Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud37.bht:"
@article{DBLP:journals/dud/Albrecht13, author = {Jan Philipp Albrecht}, title = {Starker EU-Datenschutz w{\"{a}}re Standortvorteil}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {655--657}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0270-3}, doi = {10.1007/S11623-013-0270-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Albrecht13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Babbidge13, author = {John Babbidge}, title = {Key Management - Fundamentals}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {497--501}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0206-y}, doi = {10.1007/S11623-013-0206-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Babbidge13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Baum13, author = {Gerhart Baum}, title = {Wacht auf, es geht um die Menschenw{\"{u}}rde}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {583--584}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0242-7}, doi = {10.1007/S11623-013-0242-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Baum13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BaumlerM13, author = {Helmut B{\"{a}}umler and Diano Marina}, title = {Tinnefeld, Marie-Theres; Buchner, Benedikt; Petri, Thomas: Einf{\"{u}}hrung in das Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {266}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0102-5}, doi = {10.1007/S11623-013-0102-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BaumlerM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Becker13, author = {Maximilian Becker}, title = {Sharehoster - gefangen zwischen Datenschutz und St{\"{o}}rerhaftung?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {207--214}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0080-7}, doi = {10.1007/S11623-013-0080-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Becker13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BelkeNZ13, author = {Marcus Belke and Karsten Neumann and Dominik Zier}, title = {Datenschutzpraxis in deutschen Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {577--582}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0241-8}, doi = {10.1007/S11623-013-0241-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BelkeNZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bengez13, author = {Rainhard Z. Bengez}, title = {Schl{\"{u}}sselkonzept der Suchmaschinen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {440--444}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0174-2}, doi = {10.1007/S11623-013-0174-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bengez13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bergt13, author = {Matthias Bergt}, title = {Rechtskonforme Auftragsdatenverarbeitung im Massengesch{\"{a}}ft}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {796--801}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0329-1}, doi = {10.1007/S11623-013-0329-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bergt13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bier13, author = {Christoph Bier}, title = {Das koreanische Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {457--460}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0178-y}, doi = {10.1007/S11623-013-0178-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bier13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Blessing13, author = {Werner Blessing}, title = {Me, on the fly}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {376--379}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0144-8}, doi = {10.1007/S11623-013-0144-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Blessing13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BoddenRRR13, author = {Eric Bodden and Siegfried Rasthofer and Philipp Richter and Alexander Ro{\ss}nagel}, title = {Schutzma{\ss}nahmen gegen datenschutz- unfreundliche Smartphone-Apps}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {720--725}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0300-1}, doi = {10.1007/S11623-013-0300-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BoddenRRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BoseskyHS13, author = {Pino Bosesky and Christian Hoffmann and S{\"{o}}nke E. Schulz}, title = {Datenhoheit im Cloud-Umfeld}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {95--100}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0025-1}, doi = {10.1007/S11623-013-0025-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BoseskyHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brandt13, author = {Jochen Brandt}, title = {Bausewein, Christoph: Legitimationswirkung von Einwilligung und Betriebsvereinbarung im Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {336}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0134-x}, doi = {10.1007/S11623-013-0134-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Brandt13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BrauckmannG13, author = {J{\"{u}}rgen Brauckmann and Ralf Gr{\"{o}}per}, title = {Konzept und Nutzen von Certificate Policy und Certification Practice Statement}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {491--496}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0205-z}, doi = {10.1007/S11623-013-0205-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BrauckmannG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Breitenstrom13, author = {Christian Breitenstrom}, title = {Sichere Konfiguration von Content Management Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {726--728}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0301-0}, doi = {10.1007/S11623-013-0301-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Breitenstrom13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner13, author = {Benedikt Buchner}, title = {Pers{\"{o}}nlichkeitsschutz in der Online-Welt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {753}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0319-3}, doi = {10.1007/S11623-013-0319-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner13a, author = {Benedikt Buchner}, title = {Verschl{\"{u}}sselte Daten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {804}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0331-7}, doi = {10.1007/S11623-013-0331-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchter13, author = {Martin Buchter}, title = {Der {GPEN} Internet Privacy Sweep 2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {690}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0294-8}, doi = {10.1007/S11623-013-0294-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bullingen13, author = {Franz B{\"{u}}llingen}, title = {Die Umsetzungsl{\"{u}}cke: Warum IT-Sicherheit im Mittelstand ein zentrales Thema bleibt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {173--176}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0056-7}, doi = {10.1007/S11623-013-0056-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bullingen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Busch13, author = {Christoph Busch}, title = {Was meinen wir mit Biometrie?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {386}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0147-5}, doi = {10.1007/S11623-013-0147-5}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Busch13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ByszioHMW13, author = {Frank Byszio and Detlef Houdeau and Gisela Meister and Klaus{-}Dieter Wolfenstetter}, title = {Elektronische Identifikation in Europa: die neue EU-Verordnung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {169--172}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0055-8}, doi = {10.1007/S11623-013-0055-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ByszioHMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Caspar13, author = {Johannes Caspar}, title = {Soziale Netzwerke - Endstation informationelle Selbstbestimmung?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {767--771}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0323-7}, doi = {10.1007/S11623-013-0323-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Caspar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Caumanns13, author = {J{\"{o}}rg Caumanns}, title = {Datenschutz und Datennutz bei elektronischen Patientenakten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {137--142}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0049-6}, doi = {10.1007/S11623-013-0049-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Caumanns13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Daubler13, author = {Wolfgang D{\"{a}}ubler}, title = {Pers{\"{o}}nlichkeitsschutz des Arbeitnehmers im Internet?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {759--766}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0322-8}, doi = {10.1007/S11623-013-0322-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Daubler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DeufelMDK13, author = {Bernhard Deufel and Carsten Mueller and Gavan Duffy and Tom Kevenaar}, title = {BioPACE}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {363--366}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0141-y}, doi = {10.1007/S11623-013-0141-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DeufelMDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dierks13, author = {Christian Dierks}, title = {Datenschutzaspekte der Pharmakogenomik}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {143--147}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0050-0}, doi = {10.1007/S11623-013-0050-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dierks13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dittmayer13, author = {Matthias Dittmayer}, title = {Pers{\"{o}}nlichkeitsrechtsverletzungen durch {\"{A}}u{\ss}erungen im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {780--786}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0326-4}, doi = {10.1007/S11623-013-0326-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dittmayer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dix13, author = {Alexander Dix}, title = {Funkzellenabfragen auf dem Pr{\"{u}}fstand}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {6}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0003-7}, doi = {10.1007/S11623-013-0003-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dix13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dix13a, author = {Alexander Dix}, title = {Pers{\"{o}}nlichkeits- und Datenschutz im Internet - Anforderungen und Grenzen einer Regulierung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {44--45}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0011-7}, doi = {10.1007/S11623-013-0011-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dix13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DolezelDU13, author = {Michal Dolezel and Martin Drahansk{\'{y}} and Jaroslav Urb{\'{a}}nek}, title = {Einfluss von Hauterkrankungen auf den biometrischen Erkennungsprozess}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {358--362}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0140-z}, doi = {10.1007/S11623-013-0140-Z}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DolezelDU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Drechsler13, author = {Carola Drechsler}, title = {Elektronischer Zugang zur Verwaltung nach dem EGovG}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {696--701}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0296-6}, doi = {10.1007/S11623-013-0296-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Drechsler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Eckhardt13, author = {Jens Eckhardt}, title = {Auftragsdatenverarbeitung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {585--591}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0243-6}, doi = {10.1007/S11623-013-0243-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Eckhardt13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtK13, author = {Jens Eckhardt and Rudi Kramer}, title = {{EU-DSGVO} - Diskussionspunkte aus der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {287--294}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0110-5}, doi = {10.1007/S11623-013-0110-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtKM13, author = {Jens Eckhardt and Rudi Kramer and Britta Alexandra Mester}, title = {Auswirkungen der geplanten {EU-DS-GVO} auf den deutschen Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {623--629}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0265-0}, doi = {10.1007/S11623-013-0265-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Eiermann13, author = {Helmut Eiermann}, title = {Work in Progress - Zur Zukunft des technischen Datenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {92--94}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0024-2}, doi = {10.1007/S11623-013-0024-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Eiermann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Engel-Flechsig13, author = {Stefan Engel{-}Flechsig}, title = {Elektronische Rechnungsstellung in der Europ{\"{a}}ischen Standardisierung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {25--29}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0007-3}, doi = {10.1007/S11623-013-0007-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Engel-Flechsig13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ExterD13, author = {Andreas Exter and Matthias Drodt}, title = {{CSI:} {DB} - Die {IT} Security-Awareness-Kampagne der Deutschen Bahn}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {279--282}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0108-z}, doi = {10.1007/S11623-013-0108-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ExterD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FibikovaM13, author = {Lenka Fib{\'{\i}}kov{\'{a}} and Roland M{\"{u}}ller}, title = {Entwicklung einer Informationssicherheitsstrategie im Rahmen von {ISO} 27002}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {7--13}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0004-6}, doi = {10.1007/S11623-013-0004-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FibikovaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox13, author = {Dirk Fox}, title = {Secure Hash Algorithm {SHA-3}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {104}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0027-z}, doi = {10.1007/S11623-013-0027-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox13a, author = {Dirk Fox}, title = {Awareness 3.0}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {269}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0104-3}, doi = {10.1007/S11623-013-0104-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox13b, author = {Dirk Fox}, title = {Social Engineering}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {318}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0115-0}, doi = {10.1007/S11623-013-0115-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox13c, author = {Dirk Fox}, title = {Vertrauen verspielt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {557}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0235-6}, doi = {10.1007/S11623-013-0235-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox13d, author = {Dirk Fox}, title = {{PRISM} und {TEMPORA}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {594}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0245-4}, doi = {10.1007/S11623-013-0245-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox13e, author = {Dirk Fox}, title = {Perfect Forward Secrecy {(PFS)}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {729}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0302-z}, doi = {10.1007/S11623-013-0302-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy13, author = {Walter Fumy}, title = {Die Zeiten {\"{a}}ndern sich ..}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0001-9}, doi = {10.1007/S11623-013-0001-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerlingG13, author = {Sebastian Gerling and Rainer W. Gerling}, title = {Wie realistisch ist ein "Recht auf Vergessenwerden"?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {445--446}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0175-1}, doi = {10.1007/S11623-013-0175-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerlingG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gimbut13, author = {Leonid Gimbut}, title = {Datensicherheit: Was leisten externe verschl{\"{u}}sselte Festplatten?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {526--529}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0212-0}, doi = {10.1007/S11623-013-0212-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gimbut13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Goetz13, author = {Christoph F.{-}J. Goetz}, title = {Gesundheitstelematik}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {125}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0045-x}, doi = {10.1007/S11623-013-0045-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Goetz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Goetz13a, author = {Christoph F.{-}J. Goetz}, title = {Zukunftsaufgabe Gesundheitstelematik}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {164--168}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0054-9}, doi = {10.1007/S11623-013-0054-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Goetz13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gotz13, author = {Christopher G{\"{o}}tz}, title = {Grenz{\"{u}}berschreitende Daten{\"{u}}bermittlung im Konzern}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {631--637}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0266-z}, doi = {10.1007/S11623-013-0266-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gotz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gramlich13, author = {Ludwig Gramlich}, title = {Hantschel, Ines: Softwarekauf und -weiterverkauf}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {613--614}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0260-5}, doi = {10.1007/S11623-013-0260-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gramlich13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber13, author = {Joachim Gruber}, title = {Lindner, Eric: Die datenschutzrechtliche Einwilligung nach {\textsection}{\textsection} 4 Abs 1, 4a {BDSG} - ein zukunftsf{\"{a}}higes Institut?, Verlag Dr. Kovac, Hamburg 2013, LVIII, 230 Seiten, 89, 80 EURO, {ISBN} 978-3-8300-7011-5}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {682}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0291-y}, doi = {10.1007/S11623-013-0291-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gruber13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hamdy13, author = {Safuat Hamdy}, title = {Sicherheitsherausforderungen von IPv6}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {567--572}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0239-2}, doi = {10.1007/S11623-013-0239-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hamdy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hartge13, author = {Dagmar Hartge}, title = {Open Data - Erg{\"{a}}nzung oder Einschr{\"{a}}nkung der Informationsfreiheit?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {562}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0237-4}, doi = {10.1007/S11623-013-0237-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hartge13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeinemannH13, author = {Manuel J. Heinemann and Daniela Heinemann}, title = {Postmortaler Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {242--245}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0085-2}, doi = {10.1007/S11623-013-0085-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeinemannH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Higginbottom13, author = {Karen Higginbottom}, title = {Advancing standardisation for every day life}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {49}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0013-5}, doi = {10.1007/S11623-013-0013-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Higginbottom13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hinz13, author = {Ren{\'{e}}e Hinz}, title = {Zur Problematik der Identifikation ausl{\"{a}}ndischer Teilnehmer im Vollzug des deutschen Emissionshandels}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {535--536}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0214-y}, doi = {10.1007/S11623-013-0214-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hinz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HofmannH13, author = {Christina Hofmann and Elisabeth H{\"{o}}dl}, title = {Open Source Biologie und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {227--234}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0083-4}, doi = {10.1007/S11623-013-0083-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HofmannH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HornungS13, author = {Gerrit Hornung and Stephan S{\"{a}}dtler}, title = {Eitel Sonnenschein oder Wolken am Horizont?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {148--153}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0051-z}, doi = {10.1007/S11623-013-0051-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HornungS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HorschHLSW13, author = {Moritz Horsch and Detlef H{\"{u}}hnlein and Anja Lehmann and Johannes Schm{\"{o}}lz and Tobias Wich}, title = {Authentisierung mit der Open eCard App}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {507--511}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0208-9}, doi = {10.1007/S11623-013-0208-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HorschHLSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hustinx13, author = {Peter Hustinx}, title = {T{\"{a}}tigkeitsvorausschau 2013 des {EDSB}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {206}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0079-0}, doi = {10.1007/S11623-013-0079-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hustinx13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JandtKW13, author = {Silke Jandt and Olga Kieselmann and Arno Wacker}, title = {Recht auf Vergessen im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {235--241}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0084-3}, doi = {10.1007/S11623-013-0084-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JandtKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jendrian13, author = {Kai Jendrian}, title = {30 Jahre nach 1983 - oder die Rettung der Privatsph{\"{a}}re im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {563--566}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0238-3}, doi = {10.1007/S11623-013-0238-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jendrian13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KalabisKW13, author = {Lukas Kalabis and Thomas Kunz and Ruben Wolf}, title = {Sichere Nutzung von Cloud-Speicherdiensten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {512--516}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0209-8}, doi = {10.1007/S11623-013-0209-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KalabisKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KallaS13, author = {Christian Kalla and Patrick Schuch}, title = {Sicherheit in der Fingerabdruck-Identifikation}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {352--357}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0139-5}, doi = {10.1007/S11623-013-0139-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KallaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KaltenbockS13, author = {Robert Kaltenb{\"{o}}ck and Sabine Schuster}, title = {Awareness f{\"{u}}r Informationssicherheit und Datenschutz in der Sparkassen-Finanzgruppe}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {283--286}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0109-y}, doi = {10.1007/S11623-013-0109-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KaltenbockS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KampR13, author = {Meike Kamp and Martin Rost}, title = {Kritik an der Einwilligung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {80--84}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0022-4}, doi = {10.1007/S11623-013-0022-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KampR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Karg13, author = {Moritz Karg}, title = {Der Blick zur{\"{u}}ck f{\"{u}}r den Schritt nach vorn}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {69}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0018-0}, doi = {10.1007/S11623-013-0018-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Karg13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Karg13a, author = {Moritz Karg}, title = {Die Renaissance des Verbotsprinzips im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {75--79}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0021-5}, doi = {10.1007/S11623-013-0021-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Karg13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Karg13b, author = {Moritz Karg}, title = {Unter der Lupe}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {685}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0292-x}, doi = {10.1007/S11623-013-0292-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Karg13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Karg13c, author = {Moritz Karg}, title = {Datenschutzrechtliche Anforderungen an die E-Akte}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {702--708}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0297-5}, doi = {10.1007/S11623-013-0297-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Karg13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KochME13, author = {Manuel Koch and Sven Marx and Arno Elmer}, title = {Informationelle Selbstbestimmung und Patientensouver{\"{a}}nit{\"{a}}t in einem vernetzten Gesundheitswesen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {131--136}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0048-7}, doi = {10.1007/S11623-013-0048-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KochME13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Konig13, author = {Tassilo{-}Rouven K{\"{o}}nig}, title = {Zur M{\"{o}}glichkeit einer sektoralen Datenschutzkontrolle nach dem Entwurf der EU-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {101--103}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0026-0}, doi = {10.1007/S11623-013-0026-0}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Konig13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kramer13, author = {Philipp Kramer}, title = {Verbot mit Erlaubnisvorbehalt zeitgem{\"{a}}{\ss}?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {380--382}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0145-7}, doi = {10.1007/S11623-013-0145-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kramer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kramer13a, author = {Rudi Kramer}, title = {Funktions{\"{u}}bertragung beim Steuerberater}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {658--661}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0271-2}, doi = {10.1007/S11623-013-0271-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kramer13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kranawetter13, author = {Michael Kranawetter}, title = {Identit{\"{a}}t in der Cloud und \emph{on premise}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {517--520}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0210-2}, doi = {10.1007/S11623-013-0210-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kranawetter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kranig13, author = {Thomas Kranig}, title = {Das Bayerische Landesamt f{\"{u}}r Datenschutzaufsicht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {274}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0106-1}, doi = {10.1007/S11623-013-0106-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kranig13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Krasemann13, author = {Henry Krasemann}, title = {{ULD:} Datenschutz-Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {529}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0234-7}, doi = {10.1007/S11623-013-0234-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Krasemann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhlingK13, author = {J{\"{u}}rgen K{\"{u}}hling and Manuel Klar}, title = {Datenschutz bei E-Health - Zeit f{\"{u}}r grundlegende Reformen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {791--795}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0328-2}, doi = {10.1007/S11623-013-0328-2}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KuhlingK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KunzNW13, author = {Thomas Kunz and Peter Niehues and Ulrich Waldmann}, title = {Technische Unterst{\"{u}}tzung von Audits bei Cloud-Betreibern}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {521--525}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0211-1}, doi = {10.1007/S11623-013-0211-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KunzNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kutscha13, author = {Martin Kutscha}, title = {Rogosch, Patricia Maria: Die Einwilligung im Datenschutzrecht, Nomos Verlag 2013, 208 S., {ISBN} 978-3-8487-0074-5, 49, - Euro}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {682}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0290-z}, doi = {10.1007/S11623-013-0290-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kutscha13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lenz13, author = {J{\"{o}}rg Lenz}, title = {Veranstaltungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {748--749}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0317-5}, doi = {10.1007/S11623-013-0317-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lenz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lepper13, author = {Ulrich Lepper}, title = {D{\"{u}}sseldorfer Kreis wird Gremium der Datenschutzkonferenz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {74}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0020-6}, doi = {10.1007/S11623-013-0020-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lepper13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LepperhoffPT13, author = {Niels Lepperhoff and Bj{\"{o}}rn Petersdorf and Sabine Thursch}, title = {Datenschutzverst{\"{o}}{\ss}e im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {301--306}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0112-3}, doi = {10.1007/S11623-013-0112-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LepperhoffPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Leutheusser-Schnarrenberger13, author = {Sabine Leutheusser{-}Schnarrenberger}, title = {Bedeutung und St{\"{a}}rkung der Menschenrechte in Europa}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {415--417}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0169-z}, doi = {10.1007/S11623-013-0169-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Leutheusser-Schnarrenberger13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lorenz13, author = {Bernd Lorenz}, title = {Sorgfaltspflichten im Umgang mit Passw{\"{o}}rtern}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {220--226}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0082-5}, doi = {10.1007/S11623-013-0082-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lorenz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Makulilo13, author = {Alex B. Makulilo}, title = {"One size fits all": Does Europe impose its data protection regime on Africa?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {447--451}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0176-0}, doi = {10.1007/S11623-013-0176-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Makulilo13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester13, author = {Britta Alexandra Mester}, title = {Internet - ohne das Recht auf Vergessen?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {201}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0077-2}, doi = {10.1007/S11623-013-0077-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester13a, author = {Britta Alexandra Mester}, title = {EU-Verordnung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {250}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0087-0}, doi = {10.1007/S11623-013-0087-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester13b, author = {Britta Alexandra Mester}, title = {Chance oder Risiko? Europ{\"{a}}ischer Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {617}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0262-3}, doi = {10.1007/S11623-013-0262-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MolletKW13, author = {Liliane Mollet and Jens Klopp and Thomas Walther}, title = {Cyberkriminalit{\"{a}}t: Bek{\"{a}}mpfung von Kinderpornografie}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {35--39}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0009-1}, doi = {10.1007/S11623-013-0009-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MolletKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Muller-QuadeAL13, author = {J{\"{o}}rn M{\"{u}}ller{-}Quade and Dirk Achenbach and Bernhard L{\"{o}}we}, title = {Das Kryptologikum}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {573--576}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0240-9}, doi = {10.1007/S11623-013-0240-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Muller-QuadeAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen13, author = {Alexander Nguyen}, title = {Subsidiarit{\"{a}}tsr{\"{u}}ge}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {662}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0272-1}, doi = {10.1007/S11623-013-0272-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nguyen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NguyenS13, author = {Kim Nguyen and Carsten Schwarz}, title = {Innovatives Key Management f{\"{u}}r die Qualifizierte Elektronische Signatur mit dem neuen Personalausweis}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {502--506}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0207-x}, doi = {10.1007/S11623-013-0207-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/NguyenS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/OpelKN13, author = {Alexander Opel and Barbara K{\"{o}}rffer and Alexander Nouak}, title = {Datenschutz bei der Erhebung biometrischer Testdaten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {347--351}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0138-6}, doi = {10.1007/S11623-013-0138-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/OpelKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri13, author = {Thomas Petri}, title = {Wachinger, Verena: Grenzen automatisierter Datenerfassung zu pr{\"{a}}ventiven Zwecken}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {335--336}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0132-z}, doi = {10.1007/S11623-013-0132-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri13a, author = {Thomas Petri}, title = {Smart Border oder Big Brother an EU-Au{\ss}engrenzen?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {423--427}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0171-5}, doi = {10.1007/S11623-013-0171-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri13b, author = {Thomas Petri}, title = {Gola, Peter; Schomerus, Rudolf: {BDSG} - Bundesdatenschutzgesetz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {481--482}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0199-6}, doi = {10.1007/S11623-013-0199-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PfeifferMB13, author = {Christian Pfeiffer and Thomas M{\"{o}}{\ss}le and Dirk Baier}, title = {Zensur versus Forschungsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {428--433}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0172-4}, doi = {10.1007/S11623-013-0172-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PfeifferMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Piontek13, author = {Daniel Piontek}, title = {Psychologiken im Umfeld der elektronischen Gesundheitskarte}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {160--163}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0053-x}, doi = {10.1007/S11623-013-0053-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Piontek13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PutzS13, author = {Stefan P{\"{u}}tz and Aleksandra Sowa}, title = {Privacy and Security Assessment}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {40--43}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0010-8}, doi = {10.1007/S11623-013-0010-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PutzS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Quiring-Kock13, author = {Gisela Quiring{-}Kock}, title = {Entwurf EU-Verordnung {\"{u}}ber elektronische Identifizierung und Vertrauensdienste}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {20--24}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0006-4}, doi = {10.1007/S11623-013-0006-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Quiring-Kock13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rathgeb13, author = {Christian Rathgeb}, title = {Towards enhancing the security and accuracy of iris recognition systems}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {367--370}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0142-x}, doi = {10.1007/S11623-013-0142-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rathgeb13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer13, author = {Helmut Reimer}, title = {Vom Primat der Anwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {177}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0057-6}, doi = {10.1007/S11623-013-0057-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer13a, author = {Helmut Reimer}, title = {22. {RSA} Conference, 25.02. - 01.03.2013 in San Francisco, {USA}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {333--335}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0130-1}, doi = {10.1007/S11623-013-0130-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerAS13, author = {Sebastian Reimer and J{\"{o}}rg Artmann and Karl A. Stroetmann}, title = {Rechtliche Aspekte der Nutzung von elektronischen Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {154--159}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0052-y}, doi = {10.1007/S11623-013-0052-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW13, author = {Helmut Reimer and Christoph Wegener}, title = {Key recovery und vertrauen?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {542}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0216-9}, doi = {10.1007/S11623-013-0216-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13, author = {Karl Rihaczek}, title = {Das Jesus-Argument}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {5}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0002-8}, doi = {10.1007/S11623-013-0002-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13a, author = {Karl Rihaczek}, title = {Patrimonium}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {73}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0019-z}, doi = {10.1007/S11623-013-0019-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13b, author = {Karl Rihaczek}, title = {Das falsche Herz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {129}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0046-9}, doi = {10.1007/S11623-013-0046-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13c, author = {Karl Rihaczek}, title = {In der Parentel}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {205}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0078-1}, doi = {10.1007/S11623-013-0078-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13d, author = {Karl Rihaczek}, title = {Sternzeit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {344}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0136-8}, doi = {10.1007/S11623-013-0136-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13e, author = {Karl Rihaczek}, title = {Privatheit parzelliert}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {413}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0167-1}, doi = {10.1007/S11623-013-0167-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13f, author = {Karl Rihaczek}, title = {Fr{\"{u}}hb{\"{u}}rgerliche Privatheit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {489}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0203-1}, doi = {10.1007/S11623-013-0203-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13g, author = {Karl Rihaczek}, title = {Datenschutz {\&} Computer}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {561}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0236-5}, doi = {10.1007/S11623-013-0236-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13h, author = {Karl Rihaczek}, title = {Zwischen den Ordnungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {689}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0293-9}, doi = {10.1007/S11623-013-0293-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek13i, author = {Karl Rihaczek}, title = {Das stille Lesen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {757}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0320-x}, doi = {10.1007/S11623-013-0320-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost13, author = {Martin Rost}, title = {Zur Soziologie des Datenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {85--91}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0023-3}, doi = {10.1007/S11623-013-0023-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost13a, author = {Martin Rost}, title = {Datenschutzmanagementsystem}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {295--300}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0111-4}, doi = {10.1007/S11623-013-0111-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schafer13, author = {Burkhard Schafer}, title = {Crowdsourcing and cloudsourcing {CCTV} surveillance}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {434--439}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0173-3}, doi = {10.1007/S11623-013-0173-3}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schafer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schimmer13, author = {Klaus Schimmer}, title = {Ein Poster ist zu wenig!}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {275--278}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0107-0}, doi = {10.1007/S11623-013-0107-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schimmer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnabel13, author = {Christoph Schnabel}, title = {Taeger, J{\"{u}}rgen (Hrsg.): Die Welt im Netz - Tagungsband Herbstakademie 2011}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {406}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0165-3}, doi = {10.1007/S11623-013-0165-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnabel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnabel13a, author = {Christoph Schnabel}, title = {M{\"{u}}ller, Lucien: Video{\"{u}}berwachung in {\"{o}}ffentlich zug{\"{a}}nglichen R{\"{a}}umen - insbesondere zur Verh{\"{u}}tung und Ahndung von Straftaten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {482}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0201-3}, doi = {10.1007/S11623-013-0201-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnabel13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnabel13b, author = {Christoph Schnabel}, title = {Gruske, Nils: Telekommunikations{\"{u}}berwachung und Pressefreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {614}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0261-4}, doi = {10.1007/S11623-013-0261-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnabel13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchnabelG13, author = {Christoph Schnabel and Joachim Gruber}, title = {B{\"{u}}cher}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {749--750}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0318-4}, doi = {10.1007/S11623-013-0318-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchnabelG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchreinermacherB13, author = {Bj{\"{o}}rn Schreinermacher and Benedikt Buchner}, title = {Qualitative Interviews online stellen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {537--541}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0215-x}, doi = {10.1007/S11623-013-0215-X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchreinermacherB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchroberM13, author = {Klaus{-}Werner Schr{\"{o}}ber and S{\"{o}}nke Maseberg}, title = {Aktuelle Probleme bei der Pr{\"{u}}fung qualifizierter elektronischer Signaturen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {313--317}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0114-1}, doi = {10.1007/S11623-013-0114-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchroberM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchroderM13, author = {Martin Schr{\"{o}}der and Frank Morgner}, title = {eID mit abgeleiteten Identit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {530--534}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0213-z}, doi = {10.1007/S11623-013-0213-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchroderM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchusslerZ13, author = {Lennart Sch{\"{u}}{\ss}ler and Oliver Z{\"{o}}ll}, title = {EU-Datenschutz-Grundverordnung und Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {639--643}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0267-y}, doi = {10.1007/S11623-013-0267-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchusslerZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seifert13, author = {Bernd Seifert}, title = {Neue Regeln f{\"{u}}r die Video{\"{u}}berwachung?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {650--654}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0269-9}, doi = {10.1007/S11623-013-0269-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Seifert13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Selzer13, author = {Annika Selzer}, title = {Die Kontrollpflicht nach {\textsection} 11 Abs. 2 Satz 4 {BDSG} im Zeitalter des Cloud Computing}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {215--219}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0081-6}, doi = {10.1007/S11623-013-0081-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Selzer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stollhof13, author = {Sabine Stollhof}, title = {Das E-Government-Gesetz des Bundes}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {691--695}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0295-7}, doi = {10.1007/S11623-013-0295-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stollhof13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SuptitzUE13, author = {Thomas S{\"{u}}ptitz and Christine Utz and Torsten Eymann}, title = {State-of-the-Art: Ermittlungen in der Cloud}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {307--312}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0113-2}, doi = {10.1007/S11623-013-0113-2}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SuptitzUE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SwierczynskiLP13, author = {Pawel Swierczynski and Gregor Leander and Christof Paar}, title = {Keccak und der {SHA-2}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {712--719}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0299-3}, doi = {10.1007/S11623-013-0299-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SwierczynskiLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThielF13, author = {Christoph Thiel and Arno Fiedler}, title = {Der grenzenlose digitale Binnenmarkt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {14--19}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0005-5}, doi = {10.1007/S11623-013-0005-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ThielF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Thomsen13, author = {Sven Thomsen}, title = {OpenData: Das Ende klassischer IT-Infrastrukturen?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {709--711}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0298-4}, doi = {10.1007/S11623-013-0298-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Thomsen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld13, author = {Marie{-}Theres Tinnefeld}, title = {Europ{\"{a}}ische Integration vs. Nationalismus}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {418--422}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0170-6}, doi = {10.1007/S11623-013-0170-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld13a, author = {Marie{-}Theres Tinnefeld}, title = {Schutz europ{\"{a}}ischer Grundwerte und Menschenrechte}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {461--462}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0179-x}, doi = {10.1007/S11623-013-0179-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld13b, author = {Marie{-}Theres Tinnefeld}, title = {Ricker, Reinhart; Weberling, Johannes: Handbuch des Presserechts}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {612--613}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0259-y}, doi = {10.1007/S11623-013-0259-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld13c, author = {Marie{-}Theres Tinnefeld}, title = {Datenschutz 2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {772--774}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0324-6}, doi = {10.1007/S11623-013-0324-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB13, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Demokratie und Menschenrechte - ein Thema in der globalen Welt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {409}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0166-2}, doi = {10.1007/S11623-013-0166-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke-Caprarese13, author = {Sven Venzke{-}Caprarese}, title = {Social Media Monitoring}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {775--779}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0325-5}, doi = {10.1007/S11623-013-0325-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Venzke-Caprarese13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VoskampK13, author = {Friederike Voskamp and Dennis{-}Kenji Kipker}, title = {Virtueller Pranger Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {787--790}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0327-3}, doi = {10.1007/S11623-013-0327-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VoskampK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VoskampKY13, author = {Friederike Voskamp and Dennis{-}Kenji Kipker and Richard Yamato}, title = {Grenz{\"{u}}berschreitende Datenschutzregulierung im Pazifik-Raum}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {452--456}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0177-z}, doi = {10.1007/S11623-013-0177-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VoskampKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wachter13, author = {Michael W{\"{a}}chter}, title = {Kazemi, Leopold: Datenschutzrecht in der anwaltlichen Beratung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {335}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0133-y}, doi = {10.1007/S11623-013-0133-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wachter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weber13, author = {Stefan G. Weber}, title = {Biometrische IT-Sicherheit - eine Frage des Fingerspitzengef{\"{u}}hls?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {371--375}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0143-9}, doi = {10.1007/S11623-013-0143-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weber13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener13, author = {Christoph Wegener}, title = {Schl{\"{u}}sselfragen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {485}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0202-2}, doi = {10.1007/S11623-013-0202-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert13, author = {Thilo Weichert}, title = {Das Gesch{\"{a}}ft mit den Verordnungsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {130}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0047-8}, doi = {10.1007/S11623-013-0047-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert13a, author = {Thilo Weichert}, title = {Wider das Verbot mit Erlaubnisvorbehalt im Datenschutz?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {246--249}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0086-1}, doi = {10.1007/S11623-013-0086-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wieczorek13, author = {Mirko Andreas Wieczorek}, title = {Der r{\"{a}}umliche Anwendungsbereich der EU-Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {644--649}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0268-x}, doi = {10.1007/S11623-013-0268-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wieczorek13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wischhofer13, author = {Cord Wischh{\"{o}}fer}, title = {Koordinierung der IT-Sicherheitsnormung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {30--34}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0008-2}, doi = {10.1007/S11623-013-0008-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wischhofer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13, title = {Entschlie{\ss}ung der 84. Konferenz vom 7./8. November 2012 in Frankfurt (Oder)}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {46--48}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0012-6}, doi = {10.1007/S11623-013-0012-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13a, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {50--59}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0014-4}, doi = {10.1007/S11623-013-0014-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13aa, title = {{GI:} Datenschutzfeindliche soziale Netzwerke besser meiden}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {193}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0066-5}, doi = {10.1007/S11623-013-0066-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13ab, title = {Schaar zum Besch{\"{a}}ftigtendatenschutzgesetz: "Kein gro{\ss}er Wurf"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {191}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0063-8}, doi = {10.1007/S11623-013-0063-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13ac, title = {Europ{\"{a}}ische Datenschutzreform: BfDI begr{\"{u}}{\ss}t {\"{A}}nderungsvorschl{\"{a}}ge aus dem Europ{\"{a}}ischen Parlament}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {191--192}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0064-7}, doi = {10.1007/S11623-013-0064-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13ad, title = {LfD Sachsen: Zur aufsichtsbeh{\"{o}}rdlichen T{\"{a}}tigkeit gegen{\"{u}}ber Unternehmen der Unister-Unternehmensgruppe}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {192}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0065-6}, doi = {10.1007/S11623-013-0065-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13b, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {60--64}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0015-3}, doi = {10.1007/S11623-013-0015-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13c, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {65--66}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0016-2}, doi = {10.1007/S11623-013-0016-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13d, title = {Veranstaltungskalender 1 {\(\vert\)} 2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {67}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0017-1}, doi = {10.1007/S11623-013-0017-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13e, title = {{LAG} K{\"{o}}ln: Fristlose K{\"{u}}ndigung wegen Whistleblowings}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {105--106}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0028-y}, doi = {10.1007/S11623-013-0028-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13f, title = {{OLG} Hamm: Einwilligung Minderj{\"{a}}hriger in eine Datenverarbeitung zu Werbezwecken}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {106--109}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0029-x}, doi = {10.1007/S11623-013-0029-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13g, title = {{LAG} Rheinland-Pfalz: Mitbestimmungsrecht des Betriebsrats bei Einf{\"{u}}hrung einer Video{\"{u}}berwachung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {110--111}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0030-4}, doi = {10.1007/S11623-013-0030-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13h, title = {BfDI: Leitfaden f{\"{u}}r die wissenschaftliche Evaluation von Sicherheitsgesetzen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {112}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0031-3}, doi = {10.1007/S11623-013-0031-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13i, title = {Eckpunktepapier der Bundesregierung zu "Trusted Computing" und "Secure Boot"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {112--114}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0032-2}, doi = {10.1007/S11623-013-0032-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13j, title = {25. Konferenz der Informationsfreiheitsbeauftragten, Mainz, 28.11.2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {114--115}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0034-0}, doi = {10.1007/S11623-013-0034-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13k, title = {ENISA-Bericht: Technische Aspekte des "Rechts, vergessen zu werden"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {114}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0033-1}, doi = {10.1007/S11623-013-0033-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13l, title = {4. Deutscher IT-Sicherheitspreis 2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {115--116}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0035-z}, doi = {10.1007/S11623-013-0035-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13m, title = {{BSI} und if(is) stellen App f{\"{u}}r IT-Sicherheit zur Verf{\"{u}}gung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {116}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0036-y}, doi = {10.1007/S11623-013-0036-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13n, title = {TeleTrusT - Bundesverband IT-Sicherheit e.V.: Stabile Entwicklung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {116}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0038-9}, doi = {10.1007/S11623-013-0038-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13o, title = {certBox.org - Der Zertifikatsserver in der Cloud}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {116}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0037-x}, doi = {10.1007/S11623-013-0037-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13p, title = {Kaspersky Lab: IT-Sicherheitsprognosen f{\"{u}}r 2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {117--118}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0041-1}, doi = {10.1007/S11623-013-0041-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13q, title = {Vorstandswechsel bei der {GDD}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {117}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0039-8}, doi = {10.1007/S11623-013-0039-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13r, title = {Report des Information Security Forums: "You Could Be Next"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {117}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0040-2}, doi = {10.1007/S11623-013-0040-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13s, title = {Karl Rihaczek}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {118--119}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0042-0}, doi = {10.1007/S11623-013-0042-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13t, title = {Christoph Schnabel}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {119}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0043-z}, doi = {10.1007/S11623-013-0043-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13u, title = {Ludwig Gramlich}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {2}, pages = {119--120}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0044-y}, doi = {10.1007/S11623-013-0044-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13v, title = {{OLG} Brandenburg: Weitergabe gesch{\"{a}}ftlicher Daten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {178--181}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0058-5}, doi = {10.1007/S11623-013-0058-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13w, title = {{LG} N{\"{u}}rnberg-F{\"{u}}rth: Unterlassungsanspruch gegen den Betreiber eines Arztbewertungsportals}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {181--185}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0059-4}, doi = {10.1007/S11623-013-0059-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13x, title = {ArbG Frankfurt: Anspruch einer ehemaligen Arbeitnehmerin auf Unkenntlichmachung von Bildfotographien und Namen im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {185--189}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0060-y}, doi = {10.1007/S11623-013-0060-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13y, title = {{ENISA:} Bericht {\"{u}}ber Internet-Sicherheitsma{\ss}nahmen f{\"{u}}r Smart Grids}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {190--191}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0062-9}, doi = {10.1007/S11623-013-0062-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X13z, title = {Cyber-Sicherheit: Eckpunkte zu m{\"{o}}glichen gesetzlichen Regelungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {190}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0061-x}, doi = {10.1007/S11623-013-0061-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X13z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13, title = {ThLfDI: Informationsfreiheitsgesetz - Wozu ?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {193--194}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0067-4}, doi = {10.1007/S11623-013-0067-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13a, title = {Projekt "SeManTiK": Neue Chip-Integrations-Techniken f{\"{u}}r kontaktlose Identit{\"{a}}tsdokumente}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {194}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0068-3}, doi = {10.1007/S11623-013-0068-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13b, title = {sign-me der Bundesdruckerei nach Signaturgesetz gepr{\"{u}}ft und best{\"{a}}tigt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {195}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0070-9}, doi = {10.1007/S11623-013-0070-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13c, title = {Neues Release von Sign Live! {CC} unterst{\"{u}}tzt moderne Signaturkarten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {195}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0069-2}, doi = {10.1007/S11623-013-0069-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13d, title = {Studie des Fraunhofer {AISEC:} Managementsysteme f{\"{u}}r Informationssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {195}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0071-8}, doi = {10.1007/S11623-013-0071-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13e, title = {T{\"{U}}V S{\"{U}}D-Studie zur Bedeutung von Datenschutz im Mittelstand}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {196}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0072-7}, doi = {10.1007/S11623-013-0072-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13f, title = {"Ersetzendes Scannen": TeleTrusTInformationstag zur BSI-Richtlinie am 19.04.2013 in Berlin}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {196}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0073-6}, doi = {10.1007/S11623-013-0073-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13g, title = {Thomas Petri}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {197--198}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0075-4}, doi = {10.1007/S11623-013-0075-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13h, title = {D{\(\cdot\)}A{\(\cdot\)}CH Security 2013, Call for Papers}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {197}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0074-5}, doi = {10.1007/S11623-013-0074-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XX13i, title = {Christoph Schnabel}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {3}, pages = {198}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0076-3}, doi = {10.1007/S11623-013-0076-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XX13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13, title = {{LAG} Hamm: Verunglimpfung des Arbeitgebers auf Facebook}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {251--255}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0088-z}, doi = {10.1007/S11623-013-0088-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13a, title = {ArbG Duisburg: Beleidigung unter Arbeitskollegen auf Facebook}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {255--258}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0089-y}, doi = {10.1007/S11623-013-0089-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13b, title = {ArbG Bochum: Unterlassungsanspruch gegen ehrverletzende Behauptungen auf Facebook}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {258--259}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0103-4}, doi = {10.1007/S11623-013-0103-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13c, title = {Stiftung Datenschutz gegr{\"{u}}ndet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {260--261}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0091-4}, doi = {10.1007/S11623-013-0091-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13d, title = {Der Besch{\"{a}}ftigtendatenschutz in der Gesetzgebung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {260}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0090-5}, doi = {10.1007/S11623-013-0090-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13e, title = {BayLfD: 25. T{\"{a}}tigkeitsbericht 2011/2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {261--262}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0092-3}, doi = {10.1007/S11623-013-0092-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13f, title = {Entschlie{\ss}ung der Konferenz der Datenschutzbeauftragten des Bundes und der L{\"{a}}nder vom 25. Januar 2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {262--263}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0094-1}, doi = {10.1007/S11623-013-0094-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13g, title = {Neues IT-Sicherheitsexpertenzertifikat "TeleTrusT Engineer for System Security" {(T.E.S.S.)}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {262}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0093-2}, doi = {10.1007/S11623-013-0093-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13h, title = {{BSI:} {\"{u}}berblickspapier zu IT-Consumerisation und {BYOD}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {263--264}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0096-z}, doi = {10.1007/S11623-013-0096-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13i, title = {Facebook Gesichtserkennung - Verwaltungsverfahren eingestellt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {263}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0095-0}, doi = {10.1007/S11623-013-0095-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13j, title = {Andreas K{\"{o}}nen neuer Vizepr{\"{a}}sident des {BSI}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {264}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0097-y}, doi = {10.1007/S11623-013-0097-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13k, title = {Internet-Kennzahlen-System {(IKS):} {\"{O}}ffentliche Online-Plattform offiziell gestartet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {264--265}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0100-7}, doi = {10.1007/S11623-013-0100-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13l, title = {FP-Tochterunternehmen gibt Zusammenarbeit mit Identdienstleister {ID} 8 bekannt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {264}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0099-9}, doi = {10.1007/S11623-013-0099-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13m, title = {EU-Pilotprojekt gegen Botnetze}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {264}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0098-x}, doi = {10.1007/S11623-013-0098-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/XXX13n, title = {Sicherheit beim Online-Banking: B{\"{u}}rger zwischen Angst und Sorglosigkeit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {4}, pages = {265}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0101-6}, doi = {10.1007/S11623-013-0101-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/XXX13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13, title = {BVerfG: Antiterrordatei}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {730--742}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0303-y}, doi = {10.1007/S11623-013-0303-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13a, title = {{GI} zur Sp{\"{a}}haffaire: Informatiker kl{\"{a}}ren auf}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {743--744}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0305-9}, doi = {10.1007/S11623-013-0305-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13b, title = {Entschlie{\ss}ung der Konferenz der Datenschutzbeauftragten des Bundes und der L{\"{a}}nder vom 05. September 2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {743}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0304-x}, doi = {10.1007/S11623-013-0304-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13c, title = {Daten{\"{u}}bermittlung in Drittstaaten erfordert Pr{\"{u}}fung in zwei Stufen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {744--745}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0308-6}, doi = {10.1007/S11623-013-0308-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13d, title = {Deutsche IT-Sicherheitswirtschaft gewinnt an Bedeutung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {744}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0306-8}, doi = {10.1007/S11623-013-0306-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13e, title = {Informationsfreiheitsbeauftragte weltweit fordern St{\"{a}}rkung der Transparenz auf nationaler und internationaler Ebene}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {744}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0307-7}, doi = {10.1007/S11623-013-0307-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13f, title = {World Quality Report: Rund ein Viertel der IT-Budgets flie{\ss}t in Qualit{\"{a}}tssicherung und Software-Testing}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {745--746}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0311-y}, doi = {10.1007/S11623-013-0311-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13g, title = {Hochsicherheitshandy der Telekom erh{\"{a}}lt BSI-Zulassung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {745}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0309-5}, doi = {10.1007/S11623-013-0309-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13h, title = {Consumerization of IT, Studie von techconsult: Arbeitnehmer wollen Takt in der Unternehmens {IT} mitbestimmen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {745}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0310-z}, doi = {10.1007/S11623-013-0310-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13i, title = {Fraunhofer {SIT} und House of {IT} starten Forschungsprojekt {CIRECS}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {746--747}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0313-9}, doi = {10.1007/S11623-013-0313-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13j, title = {50 {\%} der schutzw{\"{u}}rdigen Internetkommunikation nutzt unsichere Verschl{\"{u}}sselungsalgorithmen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {746}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0312-x}, doi = {10.1007/S11623-013-0312-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13k, title = {Neue HSM-Serie von Utimaco: CryptoServer CSe - doppelte Leistung auf h{\"{o}}chstem Sicherheitsniveau}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {747}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0315-7}, doi = {10.1007/S11623-013-0315-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13l, title = {Trend Micro ver{\"{o}}ffentlicht juristischen IT-Leitfaden f{\"{u}}r Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {747--748}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0316-6}, doi = {10.1007/S11623-013-0316-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xa13m, title = {Informationssicherheit im Smart Grid}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {747}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0314-8}, doi = {10.1007/S11623-013-0314-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xa13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13, title = {Datenschutzappell an die Akteure der 18. Legislaturperiode}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {758}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0321-9}, doi = {10.1007/S11623-013-0321-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13a, title = {Entschlie{\ss}ungen der 86. Konferenz vom 01. und 02. Oktober 2013 in Bremen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {802--803}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0330-8}, doi = {10.1007/S11623-013-0330-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13b, title = {BVerfG: Datenschutz im privaten Versicherungsrecht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {805--808}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0332-6}, doi = {10.1007/S11623-013-0332-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13c, title = {{OLG} Hamburg: Wettbewerbswidrigkeit aufgrund fehlender Datenschutzhinweise}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {808--810}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0333-5}, doi = {10.1007/S11623-013-0333-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13d, title = {{LG} Frankfurt: Unzul{\"{a}}ssigkeit von App-Store-AGB}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {810--812}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0334-4}, doi = {10.1007/S11623-013-0334-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13e, title = {{LG} M{\"{o}}nchengladbach: Keine Haftung f{\"{u}}r potentiell ehrverletzende Suchergebnisse bei Google}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {812--814}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0335-3}, doi = {10.1007/S11623-013-0335-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13f, title = {Jan Philipp Albrecht zu den Ergebnissen der {LIBE} Ausschusssitzung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {815--816}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0337-1}, doi = {10.1007/S11623-013-0337-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13g, title = {BfDI Peter Schaar: Die Europ{\"{a}}ische Datenschutz reform muss z{\"{u}}gig abgeschlossen werden}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {815}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0336-2}, doi = {10.1007/S11623-013-0336-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13h, title = {{BVDW:} Kritik am Votum des LIBE-Ausschusses zur neuen {EU} Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {816}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0339-z}, doi = {10.1007/S11623-013-0339-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13i, title = {Forderungspapier des BfDI und des Vorstands des Verbraucherzentrale Bundesverband (vzbv) an die neue Bundesregierung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {816}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0338-0}, doi = {10.1007/S11623-013-0338-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13j, title = {Ausschreibung des 5. Deutschen IT-Sicherheitspreises der Horst G{\"{o}}rtz-Stiftung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {816--817}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0340-6}, doi = {10.1007/S11623-013-0340-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13k, title = {{BSI} ver{\"{o}}ffentlicht Mindeststandard f{\"{u}}r verschl{\"{u}}sselte Internetverbindungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {817}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0341-5}, doi = {10.1007/S11623-013-0341-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13l, title = {BSI-Studie: Notfallmanagement mit der Cloud f{\"{u}}r {KMU}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {817}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0342-4}, doi = {10.1007/S11623-013-0342-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13m, title = {G{\&}D liefert Common Access Cards an {DMDC} des US-Verteidigungsministeriums}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {818}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0344-2}, doi = {10.1007/S11623-013-0344-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13n, title = {{TABULA} {RASA:} EU-gef{\"{o}}rdertes Projekt schlie{\ss}t Sicherheitsl{\"{u}}cken bei biometrischen Anwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {818--819}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0345-1}, doi = {10.1007/S11623-013-0345-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13o, title = {IT-Sicherheitswirtschaft fordert nationale ,Security-Roadmap'}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {818}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0343-3}, doi = {10.1007/S11623-013-0343-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13p, title = {Fraunhofer {SIT:} Forschungsroadmap zum Schutz von Privatsph{\"{a}}re und Vertraulichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {819}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0348-y}, doi = {10.1007/S11623-013-0348-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13q, title = {Partnerschaft: Bundesverband IT-Sicherheit e.V. (TeleTrusT) und Bund Deutscher Kriminalbeamter e.V. {(BDK)}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {819}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0346-0}, doi = {10.1007/S11623-013-0346-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13r, title = {Hohes Risiko bei Verlust von mobilen Ger{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {819--820}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0349-x}, doi = {10.1007/S11623-013-0349-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13s, title = {App-Security-Check f{\"{u}}r iOS, Android {\&} Co}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {819}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0347-z}, doi = {10.1007/S11623-013-0347-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13t, title = {Veranstaltungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {820--822}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0350-4}, doi = {10.1007/S11623-013-0350-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Xb13u, title = {B{\"{u}}cher}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {12}, pages = {822}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0351-3}, doi = {10.1007/S11623-013-0351-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Xb13u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13, title = {Big Data}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {273}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0105-2}, doi = {10.1007/S11623-013-0105-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13a, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {319--327}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0116-z}, doi = {10.1007/S11623-013-0116-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13b, title = {Neue Forschungsprojekte zu IT-Sicherheit in eingebetteten Systemen gestartet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {328--329}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0117-y}, doi = {10.1007/S11623-013-0117-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13c, title = {{BMI:} Gesetzentwurf zur Verbesserung der IT-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {328}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0118-x}, doi = {10.1007/S11623-013-0118-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13d, title = {13. Deutscher IT-Sicherheitskongress: Programm ver{\"{o}}ffentlicht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {329}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0121-2}, doi = {10.1007/S11623-013-0121-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13e, title = {Datenschutz-G{\"{u}}tesiegel f{\"{u}}r High Security-Festplatte}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {329--330}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0119-9}, doi = {10.1007/S11623-013-0119-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13g, title = {Kooperation f{\"{u}}r gesch{\"{u}}tzte Sicherheitsanwendungen auf Smartphones und Tablet-PCs}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {330}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0123-0}, doi = {10.1007/S11623-013-0123-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13h, title = {Sicherheitskarte mit One-Time Password und LED-Display}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {330}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0122-1}, doi = {10.1007/S11623-013-0122-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13i, title = {Verbesserte Sicherheit f{\"{u}}r Android-Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {331}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0126-x}, doi = {10.1007/S11623-013-0126-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13j, title = {{GI:} EU-Datenschutzverordnung sollte innerbetriebliche Datenschutzkontrolle nicht aufweichen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {331--332}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0124-z}, doi = {10.1007/S11623-013-0124-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13k, title = {Elektronisches Rechnungsformat "ZUGFeRD" erleichtert den Rechnungsaustausch}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {331}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0125-y}, doi = {10.1007/S11623-013-0125-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13l, title = {Video-Beitr{\"{a}}ge zu allt{\"{a}}glichen IT-Sicherheitsrisiken}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {332}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0129-7}, doi = {10.1007/S11623-013-0129-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13m, title = {E-Postbrief bietet Ende-zu-Ende- Verschl{\"{u}}sselung f{\"{u}}r Berufsgeheimnistr{\"{a}}ger}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {332--333}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0127-9}, doi = {10.1007/S11623-013-0127-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13n, title = {Information Security Forum ver{\"{o}}ffentlicht Threat Horizon 2015}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {332}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0128-8}, doi = {10.1007/S11623-013-0128-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Y13o, title = {Sealed Cloud schlie{\ss}t IT-Sicherheitsl{\"{u}}cke "Mensch"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {5}, pages = {333}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0131-0}, doi = {10.1007/S11623-013-0131-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Y13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13, title = {Biometrie}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {341}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0135-9}, doi = {10.1007/S11623-013-0135-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13a, title = {Datenschutz in Europa st{\"{a}}rken}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {345}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0137-7}, doi = {10.1007/S11623-013-0137-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13b, title = {Entschlie{\ss}ung der 85. Konferenz vom 13. und 14. M{\"{a}}rz 2013 in Bremerhaven}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {383--385}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0146-6}, doi = {10.1007/S11623-013-0146-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13c, title = {EuGH: Verarbeitung von Verkehrsdaten durch den Zessionar einer Entgeltforderung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {387--389}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0148-4}, doi = {10.1007/S11623-013-0148-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13d, title = {{OLG} Hamm: Auskunftsanspruch des durch heterologe Insemination gezeugten Kindes gegen{\"{u}}ber dem behandelnden Arzt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {389--392}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0149-3}, doi = {10.1007/S11623-013-0149-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13e, title = {{LAG} Hessen: Auskunftsanspr{\"{u}}che gegen den Arbeitgeber}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {392--396}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0150-x}, doi = {10.1007/S11623-013-0150-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13f, title = {{VG} K{\"{o}}ln: Einsicht in die Hausrechtsrichtlinien von Justizgeb{\"{a}}uden}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {396--398}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0151-9}, doi = {10.1007/S11623-013-0151-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13g, title = {ULD-T{\"{a}}tigkeitsbericht 2013: Datenschutz als globale Herausforderung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {399--400}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0152-8}, doi = {10.1007/S11623-013-0152-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13h, title = {LfDI Bremen: 35. Jahresbericht Datenschutz 2012, 7. Jahresbericht Informationsfreiheit 2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {400--401}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0153-7}, doi = {10.1007/S11623-013-0153-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13i, title = {LfD Hessen 41. T{\"{a}}tigkeitsbericht 2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {401--402}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0154-6}, doi = {10.1007/S11623-013-0154-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13j, title = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht: T{\"{a}}tigkeitsbericht 2011/2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {402}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0155-5}, doi = {10.1007/S11623-013-0155-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13k, title = {{BSI:} {TR} "Ersetzendes Scannen"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {403}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0158-2}, doi = {10.1007/S11623-013-0158-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13l, title = {Das {DGN} ist zertifizierter Anbieter von KV-SafeNet mit Netzkopplung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {403--404}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0156-4}, doi = {10.1007/S11623-013-0156-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13m, title = {TeleTrusT-Innovationspreis f{\"{u}}r IT-Sicherheitsl{\"{o}}sungen: Bewerbungen bis 31.08.2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {403}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0159-1}, doi = {10.1007/S11623-013-0159-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13n, title = {gematik erteilt Zuschlag f{\"{u}}r neue Kartengeneration}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {403}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0157-3}, doi = {10.1007/S11623-013-0157-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13o, title = {De-Mail in der Bundesverwaltung: Empfehlungen des BfDI}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {404}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0162-6}, doi = {10.1007/S11623-013-0162-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13p, title = {HmbBfDI: Bu{\ss}geld gegen Google festgesetzt}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {404--405}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0160-8}, doi = {10.1007/S11623-013-0160-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13q, title = {DsiN-Cloud-Scout: Herstellerunabh{\"{a}}ngiger und produktneutraler Online-Check f{\"{u}}r Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {404}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0161-7}, doi = {10.1007/S11623-013-0161-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13r, title = {Sicherer Austausch von E-Mail-Dateianh{\"{a}}ngen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {405--406}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0163-5}, doi = {10.1007/S11623-013-0163-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13s, title = {F-Secure-Studie: 87 Prozent der PC-Systeme in Unternehmen mit L{\"{u}}cken bei sicherheitskritischen Software-Updates}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {405}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0164-4}, doi = {10.1007/S11623-013-0164-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13t, title = {24. T{\"{a}}tigkeitsbericht zum Datenschutz f{\"{u}}r die Jahre 2011 und 2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {414}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0168-0}, doi = {10.1007/S11623-013-0168-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13u, title = {{OVG} Schleswig-Holstein: Klarnamenpflicht bei Facebook}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {463--465}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0180-4}, doi = {10.1007/S11623-013-0180-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13v, title = {{VGH} M{\"{u}}nchen: Automatisierte Kennzeichenerfassung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {465--470}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0181-3}, doi = {10.1007/S11623-013-0181-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13w, title = {{VG} Oldenburg: Video{\"{u}}berwachung von Treppenaufg{\"{a}}ngen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {471--474}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0182-2}, doi = {10.1007/S11623-013-0182-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Z13x, title = {{OVG} Schleswig-Holstein: F{\"{u}}r Facebook gilt kein deutsches Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {475--476}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0183-1}, doi = {10.1007/S11623-013-0183-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Z13x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13, title = {LfDI {NRW:} 21. T{\"{a}}tigkeitsbericht 2011/2012}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {475}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0184-0}, doi = {10.1007/S11623-013-0184-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13a, title = {LfD Baden-W{\"{u}}rttemberg: Gesetzgeber zur Regulierung sozialer Netzwerke gefordert}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {475}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0185-z}, doi = {10.1007/S11623-013-0185-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13b, title = {secunet {AG:} Internationaler Interoperabilit{\"{a}}tstests f{\"{u}}r zuk{\"{u}}nftige eP{\"{a}}sse}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {476--477}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0186-y}, doi = {10.1007/S11623-013-0186-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13c, title = {{BMI:} Zustimmung zur neugeregelten Bestandsdatenauskunft}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {476}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0187-x}, doi = {10.1007/S11623-013-0187-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13d, title = {{KOBIL:} iDtoken f{\"{u}}r den nPA in allen Postbank Finanzcentern erh{\"{a}}ltlich}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {477}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0189-8}, doi = {10.1007/S11623-013-0189-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13e, title = {IT-Sicherheit als Mittelstandsthema: Fallbeispiel "Hotellerie"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {477}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0190-2}, doi = {10.1007/S11623-013-0190-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13f, title = {LfDI {RLP:} Datenschutz im Hotelgewerbe}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {477}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0191-1}, doi = {10.1007/S11623-013-0191-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13g, title = {nPA-BOX: Bayerische Konzeptstudie zum Datensafe im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {477--478}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0188-9}, doi = {10.1007/S11623-013-0188-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13h, title = {Kaspersky-Analyse: Spam-R{\"{u}}ckgang in {I/2013}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {478}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0193-z}, doi = {10.1007/S11623-013-0193-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13i, title = {Fraunhofer {AISEC:} Tech Report zur Effektivit{\"{a}}t von Antiviren-Apps}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {478--479}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0192-0}, doi = {10.1007/S11623-013-0192-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13j, title = {Leitfaden mit Analysen und Erkl{\"{a}}rungen der Angriffsarten bei Websites}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {479}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0196-9}, doi = {10.1007/S11623-013-0196-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13k, title = {Android-Bankraub: Schad-App hat es auf mTANs abgesehen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {479}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0195-x}, doi = {10.1007/S11623-013-0195-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13l, title = {{ESET} Secure Authentication: Sicherer Zugang zu {VPN} und Outlook Web App}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {479--480}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0194-y}, doi = {10.1007/S11623-013-0194-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13m, title = {E-Mail bleibt Sicherheitsschwachstelle in den Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {480}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0197-8}, doi = {10.1007/S11623-013-0197-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13n, title = {nPA jetzt auch f{\"{u}}r {ELSTER} verwendbar}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {480}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0198-7}, doi = {10.1007/S11623-013-0198-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zx13o, title = {BvD-Datenschutztage 2013 am 24. und 25. April 2013 in Berlin}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {7}, pages = {481}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0200-4}, doi = {10.1007/S11623-013-0200-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zx13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13, title = {{BAG:} Fragerecht des Arbeitgebers nach erledigten Ermittlungsverfahren}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {543--546}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0217-8}, doi = {10.1007/S11623-013-0217-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13a, title = {BVerfG: Eilrechtsschutz gegen die Anordnung einer DNA-Analyse bei einem Minderj{\"{a}}hrigen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {546--547}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0218-7}, doi = {10.1007/S11623-013-0218-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13b, title = {{VG} Wiesbaden: Verwertungsverbot bei unzul{\"{a}}ssig gespeicherten Daten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {547--548}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0219-6}, doi = {10.1007/S11623-013-0219-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13c, title = {Common {PKI} 2.0: Nachweis der Konformit{\"{a}}t vereinfacht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {549--550}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0220-0}, doi = {10.1007/S11623-013-0220-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13d, title = {Apps mit Datenschutzm{\"{a}}ngeln}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {549}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0221-z}, doi = {10.1007/S11623-013-0221-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13e, title = {Bundesrat stimmt dem E-Government-Gesetz zu}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {550--551}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0222-y}, doi = {10.1007/S11623-013-0222-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13f, title = {Beirat der Allianz f{\"{u}}r Cyber-Sicherheit hat sich konstituiert}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {550}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0224-9}, doi = {10.1007/S11623-013-0224-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13g, title = {T{\"{U}}V Informationstechnik als IT-Sicherheitsdienstleister zertifiziert}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {550}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0223-x}, doi = {10.1007/S11623-013-0223-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13h, title = {Neue Forschungsprojekte zu IT-Sicherheit in eingebetteten Systemen gestartet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {551}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0226-7}, doi = {10.1007/S11623-013-0226-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13i, title = {G{\&}D: Elektronische P{\"{a}}sse mit neuem SAC-Zugriffsmechanismus}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {551}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0227-6}, doi = {10.1007/S11623-013-0227-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13j, title = {Wie steht es um die elektronische Signatur in Deutschland?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {551--552}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0225-8}, doi = {10.1007/S11623-013-0225-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13k, title = {"Operation NetTraveler": Cyberspionage-Kampagne gegen regierungsnahe Organisationen und Forschungsinstitute}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {552--553}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0228-5}, doi = {10.1007/S11623-013-0228-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13l, title = {Forschungsprojekt "eID Connect" verifiziert das Alter mit Hilfe der CodeMeter-Technologie}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {552}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0229-4}, doi = {10.1007/S11623-013-0229-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13m, title = {Strategiebericht Entwicklung sicherer Software}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {552}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0230-y}, doi = {10.1007/S11623-013-0230-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13n, title = {G{\&}D bietet abh{\"{o}}rsicheres Smartphone f{\"{u}}r Regierungen und Beh{\"{o}}rden an}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {553--554}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0231-x}, doi = {10.1007/S11623-013-0231-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13o, title = {Polizei, Staatsanwaltschaften, Verfassungsschutz: Aufbewahrungsfristen von personenbezogenen Daten {\&} dienstlichem Schriftgut}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {554}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0232-9}, doi = {10.1007/S11623-013-0232-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13p, title = {acatech Position "Privatheit im Internet"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {554}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0233-8}, doi = {10.1007/S11623-013-0233-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13q, title = {26. Konferenz der Informationsfreiheitsbeauftragten in Deutschland}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {592--593}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0244-5}, doi = {10.1007/S11623-013-0244-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13r, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {595--605}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0246-3}, doi = {10.1007/S11623-013-0246-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13s, title = {Das Grundrecht auf informationelle Selbstbestimmung darf weder von inl{\"{a}}ndischen noch von ausl{\"{a}}ndischen Stellen verletzt werden!}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {606}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0247-2}, doi = {10.1007/S11623-013-0247-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13t, title = {,Berlin Group' fordert besseren Schutz der Privatsph{\"{a}}re beim Web Tracking}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {606--607}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0248-1}, doi = {10.1007/S11623-013-0248-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13u, title = {Bundesrat: Gesetz zur F{\"{o}}rderung des elektronischen Rechtsverkehrs mit den Gerichten beschlossen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {607--608}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0249-0}, doi = {10.1007/S11623-013-0249-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13v, title = {Die EU-Cybersicherheitsstrategie braucht Vertrauen und den Schutz der Privatsph{\"{a}}re}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {608--609}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0251-6}, doi = {10.1007/S11623-013-0251-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13w, title = {EU-Agentur f{\"{u}}r Cybersicherheit {ENISA} erh{\"{a}}lt weitere Aufgaben}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {608}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0250-7}, doi = {10.1007/S11623-013-0250-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13x, title = {Privatsph{\"{a}}re-Bestimmungen von Google auf dem Pr{\"{u}}fstand}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {609}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0252-5}, doi = {10.1007/S11623-013-0252-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zy13y, title = {LfDI Saarland: 24. T{\"{a}}tigkeitsberichtes 2011/12}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {609--610}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0253-4}, doi = {10.1007/S11623-013-0253-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zy13y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zyy13, title = {E-Government in Sachsen-Anhalt - nur mit Datenschutz als Vertrauensfaktor}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {8}, pages = {490}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0204-0}, doi = {10.1007/S11623-013-0204-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zyy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zyy13a, title = {Die gr{\"{o}}{\ss}ten Herausforderungen f{\"{u}}r aktuelle Sicherheits-Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {610}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0254-3}, doi = {10.1007/S11623-013-0254-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zyy13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zyy13b, title = {20 Jahre Datenschutz in der Schweiz - wie weiter?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {611--612}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0257-0}, doi = {10.1007/S11623-013-0257-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zyy13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zyy13c, title = {F-Secure: Deutsche besorgt wegen Zugriffe von Unbefugten auf in der Cloud Inhalte}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {611}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0255-2}, doi = {10.1007/S11623-013-0255-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zyy13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zyy13d, title = {Bundesdruckerei erwirbt Anteile am Kryptografie-Spezialisten cryptovision}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {611}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0256-1}, doi = {10.1007/S11623-013-0256-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zyy13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zyy13e, title = {5. Tag der IT-Sicherheit, Informationsveranstaltung f{\"{u}}r IT-Sicherheitsverantwortliche und Datenschutzbeauftragte der TechnologieRegion Karlsruhe, 04.07.2013}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {9}, pages = {612}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0258-z}, doi = {10.1007/S11623-013-0258-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zyy13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13, title = {Renaissance}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {621}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0263-2}, doi = {10.1007/S11623-013-0263-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13a, title = {Geheimdienste gef{\"{a}}hrden massiv den Datenverkehr zwischen Deutschland und au{\ss}ereurop{\"{a}}ischen Staaten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {622}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0264-1}, doi = {10.1007/S11623-013-0264-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13b, title = {{BGH:} Google "Autocomplete"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {663--665}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0273-0}, doi = {10.1007/S11623-013-0273-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13c, title = {{BGH:} Fahrzeug{\"{u}}berwachung mittels GPS-Empf{\"{a}}nger}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {666--673}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0274-z}, doi = {10.1007/S11623-013-0274-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13d, title = {{OVG} L{\"{u}}neburg: Nahaufnahmen von Polizeibeamten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {673--674}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0275-y}, doi = {10.1007/S11623-013-0275-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13e, title = {{BSI:} {\"{U}}berblickspapier zu Apple iOS}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {675--676}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0277-9}, doi = {10.1007/S11623-013-0277-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13f, title = {Merkel: Acht-Punkte-Programm f{\"{u}}r einen europ{\"{a}}ischen und internationalen Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {675}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0276-x}, doi = {10.1007/S11623-013-0276-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13g, title = {PRISM, {TEMPORA} und die Folgen. Selbstdatenschutz tut Not!}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {676--677}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0279-7}, doi = {10.1007/S11623-013-0279-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13h, title = {BMWi: 10 Punkte f{\"{u}}r einen sicheren Umgang mit Unternehmensdaten im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {676}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0278-8}, doi = {10.1007/S11623-013-0278-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13i, title = {{SECUDIS:} Sicherheitskomponenten f{\"{u}}r Chipkarten und Ausweise der Zukunft}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {677--678}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0282-z}, doi = {10.1007/S11623-013-0282-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13j, title = {Kooperationsvereinbarung zur Internetsicherheit zwischen {ENISA} und europ{\"{a}}ischen Normungsgremien {CEN} und {CENLEC}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {677}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0280-1}, doi = {10.1007/S11623-013-0280-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13k, title = {G{\&}D entwickelt {KAMS} f{\"{u}}r die zweite Generation der deutschen Gesundheitskarte}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {677}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0281-0}, doi = {10.1007/S11623-013-0281-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13l, title = {Tactilon von Cassidian: Nutzermanagement im BOS-Digitalfunknetz}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {678}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0283-y}, doi = {10.1007/S11623-013-0283-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13m, title = {GDD-Arbeitskreis "Datenschutz International": 2. Bonner Erkl{\"{a}}rung "Freihandel mit Datenschutz"}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {678--679}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0284-x}, doi = {10.1007/S11623-013-0284-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13n, title = {"ZUGFeRD Release Candidate": Einheitliches Datenformat f{\"{u}}r elektronische Rechnungen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {679--680}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0286-8}, doi = {10.1007/S11623-013-0286-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13o, title = {Europ{\"{a}}isches Datenschutzg{\"{u}}tesiegel f{\"{u}}r Whistle- Blowing-System der Business Keeper {AG}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {679}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0285-9}, doi = {10.1007/S11623-013-0285-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13p, title = {Verantwortungsbewusstsein beim Umgang mit Kundendaten}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {680--681}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0288-6}, doi = {10.1007/S11623-013-0288-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13q, title = {IT-Sicherheit im Mittelstand: Leitfaden zu E-Mail-Verschl{\"{u}}sselung}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {680}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0287-7}, doi = {10.1007/S11623-013-0287-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zz13r, title = {Der Einsatz von "Sozialen Netzwerken" an Schulen}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {10}, pages = {681}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0289-5}, doi = {10.1007/S11623-013-0289-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zz13r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.