenzsysteme als Telekommunikationsdienst},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {291--295},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1605-8},
  doi          = {10.1007/S11623-022-1605-8},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schellhas-Mende22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmehE22,
  author       = {Klaus Schmeh and
                  Matthias Edelhoff},
  title        = {{S/MIME} und {PGP} im selben Client},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {439--443},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1635-2},
  doi          = {10.1007/S11623-022-1635-2},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchmehE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe22,
  author       = {Maximilian Schnebbe},
  title        = {Minderj{\"{a}}hrigenschutz in der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {367--370},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1621-8},
  doi          = {10.1007/S11623-022-1621-8},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnebbe22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchurmannB22,
  author       = {Kathrin Sch{\"{u}}rmann and
                  Jan O. Baier},
  title        = {Schadensersatzanspr{\"{u}}che im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {103--106},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1570-2},
  doi          = {10.1007/S11623-022-1570-2},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchurmannB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seegebarth22,
  author       = {Christian Seegebarth},
  title        = {eIDAS-Novellierung 2021 - erste Analyse des Proposals},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {5--8},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1551-5},
  doi          = {10.1007/S11623-022-1551-5},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Seegebarth22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerS22,
  author       = {Annika Selzer and
                  Sarah Stummer},
  title        = {Hat die h{\"{a}}ufige Videotelefonie in Corona-Zeiten Einfluss
                  auf unser Privatsph{\"{a}}reverst{\"{a}}ndnis genommen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {774--777},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1700-x},
  doi          = {10.1007/S11623-022-1700-X},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SelzerS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stapf22,
  author       = {Ingrid Stapf},
  title        = {Das Recht auf eine offene Zukunft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {339--345},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1616-5},
  doi          = {10.1007/S11623-022-1616-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stapf22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld22,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Grundrechtsschutz: Antworten auf pandemiebedingte Einschr{\"{a}}nkungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {336--337},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1614-7},
  doi          = {10.1007/S11623-022-1614-7},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/UrbanG22,
  author       = {Manuela Urban and
                  Kurt Garloff},
  title        = {Sovereign Cloud Stack},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {616--621},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1669-5},
  doi          = {10.1007/S11623-022-1669-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/UrbanG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vasquez22,
  author       = {Sheila Vasquez},
  title        = {Privacy by Design und das autonome Fahrzeug},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {98--102},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1569-8},
  doi          = {10.1007/S11623-022-1569-8},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Vasquez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vassilaki22,
  author       = {Irini E. Vassilaki},
  title        = {Anleitung zu sexuellem Missbrauch von Kindern gem. {\textsection}
                  176e StGB},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {107--110},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1571-1},
  doi          = {10.1007/S11623-022-1571-1},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Vassilaki22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22,
  author       = {Thilo Weichert},
  title        = {Anmerkung zum Urteil des {OVG} Schleswig-Holstein vom 25.11.2021 -
                  Unzul{\"{a}}ssigkeit einer Facebook-Fanpage},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {239--241},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1595-6},
  doi          = {10.1007/S11623-022-1595-6},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22a,
  author       = {Thilo Weichert},
  title        = {Die Ernennung von Mitgliedern nach Art. 53 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {371--375},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1622-7},
  doi          = {10.1007/S11623-022-1622-7},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22b,
  author       = {Thilo Weichert},
  title        = {Was das Abtreibungsrecht in den {USA} mit Datenschutz zu tun hat},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {511--515},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1649-9},
  doi          = {10.1007/S11623-022-1649-9},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeichertGG22,
  author       = {Thilo Weichert and
                  Ludwig Gramlich and
                  Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {724--728},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1690-8},
  doi          = {10.1007/S11623-022-1690-8},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeichertGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weiss22,
  author       = {Andreas Weiss},
  title        = {Gaia-X - Grundlagen f{\"{u}}r den Aufbau f{\"{o}}derierter,
                  digitaler {\"{O}}kosysteme nach europ{\"{a}}ischen Regeln},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {227--232},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1593-8},
  doi          = {10.1007/S11623-022-1593-8},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weiss22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Welz22,
  author       = {Georges Welz},
  title        = {Ein neuer sicherer Hafen in der Cloud - auch f{\"{u}}r staatliche
                  Verschlusssachen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {622--626},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1670-z},
  doi          = {10.1007/S11623-022-1670-Z},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Welz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wichmann22,
  author       = {Markus Wichmann},
  title        = {TeleTrusT European Bridge {CA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {215--216},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1590-y},
  doi          = {10.1007/S11623-022-1590-Y},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wichmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Will22,
  author       = {Michael Will},
  title        = {E-Mail-Accounts im Visier von Cyberkriminellen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {485--486},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1644-1},
  doi          = {10.1007/S11623-022-1644-1},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Will22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wolff22,
  author       = {Daniel Wolff},
  title        = {KI-Biases im Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {733--738},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1695-3},
  doi          = {10.1007/S11623-022-1695-3},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wolff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wonnemann22,
  author       = {Claus Wonnemann},
  title        = {Cyber-Security entlang der IoT-Lieferkette},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {455--458},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1638-z},
  doi          = {10.1007/S11623-022-1638-Z},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wonnemann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22,
  title        = {Verarbeitungen des Datums , , Impfstatus" von Besch{\"{a}}ftigten
                  durch die Arbeitgeberin oder den Arbeitgeber},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1550-6},
  doi          = {10.1007/S11623-022-1550-6},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22a,
  title        = {{\"{O}}ffentliche Verwaltung - Digitalisierung 2022},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {52},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1560-4},
  doi          = {10.1007/S11623-022-1560-4},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22aa,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {584--591},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1663-y},
  doi          = {10.1007/S11623-022-1663-Y},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ab,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {592--600},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1664-x},
  doi          = {10.1007/S11623-022-1664-X},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ac,
  title        = {Hyperscaler - die Globalisierung von Cloud-Diensten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {660},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1678-4},
  doi          = {10.1007/S11623-022-1678-4},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ad,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {661--671},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1679-3},
  doi          = {10.1007/S11623-022-1679-3},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ae,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {671--680},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1680-x},
  doi          = {10.1007/S11623-022-1680-X},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22af,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {707--716},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1688-2},
  doi          = {10.1007/S11623-022-1688-2},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ag,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {782--790},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1701-9},
  doi          = {10.1007/S11623-022-1701-9},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ah,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {791--797},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1702-8},
  doi          = {10.1007/S11623-022-1702-8},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22ah.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22b,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {53--63},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1561-3},
  doi          = {10.1007/S11623-022-1561-3},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22c,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {64--72},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1562-2},
  doi          = {10.1007/S11623-022-1562-2},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22d,
  title        = {{DSK:} Neue Orientierungshilfe f{\"{u}}r Anbieter: innen von
                  Telemedien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {76},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1564-0},
  doi          = {10.1007/S11623-022-1564-0},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22e,
  title        = {Whistleblowing - Fehlende Umsetzung einer EU-Richtlinie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {111--112},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1572-0},
  doi          = {10.1007/S11623-022-1572-0},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22f,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {113--121},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1573-z},
  doi          = {10.1007/S11623-022-1573-Z},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22g,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {122--128},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1574-y},
  doi          = {10.1007/S11623-022-1574-Y},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22h,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {128--132},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1575-x},
  doi          = {10.1007/S11623-022-1575-X},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22i,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {176--186},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1584-9},
  doi          = {10.1007/S11623-022-1584-9},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22j,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {187--196},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1585-8},
  doi          = {10.1007/S11623-022-1585-8},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22k,
  title        = {103. Datenschutzkonferenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {310--311},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1609-4},
  doi          = {10.1007/S11623-022-1609-4},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22l,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {312--318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1610-y},
  doi          = {10.1007/S11623-022-1610-Y},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22m,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {319--327},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1611-x},
  doi          = {10.1007/S11623-022-1611-X},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22n,
  title        = {Information zur Nutzung von Facebook-Fanpages},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {338},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1615-6},
  doi          = {10.1007/S11623-022-1615-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22o,
  title        = {Einwilligung eines Kindes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {390},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1626-3},
  doi          = {10.1007/S11623-022-1626-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22p,
  title        = {Einwilligung eines Kindes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {391--398},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1627-2},
  doi          = {10.1007/S11623-022-1627-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22q,
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {399--408},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1628-1},
  doi          = {10.1007/S11623-022-1628-1},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22r,
  title        = {Digitalisierung ist kein Selbstzweck!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {409},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1629-0},
  doi          = {10.1007/S11623-022-1629-0},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22s,
  title        = {Die Zeit f{\"{u}}r ein Besch{\"{a}}ftigtendatenschutzgesetz
                  ist , , Jetzt"!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {459--460},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1639-y},
  doi          = {10.1007/S11623-022-1639-Y},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22t,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {461--470},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1640-5},
  doi          = {10.1007/S11623-022-1640-5},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22u,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {471--477},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1641-4},
  doi          = {10.1007/S11623-022-1641-4},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22v,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {477--480},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1642-3},
  doi          = {10.1007/S11623-022-1642-3},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22w,
  title        = {Aufgel{\"{o}}ste Verantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {481},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1643-2},
  doi          = {10.1007/S11623-022-1643-2},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22x,
  title        = {Mehr Rechtssicherheit f{\"{u}}r die IT-Sicherheitsforschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {516--517},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1650-3},
  doi          = {10.1007/S11623-022-1650-3},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22y,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {518--525},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1651-2},
  doi          = {10.1007/S11623-022-1651-2},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22z,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {526--532},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1652-1},
  doi          = {10.1007/S11623-022-1652-1},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZendelZ22,
  author       = {Oliver Zendel and
                  Marianne Ziesmer},
  title        = {Geheimkommunikation mit moderner {IT}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {640--642},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1674-8},
  doi          = {10.1007/S11623-022-1674-8},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ZendelZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZunabovicG22,
  author       = {Sandra Zunabovic and
                  Rainer W. Gerling},
  title        = {IT-Sicherheit in der Arztpraxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {499--504},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1647-y},
  doi          = {10.1007/S11623-022-1647-Y},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ZunabovicG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Amend21,
  author       = {Arlette Amend},
  title        = {Anwaltliche Geheimhaltungspflicht vs. Datenschutzaufsicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {265--270},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1431-4},
  doi          = {10.1007/S11623-021-1431-4},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Amend21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Barth21,
  author       = {Marlene Barth},
  title        = {A Case Study on Data Portability},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {190--197},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1416-3},
  doi          = {10.1007/S11623-021-1416-3},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Barth21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BartschW21,
  author       = {Markus Bartsch and
                  Markus Wagner},
  title        = {Automotive Security mit der On-Board Telematics Platform {(OTP)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {90--94},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1396-3},
  doi          = {10.1007/S11623-021-1396-3},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BartschW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Birk21,
  author       = {Dominik Birk},
  title        = {Managed Security Services: Hilfe oder Herausforderung f{\"{u}}r
                  die Informationssicherheit?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {676--679},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1513-3},
  doi          = {10.1007/S11623-021-1513-3},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Birk21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Blankertz21,
  author       = {Aline Blankertz},
  title        = {Vertrauliche Datentreuhand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {789--793},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1538-7},
  doi          = {10.1007/S11623-021-1538-7},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Blankertz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann21,
  author       = {Dominik Bleckmann},
  title        = {Aus Schaden wird man klug - Warum {KRITIS} wichtig ist},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {577},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1492-4},
  doi          = {10.1007/S11623-021-1492-4},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Block21,
  author       = {Helga Block},
  title        = {Zugriffe von Strafverfolgungsbeh{\"{o}}rden auf Corona-Kontaktlisten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {4},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1380-3},
  doi          = {10.1007/S11623-020-1380-3},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Block21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boenisch21,
  author       = {Franziska Boenisch},
  title        = {Privatsph{\"{a}}re und Maschinelles Lernen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {448--452},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1469-3},
  doi          = {10.1007/S11623-021-1469-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Boenisch21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BosseDW21,
  author       = {Christian K. Bosse and
                  Aljoscha Dietrich and
                  Andreas We{\ss}ner},
  title        = {Selbstbewertungsinstrument f{\"{u}}r den betrieblichen Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {23--27},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1384-z},
  doi          = {10.1007/S11623-020-1384-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BosseDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Braun21,
  author       = {Sven Braun},
  title        = {Kontrollen risikoreicher Verarbeitungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {126--130},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1402-9},
  doi          = {10.1007/S11623-021-1402-9},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Braun21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BretthauerAB21,
  author       = {Sebastian Bretthauer and
                  Arno Appenzeller and
                  Pascal Birnstill},
  title        = {Datensouver{\"{a}}nit{\"{a}}t f{\"{u}}r Patienten im
                  Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {173--179},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1413-6},
  doi          = {10.1007/S11623-021-1413-6},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BretthauerAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {131--141},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1403-8},
  doi          = {10.1007/S11623-021-1403-8},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {272--283},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1433-2},
  doi          = {10.1007/S11623-021-1433-2},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21b,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {336--343},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1445-y},
  doi          = {10.1007/S11623-021-1445-Y},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21c,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {405--416},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1461-y},
  doi          = {10.1007/S11623-021-1461-Y},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21d,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {480--486},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1476-4},
  doi          = {10.1007/S11623-021-1476-4},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21e,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {553--562},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1488-0},
  doi          = {10.1007/S11623-021-1488-0},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21f,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {628--635},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1504-4},
  doi          = {10.1007/S11623-021-1504-4},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21g,
  author       = {Benedikt Buchner},
  title        = {Widerrufbarkeit der Einwilligung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {831},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1545-8},
  doi          = {10.1007/S11623-021-1545-8},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21h,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {832--841},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1546-7},
  doi          = {10.1007/S11623-021-1546-7},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner21h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuchnerHHPKSS21,
  author       = {Benedikt Buchner and
                  Anna Christine Haber and
                  Horst Karl Hahn and
                  Fabian Prasser and
                  Harald Kusch and
                  Ulrich Sax and
                  Carsten Oliver Schmidt},
  title        = {Das Modell der Datentreuhand in der medizinischen Forschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {806--810},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1534-y},
  doi          = {10.1007/S11623-021-1534-Y},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BuchnerHHPKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterP21,
  author       = {Ulla Coester and
                  Norbert Pohlmann},
  title        = {Vertrauen - ein elementarer Aspekt der digitalen Zukunft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {120--125},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1401-x},
  doi          = {10.1007/S11623-021-1401-X},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/CoesterP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad21,
  author       = {Conrad Sebastian Conrad},
  title        = {Die , , Verarbeitung" im Sinne der {DSGVO} - und die Realit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {603--608},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1499-x},
  doi          = {10.1007/S11623-021-1499-X},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DielKSS21,
  author       = {Sarah Diel and
                  Matthias Kohn and
                  Janine Schleper and
                  Annika Selzer},
  title        = {Datenschutzmetriken im Besch{\"{a}}ftigungsverh{\"{a}}ltnis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {821--825},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1543-x},
  doi          = {10.1007/S11623-021-1543-X},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DielKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DietrichBS21,
  author       = {Aljoscha Dietrich and
                  Christian K. Bosse and
                  Hartmut Schmitt},
  title        = {Kontrolle und {\"{U}}berwachung von Besch{\"{a}}ftigten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {5--10},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1381-2},
  doi          = {10.1007/S11623-020-1381-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DietrichBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Djeffal21,
  author       = {Christian Djeffal},
  title        = {Art. 22 {DSGVO} als sozio-technische Gestaltungsnorm},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {529--533},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1484-4},
  doi          = {10.1007/S11623-021-1484-4},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Djeffal21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DopmannMFT21,
  author       = {Christoph D{\"{o}}pmann and
                  Matthias Marx and
                  Hannes Federrath and
                  Florian Tschorsch},
  title        = {Tor Relays an Universit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {320--325},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1442-1},
  doi          = {10.1007/S11623-021-1442-1},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DopmannMFT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DopmannMFT21a,
  author       = {Christoph D{\"{o}}pmann and
                  Matthias Marx and
                  Hannes Federrath and
                  Florian Tschorsch},
  title        = {Erratum zu: Tor Relays an Universit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {849},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1533-z},
  doi          = {10.1007/S11623-021-1533-Z},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DopmannMFT21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DreyerK21,
  author       = {Bastian Dreyer and
                  Gerhard Kramarz{-}von Kohout},
  title        = {Modernisierung der Telekommunikation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {747--754},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1528-9},
  doi          = {10.1007/S11623-021-1528-9},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DreyerK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eckhardt21,
  author       = {Jens Eckhardt},
  title        = {Wann ist ein IoT-Ger{\"{a}}t datenschutzrelevant?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {107--113},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1399-0},
  doi          = {10.1007/S11623-021-1399-0},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Eckhardt21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eichenhofer21,
  author       = {Johannes Eichenhofer},
  title        = {Stand und Perspektiven einer Global Governance der Internet Privacy},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {159--162},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1410-9},
  doi          = {10.1007/S11623-021-1410-9},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Eichenhofer21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EscheMN21,
  author       = {Marko Esche and
                  Reinhard Meyer and
                  Martin Nischwitz},
  title        = {Conformity assessment of measuring instruments with artificial intelligence},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {184--189},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1415-4},
  doi          = {10.1007/S11623-021-1415-4},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EscheMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber21,
  author       = {Eberhard von Faber},
  title        = {Zur Zukunft des IT-Sicherheitsmanagements angesichts des Wandels von
                  Technik und Serviceerbringung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {691--697},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1516-0},
  doi          = {10.1007/S11623-021-1516-0},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerGG21,
  author       = {Arno Fiedler and
                  Ernst{-}G{\"{u}}nter Giessmann and
                  Franziska Granc},
  title        = {Rechtskonforme Pr{\"{u}}fung elektronischer Signaturen gestern
                  und heute},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {654--658},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1509-z},
  doi          = {10.1007/S11623-021-1509-Z},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerTT21,
  author       = {Arno Fiedler and
                  Christoph Thiel and
                  Christian Thiel},
  title        = {Verl{\"{a}}ssliche Personenidentifizierung mittels Techniken
                  der K{\"{u}}nstlichen Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {462--466},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1472-8},
  doi          = {10.1007/S11623-021-1472-8},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FlieheB21,
  author       = {Marc Fliehe and
                  Elisa Brummel},
  title        = {Eckpunkte eines sicheren {\"{O}}kosystems f{\"{u}}r KI-Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {444--447},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1468-4},
  doi          = {10.1007/S11623-021-1468-4},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FlieheB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox21,
  author       = {Dirk Fox},
  title        = {Umsetzungsfragen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {153},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1407-4},
  doi          = {10.1007/S11623-021-1407-4},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox21a,
  author       = {Dirk Fox},
  title        = {Lesen bildet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {293},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1436-z},
  doi          = {10.1007/S11623-021-1436-Z},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox21b,
  author       = {Dirk Fox},
  title        = {Phishing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {717},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1521-3},
  doi          = {10.1007/S11623-021-1521-3},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FoxT21,
  author       = {Dirk Fox and
                  Christian Titze},
  title        = {Phishing Awareness durch Gamification},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {727--732},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1524-0},
  doi          = {10.1007/S11623-021-1524-0},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FoxT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn21,
  author       = {Christian L. Geminn},
  title        = {Datenschutz bei Sprachassistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {509--514},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1481-7},
  doi          = {10.1007/S11623-021-1481-7},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Geminn21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gisch21,
  author       = {Mathias Gisch},
  title        = {F{\"{u}}hrungsinformationssysteme in der {\"{o}}ffentlichen
                  Verwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {11--18},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1382-1},
  doi          = {10.1007/S11623-020-1382-1},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gisch21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gola21,
  author       = {Peter Gola},
  title        = {Das Verbandssanktionengesetz-E und betriebliche Datenschutzbeauftragte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {472--478},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1474-6},
  doi          = {10.1007/S11623-021-1474-6},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gola21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Golla21,
  author       = {Sebastian Golla},
  title        = {Volatiles Datenschutzbu{\ss}geld},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {180--183},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1414-5},
  doi          = {10.1007/S11623-021-1414-5},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Golla21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber21,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {350--352},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1447-9},
  doi          = {10.1007/S11623-021-1447-9},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen21,
  author       = {Marit Hansen},
  title        = {Informationssicherheit: Aufgabe f{\"{u}}r die Datenschutzaufsicht?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {234--238},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1425-2},
  doi          = {10.1007/S11623-021-1425-2},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HansenP21,
  author       = {Marit Hansen and
                  Thomas Probst},
  title        = {Die ambivalente Beziehung zwischen eGovernment und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {664--668},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1511-5},
  doi          = {10.1007/S11623-021-1511-5},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HansenP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeidrichW21,
  author       = {Joerg Heidrich and
                  Christoph Wegener},
  title        = {Dauerhaft sicher zu Hause},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {680--685},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1514-2},
  doi          = {10.1007/S11623-021-1514-2},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeidrichW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HofBB21,
  author       = {Hans{-}Joachim Hof and
                  Dominik Bayerl and
                  Kevin Klaus Gomez Buquerin},
  title        = {{\"{U}}berwachung in modernen Fahrzeugen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {399--403},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1459-5},
  doi          = {10.1007/S11623-021-1459-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HofBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoffmannK21,
  author       = {Hanna Hoffmann and
                  Johannes Kevekordes},
  title        = {Das Right to Explanation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {609--615},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1500-8},
  doi          = {10.1007/S11623-021-1500-8},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoffmannK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hohne21,
  author       = {Marina Marie{-}Claire H{\"{o}}hne},
  title        = {Nachvollziehbare K{\"{u}}nstliche Intelligenz: Methoden, Chancen
                  und Risiken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {453--456},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1470-x},
  doi          = {10.1007/S11623-021-1470-X},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hohne21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/IaconoS21,
  author       = {Luigi Lo Iacono and
                  Hartmut Schmitt},
  title        = {Informationelle Selbstbestimmung am Arbeitsplatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {1},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1379-9},
  doi          = {10.1007/S11623-020-1379-9},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/IaconoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jung21,
  author       = {Marco M{\"{u}}ller{-}ter Jung},
  title        = {Datenschutz im Internet der Dinge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {114--119},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1400-y},
  doi          = {10.1007/S11623-021-1400-Y},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Jung21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kammerloher21,
  author       = {Dominik Kammerloher},
  title        = {Cybersecurity: Ein sicheres Fundament f{\"{u}}r den digitalen
                  Staat},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {649--653},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1508-0},
  doi          = {10.1007/S11623-021-1508-0},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kammerloher21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KarlH21,
  author       = {Wilfried Karl and
                  Christian Hummert},
  title        = {Digitale Souver{\"{a}}nit{\"{a}}t: Die Rolle der ZITiS in
                  der deutschen Cybersicherheitsarchitektur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {223--228},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1423-4},
  doi          = {10.1007/S11623-021-1423-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KarlH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KastropP21,
  author       = {Christian Kastrop and
                  Dominic Ponattu},
  title        = {K{\"{u}}nstliche Intelligenz muss dem Gemeinwohl dienen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {434--437},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1466-6},
  doi          = {10.1007/S11623-021-1466-6},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KastropP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber21,
  author       = {Ulrich Kelber},
  title        = {Zu {\"{u}}berarbeiteten Standarddatenschutzklauseln und zur Data-Mining
                  Entscheidung des BVerfG},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {158},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1409-2},
  doi          = {10.1007/S11623-021-1409-2},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber21a,
  author       = {Ulrich Kelber},
  title        = {K{\"{u}}nstliche Intelligenz im Bereich der Strafverfolgung und
                  Gefahrenabwehr},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {780--782},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1536-9},
  doi          = {10.1007/S11623-021-1536-9},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kellermann21,
  author       = {Gero Kellermann},
  title        = {Die Meinungsfreiheit als verfassungspolitische Herausforderung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {363--367},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1451-0},
  doi          = {10.1007/S11623-021-1451-0},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kellermann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerP21,
  author       = {Dennis{-}Kenji Kipker and
                  Sebastian Pape},
  title        = {Case Study: Checking a Serious Security-Awareness Game for its Legal
                  Adequacy},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {310--314},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1440-3},
  doi          = {10.1007/S11623-021-1440-3},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS21,
  author       = {Dennis{-}Kenji Kipker and
                  Dario Scholz},
  title        = {Das IT-Sicherheitsgesetz 2.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {40--45},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1387-9},
  doi          = {10.1007/S11623-020-1387-9},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KlausWLW21,
  author       = {Marko Klaus and
                  Dominik Wei{\ss}haar and
                  Andreas Lang and
                  Enrico Weide},
  title        = {Identifizierung relevanter Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {738--741},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1526-y},
  doi          = {10.1007/S11623-021-1526-Y},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KlausWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KneuperJ21,
  author       = {Ralf Kneuper and
                  Sven Jacobs},
  title        = {Softwaretest mit Originaldaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {163--167},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1411-8},
  doi          = {10.1007/S11623-021-1411-8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KneuperJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KowalskiIM21,
  author       = {Bernd Kowalski and
                  Matthias Intemann and
                  Tobias M{\"{u}}hlenbruch},
  title        = {Bedeutung des Cybersecurity Acts f{\"{u}}r die IT-Sicherheitszertifizierung
                  in Deutschland und Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {244--248},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1427-0},
  doi          = {10.1007/S11623-021-1427-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KowalskiIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KreutzerS21,
  author       = {Michael Kreutzer and
                  Markus Schneider},
  title        = {Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {249--253},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1428-z},
  doi          = {10.1007/S11623-021-1428-Z},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KreutzerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kroschwald21,
  author       = {Steffen Kroschwald},
  title        = {K{\"{u}}nstliche Intelligenz im autonomen Auto},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {522--528},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1483-5},
  doi          = {10.1007/S11623-021-1483-5},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kroschwald21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann21,
  author       = {Dieter Kugelmann},
  title        = {Ein Jahr Corona-Pandemie - Mehr Digitalisierung braucht effizienteren
                  Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {297},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1437-y},
  doi          = {10.1007/S11623-021-1437-Y},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann21a,
  author       = {Dieter Kugelmann},
  title        = {EU-Vorschlag zu K{\"{u}}nstlicher Intelligenz muss aus Datenschutz-Perspektive
                  durchleuchtet werden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {433},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1465-7},
  doi          = {10.1007/S11623-021-1465-7},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann21b,
  author       = {Dieter Kugelmann},
  title        = {K{\"{u}}nstliche Intelligenz aus Sicht der Datenschutzaufsicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {503--508},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1480-8},
  doi          = {10.1007/S11623-021-1480-8},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling21,
  author       = {J{\"{u}}rgen K{\"{u}}hling},
  title        = {Scoring, Plausibilisierung und Imputation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {168--172},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1412-7},
  doi          = {10.1007/S11623-021-1412-7},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kuhling21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling21a,
  author       = {J{\"{u}}rgen K{\"{u}}hling},
  title        = {Der datenschutzrechtliche Rahmen f{\"{u}}r Datentreuh{\"{a}}nder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {783--788},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1537-8},
  doi          = {10.1007/S11623-021-1537-8},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kuhling21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingB21,
  author       = {J{\"{u}}rgen K{\"{u}}hling and
                  Benedikt Buchner},
  title        = {Datentreuh{\"{a}}nder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {777},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1535-x},
  doi          = {10.1007/S11623-021-1535-X},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KuhlingB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhneRZ21,
  author       = {Christian Ricardo K{\"{u}}hne and
                  Martin Rost and
                  Stefan Zwierlein},
  title        = {Risiken in 3D},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {742--746},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1527-x},
  doi          = {10.1007/S11623-021-1527-X},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KuhneRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kunast21,
  author       = {Renate K{\"{u}}nast},
  title        = {Hass im Netz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {368--370},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1452-z},
  doi          = {10.1007/S11623-021-1452-Z},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kunast21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lahmann21,
  author       = {Henning Lahmann},
  title        = {Zur operativen Zusammenarbeit zwischen Staat und Wirtschaft in der
                  Cybersicherheit in Deutschland},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {239--243},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1426-1},
  doi          = {10.1007/S11623-021-1426-1},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lahmann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeichtM21,
  author       = {Maximilian Leicht and
                  Frederik M{\"{o}}llers},
  title        = {Zur (Un-)Sicherheit von Zwei-Faktor-Authentifizierung via {SMS}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {541--545},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1486-2},
  doi          = {10.1007/S11623-021-1486-2},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LeichtM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LewinskiH21,
  author       = {Kai von Lewinski and
                  Johanna H{\"{a}}hnle},
  title        = {Was informatisch richtig ist, kann auch juristisch recht sein},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {686--690},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1515-1},
  doi          = {10.1007/S11623-021-1515-1},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LewinskiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LipowiczS21,
  author       = {Irena Lipowicz and
                  Grazyna Szpor},
  title        = {Neue Aspekte der Desinformation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {381--384},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1455-9},
  doi          = {10.1007/S11623-021-1455-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LipowiczS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LoberLDR21,
  author       = {Lena Isabell L{\"{o}}ber and
                  Sebastian Lange and
                  Klaus David and
                  Alexander Ro{\ss}nagel},
  title        = {Datenschutzfreundliche Algorithmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {616--622},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1501-7},
  doi          = {10.1007/S11623-021-1501-7},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LoberLDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mangels21,
  author       = {Fabian Mangels},
  title        = {{KRITIS} zu Zeiten einer Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {579--583},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1494-2},
  doi          = {10.1007/S11623-021-1494-2},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mangels21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Margraf21,
  author       = {Marian Margraf},
  title        = {Systeme der K{\"{u}}nstlichen Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {429},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1464-8},
  doi          = {10.1007/S11623-021-1464-8},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Margraf21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarkertB21,
  author       = {Karla Markert and
                  Konstantin B{\"{o}}ttinger},
  title        = {Robuste Lernverfahren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {457--461},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1471-9},
  doi          = {10.1007/S11623-021-1471-9},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MarkertB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Martius21,
  author       = {Kai Martius},
  title        = {{SINA:} IT-Sicherheit als Infrastruktur betrachtet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {659--663},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1510-6},
  doi          = {10.1007/S11623-021-1510-6},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Martius21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester21,
  author       = {Britta Alexandra Mester},
  title        = {{KRITIS} als Teil einer modernen Gesellschaft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {573},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1491-5},
  doi          = {10.1007/S11623-021-1491-5},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester21a,
  author       = {Britta Alexandra Mester},
  title        = {Kritische Infrastrukturen {(KRITIS)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {627},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1503-5},
  doi          = {10.1007/S11623-021-1503-5},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Milde21,
  author       = {Thomas Milde},
  title        = {Business Continuity im F{\"{o}}deralismus},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {669--675},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1512-4},
  doi          = {10.1007/S11623-021-1512-4},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Milde21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mohle21,
  author       = {Jan{-}Peter M{\"{o}}hle},
  title        = {Totalrevision des Schweizer Datenschutzgesetzes - Ende gut, alles
                  gut?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {598--602},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1498-y},
  doi          = {10.1007/S11623-021-1498-Y},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mohle21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Molnar-Gabor21,
  author       = {Fruzsina Moln{\'{a}}r{-}G{\'{a}}bor},
  title        = {Ausgestaltung der Einwilligung in die Datenspende f{\"{u}}r die
                  Gesundheitsforschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {799--805},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1540-0},
  doi          = {10.1007/S11623-021-1540-0},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Molnar-Gabor21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MorgensternPC21,
  author       = {Maik Morgenstern and
                  Olaf Pursche and
                  Eric Clausing},
  title        = {Die Sicherheitslage im IoT-Umfeld},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {102--106},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1398-1},
  doi          = {10.1007/S11623-021-1398-1},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MorgensternPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Niewohner21,
  author       = {Mario Niew{\"{o}}hner},
  title        = {NetzDG und Meinungsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {391--395},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1457-7},
  doi          = {10.1007/S11623-021-1457-7},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Niewohner21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel21,
  author       = {Maurice Oettel},
  title        = {Wesensdaten: Regulierungsl{\"{u}}cke im derzeitigen Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {623--626},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1502-6},
  doi          = {10.1007/S11623-021-1502-6},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Oettel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OttmannPSSRF21,
  author       = {Jenny Ottmann and
                  Johannes Pollach and
                  Nicole Scheler and
                  Janine Schneider and
                  Christian R{\"{u}}ckert and
                  Felix C. Freiling},
  title        = {Zur Blackbox-Problematik im Bereich Mobilfunkforensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {546--552},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1487-1},
  doi          = {10.1007/S11623-021-1487-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/OttmannPSSRF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetrlicD21,
  author       = {Ronald Petrlic and
                  Leo Dessani},
  title        = {E-Mail-Sicherheit auf dem Pr{\"{u}}fstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {534--540},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1485-3},
  doi          = {10.1007/S11623-021-1485-3},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PetrlicD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pfrang21,
  author       = {Sebastian Pfrang},
  title        = {Aufz{\"{a}}hlung der datenschutzrechtlichen Grunds{\"{a}}tze
                  gem{\"{a}}{\ss} Art. 5 {DS-GVO} in Betriebsvereinbarungen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {396--398},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1458-6},
  doi          = {10.1007/S11623-021-1458-6},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pfrang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PilgermannSSW21,
  author       = {Michael Pilgermann and
                  Stefan Stein and
                  Thomas Schrader and
                  Simon Weber},
  title        = {Angriffserkennung beim Betrieb von {KRITIS} gem{\"{a}}{\ss} IT-Sicherheitsgesetz
                  2.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {733--737},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1525-z},
  doi          = {10.1007/S11623-021-1525-Z},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PilgermannSSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann21,
  author       = {Norbert Pohlmann},
  title        = {Sicherheitsbedarf von IoT-Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {73},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1391-8},
  doi          = {10.1007/S11623-021-1391-8},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann21a,
  author       = {Norbert Pohlmann},
  title        = {Chancen und Risiken von Smart Home},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {95--101},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1397-2},
  doi          = {10.1007/S11623-021-1397-2},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PolstTDF21,
  author       = {Svenja Polst and
                  Jan Tolsdorf and
                  Florian Dehling and
                  Denis Feth},
  title        = {Verarbeitung von Besch{\"{a}}ftigtendaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {19--22},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1383-0},
  doi          = {10.1007/S11623-020-1383-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PolstTDF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PotthoffS21,
  author       = {Tobias S. Potthoff and
                  Dorothee Schrief},
  title        = {Gesch{\"{a}}ftsrelevanz Datenschutz spezifischer Zertifizierungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {326--329},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1443-0},
  doi          = {10.1007/S11623-021-1443-0},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PotthoffS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Raji21,
  author       = {Behrang Raji},
  title        = {Rechtliche Bewertung synthetischer Daten f{\"{u}}r KI-Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {303--309},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1439-9},
  doi          = {10.1007/S11623-021-1439-9},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Raji21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReichmannEBKMSB21,
  author       = {Henrik Reichmann and
                  Malte Elson and
                  Nele Borgert and
                  Dennis{-}Kenji Kipker and
                  Rainer Malaka and
                  Karsten Sohr and
                  Mehrdad Bahrini},
  title        = {Erfahrbarer Datenschutz und IT-Sicherheit in Smart Home-Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {259--264},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1430-5},
  doi          = {10.1007/S11623-021-1430-5},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ReichmannEBKMSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21,
  author       = {Helmut Reimer},
  title        = {Der Abnutzungseffekt gro{\ss}er Visionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {76--77},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1392-7},
  doi          = {10.1007/S11623-021-1392-7},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {142--148},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1404-7},
  doi          = {10.1007/S11623-021-1404-7},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21b,
  author       = {Helmut Reimer},
  title        = {Herausforderungen durch neue Konzepte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {271},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1432-3},
  doi          = {10.1007/S11623-021-1432-3},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21c,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {284--290},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1434-1},
  doi          = {10.1007/S11623-021-1434-1},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21d,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {344--350},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1446-x},
  doi          = {10.1007/S11623-021-1446-X},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21e,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {417--424},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1462-x},
  doi          = {10.1007/S11623-021-1462-X},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21f,
  author       = {Helmut Reimer},
  title        = {{KI:} Zwischen Realit{\"{a}}t und Vision},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {479},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1475-5},
  doi          = {10.1007/S11623-021-1475-5},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21g,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {487--496},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1477-3},
  doi          = {10.1007/S11623-021-1477-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21h,
  author       = {Helmut Reimer},
  title        = {Report 08-2021},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {563--569},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1489-z},
  doi          = {10.1007/S11623-021-1489-Z},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21i,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {636--644},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1505-3},
  doi          = {10.1007/S11623-021-1505-3},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21j,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {842--849},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1547-6},
  doi          = {10.1007/S11623-021-1547-6},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer21j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RemyS21,
  author       = {Jan Remy and
                  Ralf Stettner},
  title        = {Cybersicherheit als Aufgabe der L{\"{a}}nder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {254--258},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1429-y},
  doi          = {10.1007/S11623-021-1429-Y},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RemyS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riemenschneider21,
  author       = {Severin Riemenschneider and
                  Marina Lutz},
  title        = {{\#}HateSpeech - Shitstorms als Kampfmittel organisierter Strukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {371--374},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1453-y},
  doi          = {10.1007/S11623-021-1453-Y},
  timestamp    = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Riemenschneider21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel21,
  author       = {Alexander Ro{\ss}nagel},
  title        = {K{\"{u}}nstliche Intelligenz datenschutzrechtlich gestalten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {497--498},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1478-2},
  doi          = {10.1007/S11623-021-1478-2},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schafer21,
  author       = {Burkhard Schafer},
  title        = {Death by a Thousand Cuts: Cumulative Data Effects and the Corbyn Affair},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {385--390},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1456-8},
  doi          = {10.1007/S11623-021-1456-8},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schafer21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schallbruch21,
  author       = {Martin Schallbruch},
  title        = {Cybersicherheitsarchitektur - Gro{\ss}baustelle ohne Plan},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {217},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1420-7},
  doi          = {10.1007/S11623-021-1420-7},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schallbruch21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schallbruch21a,
  author       = {Martin Schallbruch},
  title        = {Mehr Unabh{\"{a}}ngigkeit f{\"{u}}r das BSI?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {229--233},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1424-3},
  doi          = {10.1007/S11623-021-1424-3},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schallbruch21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schallbruch21b,
  author       = {Martin Schallbruch},
  title        = {EU-Regulierung der K{\"{u}}nstlichen Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {438--443},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1467-5},
  doi          = {10.1007/S11623-021-1467-5},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schallbruch21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchindlerH21,
  author       = {Stephan Schindler and
                  Gerrit Hornung},
  title        = {Datenschutz bei der biometrischen Gesichtserkennung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {515--521},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1482-6},
  doi          = {10.1007/S11623-021-1482-6},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchindlerH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmittG21,
  author       = {Hartmut Schmitt and
                  Eduard C. Groen},
  title        = {Qualit{\"{a}}tsmodell zur F{\"{o}}rderung des Besch{\"{a}}ftigtendatenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {28--32},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1385-y},
  doi          = {10.1007/S11623-020-1385-Y},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchmittG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmittG21a,
  author       = {Hartmut Schmitt and
                  Eduard C. Groen},
  title        = {Erratum zu: Qualit{\"{a}}tsmodell zur F{\"{o}}rderung des
                  Besch{\"{a}}ftigtendatenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {148},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1405-6},
  doi          = {10.1007/S11623-021-1405-6},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchmittG21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe21,
  author       = {Maximilian Schnebbe},
  title        = {{TTDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {404},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1460-z},
  doi          = {10.1007/S11623-021-1460-Z},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnebbe21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS21,
  author       = {Dominik Schrahe and
                  Thomas St{\"{a}}dter},
  title        = {COVID-19-Impf- und -Testnachweise},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {315--319},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1441-2},
  doi          = {10.1007/S11623-021-1441-2},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchraheS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulteS21,
  author       = {Laura Schulte and
                  Johanna Schmale},
  title        = {Vertragliche Absicherung internationaler Datentransfers},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {46--54},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1388-8},
  doi          = {10.1007/S11623-020-1388-8},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchulteS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwartmannB21,
  author       = {Rolf Schwartmann and
                  Kristin Benedikt},
  title        = {Anerkannte Dienste der Einwilligungsverwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {811--815},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1541-z},
  doi          = {10.1007/S11623-021-1541-Z},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchwartmannB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerT21,
  author       = {Annika Selzer and
                  Ingo J. Timm},
  title        = {Potenziale anonymer Datenverarbeitungen nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {816--820},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1542-y},
  doi          = {10.1007/S11623-021-1542-Y},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SelzerT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerT21a,
  author       = {Annika Selzer and
                  Ingo J. Timm},
  title        = {Gestaltung eines Treuhand-Systems zum anonymen Datenaustausch in einer
                  Smart-City-Umgebung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {826--830},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1544-9},
  doi          = {10.1007/S11623-021-1544-9},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SelzerT21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Smoltczyk21,
  author       = {Maja Smoltczyk},
  title        = {Datenschutz ist kein Hindernis f{\"{u}}r digitalen Unterricht
                  - Schulen brauchen Unterst{\"{u}}tzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {222},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1422-5},
  doi          = {10.1007/S11623-021-1422-5},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Smoltczyk21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Specht-Riemenschneider21,
  author       = {Louisa Specht{-}Riemenschneider and
                  Lea Lorbach},
  title        = {Rechtsschutz gegen Pers{\"{o}}nlichkeitsrechtsverletzungen im
                  Netz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {375--380},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1454-x},
  doi          = {10.1007/S11623-021-1454-X},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Specht-Riemenschneider21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Specht-Riemenschneider21a,
  author       = {Louisa Specht{-}Riemenschneider and
                  Lea Lorbach},
  title        = {Rechtsschutz gegen Pers{\"{o}}nlichkeitsrechtsverletzungen im
                  Netz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {7},
  pages        = {467--471},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1473-7},
  doi          = {10.1007/S11623-021-1473-7},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Specht-Riemenschneider21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steinrotter21,
  author       = {Bj{\"{o}}rn Steinr{\"{o}}tter},
  title        = {Das Konzept einer datenaltruistischen Organisation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {794--798},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1539-6},
  doi          = {10.1007/S11623-021-1539-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Steinrotter21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stradomsky21,
  author       = {Christopher Stradomsky},
  title        = {{KRITIS} - Der Weg zum Audit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {589--593},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1496-0},
  doi          = {10.1007/S11623-021-1496-0},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stradomsky21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sunderman21,
  author       = {Steffen Sunderman},
  title        = {Abdingbarkeit technischer oder organisatorischer Ma{\ss}nahmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {594--597},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1497-z},
  doi          = {10.1007/S11623-021-1497-Z},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Sunderman21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tiedemann21,
  author       = {Jan Tiedemann},
  title        = {Digitalisierung der industriellen Dinge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {83--89},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1395-4},
  doi          = {10.1007/S11623-021-1395-4},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tiedemann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld21,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Keine unbedingte Toleranz f{\"{u}}r Feinde der Freiheit!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {359--362},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1450-1},
  doi          = {10.1007/S11623-021-1450-1},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB21,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Toleranz, Meinungsfreiheit und Pers{\"{o}}nlichkeitsschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {353},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1448-8},
  doi          = {10.1007/S11623-021-1448-8},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TolsdorfDF21,
  author       = {Jan Tolsdorf and
                  Florian Dehling and
                  Denis Feth},
  title        = {Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {33--39},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1386-x},
  doi          = {10.1007/S11623-020-1386-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TolsdorfDF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerBABLT21,
  author       = {Melanie Volkamer and
                  Benjamin Berens and
                  Lukas Aldag and
                  Milan Burgdorf and
                  Andreas Lorenz and
                  Marie{-}Claire Thiery},
  title        = {NoPhish-Challenge-Karten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {721--726},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1523-1},
  doi          = {10.1007/S11623-021-1523-1},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/VolkamerBABLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener21,
  author       = {Christoph Wegener},
  title        = {Digitalisierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {645},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1506-2},
  doi          = {10.1007/S11623-021-1506-2},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert21,
  author       = {Thilo Weichert},
  title        = {Aufbewahrung nach Handels- und Steuerrecht - oder L{\"{o}}schung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {755--757},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1529-8},
  doi          = {10.1007/S11623-021-1529-8},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wiest21,
  author       = {Simon Wiest},
  title        = {{ENIGMA} {R.D.E}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {298--302},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1438-x},
  doi          = {10.1007/S11623-021-1438-X},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wiest21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wilczek21,
  author       = {Marc Wilczek},
  title        = {IoT - die untersch{\"{a}}tzte Gefahr f{\"{u}}r IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {79--82},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1394-5},
  doi          = {10.1007/S11623-021-1394-5},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wilczek21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Woitke21,
  author       = {Annika Woitke},
  title        = {Pr{\"{u}}fgrundlagen nach {\textsection} 8a},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {584--588},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1495-1},
  doi          = {10.1007/S11623-021-1495-1},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Woitke21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wunsche21,
  author       = {Kai E. W{\"{u}}nsche},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {290--292},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1435-0},
  doi          = {10.1007/S11623-021-1435-0},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wunsche21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {55--63},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1389-7},
  doi          = {10.1007/S11623-020-1389-7},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21a,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {1},
  pages        = {64--72},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-020-1390-1},
  doi          = {10.1007/S11623-020-1390-1},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21b,
  title        = {Betreiber von Webseiten ben{\"{o}}tigen Rechtssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {78},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1393-6},
  doi          = {10.1007/S11623-021-1393-6},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21c,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {2},
  pages        = {149--152},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1406-5},
  doi          = {10.1007/S11623-021-1406-5},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21d,
  title        = {Gretchenfrage},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {157},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1408-3},
  doi          = {10.1007/S11623-021-1408-3},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21e,
  title        = {Instrumente f{\"{u}}r Drittstaaten-Transfers},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {198},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1417-2},
  doi          = {10.1007/S11623-021-1417-2},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21f,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {199--207},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1418-1},
  doi          = {10.1007/S11623-021-1418-1},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21g,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {3},
  pages        = {208--216},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1419-0},
  doi          = {10.1007/S11623-021-1419-0},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21h,
  title        = {Pandemie und Digitalisierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {4},
  pages        = {221},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1421-6},
  doi          = {10.1007/S11623-021-1421-6},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21i,
  title        = {Impfnachweis, Nachweis negativen Testergebnisses und Genesungsnachweis
                  geh{\"{o}}ren gesetzlich geregelt!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {357--358},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1449-7},
  doi          = {10.1007/S11623-021-1449-7},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21j,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {6},
  pages        = {425--428},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1463-9},
  doi          = {10.1007/S11623-021-1463-9},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21k,
  title        = {40. Konferenz der Informationsfreiheitsbeauftragten vom 02. Juni 2021
                  - Entschlie{\ss}ungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {502},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1479-1},
  doi          = {10.1007/S11623-021-1479-1},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21l,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {570--572},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1490-6},
  doi          = {10.1007/S11623-021-1490-6},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21m,
  title        = {Erg{\"{a}}nzende Pr{\"{u}}fungen und Ma{\ss}nahmen trotz
                  neuer EU-Standardvertragsklauseln f{\"{u}}r Datenexporte n{\"{o}}tig},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {9},
  pages        = {578},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1493-3},
  doi          = {10.1007/S11623-021-1493-3},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21n,
  title        = {L{\"{a}}nder{\"{u}}bergreifende Datenschutz-Pr{\"{u}}fung
                  von Medien-Webseiten: Nachbesserungen n{\"{o}}tig},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {648},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1507-1},
  doi          = {10.1007/S11623-021-1507-1},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21o,
  title        = {Kryptographie und Benutzerfreundlichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {698},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1517-z},
  doi          = {10.1007/S11623-021-1517-Z},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21p,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {699--705},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1518-y},
  doi          = {10.1007/S11623-021-1518-Y},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21q,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {706--713},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1519-x},
  doi          = {10.1007/S11623-021-1519-X},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21r,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {713--716},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1520-4},
  doi          = {10.1007/S11623-021-1520-4},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X21r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21s,
  title        = {Berliner Aufsichtsbeh{\"{o}}rde konfrontiert Webseiten-Betreibende
                  mit rechtswidrigem Tracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {720},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1522-2},
  doi          = {10.1007/S11623-021-1522-2},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21t,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {758--764},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1530-2},
  doi          = {10.1007/S11623-021-1530-2},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21u,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {765--772},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1531-1},
  doi          = {10.1007/S11623-021-1531-1},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21v,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {11},
  pages        = {772--776},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1532-0},
  doi          = {10.1007/S11623-021-1532-0},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21w,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {12},
  pages        = {850--852},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1548-5},
  doi          = {10.1007/S11623-021-1548-5},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X21w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ziegler21,
  author       = {Stephanie Ziegler},
  title        = {Typisierte Ma{\ss}nahmenpl{\"{a}}ne f{\"{u}}r IT-Sicherheit
                  im Mittelstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {5},
  pages        = {330--335},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1444-z},
  doi          = {10.1007/S11623-021-1444-Z},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ziegler21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Atug20,
  author       = {Manuel Atug},
  title        = {Zertifizierungen im Kontext KRITIScher Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {668--671},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1346-5},
  doi          = {10.1007/S11623-020-1346-5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Atug20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Baum20,
  author       = {Gerhart Baum},
  title        = {Nachruf auf Burkhard Hirsch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {351--352},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1282-4},
  doi          = {10.1007/S11623-020-1282-4},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Baum20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckat20,
  author       = {Alexander Bleckat},
  title        = {Anwendbarkeit der Datenschutzgrundverordnung auf k{\"{u}}nstliche
                  Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {194--198},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1250-z},
  doi          = {10.1007/S11623-020-1250-Z},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BremertHKP20,
  author       = {Benjamin Bremert and
                  Marit Hansen and
                  Barbara K{\"{o}}rffer and
                  Sven Polenz},
  title        = {Pandemie und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {791--795},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1368-z},
  doi          = {10.1007/S11623-020-1368-Z},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BremertHKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breyer20,
  author       = {Jonas Breyer},
  title        = {Der neue {\textsection} 2 {BORA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {189--193},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1249-5},
  doi          = {10.1007/S11623-020-1249-5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Breyer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {476--484},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1309-x},
  doi          = {10.1007/S11623-020-1309-X},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {544--554},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1322-0},
  doi          = {10.1007/S11623-020-1322-0},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20b,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {685--699},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1351-8},
  doi          = {10.1007/S11623-020-1351-8},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bungeroth20,
  author       = {Christian Bungeroth},
  title        = {Vertrauen in Programme f{\"{u}}r IT-Sicherheit aufbauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {240--244},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1259-3},
  doi          = {10.1007/S11623-020-1259-3},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bungeroth20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ChenHK20,
  author       = {Jihong Chen and
                  Lu Han and
                  Dennis{-}Kenji Kipker},
  title        = {An Introduction into the New Chinese Data Protection Legal Framework},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {52--57},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1222-3},
  doi          = {10.1007/S11623-019-1222-3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ChenHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Coester20,
  author       = {Ulla Coester},
  title        = {Vertrauensw{\"{u}}rdige {KI} - zwischen Anspruch und Wirklichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {245--249},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1260-x},
  doi          = {10.1007/S11623-020-1260-X},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Coester20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterF20,
  author       = {Ulla Coester and
                  Bernd Fuhlert},
  title        = {Gesichtserkennung - eine Frage der Ethik?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {48--51},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1221-4},
  doi          = {10.1007/S11623-019-1221-4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/CoesterF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad20,
  author       = {Conrad Sebastian Conrad},
  title        = {Datenschutz bei Zukunftsmodellen: Nur mit Einwilligung m{\"{o}}glich?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {611--616},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1334-9},
  doi          = {10.1007/S11623-020-1334-9},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DickhautJRL20,
  author       = {Ernestine Dickhaut and
                  Andreas Janson and
                  Alexander Ro{\ss}nagel and
                  Jan Marco Leimeister},
  title        = {Interdisziplin{\"{a}}re Anforderungsmuster f{\"{u}}r smarte
                  pers{\"{o}}nliche Assistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {579--583},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1328-7},
  doi          = {10.1007/S11623-020-1328-7},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DickhautJRL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DickhautTJ20,
  author       = {Ernestine Dickhaut and
                  Laura Friederike Thies and
                  Andreas Janson},
  title        = {Die Kodifizierung von Gestaltungswissen in interdisziplin{\"{a}}ren
                  Entwurfsmustern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {584--588},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1329-6},
  doi          = {10.1007/S11623-020-1329-6},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DickhautTJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix20,
  author       = {Alexander Dix},
  title        = {Die deutsche Corona Warn-App - ein gelungenes Beispiel f{\"{u}}r
                  Privacy by Design?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {779--785},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1366-1},
  doi          = {10.1007/S11623-020-1366-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dix20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DolleHC20,
  author       = {Wilhelm Dolle and
                  Julian Herlinghaus and
                  Marian Corbe},
  title        = {Sinn und Unsinn von Zertifizierungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {641--644},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1340-y},
  doi          = {10.1007/S11623-020-1340-Y},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DolleHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FahrmannA20,
  author       = {Jan F{\"{a}}hrmann and
                  Clemens Arzt},
  title        = {Polizeilicher Umgang mit personenbezogenen Daten in der Corona-Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {801--805},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1370-5},
  doi          = {10.1007/S11623-020-1370-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FahrmannA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerD20,
  author       = {Arno Fiedler and
                  Christian Drews},
  title        = {Vertrauen in der digitalen Welt auf , , Treu und Glauben"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {231--235},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1257-5},
  doi          = {10.1007/S11623-020-1257-5},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20,
  author       = {Dirk Fox},
  title        = {Offene Herausforderungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {81},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1227-y},
  doi          = {10.1007/S11623-020-1227-Y},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20a,
  author       = {Dirk Fox},
  title        = {Beben},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {497},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1312-2},
  doi          = {10.1007/S11623-020-1312-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20b,
  author       = {Dirk Fox},
  title        = {Die Praxis sollte das Ergebnis des Nachdenkens sein. Hermann Hesse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {709},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1353-6},
  doi          = {10.1007/S11623-020-1353-6},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrankB20,
  author       = {Guido Frank and
                  Thomas Becker},
  title        = {Aus dem Nirwana},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {456--461},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1305-1},
  doi          = {10.1007/S11623-020-1305-1},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FrankB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FreyeKEM20,
  author       = {Merle Freye and
                  Dennis{-}Kenji Kipker and
                  Rindstone B. Ezekiel and
                  Doreen F. Mwamlangala},
  title        = {Strengthening protection of personal data in the health sector: a
                  comparative analysis of the Tanzanian and German eHealth system},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {393--397},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1291-3},
  doi          = {10.1007/S11623-020-1291-3},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FreyeKEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrickeL20,
  author       = {Frank Fricke and
                  Philipp L{\"{o}}hr},
  title        = {Datenschutzrechtliche Zul{\"{a}}ssigkeitspr{\"{u}}fungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {169--171},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1245-9},
  doi          = {10.1007/S11623-020-1245-9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FrickeL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn20,
  author       = {Christian L. Geminn},
  title        = {Betroffenenrechte verbessern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {307--311},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1273-5},
  doi          = {10.1007/S11623-020-1273-5},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Geminn20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeminnSWAV20,
  author       = {Christian L. Geminn and
                  Jessica M. Szczuka and
                  Carina Weber and
                  Andr{\'{e}} Artelt and
                  Lina Varonina},
  title        = {Kinder als Nutzende smarter Sprachassistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {606--610},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1333-x},
  doi          = {10.1007/S11623-020-1333-X},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GeminnSWAV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingGHP20,
  author       = {Rainer W. Gerling and
                  Sebastian Gerling and
                  Stefan Hessel and
                  Ronald Petrlic},
  title        = {Stand der Technik bei Videokonferenzen - und die Interpretation der
                  Aufsichtsbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {740--747},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1359-0},
  doi          = {10.1007/S11623-020-1359-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlingGHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Glatzner20,
  author       = {Florian Glatzner},
  title        = {Profilbildung und algorithmenbasierte Entscheidungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {312--315},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1274-4},
  doi          = {10.1007/S11623-020-1274-4},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Glatzner20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GohrKS20,
  author       = {Aron Gohr and
                  Dominik Klein and
                  Werner Schindler},
  title        = {Verr{\"{a}}terischer Stromverbrauch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {431--435},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1300-6},
  doi          = {10.1007/S11623-020-1300-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GohrKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gomez-BarreroKB20,
  author       = {Marta Gomez{-}Barrero and
                  Jascha Kolberg and
                  Christoph Busch},
  title        = {Erkennung von Pr{\"{a}}sentationsangriffen auf Fingerabdruck
                  Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {26--31},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1217-0},
  doi          = {10.1007/S11623-019-1217-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gomez-BarreroKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grafenstein20,
  author       = {Max von Grafenstein},
  title        = {Innovationsoffener Datenschutz durch Folgenabsch{\"{a}}tzungen
                  und Technikgestaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {172--175},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1246-8},
  doi          = {10.1007/S11623-020-1246-8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Grafenstein20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichK20,
  author       = {Ludwig Gramlich and
                  Kerstin Kreul},
  title        = {Novellierung des Post-Datenschutzes in Deutschland},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {469--474},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1307-z},
  doi          = {10.1007/S11623-020-1307-Z},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grethel20,
  author       = {Monika Grethel},
  title        = {Einsatz von WhatsApp durch saarl{\"{a}}ndische Kommunen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {148},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1240-1},
  doi          = {10.1007/S11623-020-1240-1},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Grethel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrubeHSS20,
  author       = {Tim Grube and
                  Alexander Heinrich and
                  Jan{-}Philipp Stroscher and
                  Sabrina Schomberg},
  title        = {Datensicherheit von Corona-Apps nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {501--505},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1314-0},
  doi          = {10.1007/S11623-020-1314-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrubeHSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber20,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {492--496},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1311-3},
  doi          = {10.1007/S11623-020-1311-3},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GuhrKM20,
  author       = {Alisha G{\"{u}}hr and
                  Irene Karper and
                  S{\"{o}}nke Maseberg},
  title        = {Der lange Weg zur Akkreditierung nach Art. 42 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {649--653},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1342-9},
  doi          = {10.1007/S11623-020-1342-9},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GuhrKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Haas20,
  author       = {Werner Haas},
  title        = {Sicherheit auf Sand gebaut?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {441--445},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1302-4},
  doi          = {10.1007/S11623-020-1302-4},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Haas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HamacherKKS20,
  author       = {Kay Hamacher and
                  Stefan Katzenbeisser and
                  Tobias Kussel and
                  Sebastian Stammler},
  title        = {Genomische Daten und der Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {87--93},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1229-9},
  doi          = {10.1007/S11623-020-1229-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HamacherKKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeckmannST20,
  author       = {Benjamin Heckmann and
                  Florian Schweighart and
                  Markus Tasch},
  title        = {{JOINED-VIV:} Umsetzung der {DSGVO} mittels {SDM} und unter Einbindung
                  des {BSI} IT-Grundschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {663--667},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1345-6},
  doi          = {10.1007/S11623-020-1345-6},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeckmannST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henniger20,
  author       = {Olaf Henniger},
  title        = {Neue Normen f{\"{u}}r biometrische Datenaustauschformate},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {43--47},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1220-5},
  doi          = {10.1007/S11623-019-1220-5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Henniger20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HesselP20,
  author       = {Stefan Hessel and
                  Karin Potel},
  title        = {Zur Notwendigkeit einer Data Breach Notification bei Datentr{\"{a}}gerverschl{\"{u}}sselung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {94--97},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1230-3},
  doi          = {10.1007/S11623-020-1230-3},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HesselP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeuftF20,
  author       = {Matthias Heuft and
                  Dirk Feldhusen},
  title        = {Angriffe auf Chips in Reisep{\"{a}}ssen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {436--440},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1301-5},
  doi          = {10.1007/S11623-020-1301-5},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeuftF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HobertB20,
  author       = {Sebastian Hobert and
                  Florian Berens},
  title        = {Chatbot-basierte Lernsysteme als k{\"{u}}nstliche Tutoren in
                  der Lehre},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {594--599},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1331-z},
  doi          = {10.1007/S11623-020-1331-Z},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HobertB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HobertB20a,
  author       = {Sebastian Hobert and
                  Florian Berens},
  title        = {Chatbot-basierte Lernsysteme alsk{\"{u}}nstliche Tutoren in der
                  Lehre},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {600--605},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1332-y},
  doi          = {10.1007/S11623-020-1332-Y},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HobertB20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenP20,
  author       = {Thomas Hoeren and
                  Stefan Pinelli},
  title        = {Datenschutz im neuen chinesischen Zivilgesetzbuch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {678--680},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1348-3},
  doi          = {10.1007/S11623-020-1348-3},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoerenP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JahnelGW20,
  author       = {Tina Jahnel and
                  Ansgar Gerhardus and
                  Julian Wienert},
  title        = {Digitales Contact Tracing: Dilemma zwischen Datenschutz und Public
                  Health Nutzenbewertung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {786--790},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1367-0},
  doi          = {10.1007/S11623-020-1367-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JahnelGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JaspersJ20,
  author       = {Andreas Jaspers and
                  Tobias Jacquemain},
  title        = {Datenschutz-Grundverordnung - Praxiserfahrungen und Evaluation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {297--301},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1271-7},
  doi          = {10.1007/S11623-020-1271-7},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JaspersJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jelinek20,
  author       = {Andrea Jelinek},
  title        = {{FAQ} on the judgment of the Court of Justice of the European Union
                  in Case {C-311/18} - Data Protection Commissioner v Facebook Ireland
                  Ltd and Maximillian Schrems},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {681--683},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1349-2},
  doi          = {10.1007/S11623-020-1349-2},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jelinek20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JohnW20,
  author       = {Nicolas John and
                  Maximilian Wellmann},
  title        = {Datenschutzrechtliche Fragestellungen zur Auswahl von Videokonferenztools},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {506--510},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1315-z},
  doi          = {10.1007/S11623-020-1315-Z},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JohnW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20,
  author       = {Ulrich Kelber},
  title        = {BfDI verh{\"{a}}ngt Geldbu{\ss}en gegen Telekommunikationsdienstleister},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {85--86},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1228-x},
  doi          = {10.1007/S11623-020-1228-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20a,
  author       = {Ulrich Kelber},
  title        = {Nicht Daten sind der Rohstoff des 21. Jahrhunderts, sondern Vertrauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {226--227},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1255-7},
  doi          = {10.1007/S11623-020-1255-7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20b,
  author       = {Ulrich Kelber},
  title        = {BfDI zu Folgen der Gesetzgebung des {PDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {640},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1339-4},
  doi          = {10.1007/S11623-020-1339-4},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker20,
  author       = {Dennis{-}Kenji Kipker},
  title        = {{EU} Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {263--265},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1264-6},
  doi          = {10.1007/S11623-020-1264-6},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker20a,
  author       = {Dennis{-}Kenji Kipker},
  title        = {{EU} Cybersecurity Act and Certification Schemes: an up-to-date progress
                  report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {390--392},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1290-4},
  doi          = {10.1007/S11623-020-1290-4},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerB20,
  author       = {Dennis{-}Kenji Kipker and
                  Benedikt Buchner},
  title        = {Digitale Herausforderungen der Corona-Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {773--775},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1364-3},
  doi          = {10.1007/S11623-020-1364-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klink-StraubS20,
  author       = {Judith Klink{-}Straub and
                  Tobias Straub},
  title        = {Der Auskunftsanspruch bei Pr{\"{u}}fungsunterlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {672--677},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1347-4},
  doi          = {10.1007/S11623-020-1347-4},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Klink-StraubS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KnieperT20,
  author       = {Thomas Knieper and
                  Marie{-}Theres Tinnefeld},
  title        = {Politische Satiren und Karikaturen - eine Bastion offener Demokratien?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {375--380},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1287-z},
  doi          = {10.1007/S11623-020-1287-Z},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KnieperT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KnuchelE20,
  author       = {Christian Knuchel and
                  Nico Ebert},
  title        = {DSGVO-konformes L{\"{o}}schen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {126--127},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1235-y},
  doi          = {10.1007/S11623-020-1235-Y},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KnuchelE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KochPW20,
  author       = {Manuel Koch and
                  Andrea Pawils and
                  Enrico Weide},
  title        = {Das Standard-Datenschutzmodell in der Telematikinfrastruktur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {104--110},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1232-1},
  doi          = {10.1007/S11623-020-1232-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KochPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Krasemann20,
  author       = {Henry Krasemann},
  title        = {Der aktuelle Stand der Datenschutz- Zertifizierung und Akkreditierung
                  in Deutschland und Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {645--648},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1341-x},
  doi          = {10.1007/S11623-020-1341-X},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Krasemann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20,
  author       = {Dieter Kugelmann},
  title        = {Kann und darf das Handy gegen Corona helfen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {350},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1281-5},
  doi          = {10.1007/S11623-020-1281-5},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20a,
  author       = {Dieter Kugelmann},
  title        = {Rolle, Strategien, Aktionsplan 2020},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {430},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1299-8},
  doi          = {10.1007/S11623-020-1299-8},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20b,
  author       = {Dieter Kugelmann},
  title        = {Neue Welle von Schadsoftware - Anstieg von Datenpannen in diesen Tagen
                  aufgrund von Phishing Mails},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {500},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1313-1},
  doi          = {10.1007/S11623-020-1313-1},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugler20,
  author       = {Dennis K{\"{u}}gler},
  title        = {Expedition in den Nanokosmos},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {425},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1297-x},
  doi          = {10.1007/S11623-020-1297-X},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugler20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuglerR20,
  author       = {Dennis K{\"{u}}gler and
                  Helmut Reimer},
  title        = {Was tun? Sicherheitsl{\"{u}}cken in Hardware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {475},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1308-y},
  doi          = {10.1007/S11623-020-1308-Y},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KuglerR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling20,
  author       = {J{\"{u}}rgen K{\"{u}}hling},
  title        = {Privatheit am Arbeitsplatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {182--188},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1248-6},
  doi          = {10.1007/S11623-020-1248-6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kuhling20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KusS20,
  author       = {Mehmet Kus and
                  Karsten Sohr},
  title        = {Praktische Erfahrungen und Ans{\"{a}}tze f{\"{u}}r {\^{a}}Security
                  by Design' auf Basis der STRIDE-Methodik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {750--754},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1361-6},
  doi          = {10.1007/S11623-020-1361-6},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KusS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Labusga20,
  author       = {Jan{-}Hendrik Labusga},
  title        = {Die Fristberechnung beim Data Breach},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {735--739},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1358-1},
  doi          = {10.1007/S11623-020-1358-1},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Labusga20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lower20,
  author       = {Daniel L{\"{o}}wer},
  title        = {Vertrauen im E-Commerce},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {236--239},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1258-4},
  doi          = {10.1007/S11623-020-1258-4},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lower20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierFW20,
  author       = {Dominik Christian Maier and
                  Fabian Franzen and
                  Manuela Wagner},
  title        = {Mehr schlecht als Recht: Grauzone Sicherheitsforschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {511--517},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1316-y},
  doi          = {10.1007/S11623-020-1316-Y},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MaierFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MargrafB20,
  author       = {Marian Margraf and
                  Nicolas Buchmann},
  title        = {Gew{\"{a}}hrleistung langfristiger Sicherheit f{\"{u}}r
                  Breeder-Dokumente durch Biometrie und Blockchain-Technologie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {32--37},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1218-z},
  doi          = {10.1007/S11623-019-1218-Z},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MargrafB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Martin20,
  author       = {Nicholas Martin},
  title        = {Corona-Eind{\"{a}}mmung in Taiwan},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {815--818},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1373-2},
  doi          = {10.1007/S11623-020-1373-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Martin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinMSFH20,
  author       = {Nicholas Martin and
                  Britta Alexandra Mester and
                  Ina Schiering and
                  Michael Friedewald and
                  Dara Hallinan},
  title        = {Datenschutz-Folgenabsch{\"{a}}tzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {149--153},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1241-0},
  doi          = {10.1007/S11623-020-1241-0},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MartinMSFH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinSF20,
  author       = {Nicholas Martin and
                  Ina Schiering and
                  Michael Friedewald},
  title        = {Methoden der Datenschutz-Folgenabsch{\"{a}}tzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {154--160},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1242-z},
  doi          = {10.1007/S11623-020-1242-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MartinSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MayerBDSV20,
  author       = {Peter Mayer and
                  Fabian Ballreich and
                  Reyhan D{\"{u}}zg{\"{u}}n and
                  Christian Schwartz and
                  Melanie Volkamer},
  title        = {Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {522--527},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1318-9},
  doi          = {10.1007/S11623-020-1318-9},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MayerBDSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MerkleRSB20,
  author       = {Johannes Merkle and
                  Christian Rathgeb and
                  Ulrich Scherhag and
                  Christoph Busch},
  title        = {Morphing-Angriffe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {38--42},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1219-y},
  doi          = {10.1007/S11623-019-1219-Y},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MerkleRSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester20,
  author       = {Britta Alexandra Mester},
  title        = {Datenschutz-Folgenabsch{\"{a}}tzung - Chance des Datenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {145},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1239-7},
  doi          = {10.1007/S11623-020-1239-7},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mester20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Miller20,
  author       = {Felix Miller},
  title        = {Root-of-Trust-Architekturen als Open-Source-Hardware und deren Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {451--455},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1304-2},
  doi          = {10.1007/S11623-020-1304-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Miller20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NagelePS20,
  author       = {Peter N{\"{a}}gele and
                  Ronald Petrlic and
                  Frank Schemmel},
  title        = {Die Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {719--728},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1356-3},
  doi          = {10.1007/S11623-020-1356-3},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/NagelePS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen20,
  author       = {Kim Nguyen},
  title        = {Vertrauen ist die Basis f{\"{u}}r Digitale Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {221},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1253-9},
  doi          = {10.1007/S11623-020-1253-9},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen20a,
  author       = {Kim Nguyen},
  title        = {Der Lebenszyklus von Souver{\"{a}}nit{\"{a}}t und Vertrauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {228--230},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1256-6},
  doi          = {10.1007/S11623-020-1256-6},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Niekrenz20,
  author       = {Elisabeth Niekrenz},
  title        = {E-Evidence-Verordnung: Datenzugriff durch Strafverfolgungbeh{\"{o}}rden
                  aus dem Ausland?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {535--536},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1320-2},
  doi          = {10.1007/S11623-020-1320-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Niekrenz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel20,
  author       = {Maurice Oettel},
  title        = {Smart Human und der Schutz der Gedanken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {386--389},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1289-x},
  doi          = {10.1007/S11623-020-1289-X},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Oettel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel20a,
  author       = {Maurice Oettel},
  title        = {Datensparsame Daten{\"{u}}bertragbarkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {819--823},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1374-1},
  doi          = {10.1007/S11623-020-1374-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Oettel20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri20,
  author       = {Thomas Petri},
  title        = {Rechtsprechung zur {DSGVO} in den Jahren 2019 - 2020 - eine Auswahl},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {810--814},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1372-3},
  doi          = {10.1007/S11623-020-1372-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollmann20,
  author       = {Maren Pollmann},
  title        = {Weltweites Vergessenwerden? Zur r{\"{a}}umlichen Reichweite des
                  Rechts auf Auslistung bei Suchmaschinen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {365--368},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1285-1},
  doi          = {10.1007/S11623-020-1285-1},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pollmann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PrietzRS20,
  author       = {Christian Prietz and
                  Martin Rost and
                  Julia Stoll},
  title        = {Pr{\"{u}}fverfahren zur datenschutzrechtlichen Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {654--658},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1343-8},
  doi          = {10.1007/S11623-020-1343-8},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PrietzRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rathgeb20,
  author       = {Christian Rathgeb},
  title        = {Neue Herausforderungen f{\"{u}}r biometrische Technologien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1211-6},
  doi          = {10.1007/S11623-019-1211-6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rathgeb20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20,
  author       = {Helmut Reimer},
  title        = {Der Unterschied},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {429},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1298-9},
  doi          = {10.1007/S11623-020-1298-9},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {485--491},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1310-4},
  doi          = {10.1007/S11623-020-1310-4},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20b,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {555--564},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1323-z},
  doi          = {10.1007/S11623-020-1323-Z},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20c,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {700--708},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1352-7},
  doi          = {10.1007/S11623-020-1352-7},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW20,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {Datenschutz in Krisenzeiten oder Krise des Datenschutzes?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {684},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1350-9},
  doi          = {10.1007/S11623-020-1350-9},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reinhardt20,
  author       = {J{\"{o}}rn Reinhardt},
  title        = {, , Recht auf Vergessen" auf Franz{\"{o}}sisch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {361--364},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1284-2},
  doi          = {10.1007/S11623-020-1284-2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reinhardt20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RiebeHDLRFR20,
  author       = {Thea Riebe and
                  Jasmin Haunschild and
                  Felix Divo and
                  Matthias Lang and
                  Gerbert Roitburd and
                  Jonas Franken and
                  Christian Reuter},
  title        = {Die Vorratsdatenspeicherung in Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {316--321},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1275-3},
  doi          = {10.1007/S11623-020-1275-3},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RiebeHDLRFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Roosendaal20,
  author       = {Arnold Roosendaal},
  title        = {DPIAs in practice - a strategic instrument for compliance},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {166--168},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1244-x},
  doi          = {10.1007/S11623-020-1244-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Roosendaal20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Evaluation nutzen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {281--283},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1267-3},
  doi          = {10.1007/S11623-020-1267-3},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Evaluation der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {287--292},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1269-1},
  doi          = {10.1007/S11623-020-1269-1},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20b,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Smarte Pers{\"{o}}nliche Assistenten gestalten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {565--566},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1324-y},
  doi          = {10.1007/S11623-020-1324-Y},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RostW20,
  author       = {Martin Rost and
                  Sebastian Welke},
  title        = {{SDM} 2.0 und {ITIL} 4 , , verschr{\"{a}}nkt"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {258--262},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1263-7},
  doi          = {10.1007/S11623-020-1263-7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RostW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchieringMFMS20,
  author       = {Ina Schiering and
                  Britta Alexandra Mester and
                  Michael Friedewald and
                  Nicholas Martin},
  title        = {Datenschutz-Risiken partizipativ identifizieren und analysieren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {161--165},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1243-y},
  doi          = {10.1007/S11623-020-1243-Y},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchieringMFMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlegel20,
  author       = {Daniela Schlegel},
  title        = {Vertrauenskrise in die digitale Welt?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {254--257},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1262-8},
  doi          = {10.1007/S11623-020-1262-8},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schlegel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schleipfer20,
  author       = {Stefan Schleipfer},
  title        = {Ende-zu-Ende-Verschl{\"{u}}sselung von E-Mails},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {748--749},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1360-7},
  doi          = {10.1007/S11623-020-1360-7},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schleipfer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe20,
  author       = {Maximilian Schnebbe},
  title        = {Digitale Assistenzsysteme in der Industrie und Produktion},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {398--400},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1292-2},
  doi          = {10.1007/S11623-020-1292-2},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnebbe20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS20,
  author       = {Dominik Schrahe and
                  Thomas St{\"{a}}dter},
  title        = {Gesundheits-Apps auf Rezept und Forschung mit Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {713--718},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1355-4},
  doi          = {10.1007/S11623-020-1355-4},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchraheS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulteW20,
  author       = {Laura Schulte and
                  Tim Wambach},
  title        = {Zielkonflikte zwischen Datenschutz und IT-Sicherheit im Kontext der
                  Aufkl{\"{a}}rung von Sicherheitsvorf{\"{a}}llen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {462--468},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1306-0},
  doi          = {10.1007/S11623-020-1306-0},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchulteW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz20,
  author       = {Sebastian Schulz},
  title        = {Die Evaluation der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {302--306},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1272-6},
  doi          = {10.1007/S11623-020-1272-6},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schulz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seiter20,
  author       = {Stefan R. Seiter},
  title        = {Wer bestimmt {\"{u}}ber uns?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {571},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1325-x},
  doi          = {10.1007/S11623-020-1325-X},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Seiter20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sleiman20,
  author       = {Mohamed Bou Sleiman},
  title        = {Das Corona-Virus - Ein Katalysator f{\"{u}}r Cyberkriminalit{\"{a}}t?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {806--809},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1371-4},
  doi          = {10.1007/S11623-020-1371-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Sleiman20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Smoltczyk20,
  author       = {Maja Smoltczyk},
  title        = {Nach "Schrems II": Europa braucht digitale Eigenst{\"{a}}ndigkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {572},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1326-9},
  doi          = {10.1007/S11623-020-1326-9},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Smoltczyk20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SowaR20,
  author       = {Aleksandra Sowa and
                  Martin Rost},
  title        = {Die {ISO} 27701 und das {SDM-V2} im Lichte der Umsetzung der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {659--662},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1344-7},
  doi          = {10.1007/S11623-020-1344-7},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SowaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SpeithBEPP20,
  author       = {Julian Speith and
                  Steffen Becker and
                  Maik Ender and
                  Endres Puschner and
                  Christof Paar},
  title        = {Hardware-Trojaner},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {446--450},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1303-3},
  doi          = {10.1007/S11623-020-1303-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Streinz20,
  author       = {Rudolf Streinz},
  title        = {, , Recht auf Vergessenwerden" zwischen Unionsrecht und Verfassungsrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {353--360},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1283-3},
  doi          = {10.1007/S11623-020-1283-3},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Streinz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TamsS20,
  author       = {Benjamin Tams and
                  Michael Schwaiger},
  title        = {Die Bedeutung qualit{\"{a}}tsgesicherter biometrischer Daten
                  f{\"{u}}r das {EU} Einreise-/Ausreisesystem {(EES)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {23--25},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1216-1},
  doi          = {10.1007/S11623-019-1216-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TamsS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThielT20,
  author       = {Christoph Thiel and
                  Christian Thiel},
  title        = {Distributed Ledger Technologie {(DLT)} im Kontext europ{\"{a}}ischer
                  Vertrauensdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {250--253},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1261-9},
  doi          = {10.1007/S11623-020-1261-9},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ThielT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThiesDJRL020,
  author       = {Laura Friederike Thies and
                  Ernestine Dickhaut and
                  Andreas Janson and
                  Alexander Ro{\ss}nagel and
                  Jan Marco Leimeister and
                  Matthias S{\"{o}}llner},
  title        = {Die Simulationsstudie als Evaluationsmethode},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {589--593},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1330-0},
  doi          = {10.1007/S11623-020-1330-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ThiesDJRL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThiesJK020,
  author       = {Laura Friederike Thies and
                  Silke Jandt and
                  Robin Knote and
                  Matthias S{\"{o}}llner},
  title        = {Konflikt{\"{a}}re Anforderungen an smarte pers{\"{o}}nliche
                  Assistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {573--578},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1327-8},
  doi          = {10.1007/S11623-020-1327-8},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ThiesJK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld20,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Die Bedeutung von Informanten f{\"{u}}r Presse und Demokratie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {381--385},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1288-y},
  doi          = {10.1007/S11623-020-1288-Y},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB20,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Gundrechtliche Freiheiten in St{\"{o}}rf{\"{a}}llen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {345--346},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1280-6},
  doi          = {10.1007/S11623-020-1280-6},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TolsdorfBDFS20,
  author       = {Jan Tolsdorf and
                  Christian K. Bosse and
                  Aljoscha Dietrich and
                  Denis Feth and
                  Hartmut Schmitt},
  title        = {Privatheit am Arbeitsplatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {176--181},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1247-7},
  doi          = {10.1007/S11623-020-1247-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TolsdorfBDFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TonnissenT20,
  author       = {Stefan T{\"{o}}nnissen and
                  Frank Teuteberg},
  title        = {{DSGVO} und die Blockchain},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {322--327},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1276-2},
  doi          = {10.1007/S11623-020-1276-2},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TonnissenT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TwickelBB20,
  author       = {Arndt von Twickel and
                  Jennifer Breuer and
                  Ralph Breithaupt},
  title        = {Vereinbarkeit von Biometrieforschung und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {9--15},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1214-3},
  doi          = {10.1007/S11623-019-1214-3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TwickelBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Uhl20,
  author       = {Andreas Uhl},
  title        = {Venen Biometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {16--22},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1215-2},
  doi          = {10.1007/S11623-019-1215-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Uhl20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ulmenstein20,
  author       = {Ulrich Freiherr von Ulmenstein},
  title        = {Datensouver{\"{a}}nit{\"{a}}t durch repr{\"{a}}sentative
                  Rechtswahrnehmung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {528--534},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1319-8},
  doi          = {10.1007/S11623-020-1319-8},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ulmenstein20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese20,
  author       = {Sven Venzke{-}Caprarese},
  title        = {Zur Praxistauglichkeit des Datenschutzes in der digitalen Kommunikation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {796--800},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1369-y},
  doi          = {10.1007/S11623-020-1369-Y},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke-Caprarese20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VogelgesangMS20,
  author       = {Stephanie Vogelgesang and
                  Frederik M{\"{o}}llers and
                  Tim Schneider},
  title        = {Strafrechtliche Relevanz von AdCloaking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {537--543},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1321-1},
  doi          = {10.1007/S11623-020-1321-1},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VogelgesangMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerH20,
  author       = {Melanie Volkamer and
                  Tobias Hilt},
  title        = {Sensibilisierung f{\"{u}}r Phishing und andere betr{\"{u}}gerische
                  Nachrichten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {121--125},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1234-z},
  doi          = {10.1007/S11623-020-1234-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VolkamerH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerSB20,
  author       = {Melanie Volkamer and
                  Martina Angela Sasse and
                  Franziska Boehm},
  title        = {Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {518--521},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1317-x},
  doi          = {10.1007/S11623-020-1317-X},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VolkamerSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner20,
  author       = {Manuela Wagner},
  title        = {IT-Sicherheitsforschung in rechtlicher Grauzone},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {111--120},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1233-0},
  doi          = {10.1007/S11623-020-1233-0},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener20,
  author       = {Christoph Wegener},
  title        = {Papier ist geduldig},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {637},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1338-5},
  doi          = {10.1007/S11623-020-1338-5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert20,
  author       = {Thilo Weichert},
  title        = {Die DSGVO, ein - ganz guter - Anfang},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {293--296},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1270-8},
  doi          = {10.1007/S11623-020-1270-8},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weik20,
  author       = {Ramona Weik},
  title        = {Die Datenkopie nach Artikel 15 Abs. 3 {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {98--103},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1231-2},
  doi          = {10.1007/S11623-020-1231-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Weik20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeikD20,
  author       = {Ramona Weik and
                  Andreas Diehl},
  title        = {Die Beantwortung von Auskunftsersuchen nach Art. 15 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {729--734},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1357-2},
  doi          = {10.1007/S11623-020-1357-2},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeikD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Will20,
  author       = {Michael Will},
  title        = {Brauchen wir eine Zentralisierung der Datenschutzaufsicht?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {369--374},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1286-0},
  doi          = {10.1007/S11623-020-1286-0},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Will20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20,
  title        = {Trickkiste Biometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {5},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1212-5},
  doi          = {10.1007/S11623-019-1212-5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20a,
  title        = {{DSK:} Standard-Datenschutzmodell {V2}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {6--8},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1213-4},
  doi          = {10.1007/S11623-019-1213-4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20aa,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {764--772},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1363-4},
  doi          = {10.1007/S11623-020-1363-4},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ab,
  title        = {Bewertung der {DSK} zu MS-Office 365: Nachbesserungen geboten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {778},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1365-2},
  doi          = {10.1007/S11623-020-1365-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ac,
  title        = {Cyber-Sicherheitsstrategie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {824},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1375-0},
  doi          = {10.1007/S11623-020-1375-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ad,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {825--834},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1376-z},
  doi          = {10.1007/S11623-020-1376-Z},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ae,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {835--841},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1377-y},
  doi          = {10.1007/S11623-020-1377-Y},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20af,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {841--844},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1378-x},
  doi          = {10.1007/S11623-020-1378-X},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20b,
  title        = {98. {DSK} Trier, 06. - 07. November 2019, Entschlie{\ss}ungen und
                  Empfehlungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {58--60},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1223-2},
  doi          = {10.1007/S11623-019-1223-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20c,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {61--71},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1224-1},
  doi          = {10.1007/S11623-019-1224-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20d,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {72--77},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1225-0},
  doi          = {10.1007/S11623-019-1225-0},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20e,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {77--80},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1226-z},
  doi          = {10.1007/S11623-019-1226-Z},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20f,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {128--133},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1236-x},
  doi          = {10.1007/S11623-020-1236-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20g,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {134--140},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1237-9},
  doi          = {10.1007/S11623-020-1237-9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20h,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {141--144},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1238-8},
  doi          = {10.1007/S11623-020-1238-8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20i,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {199--211},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1251-y},
  doi          = {10.1007/S11623-020-1251-Y},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20j,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {212--220},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1252-x},
  doi          = {10.1007/S11623-020-1252-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20k,
  title        = {Vorsicht - Glatteis!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {225},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1254-8},
  doi          = {10.1007/S11623-020-1254-8},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20l,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {266--271},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1265-5},
  doi          = {10.1007/S11623-020-1265-5},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20m,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {272--280},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1266-4},
  doi          = {10.1007/S11623-020-1266-4},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20n,
  title        = {Datenschutzrechtliche Informationen im Zusammenhang mit der Corona-Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {286},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1268-2},
  doi          = {10.1007/S11623-020-1268-2},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20o,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {328--334},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1277-1},
  doi          = {10.1007/S11623-020-1277-1},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20p,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {335--340},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1278-0},
  doi          = {10.1007/S11623-020-1278-0},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20q,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {341--344},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1279-z},
  doi          = {10.1007/S11623-020-1279-Z},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20r,
  title        = {K{\"{u}}ndigung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {401},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1293-1},
  doi          = {10.1007/S11623-020-1293-1},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20s,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {402--412},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1294-0},
  doi          = {10.1007/S11623-020-1294-0},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20t,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {413--421},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1295-z},
  doi          = {10.1007/S11623-020-1295-Z},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20u,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {421--424},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1296-y},
  doi          = {10.1007/S11623-020-1296-Y},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20v,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {617--625},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1335-8},
  doi          = {10.1007/S11623-020-1335-8},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20w,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {626--632},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1336-7},
  doi          = {10.1007/S11623-020-1336-7},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20x,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {632--636},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1337-6},
  doi          = {10.1007/S11623-020-1337-6},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20y,
  title        = {Registermodernisierung verfassungskonform umsetzen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {712},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1354-5},
  doi          = {10.1007/S11623-020-1354-5},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20z,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {755--763},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1362-5},
  doi          = {10.1007/S11623-020-1362-5},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AchenbachK19,
  author       = {Dirk Achenbach and
                  Stefan Krebs},
  title        = {Pilotprojekt Cyberwehr Baden-W{\"{u}}rttemberg},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {719--722},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1195-2},
  doi          = {10.1007/S11623-019-1195-2},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AchenbachK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AhmadHK19,
  author       = {Jawad Ahmad and
                  Detlef H{\"{u}}hnlein and
                  Ulrike Korte},
  title        = {Sichere Digitalisierung mit {TR-RESISCAN} und {TR-ESOR}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {203--208},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1093-7},
  doi          = {10.1007/S11623-019-1093-7},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AhmadHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Aretz19,
  author       = {Christian Aretz},
  title        = {Meine Daten, meine Kontrolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {13--16},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1053-2},
  doi          = {10.1007/S11623-019-1053-2},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Aretz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AuerbachSKT19,
  author       = {Benedikt Auerbach and
                  Mary Shnayien and
                  Eike Kiltz and
                  Anna Tuschling},
  title        = {Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {706--712},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1193-4},
  doi          = {10.1007/S11623-019-1193-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AuerbachSKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeckerWPR19,
  author       = {Steffen Becker and
                  Carina Wiesen and
                  Christof Paar and
                  Nikol Rummel},
  title        = {Wie arbeiten Reverse Engineers?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {686--690},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1190-7},
  doi          = {10.1007/S11623-019-1190-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BeckerWPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Beissel19,
  author       = {Stefan Bei{\ss}el},
  title        = {Evaluation von Security-Awareness-Ma{\ss}nahmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {287--291},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1109-3},
  doi          = {10.1007/S11623-019-1109-3},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Beissel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BenderMR19,
  author       = {Jens Bender and
                  Bj{\"{o}}rn Metzler and
                  Niels R{\"{a}}th},
  title        = {Neues vom Online-Ausweis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {194--197},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1091-9},
  doi          = {10.1007/S11623-019-1091-9},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BenderMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann19,
  author       = {Dominik Bleckmann},
  title        = {Anforderungen der Datenschutz-Grundverordnung an Labore},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {137--142},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1080-z},
  doi          = {10.1007/S11623-019-1080-Z},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BleckmannFHS19,
  author       = {Felix Bleckmann and
                  Guido Frank and
                  Michael Hoppe and
                  Thomas Schnattinger},
  title        = {Notifizierung von eID-Systemen gem{\"{a}}{\ss} eIDAS},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {189--193},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1090-x},
  doi          = {10.1007/S11623-019-1090-X},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BleckmannFHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Block19,
  author       = {Helga Block},
  title        = {Technische Anforderungen an technische und organisatorische Ma{\ss}nahmen
                  beim E-Mail-Versand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {64},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1064-z},
  doi          = {10.1007/S11623-019-1064-Z},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Block19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boehme-Nessler19,
  author       = {Volker Boehme{-}Ne{\ss}ler},
  title        = {Gl{\"{a}}serne Prostituierte?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {342--346},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1119-1},
  doi          = {10.1007/S11623-019-1119-1},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Boehme-Nessler19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BonninghoffHKKN19,
  author       = {Benedikt T. B{\"{o}}nninghoff and
                  Steffen Hessler and
                  Dorothea Kolossa and
                  Kerstin Kucharczik and
                  Robert M. Nickel and
                  Karin Pittner},
  title        = {Autorschaftsanalyse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {691--699},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1191-6},
  doi          = {10.1007/S11623-019-1191-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BonninghoffHKKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BorellS19,
  author       = {Anne Borell and
                  Stephan Schindler},
  title        = {Polizei und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {767--773},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1203-6},
  doi          = {10.1007/S11623-019-1203-6},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BorellS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunSHM19,
  author       = {Daniel Braun and
                  Elena Scepankova and
                  Patrick Holl and
                  Florian Matthes},
  title        = {The Potential of Customer-Centered LegalTech},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {760--766},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1202-7},
  doi          = {10.1007/S11623-019-1202-7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BraunSHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BrendelG19,
  author       = {Jacqueline Brendel and
                  Nina Gerber},
  title        = {Sichere Instant Messaging Apps},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {276--280},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1107-5},
  doi          = {10.1007/S11623-019-1107-5},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BrendelG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BreyerD19,
  author       = {Jonas Breyer and
                  Sven Duensing},
  title        = {Haftpflicht-Versicherungsschutz f{\"{u}}r Datenschutzbeauftragte
                  nach der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {86--89},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1069-7},
  doi          = {10.1007/S11623-019-1069-7},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BreyerD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuchmannE19,
  author       = {Erik Buchmann and
                  Susanne Eichhorn},
  title        = {Auskunftsersuchen nach Art. 15 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {65--70},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1065-y},
  doi          = {10.1007/S11623-019-1065-Y},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BuchmannE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner19,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {234--242},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1099-1},
  doi          = {10.1007/S11623-019-1099-1},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner19a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {723--731},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1196-1},
  doi          = {10.1007/S11623-019-1196-1},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner19b,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {793--800},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1208-1},
  doi          = {10.1007/S11623-019-1208-1},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buttarelli19,
  author       = {Giovanni Buttarelli},
  title        = {{EDPS} calls for closer alignment between consumer and data protection
                  rules in the {EU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {6},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1051-4},
  doi          = {10.1007/S11623-019-1051-4},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buttarelli19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad19,
  author       = {Conrad Sebastian Conrad},
  title        = {Freelancer als Auftragsverarbeiter?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {134--136},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1079-5},
  doi          = {10.1007/S11623-019-1079-5},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad19a,
  author       = {Conrad Sebastian Conrad},
  title        = {Die Verantwortlichkeit in der Realit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {563--568},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1164-9},
  doi          = {10.1007/S11623-019-1164-9},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DammF19,
  author       = {Frank Damm and
                  Hans{-}Peter Fischer},
  title        = {Lieferkette: Wie Cyber-Security von ad{\"{a}}quater Zusammenarbeit
                  abh{\"{a}}ngt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {418--425},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1137-z},
  doi          = {10.1007/S11623-019-1137-Z},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DammF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DeiningerMB19,
  author       = {Axel Deininger and
                  Kai Martius and
                  Sebastian Barchnicki},
  title        = {Perspektiven und zuk{\"{u}}nftige Entwicklung der deutschen IT-Sicherheitswirtschaft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {652--655},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1182-7},
  doi          = {10.1007/S11623-019-1182-7},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DeiningerMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dunkel19,
  author       = {Heiko D{\"{u}}nkel},
  title        = {Kollektiver Rechtsschutz bei Datenschutzrechtsverst{\"{o}}{\ss}en},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {483--487},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1148-9},
  doi          = {10.1007/S11623-019-1148-9},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dunkel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurmusSP19,
  author       = {Erdem Durmus and
                  Annika Selzer and
                  Ulrich Pordesch},
  title        = {Das L{\"{o}}schen nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {786--791},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1206-3},
  doi          = {10.1007/S11623-019-1206-3},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DurmusSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ertel19,
  author       = {Sebastian Ertel},
  title        = {Wer sch{\"{u}}tzt uns eigentlich?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {125},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1076-8},
  doi          = {10.1007/S11623-019-1076-8},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Ertel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19,
  author       = {Eberhard von Faber},
  title        = {Null-Fehler-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {393},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1131-5},
  doi          = {10.1007/S11623-019-1131-5},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19a,
  author       = {Eberhard von Faber},
  title        = {IT-Sicherheit 5.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {397},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1132-4},
  doi          = {10.1007/S11623-019-1132-4},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19b,
  author       = {Eberhard von Faber},
  title        = {Methoden: , , Secured by definition'' und die Umsetzung von Prinzipien
                  aus dem Qualit{\"{a}}tsmanagement},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {410--417},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1136-0},
  doi          = {10.1007/S11623-019-1136-0},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FaberK19,
  author       = {Eberhard von Faber and
                  Arndt Kohler},
  title        = {Die L{\"{u}}cke: Informationssicherheit in Systemen mit k{\"{u}}nstlicher
                  Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {434--439},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1139-x},
  doi          = {10.1007/S11623-019-1139-X},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FaberK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FarkeRDG19,
  author       = {Florian Farke and
                  Jan Rensinghoff and
                  Markus D{\"{u}}rmuth and
                  Tobias Gostomzyk},
  title        = {Recht auf Vergessen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {681--685},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1189-0},
  doi          = {10.1007/S11623-019-1189-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FarkeRDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox19,
  author       = {Dirk Fox},
  title        = {Der Teufel und die Details},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {61},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1063-0},
  doi          = {10.1007/S11623-019-1063-0},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox19a,
  author       = {Dirk Fox},
  title        = {Bewegung im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {253},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1102-x},
  doi          = {10.1007/S11623-019-1102-X},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox19b,
  author       = {Dirk Fox},
  title        = {Vom Wert des Fl{\"{u}}chtigen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {679},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1187-2},
  doi          = {10.1007/S11623-019-1187-2},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FriedewaldSM19,
  author       = {Michael Friedewald and
                  Ina Schiering and
                  Nicholas Martin},
  title        = {Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {473--477},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1146-y},
  doi          = {10.1007/S11623-019-1146-Y},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FriedewaldSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlM19,
  author       = {Armin Gerl and
                  Bianca Meier},
  title        = {The Layered Privacy Language Art. 12 - 14 {GDPR} Extension - Privacy
                  Enhancing User Interfaces},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {747--752},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1200-9},
  doi          = {10.1007/S11623-019-1200-9},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gola19,
  author       = {Peter Gola},
  title        = {Das Gesch{\"{a}}ftsgeheimnisgesetz und die Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {569--574},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1165-8},
  doi          = {10.1007/S11623-019-1165-8},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gola19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hagemeier19,
  author       = {Heike Hagemeier},
  title        = {Kryptografie - heute und zuk{\"{u}}nftig},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {631--635},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1178-3},
  doi          = {10.1007/S11623-019-1178-3},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hagemeier19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hartge19,
  author       = {Dagmar Hartge},
  title        = {Automatische Kennzeichenfahndung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {680},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1188-1},
  doi          = {10.1007/S11623-019-1188-1},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hartge19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeinemannS19,
  author       = {Andreas Heinemann and
                  Tobias Straub},
  title        = {Datenschutz muss benutzbar sein},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {7--12},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1052-3},
  doi          = {10.1007/S11623-019-1052-3},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HeinemannS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hellerbach19,
  author       = {Amin Hellerbach},
  title        = {Abstrahlsicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {636--639},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1179-2},
  doi          = {10.1007/S11623-019-1179-2},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hellerbach19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HelmKMS19,
  author       = {Alexander Helm and
                  Laura Kocksch and
                  Alexander May and
                  Estrid S{\o}rensen},
  title        = {Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer
                  Aushandlungsprozess},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {713--718},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1194-3},
  doi          = {10.1007/S11623-019-1194-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HelmKMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannLHA19,
  author       = {Eckehard Hermann and
                  Harald Lampesberger and
                  Lena Heimberger and
                  Michael Altenhuber},
  title        = {Authentizit{\"{a}}t und Integrit{\"{a}}t des Aufnahmekontextes
                  von Bildern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {281--286},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1108-4},
  doi          = {10.1007/S11623-019-1108-4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HermannLHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HonscheidH19,
  author       = {Christoph H{\"{o}}nscheid and
                  Christian Heinze},
  title        = {Hohe Datensicherheit und Usability sind kein Widerspruch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {33--34},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1057-y},
  doi          = {10.1007/S11623-019-1057-Y},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HonscheidH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hornung19,
  author       = {Gerrit Hornung},
  title        = {Implementierungsstrategien f{\"{u}}r effektiven Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {741--742},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1198-z},
  doi          = {10.1007/S11623-019-1198-Z},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hornung19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoudeauHW19,
  author       = {Detlef Houdeau and
                  Tina H{\"{u}}hnlein and
                  Klaus{-}Dieter Wolfenstetter},
  title        = {Digitale Identit{\"{a}}t als Fundament der vertrauensw{\"{u}}rdigen
                  Transformation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {209--213},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1094-6},
  doi          = {10.1007/S11623-019-1094-6},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoudeauHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HuhnleinH19,
  author       = {Tina H{\"{u}}hnlein and
                  Detlef H{\"{u}}hnlein},
  title        = {Aufbruchsstimmung im eIDAS-{\"{O}}kosystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {185},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1088-4},
  doi          = {10.1007/S11623-019-1088-4},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HuhnleinH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HuhnleinKKR19,
  author       = {Detlef H{\"{u}}hnlein and
                  Ulrike Korte and
                  Andreas K{\"{u}}hne and
                  Andrea R{\"{o}}ck},
  title        = {Neue APIs f{\"{u}}r das eIDAS-{\"{O}}kosystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {198--202},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1092-8},
  doi          = {10.1007/S11623-019-1092-8},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HuhnleinKKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KellerH19,
  author       = {Ivo Keller and
                  Friedrich{-}L. Holl},
  title        = {Kriterien: Wie Security auch f{\"{u}}r Safety verantwortlich
                  wird},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {426--433},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1138-y},
  doi          = {10.1007/S11623-019-1138-Y},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KellerH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker19,
  author       = {Dennis{-}Kenji Kipker},
  title        = {2. DSAnpUG-EU und die Talfahrt des deutschen Datenschutzrechts},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {371--372},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1124-4},
  doi          = {10.1007/S11623-019-1124-4},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker19a,
  author       = {Dennis{-}Kenji Kipker},
  title        = {Chinese Cybersecurity Law: Update zu den aktuellen Entwicklungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {583--586},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1167-6},
  doi          = {10.1007/S11623-019-1167-6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker19b,
  author       = {Dennis{-}Kenji Kipker},
  title        = {{EU} Cybersicherheitsregulierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {792},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1207-2},
  doi          = {10.1007/S11623-019-1207-2},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerW19,
  author       = {Dennis{-}Kenji Kipker and
                  Michael Walkusz},
  title        = {Hersteller- und Verk{\"{a}}uferpflichten bei softwarebezogenen
                  IT-Sicherheitsupdates},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {513--517},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1154-y},
  doi          = {10.1007/S11623-019-1154-Y},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KneuperM19,
  author       = {Ralf Kneuper and
                  Martin Macke},
  title        = {Rolle der Transportverschl{\"{u}}sselung f{\"{u}}r die sichere
                  E-Mail-Kommunikation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {76--80},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1067-9},
  doi          = {10.1007/S11623-019-1067-9},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KneuperM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KneuperP19,
  author       = {Ralf Kneuper and
                  Mark Perlitz},
  title        = {Datenschutz bei nutzungsbasierter Online-Werbung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {502--506},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1152-0},
  doi          = {10.1007/S11623-019-1152-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KneuperP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koenig19,
  author       = {Christian Koenig},
  title        = {Die Digitale Kopie von Briefsendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {551--558},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1162-y},
  doi          = {10.1007/S11623-019-1162-Y},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Koenig19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KohoutT19,
  author       = {Gerhard Kramarz{-}von Kohout and
                  Ren{\'{e}} Thiele},
  title        = {Projekt "SiReNE": Wie kann ein Notruf 110/112 m{\"{o}}glichst
                  {\"{u}}berall helfen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {90--96},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1070-1},
  doi          = {10.1007/S11623-019-1070-1},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KohoutT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KohoutT19a,
  author       = {Gerhard Kramarz{-}von Kohout and
                  Ren{\'{e}} Thiele},
  title        = {Notruf: {EU} schl{\"{a}}gt neues Kapitel auf},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {292--300},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1110-x},
  doi          = {10.1007/S11623-019-1110-X},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KohoutT19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kornwachs19,
  author       = {Klaus Kornwachs},
  title        = {Smart Robots - Smart Ethics?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {332--341},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1118-2},
  doi          = {10.1007/S11623-019-1118-2},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kornwachs19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann19,
  author       = {Dieter Kugelmann},
  title        = {Rahmenbedingungen f{\"{u}}r eine digitale Gesundheitsversorgung
                  aktiv gestalten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {398},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1133-3},
  doi          = {10.1007/S11623-019-1133-3},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingS19,
  author       = {J{\"{u}}rgen K{\"{u}}hling and
                  Florian Sackmann},
  title        = {Die Musterfeststellungsklage nach Datenschutzverst{\"{o}}{\ss}en
                  - ein unkalkulierbares Risiko f{\"{u}}r Unternehmen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {347--352},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1120-8},
  doi          = {10.1007/S11623-019-1120-8},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KuhlingS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KulykGVH19,
  author       = {Oksana Kulyk and
                  Nina Gerber and
                  Melanie Volkamer and
                  Annika Hilt},
  title        = {Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {81--85},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1068-8},
  doi          = {10.1007/S11623-019-1068-8},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KulykGVH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kunnert19,
  author       = {Gerhard Kunnert},
  title        = {Das Aus f{\"{u}}r Social-/Media-Plug-ins?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {257--264},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1104-8},
  doi          = {10.1007/S11623-019-1104-8},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kunnert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KurthK19,
  author       = {Helmut Kurth and
                  Gerald Krummeck},
  title        = {Sicher bauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {640--647},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1180-9},
  doi          = {10.1007/S11623-019-1180-9},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KurthK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LangeW19,
  author       = {Vera Lange and
                  Melanie Winkler},
  title        = {Rechtliche Grundlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {611--613},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1174-7},
  doi          = {10.1007/S11623-019-1174-7},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LangeW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LudemannP19,
  author       = {Volker L{\"{u}}demann and
                  Patrick Pokrant},
  title        = {Die Einwilligung beim Smart Metering},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {365--370},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1123-5},
  doi          = {10.1007/S11623-019-1123-5},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LudemannP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierB19,
  author       = {Natalie Maier and
                  Tamer Bile},
  title        = {Die Zertifizierung nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {478--482},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1147-x},
  doi          = {10.1007/S11623-019-1147-X},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MaierB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierLTRS19,
  author       = {Natalie Maier and
                  Sebastian Lins and
                  Heiner Teigeler and
                  Alexander Ro{\ss}nagel and
                  Ali Sunyaev},
  title        = {Die Zertifizierung von Cloud-Diensten nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {225--229},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1097-3},
  doi          = {10.1007/S11623-019-1097-3},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MaierLTRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Makulilo19,
  author       = {Alex B. Makulilo},
  title        = {Privacy under siege? {A} critical analysis of the tele-traffic monitoring
                  system in Tanzania},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {361--364},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1122-6},
  doi          = {10.1007/S11623-019-1122-6},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Makulilo19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Margraf19,
  author       = {Marian Margraf},
  title        = {IT-Sicherheit und Datenschutz: Nutzergerecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1049-y},
  doi          = {10.1007/S11623-019-1049-Y},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Margraf19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinF19,
  author       = {Nicholas Martin and
                  Michael Friedewald},
  title        = {Warum Unternehmen sich (nicht) an Recht und Gesetz halten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {493--497},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1150-2},
  doi          = {10.1007/S11623-019-1150-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MartinF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mayr19,
  author       = {Michael Mayr},
  title        = {Kompetenzen: Menschen entscheiden {\"{u}}ber den Erfolg},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {399--402},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1134-2},
  doi          = {10.1007/S11623-019-1134-2},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mayr19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MeissnerS19,
  author       = {Christian Mei{\ss}ner and
                  Klaus Peter S{\"{o}}llner},
  title        = {Smarte Mobilit{\"{a}}t mit FiftyFifty Taxi},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {230--233},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1098-2},
  doi          = {10.1007/S11623-019-1098-2},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MeissnerS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester19,
  author       = {Britta Alexandra Mester},
  title        = {Auftrags(daten)verarbeitung - Nur eine {\"{A}}nderung der Bezeichnung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {121},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1075-9},
  doi          = {10.1007/S11623-019-1075-9},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mester19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester19a,
  author       = {Britta Alexandra Mester},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {249--252},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1101-y},
  doi          = {10.1007/S11623-019-1101-Y},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester19b,
  author       = {Britta Alexandra Mester},
  title        = {Blockchain und Co. - Was bringt uns die Entwicklung der Technik?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {537},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1158-7},
  doi          = {10.1007/S11623-019-1158-7},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MesterS19,
  author       = {Britta Alexandra Mester and
                  Christoph Schnabel},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {807--812},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1210-7},
  doi          = {10.1007/S11623-019-1210-7},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MesterS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mino-Vasquez19,
  author       = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez},
  title        = {The Protection of Genetic Data under the General Data Protection regulation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {154--158},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1083-9},
  doi          = {10.1007/S11623-019-1083-9},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mino-Vasquez19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mueller19,
  author       = {Johannes Karl Martin Mueller},
  title        = {Dateneigentum in der vierten industriellen Revolution?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {159--166},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1084-8},
  doi          = {10.1007/S11623-019-1084-8},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mueller19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NuskeORS19,
  author       = {Niclas N{\"{u}}ske and
                  Christian Olenberger and
                  Daniel Rau and
                  Fabian Schmied},
  title        = {Privacy Bots},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {28--32},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1056-z},
  doi          = {10.1007/S11623-019-1056-Z},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/NuskeORS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OhlendorfSM19,
  author       = {Tim Ohlendorf and
                  Wolfgang Studier and
                  Marian Margraf},
  title        = {Digitale Identit{\"{a}}ten auf dem Smartphone},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {17--22},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1054-1},
  doi          = {10.1007/S11623-019-1054-1},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/OhlendorfSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ozturk19,
  author       = {Ebru {\"{O}}zt{\"{u}}rk},
  title        = {Arbeitnehmer{\"{u}}berlassung DS-GVO-konform l{\"{o}}sen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {143--148},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1081-y},
  doi          = {10.1007/S11623-019-1081-Y},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Ozturk19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PaeschkeFW19,
  author       = {Manfred Paeschke and
                  Walter Fumy and
                  Andreas Wilke},
  title        = {Ensuring Security {\&} Trust in a Post-Quantum Environment},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {440--443},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1140-4},
  doi          = {10.1007/S11623-019-1140-4},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PaeschkeFW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetersenBMFB19,
  author       = {Tom Petersen and
                  Maximilian Blochberger and
                  Tobias Mueller and
                  Hannes Federrath and
                  Christian{-}Alexander Behrendt},
  title        = {Sichere und datenschutzgerechte Umsetzung medizinischer Register},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {507--512},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1153-z},
  doi          = {10.1007/S11623-019-1153-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PetersenBMFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petrlic19,
  author       = {Ronald Petrlic},
  title        = {Identit{\"{a}}tspr{\"{u}}fung bei elektronischen Auskunftsersuchen
                  nach Art. 15 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {71--75},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1066-x},
  doi          = {10.1007/S11623-019-1066-X},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petrlic19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PfeifferS19,
  author       = {Stefan Pfeiffer and
                  Martin Seiffert},
  title        = {Security-Management-as-a-Service},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {23--27},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1055-0},
  doi          = {10.1007/S11623-019-1055-0},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PfeifferS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19,
  author       = {Helmut Reimer},
  title        = {Festakt: Amtswechsel beim BfDI},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {188},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1089-3},
  doi          = {10.1007/S11623-019-1089-3},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {243--249},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1100-z},
  doi          = {10.1007/S11623-019-1100-Z},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19b,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {732--740},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1197-0},
  doi          = {10.1007/S11623-019-1197-0},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19c,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {801--807},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1209-0},
  doi          = {10.1007/S11623-019-1209-0},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer19c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riechert19,
  author       = {Anne Riechert},
  title        = {Dateneigentum - ein unaufl{\"{o}}sbarer Interessenkonflikt?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {353--360},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1121-7},
  doi          = {10.1007/S11623-019-1121-7},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Riechert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riess19,
  author       = {Joachim Rie{\ss}},
  title        = {Innovationen der {DSGVO} in der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {498--501},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1151-1},
  doi          = {10.1007/S11623-019-1151-1},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Riess19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RohdeS19,
  author       = {Martina Rohde and
                  Werner Schindler},
  title        = {K{\"{u}}nstliche Intelligenz in Evaluierung und Zulassung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {627--630},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1177-4},
  doi          = {10.1007/S11623-019-1177-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RohdeS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel19,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Unvollende Innovationen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {461--462},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1143-1},
  doi          = {10.1007/S11623-019-1143-1},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel19a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Innovationen der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {467--472},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1145-z},
  doi          = {10.1007/S11623-019-1145-Z},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelW19,
  author       = {Heiko Ro{\ss}nagel and
                  Sven Wagner},
  title        = {LIGHTest},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {220--224},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1096-4},
  doi          = {10.1007/S11623-019-1096-4},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RossnagelW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost19,
  author       = {Maria Christina Rost},
  title        = {Datenschutzsanktionen: scharfes Schwert oder Papiertiger?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {488--492},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1149-8},
  doi          = {10.1007/S11623-019-1149-8},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Salami19,
  author       = {Emmanuel Salami},
  title        = {Nigerian data protection law},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {575--582},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1166-7},
  doi          = {10.1007/S11623-019-1166-7},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Salami19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schmale19,
  author       = {Wolfgang Schmale},
  title        = {(Daten-)Schutz von Privatheit im digitalen Zeitalter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {327--331},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1117-3},
  doi          = {10.1007/S11623-019-1117-3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schmale19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe19,
  author       = {Maximilian Schnebbe},
  title        = {DSB-Bestellpflicht und Datenschutzfolgeabsch{\"{a}}tzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {373--374},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1125-3},
  doi          = {10.1007/S11623-019-1125-3},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnebbe19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchombergBJH19,
  author       = {Sabrina Schomberg and
                  Torben Jan Barev and
                  Andreas Janson and
                  Felix Hupfeld},
  title        = {Ansatz zur Umsetzung von Datenschutz nach der {DSGVO} im Arbeitsumfeld:
                  Datenschutz durch Nudging},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {774--780},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1204-5},
  doi          = {10.1007/S11623-019-1204-5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchombergBJH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS19,
  author       = {Dominik Schrahe and
                  Thomas St{\"{a}}dter},
  title        = {Integration von Informationssicherheits- und Datenschutzmanagement},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {265--269},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1105-7},
  doi          = {10.1007/S11623-019-1105-7},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchraheS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schwabe19,
  author       = {Sebastian Schw{\"{a}}be},
  title        = {Technische Umsetzung beim Webtracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {559--562},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1163-x},
  doi          = {10.1007/S11623-019-1163-X},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schwabe19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwenkWH19,
  author       = {J{\"{o}}rg Schwenk and
                  Tobias Wich and
                  Detlef H{\"{u}}hnlein},
  title        = {Moderne Vertrauensdienste f{\"{u}}r vertrauensw{\"{u}}rdige
                  Transaktionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {214--219},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1095-5},
  doi          = {10.1007/S11623-019-1095-5},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchwenkWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seiter19,
  author       = {Stefan R. Seiter},
  title        = {Auftragsverarbeitung nach der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {127--133},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1078-6},
  doi          = {10.1007/S11623-019-1078-6},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Seiter19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SimonM19,
  author       = {Kai Simon and
                  Cornelius Moucha},
  title        = {Sicherheit und Datenschutz im Lebenszyklus von Informationssystemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {97--101},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1071-0},
  doi          = {10.1007/S11623-019-1071-0},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SimonM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SonnenbergB19,
  author       = {Frank Sonnenberg and
                  Thomas Borsch},
  title        = {Innovative Instrumente und Methoden der Zulassung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {619--626},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1176-5},
  doi          = {10.1007/S11623-019-1176-5},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SonnenbergB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SonnenbergBR19,
  author       = {Frank Sonnenberg and
                  Thomas Borsch and
                  Martina Rohde},
  title        = {VS-Zulassung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {614--618},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1175-6},
  doi          = {10.1007/S11623-019-1175-6},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SonnenbergBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stach19,
  author       = {Christoph Stach},
  title        = {Datenschutzkonzepte f{\"{u}}r Zeitreihendaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {753--759},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1201-8},
  doi          = {10.1007/S11623-019-1201-8},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stach19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steinacker19,
  author       = {Angelika Steinacker},
  title        = {Architekturen: Sicherheit im Internet der Dinge (IoT)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {403--409},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1135-1},
  doi          = {10.1007/S11623-019-1135-1},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Steinacker19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stock-HomburgH19,
  author       = {Ruth Stock{-}Homburg and
                  Christian Holthaus},
  title        = {{CHOIVACY} - Ein mehrdimensionaler Ansatz zur Bewertung des Privacy-Managements
                  von Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {35--40},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1058-x},
  doi          = {10.1007/S11623-019-1058-X},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Stock-HomburgH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stradomsky19,
  author       = {Christopher Stradomsky},
  title        = {{TR-ESOR} vs. Blockchain},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {547--550},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1161-z},
  doi          = {10.1007/S11623-019-1161-Z},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stradomsky19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld19,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {70 Jahre Grundgesetz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {324--325},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1115-5},
  doi          = {10.1007/S11623-019-1115-5},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB19,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Recht und Ethik im digitalen Zeitalter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {321},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1114-6},
  doi          = {10.1007/S11623-019-1114-6},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/UtzKHT19,
  author       = {Christine Utz and
                  Stephan Kolo{\ss}a and
                  Thorsten Holz and
                  Pierre Thielb{\"{o}}rger},
  title        = {Die {DSGVO} als internationales Vorbild?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {700--705},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1192-5},
  doi          = {10.1007/S11623-019-1192-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/UtzKHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese19,
  author       = {Sven Venzke{-}Caprarese},
  title        = {Blockchain-Shops im Web3},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {541--546},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1160-0},
  doi          = {10.1007/S11623-019-1160-0},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke-Caprarese19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wehrhahn-Aklender19,
  author       = {Aljona Wehrhahn{-}Aklender},
  title        = {Verschlusssachen verarbeitende Cloud},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {648--651},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1181-8},
  doi          = {10.1007/S11623-019-1181-8},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wehrhahn-Aklender19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert19,
  author       = {Thilo Weichert},
  title        = {Genetische Genealogie und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {149--153},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1082-x},
  doi          = {10.1007/S11623-019-1082-X},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Welsch19,
  author       = {G{\"{u}}nter Welsch},
  title        = {Fr{\"{u}}her war alles besser?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {605},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1171-x},
  doi          = {10.1007/S11623-019-1171-X},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Welsch19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wessels19,
  author       = {Michael Wessels},
  title        = {Schmerzensgeld bei Verst{\"{o}}{\ss}en gegen die {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {781--785},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1205-4},
  doi          = {10.1007/S11623-019-1205-4},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wessels19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WichmannSP19,
  author       = {Astrid Wichmann and
                  M. Angela Sasse and
                  Christof Paar},
  title        = {IT-Sicherheit ist mehr als Technik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {673--674},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1186-3},
  doi          = {10.1007/S11623-019-1186-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WichmannSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19,
  title        = {M{\"{a}}rchenhaft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {5},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1050-5},
  doi          = {10.1007/S11623-019-1050-5},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19a,
  title        = {Entschlie{\ss}ung und Orientierungshilfe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {41--42},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1059-9},
  doi          = {10.1007/S11623-019-1059-9},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19aa,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {534--536},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1157-8},
  doi          = {10.1007/S11623-019-1157-8},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ab,
  title        = {26. T{\"{a}}tigkeitsbericht 2018/2019},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {540},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1159-6},
  doi          = {10.1007/S11623-019-1159-6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ac,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {587--594},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1168-5},
  doi          = {10.1007/S11623-019-1168-5},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ad,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {595--600},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1169-4},
  doi          = {10.1007/S11623-019-1169-4},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ae,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {9},
  pages        = {600--604},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1170-y},
  doi          = {10.1007/S11623-019-1170-Y},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19af,
  title        = {Die Awareness-Verschleierung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {608--609},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1172-9},
  doi          = {10.1007/S11623-019-1172-9},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ag,
  title        = {Br{\"{u}}ssel: Podiumsdiskussion zu Datenschutz und Wettbewerb
                  am 10. Juli 2019},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {610},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1173-8},
  doi          = {10.1007/S11623-019-1173-8},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ah,
  title        = {Beijing {AI} Principles},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {656},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1183-6},
  doi          = {10.1007/S11623-019-1183-6},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ah.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ai,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {657--662},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1184-5},
  doi          = {10.1007/S11623-019-1184-5},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ai.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19aj,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {663--672},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1185-4},
  doi          = {10.1007/S11623-019-1185-4},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19aj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ak,
  title        = {DSK-Zwischenkonferenz am 12. September 2019 in Mainz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {12},
  pages        = {746},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1199-y},
  doi          = {10.1007/S11623-019-1199-Y},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19ak.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19b,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {43--49},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1060-3},
  doi          = {10.1007/S11623-019-1060-3},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19c,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {50--57},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1061-2},
  doi          = {10.1007/S11623-019-1061-2},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19d,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {1},
  pages        = {57--60},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1062-1},
  doi          = {10.1007/S11623-019-1062-1},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19e,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {102--109},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1072-z},
  doi          = {10.1007/S11623-019-1072-Z},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19f,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {110--117},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1073-y},
  doi          = {10.1007/S11623-019-1073-Y},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19g,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {2},
  pages        = {117--120},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1074-x},
  doi          = {10.1007/S11623-019-1074-X},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19h,
  title        = {{EDPS} Opinion 10/2018 on the Commission: Package on free and fair
                  European elections},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {126},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1077-7},
  doi          = {10.1007/S11623-019-1077-7},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19i,
  title        = {Joint Control},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {167},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1085-7},
  doi          = {10.1007/S11623-019-1085-7},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19j,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {168--174},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1086-6},
  doi          = {10.1007/S11623-019-1086-6},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19k,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {3},
  pages        = {175--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1087-5},
  doi          = {10.1007/S11623-019-1087-5},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X19k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19l,
  title        = {{DSK} zu Daten{\"{u}}bermittlungen aus Deutschland in das Vereinigte
                  K{\"{o}}nigreich Gro{\ss}britannien und Nordirland nach dem "Brexit"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {256},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1103-9},
  doi          = {10.1007/S11623-019-1103-9},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19m,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {301--307},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1111-9},
  doi          = {10.1007/S11623-019-1111-9},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19n,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {308--313},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1112-8},
  doi          = {10.1007/S11623-019-1112-8},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19o,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {314--320},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1113-7},
  doi          = {10.1007/S11623-019-1113-7},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19p,
  title        = {97. {DSK} am 3. und 4. April 2019 auf dem Hambacher Schloss},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {326},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1116-4},
  doi          = {10.1007/S11623-019-1116-4},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19q,
  title        = {Hambacher Erkl{\"{a}}rung zur K{\"{u}}nstlichen Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {375--376},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1126-2},
  doi          = {10.1007/S11623-019-1126-2},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19r,
  title        = {IT-Sicherheitsrecht 2.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {377},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1127-1},
  doi          = {10.1007/S11623-019-1127-1},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19s,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {378--383},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1128-0},
  doi          = {10.1007/S11623-019-1128-0},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19t,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {384--388},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1129-z},
  doi          = {10.1007/S11623-019-1129-Z},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19u,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {6},
  pages        = {388--392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1130-6},
  doi          = {10.1007/S11623-019-1130-6},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19v,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {444--452},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1141-3},
  doi          = {10.1007/S11623-019-1141-3},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19w,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {453--460},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1142-2},
  doi          = {10.1007/S11623-019-1142-2},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19x,
  title        = {Informationsfreiheit by Design},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {466},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1144-0},
  doi          = {10.1007/S11623-019-1144-0},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19y,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {518--526},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1155-x},
  doi          = {10.1007/S11623-019-1155-X},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19z,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {8},
  pages        = {527--534},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1156-9},
  doi          = {10.1007/S11623-019-1156-9},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X19z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZanderSB19,
  author       = {Tim Zander and
                  Anne Steinbr{\"{u}}ck and
                  Pascal Birnstill},
  title        = {Spieltheoretische Modellierung der Verarbeitung personenbezogener
                  Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {270--275},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1106-6},
  doi          = {10.1007/S11623-019-1106-6},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ZanderSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Banon18,
  author       = {Miguel Ba{\~{n}}{\'{o}}n},
  title        = {Assurance and {IT} Development Paces and Challenges},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {407--410},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0968-3},
  doi          = {10.1007/S11623-018-0968-3},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Banon18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BarchnickiP18,
  author       = {Sebastian Barchnicki and
                  Norbert Pohlmann},
  title        = {Was IT-Sicherheitsindustrie und Anwender voneinander lernen k{\"{o}}nnen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {246--251},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0916-2},
  doi          = {10.1007/S11623-018-0916-2},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BarchnickiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BartelsB18,
  author       = {Karsten U. Bartels and
                  Merlin Backer},
  title        = {Die Ber{\"{u}}cksichtigung des Stands der Technik in der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {214--219},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0910-8},
  doi          = {10.1007/S11623-018-0910-8},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BartelsB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Benzmuller18,
  author       = {Ralf Benzm{\"{u}}ller},
  title        = {Machine Learning und Virenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {224--230},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0912-6},
  doi          = {10.1007/S11623-018-0912-6},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Benzmuller18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeyererMR18,
  author       = {J{\"{u}}rgen Beyerer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Ralf H. Reussner},
  title        = {Karlsruher Thesen zur Digitalen Souver{\"{a}}nit{\"{a}}t
                  Europas},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {277--280},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0940-2},
  doi          = {10.1007/S11623-018-0940-2},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BeyererMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bieker18,
  author       = {Felix Bieker},
  title        = {Die Risikoanalyse nach dem neuen EU-Datenschutzrecht und dem Standard-Datenschutzmodell},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {27--31},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0886-4},
  doi          = {10.1007/S11623-018-0886-4},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bieker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerBH18,
  author       = {Felix Bieker and
                  Benjamin Bremert and
                  Marit Hansen},
  title        = {Die Risikobeurteilung nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {492--496},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0986-1},
  doi          = {10.1007/S11623-018-0986-1},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BiekerBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerBH18a,
  author       = {Felix Bieker and
                  Benjamin Bremert and
                  Marit Hansen},
  title        = {Verantwortlichkeit und Einsatz von Algorithmen bei {\"{o}}ffentlichen
                  Stellen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {608--612},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1010-5},
  doi          = {10.1007/S11623-018-1010-5},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BiekerBH18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BihlmayerEL18,
  author       = {Thomas Bihlmayer and
                  Philipp Ehmann and
                  Henning Lesch},
  title        = {Kommissionsvorschlag zu e-Privacy verhindert Vereinheitlichung des
                  Datenschutzes in Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {241--245},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0915-3},
  doi          = {10.1007/S11623-018-0915-3},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BihlmayerEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BileGW18,
  author       = {Tamer Bile and
                  Ludwig Gramlich and
                  Michael W{\"{a}}chter},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {266--270},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0920-6},
  doi          = {10.1007/S11623-018-0920-6},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BileGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitkom18,
  author       = {Bitkom},
  title        = {Digitale Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {294--300},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0944-y},
  doi          = {10.1007/S11623-018-0944-Y},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bitkom18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann18,
  author       = {Dominik Bleckmann},
  title        = {Wahres Ungl{\"{u}}ck bringt der falsche Wahn},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {136--137},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0922-4},
  doi          = {10.1007/S11623-018-0922-4},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann18a,
  author       = {Dominik Bleckmann},
  title        = {K{\"{u}}nstliche Intelligenz - Fluch oder Segen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {539},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0994-1},
  doi          = {10.1007/S11623-018-0994-1},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunHB18,
  author       = {Steffen Braun and
                  Tobias Henzler and
                  Anders Berg},
  title        = {Nutzeridentifikation mit mobilen Endger{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {673--679},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1023-0},
  doi          = {10.1007/S11623-018-1023-0},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BraunHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breyer18,
  author       = {Jonas Breyer},
  title        = {Verarbeitungsgrunds{\"{a}}tze und Rechenschaftspflicht nach Art.
                  5 {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {311--317},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0947-8},
  doi          = {10.1007/S11623-018-0947-8},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Breyer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BroadnaxLMMN18,
  author       = {Brandon Broadnax and
                  Bernhard L{\"{o}}we and
                  Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Nagel},
  title        = {Sicherheit auf festem Fundament},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {74--78},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0897-1},
  doi          = {10.1007/S11623-018-0897-1},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BroadnaxLMMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brockmann18,
  author       = {Hans{-}Christian Brockmann},
  title        = {Effizientes und verantwortungsvolles Datenmanagement im Zeitalter
                  der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {634--639},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1015-0},
  doi          = {10.1007/S11623-018-1015-0},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Brockmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Burri18,
  author       = {Thomas Burri},
  title        = {K{\"{u}}nstliche Intelligenz und internationales Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {603--607},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1009-y},
  doi          = {10.1007/S11623-018-1009-Y},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Burri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18,
  author       = {Conrad Sebastian Conrad},
  title        = {Gilt das Vereinigte K{\"{o}}nigreich k{\"{u}}nftig als ein
                  Drittland?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {159--160},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0928-y},
  doi          = {10.1007/S11623-018-0928-Y},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18a,
  author       = {Conrad Sebastian Conrad},
  title        = {Kann die K{\"{u}}nstliche Intelligenz den Menschen entschl{\"{u}}sseln?
                  - Neue Forderungen zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {541--546},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0996-z},
  doi          = {10.1007/S11623-018-0996-Z},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18b,
  author       = {Conrad Sebastian Conrad},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {798--802},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1048-4},
  doi          = {10.1007/S11623-018-1048-4},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Debski18,
  author       = {Andrzej Debski},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {400--402},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0965-6},
  doi          = {10.1007/S11623-018-0965-6},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Debski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DiepenbrockS18,
  author       = {Andreas Diepenbrock and
                  Sabine Sachweh},
  title        = {Ein konzeptionelles Rahmenwerk f{\"{u}}r die Integration Digitaler
                  Souver{\"{a}}nit{\"{a}}t in Softwarearchitekturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {281--285},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0941-1},
  doi          = {10.1007/S11623-018-0941-1},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DiepenbrockS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DreyerK18,
  author       = {Bastian Dreyer and
                  Gerhard Kramarz{-}von Kohout},
  title        = {Notruf 110 / 112: Technische Richtlinie Notrufverbindungen {(TR} Notruf)
                  2.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {510--517},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0989-y},
  doi          = {10.1007/S11623-018-0989-Y},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DreyerK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dullien18,
  author       = {Thomas Dullien},
  title        = {Maschinelles Lernen und k{\"{u}}nstliche Intelligenz in der Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {618--622},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1012-3},
  doi          = {10.1007/S11623-018-1012-3},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dullien18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurigF18,
  author       = {Markus D{\"{u}}rig and
                  Matthias Fischer},
  title        = {Cybersicherheit in Kritischen Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {209--213},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0909-1},
  doi          = {10.1007/S11623-018-0909-1},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DurigF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtM18,
  author       = {Jens Eckhardt and
                  Konrad Menz},
  title        = {Datenschutz-Grundverordnung: Neuer Schutz - neue Spannungsverh{\"{a}}ltnisse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {131--133},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0921-5},
  doi          = {10.1007/S11623-018-0921-5},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtM18a,
  author       = {Jens Eckhardt and
                  Konrad Menz},
  title        = {Bu{\ss}geldsanktionen der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {139--144},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0924-2},
  doi          = {10.1007/S11623-018-0924-2},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtM18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EsslingerM18,
  author       = {Bernhard Esslinger and
                  Hern{\^{a}}ni Marques},
  title        = {Verfahren und Implementationen von "pretty Easy privacy" (pEp)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {101--105},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0901-9},
  doi          = {10.1007/S11623-018-0901-9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EsslingerM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FerrareseD18,
  author       = {Barbara Ferrarese and
                  Alexander Dix},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {59--62},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0892-6},
  doi          = {10.1007/S11623-018-0892-6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FerrareseD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerT18,
  author       = {Arno Fiedler and
                  Christoph Thiel},
  title        = {Chancen europ{\"{a}}ischer Standards f{\"{u}}r die Zertifizierung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {434--436},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0974-5},
  doi          = {10.1007/S11623-018-0974-5},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerTT18,
  author       = {Arno Fiedler and
                  Christian Thiel and
                  Christoph Thiel},
  title        = {Umsetzung technischer Anforderungen der {DSGVO} mittels eIDAS-VO-konformer
                  Vertrauensdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {236--240},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0914-4},
  doi          = {10.1007/S11623-018-0914-4},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18,
  author       = {Dirk Fox},
  title        = {Stand der Forschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {63},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0893-5},
  doi          = {10.1007/S11623-018-0893-5},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18a,
  author       = {Dirk Fox},
  title        = {Digitale Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {271},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0938-9},
  doi          = {10.1007/S11623-018-0938-9},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18b,
  author       = {Dirk Fox},
  title        = {Modell und Wirklichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {667},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1020-3},
  doi          = {10.1007/S11623-018-1020-3},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18c,
  author       = {Dirk Fox},
  title        = {Des Kaisers neue Kleider},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {671},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1021-2},
  doi          = {10.1007/S11623-018-1021-2},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FumyR18,
  author       = {Walter Fumy and
                  Helmut Reimer},
  title        = {Vertrauen ist gut ... Zertifizierung ist besser!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {403},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0966-5},
  doi          = {10.1007/S11623-018-0966-5},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FumyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn18,
  author       = {Christian L. Geminn},
  title        = {Wissenschaftliche Forschung und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {640--646},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1016-z},
  doi          = {10.1007/S11623-018-1016-Z},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Geminn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerberZHEVH18,
  author       = {Nina Gerber and
                  Verena Zimmermann and
                  Birgit Henhapl and
                  Sinem Emer{\"{o}}z and
                  Melanie Volkamer and
                  Tobias Hilt},
  title        = {Nutzerwahrnehmung der Ende-zu-Ende-Verschl{\"{u}}sselung in WhatsApp},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {680--685},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1024-z},
  doi          = {10.1007/S11623-018-1024-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerberZHEVH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gerhold18,
  author       = {Maximilian Gerhold},
  title        = {40 Jahre {CNIL} - Ein Blick auf den franz{\"{o}}sischen Gendarmen
                  des Privatlebens},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {368--372},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0958-5},
  doi          = {10.1007/S11623-018-0958-5},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gerhold18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GollaHB18,
  author       = {Sebastian J. Golla and
                  Henning Hofmann and
                  Matthias B{\"{a}}cker},
  title        = {Connecting the Dots},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {89--100},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0900-x},
  doi          = {10.1007/S11623-018-0900-X},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GollaHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Golland18,
  author       = {Alexander Golland},
  title        = {Der r{\"{a}}umliche Anwendungsbereich der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {351--357},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0955-8},
  doi          = {10.1007/S11623-018-0955-8},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Golland18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GonscherowskiHR18,
  author       = {Susan Gonscherowski and
                  Marit Hansen and
                  Martin Rost},
  title        = {Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {442--446},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0976-3},
  doi          = {10.1007/S11623-018-0976-3},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GonscherowskiHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichG18,
  author       = {Ludwig Gramlich and
                  Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {199--202},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0937-x},
  doi          = {10.1007/S11623-018-0937-X},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP18,
  author       = {Ludwig Gramlich and
                  Thomas Petri},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {127--130},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0905-5},
  doi          = {10.1007/S11623-018-0905-5},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP18a,
  author       = {Ludwig Gramlich and
                  Thomas Petri},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {663--666},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1019-9},
  doi          = {10.1007/S11623-018-1019-9},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GriesbeckG18,
  author       = {Michael Griesbeck and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {590--594},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1005-2},
  doi          = {10.1007/S11623-018-1005-2},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GriesbeckG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HackenjosMR18,
  author       = {Timon Hackenjos and
                  Jeremias Mechler and
                  Jochen Rill},
  title        = {IT-Sicherheit - ein rechtsfreier Raum?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {286--290},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0942-0},
  doi          = {10.1007/S11623-018-0942-0},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HackenjosMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen18,
  author       = {Marit Hansen},
  title        = {Transparenz der Verwaltung auch beim Einsatz von Algorithmen und K{\"{u}}nstlicher
                  Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {733},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1035-9},
  doi          = {10.1007/S11623-018-1035-9},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hartmann18,
  author       = {Mark Hartmann},
  title        = {Machine Learning und IT-Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {231--235},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0913-5},
  doi          = {10.1007/S11623-018-0913-5},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hartmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hemker18,
  author       = {Thomas Hemker},
  title        = {Machen Maschinen die Welt sicherer?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {629--633},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1014-1},
  doi          = {10.1007/S11623-018-1014-1},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hemker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henseler-UngerH18,
  author       = {Iris Henseler{-}Unger and
                  Annette Hillebrand},
  title        = {Aktuelle Lage der IT-Sicherheit in {KMU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {686--690},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1025-y},
  doi          = {10.1007/S11623-018-1025-Y},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Henseler-UngerH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenV18,
  author       = {Thomas Hoeren and
                  Jonas V{\"{o}}lkel},
  title        = {Informationsabfrage {\"{u}}ber Domain-verantwortliche nach der
                  {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {161--164},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0929-x},
  doi          = {10.1007/S11623-018-0929-X},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoerenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoidnR18,
  author       = {Dominik Hoidn and
                  Alexander Ro{\ss}nagel},
  title        = {Anpassung des Sozialdatenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {487--491},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0985-2},
  doi          = {10.1007/S11623-018-0985-2},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoidnR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Holzel18,
  author       = {Julian H{\"{o}}lzel},
  title        = {Anonymisierungstechniken und das Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {502--509},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0988-z},
  doi          = {10.1007/S11623-018-0988-Z},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Holzel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Humphreys18,
  author       = {Edward Humphreys},
  title        = {The Future Landscape of {ISMS} Standards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {421--423},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0971-8},
  doi          = {10.1007/S11623-018-0971-8},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Humphreys18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HusemannPS18,
  author       = {Charlotte Husemann and
                  Fabian Pittroff and
                  Andreas D. Schulz},
  title        = {Fitness-Tracking als Informationsproblem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {694--700},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1027-9},
  doi          = {10.1007/S11623-018-1027-9},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HusemannPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JakobiSS18,
  author       = {Timo Jakobi and
                  Gunnar Stevens and
                  Anna{-}Magdalena Seufert},
  title        = {Privacy-By-Design f{\"{u}}r das Connected Car: Architekturen
                  aus Verbrauchersicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {704--707},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1029-7},
  doi          = {10.1007/S11623-018-1029-7},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/JakobiSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JakschD18,
  author       = {Christian Jaksch and
                  Gerrit von Daacke},
  title        = {Datenschutzbeauftragter und Datenschutz-Organisation unter der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {758--763},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1040-z},
  doi          = {10.1007/S11623-018-1040-Z},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/JakschD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jensen18,
  author       = {Meiko Jensen},
  title        = {Zur Messbarkeit von Schutzzielen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {23--26},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0885-5},
  doi          = {10.1007/S11623-018-0885-5},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Jensen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KieselmannW18,
  author       = {Olga Kieselmann and
                  Arno Wacker},
  title        = {L{\"{o}}schen im Internet - rechtlich gefordert und technisch
                  m{\"{o}}glich!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {437--441},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0975-4},
  doi          = {10.1007/S11623-018-0975-4},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KieselmannW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker18,
  author       = {Dennis{-}Kenji Kipker},
  title        = {Stellungnahme der {EAID}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {252--253},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0917-1},
  doi          = {10.1007/S11623-018-0917-1},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker18a,
  author       = {Dennis{-}Kenji Kipker},
  title        = {VPN-Tunnelabschaltung und "Chinese Cybersecurity Law"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {574--575},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1001-6},
  doi          = {10.1007/S11623-018-1001-6},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18,
  author       = {Dennis{-}Kenji Kipker and
                  Mattea Stelter},
  title        = {Datenschutz unter MiFID {II}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {364--367},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0957-6},
  doi          = {10.1007/S11623-018-0957-6},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18a,
  author       = {Dennis{-}Kenji Kipker and
                  Dario Scholz},
  title        = {{EU} Cybersecurity-Verordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {701--703},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1028-8},
  doi          = {10.1007/S11623-018-1028-8},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18b,
  author       = {Dennis{-}Kenji Kipker and
                  Dario Scholz},
  title        = {Cybersicherheit und Datenschutz in China},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {768--771},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1042-x},
  doi          = {10.1007/S11623-018-1042-X},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kohler18,
  author       = {Thomas R. K{\"{o}}hler},
  title        = {Datenschutz im vernetzten Fahrzeug},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {376--379},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0960-y},
  doi          = {10.1007/S11623-018-0960-Y},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kohler18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KowalskiI18,
  author       = {Bernd Kowalski and
                  Matthias Intemann},
  title        = {Perspektiven der IT-Sicherheits-Zertifizierung f{\"{u}}r Europas
                  M{\"{a}}rkte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {415--419},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0970-9},
  doi          = {10.1007/S11623-018-0970-9},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KowalskiI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kranig18,
  author       = {Thomas Kranig},
  title        = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht Verbindliche
                  Datenschutzvorschriften {(BCR)} f{\"{u}}r die Allianz-Gruppe
                  genehmigt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {406},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0967-4},
  doi          = {10.1007/S11623-018-0967-4},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kranig18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann18,
  author       = {Dieter Kugelmann},
  title        = {Die Anpassung der Fachgesetze an die {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {482--486},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0984-3},
  doi          = {10.1007/S11623-018-0984-3},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhnlRS18,
  author       = {Christina K{\"{u}}hnl and
                  Kerstin Rohrer and
                  Nick Kai Schneider},
  title        = {Ein europ{\"{a}}ischer Gesundheitsdatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {735--740},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1036-8},
  doi          = {10.1007/S11623-018-1036-8},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KuhnlRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lachenmann18,
  author       = {Matthias Lachenmann},
  title        = {Bodycams: Nutzung durch private Sicherheitsdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {777--781},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1044-8},
  doi          = {10.1007/S11623-018-1044-8},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lachenmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lander18,
  author       = {Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden des Bundes und der L{\"{a}}nder},
  title        = {Beschluss der {DSK} zu Facebook Fanpages D{\"{u}}sseldorf, 5.
                  September 2018},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {672},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1022-1},
  doi          = {10.1007/S11623-018-1022-1},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lander18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeitoldK18,
  author       = {Herbert Leitold and
                  Daniel Konrad},
  title        = {Erfahrungen aus eIDAS Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {429--433},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0973-6},
  doi          = {10.1007/S11623-018-0973-6},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LeitoldK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lorenz18,
  author       = {Bernd Lorenz},
  title        = {Datenschutzrechtliche Fragen offener E-Mail-Verteiler},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {178--180},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0933-1},
  doi          = {10.1007/S11623-018-0933-1},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lorenz18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarnauBH18,
  author       = {Ninja Marnau and
                  Pascal Berrang and
                  Mathias Humbert},
  title        = {Anonymisierungsverfahren f{\"{u}}r genetische Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {83--88},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0899-z},
  doi          = {10.1007/S11623-018-0899-Z},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MarnauBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MayerKV18,
  author       = {Peter Mayer and
                  Alexandra Kunz and
                  Melanie Volkamer},
  title        = {Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {307--310},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0946-9},
  doi          = {10.1007/S11623-018-0946-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MayerKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18,
  author       = {Britta Alexandra Mester},
  title        = {Haftungsrisiko i. S. d. {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {181},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0934-0},
  doi          = {10.1007/S11623-018-0934-0},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18a,
  author       = {Britta Alexandra Mester},
  title        = {Datenschutzrechtliche Herausforderung der "K{\"{u}}nstlichen
                  Intelligenz" {(KI)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {535},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0993-2},
  doi          = {10.1007/S11623-018-0993-2},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18b,
  author       = {Britta Alexandra Mester},
  title        = {K{\"{u}}nstliche Intelligenz {(KI)} in Zeiten des Datenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {576},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1002-5},
  doi          = {10.1007/S11623-018-1002-5},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mino-VasquezS18,
  author       = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez and
                  Peter Suhren},
  title        = {Liability for injuries according to {GDPR}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {151--155},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0926-0},
  doi          = {10.1007/S11623-018-0926-0},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mino-VasquezS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mitrakas18,
  author       = {Andreas Mitrakas},
  title        = {The emerging {EU} framework on cybersecurity certification},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {411--414},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0969-2},
  doi          = {10.1007/S11623-018-0969-2},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mitrakas18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Msumi18,
  author       = {Mbiki M. Msumi},
  title        = {An Overview of eHealth Regulations in Tanzania},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {373--375},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0959-4},
  doi          = {10.1007/S11623-018-0959-4},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Msumi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NeumannRVKS18,
  author       = {Stephan Neumann and
                  Benjamin Reinheimer and
                  Melanie Volkamer and
                  Alexandra Kunz and
                  Christian Schwartz},
  title        = {Effektiver Schutz vor betr{\"{u}}gerischen Nachrichten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {301--306},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0945-x},
  doi          = {10.1007/S11623-018-0945-X},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/NeumannRVKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen18,
  author       = {Kim Nguyen},
  title        = {Certification of eIDAS trust services and new global transparency
                  trends},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {424--428},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0972-7},
  doi          = {10.1007/S11623-018-0972-7},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nordrhein-Westfalen18,
  author       = {LfDI Nordrhein{-}Westfalen and
                  Helga Block},
  title        = {Datenschutzkonferenz - Nordrhein-Westfalen {\"{u}}bernimmt Vorsitz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {138},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0923-3},
  doi          = {10.1007/S11623-018-0923-3},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nordrhein-Westfalen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nurnberger18,
  author       = {Stefan N{\"{u}}rnberger},
  title        = {Datenverarbeitung im (vernetzten) Fahrzeug},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {79--82},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0898-0},
  doi          = {10.1007/S11623-018-0898-0},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nurnberger18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18,
  author       = {Thomas Petri},
  title        = {Faire und transparente Verarbeitung, Informationsrechte und Rahmenbedingungen
                  f{\"{u}}r ihre Beschr{\"{a}}nkung - zur Auslegung der Art.
                  12 ff. und 23 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {347--350},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0954-9},
  doi          = {10.1007/S11623-018-0954-9},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18a,
  author       = {Thomas Petri},
  title        = {Bitte weniger Hysterie im Umgang mit der Datenschutz-Grundverordnung!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {727--728},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1033-y},
  doi          = {10.1007/S11623-018-1033-Y},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18b,
  author       = {Thomas Petri},
  title        = {Kliniken melden Datenschutzverst{\"{o}}{\ss}e nach Art. 33 {DSGVO}
                  - erste Erfahrungen einer Aufsichtsbeh{\"{o}}rde},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {753--757},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1039-5},
  doi          = {10.1007/S11623-018-1039-5},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petrlic18,
  author       = {Ronald Petrlic},
  title        = {{HTTPS} im Lichte der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {691--693},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1026-x},
  doi          = {10.1007/S11623-018-1026-X},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petrlic18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pfrang18,
  author       = {Sebastian Pfrang},
  title        = {Die "nicht-dateim{\"{a}}{\ss}ige" Verarbeitung von Besch{\"{a}}ftigtendaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {380--382},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0961-x},
  doi          = {10.1007/S11623-018-0961-X},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pfrang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohle18,
  author       = {J{\"{o}}rg Pohle},
  title        = {Zur Zeitdimension der Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {19--22},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0884-6},
  doi          = {10.1007/S11623-018-0884-6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohle18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann18,
  author       = {Norbert Pohlmann},
  title        = {Europa treibt die IT-Sicherheit voran},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {203},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0906-4},
  doi          = {10.1007/S11623-018-0906-4},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR18,
  author       = {Norbert Pohlmann and
                  Rene Riedel},
  title        = {Strafverfolgung darf die IT-Sicherheit im Internet nicht schw{\"{a}}chen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {37--44},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0888-2},
  doi          = {10.1007/S11623-018-0888-2},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollmann18,
  author       = {Maren Pollmann},
  title        = {Das Marktortprinzip in der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {383},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0962-9},
  doi          = {10.1007/S11623-018-0962-9},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pollmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiel18,
  author       = {Philipp Quiel},
  title        = {Blockchain-Technologie im Fokus von Art. 8 {GRC} und {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {566--573},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1000-7},
  doi          = {10.1007/S11623-018-1000-7},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer18,
  author       = {Helmut Reimer},
  title        = {Online-Durchsuchung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {5},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0880-x},
  doi          = {10.1007/S11623-018-0880-X},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer18a,
  author       = {Helmut Reimer},
  title        = {Gro{\ss}sprech: Vorreiter und Vorreiterrolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {207},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0907-3},
  doi          = {10.1007/S11623-018-0907-3},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerSB18,
  author       = {Helmut Reimer and
                  Peter Schaar and
                  Helmut B{\"{a}}umler},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {465--470},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0980-7},
  doi          = {10.1007/S11623-018-0980-7},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW18,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {K{\"{u}}nstliche Intelligenz: Vorsicht Hype!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {599--600},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1007-0},
  doi          = {10.1007/S11623-018-1007-0},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riemer18,
  author       = {Dieter Riemer},
  title        = {Die DONot - ein Nachruf},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {772--776},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1043-9},
  doi          = {10.1007/S11623-018-1043-9},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Riemer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RobrahnB18,
  author       = {Rasmus Robrahn and
                  Kirsten Bock},
  title        = {Schutzziele als Optimierungsgebote},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {7--11},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0882-8},
  doi          = {10.1007/S11623-018-0882-8},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RobrahnB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rocher18,
  author       = {Dror{-}John R{\"{o}}cher},
  title        = {Cyber Threat Intelligence 101},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {623--628},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1013-2},
  doi          = {10.1007/S11623-018-1013-2},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rocher18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RohrKG18,
  author       = {Sebastian Rohr and
                  Dennis{-}Kenji Kipker and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {722--726},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1032-z},
  doi          = {10.1007/S11623-018-1032-Z},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RohrKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Nationale Anpassung des Datenschutzrechts},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {471--472},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0981-6},
  doi          = {10.1007/S11623-018-0981-6},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Kontinuit{\"{a}}t oder Innovation?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {477--481},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0983-4},
  doi          = {10.1007/S11623-018-0983-4},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18b,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Umsetzung der Unionsregelungen zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {741--745},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1037-7},
  doi          = {10.1007/S11623-018-1037-7},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18,
  author       = {Martin Rost},
  title        = {Schutzziele im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0879-3},
  doi          = {10.1007/S11623-018-0879-3},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rost18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18a,
  author       = {Martin Rost},
  title        = {Die Ordnung der Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {13--17},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0883-7},
  doi          = {10.1007/S11623-018-0883-7},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rost18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18b,
  author       = {Martin Rost},
  title        = {K{\"{u}}nstliche Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {558--565},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0999-9},
  doi          = {10.1007/S11623-018-0999-9},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RothmannB18,
  author       = {Robert Rothmann and
                  Benedikt Buchner},
  title        = {Der typische Facebook-Nutzer zwischen Recht und Realit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {342--346},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0953-x},
  doi          = {10.1007/S11623-018-0953-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RothmannB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Saive18,
  author       = {David Saive},
  title        = {R{\"{u}}ckabwicklung von Blockchain-Transaktionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {764--767},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1041-y},
  doi          = {10.1007/S11623-018-1041-Y},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Saive18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schadt18,
  author       = {Achim Schadt},
  title        = {Vernetzung im {OP} - Echtzeitdaten als {\"{a}}rztliche Dokumentation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {169--173},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0931-3},
  doi          = {10.1007/S11623-018-0931-3},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schadt18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schael18,
  author       = {Christopher Schael},
  title        = {K{\"{u}}nstliche Intelligenz in der modernen Gesellschaft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {547--551},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0997-y},
  doi          = {10.1007/S11623-018-0997-Y},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schael18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlehahn18,
  author       = {Eva Schlehahn},
  title        = {Die Methodik des Standard-Datenschutzmodells im Bereich der {\"{o}}ffentlichen
                  Sicherheit und Justiz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {32--36},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0887-3},
  doi          = {10.1007/S11623-018-0887-3},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schlehahn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchroderAW18,
  author       = {Christian Schr{\"{o}}der and
                  Amelie von Alten and
                  Robert Weinhold},
  title        = {Stolpersteine der {DSGVO} f{\"{u}}r multinationale Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {746--752},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1038-6},
  doi          = {10.1007/S11623-018-1038-6},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchroderAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SparenbergP18,
  author       = {Michael Sparenberg and
                  Norbert Pohlmann},
  title        = {Cybersecurity made in {EU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {220--223},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0911-7},
  doi          = {10.1007/S11623-018-0911-7},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SparenbergP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steffen18,
  author       = {Nils Steffen},
  title        = {Zivilrechtliche Haftung von Datenschutzbeauftragten f{\"{u}}r
                  Bu{\ss}gelder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {145--150},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0925-1},
  doi          = {10.1007/S11623-018-0925-1},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Steffen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Strauss18,
  author       = {Stefan Strau{\ss}},
  title        = {Identifizierbarkeit in soziotechnischen Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {497--501},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0987-0},
  doi          = {10.1007/S11623-018-0987-0},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Strauss18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Supervisor18,
  author       = {European Data Protection Supervisor},
  title        = {{EDPS} calls for consistency in {EU} approach to criminal records},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {68},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0895-3},
  doi          = {10.1007/S11623-018-0895-3},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Supervisor18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tassi18,
  author       = {Smaro Tassi},
  title        = {Das Verh{\"{a}}ltnis von Sach- und Datenhehlerei},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {165--168},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0930-4},
  doi          = {10.1007/S11623-018-0930-4},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tassi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Thiel18,
  author       = {Barbara Thiel},
  title        = {Merkblatt f{\"{u}}r die Nutzung von "WhatsApp" in Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {601--602},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1008-z},
  doi          = {10.1007/S11623-018-1008-Z},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Thiel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Vom Schwein und anderen Querschnittsmaterien in der Union},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {67},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0894-4},
  doi          = {10.1007/S11623-018-0894-4},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18a,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Herausforderungen im europ{\"{a}}ischen Kulturerbejahr 2018 -
                  einige fragmentarische Betrachtungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {339--341},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0952-y},
  doi          = {10.1007/S11623-018-0952-Y},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18b,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Joseph Weizenbaum und die Utopie vom ganzen Menschen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {733},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1034-x},
  doi          = {10.1007/S11623-018-1034-X},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB18,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Rechtskultur dank EU-Datenschutz?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {335},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0950-0},
  doi          = {10.1007/S11623-018-0950-0},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese18,
  author       = {Sven Venzke{-}Caprarese},
  title        = {Haftungsrisiko Webtracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {156--158},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0927-z},
  doi          = {10.1007/S11623-018-0927-Z},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke-Caprarese18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vosshoff18,
  author       = {Andrea Vo{\ss}hoff},
  title        = {Dialogkonferenz "Datenschutz f{\"{u}}r Kinder": Belange der Kinder
                  st{\"{a}}rker ber{\"{u}}cksichtigen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {540},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0995-0},
  doi          = {10.1007/S11623-018-0995-0},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Vosshoff18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterG18,
  author       = {Michael W{\"{a}}chter and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {531--534},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0992-3},
  doi          = {10.1007/S11623-018-0992-3},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WachterG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WaltlV18,
  author       = {Bernhard Waltl and
                  Roland Vogl},
  title        = {Increasing Transparency in Algorithmic- Decision-Making with Explainable
                  {AI}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {613--617},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1011-4},
  doi          = {10.1007/S11623-018-1011-4},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WaltlV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WaschetzkiS18,
  author       = {Michael Waschetzki and
                  Martin Steinebach},
  title        = {Digitale Wasserzeichen in der Kriminalistik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {69--73},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0896-2},
  doi          = {10.1007/S11623-018-0896-2},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WaschetzkiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeberRKKSK18,
  author       = {Arnd Weber and
                  Steffen Reith and
                  Michael Kasper and
                  Dirk Kuhlmann and
                  Jean{-}Pierre Seifert and
                  Christoph Krau{\ss}},
  title        = {Souver{\"{a}}nit{\"{a}}t und die IT-Wertsch{\"{o}}pfungskette},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {291--293},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0943-z},
  doi          = {10.1007/S11623-018-0943-Z},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WeberRKKSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener18,
  author       = {Christoph Wegener},
  title        = {Chancen und Risiken intelligenter Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {595},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1006-1},
  doi          = {10.1007/S11623-018-1006-1},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert18,
  author       = {Thilo Weichert},
  title        = {Forensische DNA-Analysen und der Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {358--363},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0956-7},
  doi          = {10.1007/S11623-018-0956-7},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeidenhammerG18,
  author       = {Detlef Weidenhammer and
                  Rocco Gundlach},
  title        = {Wer kennt den "Stand der Technik"?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {106--110},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0902-8},
  doi          = {10.1007/S11623-018-0902-8},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeidenhammerG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wennemann18,
  author       = {Thomas Wennemann},
  title        = {{TOM} und die Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {174--177},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0932-2},
  doi          = {10.1007/S11623-018-0932-2},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wennemann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wessels18,
  author       = {Michael Wessels},
  title        = {Abmahnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {782},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1045-7},
  doi          = {10.1007/S11623-018-1045-7},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wessels18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wojak18,
  author       = {Stefanie Wojak},
  title        = {Intelligente Kollektiv-Algorithmen in der Personalverwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {553--557},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0998-x},
  doi          = {10.1007/S11623-018-0998-X},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wojak18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18,
  title        = {94. {DSK} am 08./09. November 2017 in Oldenburg},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {6},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0881-9},
  doi          = {10.1007/S11623-018-0881-9},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18a,
  title        = {94. Datenschutz-Konferenz am 08./09. November 2017 in Oldenburg -
                  Entschlie{\ss}ungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {45--46},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0889-1},
  doi          = {10.1007/S11623-018-0889-1},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics