Search dblp for Publications

export results for "toc:db/journals/dud/dud37.bht:"

 download as .bib file

@article{DBLP:journals/dud/Albrecht13,
  author       = {Jan Philipp Albrecht},
  title        = {Starker EU-Datenschutz w{\"{a}}re Standortvorteil},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {655--657},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0270-3},
  doi          = {10.1007/S11623-013-0270-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Albrecht13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Babbidge13,
  author       = {John Babbidge},
  title        = {Key Management - Fundamentals},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {497--501},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0206-y},
  doi          = {10.1007/S11623-013-0206-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Babbidge13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Baum13,
  author       = {Gerhart Baum},
  title        = {Wacht auf, es geht um die Menschenw{\"{u}}rde},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {583--584},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0242-7},
  doi          = {10.1007/S11623-013-0242-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Baum13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BaumlerM13,
  author       = {Helmut B{\"{a}}umler and
                  Diano Marina},
  title        = {Tinnefeld, Marie-Theres; Buchner, Benedikt; Petri, Thomas: Einf{\"{u}}hrung
                  in das Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {266},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0102-5},
  doi          = {10.1007/S11623-013-0102-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BaumlerM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Becker13,
  author       = {Maximilian Becker},
  title        = {Sharehoster - gefangen zwischen Datenschutz und St{\"{o}}rerhaftung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {207--214},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0080-7},
  doi          = {10.1007/S11623-013-0080-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Becker13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BelkeNZ13,
  author       = {Marcus Belke and
                  Karsten Neumann and
                  Dominik Zier},
  title        = {Datenschutzpraxis in deutschen Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {577--582},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0241-8},
  doi          = {10.1007/S11623-013-0241-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BelkeNZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bengez13,
  author       = {Rainhard Z. Bengez},
  title        = {Schl{\"{u}}sselkonzept der Suchmaschinen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {440--444},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0174-2},
  doi          = {10.1007/S11623-013-0174-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bengez13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bergt13,
  author       = {Matthias Bergt},
  title        = {Rechtskonforme Auftragsdatenverarbeitung im Massengesch{\"{a}}ft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {796--801},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0329-1},
  doi          = {10.1007/S11623-013-0329-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bergt13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bier13,
  author       = {Christoph Bier},
  title        = {Das koreanische Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {457--460},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0178-y},
  doi          = {10.1007/S11623-013-0178-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Blessing13,
  author       = {Werner Blessing},
  title        = {Me, on the fly},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {376--379},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0144-8},
  doi          = {10.1007/S11623-013-0144-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Blessing13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BoddenRRR13,
  author       = {Eric Bodden and
                  Siegfried Rasthofer and
                  Philipp Richter and
                  Alexander Ro{\ss}nagel},
  title        = {Schutzma{\ss}nahmen gegen datenschutz- unfreundliche Smartphone-Apps},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {720--725},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0300-1},
  doi          = {10.1007/S11623-013-0300-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BoddenRRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BoseskyHS13,
  author       = {Pino Bosesky and
                  Christian Hoffmann and
                  S{\"{o}}nke E. Schulz},
  title        = {Datenhoheit im Cloud-Umfeld},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {95--100},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0025-1},
  doi          = {10.1007/S11623-013-0025-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BoseskyHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brandt13,
  author       = {Jochen Brandt},
  title        = {Bausewein, Christoph: Legitimationswirkung von Einwilligung und Betriebsvereinbarung
                  im Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {336},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0134-x},
  doi          = {10.1007/S11623-013-0134-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Brandt13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BrauckmannG13,
  author       = {J{\"{u}}rgen Brauckmann and
                  Ralf Gr{\"{o}}per},
  title        = {Konzept und Nutzen von Certificate Policy und Certification Practice
                  Statement},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {491--496},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0205-z},
  doi          = {10.1007/S11623-013-0205-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BrauckmannG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breitenstrom13,
  author       = {Christian Breitenstrom},
  title        = {Sichere Konfiguration von Content Management Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {726--728},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0301-0},
  doi          = {10.1007/S11623-013-0301-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Breitenstrom13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner13,
  author       = {Benedikt Buchner},
  title        = {Pers{\"{o}}nlichkeitsschutz in der Online-Welt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {753},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0319-3},
  doi          = {10.1007/S11623-013-0319-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner13a,
  author       = {Benedikt Buchner},
  title        = {Verschl{\"{u}}sselte Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {804},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0331-7},
  doi          = {10.1007/S11623-013-0331-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchter13,
  author       = {Martin Buchter},
  title        = {Der {GPEN} Internet Privacy Sweep 2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {690},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0294-8},
  doi          = {10.1007/S11623-013-0294-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bullingen13,
  author       = {Franz B{\"{u}}llingen},
  title        = {Die Umsetzungsl{\"{u}}cke: Warum IT-Sicherheit im Mittelstand
                  ein zentrales Thema bleibt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {173--176},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0056-7},
  doi          = {10.1007/S11623-013-0056-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bullingen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Busch13,
  author       = {Christoph Busch},
  title        = {Was meinen wir mit Biometrie?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {386},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0147-5},
  doi          = {10.1007/S11623-013-0147-5},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Busch13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ByszioHMW13,
  author       = {Frank Byszio and
                  Detlef Houdeau and
                  Gisela Meister and
                  Klaus{-}Dieter Wolfenstetter},
  title        = {Elektronische Identifikation in Europa: die neue EU-Verordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {169--172},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0055-8},
  doi          = {10.1007/S11623-013-0055-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ByszioHMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Caspar13,
  author       = {Johannes Caspar},
  title        = {Soziale Netzwerke - Endstation informationelle Selbstbestimmung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {767--771},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0323-7},
  doi          = {10.1007/S11623-013-0323-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Caspar13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Caumanns13,
  author       = {J{\"{o}}rg Caumanns},
  title        = {Datenschutz und Datennutz bei elektronischen Patientenakten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {137--142},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0049-6},
  doi          = {10.1007/S11623-013-0049-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Caumanns13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Daubler13,
  author       = {Wolfgang D{\"{a}}ubler},
  title        = {Pers{\"{o}}nlichkeitsschutz des Arbeitnehmers im Internet?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {759--766},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0322-8},
  doi          = {10.1007/S11623-013-0322-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Daubler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DeufelMDK13,
  author       = {Bernhard Deufel and
                  Carsten Mueller and
                  Gavan Duffy and
                  Tom Kevenaar},
  title        = {BioPACE},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {363--366},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0141-y},
  doi          = {10.1007/S11623-013-0141-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DeufelMDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dierks13,
  author       = {Christian Dierks},
  title        = {Datenschutzaspekte der Pharmakogenomik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {143--147},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0050-0},
  doi          = {10.1007/S11623-013-0050-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dierks13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dittmayer13,
  author       = {Matthias Dittmayer},
  title        = {Pers{\"{o}}nlichkeitsrechtsverletzungen durch {\"{A}}u{\ss}erungen
                  im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {780--786},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0326-4},
  doi          = {10.1007/S11623-013-0326-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dittmayer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix13,
  author       = {Alexander Dix},
  title        = {Funkzellenabfragen auf dem Pr{\"{u}}fstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {6},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0003-7},
  doi          = {10.1007/S11623-013-0003-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dix13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix13a,
  author       = {Alexander Dix},
  title        = {Pers{\"{o}}nlichkeits- und Datenschutz im Internet - Anforderungen
                  und Grenzen einer Regulierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {44--45},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0011-7},
  doi          = {10.1007/S11623-013-0011-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dix13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DolezelDU13,
  author       = {Michal Dolezel and
                  Martin Drahansk{\'{y}} and
                  Jaroslav Urb{\'{a}}nek},
  title        = {Einfluss von Hauterkrankungen auf den biometrischen Erkennungsprozess},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {358--362},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0140-z},
  doi          = {10.1007/S11623-013-0140-Z},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DolezelDU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Drechsler13,
  author       = {Carola Drechsler},
  title        = {Elektronischer Zugang zur Verwaltung nach dem EGovG},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {696--701},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0296-6},
  doi          = {10.1007/S11623-013-0296-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Drechsler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eckhardt13,
  author       = {Jens Eckhardt},
  title        = {Auftragsdatenverarbeitung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {585--591},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0243-6},
  doi          = {10.1007/S11623-013-0243-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Eckhardt13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtK13,
  author       = {Jens Eckhardt and
                  Rudi Kramer},
  title        = {{EU-DSGVO} - Diskussionspunkte aus der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {287--294},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0110-5},
  doi          = {10.1007/S11623-013-0110-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtKM13,
  author       = {Jens Eckhardt and
                  Rudi Kramer and
                  Britta Alexandra Mester},
  title        = {Auswirkungen der geplanten {EU-DS-GVO} auf den deutschen Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {623--629},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0265-0},
  doi          = {10.1007/S11623-013-0265-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eiermann13,
  author       = {Helmut Eiermann},
  title        = {Work in Progress - Zur Zukunft des technischen Datenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {92--94},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0024-2},
  doi          = {10.1007/S11623-013-0024-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Eiermann13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Engel-Flechsig13,
  author       = {Stefan Engel{-}Flechsig},
  title        = {Elektronische Rechnungsstellung in der Europ{\"{a}}ischen Standardisierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {25--29},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0007-3},
  doi          = {10.1007/S11623-013-0007-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Engel-Flechsig13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ExterD13,
  author       = {Andreas Exter and
                  Matthias Drodt},
  title        = {{CSI:} {DB} - Die {IT} Security-Awareness-Kampagne der Deutschen Bahn},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {279--282},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0108-z},
  doi          = {10.1007/S11623-013-0108-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ExterD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FibikovaM13,
  author       = {Lenka Fib{\'{\i}}kov{\'{a}} and
                  Roland M{\"{u}}ller},
  title        = {Entwicklung einer Informationssicherheitsstrategie im Rahmen von {ISO}
                  27002},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {7--13},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0004-6},
  doi          = {10.1007/S11623-013-0004-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FibikovaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox13,
  author       = {Dirk Fox},
  title        = {Secure Hash Algorithm {SHA-3}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {104},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0027-z},
  doi          = {10.1007/S11623-013-0027-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox13a,
  author       = {Dirk Fox},
  title        = {Awareness 3.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {269},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0104-3},
  doi          = {10.1007/S11623-013-0104-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox13b,
  author       = {Dirk Fox},
  title        = {Social Engineering},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {318},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0115-0},
  doi          = {10.1007/S11623-013-0115-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox13c,
  author       = {Dirk Fox},
  title        = {Vertrauen verspielt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {557},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0235-6},
  doi          = {10.1007/S11623-013-0235-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox13d,
  author       = {Dirk Fox},
  title        = {{PRISM} und {TEMPORA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {594},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0245-4},
  doi          = {10.1007/S11623-013-0245-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox13e,
  author       = {Dirk Fox},
  title        = {Perfect Forward Secrecy {(PFS)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {729},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0302-z},
  doi          = {10.1007/S11623-013-0302-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy13,
  author       = {Walter Fumy},
  title        = {Die Zeiten {\"{a}}ndern sich ..},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0001-9},
  doi          = {10.1007/S11623-013-0001-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingG13,
  author       = {Sebastian Gerling and
                  Rainer W. Gerling},
  title        = {Wie realistisch ist ein "Recht auf Vergessenwerden"?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {445--446},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0175-1},
  doi          = {10.1007/S11623-013-0175-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlingG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gimbut13,
  author       = {Leonid Gimbut},
  title        = {Datensicherheit: Was leisten externe verschl{\"{u}}sselte Festplatten?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {526--529},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0212-0},
  doi          = {10.1007/S11623-013-0212-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gimbut13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Goetz13,
  author       = {Christoph F.{-}J. Goetz},
  title        = {Gesundheitstelematik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {125},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0045-x},
  doi          = {10.1007/S11623-013-0045-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Goetz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Goetz13a,
  author       = {Christoph F.{-}J. Goetz},
  title        = {Zukunftsaufgabe Gesundheitstelematik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {164--168},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0054-9},
  doi          = {10.1007/S11623-013-0054-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Goetz13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gotz13,
  author       = {Christopher G{\"{o}}tz},
  title        = {Grenz{\"{u}}berschreitende Daten{\"{u}}bermittlung im Konzern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {631--637},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0266-z},
  doi          = {10.1007/S11623-013-0266-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gotz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich13,
  author       = {Ludwig Gramlich},
  title        = {Hantschel, Ines: Softwarekauf und -weiterverkauf},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {613--614},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0260-5},
  doi          = {10.1007/S11623-013-0260-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gramlich13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber13,
  author       = {Joachim Gruber},
  title        = {Lindner, Eric: Die datenschutzrechtliche Einwilligung nach {\textsection}{\textsection}
                  4 Abs 1, 4a {BDSG} - ein zukunftsf{\"{a}}higes Institut?, Verlag
                  Dr. Kovac, Hamburg 2013, LVIII, 230 Seiten, 89, 80 EURO, {ISBN} 978-3-8300-7011-5},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {682},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0291-y},
  doi          = {10.1007/S11623-013-0291-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hamdy13,
  author       = {Safuat Hamdy},
  title        = {Sicherheitsherausforderungen von IPv6},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {567--572},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0239-2},
  doi          = {10.1007/S11623-013-0239-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hamdy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hartge13,
  author       = {Dagmar Hartge},
  title        = {Open Data - Erg{\"{a}}nzung oder Einschr{\"{a}}nkung der
                  Informationsfreiheit?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {562},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0237-4},
  doi          = {10.1007/S11623-013-0237-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hartge13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeinemannH13,
  author       = {Manuel J. Heinemann and
                  Daniela Heinemann},
  title        = {Postmortaler Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {242--245},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0085-2},
  doi          = {10.1007/S11623-013-0085-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeinemannH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Higginbottom13,
  author       = {Karen Higginbottom},
  title        = {Advancing standardisation for every day life},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {49},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0013-5},
  doi          = {10.1007/S11623-013-0013-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Higginbottom13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hinz13,
  author       = {Ren{\'{e}}e Hinz},
  title        = {Zur Problematik der Identifikation ausl{\"{a}}ndischer Teilnehmer
                  im Vollzug des deutschen Emissionshandels},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {535--536},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0214-y},
  doi          = {10.1007/S11623-013-0214-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hinz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HofmannH13,
  author       = {Christina Hofmann and
                  Elisabeth H{\"{o}}dl},
  title        = {Open Source Biologie und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {227--234},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0083-4},
  doi          = {10.1007/S11623-013-0083-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HofmannH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HornungS13,
  author       = {Gerrit Hornung and
                  Stephan S{\"{a}}dtler},
  title        = {Eitel Sonnenschein oder Wolken am Horizont?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {148--153},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0051-z},
  doi          = {10.1007/S11623-013-0051-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HornungS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HorschHLSW13,
  author       = {Moritz Horsch and
                  Detlef H{\"{u}}hnlein and
                  Anja Lehmann and
                  Johannes Schm{\"{o}}lz and
                  Tobias Wich},
  title        = {Authentisierung mit der Open eCard App},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {507--511},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0208-9},
  doi          = {10.1007/S11623-013-0208-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HorschHLSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hustinx13,
  author       = {Peter Hustinx},
  title        = {T{\"{a}}tigkeitsvorausschau 2013 des {EDSB}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {206},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0079-0},
  doi          = {10.1007/S11623-013-0079-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hustinx13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JandtKW13,
  author       = {Silke Jandt and
                  Olga Kieselmann and
                  Arno Wacker},
  title        = {Recht auf Vergessen im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {235--241},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0084-3},
  doi          = {10.1007/S11623-013-0084-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JandtKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jendrian13,
  author       = {Kai Jendrian},
  title        = {30 Jahre nach 1983 - oder die Rettung der Privatsph{\"{a}}re
                  im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {563--566},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0238-3},
  doi          = {10.1007/S11623-013-0238-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jendrian13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KalabisKW13,
  author       = {Lukas Kalabis and
                  Thomas Kunz and
                  Ruben Wolf},
  title        = {Sichere Nutzung von Cloud-Speicherdiensten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {512--516},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0209-8},
  doi          = {10.1007/S11623-013-0209-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KalabisKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KallaS13,
  author       = {Christian Kalla and
                  Patrick Schuch},
  title        = {Sicherheit in der Fingerabdruck-Identifikation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {352--357},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0139-5},
  doi          = {10.1007/S11623-013-0139-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KallaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KaltenbockS13,
  author       = {Robert Kaltenb{\"{o}}ck and
                  Sabine Schuster},
  title        = {Awareness f{\"{u}}r Informationssicherheit und Datenschutz in
                  der Sparkassen-Finanzgruppe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {283--286},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0109-y},
  doi          = {10.1007/S11623-013-0109-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KaltenbockS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KampR13,
  author       = {Meike Kamp and
                  Martin Rost},
  title        = {Kritik an der Einwilligung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {80--84},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0022-4},
  doi          = {10.1007/S11623-013-0022-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KampR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Karg13,
  author       = {Moritz Karg},
  title        = {Der Blick zur{\"{u}}ck f{\"{u}}r den Schritt nach vorn},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {69},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0018-0},
  doi          = {10.1007/S11623-013-0018-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Karg13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Karg13a,
  author       = {Moritz Karg},
  title        = {Die Renaissance des Verbotsprinzips im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {75--79},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0021-5},
  doi          = {10.1007/S11623-013-0021-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Karg13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Karg13b,
  author       = {Moritz Karg},
  title        = {Unter der Lupe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {685},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0292-x},
  doi          = {10.1007/S11623-013-0292-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Karg13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Karg13c,
  author       = {Moritz Karg},
  title        = {Datenschutzrechtliche Anforderungen an die E-Akte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {702--708},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0297-5},
  doi          = {10.1007/S11623-013-0297-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Karg13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KochME13,
  author       = {Manuel Koch and
                  Sven Marx and
                  Arno Elmer},
  title        = {Informationelle Selbstbestimmung und Patientensouver{\"{a}}nit{\"{a}}t
                  in einem vernetzten Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {131--136},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0048-7},
  doi          = {10.1007/S11623-013-0048-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KochME13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Konig13,
  author       = {Tassilo{-}Rouven K{\"{o}}nig},
  title        = {Zur M{\"{o}}glichkeit einer sektoralen Datenschutzkontrolle nach
                  dem Entwurf der EU-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {101--103},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0026-0},
  doi          = {10.1007/S11623-013-0026-0},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Konig13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kramer13,
  author       = {Philipp Kramer},
  title        = {Verbot mit Erlaubnisvorbehalt zeitgem{\"{a}}{\ss}?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {380--382},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0145-7},
  doi          = {10.1007/S11623-013-0145-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kramer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kramer13a,
  author       = {Rudi Kramer},
  title        = {Funktions{\"{u}}bertragung beim Steuerberater},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {658--661},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0271-2},
  doi          = {10.1007/S11623-013-0271-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kramer13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kranawetter13,
  author       = {Michael Kranawetter},
  title        = {Identit{\"{a}}t in der Cloud und \emph{on premise}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {517--520},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0210-2},
  doi          = {10.1007/S11623-013-0210-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kranawetter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kranig13,
  author       = {Thomas Kranig},
  title        = {Das Bayerische Landesamt f{\"{u}}r Datenschutzaufsicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {274},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0106-1},
  doi          = {10.1007/S11623-013-0106-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kranig13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Krasemann13,
  author       = {Henry Krasemann},
  title        = {{ULD:} Datenschutz-Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {529},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0234-7},
  doi          = {10.1007/S11623-013-0234-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Krasemann13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingK13,
  author       = {J{\"{u}}rgen K{\"{u}}hling and
                  Manuel Klar},
  title        = {Datenschutz bei E-Health - Zeit f{\"{u}}r grundlegende Reformen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {791--795},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0328-2},
  doi          = {10.1007/S11623-013-0328-2},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KuhlingK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KunzNW13,
  author       = {Thomas Kunz and
                  Peter Niehues and
                  Ulrich Waldmann},
  title        = {Technische Unterst{\"{u}}tzung von Audits bei Cloud-Betreibern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {521--525},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0211-1},
  doi          = {10.1007/S11623-013-0211-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KunzNW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutscha13,
  author       = {Martin Kutscha},
  title        = {Rogosch, Patricia Maria: Die Einwilligung im Datenschutzrecht, Nomos
                  Verlag 2013, 208 S., {ISBN} 978-3-8487-0074-5, 49, - Euro},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {682},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0290-z},
  doi          = {10.1007/S11623-013-0290-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kutscha13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lenz13,
  author       = {J{\"{o}}rg Lenz},
  title        = {Veranstaltungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {748--749},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0317-5},
  doi          = {10.1007/S11623-013-0317-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lenz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lepper13,
  author       = {Ulrich Lepper},
  title        = {D{\"{u}}sseldorfer Kreis wird Gremium der Datenschutzkonferenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {74},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0020-6},
  doi          = {10.1007/S11623-013-0020-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lepper13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LepperhoffPT13,
  author       = {Niels Lepperhoff and
                  Bj{\"{o}}rn Petersdorf and
                  Sabine Thursch},
  title        = {Datenschutzverst{\"{o}}{\ss}e im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {301--306},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0112-3},
  doi          = {10.1007/S11623-013-0112-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LepperhoffPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Leutheusser-Schnarrenberger13,
  author       = {Sabine Leutheusser{-}Schnarrenberger},
  title        = {Bedeutung und St{\"{a}}rkung der Menschenrechte in Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {415--417},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0169-z},
  doi          = {10.1007/S11623-013-0169-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Leutheusser-Schnarrenberger13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lorenz13,
  author       = {Bernd Lorenz},
  title        = {Sorgfaltspflichten im Umgang mit Passw{\"{o}}rtern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {220--226},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0082-5},
  doi          = {10.1007/S11623-013-0082-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lorenz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Makulilo13,
  author       = {Alex B. Makulilo},
  title        = {"One size fits all": Does Europe impose its data protection regime
                  on Africa?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {447--451},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0176-0},
  doi          = {10.1007/S11623-013-0176-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Makulilo13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester13,
  author       = {Britta Alexandra Mester},
  title        = {Internet - ohne das Recht auf Vergessen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {201},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0077-2},
  doi          = {10.1007/S11623-013-0077-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester13a,
  author       = {Britta Alexandra Mester},
  title        = {EU-Verordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {250},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0087-0},
  doi          = {10.1007/S11623-013-0087-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester13b,
  author       = {Britta Alexandra Mester},
  title        = {Chance oder Risiko? Europ{\"{a}}ischer Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {617},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0262-3},
  doi          = {10.1007/S11623-013-0262-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MolletKW13,
  author       = {Liliane Mollet and
                  Jens Klopp and
                  Thomas Walther},
  title        = {Cyberkriminalit{\"{a}}t: Bek{\"{a}}mpfung von Kinderpornografie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {35--39},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0009-1},
  doi          = {10.1007/S11623-013-0009-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MolletKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muller-QuadeAL13,
  author       = {J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dirk Achenbach and
                  Bernhard L{\"{o}}we},
  title        = {Das Kryptologikum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {573--576},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0240-9},
  doi          = {10.1007/S11623-013-0240-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Muller-QuadeAL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen13,
  author       = {Alexander Nguyen},
  title        = {Subsidiarit{\"{a}}tsr{\"{u}}ge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {662},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0272-1},
  doi          = {10.1007/S11623-013-0272-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NguyenS13,
  author       = {Kim Nguyen and
                  Carsten Schwarz},
  title        = {Innovatives Key Management f{\"{u}}r die Qualifizierte Elektronische
                  Signatur mit dem neuen Personalausweis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {502--506},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0207-x},
  doi          = {10.1007/S11623-013-0207-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/NguyenS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OpelKN13,
  author       = {Alexander Opel and
                  Barbara K{\"{o}}rffer and
                  Alexander Nouak},
  title        = {Datenschutz bei der Erhebung biometrischer Testdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {347--351},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0138-6},
  doi          = {10.1007/S11623-013-0138-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/OpelKN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri13,
  author       = {Thomas Petri},
  title        = {Wachinger, Verena: Grenzen automatisierter Datenerfassung zu pr{\"{a}}ventiven
                  Zwecken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {335--336},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0132-z},
  doi          = {10.1007/S11623-013-0132-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri13a,
  author       = {Thomas Petri},
  title        = {Smart Border oder Big Brother an EU-Au{\ss}engrenzen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {423--427},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0171-5},
  doi          = {10.1007/S11623-013-0171-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri13b,
  author       = {Thomas Petri},
  title        = {Gola, Peter; Schomerus, Rudolf: {BDSG} - Bundesdatenschutzgesetz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {481--482},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0199-6},
  doi          = {10.1007/S11623-013-0199-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PfeifferMB13,
  author       = {Christian Pfeiffer and
                  Thomas M{\"{o}}{\ss}le and
                  Dirk Baier},
  title        = {Zensur versus Forschungsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {428--433},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0172-4},
  doi          = {10.1007/S11623-013-0172-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PfeifferMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Piontek13,
  author       = {Daniel Piontek},
  title        = {Psychologiken im Umfeld der elektronischen Gesundheitskarte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {160--163},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0053-x},
  doi          = {10.1007/S11623-013-0053-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Piontek13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PutzS13,
  author       = {Stefan P{\"{u}}tz and
                  Aleksandra Sowa},
  title        = {Privacy and Security Assessment},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {40--43},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0010-8},
  doi          = {10.1007/S11623-013-0010-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PutzS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock13,
  author       = {Gisela Quiring{-}Kock},
  title        = {Entwurf EU-Verordnung {\"{u}}ber elektronische Identifizierung
                  und Vertrauensdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {20--24},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0006-4},
  doi          = {10.1007/S11623-013-0006-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rathgeb13,
  author       = {Christian Rathgeb},
  title        = {Towards enhancing the security and accuracy of iris recognition systems},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {367--370},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0142-x},
  doi          = {10.1007/S11623-013-0142-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rathgeb13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer13,
  author       = {Helmut Reimer},
  title        = {Vom Primat der Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {177},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0057-6},
  doi          = {10.1007/S11623-013-0057-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer13a,
  author       = {Helmut Reimer},
  title        = {22. {RSA} Conference, 25.02. - 01.03.2013 in San Francisco, {USA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {333--335},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0130-1},
  doi          = {10.1007/S11623-013-0130-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerAS13,
  author       = {Sebastian Reimer and
                  J{\"{o}}rg Artmann and
                  Karl A. Stroetmann},
  title        = {Rechtliche Aspekte der Nutzung von elektronischen Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {154--159},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0052-y},
  doi          = {10.1007/S11623-013-0052-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW13,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {Key recovery und vertrauen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {542},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0216-9},
  doi          = {10.1007/S11623-013-0216-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13,
  author       = {Karl Rihaczek},
  title        = {Das Jesus-Argument},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {5},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0002-8},
  doi          = {10.1007/S11623-013-0002-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13a,
  author       = {Karl Rihaczek},
  title        = {Patrimonium},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {73},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0019-z},
  doi          = {10.1007/S11623-013-0019-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13b,
  author       = {Karl Rihaczek},
  title        = {Das falsche Herz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {129},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0046-9},
  doi          = {10.1007/S11623-013-0046-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13c,
  author       = {Karl Rihaczek},
  title        = {In der Parentel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {205},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0078-1},
  doi          = {10.1007/S11623-013-0078-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13d,
  author       = {Karl Rihaczek},
  title        = {Sternzeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {344},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0136-8},
  doi          = {10.1007/S11623-013-0136-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13e,
  author       = {Karl Rihaczek},
  title        = {Privatheit parzelliert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {413},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0167-1},
  doi          = {10.1007/S11623-013-0167-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13f,
  author       = {Karl Rihaczek},
  title        = {Fr{\"{u}}hb{\"{u}}rgerliche Privatheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {489},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0203-1},
  doi          = {10.1007/S11623-013-0203-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13g,
  author       = {Karl Rihaczek},
  title        = {Datenschutz {\&} Computer},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {561},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0236-5},
  doi          = {10.1007/S11623-013-0236-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13h,
  author       = {Karl Rihaczek},
  title        = {Zwischen den Ordnungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {689},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0293-9},
  doi          = {10.1007/S11623-013-0293-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek13i,
  author       = {Karl Rihaczek},
  title        = {Das stille Lesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {757},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0320-x},
  doi          = {10.1007/S11623-013-0320-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost13,
  author       = {Martin Rost},
  title        = {Zur Soziologie des Datenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {85--91},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0023-3},
  doi          = {10.1007/S11623-013-0023-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost13a,
  author       = {Martin Rost},
  title        = {Datenschutzmanagementsystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {295--300},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0111-4},
  doi          = {10.1007/S11623-013-0111-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schafer13,
  author       = {Burkhard Schafer},
  title        = {Crowdsourcing and cloudsourcing {CCTV} surveillance},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {434--439},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0173-3},
  doi          = {10.1007/S11623-013-0173-3},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schafer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schimmer13,
  author       = {Klaus Schimmer},
  title        = {Ein Poster ist zu wenig!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {275--278},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0107-0},
  doi          = {10.1007/S11623-013-0107-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schimmer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnabel13,
  author       = {Christoph Schnabel},
  title        = {Taeger, J{\"{u}}rgen (Hrsg.): Die Welt im Netz - Tagungsband
                  Herbstakademie 2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {406},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0165-3},
  doi          = {10.1007/S11623-013-0165-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnabel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnabel13a,
  author       = {Christoph Schnabel},
  title        = {M{\"{u}}ller, Lucien: Video{\"{u}}berwachung in {\"{o}}ffentlich
                  zug{\"{a}}nglichen R{\"{a}}umen - insbesondere zur Verh{\"{u}}tung
                  und Ahndung von Straftaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {482},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0201-3},
  doi          = {10.1007/S11623-013-0201-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnabel13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnabel13b,
  author       = {Christoph Schnabel},
  title        = {Gruske, Nils: Telekommunikations{\"{u}}berwachung und Pressefreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {614},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0261-4},
  doi          = {10.1007/S11623-013-0261-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnabel13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchnabelG13,
  author       = {Christoph Schnabel and
                  Joachim Gruber},
  title        = {B{\"{u}}cher},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {749--750},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0318-4},
  doi          = {10.1007/S11623-013-0318-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchnabelG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchreinermacherB13,
  author       = {Bj{\"{o}}rn Schreinermacher and
                  Benedikt Buchner},
  title        = {Qualitative Interviews online stellen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {537--541},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0215-x},
  doi          = {10.1007/S11623-013-0215-X},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchreinermacherB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchroberM13,
  author       = {Klaus{-}Werner Schr{\"{o}}ber and
                  S{\"{o}}nke Maseberg},
  title        = {Aktuelle Probleme bei der Pr{\"{u}}fung qualifizierter elektronischer
                  Signaturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {313--317},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0114-1},
  doi          = {10.1007/S11623-013-0114-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchroberM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchroderM13,
  author       = {Martin Schr{\"{o}}der and
                  Frank Morgner},
  title        = {eID mit abgeleiteten Identit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {530--534},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0213-z},
  doi          = {10.1007/S11623-013-0213-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchroderM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchusslerZ13,
  author       = {Lennart Sch{\"{u}}{\ss}ler and
                  Oliver Z{\"{o}}ll},
  title        = {EU-Datenschutz-Grundverordnung und Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {639--643},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0267-y},
  doi          = {10.1007/S11623-013-0267-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchusslerZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seifert13,
  author       = {Bernd Seifert},
  title        = {Neue Regeln f{\"{u}}r die Video{\"{u}}berwachung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {650--654},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0269-9},
  doi          = {10.1007/S11623-013-0269-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Seifert13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Selzer13,
  author       = {Annika Selzer},
  title        = {Die Kontrollpflicht nach {\textsection} 11 Abs. 2 Satz 4 {BDSG} im
                  Zeitalter des Cloud Computing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {215--219},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0081-6},
  doi          = {10.1007/S11623-013-0081-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Selzer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stollhof13,
  author       = {Sabine Stollhof},
  title        = {Das E-Government-Gesetz des Bundes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {691--695},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0295-7},
  doi          = {10.1007/S11623-013-0295-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stollhof13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SuptitzUE13,
  author       = {Thomas S{\"{u}}ptitz and
                  Christine Utz and
                  Torsten Eymann},
  title        = {State-of-the-Art: Ermittlungen in der Cloud},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {307--312},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0113-2},
  doi          = {10.1007/S11623-013-0113-2},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SuptitzUE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SwierczynskiLP13,
  author       = {Pawel Swierczynski and
                  Gregor Leander and
                  Christof Paar},
  title        = {Keccak und der {SHA-2}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {712--719},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0299-3},
  doi          = {10.1007/S11623-013-0299-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SwierczynskiLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThielF13,
  author       = {Christoph Thiel and
                  Arno Fiedler},
  title        = {Der grenzenlose digitale Binnenmarkt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {14--19},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0005-5},
  doi          = {10.1007/S11623-013-0005-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ThielF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Thomsen13,
  author       = {Sven Thomsen},
  title        = {OpenData: Das Ende klassischer IT-Infrastrukturen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {709--711},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0298-4},
  doi          = {10.1007/S11623-013-0298-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Thomsen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld13,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Europ{\"{a}}ische Integration vs. Nationalismus},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {418--422},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0170-6},
  doi          = {10.1007/S11623-013-0170-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld13a,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Schutz europ{\"{a}}ischer Grundwerte und Menschenrechte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {461--462},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0179-x},
  doi          = {10.1007/S11623-013-0179-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld13b,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Ricker, Reinhart; Weberling, Johannes: Handbuch des Presserechts},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {612--613},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0259-y},
  doi          = {10.1007/S11623-013-0259-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld13c,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Datenschutz 2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {772--774},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0324-6},
  doi          = {10.1007/S11623-013-0324-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB13,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Demokratie und Menschenrechte - ein Thema in der globalen Welt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {409},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0166-2},
  doi          = {10.1007/S11623-013-0166-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese13,
  author       = {Sven Venzke{-}Caprarese},
  title        = {Social Media Monitoring},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {775--779},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0325-5},
  doi          = {10.1007/S11623-013-0325-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke-Caprarese13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VoskampK13,
  author       = {Friederike Voskamp and
                  Dennis{-}Kenji Kipker},
  title        = {Virtueller Pranger Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {787--790},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0327-3},
  doi          = {10.1007/S11623-013-0327-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VoskampK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VoskampKY13,
  author       = {Friederike Voskamp and
                  Dennis{-}Kenji Kipker and
                  Richard Yamato},
  title        = {Grenz{\"{u}}berschreitende Datenschutzregulierung im Pazifik-Raum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {452--456},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0177-z},
  doi          = {10.1007/S11623-013-0177-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VoskampKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wachter13,
  author       = {Michael W{\"{a}}chter},
  title        = {Kazemi, Leopold: Datenschutzrecht in der anwaltlichen Beratung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {335},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0133-y},
  doi          = {10.1007/S11623-013-0133-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wachter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weber13,
  author       = {Stefan G. Weber},
  title        = {Biometrische IT-Sicherheit - eine Frage des Fingerspitzengef{\"{u}}hls?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {371--375},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0143-9},
  doi          = {10.1007/S11623-013-0143-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weber13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener13,
  author       = {Christoph Wegener},
  title        = {Schl{\"{u}}sselfragen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {485},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0202-2},
  doi          = {10.1007/S11623-013-0202-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert13,
  author       = {Thilo Weichert},
  title        = {Das Gesch{\"{a}}ft mit den Verordnungsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {130},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0047-8},
  doi          = {10.1007/S11623-013-0047-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert13a,
  author       = {Thilo Weichert},
  title        = {Wider das Verbot mit Erlaubnisvorbehalt im Datenschutz?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {246--249},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0086-1},
  doi          = {10.1007/S11623-013-0086-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wieczorek13,
  author       = {Mirko Andreas Wieczorek},
  title        = {Der r{\"{a}}umliche Anwendungsbereich der EU-Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {644--649},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0268-x},
  doi          = {10.1007/S11623-013-0268-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wieczorek13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wischhofer13,
  author       = {Cord Wischh{\"{o}}fer},
  title        = {Koordinierung der IT-Sicherheitsnormung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {30--34},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0008-2},
  doi          = {10.1007/S11623-013-0008-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wischhofer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13,
  title        = {Entschlie{\ss}ung der 84. Konferenz vom 7./8. November 2012 in Frankfurt
                  (Oder)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {46--48},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0012-6},
  doi          = {10.1007/S11623-013-0012-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13a,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {50--59},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0014-4},
  doi          = {10.1007/S11623-013-0014-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13aa,
  title        = {{GI:} Datenschutzfeindliche soziale Netzwerke besser meiden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {193},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0066-5},
  doi          = {10.1007/S11623-013-0066-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13ab,
  title        = {Schaar zum Besch{\"{a}}ftigtendatenschutzgesetz: "Kein gro{\ss}er
                  Wurf"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {191},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0063-8},
  doi          = {10.1007/S11623-013-0063-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13ac,
  title        = {Europ{\"{a}}ische Datenschutzreform: BfDI begr{\"{u}}{\ss}t
                  {\"{A}}nderungsvorschl{\"{a}}ge aus dem Europ{\"{a}}ischen
                  Parlament},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {191--192},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0064-7},
  doi          = {10.1007/S11623-013-0064-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13ad,
  title        = {LfD Sachsen: Zur aufsichtsbeh{\"{o}}rdlichen T{\"{a}}tigkeit
                  gegen{\"{u}}ber Unternehmen der Unister-Unternehmensgruppe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {192},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0065-6},
  doi          = {10.1007/S11623-013-0065-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13b,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {60--64},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0015-3},
  doi          = {10.1007/S11623-013-0015-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13c,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {65--66},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0016-2},
  doi          = {10.1007/S11623-013-0016-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13d,
  title        = {Veranstaltungskalender 1 {\(\vert\)} 2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {67},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0017-1},
  doi          = {10.1007/S11623-013-0017-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13e,
  title        = {{LAG} K{\"{o}}ln: Fristlose K{\"{u}}ndigung wegen Whistleblowings},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {105--106},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0028-y},
  doi          = {10.1007/S11623-013-0028-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13f,
  title        = {{OLG} Hamm: Einwilligung Minderj{\"{a}}hriger in eine Datenverarbeitung
                  zu Werbezwecken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {106--109},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0029-x},
  doi          = {10.1007/S11623-013-0029-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13g,
  title        = {{LAG} Rheinland-Pfalz: Mitbestimmungsrecht des Betriebsrats bei Einf{\"{u}}hrung
                  einer Video{\"{u}}berwachung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {110--111},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0030-4},
  doi          = {10.1007/S11623-013-0030-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13h,
  title        = {BfDI: Leitfaden f{\"{u}}r die wissenschaftliche Evaluation von
                  Sicherheitsgesetzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {112},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0031-3},
  doi          = {10.1007/S11623-013-0031-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13i,
  title        = {Eckpunktepapier der Bundesregierung zu "Trusted Computing" und "Secure
                  Boot"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {112--114},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0032-2},
  doi          = {10.1007/S11623-013-0032-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13j,
  title        = {25. Konferenz der Informationsfreiheitsbeauftragten, Mainz, 28.11.2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {114--115},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0034-0},
  doi          = {10.1007/S11623-013-0034-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13k,
  title        = {ENISA-Bericht: Technische Aspekte des "Rechts, vergessen zu werden"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {114},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0033-1},
  doi          = {10.1007/S11623-013-0033-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13l,
  title        = {4. Deutscher IT-Sicherheitspreis 2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {115--116},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0035-z},
  doi          = {10.1007/S11623-013-0035-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13m,
  title        = {{BSI} und if(is) stellen App f{\"{u}}r IT-Sicherheit zur Verf{\"{u}}gung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {116},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0036-y},
  doi          = {10.1007/S11623-013-0036-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13n,
  title        = {TeleTrusT - Bundesverband IT-Sicherheit e.V.: Stabile Entwicklung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {116},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0038-9},
  doi          = {10.1007/S11623-013-0038-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13o,
  title        = {certBox.org - Der Zertifikatsserver in der Cloud},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {116},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0037-x},
  doi          = {10.1007/S11623-013-0037-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13p,
  title        = {Kaspersky Lab: IT-Sicherheitsprognosen f{\"{u}}r 2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {117--118},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0041-1},
  doi          = {10.1007/S11623-013-0041-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13q,
  title        = {Vorstandswechsel bei der {GDD}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {117},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0039-8},
  doi          = {10.1007/S11623-013-0039-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13r,
  title        = {Report des Information Security Forums: "You Could Be Next"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {117},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0040-2},
  doi          = {10.1007/S11623-013-0040-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13s,
  title        = {Karl Rihaczek},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {118--119},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0042-0},
  doi          = {10.1007/S11623-013-0042-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13t,
  title        = {Christoph Schnabel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {119},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0043-z},
  doi          = {10.1007/S11623-013-0043-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13u,
  title        = {Ludwig Gramlich},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {2},
  pages        = {119--120},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0044-y},
  doi          = {10.1007/S11623-013-0044-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13v,
  title        = {{OLG} Brandenburg: Weitergabe gesch{\"{a}}ftlicher Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {178--181},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0058-5},
  doi          = {10.1007/S11623-013-0058-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13w,
  title        = {{LG} N{\"{u}}rnberg-F{\"{u}}rth: Unterlassungsanspruch gegen
                  den Betreiber eines Arztbewertungsportals},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {181--185},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0059-4},
  doi          = {10.1007/S11623-013-0059-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13x,
  title        = {ArbG Frankfurt: Anspruch einer ehemaligen Arbeitnehmerin auf Unkenntlichmachung
                  von Bildfotographien und Namen im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {185--189},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0060-y},
  doi          = {10.1007/S11623-013-0060-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13y,
  title        = {{ENISA:} Bericht {\"{u}}ber Internet-Sicherheitsma{\ss}nahmen
                  f{\"{u}}r Smart Grids},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {190--191},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0062-9},
  doi          = {10.1007/S11623-013-0062-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X13z,
  title        = {Cyber-Sicherheit: Eckpunkte zu m{\"{o}}glichen gesetzlichen Regelungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {190},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0061-x},
  doi          = {10.1007/S11623-013-0061-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X13z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13,
  title        = {ThLfDI: Informationsfreiheitsgesetz - Wozu ?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {193--194},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0067-4},
  doi          = {10.1007/S11623-013-0067-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13a,
  title        = {Projekt "SeManTiK": Neue Chip-Integrations-Techniken f{\"{u}}r
                  kontaktlose Identit{\"{a}}tsdokumente},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {194},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0068-3},
  doi          = {10.1007/S11623-013-0068-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13b,
  title        = {sign-me der Bundesdruckerei nach Signaturgesetz gepr{\"{u}}ft
                  und best{\"{a}}tigt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {195},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0070-9},
  doi          = {10.1007/S11623-013-0070-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13c,
  title        = {Neues Release von Sign Live! {CC} unterst{\"{u}}tzt moderne Signaturkarten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {195},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0069-2},
  doi          = {10.1007/S11623-013-0069-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13d,
  title        = {Studie des Fraunhofer {AISEC:} Managementsysteme f{\"{u}}r Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {195},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0071-8},
  doi          = {10.1007/S11623-013-0071-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13e,
  title        = {T{\"{U}}V S{\"{U}}D-Studie zur Bedeutung von Datenschutz
                  im Mittelstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {196},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0072-7},
  doi          = {10.1007/S11623-013-0072-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13f,
  title        = {"Ersetzendes Scannen": TeleTrusTInformationstag zur BSI-Richtlinie
                  am 19.04.2013 in Berlin},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {196},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0073-6},
  doi          = {10.1007/S11623-013-0073-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13g,
  title        = {Thomas Petri},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {197--198},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0075-4},
  doi          = {10.1007/S11623-013-0075-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13h,
  title        = {D{\(\cdot\)}A{\(\cdot\)}CH Security 2013, Call for Papers},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {197},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0074-5},
  doi          = {10.1007/S11623-013-0074-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XX13i,
  title        = {Christoph Schnabel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {3},
  pages        = {198},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0076-3},
  doi          = {10.1007/S11623-013-0076-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XX13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13,
  title        = {{LAG} Hamm: Verunglimpfung des Arbeitgebers auf Facebook},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {251--255},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0088-z},
  doi          = {10.1007/S11623-013-0088-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13a,
  title        = {ArbG Duisburg: Beleidigung unter Arbeitskollegen auf Facebook},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {255--258},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0089-y},
  doi          = {10.1007/S11623-013-0089-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13b,
  title        = {ArbG Bochum: Unterlassungsanspruch gegen ehrverletzende Behauptungen
                  auf Facebook},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {258--259},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0103-4},
  doi          = {10.1007/S11623-013-0103-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13c,
  title        = {Stiftung Datenschutz gegr{\"{u}}ndet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {260--261},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0091-4},
  doi          = {10.1007/S11623-013-0091-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13d,
  title        = {Der Besch{\"{a}}ftigtendatenschutz in der Gesetzgebung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {260},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0090-5},
  doi          = {10.1007/S11623-013-0090-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13e,
  title        = {BayLfD: 25. T{\"{a}}tigkeitsbericht 2011/2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {261--262},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0092-3},
  doi          = {10.1007/S11623-013-0092-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13f,
  title        = {Entschlie{\ss}ung der Konferenz der Datenschutzbeauftragten des Bundes
                  und der L{\"{a}}nder vom 25. Januar 2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {262--263},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0094-1},
  doi          = {10.1007/S11623-013-0094-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13g,
  title        = {Neues IT-Sicherheitsexpertenzertifikat "TeleTrusT Engineer for System
                  Security" {(T.E.S.S.)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {262},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0093-2},
  doi          = {10.1007/S11623-013-0093-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13h,
  title        = {{BSI:} {\"{u}}berblickspapier zu IT-Consumerisation und {BYOD}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {263--264},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0096-z},
  doi          = {10.1007/S11623-013-0096-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13i,
  title        = {Facebook Gesichtserkennung - Verwaltungsverfahren eingestellt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {263},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0095-0},
  doi          = {10.1007/S11623-013-0095-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13j,
  title        = {Andreas K{\"{o}}nen neuer Vizepr{\"{a}}sident des {BSI}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {264},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0097-y},
  doi          = {10.1007/S11623-013-0097-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13k,
  title        = {Internet-Kennzahlen-System {(IKS):} {\"{O}}ffentliche Online-Plattform
                  offiziell gestartet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {264--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0100-7},
  doi          = {10.1007/S11623-013-0100-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13l,
  title        = {FP-Tochterunternehmen gibt Zusammenarbeit mit Identdienstleister {ID}
                  8 bekannt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {264},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0099-9},
  doi          = {10.1007/S11623-013-0099-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13m,
  title        = {EU-Pilotprojekt gegen Botnetze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {264},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0098-x},
  doi          = {10.1007/S11623-013-0098-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/XXX13n,
  title        = {Sicherheit beim Online-Banking: B{\"{u}}rger zwischen Angst und
                  Sorglosigkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {4},
  pages        = {265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0101-6},
  doi          = {10.1007/S11623-013-0101-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/XXX13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13,
  title        = {BVerfG: Antiterrordatei},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {730--742},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0303-y},
  doi          = {10.1007/S11623-013-0303-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13a,
  title        = {{GI} zur Sp{\"{a}}haffaire: Informatiker kl{\"{a}}ren auf},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {743--744},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0305-9},
  doi          = {10.1007/S11623-013-0305-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13b,
  title        = {Entschlie{\ss}ung der Konferenz der Datenschutzbeauftragten des Bundes
                  und der L{\"{a}}nder vom 05. September 2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {743},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0304-x},
  doi          = {10.1007/S11623-013-0304-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13c,
  title        = {Daten{\"{u}}bermittlung in Drittstaaten erfordert Pr{\"{u}}fung
                  in zwei Stufen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {744--745},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0308-6},
  doi          = {10.1007/S11623-013-0308-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13d,
  title        = {Deutsche IT-Sicherheitswirtschaft gewinnt an Bedeutung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {744},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0306-8},
  doi          = {10.1007/S11623-013-0306-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13e,
  title        = {Informationsfreiheitsbeauftragte weltweit fordern St{\"{a}}rkung
                  der Transparenz auf nationaler und internationaler Ebene},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {744},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0307-7},
  doi          = {10.1007/S11623-013-0307-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13f,
  title        = {World Quality Report: Rund ein Viertel der IT-Budgets flie{\ss}t in
                  Qualit{\"{a}}tssicherung und Software-Testing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {745--746},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0311-y},
  doi          = {10.1007/S11623-013-0311-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13g,
  title        = {Hochsicherheitshandy der Telekom erh{\"{a}}lt BSI-Zulassung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {745},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0309-5},
  doi          = {10.1007/S11623-013-0309-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13h,
  title        = {Consumerization of IT, Studie von techconsult: Arbeitnehmer wollen
                  Takt in der Unternehmens {IT} mitbestimmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {745},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0310-z},
  doi          = {10.1007/S11623-013-0310-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13i,
  title        = {Fraunhofer {SIT} und House of {IT} starten Forschungsprojekt {CIRECS}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {746--747},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0313-9},
  doi          = {10.1007/S11623-013-0313-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13j,
  title        = {50 {\%} der schutzw{\"{u}}rdigen Internetkommunikation nutzt
                  unsichere Verschl{\"{u}}sselungsalgorithmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {746},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0312-x},
  doi          = {10.1007/S11623-013-0312-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13k,
  title        = {Neue HSM-Serie von Utimaco: CryptoServer CSe - doppelte Leistung auf
                  h{\"{o}}chstem Sicherheitsniveau},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {747},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0315-7},
  doi          = {10.1007/S11623-013-0315-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13l,
  title        = {Trend Micro ver{\"{o}}ffentlicht juristischen IT-Leitfaden f{\"{u}}r
                  Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {747--748},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0316-6},
  doi          = {10.1007/S11623-013-0316-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xa13m,
  title        = {Informationssicherheit im Smart Grid},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {747},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0314-8},
  doi          = {10.1007/S11623-013-0314-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xa13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13,
  title        = {Datenschutzappell an die Akteure der 18. Legislaturperiode},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {758},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0321-9},
  doi          = {10.1007/S11623-013-0321-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13a,
  title        = {Entschlie{\ss}ungen der 86. Konferenz vom 01. und 02. Oktober 2013
                  in Bremen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {802--803},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0330-8},
  doi          = {10.1007/S11623-013-0330-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13b,
  title        = {BVerfG: Datenschutz im privaten Versicherungsrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {805--808},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0332-6},
  doi          = {10.1007/S11623-013-0332-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13c,
  title        = {{OLG} Hamburg: Wettbewerbswidrigkeit aufgrund fehlender Datenschutzhinweise},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {808--810},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0333-5},
  doi          = {10.1007/S11623-013-0333-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13d,
  title        = {{LG} Frankfurt: Unzul{\"{a}}ssigkeit von App-Store-AGB},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {810--812},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0334-4},
  doi          = {10.1007/S11623-013-0334-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13e,
  title        = {{LG} M{\"{o}}nchengladbach: Keine Haftung f{\"{u}}r potentiell
                  ehrverletzende Suchergebnisse bei Google},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {812--814},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0335-3},
  doi          = {10.1007/S11623-013-0335-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13f,
  title        = {Jan Philipp Albrecht zu den Ergebnissen der {LIBE} Ausschusssitzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {815--816},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0337-1},
  doi          = {10.1007/S11623-013-0337-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13g,
  title        = {BfDI Peter Schaar: Die Europ{\"{a}}ische Datenschutz reform muss
                  z{\"{u}}gig abgeschlossen werden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {815},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0336-2},
  doi          = {10.1007/S11623-013-0336-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13h,
  title        = {{BVDW:} Kritik am Votum des LIBE-Ausschusses zur neuen {EU} Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {816},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0339-z},
  doi          = {10.1007/S11623-013-0339-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13i,
  title        = {Forderungspapier des BfDI und des Vorstands des Verbraucherzentrale
                  Bundesverband (vzbv) an die neue Bundesregierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {816},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0338-0},
  doi          = {10.1007/S11623-013-0338-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13j,
  title        = {Ausschreibung des 5. Deutschen IT-Sicherheitspreises der Horst G{\"{o}}rtz-Stiftung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {816--817},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0340-6},
  doi          = {10.1007/S11623-013-0340-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13k,
  title        = {{BSI} ver{\"{o}}ffentlicht Mindeststandard f{\"{u}}r verschl{\"{u}}sselte
                  Internetverbindungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {817},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0341-5},
  doi          = {10.1007/S11623-013-0341-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13l,
  title        = {BSI-Studie: Notfallmanagement mit der Cloud f{\"{u}}r {KMU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {817},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0342-4},
  doi          = {10.1007/S11623-013-0342-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13m,
  title        = {G{\&}D liefert Common Access Cards an {DMDC} des US-Verteidigungsministeriums},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {818},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0344-2},
  doi          = {10.1007/S11623-013-0344-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13n,
  title        = {{TABULA} {RASA:} EU-gef{\"{o}}rdertes Projekt schlie{\ss}t Sicherheitsl{\"{u}}cken
                  bei biometrischen Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {818--819},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0345-1},
  doi          = {10.1007/S11623-013-0345-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13o,
  title        = {IT-Sicherheitswirtschaft fordert nationale ,Security-Roadmap'},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {818},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0343-3},
  doi          = {10.1007/S11623-013-0343-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13p,
  title        = {Fraunhofer {SIT:} Forschungsroadmap zum Schutz von Privatsph{\"{a}}re
                  und Vertraulichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {819},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0348-y},
  doi          = {10.1007/S11623-013-0348-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13q,
  title        = {Partnerschaft: Bundesverband IT-Sicherheit e.V. (TeleTrusT) und Bund
                  Deutscher Kriminalbeamter e.V. {(BDK)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {819},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0346-0},
  doi          = {10.1007/S11623-013-0346-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13r,
  title        = {Hohes Risiko bei Verlust von mobilen Ger{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {819--820},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0349-x},
  doi          = {10.1007/S11623-013-0349-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13s,
  title        = {App-Security-Check f{\"{u}}r iOS, Android {\&} Co},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {819},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0347-z},
  doi          = {10.1007/S11623-013-0347-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13t,
  title        = {Veranstaltungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {820--822},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0350-4},
  doi          = {10.1007/S11623-013-0350-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Xb13u,
  title        = {B{\"{u}}cher},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {12},
  pages        = {822},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0351-3},
  doi          = {10.1007/S11623-013-0351-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Xb13u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13,
  title        = {Big Data},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {273},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0105-2},
  doi          = {10.1007/S11623-013-0105-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13a,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {319--327},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0116-z},
  doi          = {10.1007/S11623-013-0116-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13b,
  title        = {Neue Forschungsprojekte zu IT-Sicherheit in eingebetteten Systemen
                  gestartet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {328--329},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0117-y},
  doi          = {10.1007/S11623-013-0117-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13c,
  title        = {{BMI:} Gesetzentwurf zur Verbesserung der IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {328},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0118-x},
  doi          = {10.1007/S11623-013-0118-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13d,
  title        = {13. Deutscher IT-Sicherheitskongress: Programm ver{\"{o}}ffentlicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {329},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0121-2},
  doi          = {10.1007/S11623-013-0121-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13e,
  title        = {Datenschutz-G{\"{u}}tesiegel f{\"{u}}r High Security-Festplatte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {329--330},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0119-9},
  doi          = {10.1007/S11623-013-0119-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13g,
  title        = {Kooperation f{\"{u}}r gesch{\"{u}}tzte Sicherheitsanwendungen
                  auf Smartphones und Tablet-PCs},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {330},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0123-0},
  doi          = {10.1007/S11623-013-0123-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13h,
  title        = {Sicherheitskarte mit One-Time Password und LED-Display},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {330},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0122-1},
  doi          = {10.1007/S11623-013-0122-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13i,
  title        = {Verbesserte Sicherheit f{\"{u}}r Android-Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {331},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0126-x},
  doi          = {10.1007/S11623-013-0126-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13j,
  title        = {{GI:} EU-Datenschutzverordnung sollte innerbetriebliche Datenschutzkontrolle
                  nicht aufweichen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {331--332},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0124-z},
  doi          = {10.1007/S11623-013-0124-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13k,
  title        = {Elektronisches Rechnungsformat "ZUGFeRD" erleichtert den Rechnungsaustausch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {331},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0125-y},
  doi          = {10.1007/S11623-013-0125-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13l,
  title        = {Video-Beitr{\"{a}}ge zu allt{\"{a}}glichen IT-Sicherheitsrisiken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {332},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0129-7},
  doi          = {10.1007/S11623-013-0129-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13m,
  title        = {E-Postbrief bietet Ende-zu-Ende- Verschl{\"{u}}sselung f{\"{u}}r
                  Berufsgeheimnistr{\"{a}}ger},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {332--333},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0127-9},
  doi          = {10.1007/S11623-013-0127-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13n,
  title        = {Information Security Forum ver{\"{o}}ffentlicht Threat Horizon
                  2015},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {332},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0128-8},
  doi          = {10.1007/S11623-013-0128-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Y13o,
  title        = {Sealed Cloud schlie{\ss}t IT-Sicherheitsl{\"{u}}cke "Mensch"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {5},
  pages        = {333},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0131-0},
  doi          = {10.1007/S11623-013-0131-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Y13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13,
  title        = {Biometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {341},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0135-9},
  doi          = {10.1007/S11623-013-0135-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13a,
  title        = {Datenschutz in Europa st{\"{a}}rken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {345},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0137-7},
  doi          = {10.1007/S11623-013-0137-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13b,
  title        = {Entschlie{\ss}ung der 85. Konferenz vom 13. und 14. M{\"{a}}rz
                  2013 in Bremerhaven},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {383--385},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0146-6},
  doi          = {10.1007/S11623-013-0146-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13c,
  title        = {EuGH: Verarbeitung von Verkehrsdaten durch den Zessionar einer Entgeltforderung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {387--389},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0148-4},
  doi          = {10.1007/S11623-013-0148-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13d,
  title        = {{OLG} Hamm: Auskunftsanspruch des durch heterologe Insemination gezeugten
                  Kindes gegen{\"{u}}ber dem behandelnden Arzt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {389--392},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0149-3},
  doi          = {10.1007/S11623-013-0149-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13e,
  title        = {{LAG} Hessen: Auskunftsanspr{\"{u}}che gegen den Arbeitgeber},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {392--396},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0150-x},
  doi          = {10.1007/S11623-013-0150-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13f,
  title        = {{VG} K{\"{o}}ln: Einsicht in die Hausrechtsrichtlinien von Justizgeb{\"{a}}uden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {396--398},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0151-9},
  doi          = {10.1007/S11623-013-0151-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13g,
  title        = {ULD-T{\"{a}}tigkeitsbericht 2013: Datenschutz als globale Herausforderung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {399--400},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0152-8},
  doi          = {10.1007/S11623-013-0152-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13h,
  title        = {LfDI Bremen: 35. Jahresbericht Datenschutz 2012, 7. Jahresbericht
                  Informationsfreiheit 2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {400--401},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0153-7},
  doi          = {10.1007/S11623-013-0153-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13i,
  title        = {LfD Hessen 41. T{\"{a}}tigkeitsbericht 2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {401--402},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0154-6},
  doi          = {10.1007/S11623-013-0154-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13j,
  title        = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht: T{\"{a}}tigkeitsbericht
                  2011/2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {402},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0155-5},
  doi          = {10.1007/S11623-013-0155-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13k,
  title        = {{BSI:} {TR} "Ersetzendes Scannen"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {403},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0158-2},
  doi          = {10.1007/S11623-013-0158-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13l,
  title        = {Das {DGN} ist zertifizierter Anbieter von KV-SafeNet mit Netzkopplung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {403--404},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0156-4},
  doi          = {10.1007/S11623-013-0156-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13m,
  title        = {TeleTrusT-Innovationspreis f{\"{u}}r IT-Sicherheitsl{\"{o}}sungen:
                  Bewerbungen bis 31.08.2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {403},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0159-1},
  doi          = {10.1007/S11623-013-0159-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13n,
  title        = {gematik erteilt Zuschlag f{\"{u}}r neue Kartengeneration},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {403},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0157-3},
  doi          = {10.1007/S11623-013-0157-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13o,
  title        = {De-Mail in der Bundesverwaltung: Empfehlungen des BfDI},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {404},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0162-6},
  doi          = {10.1007/S11623-013-0162-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13p,
  title        = {HmbBfDI: Bu{\ss}geld gegen Google festgesetzt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {404--405},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0160-8},
  doi          = {10.1007/S11623-013-0160-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13q,
  title        = {DsiN-Cloud-Scout: Herstellerunabh{\"{a}}ngiger und produktneutraler
                  Online-Check f{\"{u}}r Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {404},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0161-7},
  doi          = {10.1007/S11623-013-0161-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13r,
  title        = {Sicherer Austausch von E-Mail-Dateianh{\"{a}}ngen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {405--406},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0163-5},
  doi          = {10.1007/S11623-013-0163-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13s,
  title        = {F-Secure-Studie: 87 Prozent der PC-Systeme in Unternehmen mit L{\"{u}}cken
                  bei sicherheitskritischen Software-Updates},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {6},
  pages        = {405},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0164-4},
  doi          = {10.1007/S11623-013-0164-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13t,
  title        = {24. T{\"{a}}tigkeitsbericht zum Datenschutz f{\"{u}}r die
                  Jahre 2011 und 2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {414},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0168-0},
  doi          = {10.1007/S11623-013-0168-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13u,
  title        = {{OVG} Schleswig-Holstein: Klarnamenpflicht bei Facebook},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {463--465},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0180-4},
  doi          = {10.1007/S11623-013-0180-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13v,
  title        = {{VGH} M{\"{u}}nchen: Automatisierte Kennzeichenerfassung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {465--470},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0181-3},
  doi          = {10.1007/S11623-013-0181-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13w,
  title        = {{VG} Oldenburg: Video{\"{u}}berwachung von Treppenaufg{\"{a}}ngen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {471--474},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0182-2},
  doi          = {10.1007/S11623-013-0182-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Z13x,
  title        = {{OVG} Schleswig-Holstein: F{\"{u}}r Facebook gilt kein deutsches
                  Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {475--476},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0183-1},
  doi          = {10.1007/S11623-013-0183-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Z13x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13,
  title        = {LfDI {NRW:} 21. T{\"{a}}tigkeitsbericht 2011/2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {475},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0184-0},
  doi          = {10.1007/S11623-013-0184-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13a,
  title        = {LfD Baden-W{\"{u}}rttemberg: Gesetzgeber zur Regulierung sozialer
                  Netzwerke gefordert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {475},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0185-z},
  doi          = {10.1007/S11623-013-0185-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13b,
  title        = {secunet {AG:} Internationaler Interoperabilit{\"{a}}tstests f{\"{u}}r
                  zuk{\"{u}}nftige eP{\"{a}}sse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {476--477},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0186-y},
  doi          = {10.1007/S11623-013-0186-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13c,
  title        = {{BMI:} Zustimmung zur neugeregelten Bestandsdatenauskunft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {476},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0187-x},
  doi          = {10.1007/S11623-013-0187-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13d,
  title        = {{KOBIL:} iDtoken f{\"{u}}r den nPA in allen Postbank Finanzcentern
                  erh{\"{a}}ltlich},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {477},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0189-8},
  doi          = {10.1007/S11623-013-0189-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13e,
  title        = {IT-Sicherheit als Mittelstandsthema: Fallbeispiel "Hotellerie"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {477},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0190-2},
  doi          = {10.1007/S11623-013-0190-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13f,
  title        = {LfDI {RLP:} Datenschutz im Hotelgewerbe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {477},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0191-1},
  doi          = {10.1007/S11623-013-0191-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13g,
  title        = {nPA-BOX: Bayerische Konzeptstudie zum Datensafe im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {477--478},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0188-9},
  doi          = {10.1007/S11623-013-0188-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13h,
  title        = {Kaspersky-Analyse: Spam-R{\"{u}}ckgang in {I/2013}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {478},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0193-z},
  doi          = {10.1007/S11623-013-0193-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13i,
  title        = {Fraunhofer {AISEC:} Tech Report zur Effektivit{\"{a}}t von Antiviren-Apps},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {478--479},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0192-0},
  doi          = {10.1007/S11623-013-0192-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13j,
  title        = {Leitfaden mit Analysen und Erkl{\"{a}}rungen der Angriffsarten
                  bei Websites},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {479},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0196-9},
  doi          = {10.1007/S11623-013-0196-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13k,
  title        = {Android-Bankraub: Schad-App hat es auf mTANs abgesehen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {479},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0195-x},
  doi          = {10.1007/S11623-013-0195-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13l,
  title        = {{ESET} Secure Authentication: Sicherer Zugang zu {VPN} und Outlook
                  Web App},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {479--480},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0194-y},
  doi          = {10.1007/S11623-013-0194-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13m,
  title        = {E-Mail bleibt Sicherheitsschwachstelle in den Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {480},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0197-8},
  doi          = {10.1007/S11623-013-0197-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13n,
  title        = {nPA jetzt auch f{\"{u}}r {ELSTER} verwendbar},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {480},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0198-7},
  doi          = {10.1007/S11623-013-0198-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zx13o,
  title        = {BvD-Datenschutztage 2013 am 24. und 25. April 2013 in Berlin},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {481},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0200-4},
  doi          = {10.1007/S11623-013-0200-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zx13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13,
  title        = {{BAG:} Fragerecht des Arbeitgebers nach erledigten Ermittlungsverfahren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {543--546},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0217-8},
  doi          = {10.1007/S11623-013-0217-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13a,
  title        = {BVerfG: Eilrechtsschutz gegen die Anordnung einer DNA-Analyse bei
                  einem Minderj{\"{a}}hrigen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {546--547},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0218-7},
  doi          = {10.1007/S11623-013-0218-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13b,
  title        = {{VG} Wiesbaden: Verwertungsverbot bei unzul{\"{a}}ssig gespeicherten
                  Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {547--548},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0219-6},
  doi          = {10.1007/S11623-013-0219-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13c,
  title        = {Common {PKI} 2.0: Nachweis der Konformit{\"{a}}t vereinfacht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {549--550},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0220-0},
  doi          = {10.1007/S11623-013-0220-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13d,
  title        = {Apps mit Datenschutzm{\"{a}}ngeln},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {549},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0221-z},
  doi          = {10.1007/S11623-013-0221-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13e,
  title        = {Bundesrat stimmt dem E-Government-Gesetz zu},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {550--551},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0222-y},
  doi          = {10.1007/S11623-013-0222-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13f,
  title        = {Beirat der Allianz f{\"{u}}r Cyber-Sicherheit hat sich konstituiert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {550},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0224-9},
  doi          = {10.1007/S11623-013-0224-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13g,
  title        = {T{\"{U}}V Informationstechnik als IT-Sicherheitsdienstleister
                  zertifiziert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {550},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0223-x},
  doi          = {10.1007/S11623-013-0223-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13h,
  title        = {Neue Forschungsprojekte zu IT-Sicherheit in eingebetteten Systemen
                  gestartet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {551},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0226-7},
  doi          = {10.1007/S11623-013-0226-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13i,
  title        = {G{\&}D: Elektronische P{\"{a}}sse mit neuem SAC-Zugriffsmechanismus},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {551},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0227-6},
  doi          = {10.1007/S11623-013-0227-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13j,
  title        = {Wie steht es um die elektronische Signatur in Deutschland?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {551--552},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0225-8},
  doi          = {10.1007/S11623-013-0225-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13k,
  title        = {"Operation NetTraveler": Cyberspionage-Kampagne gegen regierungsnahe
                  Organisationen und Forschungsinstitute},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {552--553},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0228-5},
  doi          = {10.1007/S11623-013-0228-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13l,
  title        = {Forschungsprojekt "eID Connect" verifiziert das Alter mit Hilfe der
                  CodeMeter-Technologie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {552},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0229-4},
  doi          = {10.1007/S11623-013-0229-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13m,
  title        = {Strategiebericht Entwicklung sicherer Software},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {552},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0230-y},
  doi          = {10.1007/S11623-013-0230-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13n,
  title        = {G{\&}D bietet abh{\"{o}}rsicheres Smartphone f{\"{u}}r
                  Regierungen und Beh{\"{o}}rden an},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {553--554},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0231-x},
  doi          = {10.1007/S11623-013-0231-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13o,
  title        = {Polizei, Staatsanwaltschaften, Verfassungsschutz: Aufbewahrungsfristen
                  von personenbezogenen Daten {\&} dienstlichem Schriftgut},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {554},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0232-9},
  doi          = {10.1007/S11623-013-0232-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13p,
  title        = {acatech Position "Privatheit im Internet"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {554},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0233-8},
  doi          = {10.1007/S11623-013-0233-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13q,
  title        = {26. Konferenz der Informationsfreiheitsbeauftragten in Deutschland},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {592--593},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0244-5},
  doi          = {10.1007/S11623-013-0244-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13r,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {595--605},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0246-3},
  doi          = {10.1007/S11623-013-0246-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13s,
  title        = {Das Grundrecht auf informationelle Selbstbestimmung darf weder von
                  inl{\"{a}}ndischen noch von ausl{\"{a}}ndischen Stellen
                  verletzt werden!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {606},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0247-2},
  doi          = {10.1007/S11623-013-0247-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13t,
  title        = {,Berlin Group' fordert besseren Schutz der Privatsph{\"{a}}re
                  beim Web Tracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {606--607},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0248-1},
  doi          = {10.1007/S11623-013-0248-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13u,
  title        = {Bundesrat: Gesetz zur F{\"{o}}rderung des elektronischen Rechtsverkehrs
                  mit den Gerichten beschlossen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {607--608},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0249-0},
  doi          = {10.1007/S11623-013-0249-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13v,
  title        = {Die EU-Cybersicherheitsstrategie braucht Vertrauen und den Schutz
                  der Privatsph{\"{a}}re},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {608--609},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0251-6},
  doi          = {10.1007/S11623-013-0251-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13w,
  title        = {EU-Agentur f{\"{u}}r Cybersicherheit {ENISA} erh{\"{a}}lt
                  weitere Aufgaben},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {608},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0250-7},
  doi          = {10.1007/S11623-013-0250-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13x,
  title        = {Privatsph{\"{a}}re-Bestimmungen von Google auf dem Pr{\"{u}}fstand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {609},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0252-5},
  doi          = {10.1007/S11623-013-0252-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zy13y,
  title        = {LfDI Saarland: 24. T{\"{a}}tigkeitsberichtes 2011/12},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {609--610},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0253-4},
  doi          = {10.1007/S11623-013-0253-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zy13y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zyy13,
  title        = {E-Government in Sachsen-Anhalt - nur mit Datenschutz als Vertrauensfaktor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {8},
  pages        = {490},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0204-0},
  doi          = {10.1007/S11623-013-0204-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zyy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zyy13a,
  title        = {Die gr{\"{o}}{\ss}ten Herausforderungen f{\"{u}}r aktuelle
                  Sicherheits-Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {610},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0254-3},
  doi          = {10.1007/S11623-013-0254-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zyy13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zyy13b,
  title        = {20 Jahre Datenschutz in der Schweiz - wie weiter?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {611--612},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0257-0},
  doi          = {10.1007/S11623-013-0257-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zyy13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zyy13c,
  title        = {F-Secure: Deutsche besorgt wegen Zugriffe von Unbefugten auf in der
                  Cloud Inhalte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {611},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0255-2},
  doi          = {10.1007/S11623-013-0255-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zyy13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zyy13d,
  title        = {Bundesdruckerei erwirbt Anteile am Kryptografie-Spezialisten cryptovision},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {611},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0256-1},
  doi          = {10.1007/S11623-013-0256-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zyy13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zyy13e,
  title        = {5. Tag der IT-Sicherheit, Informationsveranstaltung f{\"{u}}r
                  IT-Sicherheitsverantwortliche und Datenschutzbeauftragte der TechnologieRegion
                  Karlsruhe, 04.07.2013},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {9},
  pages        = {612},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0258-z},
  doi          = {10.1007/S11623-013-0258-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zyy13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13,
  title        = {Renaissance},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {621},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0263-2},
  doi          = {10.1007/S11623-013-0263-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13a,
  title        = {Geheimdienste gef{\"{a}}hrden massiv den Datenverkehr zwischen
                  Deutschland und au{\ss}ereurop{\"{a}}ischen Staaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {622},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0264-1},
  doi          = {10.1007/S11623-013-0264-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13b,
  title        = {{BGH:} Google "Autocomplete"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {663--665},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0273-0},
  doi          = {10.1007/S11623-013-0273-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13c,
  title        = {{BGH:} Fahrzeug{\"{u}}berwachung mittels GPS-Empf{\"{a}}nger},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {666--673},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0274-z},
  doi          = {10.1007/S11623-013-0274-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13d,
  title        = {{OVG} L{\"{u}}neburg: Nahaufnahmen von Polizeibeamten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {673--674},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0275-y},
  doi          = {10.1007/S11623-013-0275-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13e,
  title        = {{BSI:} {\"{U}}berblickspapier zu Apple iOS},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {675--676},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0277-9},
  doi          = {10.1007/S11623-013-0277-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13f,
  title        = {Merkel: Acht-Punkte-Programm f{\"{u}}r einen europ{\"{a}}ischen
                  und internationalen Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {675},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0276-x},
  doi          = {10.1007/S11623-013-0276-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13g,
  title        = {PRISM, {TEMPORA} und die Folgen. Selbstdatenschutz tut Not!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {676--677},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0279-7},
  doi          = {10.1007/S11623-013-0279-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13h,
  title        = {BMWi: 10 Punkte f{\"{u}}r einen sicheren Umgang mit Unternehmensdaten
                  im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {676},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0278-8},
  doi          = {10.1007/S11623-013-0278-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13i,
  title        = {{SECUDIS:} Sicherheitskomponenten f{\"{u}}r Chipkarten und Ausweise
                  der Zukunft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {677--678},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0282-z},
  doi          = {10.1007/S11623-013-0282-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13j,
  title        = {Kooperationsvereinbarung zur Internetsicherheit zwischen {ENISA} und
                  europ{\"{a}}ischen Normungsgremien {CEN} und {CENLEC}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {677},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0280-1},
  doi          = {10.1007/S11623-013-0280-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13k,
  title        = {G{\&}D entwickelt {KAMS} f{\"{u}}r die zweite Generation
                  der deutschen Gesundheitskarte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {677},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0281-0},
  doi          = {10.1007/S11623-013-0281-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13l,
  title        = {Tactilon von Cassidian: Nutzermanagement im BOS-Digitalfunknetz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {678},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0283-y},
  doi          = {10.1007/S11623-013-0283-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13m,
  title        = {GDD-Arbeitskreis "Datenschutz International": 2. Bonner Erkl{\"{a}}rung
                  "Freihandel mit Datenschutz"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {678--679},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0284-x},
  doi          = {10.1007/S11623-013-0284-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13n,
  title        = {"ZUGFeRD Release Candidate": Einheitliches Datenformat f{\"{u}}r
                  elektronische Rechnungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {679--680},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0286-8},
  doi          = {10.1007/S11623-013-0286-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13o,
  title        = {Europ{\"{a}}isches Datenschutzg{\"{u}}tesiegel f{\"{u}}r
                  Whistle- Blowing-System der Business Keeper {AG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {679},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0285-9},
  doi          = {10.1007/S11623-013-0285-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13p,
  title        = {Verantwortungsbewusstsein beim Umgang mit Kundendaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {680--681},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0288-6},
  doi          = {10.1007/S11623-013-0288-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13q,
  title        = {IT-Sicherheit im Mittelstand: Leitfaden zu E-Mail-Verschl{\"{u}}sselung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {680},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0287-7},
  doi          = {10.1007/S11623-013-0287-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zz13r,
  title        = {Der Einsatz von "Sozialen Netzwerken" an Schulen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {10},
  pages        = {681},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0289-5},
  doi          = {10.1007/S11623-013-0289-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zz13r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics