Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud44.bht:"
@article{DBLP:journals/dud/Atug20, author = {Manuel Atug}, title = {Zertifizierungen im Kontext KRITIScher Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {668--671}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1346-5}, doi = {10.1007/S11623-020-1346-5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Atug20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Baum20, author = {Gerhart Baum}, title = {Nachruf auf Burkhard Hirsch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {351--352}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1282-4}, doi = {10.1007/S11623-020-1282-4}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Baum20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckat20, author = {Alexander Bleckat}, title = {Anwendbarkeit der Datenschutzgrundverordnung auf k{\"{u}}nstliche Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {194--198}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1250-z}, doi = {10.1007/S11623-020-1250-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bleckat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BremertHKP20, author = {Benjamin Bremert and Marit Hansen and Barbara K{\"{o}}rffer and Sven Polenz}, title = {Pandemie und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {791--795}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1368-z}, doi = {10.1007/S11623-020-1368-Z}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BremertHKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Breyer20, author = {Jonas Breyer}, title = {Der neue {\textsection} 2 {BORA}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {189--193}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1249-5}, doi = {10.1007/S11623-020-1249-5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Breyer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner20, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {476--484}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1309-x}, doi = {10.1007/S11623-020-1309-X}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner20a, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {544--554}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1322-0}, doi = {10.1007/S11623-020-1322-0}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner20b, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {685--699}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1351-8}, doi = {10.1007/S11623-020-1351-8}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bungeroth20, author = {Christian Bungeroth}, title = {Vertrauen in Programme f{\"{u}}r IT-Sicherheit aufbauen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {240--244}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1259-3}, doi = {10.1007/S11623-020-1259-3}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bungeroth20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ChenHK20, author = {Jihong Chen and Lu Han and Dennis{-}Kenji Kipker}, title = {An Introduction into the New Chinese Data Protection Legal Framework}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {52--57}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1222-3}, doi = {10.1007/S11623-019-1222-3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ChenHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Coester20, author = {Ulla Coester}, title = {Vertrauensw{\"{u}}rdige {KI} - zwischen Anspruch und Wirklichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {245--249}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1260-x}, doi = {10.1007/S11623-020-1260-X}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Coester20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CoesterF20, author = {Ulla Coester and Bernd Fuhlert}, title = {Gesichtserkennung - eine Frage der Ethik?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {48--51}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1221-4}, doi = {10.1007/S11623-019-1221-4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/CoesterF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad20, author = {Conrad Sebastian Conrad}, title = {Datenschutz bei Zukunftsmodellen: Nur mit Einwilligung m{\"{o}}glich?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {611--616}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1334-9}, doi = {10.1007/S11623-020-1334-9}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DickhautJRL20, author = {Ernestine Dickhaut and Andreas Janson and Alexander Ro{\ss}nagel and Jan Marco Leimeister}, title = {Interdisziplin{\"{a}}re Anforderungsmuster f{\"{u}}r smarte pers{\"{o}}nliche Assistenten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {579--583}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1328-7}, doi = {10.1007/S11623-020-1328-7}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DickhautJRL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DickhautTJ20, author = {Ernestine Dickhaut and Laura Friederike Thies and Andreas Janson}, title = {Die Kodifizierung von Gestaltungswissen in interdisziplin{\"{a}}ren Entwurfsmustern}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {584--588}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1329-6}, doi = {10.1007/S11623-020-1329-6}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DickhautTJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dix20, author = {Alexander Dix}, title = {Die deutsche Corona Warn-App - ein gelungenes Beispiel f{\"{u}}r Privacy by Design?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {779--785}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1366-1}, doi = {10.1007/S11623-020-1366-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Dix20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DolleHC20, author = {Wilhelm Dolle and Julian Herlinghaus and Marian Corbe}, title = {Sinn und Unsinn von Zertifizierungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {641--644}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1340-y}, doi = {10.1007/S11623-020-1340-Y}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DolleHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FahrmannA20, author = {Jan F{\"{a}}hrmann and Clemens Arzt}, title = {Polizeilicher Umgang mit personenbezogenen Daten in der Corona-Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {801--805}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1370-5}, doi = {10.1007/S11623-020-1370-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FahrmannA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerD20, author = {Arno Fiedler and Christian Drews}, title = {Vertrauen in der digitalen Welt auf , , Treu und Glauben"}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {231--235}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1257-5}, doi = {10.1007/S11623-020-1257-5}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FiedlerD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox20, author = {Dirk Fox}, title = {Offene Herausforderungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {81}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1227-y}, doi = {10.1007/S11623-020-1227-Y}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox20a, author = {Dirk Fox}, title = {Beben}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {497}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1312-2}, doi = {10.1007/S11623-020-1312-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox20b, author = {Dirk Fox}, title = {Die Praxis sollte das Ergebnis des Nachdenkens sein. Hermann Hesse}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {709}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1353-6}, doi = {10.1007/S11623-020-1353-6}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FrankB20, author = {Guido Frank and Thomas Becker}, title = {Aus dem Nirwana}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {456--461}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1305-1}, doi = {10.1007/S11623-020-1305-1}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FrankB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FreyeKEM20, author = {Merle Freye and Dennis{-}Kenji Kipker and Rindstone B. Ezekiel and Doreen F. Mwamlangala}, title = {Strengthening protection of personal data in the health sector: a comparative analysis of the Tanzanian and German eHealth system}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {393--397}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1291-3}, doi = {10.1007/S11623-020-1291-3}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FreyeKEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FrickeL20, author = {Frank Fricke and Philipp L{\"{o}}hr}, title = {Datenschutzrechtliche Zul{\"{a}}ssigkeitspr{\"{u}}fungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {169--171}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1245-9}, doi = {10.1007/S11623-020-1245-9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FrickeL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geminn20, author = {Christian L. Geminn}, title = {Betroffenenrechte verbessern}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {307--311}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1273-5}, doi = {10.1007/S11623-020-1273-5}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Geminn20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GeminnSWAV20, author = {Christian L. Geminn and Jessica M. Szczuka and Carina Weber and Andr{\'{e}} Artelt and Lina Varonina}, title = {Kinder als Nutzende smarter Sprachassistenten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {606--610}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1333-x}, doi = {10.1007/S11623-020-1333-X}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GeminnSWAV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerlingGHP20, author = {Rainer W. Gerling and Sebastian Gerling and Stefan Hessel and Ronald Petrlic}, title = {Stand der Technik bei Videokonferenzen - und die Interpretation der Aufsichtsbeh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {740--747}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1359-0}, doi = {10.1007/S11623-020-1359-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerlingGHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Glatzner20, author = {Florian Glatzner}, title = {Profilbildung und algorithmenbasierte Entscheidungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {312--315}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1274-4}, doi = {10.1007/S11623-020-1274-4}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Glatzner20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GohrKS20, author = {Aron Gohr and Dominik Klein and Werner Schindler}, title = {Verr{\"{a}}terischer Stromverbrauch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {431--435}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1300-6}, doi = {10.1007/S11623-020-1300-6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GohrKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gomez-BarreroKB20, author = {Marta Gomez{-}Barrero and Jascha Kolberg and Christoph Busch}, title = {Erkennung von Pr{\"{a}}sentationsangriffen auf Fingerabdruck Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {26--31}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1217-0}, doi = {10.1007/S11623-019-1217-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gomez-BarreroKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grafenstein20, author = {Max von Grafenstein}, title = {Innovationsoffener Datenschutz durch Folgenabsch{\"{a}}tzungen und Technikgestaltung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {172--175}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1246-8}, doi = {10.1007/S11623-020-1246-8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Grafenstein20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichK20, author = {Ludwig Gramlich and Kerstin Kreul}, title = {Novellierung des Post-Datenschutzes in Deutschland}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {469--474}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1307-z}, doi = {10.1007/S11623-020-1307-Z}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grethel20, author = {Monika Grethel}, title = {Einsatz von WhatsApp durch saarl{\"{a}}ndische Kommunen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {148}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1240-1}, doi = {10.1007/S11623-020-1240-1}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Grethel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrubeHSS20, author = {Tim Grube and Alexander Heinrich and Jan{-}Philipp Stroscher and Sabrina Schomberg}, title = {Datensicherheit von Corona-Apps nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {501--505}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1314-0}, doi = {10.1007/S11623-020-1314-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrubeHSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gruber20, author = {Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {492--496}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1311-3}, doi = {10.1007/S11623-020-1311-3}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gruber20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GuhrKM20, author = {Alisha G{\"{u}}hr and Irene Karper and S{\"{o}}nke Maseberg}, title = {Der lange Weg zur Akkreditierung nach Art. 42 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {649--653}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1342-9}, doi = {10.1007/S11623-020-1342-9}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GuhrKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Haas20, author = {Werner Haas}, title = {Sicherheit auf Sand gebaut?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {441--445}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1302-4}, doi = {10.1007/S11623-020-1302-4}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Haas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HamacherKKS20, author = {Kay Hamacher and Stefan Katzenbeisser and Tobias Kussel and Sebastian Stammler}, title = {Genomische Daten und der Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {87--93}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1229-9}, doi = {10.1007/S11623-020-1229-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HamacherKKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeckmannST20, author = {Benjamin Heckmann and Florian Schweighart and Markus Tasch}, title = {{JOINED-VIV:} Umsetzung der {DSGVO} mittels {SDM} und unter Einbindung des {BSI} IT-Grundschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {663--667}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1345-6}, doi = {10.1007/S11623-020-1345-6}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeckmannST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Henniger20, author = {Olaf Henniger}, title = {Neue Normen f{\"{u}}r biometrische Datenaustauschformate}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {43--47}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1220-5}, doi = {10.1007/S11623-019-1220-5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Henniger20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HesselP20, author = {Stefan Hessel and Karin Potel}, title = {Zur Notwendigkeit einer Data Breach Notification bei Datentr{\"{a}}gerverschl{\"{u}}sselung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {94--97}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1230-3}, doi = {10.1007/S11623-020-1230-3}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HesselP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeuftF20, author = {Matthias Heuft and Dirk Feldhusen}, title = {Angriffe auf Chips in Reisep{\"{a}}ssen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {436--440}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1301-5}, doi = {10.1007/S11623-020-1301-5}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeuftF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HobertB20, author = {Sebastian Hobert and Florian Berens}, title = {Chatbot-basierte Lernsysteme als k{\"{u}}nstliche Tutoren in der Lehre}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {594--599}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1331-z}, doi = {10.1007/S11623-020-1331-Z}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HobertB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HobertB20a, author = {Sebastian Hobert and Florian Berens}, title = {Chatbot-basierte Lernsysteme alsk{\"{u}}nstliche Tutoren in der Lehre}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {600--605}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1332-y}, doi = {10.1007/S11623-020-1332-Y}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HobertB20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoerenP20, author = {Thomas Hoeren and Stefan Pinelli}, title = {Datenschutz im neuen chinesischen Zivilgesetzbuch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {678--680}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1348-3}, doi = {10.1007/S11623-020-1348-3}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoerenP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JahnelGW20, author = {Tina Jahnel and Ansgar Gerhardus and Julian Wienert}, title = {Digitales Contact Tracing: Dilemma zwischen Datenschutz und Public Health Nutzenbewertung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {786--790}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1367-0}, doi = {10.1007/S11623-020-1367-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JahnelGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JaspersJ20, author = {Andreas Jaspers and Tobias Jacquemain}, title = {Datenschutz-Grundverordnung - Praxiserfahrungen und Evaluation}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {297--301}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1271-7}, doi = {10.1007/S11623-020-1271-7}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JaspersJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jelinek20, author = {Andrea Jelinek}, title = {{FAQ} on the judgment of the Court of Justice of the European Union in Case {C-311/18} - Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {681--683}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1349-2}, doi = {10.1007/S11623-020-1349-2}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jelinek20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JohnW20, author = {Nicolas John and Maximilian Wellmann}, title = {Datenschutzrechtliche Fragestellungen zur Auswahl von Videokonferenztools}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {506--510}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1315-z}, doi = {10.1007/S11623-020-1315-Z}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JohnW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber20, author = {Ulrich Kelber}, title = {BfDI verh{\"{a}}ngt Geldbu{\ss}en gegen Telekommunikationsdienstleister}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {85--86}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1228-x}, doi = {10.1007/S11623-020-1228-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber20a, author = {Ulrich Kelber}, title = {Nicht Daten sind der Rohstoff des 21. Jahrhunderts, sondern Vertrauen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {226--227}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1255-7}, doi = {10.1007/S11623-020-1255-7}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kelber20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kelber20b, author = {Ulrich Kelber}, title = {BfDI zu Folgen der Gesetzgebung des {PDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {640}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1339-4}, doi = {10.1007/S11623-020-1339-4}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kelber20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker20, author = {Dennis{-}Kenji Kipker}, title = {{EU} Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {263--265}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1264-6}, doi = {10.1007/S11623-020-1264-6}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kipker20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker20a, author = {Dennis{-}Kenji Kipker}, title = {{EU} Cybersecurity Act and Certification Schemes: an up-to-date progress report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {390--392}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1290-4}, doi = {10.1007/S11623-020-1290-4}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerB20, author = {Dennis{-}Kenji Kipker and Benedikt Buchner}, title = {Digitale Herausforderungen der Corona-Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {773--775}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1364-3}, doi = {10.1007/S11623-020-1364-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Klink-StraubS20, author = {Judith Klink{-}Straub and Tobias Straub}, title = {Der Auskunftsanspruch bei Pr{\"{u}}fungsunterlagen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {672--677}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1347-4}, doi = {10.1007/S11623-020-1347-4}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Klink-StraubS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KnieperT20, author = {Thomas Knieper and Marie{-}Theres Tinnefeld}, title = {Politische Satiren und Karikaturen - eine Bastion offener Demokratien?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {375--380}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1287-z}, doi = {10.1007/S11623-020-1287-Z}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KnieperT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KnuchelE20, author = {Christian Knuchel and Nico Ebert}, title = {DSGVO-konformes L{\"{o}}schen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {126--127}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1235-y}, doi = {10.1007/S11623-020-1235-Y}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KnuchelE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KochPW20, author = {Manuel Koch and Andrea Pawils and Enrico Weide}, title = {Das Standard-Datenschutzmodell in der Telematikinfrastruktur}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {104--110}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1232-1}, doi = {10.1007/S11623-020-1232-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KochPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Krasemann20, author = {Henry Krasemann}, title = {Der aktuelle Stand der Datenschutz- Zertifizierung und Akkreditierung in Deutschland und Europa}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {645--648}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1341-x}, doi = {10.1007/S11623-020-1341-X}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Krasemann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann20, author = {Dieter Kugelmann}, title = {Kann und darf das Handy gegen Corona helfen?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {350}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1281-5}, doi = {10.1007/S11623-020-1281-5}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann20a, author = {Dieter Kugelmann}, title = {Rolle, Strategien, Aktionsplan 2020}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {430}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1299-8}, doi = {10.1007/S11623-020-1299-8}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann20b, author = {Dieter Kugelmann}, title = {Neue Welle von Schadsoftware - Anstieg von Datenpannen in diesen Tagen aufgrund von Phishing Mails}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {500}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1313-1}, doi = {10.1007/S11623-020-1313-1}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugler20, author = {Dennis K{\"{u}}gler}, title = {Expedition in den Nanokosmos}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {425}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1297-x}, doi = {10.1007/S11623-020-1297-X}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugler20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuglerR20, author = {Dennis K{\"{u}}gler and Helmut Reimer}, title = {Was tun? Sicherheitsl{\"{u}}cken in Hardware}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {475}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1308-y}, doi = {10.1007/S11623-020-1308-Y}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KuglerR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kuhling20, author = {J{\"{u}}rgen K{\"{u}}hling}, title = {Privatheit am Arbeitsplatz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {182--188}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1248-6}, doi = {10.1007/S11623-020-1248-6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Kuhling20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KusS20, author = {Mehmet Kus and Karsten Sohr}, title = {Praktische Erfahrungen und Ans{\"{a}}tze f{\"{u}}r {\^{a}}Security by Design' auf Basis der STRIDE-Methodik}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {750--754}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1361-6}, doi = {10.1007/S11623-020-1361-6}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KusS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Labusga20, author = {Jan{-}Hendrik Labusga}, title = {Die Fristberechnung beim Data Breach}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {735--739}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1358-1}, doi = {10.1007/S11623-020-1358-1}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Labusga20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lower20, author = {Daniel L{\"{o}}wer}, title = {Vertrauen im E-Commerce}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {236--239}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1258-4}, doi = {10.1007/S11623-020-1258-4}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lower20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MaierFW20, author = {Dominik Christian Maier and Fabian Franzen and Manuela Wagner}, title = {Mehr schlecht als Recht: Grauzone Sicherheitsforschung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {511--517}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1316-y}, doi = {10.1007/S11623-020-1316-Y}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MaierFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MargrafB20, author = {Marian Margraf and Nicolas Buchmann}, title = {Gew{\"{a}}hrleistung langfristiger Sicherheit f{\"{u}}r Breeder-Dokumente durch Biometrie und Blockchain-Technologie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {32--37}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1218-z}, doi = {10.1007/S11623-019-1218-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MargrafB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Martin20, author = {Nicholas Martin}, title = {Corona-Eind{\"{a}}mmung in Taiwan}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {815--818}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1373-2}, doi = {10.1007/S11623-020-1373-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Martin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MartinMSFH20, author = {Nicholas Martin and Britta Alexandra Mester and Ina Schiering and Michael Friedewald and Dara Hallinan}, title = {Datenschutz-Folgenabsch{\"{a}}tzung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {149--153}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1241-0}, doi = {10.1007/S11623-020-1241-0}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MartinMSFH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MartinSF20, author = {Nicholas Martin and Ina Schiering and Michael Friedewald}, title = {Methoden der Datenschutz-Folgenabsch{\"{a}}tzung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {154--160}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1242-z}, doi = {10.1007/S11623-020-1242-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MartinSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MayerBDSV20, author = {Peter Mayer and Fabian Ballreich and Reyhan D{\"{u}}zg{\"{u}}n and Christian Schwartz and Melanie Volkamer}, title = {Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {522--527}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1318-9}, doi = {10.1007/S11623-020-1318-9}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MayerBDSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MerkleRSB20, author = {Johannes Merkle and Christian Rathgeb and Ulrich Scherhag and Christoph Busch}, title = {Morphing-Angriffe}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {38--42}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1219-y}, doi = {10.1007/S11623-019-1219-Y}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MerkleRSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester20, author = {Britta Alexandra Mester}, title = {Datenschutz-Folgenabsch{\"{a}}tzung - Chance des Datenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {145}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1239-7}, doi = {10.1007/S11623-020-1239-7}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Mester20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Miller20, author = {Felix Miller}, title = {Root-of-Trust-Architekturen als Open-Source-Hardware und deren Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {451--455}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1304-2}, doi = {10.1007/S11623-020-1304-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Miller20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NagelePS20, author = {Peter N{\"{a}}gele and Ronald Petrlic and Frank Schemmel}, title = {Die Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {719--728}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1356-3}, doi = {10.1007/S11623-020-1356-3}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/NagelePS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen20, author = {Kim Nguyen}, title = {Vertrauen ist die Basis f{\"{u}}r Digitale Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {221}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1253-9}, doi = {10.1007/S11623-020-1253-9}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nguyen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen20a, author = {Kim Nguyen}, title = {Der Lebenszyklus von Souver{\"{a}}nit{\"{a}}t und Vertrauen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {228--230}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1256-6}, doi = {10.1007/S11623-020-1256-6}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nguyen20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Niekrenz20, author = {Elisabeth Niekrenz}, title = {E-Evidence-Verordnung: Datenzugriff durch Strafverfolgungbeh{\"{o}}rden aus dem Ausland?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {535--536}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1320-2}, doi = {10.1007/S11623-020-1320-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Niekrenz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Oettel20, author = {Maurice Oettel}, title = {Smart Human und der Schutz der Gedanken}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {386--389}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1289-x}, doi = {10.1007/S11623-020-1289-X}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Oettel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Oettel20a, author = {Maurice Oettel}, title = {Datensparsame Daten{\"{u}}bertragbarkeit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {819--823}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1374-1}, doi = {10.1007/S11623-020-1374-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Oettel20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri20, author = {Thomas Petri}, title = {Rechtsprechung zur {DSGVO} in den Jahren 2019 - 2020 - eine Auswahl}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {810--814}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1372-3}, doi = {10.1007/S11623-020-1372-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pollmann20, author = {Maren Pollmann}, title = {Weltweites Vergessenwerden? Zur r{\"{a}}umlichen Reichweite des Rechts auf Auslistung bei Suchmaschinen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {365--368}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1285-1}, doi = {10.1007/S11623-020-1285-1}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pollmann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PrietzRS20, author = {Christian Prietz and Martin Rost and Julia Stoll}, title = {Pr{\"{u}}fverfahren zur datenschutzrechtlichen Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {654--658}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1343-8}, doi = {10.1007/S11623-020-1343-8}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PrietzRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rathgeb20, author = {Christian Rathgeb}, title = {Neue Herausforderungen f{\"{u}}r biometrische Technologien}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1211-6}, doi = {10.1007/S11623-019-1211-6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rathgeb20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20, author = {Helmut Reimer}, title = {Der Unterschied}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {429}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1298-9}, doi = {10.1007/S11623-020-1298-9}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20a, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {485--491}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1310-4}, doi = {10.1007/S11623-020-1310-4}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20b, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {555--564}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1323-z}, doi = {10.1007/S11623-020-1323-Z}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer20c, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {700--708}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1352-7}, doi = {10.1007/S11623-020-1352-7}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW20, author = {Helmut Reimer and Christoph Wegener}, title = {Datenschutz in Krisenzeiten oder Krise des Datenschutzes?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {684}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1350-9}, doi = {10.1007/S11623-020-1350-9}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reinhardt20, author = {J{\"{o}}rn Reinhardt}, title = {, , Recht auf Vergessen" auf Franz{\"{o}}sisch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {361--364}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1284-2}, doi = {10.1007/S11623-020-1284-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reinhardt20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RiebeHDLRFR20, author = {Thea Riebe and Jasmin Haunschild and Felix Divo and Matthias Lang and Gerbert Roitburd and Jonas Franken and Christian Reuter}, title = {Die Vorratsdatenspeicherung in Europa}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {316--321}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1275-3}, doi = {10.1007/S11623-020-1275-3}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RiebeHDLRFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Roosendaal20, author = {Arnold Roosendaal}, title = {DPIAs in practice - a strategic instrument for compliance}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {166--168}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1244-x}, doi = {10.1007/S11623-020-1244-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Roosendaal20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel20, author = {Alexander Ro{\ss}nagel}, title = {Evaluation nutzen!}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {281--283}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1267-3}, doi = {10.1007/S11623-020-1267-3}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel20a, author = {Alexander Ro{\ss}nagel}, title = {Evaluation der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {287--292}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1269-1}, doi = {10.1007/S11623-020-1269-1}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel20b, author = {Alexander Ro{\ss}nagel}, title = {Smarte Pers{\"{o}}nliche Assistenten gestalten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {565--566}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1324-y}, doi = {10.1007/S11623-020-1324-Y}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RostW20, author = {Martin Rost and Sebastian Welke}, title = {{SDM} 2.0 und {ITIL} 4 , , verschr{\"{a}}nkt"}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {258--262}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1263-7}, doi = {10.1007/S11623-020-1263-7}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RostW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchieringMFMS20, author = {Ina Schiering and Britta Alexandra Mester and Michael Friedewald and Nicholas Martin}, title = {Datenschutz-Risiken partizipativ identifizieren und analysieren}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {161--165}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1243-y}, doi = {10.1007/S11623-020-1243-Y}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchieringMFMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schlegel20, author = {Daniela Schlegel}, title = {Vertrauenskrise in die digitale Welt?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {254--257}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1262-8}, doi = {10.1007/S11623-020-1262-8}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schlegel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schleipfer20, author = {Stefan Schleipfer}, title = {Ende-zu-Ende-Verschl{\"{u}}sselung von E-Mails}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {748--749}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1360-7}, doi = {10.1007/S11623-020-1360-7}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schleipfer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnebbe20, author = {Maximilian Schnebbe}, title = {Digitale Assistenzsysteme in der Industrie und Produktion}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {398--400}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1292-2}, doi = {10.1007/S11623-020-1292-2}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnebbe20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchraheS20, author = {Dominik Schrahe and Thomas St{\"{a}}dter}, title = {Gesundheits-Apps auf Rezept und Forschung mit Gesundheitsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {713--718}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1355-4}, doi = {10.1007/S11623-020-1355-4}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchraheS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchulteW20, author = {Laura Schulte and Tim Wambach}, title = {Zielkonflikte zwischen Datenschutz und IT-Sicherheit im Kontext der Aufkl{\"{a}}rung von Sicherheitsvorf{\"{a}}llen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {462--468}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1306-0}, doi = {10.1007/S11623-020-1306-0}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchulteW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schulz20, author = {Sebastian Schulz}, title = {Die Evaluation der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {302--306}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1272-6}, doi = {10.1007/S11623-020-1272-6}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schulz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seiter20, author = {Stefan R. Seiter}, title = {Wer bestimmt {\"{u}}ber uns?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {571}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1325-x}, doi = {10.1007/S11623-020-1325-X}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Seiter20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Sleiman20, author = {Mohamed Bou Sleiman}, title = {Das Corona-Virus - Ein Katalysator f{\"{u}}r Cyberkriminalit{\"{a}}t?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {806--809}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1371-4}, doi = {10.1007/S11623-020-1371-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Sleiman20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Smoltczyk20, author = {Maja Smoltczyk}, title = {Nach "Schrems II": Europa braucht digitale Eigenst{\"{a}}ndigkeit}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {572}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1326-9}, doi = {10.1007/S11623-020-1326-9}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Smoltczyk20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SowaR20, author = {Aleksandra Sowa and Martin Rost}, title = {Die {ISO} 27701 und das {SDM-V2} im Lichte der Umsetzung der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {659--662}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1344-7}, doi = {10.1007/S11623-020-1344-7}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SowaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SpeithBEPP20, author = {Julian Speith and Steffen Becker and Maik Ender and Endres Puschner and Christof Paar}, title = {Hardware-Trojaner}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {446--450}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1303-3}, doi = {10.1007/S11623-020-1303-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Streinz20, author = {Rudolf Streinz}, title = {, , Recht auf Vergessenwerden" zwischen Unionsrecht und Verfassungsrecht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {353--360}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1283-3}, doi = {10.1007/S11623-020-1283-3}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Streinz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TamsS20, author = {Benjamin Tams and Michael Schwaiger}, title = {Die Bedeutung qualit{\"{a}}tsgesicherter biometrischer Daten f{\"{u}}r das {EU} Einreise-/Ausreisesystem {(EES)}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {23--25}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1216-1}, doi = {10.1007/S11623-019-1216-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TamsS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThielT20, author = {Christoph Thiel and Christian Thiel}, title = {Distributed Ledger Technologie {(DLT)} im Kontext europ{\"{a}}ischer Vertrauensdienste}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {250--253}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1261-9}, doi = {10.1007/S11623-020-1261-9}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ThielT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThiesDJRL020, author = {Laura Friederike Thies and Ernestine Dickhaut and Andreas Janson and Alexander Ro{\ss}nagel and Jan Marco Leimeister and Matthias S{\"{o}}llner}, title = {Die Simulationsstudie als Evaluationsmethode}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {589--593}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1330-0}, doi = {10.1007/S11623-020-1330-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ThiesDJRL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ThiesJK020, author = {Laura Friederike Thies and Silke Jandt and Robin Knote and Matthias S{\"{o}}llner}, title = {Konflikt{\"{a}}re Anforderungen an smarte pers{\"{o}}nliche Assistenten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {573--578}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1327-8}, doi = {10.1007/S11623-020-1327-8}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ThiesJK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld20, author = {Marie{-}Theres Tinnefeld}, title = {Die Bedeutung von Informanten f{\"{u}}r Presse und Demokratie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {381--385}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1288-y}, doi = {10.1007/S11623-020-1288-Y}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB20, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Gundrechtliche Freiheiten in St{\"{o}}rf{\"{a}}llen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {345--346}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1280-6}, doi = {10.1007/S11623-020-1280-6}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TolsdorfBDFS20, author = {Jan Tolsdorf and Christian K. Bosse and Aljoscha Dietrich and Denis Feth and Hartmut Schmitt}, title = {Privatheit am Arbeitsplatz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {176--181}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1247-7}, doi = {10.1007/S11623-020-1247-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TolsdorfBDFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TonnissenT20, author = {Stefan T{\"{o}}nnissen and Frank Teuteberg}, title = {{DSGVO} und die Blockchain}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {322--327}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1276-2}, doi = {10.1007/S11623-020-1276-2}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TonnissenT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TwickelBB20, author = {Arndt von Twickel and Jennifer Breuer and Ralph Breithaupt}, title = {Vereinbarkeit von Biometrieforschung und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {9--15}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1214-3}, doi = {10.1007/S11623-019-1214-3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/TwickelBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Uhl20, author = {Andreas Uhl}, title = {Venen Biometrie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {16--22}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1215-2}, doi = {10.1007/S11623-019-1215-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Uhl20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ulmenstein20, author = {Ulrich Freiherr von Ulmenstein}, title = {Datensouver{\"{a}}nit{\"{a}}t durch repr{\"{a}}sentative Rechtswahrnehmung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {528--534}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1319-8}, doi = {10.1007/S11623-020-1319-8}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ulmenstein20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke-Caprarese20, author = {Sven Venzke{-}Caprarese}, title = {Zur Praxistauglichkeit des Datenschutzes in der digitalen Kommunikation}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {796--800}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1369-y}, doi = {10.1007/S11623-020-1369-Y}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Venzke-Caprarese20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VogelgesangMS20, author = {Stephanie Vogelgesang and Frederik M{\"{o}}llers and Tim Schneider}, title = {Strafrechtliche Relevanz von AdCloaking}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {537--543}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1321-1}, doi = {10.1007/S11623-020-1321-1}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VogelgesangMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VolkamerH20, author = {Melanie Volkamer and Tobias Hilt}, title = {Sensibilisierung f{\"{u}}r Phishing und andere betr{\"{u}}gerische Nachrichten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {121--125}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1234-z}, doi = {10.1007/S11623-020-1234-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VolkamerH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/VolkamerSB20, author = {Melanie Volkamer and Martina Angela Sasse and Franziska Boehm}, title = {Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {8}, pages = {518--521}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1317-x}, doi = {10.1007/S11623-020-1317-X}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/VolkamerSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner20, author = {Manuela Wagner}, title = {IT-Sicherheitsforschung in rechtlicher Grauzone}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {111--120}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1233-0}, doi = {10.1007/S11623-020-1233-0}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wagner20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener20, author = {Christoph Wegener}, title = {Papier ist geduldig}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {10}, pages = {637}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1338-5}, doi = {10.1007/S11623-020-1338-5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert20, author = {Thilo Weichert}, title = {Die DSGVO, ein - ganz guter - Anfang}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {293--296}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1270-8}, doi = {10.1007/S11623-020-1270-8}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weik20, author = {Ramona Weik}, title = {Die Datenkopie nach Artikel 15 Abs. 3 {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {98--103}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1231-2}, doi = {10.1007/S11623-020-1231-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Weik20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeikD20, author = {Ramona Weik and Andreas Diehl}, title = {Die Beantwortung von Auskunftsersuchen nach Art. 15 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {729--734}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1357-2}, doi = {10.1007/S11623-020-1357-2}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeikD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Will20, author = {Michael Will}, title = {Brauchen wir eine Zentralisierung der Datenschutzaufsicht?}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {369--374}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1286-0}, doi = {10.1007/S11623-020-1286-0}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Will20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20, title = {Trickkiste Biometrie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {5}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1212-5}, doi = {10.1007/S11623-019-1212-5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20a, title = {{DSK:} Standard-Datenschutzmodell {V2}}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {6--8}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1213-4}, doi = {10.1007/S11623-019-1213-4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20aa, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {764--772}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1363-4}, doi = {10.1007/S11623-020-1363-4}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ab, title = {Bewertung der {DSK} zu MS-Office 365: Nachbesserungen geboten}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {778}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1365-2}, doi = {10.1007/S11623-020-1365-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ac, title = {Cyber-Sicherheitsstrategie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {824}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1375-0}, doi = {10.1007/S11623-020-1375-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ad, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {825--834}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1376-z}, doi = {10.1007/S11623-020-1376-Z}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20ae, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {835--841}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1377-y}, doi = {10.1007/S11623-020-1377-Y}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20af, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {12}, pages = {841--844}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1378-x}, doi = {10.1007/S11623-020-1378-X}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20b, title = {98. {DSK} Trier, 06. - 07. November 2019, Entschlie{\ss}ungen und Empfehlungen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {58--60}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1223-2}, doi = {10.1007/S11623-019-1223-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20c, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {61--71}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1224-1}, doi = {10.1007/S11623-019-1224-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20d, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {72--77}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1225-0}, doi = {10.1007/S11623-019-1225-0}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20e, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {1}, pages = {77--80}, year = {2020}, url = {https://doi.org/10.1007/s11623-019-1226-z}, doi = {10.1007/S11623-019-1226-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20f, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {128--133}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1236-x}, doi = {10.1007/S11623-020-1236-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20g, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {134--140}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1237-9}, doi = {10.1007/S11623-020-1237-9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20h, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {2}, pages = {141--144}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1238-8}, doi = {10.1007/S11623-020-1238-8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20i, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {199--211}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1251-y}, doi = {10.1007/S11623-020-1251-Y}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20j, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {3}, pages = {212--220}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1252-x}, doi = {10.1007/S11623-020-1252-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20k, title = {Vorsicht - Glatteis!}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {225}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1254-8}, doi = {10.1007/S11623-020-1254-8}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20l, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {266--271}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1265-5}, doi = {10.1007/S11623-020-1265-5}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20m, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {4}, pages = {272--280}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1266-4}, doi = {10.1007/S11623-020-1266-4}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20n, title = {Datenschutzrechtliche Informationen im Zusammenhang mit der Corona-Pandemie}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {286}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1268-2}, doi = {10.1007/S11623-020-1268-2}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20o, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {328--334}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1277-1}, doi = {10.1007/S11623-020-1277-1}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20p, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {335--340}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1278-0}, doi = {10.1007/S11623-020-1278-0}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20q, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {5}, pages = {341--344}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1279-z}, doi = {10.1007/S11623-020-1279-Z}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20r, title = {K{\"{u}}ndigung}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {401}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1293-1}, doi = {10.1007/S11623-020-1293-1}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20s, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {402--412}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1294-0}, doi = {10.1007/S11623-020-1294-0}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20t, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {413--421}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1295-z}, doi = {10.1007/S11623-020-1295-Z}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20u, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {6}, pages = {421--424}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1296-y}, doi = {10.1007/S11623-020-1296-Y}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20v, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {617--625}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1335-8}, doi = {10.1007/S11623-020-1335-8}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20w, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {626--632}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1336-7}, doi = {10.1007/S11623-020-1336-7}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20x, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {9}, pages = {632--636}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1337-6}, doi = {10.1007/S11623-020-1337-6}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X20x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20y, title = {Registermodernisierung verfassungskonform umsetzen!}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {712}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1354-5}, doi = {10.1007/S11623-020-1354-5}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X20z, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {11}, pages = {755--763}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1362-5}, doi = {10.1007/S11623-020-1362-5}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X20z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.