Search dblp for Publications

export results for "toc:db/journals/dud/dud46.bht:"

 download as .bib file

@article{DBLP:journals/dud/AhrensH22,
  author       = {Maximilian Ahrens and
                  Wieland Holfelder},
  title        = {Innovative souver{\"{a}}ne Cloud-L{\"{o}}sungen durch integrierte
                  Transparenz- und Kontrollmechanismen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {627--631},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1671-y},
  doi          = {10.1007/S11623-022-1671-Y},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AhrensH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AndresenD22,
  author       = {S{\"{u}}nje Andresen and
                  Stephan Dreyer},
  title        = {Die Rolle der Eltern bei der datenschutzrechtlichen Einwilligung f{\"{u}}r
                  ihre Kinder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {361--366},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1620-9},
  doi          = {10.1007/S11623-022-1620-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AndresenD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Aretz22,
  author       = {Christian Aretz},
  title        = {Der Souver{\"{a}}n in der Krise},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {40--44},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1558-y},
  doi          = {10.1007/S11623-022-1558-Y},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Aretz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BerningerR22,
  author       = {Marc Berninger and
                  Bastian Raunecker},
  title        = {Kapitalmarktseitige Konsequenzen von Rechtsverst{\"{o}}{\ss}en
                  gegen die {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {164--173},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1582-y},
  doi          = {10.1007/S11623-022-1582-Y},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BerningerR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BessantS22,
  author       = {Claire Bessant and
                  Maximilian Schnebbe},
  title        = {Does the {GDPR} offer a solution to the 'problem' of sharenting?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {352--356},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1618-3},
  doi          = {10.1007/S11623-022-1618-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BessantS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brozio22,
  author       = {Volker Brozio},
  title        = {Interessenkonflikt des betrieblichen Datenschutzbeauftragten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {684},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1682-8},
  doi          = {10.1007/S11623-022-1682-8},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Brozio22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BruhnRWZ22,
  author       = {Jens Bruhn and
                  Alexander Ro{\ss}nagel and
                  Rouven Wachhaus and
                  Volker Zimmer},
  title        = {Datenschutz{\"{u}}berpr{\"{u}}fungen im IT-Labor von Aufsichtsbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {685--689},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1683-7},
  doi          = {10.1007/S11623-022-1683-7},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BruhnRWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {243--252},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1597-4},
  doi          = {10.1007/S11623-022-1597-4},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22a,
  author       = {Benedikt Buchner},
  title        = {Kinder im Netz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {333},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1613-8},
  doi          = {10.1007/S11623-022-1613-8},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22b,
  author       = {Benedikt Buchner},
  title        = {Forschungsdaten effektiver nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {555--560},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1658-8},
  doi          = {10.1007/S11623-022-1658-8},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22c,
  author       = {Benedikt Buchner},
  title        = {Digital Health},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {729},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1693-5},
  doi          = {10.1007/S11623-022-1693-5},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BurgdorfJ22,
  author       = {Milan Burgdorf and
                  Kai Jendria},
  title        = {{ISO} 27002 revisited},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {301--304},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1607-6},
  doi          = {10.1007/S11623-022-1607-6},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BurgdorfJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BurgfriedR22,
  author       = {Matthias Burgfried and
                  Andreas Reckert{-}Lodde},
  title        = {Die Deutsche Verwaltungscloud-Strategie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {611--615},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1668-6},
  doi          = {10.1007/S11623-022-1668-6},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BurgfriedR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Caspers22,
  author       = {Thomas Caspers},
  title        = {Souver{\"{a}}ne Clouds f{\"{u}}r den {\"{o}}ffentlichen
                  Sektor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {601},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1665-9},
  doi          = {10.1007/S11623-022-1665-9},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Caspers22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CejvanovicDHS22,
  author       = {Jasmina Cejvanovic and
                  Ann{-}Kristin Derst and
                  Maik Horz and
                  Steffen Schwalm},
  title        = {Rechtssicheres ersetzendes Scannen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {432--438},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1634-3},
  doi          = {10.1007/S11623-022-1634-3},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CejvanovicDHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterP22,
  author       = {Ulla Coester and
                  Norbert Pohlmann},
  title        = {Vertrauensw{\"{u}}rdigkeit schafft Vertrauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {233--238},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1594-7},
  doi          = {10.1007/S11623-022-1594-7},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CoesterP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dochow22,
  author       = {Carsten Dochow},
  title        = {Opt-ionen f{\"{u}}r die elektronische Patientenakte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {747--755},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1697-1},
  doi          = {10.1007/S11623-022-1697-1},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dochow22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DoubravaS22,
  author       = {Clemens Doubrava and
                  Vera Sikes},
  title        = {Cloud-Paradigma in der {\"{o}}ffentlichen Verwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {605--610},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1667-7},
  doi          = {10.1007/S11623-022-1667-7},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DoubravaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurmusES22,
  author       = {Erdem Durmus and
                  Jens Engelhardt and
                  Annika Selzer},
  title        = {Kontrollen bei Auftragsverarbeitern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {487--492},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1645-0},
  doi          = {10.1007/S11623-022-1645-0},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DurmusES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dyroff22,
  author       = {Daniel Dyroff},
  title        = {Lebenszyklusmanagement von digitalen Zertifikaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {225--226},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1592-9},
  doi          = {10.1007/S11623-022-1592-9},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dyroff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EinzingerRF22,
  author       = {Christoph Einzinger and
                  Christian R{\"{u}}ckert and
                  Felix C. Freiling},
  title        = {Datenminimierung in der Netzwerkforensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {149--155},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1580-0},
  doi          = {10.1007/S11623-022-1580-0},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EntschewHBN22,
  author       = {Enrico Entschew and
                  Kirk Hall and
                  Chris Bailey and
                  Kim Nguyen},
  title        = {A New eIDAS Beginning for QWACs},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {217--224},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1591-x},
  doi          = {10.1007/S11623-022-1591-X},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EntschewHBN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber22,
  author       = {Eberhard von Faber},
  title        = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {45--51},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1559-x},
  doi          = {10.1007/S11623-022-1559-X},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Faber22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber22a,
  author       = {Eberhard von Faber},
  title        = {Zw{\"{o}}lf Prinzipien f{\"{u}}r systematische IT-Service-Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {703--706},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1687-3},
  doi          = {10.1007/S11623-022-1687-3},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Faber22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FeldmannS22,
  author       = {Marius Feldmann and
                  Matthias Sutter},
  title        = {Open-Source-L{\"{o}}sungen zur Automatisierung des Deployments
                  und Betriebs von Clouds},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {637--639},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1673-9},
  doi          = {10.1007/S11623-022-1673-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FeldmannS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerG22,
  author       = {Arno Fiedler and
                  Franziska Granc},
  title        = {Nationale und europ{\"{a}}ische Sicht auf eIDAS 2.0 - Aufwand
                  und Nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {27--31},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1556-0},
  doi          = {10.1007/S11623-022-1556-0},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerGN22,
  author       = {Arno Fiedler and
                  Ernst{-}G{\"{u}}nter Giessmann and
                  Kim Nguyen},
  title        = {Die Bedeutung von {PKI} - Gestern, Heute und Morgen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {209--214},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1589-4},
  doi          = {10.1007/S11623-022-1589-4},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerGN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Folkerts22,
  author       = {Elena Folkerts},
  title        = {Wirklich freiwillig?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {77--80},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1565-z},
  doi          = {10.1007/S11623-022-1565-Z},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Folkerts22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22,
  author       = {Dirk Fox},
  title        = {Pr{\"{u}}fstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {133},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1576-9},
  doi          = {10.1007/S11623-022-1576-9},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22a,
  author       = {Dirk Fox},
  title        = {Zero Trust},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {174--175},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1583-x},
  doi          = {10.1007/S11623-022-1583-X},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22b,
  author       = {Dirk Fox},
  title        = {Warnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {265},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1600-0},
  doi          = {10.1007/S11623-022-1600-0},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22c,
  author       = {Dirk Fox},
  title        = {Das Prinzip Verantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {681},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1681-9},
  doi          = {10.1007/S11623-022-1681-9},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Freye22,
  author       = {Merle Freye},
  title        = {Die Datenschutzerkl{\"{a}}rungen von Gesundheits-Apps},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {762--766},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1698-0},
  doi          = {10.1007/S11623-022-1698-0},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Freye22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FriedewaldRBGHB22,
  author       = {Michael Friedewald and
                  Alexander Ro{\ss}nagel and
                  Tamer Bile and
                  Christian L. Geminn and
                  Marit Hansen and
                  Felix Bieker and
                  Murat Karaboga},
  title        = {Zur Einf{\"{u}}hrung einer {\"{U}}berwachungs-Gesamtrechnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {572--577},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1661-0},
  doi          = {10.1007/S11623-022-1661-0},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FriedewaldRBGHB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gassner22,
  author       = {Ulrich M. Gassner},
  title        = {Forschung und Innovation im europ{\"{a}}ischen Gesundheitsdatenraum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {739--746},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1696-2},
  doi          = {10.1007/S11623-022-1696-2},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Gassner22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeisslerPSW22,
  author       = {Ines Geissler and
                  Ulrich Pordesch and
                  Annika Selzer and
                  Thomas Wilmer},
  title        = {Auswahl cloudbasierter Dienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {690--694},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1684-6},
  doi          = {10.1007/S11623-022-1684-6},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GeisslerPSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeminnT22,
  author       = {Christian Geminn and
                  Marie{-}Theres Tinnefeld},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {327--332},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1612-9},
  doi          = {10.1007/S11623-022-1612-9},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GeminnT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Glemser22,
  author       = {Tobias Glemser},
  title        = {{OWASP} Top 10},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {695--698},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1685-5},
  doi          = {10.1007/S11623-022-1685-5},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Glemser22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gotz22,
  author       = {Isabell G{\"{o}}tz},
  title        = {Lach' doch mal!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {357--360},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1619-2},
  doi          = {10.1007/S11623-022-1619-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gotz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich22,
  author       = {Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {261--264},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1599-2},
  doi          = {10.1007/S11623-022-1599-2},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gramlich22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP22,
  author       = {Ludwig Gramlich and
                  Ronald Petrlic},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {532--536},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1653-0},
  doi          = {10.1007/S11623-022-1653-0},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GreteK22,
  author       = {Patrick Grete and
                  Carsten Kestermann},
  title        = {Cloud Computing im Spannungsfeld von Souver{\"{a}}nit{\"{a}}t,
                  Cybersicherheit und {\"{O}}konomie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {632--636},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1672-x},
  doi          = {10.1007/S11623-022-1672-X},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GreteK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GruberF22,
  author       = {Jan Gruber and
                  Felix C. Freiling},
  title        = {Fighting Evasive Malware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {284--290},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1604-9},
  doi          = {10.1007/S11623-022-1604-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GruberF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HamacherKLBHSMW22,
  author       = {Kay Hamacher and
                  Tobias Kussel and
                  Tatiana von Landesberger and
                  Tom Baumgartl and
                  Markus H{\"{o}}hn and
                  Simone Scheithauer and
                  Michael Marschollek and
                  Antje Wulff},
  title        = {Fallzahlen, Re-Identifikation und der technische Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {143--148},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1579-6},
  doi          = {10.1007/S11623-022-1579-6},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HamacherKLBHSMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22,
  author       = {Marit Hansen},
  title        = {{ULD:} 40. T{\"{a}}tigkeitsbericht 2021},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {268},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1601-z},
  doi          = {10.1007/S11623-022-1601-Z},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22a,
  author       = {Marit Hansen},
  title        = {Deutschlands Plan zur St{\"{a}}rkung der B{\"{u}}rgerrechte
                  im digitalen Raum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {550--554},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1657-9},
  doi          = {10.1007/S11623-022-1657-9},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22b,
  author       = {Marit Hansen},
  title        = {E-Rezept-Verfahren: maschinenlesbare Codes sch{\"{u}}tzen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {604},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1666-8},
  doi          = {10.1007/S11623-022-1666-8},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HillebrandSP22,
  author       = {Annette Hillebrand and
                  Jana Stuck and
                  Pirmin Puhl},
  title        = {Vertrauen in Datenverarbeitung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {493--498},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1646-z},
  doi          = {10.1007/S11623-022-1646-Z},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HillebrandSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hofmann22,
  author       = {Sebastian Hofmann},
  title        = {Forschungsklausel statt Broad Consent},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {756--761},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1691-7},
  doi          = {10.1007/S11623-022-1691-7},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Hofmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Horlbeck22,
  author       = {Katja Horlbeck},
  title        = {Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {567--571},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1660-1},
  doi          = {10.1007/S11623-022-1660-1},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Horlbeck22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hornung22,
  author       = {Gerrit Hornung},
  title        = {KI-Regulierung im Mehrebenensystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {561--566},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1659-7},
  doi          = {10.1007/S11623-022-1659-7},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hornung22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HornungSSZ22,
  author       = {Gerrit Hornung and
                  Matthias S{\"{o}}llner and
                  Jan{-}Philipp Stroscher and
                  Eva{-}Maria Zahn},
  title        = {Kollaboration im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {384--389},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1625-4},
  doi          = {10.1007/S11623-022-1625-4},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HornungSSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoeB22,
  author       = {Alicia Joe and
                  Benedikt Buchner},
  title        = {Kinder als digitales Freiwild},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {381--383},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1624-5},
  doi          = {10.1007/S11623-022-1624-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JoeB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JohnR22,
  author       = {Nicolas John and
                  Justin Rennert},
  title        = {Cookieless Tracking: Neue M{\"{o}}glichkeiten unter dem TTDSG?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {643--648},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1675-7},
  doi          = {10.1007/S11623-022-1675-7},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JohnR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Joos22,
  author       = {Harald Joos},
  title        = {Hochskalierbares Cloud Computing mit nationalen Hyperscalern f{\"{u}}r
                  die Verwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {699--702},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1686-4},
  doi          = {10.1007/S11623-022-1686-4},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Joos22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoosM22,
  author       = {Daniel Joos and
                  Kristof Meding},
  title        = {Anforderungen bei der Einf{\"{u}}hrung und Entwicklung von {KI}
                  zur Gew{\"{a}}hrleistung von Fairness und Diskriminierungsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {376--380},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1623-6},
  doi          = {10.1007/S11623-022-1623-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JoosM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoosN22,
  author       = {Daniel Joos and
                  Peter N{\"{a}}gele},
  title        = {Verarbeitung personenbezogener Echtdaten zur Netz- und Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {578--583},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1662-z},
  doi          = {10.1007/S11623-022-1662-Z},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JoosN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22,
  author       = {Ulrich Kelber},
  title        = {Die {DSK} st{\"{a}}rkt die informationelle Selbstbestimmung und
                  der {EDSA} gibt den Betroffenenrechten der {DSGVO} einen verbindlichen
                  Rahmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {136},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1577-8},
  doi          = {10.1007/S11623-022-1577-8},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22a,
  author       = {Ulrich Kelber},
  title        = {Koordinierte Durchsetzung durch 22 Aufsichtsbeh{\"{o}}rden zur
                  Nutzung von Cloud-Diensten durch den {\"{o}}ffentlichen Sektor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {200},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1587-6},
  doi          = {10.1007/S11623-022-1587-6},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22b,
  author       = {Ulrich Kelber},
  title        = {Mastodon: Datenschutzfreundliche Twitter-Alternative},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {412},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1630-7},
  doi          = {10.1007/S11623-022-1630-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koch22,
  author       = {Manuel Koch},
  title        = {Telematikinfrastruktur 2.0 - Verhindern von missbr{\"{a}}uchlicher
                  Profilbildung durch {PET}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {427--431},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1633-4},
  doi          = {10.1007/S11623-022-1633-4},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Koch22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KronkeT22,
  author       = {Christoph Kr{\"{o}}nke and
                  Elissa Tschachler},
  title        = {Ein Opt-out f{\"{u}}r die elektronische Patientenakte (ePA)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {419--426},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1632-5},
  doi          = {10.1007/S11623-022-1632-5},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KronkeT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kudra22,
  author       = {Andre Kudra},
  title        = {Self-Sovereign Identity {(SSI)} in Deutschland},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {22--26},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1555-1},
  doi          = {10.1007/S11623-022-1555-1},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kudra22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KudraSS22,
  author       = {Andre Kudra and
                  Christian Seegebarth and
                  Steffen Schwalm},
  title        = {Ein digitaler Vertrauensraum f{\"{u}}r Identit{\"{a}}ten
                  und Dienste - Europa ist auf dem richtigen Weg},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {9--11},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1552-4},
  doi          = {10.1007/S11623-022-1552-4},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KudraSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KunzW22,
  author       = {Thomas Kunz and
                  Ulrich Waldmann},
  title        = {ML-basierte Unterst{\"{u}}tzung von L{\"{o}}sch- und Aufbewahrungspflichten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {649--653},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1676-6},
  doi          = {10.1007/S11623-022-1676-6},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KunzW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KusberSKE22,
  author       = {Tomasz Kusber and
                  Steffen Schwalm and
                  Ulrike Korte and
                  Mario Engel},
  title        = {Langfristige Beweissicherheit und Vertrauensw{\"{u}}rdigkeit
                  digitaler Unterlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {32--39},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1557-z},
  doi          = {10.1007/S11623-022-1557-Z},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KusberSKE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutscher22,
  author       = {Nadia Kutscher},
  title        = {Sharenting als familialer Alltag},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {346--351},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1617-4},
  doi          = {10.1007/S11623-022-1617-4},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kutscher22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LangK22,
  author       = {Simon Lang and
                  Ralf Kneuper},
  title        = {Datenschutz und Informationssicherheit in Gaia-X},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {778--781},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1692-6},
  doi          = {10.1007/S11623-022-1692-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LangK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LefferW22,
  author       = {Lena Leffer and
                  Michelle Weber},
  title        = {Technische und strafrechtliche Implikationen des unbemerkten Einsatzes
                  von AirTags},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {137--142},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1578-7},
  doi          = {10.1007/S11623-022-1578-7},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/LefferW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LehrDKV22,
  author       = {Franz Lehr and
                  Heike Dietmann and
                  Chiara Krisam and
                  Melanie Volkamer},
  title        = {Manipulative Designs von Cookies},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {296--300},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1606-7},
  doi          = {10.1007/S11623-022-1606-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LehrDKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeichtH22,
  author       = {Maximilian Leicht and
                  Stefan Hessel},
  title        = {Datenschutzrechtliche Verantwortlichkeit in der Forschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {305--309},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1608-5},
  doi          = {10.1007/S11623-022-1608-5},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LeichtH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Liptak22,
  author       = {Patrick Liptak},
  title        = {Ein neuer Rahmen f{\"{u}}r eine europ{\"{a}}ische digitale
                  Identit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {18--21},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1554-2},
  doi          = {10.1007/S11623-022-1554-2},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Liptak22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester22,
  author       = {Britta Alexandra Mester},
  title        = {Besch{\"{a}}ftigtendatenschutz - Digitale Arbeitswelten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {73},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1563-1},
  doi          = {10.1007/S11623-022-1563-1},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mester22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mollik22,
  author       = {Mirko Mollik},
  title        = {Blockchain als sicheres Register},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {201--208},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1588-5},
  doi          = {10.1007/S11623-022-1588-5},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mollik22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MosesS22,
  author       = {Frank Moses and
                  Kurt Sandkuhl},
  title        = {Mit {CISIS12} ein {ISMS} aufbauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {654--659},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1677-5},
  doi          = {10.1007/S11623-022-1677-5},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MosesS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MullerRWWH22,
  author       = {Robin M{\"{u}}ller and
                  Julius Ruppert and
                  Katharina Will and
                  Lukas W{\"{u}}steney and
                  Tobias Heer},
  title        = {Analyzing the Software Patch Discipline Across Different Industries
                  and Countries},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {269--275},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1602-y},
  doi          = {10.1007/S11623-022-1602-Y},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MullerRWWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen22,
  author       = {Kim Nguyen},
  title        = {Sichere elektronische Identit{\"{a}}t - ein Ziel f{\"{u}}r
                  Europa!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1549-z},
  doi          = {10.1007/S11623-022-1549-Z},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PeeckhausS22,
  author       = {Martin Peeckhaus and
                  Klaus Schmeh},
  title        = {Benutzerfreundliche Mail-Verschl{\"{u}}sselung bei einer Bundesbeh{\"{o}}rde},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {444--447},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1636-1},
  doi          = {10.1007/S11623-022-1636-1},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PeeckhausS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri22,
  author       = {Thomas Petri},
  title        = {Die prim{\"{a}}re und sekund{\"{a}}re Nutzung elektronischer
                  Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {413--418},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1631-6},
  doi          = {10.1007/S11623-022-1631-6},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri22a,
  author       = {Thomas Petri},
  title        = {Rechtsprechung zur {DS-GVO} in den Jahren 2021-2022},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {767--773},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1699-z},
  doi          = {10.1007/S11623-022-1699-Z},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann22,
  author       = {Norbert Pohlmann},
  title        = {Vertrauensw{\"{u}}rdige IT-Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {197},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1586-7},
  doi          = {10.1007/S11623-022-1586-7},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR22,
  author       = {Norbert Pohlmann and
                  Helmut Reimer},
  title        = {Cyber-Sicherheit - gemeinsam Grenzen {\"{u}}berwinden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {242},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1596-5},
  doi          = {10.1007/S11623-022-1596-5},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RehbohmKCS22,
  author       = {Thomas Rehbohm and
                  Robin Kemmerich and
                  Clemens H. Cap and
                  Kurt Sandkuhl},
  title        = {Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische
                  Studie in deutschen Kommunen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {448--454},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1637-0},
  doi          = {10.1007/S11623-022-1637-0},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RehbohmKCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer22,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {253--260},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1598-3},
  doi          = {10.1007/S11623-022-1598-3},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer22a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {717--724},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1689-1},
  doi          = {10.1007/S11623-022-1689-1},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rosenberger22,
  author       = {Nadine Rosenberger},
  title        = {Bewerberscreening unter Geltung der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {87--92},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1567-x},
  doi          = {10.1007/S11623-022-1567-X},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rosenberger22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Verbessert die Ampel-Koalition den Datenschutz?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {537--538},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1654-z},
  doi          = {10.1007/S11623-022-1654-Z},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Datenschutzanforderungen an Videokonferenzsysteme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {543--544},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1655-y},
  doi          = {10.1007/S11623-022-1655-Y},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22b,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Internationaler Datentransfer},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {545--549},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1656-x},
  doi          = {10.1007/S11623-022-1656-X},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22c,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Festakt im Hessischen Landtag: 50 Jahre Datenschutz in Hessen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {732},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1694-4},
  doi          = {10.1007/S11623-022-1694-4},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22d,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {797--800},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1703-7},
  doi          = {10.1007/S11623-022-1703-7},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelGJM22,
  author       = {Alexander Ro{\ss}nagel and
                  Christian L. Geminn and
                  Paul C. Johannes and
                  Johannes K. M. M{\"{u}}ller},
  title        = {Auswirkungen ausl{\"{a}}ndischer Gesetzgebung auf die deutsche
                  Cybersicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {156--163},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1581-z},
  doi          = {10.1007/S11623-022-1581-Z},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RossnagelGJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossow22,
  author       = {Olaf Rossow},
  title        = {Datenschutz beim Betriebsrat},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {81--86},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1566-y},
  doi          = {10.1007/S11623-022-1566-Y},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossow22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossow22a,
  author       = {Olaf Rossow},
  title        = {Arbeitgeber und das Fernmeldegeheimnis nach dem {TTDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {93--97},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1568-9},
  doi          = {10.1007/S11623-022-1568-9},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossow22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SaatjohannIGNSK22,
  author       = {Christoph Saatjohann and
                  Fabian Ising and
                  Matthias Gierlings and
                  Dominik Noss and
                  Sascha Schimmler and
                  Alexander Klemm and
                  Leif Grundmann and
                  Tilman Frosch and
                  Sebastian Schinzel},
  title        = {Sicherheit medizintechnischer Protokolle im Krankenhaus},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {276--283},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1603-x},
  doi          = {10.1007/S11623-022-1603-X},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SaatjohannIGNSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Salemi22,
  author       = {Simone Salemi},
  title        = {Chancen und Risiken von {PIMS} nach {\textsection} 26 {TTDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {505--510},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1648-x},
  doi          = {10.1007/S11623-022-1648-X},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Salemi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchaarschmidtSS22,
  author       = {Konstantin Schaarschmidt and
                  Martin Schallbruch and
                  Stefan Schuck},
  title        = {Digitale Brieftaschen f{\"{u}}r sichere Identit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {12--17},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1553-3},
  doi          = {10.1007/S11623-022-1553-3},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchaarschmidtSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schellhas-Mende22,
  author       = {Friederike Schellhas{-}Mende and
                  Nils Wiedemann and
                  Nicolas Blum},
  title        = {Videokonferenzsysteme als Telekommunikationsdienst},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {291--295},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1605-8},
  doi          = {10.1007/S11623-022-1605-8},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schellhas-Mende22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmehE22,
  author       = {Klaus Schmeh and
                  Matthias Edelhoff},
  title        = {{S/MIME} und {PGP} im selben Client},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {439--443},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1635-2},
  doi          = {10.1007/S11623-022-1635-2},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchmehE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe22,
  author       = {Maximilian Schnebbe},
  title        = {Minderj{\"{a}}hrigenschutz in der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {367--370},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1621-8},
  doi          = {10.1007/S11623-022-1621-8},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnebbe22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchurmannB22,
  author       = {Kathrin Sch{\"{u}}rmann and
                  Jan O. Baier},
  title        = {Schadensersatzanspr{\"{u}}che im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {103--106},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1570-2},
  doi          = {10.1007/S11623-022-1570-2},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchurmannB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seegebarth22,
  author       = {Christian Seegebarth},
  title        = {eIDAS-Novellierung 2021 - erste Analyse des Proposals},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {5--8},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1551-5},
  doi          = {10.1007/S11623-022-1551-5},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Seegebarth22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerS22,
  author       = {Annika Selzer and
                  Sarah Stummer},
  title        = {Hat die h{\"{a}}ufige Videotelefonie in Corona-Zeiten Einfluss
                  auf unser Privatsph{\"{a}}reverst{\"{a}}ndnis genommen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {774--777},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1700-x},
  doi          = {10.1007/S11623-022-1700-X},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SelzerS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stapf22,
  author       = {Ingrid Stapf},
  title        = {Das Recht auf eine offene Zukunft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {339--345},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1616-5},
  doi          = {10.1007/S11623-022-1616-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stapf22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld22,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Grundrechtsschutz: Antworten auf pandemiebedingte Einschr{\"{a}}nkungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {336--337},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1614-7},
  doi          = {10.1007/S11623-022-1614-7},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/UrbanG22,
  author       = {Manuela Urban and
                  Kurt Garloff},
  title        = {Sovereign Cloud Stack},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {616--621},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1669-5},
  doi          = {10.1007/S11623-022-1669-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/UrbanG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vasquez22,
  author       = {Sheila Vasquez},
  title        = {Privacy by Design und das autonome Fahrzeug},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {98--102},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1569-8},
  doi          = {10.1007/S11623-022-1569-8},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Vasquez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vassilaki22,
  author       = {Irini E. Vassilaki},
  title        = {Anleitung zu sexuellem Missbrauch von Kindern gem. {\textsection}
                  176e StGB},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {107--110},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1571-1},
  doi          = {10.1007/S11623-022-1571-1},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Vassilaki22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22,
  author       = {Thilo Weichert},
  title        = {Anmerkung zum Urteil des {OVG} Schleswig-Holstein vom 25.11.2021 -
                  Unzul{\"{a}}ssigkeit einer Facebook-Fanpage},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {239--241},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1595-6},
  doi          = {10.1007/S11623-022-1595-6},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22a,
  author       = {Thilo Weichert},
  title        = {Die Ernennung von Mitgliedern nach Art. 53 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {371--375},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1622-7},
  doi          = {10.1007/S11623-022-1622-7},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22b,
  author       = {Thilo Weichert},
  title        = {Was das Abtreibungsrecht in den {USA} mit Datenschutz zu tun hat},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {511--515},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1649-9},
  doi          = {10.1007/S11623-022-1649-9},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeichertGG22,
  author       = {Thilo Weichert and
                  Ludwig Gramlich and
                  Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {724--728},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1690-8},
  doi          = {10.1007/S11623-022-1690-8},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeichertGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weiss22,
  author       = {Andreas Weiss},
  title        = {Gaia-X - Grundlagen f{\"{u}}r den Aufbau f{\"{o}}derierter,
                  digitaler {\"{O}}kosysteme nach europ{\"{a}}ischen Regeln},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {227--232},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1593-8},
  doi          = {10.1007/S11623-022-1593-8},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weiss22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Welz22,
  author       = {Georges Welz},
  title        = {Ein neuer sicherer Hafen in der Cloud - auch f{\"{u}}r staatliche
                  Verschlusssachen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {622--626},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1670-z},
  doi          = {10.1007/S11623-022-1670-Z},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Welz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wichmann22,
  author       = {Markus Wichmann},
  title        = {TeleTrusT European Bridge {CA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {4},
  pages        = {215--216},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1590-y},
  doi          = {10.1007/S11623-022-1590-Y},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wichmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Will22,
  author       = {Michael Will},
  title        = {E-Mail-Accounts im Visier von Cyberkriminellen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {485--486},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1644-1},
  doi          = {10.1007/S11623-022-1644-1},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Will22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wolff22,
  author       = {Daniel Wolff},
  title        = {KI-Biases im Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {733--738},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1695-3},
  doi          = {10.1007/S11623-022-1695-3},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wolff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wonnemann22,
  author       = {Claus Wonnemann},
  title        = {Cyber-Security entlang der IoT-Lieferkette},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {455--458},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1638-z},
  doi          = {10.1007/S11623-022-1638-Z},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wonnemann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22,
  title        = {Verarbeitungen des Datums , , Impfstatus" von Besch{\"{a}}ftigten
                  durch die Arbeitgeberin oder den Arbeitgeber},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1550-6},
  doi          = {10.1007/S11623-022-1550-6},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22a,
  title        = {{\"{O}}ffentliche Verwaltung - Digitalisierung 2022},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {52},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1560-4},
  doi          = {10.1007/S11623-022-1560-4},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22aa,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {584--591},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1663-y},
  doi          = {10.1007/S11623-022-1663-Y},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ab,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {9},
  pages        = {592--600},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1664-x},
  doi          = {10.1007/S11623-022-1664-X},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ac,
  title        = {Hyperscaler - die Globalisierung von Cloud-Diensten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {660},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1678-4},
  doi          = {10.1007/S11623-022-1678-4},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ad,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {661--671},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1679-3},
  doi          = {10.1007/S11623-022-1679-3},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ae,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {671--680},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1680-x},
  doi          = {10.1007/S11623-022-1680-X},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22af,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {707--716},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1688-2},
  doi          = {10.1007/S11623-022-1688-2},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ag,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {782--790},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1701-9},
  doi          = {10.1007/S11623-022-1701-9},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ah,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {12},
  pages        = {791--797},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1702-8},
  doi          = {10.1007/S11623-022-1702-8},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22ah.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22b,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {53--63},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1561-3},
  doi          = {10.1007/S11623-022-1561-3},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22c,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {64--72},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1562-2},
  doi          = {10.1007/S11623-022-1562-2},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22d,
  title        = {{DSK:} Neue Orientierungshilfe f{\"{u}}r Anbieter: innen von
                  Telemedien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {76},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1564-0},
  doi          = {10.1007/S11623-022-1564-0},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22e,
  title        = {Whistleblowing - Fehlende Umsetzung einer EU-Richtlinie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {111--112},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1572-0},
  doi          = {10.1007/S11623-022-1572-0},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22f,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {113--121},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1573-z},
  doi          = {10.1007/S11623-022-1573-Z},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22g,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {122--128},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1574-y},
  doi          = {10.1007/S11623-022-1574-Y},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22h,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {2},
  pages        = {128--132},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1575-x},
  doi          = {10.1007/S11623-022-1575-X},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22i,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {176--186},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1584-9},
  doi          = {10.1007/S11623-022-1584-9},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22j,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {187--196},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1585-8},
  doi          = {10.1007/S11623-022-1585-8},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X22j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22k,
  title        = {103. Datenschutzkonferenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {310--311},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1609-4},
  doi          = {10.1007/S11623-022-1609-4},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22l,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {312--318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1610-y},
  doi          = {10.1007/S11623-022-1610-Y},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22m,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {319--327},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1611-x},
  doi          = {10.1007/S11623-022-1611-X},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22n,
  title        = {Information zur Nutzung von Facebook-Fanpages},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {338},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1615-6},
  doi          = {10.1007/S11623-022-1615-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22o,
  title        = {Einwilligung eines Kindes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {390},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1626-3},
  doi          = {10.1007/S11623-022-1626-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22p,
  title        = {Einwilligung eines Kindes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {391--398},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1627-2},
  doi          = {10.1007/S11623-022-1627-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22q,
  title        = {DuD Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {6},
  pages        = {399--408},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1628-1},
  doi          = {10.1007/S11623-022-1628-1},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22r,
  title        = {Digitalisierung ist kein Selbstzweck!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {409},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1629-0},
  doi          = {10.1007/S11623-022-1629-0},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22s,
  title        = {Die Zeit f{\"{u}}r ein Besch{\"{a}}ftigtendatenschutzgesetz
                  ist , , Jetzt"!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {459--460},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1639-y},
  doi          = {10.1007/S11623-022-1639-Y},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22t,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {461--470},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1640-5},
  doi          = {10.1007/S11623-022-1640-5},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22u,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {471--477},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1641-4},
  doi          = {10.1007/S11623-022-1641-4},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22v,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {7},
  pages        = {477--480},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1642-3},
  doi          = {10.1007/S11623-022-1642-3},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22w,
  title        = {Aufgel{\"{o}}ste Verantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {481},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1643-2},
  doi          = {10.1007/S11623-022-1643-2},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22x,
  title        = {Mehr Rechtssicherheit f{\"{u}}r die IT-Sicherheitsforschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {516--517},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1650-3},
  doi          = {10.1007/S11623-022-1650-3},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22y,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {518--525},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1651-2},
  doi          = {10.1007/S11623-022-1651-2},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22z,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {526--532},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1652-1},
  doi          = {10.1007/S11623-022-1652-1},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X22z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZendelZ22,
  author       = {Oliver Zendel and
                  Marianne Ziesmer},
  title        = {Geheimkommunikation mit moderner {IT}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {10},
  pages        = {640--642},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1674-8},
  doi          = {10.1007/S11623-022-1674-8},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ZendelZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZunabovicG22,
  author       = {Sandra Zunabovic and
                  Rainer W. Gerling},
  title        = {IT-Sicherheit in der Arztpraxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {8},
  pages        = {499--504},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1647-y},
  doi          = {10.1007/S11623-022-1647-Y},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ZunabovicG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics