default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud42.bht:"
@article{DBLP:journals/dud/Banon18, author = {Miguel Ba{\~{n}}{\'{o}}n}, title = {Assurance and {IT} Development Paces and Challenges}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {407--410}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0968-3}, doi = {10.1007/S11623-018-0968-3}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Banon18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BarchnickiP18, author = {Sebastian Barchnicki and Norbert Pohlmann}, title = {Was IT-Sicherheitsindustrie und Anwender voneinander lernen k{\"{o}}nnen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {246--251}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0916-2}, doi = {10.1007/S11623-018-0916-2}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BarchnickiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BartelsB18, author = {Karsten U. Bartels and Merlin Backer}, title = {Die Ber{\"{u}}cksichtigung des Stands der Technik in der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {214--219}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0910-8}, doi = {10.1007/S11623-018-0910-8}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BartelsB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Benzmuller18, author = {Ralf Benzm{\"{u}}ller}, title = {Machine Learning und Virenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {224--230}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0912-6}, doi = {10.1007/S11623-018-0912-6}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Benzmuller18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BeyererMR18, author = {J{\"{u}}rgen Beyerer and J{\"{o}}rn M{\"{u}}ller{-}Quade and Ralf H. Reussner}, title = {Karlsruher Thesen zur Digitalen Souver{\"{a}}nit{\"{a}}t Europas}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {277--280}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0940-2}, doi = {10.1007/S11623-018-0940-2}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BeyererMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bieker18, author = {Felix Bieker}, title = {Die Risikoanalyse nach dem neuen EU-Datenschutzrecht und dem Standard-Datenschutzmodell}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {27--31}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0886-4}, doi = {10.1007/S11623-018-0886-4}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bieker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BiekerBH18, author = {Felix Bieker and Benjamin Bremert and Marit Hansen}, title = {Die Risikobeurteilung nach der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {492--496}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0986-1}, doi = {10.1007/S11623-018-0986-1}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BiekerBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BiekerBH18a, author = {Felix Bieker and Benjamin Bremert and Marit Hansen}, title = {Verantwortlichkeit und Einsatz von Algorithmen bei {\"{o}}ffentlichen Stellen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {608--612}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1010-5}, doi = {10.1007/S11623-018-1010-5}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BiekerBH18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BihlmayerEL18, author = {Thomas Bihlmayer and Philipp Ehmann and Henning Lesch}, title = {Kommissionsvorschlag zu e-Privacy verhindert Vereinheitlichung des Datenschutzes in Europa}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {241--245}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0915-3}, doi = {10.1007/S11623-018-0915-3}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BihlmayerEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BileGW18, author = {Tamer Bile and Ludwig Gramlich and Michael W{\"{a}}chter}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {266--270}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0920-6}, doi = {10.1007/S11623-018-0920-6}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BileGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bitkom18, author = {Bitkom}, title = {Digitale Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {294--300}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0944-y}, doi = {10.1007/S11623-018-0944-Y}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bitkom18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann18, author = {Dominik Bleckmann}, title = {Wahres Ungl{\"{u}}ck bringt der falsche Wahn}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {136--137}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0922-4}, doi = {10.1007/S11623-018-0922-4}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleckmann18a, author = {Dominik Bleckmann}, title = {K{\"{u}}nstliche Intelligenz - Fluch oder Segen?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {539}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0994-1}, doi = {10.1007/S11623-018-0994-1}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bleckmann18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BraunHB18, author = {Steffen Braun and Tobias Henzler and Anders Berg}, title = {Nutzeridentifikation mit mobilen Endger{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {673--679}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1023-0}, doi = {10.1007/S11623-018-1023-0}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BraunHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Breyer18, author = {Jonas Breyer}, title = {Verarbeitungsgrunds{\"{a}}tze und Rechenschaftspflicht nach Art. 5 {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {311--317}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0947-8}, doi = {10.1007/S11623-018-0947-8}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Breyer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BroadnaxLMMN18, author = {Brandon Broadnax and Bernhard L{\"{o}}we and Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, title = {Sicherheit auf festem Fundament}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {74--78}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0897-1}, doi = {10.1007/S11623-018-0897-1}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BroadnaxLMMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brockmann18, author = {Hans{-}Christian Brockmann}, title = {Effizientes und verantwortungsvolles Datenmanagement im Zeitalter der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {634--639}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1015-0}, doi = {10.1007/S11623-018-1015-0}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Brockmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Burri18, author = {Thomas Burri}, title = {K{\"{u}}nstliche Intelligenz und internationales Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {603--607}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1009-y}, doi = {10.1007/S11623-018-1009-Y}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Burri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad18, author = {Conrad Sebastian Conrad}, title = {Gilt das Vereinigte K{\"{o}}nigreich k{\"{u}}nftig als ein Drittland?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {159--160}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0928-y}, doi = {10.1007/S11623-018-0928-Y}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad18a, author = {Conrad Sebastian Conrad}, title = {Kann die K{\"{u}}nstliche Intelligenz den Menschen entschl{\"{u}}sseln? - Neue Forderungen zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {541--546}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0996-z}, doi = {10.1007/S11623-018-0996-Z}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Conrad18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Conrad18b, author = {Conrad Sebastian Conrad}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {798--802}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1048-4}, doi = {10.1007/S11623-018-1048-4}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Conrad18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Debski18, author = {Andrzej Debski}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {400--402}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0965-6}, doi = {10.1007/S11623-018-0965-6}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Debski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DiepenbrockS18, author = {Andreas Diepenbrock and Sabine Sachweh}, title = {Ein konzeptionelles Rahmenwerk f{\"{u}}r die Integration Digitaler Souver{\"{a}}nit{\"{a}}t in Softwarearchitekturen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {281--285}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0941-1}, doi = {10.1007/S11623-018-0941-1}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DiepenbrockS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DreyerK18, author = {Bastian Dreyer and Gerhard Kramarz{-}von Kohout}, title = {Notruf 110 / 112: Technische Richtlinie Notrufverbindungen {(TR} Notruf) 2.0}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {510--517}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0989-y}, doi = {10.1007/S11623-018-0989-Y}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DreyerK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dullien18, author = {Thomas Dullien}, title = {Maschinelles Lernen und k{\"{u}}nstliche Intelligenz in der Informationssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {618--622}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1012-3}, doi = {10.1007/S11623-018-1012-3}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dullien18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DurigF18, author = {Markus D{\"{u}}rig and Matthias Fischer}, title = {Cybersicherheit in Kritischen Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {209--213}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0909-1}, doi = {10.1007/S11623-018-0909-1}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DurigF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtM18, author = {Jens Eckhardt and Konrad Menz}, title = {Datenschutz-Grundverordnung: Neuer Schutz - neue Spannungsverh{\"{a}}ltnisse}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {131--133}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0921-5}, doi = {10.1007/S11623-018-0921-5}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtM18a, author = {Jens Eckhardt and Konrad Menz}, title = {Bu{\ss}geldsanktionen der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {139--144}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0924-2}, doi = {10.1007/S11623-018-0924-2}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtM18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EsslingerM18, author = {Bernhard Esslinger and Hern{\^{a}}ni Marques}, title = {Verfahren und Implementationen von "pretty Easy privacy" (pEp)}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {101--105}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0901-9}, doi = {10.1007/S11623-018-0901-9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EsslingerM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FerrareseD18, author = {Barbara Ferrarese and Alexander Dix}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {59--62}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0892-6}, doi = {10.1007/S11623-018-0892-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/FerrareseD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerT18, author = {Arno Fiedler and Christoph Thiel}, title = {Chancen europ{\"{a}}ischer Standards f{\"{u}}r die Zertifizierung?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {434--436}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0974-5}, doi = {10.1007/S11623-018-0974-5}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerTT18, author = {Arno Fiedler and Christian Thiel and Christoph Thiel}, title = {Umsetzung technischer Anforderungen der {DSGVO} mittels eIDAS-VO-konformer Vertrauensdienste}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {236--240}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0914-4}, doi = {10.1007/S11623-018-0914-4}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18, author = {Dirk Fox}, title = {Stand der Forschung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {63}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0893-5}, doi = {10.1007/S11623-018-0893-5}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18a, author = {Dirk Fox}, title = {Digitale Souver{\"{a}}nit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {271}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0938-9}, doi = {10.1007/S11623-018-0938-9}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18b, author = {Dirk Fox}, title = {Modell und Wirklichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {667}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1020-3}, doi = {10.1007/S11623-018-1020-3}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox18c, author = {Dirk Fox}, title = {Des Kaisers neue Kleider}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {671}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1021-2}, doi = {10.1007/S11623-018-1021-2}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FumyR18, author = {Walter Fumy and Helmut Reimer}, title = {Vertrauen ist gut ... Zertifizierung ist besser!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {403}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0966-5}, doi = {10.1007/S11623-018-0966-5}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FumyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Geminn18, author = {Christian L. Geminn}, title = {Wissenschaftliche Forschung und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {640--646}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1016-z}, doi = {10.1007/S11623-018-1016-Z}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Geminn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerberZHEVH18, author = {Nina Gerber and Verena Zimmermann and Birgit Henhapl and Sinem Emer{\"{o}}z and Melanie Volkamer and Tobias Hilt}, title = {Nutzerwahrnehmung der Ende-zu-Ende-Verschl{\"{u}}sselung in WhatsApp}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {680--685}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1024-z}, doi = {10.1007/S11623-018-1024-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerberZHEVH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gerhold18, author = {Maximilian Gerhold}, title = {40 Jahre {CNIL} - Ein Blick auf den franz{\"{o}}sischen Gendarmen des Privatlebens}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {368--372}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0958-5}, doi = {10.1007/S11623-018-0958-5}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gerhold18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GollaHB18, author = {Sebastian J. Golla and Henning Hofmann and Matthias B{\"{a}}cker}, title = {Connecting the Dots}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {89--100}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0900-x}, doi = {10.1007/S11623-018-0900-X}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GollaHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Golland18, author = {Alexander Golland}, title = {Der r{\"{a}}umliche Anwendungsbereich der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {351--357}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0955-8}, doi = {10.1007/S11623-018-0955-8}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Golland18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GonscherowskiHR18, author = {Susan Gonscherowski and Marit Hansen and Martin Rost}, title = {Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {442--446}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0976-3}, doi = {10.1007/S11623-018-0976-3}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GonscherowskiHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichG18, author = {Ludwig Gramlich and Joachim Gruber}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {199--202}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0937-x}, doi = {10.1007/S11623-018-0937-X}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichP18, author = {Ludwig Gramlich and Thomas Petri}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {127--130}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0905-5}, doi = {10.1007/S11623-018-0905-5}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/GramlichP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichP18a, author = {Ludwig Gramlich and Thomas Petri}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {663--666}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1019-9}, doi = {10.1007/S11623-018-1019-9}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GriesbeckG18, author = {Michael Griesbeck and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {590--594}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1005-2}, doi = {10.1007/S11623-018-1005-2}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GriesbeckG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HackenjosMR18, author = {Timon Hackenjos and Jeremias Mechler and Jochen Rill}, title = {IT-Sicherheit - ein rechtsfreier Raum?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {286--290}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0942-0}, doi = {10.1007/S11623-018-0942-0}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HackenjosMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen18, author = {Marit Hansen}, title = {Transparenz der Verwaltung auch beim Einsatz von Algorithmen und K{\"{u}}nstlicher Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {733}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1035-9}, doi = {10.1007/S11623-018-1035-9}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Hansen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hartmann18, author = {Mark Hartmann}, title = {Machine Learning und IT-Security}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {231--235}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0913-5}, doi = {10.1007/S11623-018-0913-5}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hartmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hemker18, author = {Thomas Hemker}, title = {Machen Maschinen die Welt sicherer?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {629--633}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1014-1}, doi = {10.1007/S11623-018-1014-1}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hemker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Henseler-UngerH18, author = {Iris Henseler{-}Unger and Annette Hillebrand}, title = {Aktuelle Lage der IT-Sicherheit in {KMU}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {686--690}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1025-y}, doi = {10.1007/S11623-018-1025-Y}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Henseler-UngerH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoerenV18, author = {Thomas Hoeren and Jonas V{\"{o}}lkel}, title = {Informationsabfrage {\"{u}}ber Domain-verantwortliche nach der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {161--164}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0929-x}, doi = {10.1007/S11623-018-0929-X}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoerenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoidnR18, author = {Dominik Hoidn and Alexander Ro{\ss}nagel}, title = {Anpassung des Sozialdatenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {487--491}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0985-2}, doi = {10.1007/S11623-018-0985-2}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoidnR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Holzel18, author = {Julian H{\"{o}}lzel}, title = {Anonymisierungstechniken und das Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {502--509}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0988-z}, doi = {10.1007/S11623-018-0988-Z}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Holzel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Humphreys18, author = {Edward Humphreys}, title = {The Future Landscape of {ISMS} Standards}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {421--423}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0971-8}, doi = {10.1007/S11623-018-0971-8}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Humphreys18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HusemannPS18, author = {Charlotte Husemann and Fabian Pittroff and Andreas D. Schulz}, title = {Fitness-Tracking als Informationsproblem}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {694--700}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1027-9}, doi = {10.1007/S11623-018-1027-9}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HusemannPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JakobiSS18, author = {Timo Jakobi and Gunnar Stevens and Anna{-}Magdalena Seufert}, title = {Privacy-By-Design f{\"{u}}r das Connected Car: Architekturen aus Verbrauchersicht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {704--707}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1029-7}, doi = {10.1007/S11623-018-1029-7}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/JakobiSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JakschD18, author = {Christian Jaksch and Gerrit von Daacke}, title = {Datenschutzbeauftragter und Datenschutz-Organisation unter der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {758--763}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1040-z}, doi = {10.1007/S11623-018-1040-Z}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/JakschD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jensen18, author = {Meiko Jensen}, title = {Zur Messbarkeit von Schutzzielen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {23--26}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0885-5}, doi = {10.1007/S11623-018-0885-5}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Jensen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KieselmannW18, author = {Olga Kieselmann and Arno Wacker}, title = {L{\"{o}}schen im Internet - rechtlich gefordert und technisch m{\"{o}}glich!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {437--441}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0975-4}, doi = {10.1007/S11623-018-0975-4}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KieselmannW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker18, author = {Dennis{-}Kenji Kipker}, title = {Stellungnahme der {EAID}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {252--253}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0917-1}, doi = {10.1007/S11623-018-0917-1}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kipker18a, author = {Dennis{-}Kenji Kipker}, title = {VPN-Tunnelabschaltung und "Chinese Cybersecurity Law"}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {574--575}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1001-6}, doi = {10.1007/S11623-018-1001-6}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kipker18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS18, author = {Dennis{-}Kenji Kipker and Mattea Stelter}, title = {Datenschutz unter MiFID {II}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {364--367}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0957-6}, doi = {10.1007/S11623-018-0957-6}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KipkerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS18a, author = {Dennis{-}Kenji Kipker and Dario Scholz}, title = {{EU} Cybersecurity-Verordnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {701--703}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1028-8}, doi = {10.1007/S11623-018-1028-8}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerS18b, author = {Dennis{-}Kenji Kipker and Dario Scholz}, title = {Cybersicherheit und Datenschutz in China}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {768--771}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1042-x}, doi = {10.1007/S11623-018-1042-X}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KipkerS18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kohler18, author = {Thomas R. K{\"{o}}hler}, title = {Datenschutz im vernetzten Fahrzeug}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {376--379}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0960-y}, doi = {10.1007/S11623-018-0960-Y}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kohler18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KowalskiI18, author = {Bernd Kowalski and Matthias Intemann}, title = {Perspektiven der IT-Sicherheits-Zertifizierung f{\"{u}}r Europas M{\"{a}}rkte}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {415--419}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0970-9}, doi = {10.1007/S11623-018-0970-9}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KowalskiI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kranig18, author = {Thomas Kranig}, title = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht Verbindliche Datenschutzvorschriften {(BCR)} f{\"{u}}r die Allianz-Gruppe genehmigt}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {406}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0967-4}, doi = {10.1007/S11623-018-0967-4}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kranig18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann18, author = {Dieter Kugelmann}, title = {Die Anpassung der Fachgesetze an die {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {482--486}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0984-3}, doi = {10.1007/S11623-018-0984-3}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KuhnlRS18, author = {Christina K{\"{u}}hnl and Kerstin Rohrer and Nick Kai Schneider}, title = {Ein europ{\"{a}}ischer Gesundheitsdatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {735--740}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1036-8}, doi = {10.1007/S11623-018-1036-8}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KuhnlRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lachenmann18, author = {Matthias Lachenmann}, title = {Bodycams: Nutzung durch private Sicherheitsdienste}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {777--781}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1044-8}, doi = {10.1007/S11623-018-1044-8}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lachenmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lander18, author = {Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden des Bundes und der L{\"{a}}nder}, title = {Beschluss der {DSK} zu Facebook Fanpages D{\"{u}}sseldorf, 5. September 2018}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {672}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1022-1}, doi = {10.1007/S11623-018-1022-1}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Lander18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LeitoldK18, author = {Herbert Leitold and Daniel Konrad}, title = {Erfahrungen aus eIDAS Zertifizierung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {429--433}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0973-6}, doi = {10.1007/S11623-018-0973-6}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LeitoldK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lorenz18, author = {Bernd Lorenz}, title = {Datenschutzrechtliche Fragen offener E-Mail-Verteiler}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {178--180}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0933-1}, doi = {10.1007/S11623-018-0933-1}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lorenz18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MarnauBH18, author = {Ninja Marnau and Pascal Berrang and Mathias Humbert}, title = {Anonymisierungsverfahren f{\"{u}}r genetische Daten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {83--88}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0899-z}, doi = {10.1007/S11623-018-0899-Z}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MarnauBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MayerKV18, author = {Peter Mayer and Alexandra Kunz and Melanie Volkamer}, title = {Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {307--310}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0946-9}, doi = {10.1007/S11623-018-0946-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MayerKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester18, author = {Britta Alexandra Mester}, title = {Haftungsrisiko i. S. d. {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {181}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0934-0}, doi = {10.1007/S11623-018-0934-0}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester18a, author = {Britta Alexandra Mester}, title = {Datenschutzrechtliche Herausforderung der "K{\"{u}}nstlichen Intelligenz" {(KI)}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {535}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0993-2}, doi = {10.1007/S11623-018-0993-2}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester18b, author = {Britta Alexandra Mester}, title = {K{\"{u}}nstliche Intelligenz {(KI)} in Zeiten des Datenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {576}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1002-5}, doi = {10.1007/S11623-018-1002-5}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mino-VasquezS18, author = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez and Peter Suhren}, title = {Liability for injuries according to {GDPR}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {151--155}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0926-0}, doi = {10.1007/S11623-018-0926-0}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mino-VasquezS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mitrakas18, author = {Andreas Mitrakas}, title = {The emerging {EU} framework on cybersecurity certification}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {411--414}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0969-2}, doi = {10.1007/S11623-018-0969-2}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mitrakas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Msumi18, author = {Mbiki M. Msumi}, title = {An Overview of eHealth Regulations in Tanzania}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {373--375}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0959-4}, doi = {10.1007/S11623-018-0959-4}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Msumi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NeumannRVKS18, author = {Stephan Neumann and Benjamin Reinheimer and Melanie Volkamer and Alexandra Kunz and Christian Schwartz}, title = {Effektiver Schutz vor betr{\"{u}}gerischen Nachrichten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {301--306}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0945-x}, doi = {10.1007/S11623-018-0945-X}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/NeumannRVKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen18, author = {Kim Nguyen}, title = {Certification of eIDAS trust services and new global transparency trends}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {424--428}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0972-7}, doi = {10.1007/S11623-018-0972-7}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nguyen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nordrhein-Westfalen18, author = {LfDI Nordrhein{-}Westfalen and Helga Block}, title = {Datenschutzkonferenz - Nordrhein-Westfalen {\"{u}}bernimmt Vorsitz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {138}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0923-3}, doi = {10.1007/S11623-018-0923-3}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nordrhein-Westfalen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nurnberger18, author = {Stefan N{\"{u}}rnberger}, title = {Datenverarbeitung im (vernetzten) Fahrzeug}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {79--82}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0898-0}, doi = {10.1007/S11623-018-0898-0}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Nurnberger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri18, author = {Thomas Petri}, title = {Faire und transparente Verarbeitung, Informationsrechte und Rahmenbedingungen f{\"{u}}r ihre Beschr{\"{a}}nkung - zur Auslegung der Art. 12 ff. und 23 {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {347--350}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0954-9}, doi = {10.1007/S11623-018-0954-9}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri18a, author = {Thomas Petri}, title = {Bitte weniger Hysterie im Umgang mit der Datenschutz-Grundverordnung!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {727--728}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1033-y}, doi = {10.1007/S11623-018-1033-Y}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri18b, author = {Thomas Petri}, title = {Kliniken melden Datenschutzverst{\"{o}}{\ss}e nach Art. 33 {DSGVO} - erste Erfahrungen einer Aufsichtsbeh{\"{o}}rde}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {753--757}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1039-5}, doi = {10.1007/S11623-018-1039-5}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petri18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petrlic18, author = {Ronald Petrlic}, title = {{HTTPS} im Lichte der {DSGVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {691--693}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1026-x}, doi = {10.1007/S11623-018-1026-X}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Petrlic18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pfrang18, author = {Sebastian Pfrang}, title = {Die "nicht-dateim{\"{a}}{\ss}ige" Verarbeitung von Besch{\"{a}}ftigtendaten}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {380--382}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0961-x}, doi = {10.1007/S11623-018-0961-X}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pfrang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohle18, author = {J{\"{o}}rg Pohle}, title = {Zur Zeitdimension der Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {19--22}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0884-6}, doi = {10.1007/S11623-018-0884-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Pohle18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann18, author = {Norbert Pohlmann}, title = {Europa treibt die IT-Sicherheit voran}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {203}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0906-4}, doi = {10.1007/S11623-018-0906-4}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR18, author = {Norbert Pohlmann and Rene Riedel}, title = {Strafverfolgung darf die IT-Sicherheit im Internet nicht schw{\"{a}}chen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {37--44}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0888-2}, doi = {10.1007/S11623-018-0888-2}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pollmann18, author = {Maren Pollmann}, title = {Das Marktortprinzip in der {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {383}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0962-9}, doi = {10.1007/S11623-018-0962-9}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pollmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Quiel18, author = {Philipp Quiel}, title = {Blockchain-Technologie im Fokus von Art. 8 {GRC} und {DS-GVO}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {566--573}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1000-7}, doi = {10.1007/S11623-018-1000-7}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Quiel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer18, author = {Helmut Reimer}, title = {Online-Durchsuchung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {5}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0880-x}, doi = {10.1007/S11623-018-0880-X}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Reimer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer18a, author = {Helmut Reimer}, title = {Gro{\ss}sprech: Vorreiter und Vorreiterrolle}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {207}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0907-3}, doi = {10.1007/S11623-018-0907-3}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerSB18, author = {Helmut Reimer and Peter Schaar and Helmut B{\"{a}}umler}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {465--470}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0980-7}, doi = {10.1007/S11623-018-0980-7}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW18, author = {Helmut Reimer and Christoph Wegener}, title = {K{\"{u}}nstliche Intelligenz: Vorsicht Hype!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {599--600}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1007-0}, doi = {10.1007/S11623-018-1007-0}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Riemer18, author = {Dieter Riemer}, title = {Die DONot - ein Nachruf}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {772--776}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1043-9}, doi = {10.1007/S11623-018-1043-9}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Riemer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RobrahnB18, author = {Rasmus Robrahn and Kirsten Bock}, title = {Schutzziele als Optimierungsgebote}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {7--11}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0882-8}, doi = {10.1007/S11623-018-0882-8}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RobrahnB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rocher18, author = {Dror{-}John R{\"{o}}cher}, title = {Cyber Threat Intelligence 101}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {623--628}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1013-2}, doi = {10.1007/S11623-018-1013-2}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rocher18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RohrKG18, author = {Sebastian Rohr and Dennis{-}Kenji Kipker and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {722--726}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1032-z}, doi = {10.1007/S11623-018-1032-Z}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RohrKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel18, author = {Alexander Ro{\ss}nagel}, title = {Nationale Anpassung des Datenschutzrechts}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {471--472}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0981-6}, doi = {10.1007/S11623-018-0981-6}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel18a, author = {Alexander Ro{\ss}nagel}, title = {Kontinuit{\"{a}}t oder Innovation?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {477--481}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0983-4}, doi = {10.1007/S11623-018-0983-4}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel18b, author = {Alexander Ro{\ss}nagel}, title = {Umsetzung der Unionsregelungen zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {741--745}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1037-7}, doi = {10.1007/S11623-018-1037-7}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost18, author = {Martin Rost}, title = {Schutzziele im Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {1}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0879-3}, doi = {10.1007/S11623-018-0879-3}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rost18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost18a, author = {Martin Rost}, title = {Die Ordnung der Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {13--17}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0883-7}, doi = {10.1007/S11623-018-0883-7}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Rost18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost18b, author = {Martin Rost}, title = {K{\"{u}}nstliche Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {558--565}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0999-9}, doi = {10.1007/S11623-018-0999-9}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RothmannB18, author = {Robert Rothmann and Benedikt Buchner}, title = {Der typische Facebook-Nutzer zwischen Recht und Realit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {342--346}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0953-x}, doi = {10.1007/S11623-018-0953-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RothmannB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Saive18, author = {David Saive}, title = {R{\"{u}}ckabwicklung von Blockchain-Transaktionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {764--767}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1041-y}, doi = {10.1007/S11623-018-1041-Y}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Saive18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schadt18, author = {Achim Schadt}, title = {Vernetzung im {OP} - Echtzeitdaten als {\"{a}}rztliche Dokumentation}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {169--173}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0931-3}, doi = {10.1007/S11623-018-0931-3}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schadt18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schael18, author = {Christopher Schael}, title = {K{\"{u}}nstliche Intelligenz in der modernen Gesellschaft}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {547--551}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0997-y}, doi = {10.1007/S11623-018-0997-Y}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schael18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schlehahn18, author = {Eva Schlehahn}, title = {Die Methodik des Standard-Datenschutzmodells im Bereich der {\"{o}}ffentlichen Sicherheit und Justiz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {32--36}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0887-3}, doi = {10.1007/S11623-018-0887-3}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Schlehahn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchroderAW18, author = {Christian Schr{\"{o}}der and Amelie von Alten and Robert Weinhold}, title = {Stolpersteine der {DSGVO} f{\"{u}}r multinationale Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {746--752}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1038-6}, doi = {10.1007/S11623-018-1038-6}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SchroderAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SparenbergP18, author = {Michael Sparenberg and Norbert Pohlmann}, title = {Cybersecurity made in {EU}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {220--223}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0911-7}, doi = {10.1007/S11623-018-0911-7}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SparenbergP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Steffen18, author = {Nils Steffen}, title = {Zivilrechtliche Haftung von Datenschutzbeauftragten f{\"{u}}r Bu{\ss}gelder}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {145--150}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0925-1}, doi = {10.1007/S11623-018-0925-1}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Steffen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Strauss18, author = {Stefan Strau{\ss}}, title = {Identifizierbarkeit in soziotechnischen Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {497--501}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0987-0}, doi = {10.1007/S11623-018-0987-0}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Strauss18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Supervisor18, author = {European Data Protection Supervisor}, title = {{EDPS} calls for consistency in {EU} approach to criminal records}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {68}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0895-3}, doi = {10.1007/S11623-018-0895-3}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Supervisor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tassi18, author = {Smaro Tassi}, title = {Das Verh{\"{a}}ltnis von Sach- und Datenhehlerei}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {165--168}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0930-4}, doi = {10.1007/S11623-018-0930-4}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tassi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Thiel18, author = {Barbara Thiel}, title = {Merkblatt f{\"{u}}r die Nutzung von "WhatsApp" in Unternehmen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {601--602}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1008-z}, doi = {10.1007/S11623-018-1008-Z}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Thiel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld18, author = {Marie{-}Theres Tinnefeld}, title = {Vom Schwein und anderen Querschnittsmaterien in der Union}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {67}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0894-4}, doi = {10.1007/S11623-018-0894-4}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld18a, author = {Marie{-}Theres Tinnefeld}, title = {Herausforderungen im europ{\"{a}}ischen Kulturerbejahr 2018 - einige fragmentarische Betrachtungen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {339--341}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0952-y}, doi = {10.1007/S11623-018-0952-Y}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld18b, author = {Marie{-}Theres Tinnefeld}, title = {Joseph Weizenbaum und die Utopie vom ganzen Menschen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {733}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1034-x}, doi = {10.1007/S11623-018-1034-X}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB18, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Rechtskultur dank EU-Datenschutz?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {335}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0950-0}, doi = {10.1007/S11623-018-0950-0}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke-Caprarese18, author = {Sven Venzke{-}Caprarese}, title = {Haftungsrisiko Webtracking}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {156--158}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0927-z}, doi = {10.1007/S11623-018-0927-Z}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Venzke-Caprarese18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Vosshoff18, author = {Andrea Vo{\ss}hoff}, title = {Dialogkonferenz "Datenschutz f{\"{u}}r Kinder": Belange der Kinder st{\"{a}}rker ber{\"{u}}cksichtigen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {540}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0995-0}, doi = {10.1007/S11623-018-0995-0}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Vosshoff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WachterG18, author = {Michael W{\"{a}}chter and Ludwig Gramlich}, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {531--534}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0992-3}, doi = {10.1007/S11623-018-0992-3}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WachterG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WaltlV18, author = {Bernhard Waltl and Roland Vogl}, title = {Increasing Transparency in Algorithmic- Decision-Making with Explainable {AI}}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {613--617}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1011-4}, doi = {10.1007/S11623-018-1011-4}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WaltlV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WaschetzkiS18, author = {Michael Waschetzki and Martin Steinebach}, title = {Digitale Wasserzeichen in der Kriminalistik}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {69--73}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0896-2}, doi = {10.1007/S11623-018-0896-2}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WaschetzkiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeberRKKSK18, author = {Arnd Weber and Steffen Reith and Michael Kasper and Dirk Kuhlmann and Jean{-}Pierre Seifert and Christoph Krau{\ss}}, title = {Souver{\"{a}}nit{\"{a}}t und die IT-Wertsch{\"{o}}pfungskette}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {291--293}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0943-z}, doi = {10.1007/S11623-018-0943-Z}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WeberRKKSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener18, author = {Christoph Wegener}, title = {Chancen und Risiken intelligenter Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {595}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1006-1}, doi = {10.1007/S11623-018-1006-1}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert18, author = {Thilo Weichert}, title = {Forensische DNA-Analysen und der Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {358--363}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0956-7}, doi = {10.1007/S11623-018-0956-7}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeidenhammerG18, author = {Detlef Weidenhammer and Rocco Gundlach}, title = {Wer kennt den "Stand der Technik"?}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {106--110}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0902-8}, doi = {10.1007/S11623-018-0902-8}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeidenhammerG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wennemann18, author = {Thomas Wennemann}, title = {{TOM} und die Datenschutz-Grundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {174--177}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0932-2}, doi = {10.1007/S11623-018-0932-2}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wennemann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wessels18, author = {Michael Wessels}, title = {Abmahnung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {782}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1045-7}, doi = {10.1007/S11623-018-1045-7}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Wessels18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wojak18, author = {Stefanie Wojak}, title = {Intelligente Kollektiv-Algorithmen in der Personalverwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {553--557}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0998-x}, doi = {10.1007/S11623-018-0998-X}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wojak18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18, title = {94. {DSK} am 08./09. November 2017 in Oldenburg}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {6}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0881-9}, doi = {10.1007/S11623-018-0881-9}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18a, title = {94. Datenschutz-Konferenz am 08./09. November 2017 in Oldenburg - Entschlie{\ss}ungen}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {45--46}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0889-1}, doi = {10.1007/S11623-018-0889-1}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18aa, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {708--715}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1030-1}, doi = {10.1007/S11623-018-1030-1}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18ab, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {11}, pages = {716--722}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1031-0}, doi = {10.1007/S11623-018-1031-0}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18ac, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {783--791}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1046-6}, doi = {10.1007/S11623-018-1046-6}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18ad, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {12}, pages = {792--798}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1047-5}, doi = {10.1007/S11623-018-1047-5}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18b, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {47--53}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0890-8}, doi = {10.1007/S11623-018-0890-8}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18c, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {1}, pages = {54--59}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0891-7}, doi = {10.1007/S11623-018-0891-7}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18d, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {111--120}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0903-7}, doi = {10.1007/S11623-018-0903-7}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18e, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {2}, pages = {121--127}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0904-6}, doi = {10.1007/S11623-018-0904-6}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/X18e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18f, title = {Der Europ{\"{a}}ische Datenschutzausschuss}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {208}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0908-2}, doi = {10.1007/S11623-018-0908-2}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18g, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {254--260}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0918-0}, doi = {10.1007/S11623-018-0918-0}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18h, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {4}, pages = {261--266}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0919-z}, doi = {10.1007/S11623-018-0919-Z}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18i, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {182--192}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0935-z}, doi = {10.1007/S11623-018-0935-Z}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18j, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {3}, pages = {193--199}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0936-y}, doi = {10.1007/S11623-018-0936-Y}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18k, title = {Datenschutz einbauen! - Appell an die Hersteller und Betreiber am Safer Internet Day 2018}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {275--276}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0939-8}, doi = {10.1007/S11623-018-0939-8}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18l, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {318--321}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0948-7}, doi = {10.1007/S11623-018-0948-7}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18m, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {5}, pages = {327--334}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0949-6}, doi = {10.1007/S11623-018-0949-6}, timestamp = {Fri, 25 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18n, title = {Facebook in der Verantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {338}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0951-z}, doi = {10.1007/S11623-018-0951-Z}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18o, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {384--392}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0963-8}, doi = {10.1007/S11623-018-0963-8}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18p, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {6}, pages = {393--400}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0964-7}, doi = {10.1007/S11623-018-0964-7}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18q, title = {95. Datenschutz-Konferenz am 25./26. April 2018 in D{\"{u}}sseldorf}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {447--448}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0977-2}, doi = {10.1007/S11623-018-0977-2}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18r, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {449--459}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0978-1}, doi = {10.1007/S11623-018-0978-1}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18s, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {460--465}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0979-0}, doi = {10.1007/S11623-018-0979-0}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18t, title = {Entschlie{\ss}ung vom 6. Juni 2018}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {476}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0982-5}, doi = {10.1007/S11623-018-0982-5}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18u, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {518--525}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0990-5}, doi = {10.1007/S11623-018-0990-5}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18v, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {8}, pages = {526--531}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0991-4}, doi = {10.1007/S11623-018-0991-4}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18w, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {577--583}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1003-4}, doi = {10.1007/S11623-018-1003-4}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18x, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {9}, pages = {584--590}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1004-3}, doi = {10.1007/S11623-018-1004-3}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18y, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {647--656}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1017-y}, doi = {10.1007/S11623-018-1017-Y}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X18z, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {10}, pages = {657--663}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-1018-x}, doi = {10.1007/S11623-018-1018-X}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X18z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.