Search dblp for Publications

export results for "toc:db/journals/dud/dud42.bht:"

 download as .bib file

@article{DBLP:journals/dud/Banon18,
  author       = {Miguel Ba{\~{n}}{\'{o}}n},
  title        = {Assurance and {IT} Development Paces and Challenges},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {407--410},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0968-3},
  doi          = {10.1007/S11623-018-0968-3},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Banon18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BarchnickiP18,
  author       = {Sebastian Barchnicki and
                  Norbert Pohlmann},
  title        = {Was IT-Sicherheitsindustrie und Anwender voneinander lernen k{\"{o}}nnen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {246--251},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0916-2},
  doi          = {10.1007/S11623-018-0916-2},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BarchnickiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BartelsB18,
  author       = {Karsten U. Bartels and
                  Merlin Backer},
  title        = {Die Ber{\"{u}}cksichtigung des Stands der Technik in der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {214--219},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0910-8},
  doi          = {10.1007/S11623-018-0910-8},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BartelsB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Benzmuller18,
  author       = {Ralf Benzm{\"{u}}ller},
  title        = {Machine Learning und Virenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {224--230},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0912-6},
  doi          = {10.1007/S11623-018-0912-6},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Benzmuller18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeyererMR18,
  author       = {J{\"{u}}rgen Beyerer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Ralf H. Reussner},
  title        = {Karlsruher Thesen zur Digitalen Souver{\"{a}}nit{\"{a}}t
                  Europas},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {277--280},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0940-2},
  doi          = {10.1007/S11623-018-0940-2},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BeyererMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bieker18,
  author       = {Felix Bieker},
  title        = {Die Risikoanalyse nach dem neuen EU-Datenschutzrecht und dem Standard-Datenschutzmodell},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {27--31},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0886-4},
  doi          = {10.1007/S11623-018-0886-4},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bieker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerBH18,
  author       = {Felix Bieker and
                  Benjamin Bremert and
                  Marit Hansen},
  title        = {Die Risikobeurteilung nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {492--496},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0986-1},
  doi          = {10.1007/S11623-018-0986-1},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BiekerBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerBH18a,
  author       = {Felix Bieker and
                  Benjamin Bremert and
                  Marit Hansen},
  title        = {Verantwortlichkeit und Einsatz von Algorithmen bei {\"{o}}ffentlichen
                  Stellen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {608--612},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1010-5},
  doi          = {10.1007/S11623-018-1010-5},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BiekerBH18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BihlmayerEL18,
  author       = {Thomas Bihlmayer and
                  Philipp Ehmann and
                  Henning Lesch},
  title        = {Kommissionsvorschlag zu e-Privacy verhindert Vereinheitlichung des
                  Datenschutzes in Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {241--245},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0915-3},
  doi          = {10.1007/S11623-018-0915-3},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BihlmayerEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BileGW18,
  author       = {Tamer Bile and
                  Ludwig Gramlich and
                  Michael W{\"{a}}chter},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {266--270},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0920-6},
  doi          = {10.1007/S11623-018-0920-6},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BileGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitkom18,
  author       = {Bitkom},
  title        = {Digitale Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {294--300},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0944-y},
  doi          = {10.1007/S11623-018-0944-Y},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bitkom18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann18,
  author       = {Dominik Bleckmann},
  title        = {Wahres Ungl{\"{u}}ck bringt der falsche Wahn},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {136--137},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0922-4},
  doi          = {10.1007/S11623-018-0922-4},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann18a,
  author       = {Dominik Bleckmann},
  title        = {K{\"{u}}nstliche Intelligenz - Fluch oder Segen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {539},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0994-1},
  doi          = {10.1007/S11623-018-0994-1},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckmann18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunHB18,
  author       = {Steffen Braun and
                  Tobias Henzler and
                  Anders Berg},
  title        = {Nutzeridentifikation mit mobilen Endger{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {673--679},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1023-0},
  doi          = {10.1007/S11623-018-1023-0},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BraunHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breyer18,
  author       = {Jonas Breyer},
  title        = {Verarbeitungsgrunds{\"{a}}tze und Rechenschaftspflicht nach Art.
                  5 {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {311--317},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0947-8},
  doi          = {10.1007/S11623-018-0947-8},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Breyer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BroadnaxLMMN18,
  author       = {Brandon Broadnax and
                  Bernhard L{\"{o}}we and
                  Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Nagel},
  title        = {Sicherheit auf festem Fundament},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {74--78},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0897-1},
  doi          = {10.1007/S11623-018-0897-1},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BroadnaxLMMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brockmann18,
  author       = {Hans{-}Christian Brockmann},
  title        = {Effizientes und verantwortungsvolles Datenmanagement im Zeitalter
                  der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {634--639},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1015-0},
  doi          = {10.1007/S11623-018-1015-0},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Brockmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Burri18,
  author       = {Thomas Burri},
  title        = {K{\"{u}}nstliche Intelligenz und internationales Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {603--607},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1009-y},
  doi          = {10.1007/S11623-018-1009-Y},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Burri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18,
  author       = {Conrad Sebastian Conrad},
  title        = {Gilt das Vereinigte K{\"{o}}nigreich k{\"{u}}nftig als ein
                  Drittland?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {159--160},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0928-y},
  doi          = {10.1007/S11623-018-0928-Y},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18a,
  author       = {Conrad Sebastian Conrad},
  title        = {Kann die K{\"{u}}nstliche Intelligenz den Menschen entschl{\"{u}}sseln?
                  - Neue Forderungen zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {541--546},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0996-z},
  doi          = {10.1007/S11623-018-0996-Z},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18b,
  author       = {Conrad Sebastian Conrad},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {798--802},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1048-4},
  doi          = {10.1007/S11623-018-1048-4},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Debski18,
  author       = {Andrzej Debski},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {400--402},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0965-6},
  doi          = {10.1007/S11623-018-0965-6},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Debski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DiepenbrockS18,
  author       = {Andreas Diepenbrock and
                  Sabine Sachweh},
  title        = {Ein konzeptionelles Rahmenwerk f{\"{u}}r die Integration Digitaler
                  Souver{\"{a}}nit{\"{a}}t in Softwarearchitekturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {281--285},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0941-1},
  doi          = {10.1007/S11623-018-0941-1},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DiepenbrockS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DreyerK18,
  author       = {Bastian Dreyer and
                  Gerhard Kramarz{-}von Kohout},
  title        = {Notruf 110 / 112: Technische Richtlinie Notrufverbindungen {(TR} Notruf)
                  2.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {510--517},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0989-y},
  doi          = {10.1007/S11623-018-0989-Y},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DreyerK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dullien18,
  author       = {Thomas Dullien},
  title        = {Maschinelles Lernen und k{\"{u}}nstliche Intelligenz in der Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {618--622},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1012-3},
  doi          = {10.1007/S11623-018-1012-3},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dullien18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurigF18,
  author       = {Markus D{\"{u}}rig and
                  Matthias Fischer},
  title        = {Cybersicherheit in Kritischen Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {209--213},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0909-1},
  doi          = {10.1007/S11623-018-0909-1},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DurigF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtM18,
  author       = {Jens Eckhardt and
                  Konrad Menz},
  title        = {Datenschutz-Grundverordnung: Neuer Schutz - neue Spannungsverh{\"{a}}ltnisse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {131--133},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0921-5},
  doi          = {10.1007/S11623-018-0921-5},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtM18a,
  author       = {Jens Eckhardt and
                  Konrad Menz},
  title        = {Bu{\ss}geldsanktionen der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {139--144},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0924-2},
  doi          = {10.1007/S11623-018-0924-2},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtM18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EsslingerM18,
  author       = {Bernhard Esslinger and
                  Hern{\^{a}}ni Marques},
  title        = {Verfahren und Implementationen von "pretty Easy privacy" (pEp)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {101--105},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0901-9},
  doi          = {10.1007/S11623-018-0901-9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EsslingerM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FerrareseD18,
  author       = {Barbara Ferrarese and
                  Alexander Dix},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {59--62},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0892-6},
  doi          = {10.1007/S11623-018-0892-6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FerrareseD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerT18,
  author       = {Arno Fiedler and
                  Christoph Thiel},
  title        = {Chancen europ{\"{a}}ischer Standards f{\"{u}}r die Zertifizierung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {434--436},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0974-5},
  doi          = {10.1007/S11623-018-0974-5},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerTT18,
  author       = {Arno Fiedler and
                  Christian Thiel and
                  Christoph Thiel},
  title        = {Umsetzung technischer Anforderungen der {DSGVO} mittels eIDAS-VO-konformer
                  Vertrauensdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {236--240},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0914-4},
  doi          = {10.1007/S11623-018-0914-4},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18,
  author       = {Dirk Fox},
  title        = {Stand der Forschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {63},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0893-5},
  doi          = {10.1007/S11623-018-0893-5},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18a,
  author       = {Dirk Fox},
  title        = {Digitale Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {271},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0938-9},
  doi          = {10.1007/S11623-018-0938-9},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18b,
  author       = {Dirk Fox},
  title        = {Modell und Wirklichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {667},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1020-3},
  doi          = {10.1007/S11623-018-1020-3},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18c,
  author       = {Dirk Fox},
  title        = {Des Kaisers neue Kleider},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {671},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1021-2},
  doi          = {10.1007/S11623-018-1021-2},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FumyR18,
  author       = {Walter Fumy and
                  Helmut Reimer},
  title        = {Vertrauen ist gut ... Zertifizierung ist besser!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {403},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0966-5},
  doi          = {10.1007/S11623-018-0966-5},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FumyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn18,
  author       = {Christian L. Geminn},
  title        = {Wissenschaftliche Forschung und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {640--646},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1016-z},
  doi          = {10.1007/S11623-018-1016-Z},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Geminn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerberZHEVH18,
  author       = {Nina Gerber and
                  Verena Zimmermann and
                  Birgit Henhapl and
                  Sinem Emer{\"{o}}z and
                  Melanie Volkamer and
                  Tobias Hilt},
  title        = {Nutzerwahrnehmung der Ende-zu-Ende-Verschl{\"{u}}sselung in WhatsApp},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {680--685},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1024-z},
  doi          = {10.1007/S11623-018-1024-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerberZHEVH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gerhold18,
  author       = {Maximilian Gerhold},
  title        = {40 Jahre {CNIL} - Ein Blick auf den franz{\"{o}}sischen Gendarmen
                  des Privatlebens},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {368--372},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0958-5},
  doi          = {10.1007/S11623-018-0958-5},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gerhold18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GollaHB18,
  author       = {Sebastian J. Golla and
                  Henning Hofmann and
                  Matthias B{\"{a}}cker},
  title        = {Connecting the Dots},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {89--100},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0900-x},
  doi          = {10.1007/S11623-018-0900-X},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GollaHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Golland18,
  author       = {Alexander Golland},
  title        = {Der r{\"{a}}umliche Anwendungsbereich der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {351--357},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0955-8},
  doi          = {10.1007/S11623-018-0955-8},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Golland18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GonscherowskiHR18,
  author       = {Susan Gonscherowski and
                  Marit Hansen and
                  Martin Rost},
  title        = {Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {442--446},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0976-3},
  doi          = {10.1007/S11623-018-0976-3},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GonscherowskiHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichG18,
  author       = {Ludwig Gramlich and
                  Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {199--202},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0937-x},
  doi          = {10.1007/S11623-018-0937-X},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP18,
  author       = {Ludwig Gramlich and
                  Thomas Petri},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {127--130},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0905-5},
  doi          = {10.1007/S11623-018-0905-5},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP18a,
  author       = {Ludwig Gramlich and
                  Thomas Petri},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {663--666},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1019-9},
  doi          = {10.1007/S11623-018-1019-9},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GriesbeckG18,
  author       = {Michael Griesbeck and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {590--594},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1005-2},
  doi          = {10.1007/S11623-018-1005-2},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GriesbeckG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HackenjosMR18,
  author       = {Timon Hackenjos and
                  Jeremias Mechler and
                  Jochen Rill},
  title        = {IT-Sicherheit - ein rechtsfreier Raum?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {286--290},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0942-0},
  doi          = {10.1007/S11623-018-0942-0},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HackenjosMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen18,
  author       = {Marit Hansen},
  title        = {Transparenz der Verwaltung auch beim Einsatz von Algorithmen und K{\"{u}}nstlicher
                  Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {733},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1035-9},
  doi          = {10.1007/S11623-018-1035-9},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hartmann18,
  author       = {Mark Hartmann},
  title        = {Machine Learning und IT-Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {231--235},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0913-5},
  doi          = {10.1007/S11623-018-0913-5},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hartmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hemker18,
  author       = {Thomas Hemker},
  title        = {Machen Maschinen die Welt sicherer?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {629--633},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1014-1},
  doi          = {10.1007/S11623-018-1014-1},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hemker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henseler-UngerH18,
  author       = {Iris Henseler{-}Unger and
                  Annette Hillebrand},
  title        = {Aktuelle Lage der IT-Sicherheit in {KMU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {686--690},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1025-y},
  doi          = {10.1007/S11623-018-1025-Y},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Henseler-UngerH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenV18,
  author       = {Thomas Hoeren and
                  Jonas V{\"{o}}lkel},
  title        = {Informationsabfrage {\"{u}}ber Domain-verantwortliche nach der
                  {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {161--164},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0929-x},
  doi          = {10.1007/S11623-018-0929-X},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoerenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoidnR18,
  author       = {Dominik Hoidn and
                  Alexander Ro{\ss}nagel},
  title        = {Anpassung des Sozialdatenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {487--491},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0985-2},
  doi          = {10.1007/S11623-018-0985-2},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoidnR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Holzel18,
  author       = {Julian H{\"{o}}lzel},
  title        = {Anonymisierungstechniken und das Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {502--509},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0988-z},
  doi          = {10.1007/S11623-018-0988-Z},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Holzel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Humphreys18,
  author       = {Edward Humphreys},
  title        = {The Future Landscape of {ISMS} Standards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {421--423},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0971-8},
  doi          = {10.1007/S11623-018-0971-8},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Humphreys18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HusemannPS18,
  author       = {Charlotte Husemann and
                  Fabian Pittroff and
                  Andreas D. Schulz},
  title        = {Fitness-Tracking als Informationsproblem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {694--700},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1027-9},
  doi          = {10.1007/S11623-018-1027-9},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HusemannPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JakobiSS18,
  author       = {Timo Jakobi and
                  Gunnar Stevens and
                  Anna{-}Magdalena Seufert},
  title        = {Privacy-By-Design f{\"{u}}r das Connected Car: Architekturen
                  aus Verbrauchersicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {704--707},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1029-7},
  doi          = {10.1007/S11623-018-1029-7},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/JakobiSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JakschD18,
  author       = {Christian Jaksch and
                  Gerrit von Daacke},
  title        = {Datenschutzbeauftragter und Datenschutz-Organisation unter der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {758--763},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1040-z},
  doi          = {10.1007/S11623-018-1040-Z},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/JakschD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jensen18,
  author       = {Meiko Jensen},
  title        = {Zur Messbarkeit von Schutzzielen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {23--26},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0885-5},
  doi          = {10.1007/S11623-018-0885-5},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Jensen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KieselmannW18,
  author       = {Olga Kieselmann and
                  Arno Wacker},
  title        = {L{\"{o}}schen im Internet - rechtlich gefordert und technisch
                  m{\"{o}}glich!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {437--441},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0975-4},
  doi          = {10.1007/S11623-018-0975-4},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KieselmannW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker18,
  author       = {Dennis{-}Kenji Kipker},
  title        = {Stellungnahme der {EAID}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {252--253},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0917-1},
  doi          = {10.1007/S11623-018-0917-1},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker18a,
  author       = {Dennis{-}Kenji Kipker},
  title        = {VPN-Tunnelabschaltung und "Chinese Cybersecurity Law"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {574--575},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1001-6},
  doi          = {10.1007/S11623-018-1001-6},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18,
  author       = {Dennis{-}Kenji Kipker and
                  Mattea Stelter},
  title        = {Datenschutz unter MiFID {II}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {364--367},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0957-6},
  doi          = {10.1007/S11623-018-0957-6},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18a,
  author       = {Dennis{-}Kenji Kipker and
                  Dario Scholz},
  title        = {{EU} Cybersecurity-Verordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {701--703},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1028-8},
  doi          = {10.1007/S11623-018-1028-8},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18b,
  author       = {Dennis{-}Kenji Kipker and
                  Dario Scholz},
  title        = {Cybersicherheit und Datenschutz in China},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {768--771},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1042-x},
  doi          = {10.1007/S11623-018-1042-X},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerS18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kohler18,
  author       = {Thomas R. K{\"{o}}hler},
  title        = {Datenschutz im vernetzten Fahrzeug},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {376--379},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0960-y},
  doi          = {10.1007/S11623-018-0960-Y},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kohler18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KowalskiI18,
  author       = {Bernd Kowalski and
                  Matthias Intemann},
  title        = {Perspektiven der IT-Sicherheits-Zertifizierung f{\"{u}}r Europas
                  M{\"{a}}rkte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {415--419},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0970-9},
  doi          = {10.1007/S11623-018-0970-9},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KowalskiI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kranig18,
  author       = {Thomas Kranig},
  title        = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht Verbindliche
                  Datenschutzvorschriften {(BCR)} f{\"{u}}r die Allianz-Gruppe
                  genehmigt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {406},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0967-4},
  doi          = {10.1007/S11623-018-0967-4},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kranig18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann18,
  author       = {Dieter Kugelmann},
  title        = {Die Anpassung der Fachgesetze an die {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {482--486},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0984-3},
  doi          = {10.1007/S11623-018-0984-3},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhnlRS18,
  author       = {Christina K{\"{u}}hnl and
                  Kerstin Rohrer and
                  Nick Kai Schneider},
  title        = {Ein europ{\"{a}}ischer Gesundheitsdatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {735--740},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1036-8},
  doi          = {10.1007/S11623-018-1036-8},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KuhnlRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lachenmann18,
  author       = {Matthias Lachenmann},
  title        = {Bodycams: Nutzung durch private Sicherheitsdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {777--781},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1044-8},
  doi          = {10.1007/S11623-018-1044-8},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lachenmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lander18,
  author       = {Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden des Bundes und der L{\"{a}}nder},
  title        = {Beschluss der {DSK} zu Facebook Fanpages D{\"{u}}sseldorf, 5.
                  September 2018},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {672},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1022-1},
  doi          = {10.1007/S11623-018-1022-1},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lander18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeitoldK18,
  author       = {Herbert Leitold and
                  Daniel Konrad},
  title        = {Erfahrungen aus eIDAS Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {429--433},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0973-6},
  doi          = {10.1007/S11623-018-0973-6},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LeitoldK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lorenz18,
  author       = {Bernd Lorenz},
  title        = {Datenschutzrechtliche Fragen offener E-Mail-Verteiler},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {178--180},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0933-1},
  doi          = {10.1007/S11623-018-0933-1},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lorenz18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarnauBH18,
  author       = {Ninja Marnau and
                  Pascal Berrang and
                  Mathias Humbert},
  title        = {Anonymisierungsverfahren f{\"{u}}r genetische Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {83--88},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0899-z},
  doi          = {10.1007/S11623-018-0899-Z},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MarnauBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MayerKV18,
  author       = {Peter Mayer and
                  Alexandra Kunz and
                  Melanie Volkamer},
  title        = {Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {307--310},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0946-9},
  doi          = {10.1007/S11623-018-0946-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MayerKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18,
  author       = {Britta Alexandra Mester},
  title        = {Haftungsrisiko i. S. d. {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {181},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0934-0},
  doi          = {10.1007/S11623-018-0934-0},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18a,
  author       = {Britta Alexandra Mester},
  title        = {Datenschutzrechtliche Herausforderung der "K{\"{u}}nstlichen
                  Intelligenz" {(KI)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {535},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0993-2},
  doi          = {10.1007/S11623-018-0993-2},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18b,
  author       = {Britta Alexandra Mester},
  title        = {K{\"{u}}nstliche Intelligenz {(KI)} in Zeiten des Datenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {576},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1002-5},
  doi          = {10.1007/S11623-018-1002-5},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mino-VasquezS18,
  author       = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez and
                  Peter Suhren},
  title        = {Liability for injuries according to {GDPR}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {151--155},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0926-0},
  doi          = {10.1007/S11623-018-0926-0},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mino-VasquezS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mitrakas18,
  author       = {Andreas Mitrakas},
  title        = {The emerging {EU} framework on cybersecurity certification},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {411--414},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0969-2},
  doi          = {10.1007/S11623-018-0969-2},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mitrakas18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Msumi18,
  author       = {Mbiki M. Msumi},
  title        = {An Overview of eHealth Regulations in Tanzania},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {373--375},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0959-4},
  doi          = {10.1007/S11623-018-0959-4},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Msumi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NeumannRVKS18,
  author       = {Stephan Neumann and
                  Benjamin Reinheimer and
                  Melanie Volkamer and
                  Alexandra Kunz and
                  Christian Schwartz},
  title        = {Effektiver Schutz vor betr{\"{u}}gerischen Nachrichten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {301--306},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0945-x},
  doi          = {10.1007/S11623-018-0945-X},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/NeumannRVKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen18,
  author       = {Kim Nguyen},
  title        = {Certification of eIDAS trust services and new global transparency
                  trends},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {424--428},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0972-7},
  doi          = {10.1007/S11623-018-0972-7},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nordrhein-Westfalen18,
  author       = {LfDI Nordrhein{-}Westfalen and
                  Helga Block},
  title        = {Datenschutzkonferenz - Nordrhein-Westfalen {\"{u}}bernimmt Vorsitz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {138},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0923-3},
  doi          = {10.1007/S11623-018-0923-3},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nordrhein-Westfalen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nurnberger18,
  author       = {Stefan N{\"{u}}rnberger},
  title        = {Datenverarbeitung im (vernetzten) Fahrzeug},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {79--82},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0898-0},
  doi          = {10.1007/S11623-018-0898-0},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nurnberger18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18,
  author       = {Thomas Petri},
  title        = {Faire und transparente Verarbeitung, Informationsrechte und Rahmenbedingungen
                  f{\"{u}}r ihre Beschr{\"{a}}nkung - zur Auslegung der Art.
                  12 ff. und 23 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {347--350},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0954-9},
  doi          = {10.1007/S11623-018-0954-9},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18a,
  author       = {Thomas Petri},
  title        = {Bitte weniger Hysterie im Umgang mit der Datenschutz-Grundverordnung!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {727--728},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1033-y},
  doi          = {10.1007/S11623-018-1033-Y},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18b,
  author       = {Thomas Petri},
  title        = {Kliniken melden Datenschutzverst{\"{o}}{\ss}e nach Art. 33 {DSGVO}
                  - erste Erfahrungen einer Aufsichtsbeh{\"{o}}rde},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {753--757},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1039-5},
  doi          = {10.1007/S11623-018-1039-5},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petrlic18,
  author       = {Ronald Petrlic},
  title        = {{HTTPS} im Lichte der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {691--693},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1026-x},
  doi          = {10.1007/S11623-018-1026-X},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petrlic18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pfrang18,
  author       = {Sebastian Pfrang},
  title        = {Die "nicht-dateim{\"{a}}{\ss}ige" Verarbeitung von Besch{\"{a}}ftigtendaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {380--382},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0961-x},
  doi          = {10.1007/S11623-018-0961-X},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pfrang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohle18,
  author       = {J{\"{o}}rg Pohle},
  title        = {Zur Zeitdimension der Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {19--22},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0884-6},
  doi          = {10.1007/S11623-018-0884-6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Pohle18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann18,
  author       = {Norbert Pohlmann},
  title        = {Europa treibt die IT-Sicherheit voran},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {203},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0906-4},
  doi          = {10.1007/S11623-018-0906-4},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR18,
  author       = {Norbert Pohlmann and
                  Rene Riedel},
  title        = {Strafverfolgung darf die IT-Sicherheit im Internet nicht schw{\"{a}}chen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {37--44},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0888-2},
  doi          = {10.1007/S11623-018-0888-2},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollmann18,
  author       = {Maren Pollmann},
  title        = {Das Marktortprinzip in der {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {383},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0962-9},
  doi          = {10.1007/S11623-018-0962-9},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pollmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiel18,
  author       = {Philipp Quiel},
  title        = {Blockchain-Technologie im Fokus von Art. 8 {GRC} und {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {566--573},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1000-7},
  doi          = {10.1007/S11623-018-1000-7},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer18,
  author       = {Helmut Reimer},
  title        = {Online-Durchsuchung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {5},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0880-x},
  doi          = {10.1007/S11623-018-0880-X},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer18a,
  author       = {Helmut Reimer},
  title        = {Gro{\ss}sprech: Vorreiter und Vorreiterrolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {207},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0907-3},
  doi          = {10.1007/S11623-018-0907-3},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerSB18,
  author       = {Helmut Reimer and
                  Peter Schaar and
                  Helmut B{\"{a}}umler},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {465--470},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0980-7},
  doi          = {10.1007/S11623-018-0980-7},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW18,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {K{\"{u}}nstliche Intelligenz: Vorsicht Hype!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {599--600},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1007-0},
  doi          = {10.1007/S11623-018-1007-0},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riemer18,
  author       = {Dieter Riemer},
  title        = {Die DONot - ein Nachruf},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {772--776},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1043-9},
  doi          = {10.1007/S11623-018-1043-9},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Riemer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RobrahnB18,
  author       = {Rasmus Robrahn and
                  Kirsten Bock},
  title        = {Schutzziele als Optimierungsgebote},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {7--11},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0882-8},
  doi          = {10.1007/S11623-018-0882-8},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RobrahnB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rocher18,
  author       = {Dror{-}John R{\"{o}}cher},
  title        = {Cyber Threat Intelligence 101},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {623--628},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1013-2},
  doi          = {10.1007/S11623-018-1013-2},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rocher18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RohrKG18,
  author       = {Sebastian Rohr and
                  Dennis{-}Kenji Kipker and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {722--726},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1032-z},
  doi          = {10.1007/S11623-018-1032-Z},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RohrKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Nationale Anpassung des Datenschutzrechts},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {471--472},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0981-6},
  doi          = {10.1007/S11623-018-0981-6},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Kontinuit{\"{a}}t oder Innovation?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {477--481},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0983-4},
  doi          = {10.1007/S11623-018-0983-4},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18b,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Umsetzung der Unionsregelungen zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {741--745},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1037-7},
  doi          = {10.1007/S11623-018-1037-7},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18,
  author       = {Martin Rost},
  title        = {Schutzziele im Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0879-3},
  doi          = {10.1007/S11623-018-0879-3},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rost18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18a,
  author       = {Martin Rost},
  title        = {Die Ordnung der Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {13--17},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0883-7},
  doi          = {10.1007/S11623-018-0883-7},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rost18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18b,
  author       = {Martin Rost},
  title        = {K{\"{u}}nstliche Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {558--565},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0999-9},
  doi          = {10.1007/S11623-018-0999-9},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RothmannB18,
  author       = {Robert Rothmann and
                  Benedikt Buchner},
  title        = {Der typische Facebook-Nutzer zwischen Recht und Realit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {342--346},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0953-x},
  doi          = {10.1007/S11623-018-0953-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RothmannB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Saive18,
  author       = {David Saive},
  title        = {R{\"{u}}ckabwicklung von Blockchain-Transaktionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {764--767},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1041-y},
  doi          = {10.1007/S11623-018-1041-Y},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Saive18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schadt18,
  author       = {Achim Schadt},
  title        = {Vernetzung im {OP} - Echtzeitdaten als {\"{a}}rztliche Dokumentation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {169--173},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0931-3},
  doi          = {10.1007/S11623-018-0931-3},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schadt18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schael18,
  author       = {Christopher Schael},
  title        = {K{\"{u}}nstliche Intelligenz in der modernen Gesellschaft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {547--551},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0997-y},
  doi          = {10.1007/S11623-018-0997-Y},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schael18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlehahn18,
  author       = {Eva Schlehahn},
  title        = {Die Methodik des Standard-Datenschutzmodells im Bereich der {\"{o}}ffentlichen
                  Sicherheit und Justiz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {32--36},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0887-3},
  doi          = {10.1007/S11623-018-0887-3},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schlehahn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchroderAW18,
  author       = {Christian Schr{\"{o}}der and
                  Amelie von Alten and
                  Robert Weinhold},
  title        = {Stolpersteine der {DSGVO} f{\"{u}}r multinationale Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {746--752},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1038-6},
  doi          = {10.1007/S11623-018-1038-6},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchroderAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SparenbergP18,
  author       = {Michael Sparenberg and
                  Norbert Pohlmann},
  title        = {Cybersecurity made in {EU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {220--223},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0911-7},
  doi          = {10.1007/S11623-018-0911-7},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SparenbergP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steffen18,
  author       = {Nils Steffen},
  title        = {Zivilrechtliche Haftung von Datenschutzbeauftragten f{\"{u}}r
                  Bu{\ss}gelder},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {145--150},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0925-1},
  doi          = {10.1007/S11623-018-0925-1},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Steffen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Strauss18,
  author       = {Stefan Strau{\ss}},
  title        = {Identifizierbarkeit in soziotechnischen Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {497--501},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0987-0},
  doi          = {10.1007/S11623-018-0987-0},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Strauss18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Supervisor18,
  author       = {European Data Protection Supervisor},
  title        = {{EDPS} calls for consistency in {EU} approach to criminal records},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {68},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0895-3},
  doi          = {10.1007/S11623-018-0895-3},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Supervisor18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tassi18,
  author       = {Smaro Tassi},
  title        = {Das Verh{\"{a}}ltnis von Sach- und Datenhehlerei},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {165--168},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0930-4},
  doi          = {10.1007/S11623-018-0930-4},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tassi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Thiel18,
  author       = {Barbara Thiel},
  title        = {Merkblatt f{\"{u}}r die Nutzung von "WhatsApp" in Unternehmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {601--602},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1008-z},
  doi          = {10.1007/S11623-018-1008-Z},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Thiel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Vom Schwein und anderen Querschnittsmaterien in der Union},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {67},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0894-4},
  doi          = {10.1007/S11623-018-0894-4},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18a,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Herausforderungen im europ{\"{a}}ischen Kulturerbejahr 2018 -
                  einige fragmentarische Betrachtungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {339--341},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0952-y},
  doi          = {10.1007/S11623-018-0952-Y},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18b,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Joseph Weizenbaum und die Utopie vom ganzen Menschen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {733},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1034-x},
  doi          = {10.1007/S11623-018-1034-X},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB18,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Rechtskultur dank EU-Datenschutz?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {335},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0950-0},
  doi          = {10.1007/S11623-018-0950-0},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese18,
  author       = {Sven Venzke{-}Caprarese},
  title        = {Haftungsrisiko Webtracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {156--158},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0927-z},
  doi          = {10.1007/S11623-018-0927-Z},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke-Caprarese18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vosshoff18,
  author       = {Andrea Vo{\ss}hoff},
  title        = {Dialogkonferenz "Datenschutz f{\"{u}}r Kinder": Belange der Kinder
                  st{\"{a}}rker ber{\"{u}}cksichtigen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {540},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0995-0},
  doi          = {10.1007/S11623-018-0995-0},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Vosshoff18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterG18,
  author       = {Michael W{\"{a}}chter and
                  Ludwig Gramlich},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {531--534},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0992-3},
  doi          = {10.1007/S11623-018-0992-3},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WachterG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WaltlV18,
  author       = {Bernhard Waltl and
                  Roland Vogl},
  title        = {Increasing Transparency in Algorithmic- Decision-Making with Explainable
                  {AI}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {613--617},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1011-4},
  doi          = {10.1007/S11623-018-1011-4},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WaltlV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WaschetzkiS18,
  author       = {Michael Waschetzki and
                  Martin Steinebach},
  title        = {Digitale Wasserzeichen in der Kriminalistik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {69--73},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0896-2},
  doi          = {10.1007/S11623-018-0896-2},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WaschetzkiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeberRKKSK18,
  author       = {Arnd Weber and
                  Steffen Reith and
                  Michael Kasper and
                  Dirk Kuhlmann and
                  Jean{-}Pierre Seifert and
                  Christoph Krau{\ss}},
  title        = {Souver{\"{a}}nit{\"{a}}t und die IT-Wertsch{\"{o}}pfungskette},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {291--293},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0943-z},
  doi          = {10.1007/S11623-018-0943-Z},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WeberRKKSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener18,
  author       = {Christoph Wegener},
  title        = {Chancen und Risiken intelligenter Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {595},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1006-1},
  doi          = {10.1007/S11623-018-1006-1},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert18,
  author       = {Thilo Weichert},
  title        = {Forensische DNA-Analysen und der Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {358--363},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0956-7},
  doi          = {10.1007/S11623-018-0956-7},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeidenhammerG18,
  author       = {Detlef Weidenhammer and
                  Rocco Gundlach},
  title        = {Wer kennt den "Stand der Technik"?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {106--110},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0902-8},
  doi          = {10.1007/S11623-018-0902-8},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeidenhammerG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wennemann18,
  author       = {Thomas Wennemann},
  title        = {{TOM} und die Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {174--177},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0932-2},
  doi          = {10.1007/S11623-018-0932-2},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wennemann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wessels18,
  author       = {Michael Wessels},
  title        = {Abmahnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {782},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1045-7},
  doi          = {10.1007/S11623-018-1045-7},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wessels18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wojak18,
  author       = {Stefanie Wojak},
  title        = {Intelligente Kollektiv-Algorithmen in der Personalverwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {553--557},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0998-x},
  doi          = {10.1007/S11623-018-0998-X},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wojak18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18,
  title        = {94. {DSK} am 08./09. November 2017 in Oldenburg},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {6},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0881-9},
  doi          = {10.1007/S11623-018-0881-9},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18a,
  title        = {94. Datenschutz-Konferenz am 08./09. November 2017 in Oldenburg -
                  Entschlie{\ss}ungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {45--46},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0889-1},
  doi          = {10.1007/S11623-018-0889-1},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18aa,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {708--715},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1030-1},
  doi          = {10.1007/S11623-018-1030-1},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18ab,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {11},
  pages        = {716--722},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1031-0},
  doi          = {10.1007/S11623-018-1031-0},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18ac,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {783--791},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1046-6},
  doi          = {10.1007/S11623-018-1046-6},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18ad,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {12},
  pages        = {792--798},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1047-5},
  doi          = {10.1007/S11623-018-1047-5},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18b,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {47--53},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0890-8},
  doi          = {10.1007/S11623-018-0890-8},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18c,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {1},
  pages        = {54--59},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0891-7},
  doi          = {10.1007/S11623-018-0891-7},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18d,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {111--120},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0903-7},
  doi          = {10.1007/S11623-018-0903-7},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18e,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {2},
  pages        = {121--127},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0904-6},
  doi          = {10.1007/S11623-018-0904-6},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X18e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18f,
  title        = {Der Europ{\"{a}}ische Datenschutzausschuss},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {208},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0908-2},
  doi          = {10.1007/S11623-018-0908-2},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18g,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {254--260},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0918-0},
  doi          = {10.1007/S11623-018-0918-0},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18h,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {4},
  pages        = {261--266},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0919-z},
  doi          = {10.1007/S11623-018-0919-Z},
  timestamp    = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18i,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {182--192},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0935-z},
  doi          = {10.1007/S11623-018-0935-Z},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18j,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {3},
  pages        = {193--199},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0936-y},
  doi          = {10.1007/S11623-018-0936-Y},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18k,
  title        = {Datenschutz einbauen! - Appell an die Hersteller und Betreiber am
                  Safer Internet Day 2018},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {275--276},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0939-8},
  doi          = {10.1007/S11623-018-0939-8},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18l,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {318--321},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0948-7},
  doi          = {10.1007/S11623-018-0948-7},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18m,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {5},
  pages        = {327--334},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0949-6},
  doi          = {10.1007/S11623-018-0949-6},
  timestamp    = {Fri, 25 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18n,
  title        = {Facebook in der Verantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {338},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0951-z},
  doi          = {10.1007/S11623-018-0951-Z},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18o,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {384--392},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0963-8},
  doi          = {10.1007/S11623-018-0963-8},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18p,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {6},
  pages        = {393--400},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0964-7},
  doi          = {10.1007/S11623-018-0964-7},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18q,
  title        = {95. Datenschutz-Konferenz am 25./26. April 2018 in D{\"{u}}sseldorf},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {447--448},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0977-2},
  doi          = {10.1007/S11623-018-0977-2},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18r,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {449--459},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0978-1},
  doi          = {10.1007/S11623-018-0978-1},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18s,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {460--465},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0979-0},
  doi          = {10.1007/S11623-018-0979-0},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18t,
  title        = {Entschlie{\ss}ung vom 6. Juni 2018},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {476},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0982-5},
  doi          = {10.1007/S11623-018-0982-5},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18u,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {518--525},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0990-5},
  doi          = {10.1007/S11623-018-0990-5},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18v,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {8},
  pages        = {526--531},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0991-4},
  doi          = {10.1007/S11623-018-0991-4},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18w,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {577--583},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1003-4},
  doi          = {10.1007/S11623-018-1003-4},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18x,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {9},
  pages        = {584--590},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1004-3},
  doi          = {10.1007/S11623-018-1004-3},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18y,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {647--656},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1017-y},
  doi          = {10.1007/S11623-018-1017-Y},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18z,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {10},
  pages        = {657--663},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-1018-x},
  doi          = {10.1007/S11623-018-1018-X},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X18z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}