Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud46.bht:"
@article{DBLP:journals/dud/AhrensH22, author = {Maximilian Ahrens and Wieland Holfelder}, title = {Innovative souver{\"{a}}ne Cloud-L{\"{o}}sungen durch integrierte Transparenz- und Kontrollmechanismen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {627--631}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1671-y}, doi = {10.1007/S11623-022-1671-Y}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AhrensH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AndresenD22, author = {S{\"{u}}nje Andresen and Stephan Dreyer}, title = {Die Rolle der Eltern bei der datenschutzrechtlichen Einwilligung f{\"{u}}r ihre Kinder}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {361--366}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1620-9}, doi = {10.1007/S11623-022-1620-9}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AndresenD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Aretz22, author = {Christian Aretz}, title = {Der Souver{\"{a}}n in der Krise}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {40--44}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1558-y}, doi = {10.1007/S11623-022-1558-Y}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Aretz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BerningerR22, author = {Marc Berninger and Bastian Raunecker}, title = {Kapitalmarktseitige Konsequenzen von Rechtsverst{\"{o}}{\ss}en gegen die {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {164--173}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1582-y}, doi = {10.1007/S11623-022-1582-Y}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BerningerR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BessantS22, author = {Claire Bessant and Maximilian Schnebbe}, title = {Does the {GDPR} offer a solution to the 'problem' of sharenting?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {352--356}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1618-3}, doi = {10.1007/S11623-022-1618-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BessantS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brozio22, author = {Volker Brozio}, title = {Interessenkonflikt des betrieblichen Datenschutzbeauftragten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {684}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1682-8}, doi = {10.1007/S11623-022-1682-8}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Brozio22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BruhnRWZ22, author = {Jens Bruhn and Alexander Ro{\ss}nagel and Rouven Wachhaus and Volker Zimmer}, title = {Datenschutz{\"{u}}berpr{\"{u}}fungen im IT-Labor von Aufsichtsbeh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {685--689}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1683-7}, doi = {10.1007/S11623-022-1683-7}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BruhnRWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {243--252}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1597-4}, doi = {10.1007/S11623-022-1597-4}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22a, author = {Benedikt Buchner}, title = {Kinder im Netz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {333}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1613-8}, doi = {10.1007/S11623-022-1613-8}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22b, author = {Benedikt Buchner}, title = {Forschungsdaten effektiver nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {555--560}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1658-8}, doi = {10.1007/S11623-022-1658-8}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner22c, author = {Benedikt Buchner}, title = {Digital Health}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {729}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1693-5}, doi = {10.1007/S11623-022-1693-5}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Buchner22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BurgdorfJ22, author = {Milan Burgdorf and Kai Jendria}, title = {{ISO} 27002 revisited}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {301--304}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1607-6}, doi = {10.1007/S11623-022-1607-6}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BurgdorfJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BurgfriedR22, author = {Matthias Burgfried and Andreas Reckert{-}Lodde}, title = {Die Deutsche Verwaltungscloud-Strategie}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {611--615}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1668-6}, doi = {10.1007/S11623-022-1668-6}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BurgfriedR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Caspers22, author = {Thomas Caspers}, title = {Souver{\"{a}}ne Clouds f{\"{u}}r den {\"{o}}ffentlichen Sektor}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {601}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1665-9}, doi = {10.1007/S11623-022-1665-9}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Caspers22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CejvanovicDHS22, author = {Jasmina Cejvanovic and Ann{-}Kristin Derst and Maik Horz and Steffen Schwalm}, title = {Rechtssicheres ersetzendes Scannen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {432--438}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1634-3}, doi = {10.1007/S11623-022-1634-3}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CejvanovicDHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CoesterP22, author = {Ulla Coester and Norbert Pohlmann}, title = {Vertrauensw{\"{u}}rdigkeit schafft Vertrauen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {233--238}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1594-7}, doi = {10.1007/S11623-022-1594-7}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CoesterP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dochow22, author = {Carsten Dochow}, title = {Opt-ionen f{\"{u}}r die elektronische Patientenakte}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {747--755}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1697-1}, doi = {10.1007/S11623-022-1697-1}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dochow22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DoubravaS22, author = {Clemens Doubrava and Vera Sikes}, title = {Cloud-Paradigma in der {\"{o}}ffentlichen Verwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {605--610}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1667-7}, doi = {10.1007/S11623-022-1667-7}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DoubravaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DurmusES22, author = {Erdem Durmus and Jens Engelhardt and Annika Selzer}, title = {Kontrollen bei Auftragsverarbeitern}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {487--492}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1645-0}, doi = {10.1007/S11623-022-1645-0}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DurmusES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dyroff22, author = {Daniel Dyroff}, title = {Lebenszyklusmanagement von digitalen Zertifikaten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {225--226}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1592-9}, doi = {10.1007/S11623-022-1592-9}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dyroff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EinzingerRF22, author = {Christoph Einzinger and Christian R{\"{u}}ckert and Felix C. Freiling}, title = {Datenminimierung in der Netzwerkforensik}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {149--155}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1580-0}, doi = {10.1007/S11623-022-1580-0}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EntschewHBN22, author = {Enrico Entschew and Kirk Hall and Chris Bailey and Kim Nguyen}, title = {A New eIDAS Beginning for QWACs}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {217--224}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1591-x}, doi = {10.1007/S11623-022-1591-X}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EntschewHBN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber22, author = {Eberhard von Faber}, title = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {45--51}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1559-x}, doi = {10.1007/S11623-022-1559-X}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Faber22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber22a, author = {Eberhard von Faber}, title = {Zw{\"{o}}lf Prinzipien f{\"{u}}r systematische IT-Service-Security}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {703--706}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1687-3}, doi = {10.1007/S11623-022-1687-3}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Faber22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FeldmannS22, author = {Marius Feldmann and Matthias Sutter}, title = {Open-Source-L{\"{o}}sungen zur Automatisierung des Deployments und Betriebs von Clouds}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {637--639}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1673-9}, doi = {10.1007/S11623-022-1673-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FeldmannS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerG22, author = {Arno Fiedler and Franziska Granc}, title = {Nationale und europ{\"{a}}ische Sicht auf eIDAS 2.0 - Aufwand und Nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {27--31}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1556-0}, doi = {10.1007/S11623-022-1556-0}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FiedlerG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerGN22, author = {Arno Fiedler and Ernst{-}G{\"{u}}nter Giessmann and Kim Nguyen}, title = {Die Bedeutung von {PKI} - Gestern, Heute und Morgen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {209--214}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1589-4}, doi = {10.1007/S11623-022-1589-4}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerGN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Folkerts22, author = {Elena Folkerts}, title = {Wirklich freiwillig?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {77--80}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1565-z}, doi = {10.1007/S11623-022-1565-Z}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Folkerts22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22, author = {Dirk Fox}, title = {Pr{\"{u}}fstand}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {133}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1576-9}, doi = {10.1007/S11623-022-1576-9}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22a, author = {Dirk Fox}, title = {Zero Trust}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {174--175}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1583-x}, doi = {10.1007/S11623-022-1583-X}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22b, author = {Dirk Fox}, title = {Warnung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {265}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1600-0}, doi = {10.1007/S11623-022-1600-0}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox22c, author = {Dirk Fox}, title = {Das Prinzip Verantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {681}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1681-9}, doi = {10.1007/S11623-022-1681-9}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Freye22, author = {Merle Freye}, title = {Die Datenschutzerkl{\"{a}}rungen von Gesundheits-Apps}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {762--766}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1698-0}, doi = {10.1007/S11623-022-1698-0}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Freye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FriedewaldRBGHB22, author = {Michael Friedewald and Alexander Ro{\ss}nagel and Tamer Bile and Christian L. Geminn and Marit Hansen and Felix Bieker and Murat Karaboga}, title = {Zur Einf{\"{u}}hrung einer {\"{U}}berwachungs-Gesamtrechnung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {572--577}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1661-0}, doi = {10.1007/S11623-022-1661-0}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FriedewaldRBGHB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gassner22, author = {Ulrich M. Gassner}, title = {Forschung und Innovation im europ{\"{a}}ischen Gesundheitsdatenraum}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {739--746}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1696-2}, doi = {10.1007/S11623-022-1696-2}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Gassner22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GeisslerPSW22, author = {Ines Geissler and Ulrich Pordesch and Annika Selzer and Thomas Wilmer}, title = {Auswahl cloudbasierter Dienste}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {690--694}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1684-6}, doi = {10.1007/S11623-022-1684-6}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GeisslerPSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GeminnT22, author = {Christian Geminn and Marie{-}Theres Tinnefeld}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {327--332}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1612-9}, doi = {10.1007/S11623-022-1612-9}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GeminnT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Glemser22, author = {Tobias Glemser}, title = {{OWASP} Top 10}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {695--698}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1685-5}, doi = {10.1007/S11623-022-1685-5}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Glemser22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gotz22, author = {Isabell G{\"{o}}tz}, title = {Lach' doch mal!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {357--360}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1619-2}, doi = {10.1007/S11623-022-1619-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gotz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gramlich22, author = {Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {261--264}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1599-2}, doi = {10.1007/S11623-022-1599-2}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gramlich22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichP22, author = {Ludwig Gramlich and Ronald Petrlic}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {532--536}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1653-0}, doi = {10.1007/S11623-022-1653-0}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GreteK22, author = {Patrick Grete and Carsten Kestermann}, title = {Cloud Computing im Spannungsfeld von Souver{\"{a}}nit{\"{a}}t, Cybersicherheit und {\"{O}}konomie}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {632--636}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1672-x}, doi = {10.1007/S11623-022-1672-X}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GreteK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GruberF22, author = {Jan Gruber and Felix C. Freiling}, title = {Fighting Evasive Malware}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {284--290}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1604-9}, doi = {10.1007/S11623-022-1604-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GruberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HamacherKLBHSMW22, author = {Kay Hamacher and Tobias Kussel and Tatiana von Landesberger and Tom Baumgartl and Markus H{\"{o}}hn and Simone Scheithauer and Michael Marschollek and Antje Wulff}, title = {Fallzahlen, Re-Identifikation und der technische Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {143--148}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1579-6}, doi = {10.1007/S11623-022-1579-6}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HamacherKLBHSMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen22, author = {Marit Hansen}, title = {{ULD:} 40. T{\"{a}}tigkeitsbericht 2021}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {268}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1601-z}, doi = {10.1007/S11623-022-1601-Z}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen22a, author = {Marit Hansen}, title = {Deutschlands Plan zur St{\"{a}}rkung der B{\"{u}}rgerrechte im digitalen Raum}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {550--554}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1657-9}, doi = {10.1007/S11623-022-1657-9}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen22b, author = {Marit Hansen}, title = {E-Rezept-Verfahren: maschinenlesbare Codes sch{\"{u}}tzen!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {604}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1666-8}, doi = {10.1007/S11623-022-1666-8}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HillebrandSP22, author = {Annette Hillebrand and Jana Stuck and Pirmin Puhl}, title = {Vertrauen in Datenverarbeitung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {493--498}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1646-z}, doi = {10.1007/S11623-022-1646-Z}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HillebrandSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hofmann22, author = {Sebastian Hofmann}, title = {Forschungsklausel statt Broad Consent}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {756--761}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1691-7}, doi = {10.1007/S11623-022-1691-7}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Hofmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Horlbeck22, author = {Katja Horlbeck}, title = {Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {567--571}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1660-1}, doi = {10.1007/S11623-022-1660-1}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Horlbeck22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hornung22, author = {Gerrit Hornung}, title = {KI-Regulierung im Mehrebenensystem}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {561--566}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1659-7}, doi = {10.1007/S11623-022-1659-7}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hornung22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HornungSSZ22, author = {Gerrit Hornung and Matthias S{\"{o}}llner and Jan{-}Philipp Stroscher and Eva{-}Maria Zahn}, title = {Kollaboration im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {384--389}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1625-4}, doi = {10.1007/S11623-022-1625-4}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HornungSSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JoeB22, author = {Alicia Joe and Benedikt Buchner}, title = {Kinder als digitales Freiwild}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {381--383}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1624-5}, doi = {10.1007/S11623-022-1624-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JoeB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JohnR22, author = {Nicolas John and Justin Rennert}, title = {Cookieless Tracking: Neue M{\"{o}}glichkeiten unter dem TTDSG?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {643--648}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1675-7}, doi = {10.1007/S11623-022-1675-7}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JohnR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Joos22, author = {Harald Joos}, title = {Hochskalierbares Cloud Computing mit nationalen Hyperscalern f{\"{u}}r die Verwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {699--702}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1686-4}, doi = {10.1007/S11623-022-1686-4}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Joos22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JoosM22, author = {Daniel Joos and Kristof Meding}, title = {Anforderungen bei der Einf{\"{u}}hrung und Entwicklung von {KI} zur Gew{\"{a}}hrleistung von Fairness und Diskriminierungsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {376--380}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1623-6}, doi = {10.1007/S11623-022-1623-6}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JoosM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JoosN22, author = {Daniel Joos and Peter N{\"{a}}gele}, title = {Verarbeitung personenbezogener Echtdaten zur Netz- und Informationssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {578--583}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1662-z}, doi = {10.1007/S11623-022-1662-Z}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JoosN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber22, author = {Ulrich Kelber}, title = {Die {DSK} st{\"{a}}rkt die informationelle Selbstbestimmung und der {EDSA} gibt den Betroffenenrechten der {DSGVO} einen verbindlichen Rahmen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {136}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1577-8}, doi = {10.1007/S11623-022-1577-8}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber22a, author = {Ulrich Kelber}, title = {Koordinierte Durchsetzung durch 22 Aufsichtsbeh{\"{o}}rden zur Nutzung von Cloud-Diensten durch den {\"{o}}ffentlichen Sektor}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {200}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1587-6}, doi = {10.1007/S11623-022-1587-6}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kelber22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber22b, author = {Ulrich Kelber}, title = {Mastodon: Datenschutzfreundliche Twitter-Alternative}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {412}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1630-7}, doi = {10.1007/S11623-022-1630-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kelber22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Koch22, author = {Manuel Koch}, title = {Telematikinfrastruktur 2.0 - Verhindern von missbr{\"{a}}uchlicher Profilbildung durch {PET}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {427--431}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1633-4}, doi = {10.1007/S11623-022-1633-4}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Koch22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KronkeT22, author = {Christoph Kr{\"{o}}nke and Elissa Tschachler}, title = {Ein Opt-out f{\"{u}}r die elektronische Patientenakte (ePA)}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {419--426}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1632-5}, doi = {10.1007/S11623-022-1632-5}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KronkeT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kudra22, author = {Andre Kudra}, title = {Self-Sovereign Identity {(SSI)} in Deutschland}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {22--26}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1555-1}, doi = {10.1007/S11623-022-1555-1}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kudra22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KudraSS22, author = {Andre Kudra and Christian Seegebarth and Steffen Schwalm}, title = {Ein digitaler Vertrauensraum f{\"{u}}r Identit{\"{a}}ten und Dienste - Europa ist auf dem richtigen Weg}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {9--11}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1552-4}, doi = {10.1007/S11623-022-1552-4}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KudraSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KunzW22, author = {Thomas Kunz and Ulrich Waldmann}, title = {ML-basierte Unterst{\"{u}}tzung von L{\"{o}}sch- und Aufbewahrungspflichten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {649--653}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1676-6}, doi = {10.1007/S11623-022-1676-6}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KunzW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KusberSKE22, author = {Tomasz Kusber and Steffen Schwalm and Ulrike Korte and Mario Engel}, title = {Langfristige Beweissicherheit und Vertrauensw{\"{u}}rdigkeit digitaler Unterlagen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {32--39}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1557-z}, doi = {10.1007/S11623-022-1557-Z}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KusberSKE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kutscher22, author = {Nadia Kutscher}, title = {Sharenting als familialer Alltag}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {346--351}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1617-4}, doi = {10.1007/S11623-022-1617-4}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kutscher22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LangK22, author = {Simon Lang and Ralf Kneuper}, title = {Datenschutz und Informationssicherheit in Gaia-X}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {778--781}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1692-6}, doi = {10.1007/S11623-022-1692-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LangK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LefferW22, author = {Lena Leffer and Michelle Weber}, title = {Technische und strafrechtliche Implikationen des unbemerkten Einsatzes von AirTags}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {137--142}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1578-7}, doi = {10.1007/S11623-022-1578-7}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/LefferW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LehrDKV22, author = {Franz Lehr and Heike Dietmann and Chiara Krisam and Melanie Volkamer}, title = {Manipulative Designs von Cookies}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {296--300}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1606-7}, doi = {10.1007/S11623-022-1606-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LehrDKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LeichtH22, author = {Maximilian Leicht and Stefan Hessel}, title = {Datenschutzrechtliche Verantwortlichkeit in der Forschung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {305--309}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1608-5}, doi = {10.1007/S11623-022-1608-5}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LeichtH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Liptak22, author = {Patrick Liptak}, title = {Ein neuer Rahmen f{\"{u}}r eine europ{\"{a}}ische digitale Identit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {18--21}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1554-2}, doi = {10.1007/S11623-022-1554-2}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Liptak22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester22, author = {Britta Alexandra Mester}, title = {Besch{\"{a}}ftigtendatenschutz - Digitale Arbeitswelten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {73}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1563-1}, doi = {10.1007/S11623-022-1563-1}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mester22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mollik22, author = {Mirko Mollik}, title = {Blockchain als sicheres Register}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {201--208}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1588-5}, doi = {10.1007/S11623-022-1588-5}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mollik22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MosesS22, author = {Frank Moses and Kurt Sandkuhl}, title = {Mit {CISIS12} ein {ISMS} aufbauen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {654--659}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1677-5}, doi = {10.1007/S11623-022-1677-5}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MosesS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MullerRWWH22, author = {Robin M{\"{u}}ller and Julius Ruppert and Katharina Will and Lukas W{\"{u}}steney and Tobias Heer}, title = {Analyzing the Software Patch Discipline Across Different Industries and Countries}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {269--275}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1602-y}, doi = {10.1007/S11623-022-1602-Y}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MullerRWWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen22, author = {Kim Nguyen}, title = {Sichere elektronische Identit{\"{a}}t - ein Ziel f{\"{u}}r Europa!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1549-z}, doi = {10.1007/S11623-022-1549-Z}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nguyen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PeeckhausS22, author = {Martin Peeckhaus and Klaus Schmeh}, title = {Benutzerfreundliche Mail-Verschl{\"{u}}sselung bei einer Bundesbeh{\"{o}}rde}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {444--447}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1636-1}, doi = {10.1007/S11623-022-1636-1}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PeeckhausS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri22, author = {Thomas Petri}, title = {Die prim{\"{a}}re und sekund{\"{a}}re Nutzung elektronischer Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {413--418}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1631-6}, doi = {10.1007/S11623-022-1631-6}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri22a, author = {Thomas Petri}, title = {Rechtsprechung zur {DS-GVO} in den Jahren 2021-2022}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {767--773}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1699-z}, doi = {10.1007/S11623-022-1699-Z}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann22, author = {Norbert Pohlmann}, title = {Vertrauensw{\"{u}}rdige IT-Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {197}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1586-7}, doi = {10.1007/S11623-022-1586-7}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR22, author = {Norbert Pohlmann and Helmut Reimer}, title = {Cyber-Sicherheit - gemeinsam Grenzen {\"{u}}berwinden}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {242}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1596-5}, doi = {10.1007/S11623-022-1596-5}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RehbohmKCS22, author = {Thomas Rehbohm and Robin Kemmerich and Clemens H. Cap and Kurt Sandkuhl}, title = {Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische Studie in deutschen Kommunen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {448--454}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1637-0}, doi = {10.1007/S11623-022-1637-0}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RehbohmKCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer22, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {253--260}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1598-3}, doi = {10.1007/S11623-022-1598-3}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer22a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {717--724}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1689-1}, doi = {10.1007/S11623-022-1689-1}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rosenberger22, author = {Nadine Rosenberger}, title = {Bewerberscreening unter Geltung der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {87--92}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1567-x}, doi = {10.1007/S11623-022-1567-X}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rosenberger22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22, author = {Alexander Ro{\ss}nagel}, title = {Verbessert die Ampel-Koalition den Datenschutz?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {537--538}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1654-z}, doi = {10.1007/S11623-022-1654-Z}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22a, author = {Alexander Ro{\ss}nagel}, title = {Datenschutzanforderungen an Videokonferenzsysteme}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {543--544}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1655-y}, doi = {10.1007/S11623-022-1655-Y}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22b, author = {Alexander Ro{\ss}nagel}, title = {Internationaler Datentransfer}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {545--549}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1656-x}, doi = {10.1007/S11623-022-1656-X}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22c, author = {Alexander Ro{\ss}nagel}, title = {Festakt im Hessischen Landtag: 50 Jahre Datenschutz in Hessen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {732}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1694-4}, doi = {10.1007/S11623-022-1694-4}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel22d, author = {Alexander Ro{\ss}nagel}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {797--800}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1703-7}, doi = {10.1007/S11623-022-1703-7}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RossnagelGJM22, author = {Alexander Ro{\ss}nagel and Christian L. Geminn and Paul C. Johannes and Johannes K. M. M{\"{u}}ller}, title = {Auswirkungen ausl{\"{a}}ndischer Gesetzgebung auf die deutsche Cybersicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {156--163}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1581-z}, doi = {10.1007/S11623-022-1581-Z}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RossnagelGJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossow22, author = {Olaf Rossow}, title = {Datenschutz beim Betriebsrat}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {81--86}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1566-y}, doi = {10.1007/S11623-022-1566-Y}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossow22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossow22a, author = {Olaf Rossow}, title = {Arbeitgeber und das Fernmeldegeheimnis nach dem {TTDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {93--97}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1568-9}, doi = {10.1007/S11623-022-1568-9}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossow22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SaatjohannIGNSK22, author = {Christoph Saatjohann and Fabian Ising and Matthias Gierlings and Dominik Noss and Sascha Schimmler and Alexander Klemm and Leif Grundmann and Tilman Frosch and Sebastian Schinzel}, title = {Sicherheit medizintechnischer Protokolle im Krankenhaus}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {276--283}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1603-x}, doi = {10.1007/S11623-022-1603-X}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SaatjohannIGNSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Salemi22, author = {Simone Salemi}, title = {Chancen und Risiken von {PIMS} nach {\textsection} 26 {TTDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {505--510}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1648-x}, doi = {10.1007/S11623-022-1648-X}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Salemi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchaarschmidtSS22, author = {Konstantin Schaarschmidt and Martin Schallbruch and Stefan Schuck}, title = {Digitale Brieftaschen f{\"{u}}r sichere Identit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {12--17}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1553-3}, doi = {10.1007/S11623-022-1553-3}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchaarschmidtSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schellhas-Mende22, author = {Friederike Schellhas{-}Mende and Nils Wiedemann and Nicolas Blum}, title = {Videokonferenzsysteme als Telekommunikationsdienst}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {291--295}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1605-8}, doi = {10.1007/S11623-022-1605-8}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schellhas-Mende22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmehE22, author = {Klaus Schmeh and Matthias Edelhoff}, title = {{S/MIME} und {PGP} im selben Client}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {439--443}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1635-2}, doi = {10.1007/S11623-022-1635-2}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchmehE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnebbe22, author = {Maximilian Schnebbe}, title = {Minderj{\"{a}}hrigenschutz in der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {367--370}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1621-8}, doi = {10.1007/S11623-022-1621-8}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnebbe22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchurmannB22, author = {Kathrin Sch{\"{u}}rmann and Jan O. Baier}, title = {Schadensersatzanspr{\"{u}}che im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {103--106}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1570-2}, doi = {10.1007/S11623-022-1570-2}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchurmannB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seegebarth22, author = {Christian Seegebarth}, title = {eIDAS-Novellierung 2021 - erste Analyse des Proposals}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {5--8}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1551-5}, doi = {10.1007/S11623-022-1551-5}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Seegebarth22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SelzerS22, author = {Annika Selzer and Sarah Stummer}, title = {Hat die h{\"{a}}ufige Videotelefonie in Corona-Zeiten Einfluss auf unser Privatsph{\"{a}}reverst{\"{a}}ndnis genommen?}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {774--777}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1700-x}, doi = {10.1007/S11623-022-1700-X}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SelzerS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stapf22, author = {Ingrid Stapf}, title = {Das Recht auf eine offene Zukunft}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {339--345}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1616-5}, doi = {10.1007/S11623-022-1616-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stapf22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld22, author = {Marie{-}Theres Tinnefeld}, title = {Grundrechtsschutz: Antworten auf pandemiebedingte Einschr{\"{a}}nkungen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {336--337}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1614-7}, doi = {10.1007/S11623-022-1614-7}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/UrbanG22, author = {Manuela Urban and Kurt Garloff}, title = {Sovereign Cloud Stack}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {616--621}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1669-5}, doi = {10.1007/S11623-022-1669-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/UrbanG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Vasquez22, author = {Sheila Vasquez}, title = {Privacy by Design und das autonome Fahrzeug}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {98--102}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1569-8}, doi = {10.1007/S11623-022-1569-8}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Vasquez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Vassilaki22, author = {Irini E. Vassilaki}, title = {Anleitung zu sexuellem Missbrauch von Kindern gem. {\textsection} 176e StGB}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {107--110}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1571-1}, doi = {10.1007/S11623-022-1571-1}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Vassilaki22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert22, author = {Thilo Weichert}, title = {Anmerkung zum Urteil des {OVG} Schleswig-Holstein vom 25.11.2021 - Unzul{\"{a}}ssigkeit einer Facebook-Fanpage}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {239--241}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1595-6}, doi = {10.1007/S11623-022-1595-6}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert22a, author = {Thilo Weichert}, title = {Die Ernennung von Mitgliedern nach Art. 53 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {371--375}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1622-7}, doi = {10.1007/S11623-022-1622-7}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert22b, author = {Thilo Weichert}, title = {Was das Abtreibungsrecht in den {USA} mit Datenschutz zu tun hat}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {511--515}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1649-9}, doi = {10.1007/S11623-022-1649-9}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeichertGG22, author = {Thilo Weichert and Ludwig Gramlich and Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {724--728}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1690-8}, doi = {10.1007/S11623-022-1690-8}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeichertGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weiss22, author = {Andreas Weiss}, title = {Gaia-X - Grundlagen f{\"{u}}r den Aufbau f{\"{o}}derierter, digitaler {\"{O}}kosysteme nach europ{\"{a}}ischen Regeln}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {227--232}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1593-8}, doi = {10.1007/S11623-022-1593-8}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weiss22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Welz22, author = {Georges Welz}, title = {Ein neuer sicherer Hafen in der Cloud - auch f{\"{u}}r staatliche Verschlusssachen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {622--626}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1670-z}, doi = {10.1007/S11623-022-1670-Z}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Welz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wichmann22, author = {Markus Wichmann}, title = {TeleTrusT European Bridge {CA}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {4}, pages = {215--216}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1590-y}, doi = {10.1007/S11623-022-1590-Y}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wichmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Will22, author = {Michael Will}, title = {E-Mail-Accounts im Visier von Cyberkriminellen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {485--486}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1644-1}, doi = {10.1007/S11623-022-1644-1}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Will22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wolff22, author = {Daniel Wolff}, title = {KI-Biases im Gesundheitswesen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {733--738}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1695-3}, doi = {10.1007/S11623-022-1695-3}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wolff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wonnemann22, author = {Claus Wonnemann}, title = {Cyber-Security entlang der IoT-Lieferkette}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {455--458}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1638-z}, doi = {10.1007/S11623-022-1638-Z}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wonnemann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22, title = {Verarbeitungen des Datums , , Impfstatus" von Besch{\"{a}}ftigten durch die Arbeitgeberin oder den Arbeitgeber}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {4}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1550-6}, doi = {10.1007/S11623-022-1550-6}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22a, title = {{\"{O}}ffentliche Verwaltung - Digitalisierung 2022}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {52}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1560-4}, doi = {10.1007/S11623-022-1560-4}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22aa, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {584--591}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1663-y}, doi = {10.1007/S11623-022-1663-Y}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ab, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {9}, pages = {592--600}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1664-x}, doi = {10.1007/S11623-022-1664-X}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ac, title = {Hyperscaler - die Globalisierung von Cloud-Diensten}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {660}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1678-4}, doi = {10.1007/S11623-022-1678-4}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ad, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {661--671}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1679-3}, doi = {10.1007/S11623-022-1679-3}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ae, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {671--680}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1680-x}, doi = {10.1007/S11623-022-1680-X}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22af, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {707--716}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1688-2}, doi = {10.1007/S11623-022-1688-2}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ag, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {782--790}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1701-9}, doi = {10.1007/S11623-022-1701-9}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22ah, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {12}, pages = {791--797}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1702-8}, doi = {10.1007/S11623-022-1702-8}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22ah.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22b, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {53--63}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1561-3}, doi = {10.1007/S11623-022-1561-3}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22c, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {64--72}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1562-2}, doi = {10.1007/S11623-022-1562-2}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22d, title = {{DSK:} Neue Orientierungshilfe f{\"{u}}r Anbieter: innen von Telemedien}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {76}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1564-0}, doi = {10.1007/S11623-022-1564-0}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22e, title = {Whistleblowing - Fehlende Umsetzung einer EU-Richtlinie}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {111--112}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1572-0}, doi = {10.1007/S11623-022-1572-0}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22f, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {113--121}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1573-z}, doi = {10.1007/S11623-022-1573-Z}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22g, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {122--128}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1574-y}, doi = {10.1007/S11623-022-1574-Y}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22h, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {2}, pages = {128--132}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1575-x}, doi = {10.1007/S11623-022-1575-X}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22i, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {176--186}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1584-9}, doi = {10.1007/S11623-022-1584-9}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22j, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {3}, pages = {187--196}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1585-8}, doi = {10.1007/S11623-022-1585-8}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X22j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22k, title = {103. Datenschutzkonferenz}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {310--311}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1609-4}, doi = {10.1007/S11623-022-1609-4}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22l, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {312--318}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1610-y}, doi = {10.1007/S11623-022-1610-Y}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22m, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {5}, pages = {319--327}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1611-x}, doi = {10.1007/S11623-022-1611-X}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22n, title = {Information zur Nutzung von Facebook-Fanpages}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {338}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1615-6}, doi = {10.1007/S11623-022-1615-6}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22o, title = {Einwilligung eines Kindes}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {390}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1626-3}, doi = {10.1007/S11623-022-1626-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22p, title = {Einwilligung eines Kindes}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {391--398}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1627-2}, doi = {10.1007/S11623-022-1627-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22q, title = {DuD Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {6}, pages = {399--408}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1628-1}, doi = {10.1007/S11623-022-1628-1}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22r, title = {Digitalisierung ist kein Selbstzweck!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {409}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1629-0}, doi = {10.1007/S11623-022-1629-0}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22s, title = {Die Zeit f{\"{u}}r ein Besch{\"{a}}ftigtendatenschutzgesetz ist , , Jetzt"!}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {459--460}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1639-y}, doi = {10.1007/S11623-022-1639-Y}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22t, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {461--470}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1640-5}, doi = {10.1007/S11623-022-1640-5}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22u, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {471--477}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1641-4}, doi = {10.1007/S11623-022-1641-4}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22v, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {7}, pages = {477--480}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1642-3}, doi = {10.1007/S11623-022-1642-3}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22w, title = {Aufgel{\"{o}}ste Verantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {481}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1643-2}, doi = {10.1007/S11623-022-1643-2}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22x, title = {Mehr Rechtssicherheit f{\"{u}}r die IT-Sicherheitsforschung}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {516--517}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1650-3}, doi = {10.1007/S11623-022-1650-3}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22y, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {518--525}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1651-2}, doi = {10.1007/S11623-022-1651-2}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X22z, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {526--532}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1652-1}, doi = {10.1007/S11623-022-1652-1}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X22z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZendelZ22, author = {Oliver Zendel and Marianne Ziesmer}, title = {Geheimkommunikation mit moderner {IT}}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {10}, pages = {640--642}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1674-8}, doi = {10.1007/S11623-022-1674-8}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ZendelZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZunabovicG22, author = {Sandra Zunabovic and Rainer W. Gerling}, title = {IT-Sicherheit in der Arztpraxis}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {8}, pages = {499--504}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1647-y}, doi = {10.1007/S11623-022-1647-Y}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ZunabovicG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.