Search dblp for Publications

export results for "stream:streams/journals/dud:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/dud/AndresenD22,
  author    = {S{\"{u}}nje Andresen and
               Stephan Dreyer},
  title     = {Die Rolle der Eltern bei der datenschutzrechtlichen Einwilligung f{\"{u}}r
               ihre Kinder},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {361--366},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1620-9},
  doi       = {10.1007/s11623-022-1620-9},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/AndresenD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Aretz22,
  author    = {Christian Aretz},
  title     = {Der Souver{\"{a}}n in der Krise},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {40--44},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1558-y},
  doi       = {10.1007/s11623-022-1558-y},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Aretz22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BerningerR22,
  author    = {Marc Berninger and
               Bastian Raunecker},
  title     = {Kapitalmarktseitige Konsequenzen von Rechtsverst{\"{o}}{\ss}en
               gegen die {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {164--173},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1582-y},
  doi       = {10.1007/s11623-022-1582-y},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BerningerR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BessantS22,
  author    = {Claire Bessant and
               Maximilian Schnebbe},
  title     = {Does the {GDPR} offer a solution to the 'problem' of sharenting?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {352--356},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1618-3},
  doi       = {10.1007/s11623-022-1618-3},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BessantS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {243--252},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1597-4},
  doi       = {10.1007/s11623-022-1597-4},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22a,
  author    = {Benedikt Buchner},
  title     = {Kinder im Netz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {333},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1613-8},
  doi       = {10.1007/s11623-022-1613-8},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner22b,
  author    = {Benedikt Buchner},
  title     = {Forschungsdaten effektiver nutzen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {555--560},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1658-8},
  doi       = {10.1007/s11623-022-1658-8},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner22b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BurgdorfJ22,
  author    = {Milan Burgdorf and
               Kai Jendria},
  title     = {{ISO} 27002 revisited},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {301--304},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1607-6},
  doi       = {10.1007/s11623-022-1607-6},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BurgdorfJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CejvanovicDHS22,
  author    = {Jasmina Cejvanovic and
               Ann{-}Kristin Derst and
               Maik Horz and
               Steffen Schwalm},
  title     = {Rechtssicheres ersetzendes Scannen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {432--438},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1634-3},
  doi       = {10.1007/s11623-022-1634-3},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/CejvanovicDHS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterP22,
  author    = {Ulla Coester and
               Norbert Pohlmann},
  title     = {Vertrauensw{\"{u}}rdigkeit schafft Vertrauen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {233--238},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1594-7},
  doi       = {10.1007/s11623-022-1594-7},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/CoesterP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurmusES22,
  author    = {Erdem Durmus and
               Jens Engelhardt and
               Annika Selzer},
  title     = {Kontrollen bei Auftragsverarbeitern},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {487--492},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1645-0},
  doi       = {10.1007/s11623-022-1645-0},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DurmusES22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dyroff22,
  author    = {Daniel Dyroff},
  title     = {Lebenszyklusmanagement von digitalen Zertifikaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {225--226},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1592-9},
  doi       = {10.1007/s11623-022-1592-9},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Dyroff22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EinzingerRF22,
  author    = {Christoph Einzinger and
               Christian R{\"{u}}ckert and
               Felix C. Freiling},
  title     = {Datenminimierung in der Netzwerkforensik},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {149--155},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1580-0},
  doi       = {10.1007/s11623-022-1580-0},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EntschewHBN22,
  author    = {Enrico Entschew and
               Kirk Hall and
               Chris Bailey and
               Kim Nguyen},
  title     = {A New eIDAS Beginning for QWACs},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {217--224},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1591-x},
  doi       = {10.1007/s11623-022-1591-x},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EntschewHBN22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber22,
  author    = {Eberhard von Faber},
  title     = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {45--51},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1559-x},
  doi       = {10.1007/s11623-022-1559-x},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Faber22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerG22,
  author    = {Arno Fiedler and
               Franziska Granc},
  title     = {Nationale und europ{\"{a}}ische Sicht auf eIDAS 2.0 - Aufwand
               und Nutzen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {27--31},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1556-0},
  doi       = {10.1007/s11623-022-1556-0},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerGN22,
  author    = {Arno Fiedler and
               Ernst{-}G{\"{u}}nter Giessmann and
               Kim Nguyen},
  title     = {Die Bedeutung von {PKI} - Gestern, Heute und Morgen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {209--214},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1589-4},
  doi       = {10.1007/s11623-022-1589-4},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerGN22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Folkerts22,
  author    = {Elena Folkerts},
  title     = {Wirklich freiwillig?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {77--80},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1565-z},
  doi       = {10.1007/s11623-022-1565-z},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Folkerts22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22,
  author    = {Dirk Fox},
  title     = {Pr{\"{u}}fstand},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {133},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1576-9},
  doi       = {10.1007/s11623-022-1576-9},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22a,
  author    = {Dirk Fox},
  title     = {Zero Trust},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {174--175},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1583-x},
  doi       = {10.1007/s11623-022-1583-x},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox22b,
  author    = {Dirk Fox},
  title     = {Warnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {265},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1600-0},
  doi       = {10.1007/s11623-022-1600-0},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox22b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FriedewaldRBGHB22,
  author    = {Michael Friedewald and
               Alexander Ro{\ss}nagel and
               Tamer Bile and
               Christian L. Geminn and
               Marit Hansen and
               Felix Bieker and
               Murat Karaboga},
  title     = {Zur Einf{\"{u}}hrung einer {\"{U}}berwachungs-Gesamtrechnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {572--577},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1661-0},
  doi       = {10.1007/s11623-022-1661-0},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FriedewaldRBGHB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeminnT22,
  author    = {Christian Geminn and
               Marie{-}Theres Tinnefeld},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {327--332},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1612-9},
  doi       = {10.1007/s11623-022-1612-9},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GeminnT22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gotz22,
  author    = {Isabell G{\"{o}}tz},
  title     = {Lach' doch mal!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {357--360},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1619-2},
  doi       = {10.1007/s11623-022-1619-2},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gotz22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich22,
  author    = {Ludwig Gramlich},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {261--264},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1599-2},
  doi       = {10.1007/s11623-022-1599-2},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gramlich22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP22,
  author    = {Ludwig Gramlich and
               Ronald Petrlic},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {532--536},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1653-0},
  doi       = {10.1007/s11623-022-1653-0},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GramlichP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GruberF22,
  author    = {Jan Gruber and
               Felix C. Freiling},
  title     = {Fighting Evasive Malware},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {284--290},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1604-9},
  doi       = {10.1007/s11623-022-1604-9},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GruberF22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HamacherKLBHSMW22,
  author    = {Kay Hamacher and
               Tobias Kussel and
               Tatiana von Landesberger and
               Tom Baumgartl and
               Markus H{\"{o}}hn and
               Simone Scheithauer and
               Michael Marschollek and
               Antje Wulff},
  title     = {Fallzahlen, Re-Identifikation und der technische Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {143--148},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1579-6},
  doi       = {10.1007/s11623-022-1579-6},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HamacherKLBHSMW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22,
  author    = {Marit Hansen},
  title     = {{ULD:} 40. T{\"{a}}tigkeitsbericht 2021},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {268},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1601-z},
  doi       = {10.1007/s11623-022-1601-z},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hansen22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen22a,
  author    = {Marit Hansen},
  title     = {Deutschlands Plan zur St{\"{a}}rkung der B{\"{u}}rgerrechte
               im digitalen Raum},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {550--554},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1657-9},
  doi       = {10.1007/s11623-022-1657-9},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hansen22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HillebrandSP22,
  author    = {Annette Hillebrand and
               Jana Stuck and
               Pirmin Puhl},
  title     = {Vertrauen in Datenverarbeitung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {493--498},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1646-z},
  doi       = {10.1007/s11623-022-1646-z},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HillebrandSP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Horlbeck22,
  author    = {Katja Horlbeck},
  title     = {Besch{\"{a}}ftigtendatenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {567--571},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1660-1},
  doi       = {10.1007/s11623-022-1660-1},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Horlbeck22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hornung22,
  author    = {Gerrit Hornung},
  title     = {KI-Regulierung im Mehrebenensystem},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {561--566},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1659-7},
  doi       = {10.1007/s11623-022-1659-7},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hornung22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HornungSSZ22,
  author    = {Gerrit Hornung and
               Matthias S{\"{o}}llner and
               Jan{-}Philipp Stroscher and
               Eva{-}Maria Zahn},
  title     = {Kollaboration im Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {384--389},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1625-4},
  doi       = {10.1007/s11623-022-1625-4},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HornungSSZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoeB22,
  author    = {Alicia Joe and
               Benedikt Buchner},
  title     = {Kinder als digitales Freiwild},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {381--383},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1624-5},
  doi       = {10.1007/s11623-022-1624-5},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JoeB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoosM22,
  author    = {Daniel Joos and
               Kristof Meding},
  title     = {Anforderungen bei der Einf{\"{u}}hrung und Entwicklung von {KI}
               zur Gew{\"{a}}hrleistung von Fairness und Diskriminierungsfreiheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {376--380},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1623-6},
  doi       = {10.1007/s11623-022-1623-6},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JoosM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JoosN22,
  author    = {Daniel Joos and
               Peter N{\"{a}}gele},
  title     = {Verarbeitung personenbezogener Echtdaten zur Netz- und Informationssicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {578--583},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1662-z},
  doi       = {10.1007/s11623-022-1662-z},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JoosN22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22,
  author    = {Ulrich Kelber},
  title     = {Die {DSK} st{\"{a}}rkt die informationelle Selbstbestimmung und
               der {EDSA} gibt den Betroffenenrechten der {DSGVO} einen verbindlichen
               Rahmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {136},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1577-8},
  doi       = {10.1007/s11623-022-1577-8},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22a,
  author    = {Ulrich Kelber},
  title     = {Koordinierte Durchsetzung durch 22 Aufsichtsbeh{\"{o}}rden zur
               Nutzung von Cloud-Diensten durch den {\"{o}}ffentlichen Sektor},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {200},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1587-6},
  doi       = {10.1007/s11623-022-1587-6},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber22b,
  author    = {Ulrich Kelber},
  title     = {Mastodon: Datenschutzfreundliche Twitter-Alternative},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {412},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1630-7},
  doi       = {10.1007/s11623-022-1630-7},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber22b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koch22,
  author    = {Manuel Koch},
  title     = {Telematikinfrastruktur 2.0 - Verhindern von missbr{\"{a}}uchlicher
               Profilbildung durch {PET}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {427--431},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1633-4},
  doi       = {10.1007/s11623-022-1633-4},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Koch22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KronkeT22,
  author    = {Christoph Kr{\"{o}}nke and
               Elissa Tschachler},
  title     = {Ein Opt-out f{\"{u}}r die elektronische Patientenakte (ePA)},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {419--426},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1632-5},
  doi       = {10.1007/s11623-022-1632-5},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KronkeT22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kudra22,
  author    = {Andre Kudra},
  title     = {Self-Sovereign Identity {(SSI)} in Deutschland},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {22--26},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1555-1},
  doi       = {10.1007/s11623-022-1555-1},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kudra22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KudraSS22,
  author    = {Andre Kudra and
               Christian Seegebarth and
               Steffen Schwalm},
  title     = {Ein digitaler Vertrauensraum f{\"{u}}r Identit{\"{a}}ten
               und Dienste - Europa ist auf dem richtigen Weg},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {9--11},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1552-4},
  doi       = {10.1007/s11623-022-1552-4},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KudraSS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KusberSKE22,
  author    = {Tomasz Kusber and
               Steffen Schwalm and
               Ulrike Korte and
               Mario Engel},
  title     = {Langfristige Beweissicherheit und Vertrauensw{\"{u}}rdigkeit
               digitaler Unterlagen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {32--39},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1557-z},
  doi       = {10.1007/s11623-022-1557-z},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KusberSKE22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutscher22,
  author    = {Nadia Kutscher},
  title     = {Sharenting als familialer Alltag},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {346--351},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1617-4},
  doi       = {10.1007/s11623-022-1617-4},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kutscher22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LefferW22,
  author    = {Lena Leffer and
               Michelle Weber},
  title     = {Technische und strafrechtliche Implikationen des unbemerkten Einsatzes
               von AirTags},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {137--142},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1578-7},
  doi       = {10.1007/s11623-022-1578-7},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/LefferW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LehrDKV22,
  author    = {Franz Lehr and
               Heike Dietmann and
               Chiara Krisam and
               Melanie Volkamer},
  title     = {Manipulative Designs von Cookies},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {296--300},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1606-7},
  doi       = {10.1007/s11623-022-1606-7},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LehrDKV22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeichtH22,
  author    = {Maximilian Leicht and
               Stefan Hessel},
  title     = {Datenschutzrechtliche Verantwortlichkeit in der Forschung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {305--309},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1608-5},
  doi       = {10.1007/s11623-022-1608-5},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LeichtH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Liptak22,
  author    = {Patrick Liptak},
  title     = {Ein neuer Rahmen f{\"{u}}r eine europ{\"{a}}ische digitale
               Identit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {18--21},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1554-2},
  doi       = {10.1007/s11623-022-1554-2},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Liptak22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester22,
  author    = {Britta Alexandra Mester},
  title     = {Besch{\"{a}}ftigtendatenschutz - Digitale Arbeitswelten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {73},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1563-1},
  doi       = {10.1007/s11623-022-1563-1},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Mester22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mollik22,
  author    = {Mirko Mollik},
  title     = {Blockchain als sicheres Register},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {201--208},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1588-5},
  doi       = {10.1007/s11623-022-1588-5},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mollik22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MullerRWWH22,
  author    = {Robin M{\"{u}}ller and
               Julius Ruppert and
               Katharina Will and
               Lukas W{\"{u}}steney and
               Tobias Heer},
  title     = {Analyzing the Software Patch Discipline Across Different Industries
               and Countries},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {269--275},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1602-y},
  doi       = {10.1007/s11623-022-1602-y},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MullerRWWH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen22,
  author    = {Kim Nguyen},
  title     = {Sichere elektronische Identit{\"{a}}t - ein Ziel f{\"{u}}r
               Europa!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {1},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1549-z},
  doi       = {10.1007/s11623-022-1549-z},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Nguyen22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PeeckhausS22,
  author    = {Martin Peeckhaus and
               Klaus Schmeh},
  title     = {Benutzerfreundliche Mail-Verschl{\"{u}}sselung bei einer Bundesbeh{\"{o}}rde},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {444--447},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1636-1},
  doi       = {10.1007/s11623-022-1636-1},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PeeckhausS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri22,
  author    = {Thomas Petri},
  title     = {Die prim{\"{a}}re und sekund{\"{a}}re Nutzung elektronischer
               Gesundheitsdaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {413--418},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1631-6},
  doi       = {10.1007/s11623-022-1631-6},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Petri22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann22,
  author    = {Norbert Pohlmann},
  title     = {Vertrauensw{\"{u}}rdige IT-Infrastrukturen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {197},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1586-7},
  doi       = {10.1007/s11623-022-1586-7},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Pohlmann22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR22,
  author    = {Norbert Pohlmann and
               Helmut Reimer},
  title     = {Cyber-Sicherheit - gemeinsam Grenzen {\"{u}}berwinden},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {242},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1596-5},
  doi       = {10.1007/s11623-022-1596-5},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PohlmannR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RehbohmKCS22,
  author    = {Thomas Rehbohm and
               Robin Kemmerich and
               Clemens H. Cap and
               Kurt Sandkuhl},
  title     = {Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische
               Studie in deutschen Kommunen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {448--454},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1637-0},
  doi       = {10.1007/s11623-022-1637-0},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/RehbohmKCS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer22,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {253--260},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1598-3},
  doi       = {10.1007/s11623-022-1598-3},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rosenberger22,
  author    = {Nadine Rosenberger},
  title     = {Bewerberscreening unter Geltung der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {87--92},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1567-x},
  doi       = {10.1007/s11623-022-1567-x},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rosenberger22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Verbessert die Ampel-Koalition den Datenschutz?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {537--538},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1654-z},
  doi       = {10.1007/s11623-022-1654-z},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22a,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Datenschutzanforderungen an Videokonferenzsysteme},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {543--544},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1655-y},
  doi       = {10.1007/s11623-022-1655-y},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel22b,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Internationaler Datentransfer},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {545--549},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1656-x},
  doi       = {10.1007/s11623-022-1656-x},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel22b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelGJM22,
  author    = {Alexander Ro{\ss}nagel and
               Christian L. Geminn and
               Paul C. Johannes and
               Johannes K. M. M{\"{u}}ller},
  title     = {Auswirkungen ausl{\"{a}}ndischer Gesetzgebung auf die deutsche
               Cybersicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {156--163},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1581-z},
  doi       = {10.1007/s11623-022-1581-z},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RossnagelGJM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossow22,
  author    = {Olaf Rossow},
  title     = {Datenschutz beim Betriebsrat},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {81--86},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1566-y},
  doi       = {10.1007/s11623-022-1566-y},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rossow22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossow22a,
  author    = {Olaf Rossow},
  title     = {Arbeitgeber und das Fernmeldegeheimnis nach dem {TTDSG}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {93--97},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1568-9},
  doi       = {10.1007/s11623-022-1568-9},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rossow22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SaatjohannIGNSK22,
  author    = {Christoph Saatjohann and
               Fabian Ising and
               Matthias Gierlings and
               Dominik Noss and
               Sascha Schimmler and
               Alexander Klemm and
               Leif Grundmann and
               Tilman Frosch and
               Sebastian Schinzel},
  title     = {Sicherheit medizintechnischer Protokolle im Krankenhaus},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {276--283},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1603-x},
  doi       = {10.1007/s11623-022-1603-x},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SaatjohannIGNSK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Salemi22,
  author    = {Simone Salemi},
  title     = {Chancen und Risiken von {PIMS} nach {\textsection} 26 {TTDSG}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {505--510},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1648-x},
  doi       = {10.1007/s11623-022-1648-x},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Salemi22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchaarschmidtSS22,
  author    = {Konstantin Schaarschmidt and
               Martin Schallbruch and
               Stefan Schuck},
  title     = {Digitale Brieftaschen f{\"{u}}r sichere Identit{\"{a}}ten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {12--17},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1553-3},
  doi       = {10.1007/s11623-022-1553-3},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchaarschmidtSS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schellhas-Mende22,
  author    = {Friederike Schellhas{-}Mende and
               Nils Wiedemann and
               Nicolas Blum},
  title     = {Videokonferenzsysteme als Telekommunikationsdienst},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {291--295},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1605-8},
  doi       = {10.1007/s11623-022-1605-8},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schellhas-Mende22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmehE22,
  author    = {Klaus Schmeh and
               Matthias Edelhoff},
  title     = {{S/MIME} und {PGP} im selben Client},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {439--443},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1635-2},
  doi       = {10.1007/s11623-022-1635-2},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchmehE22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe22,
  author    = {Maximilian Schnebbe},
  title     = {Minderj{\"{a}}hrigenschutz in der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {367--370},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1621-8},
  doi       = {10.1007/s11623-022-1621-8},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schnebbe22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchurmannB22,
  author    = {Kathrin Sch{\"{u}}rmann and
               Jan O. Baier},
  title     = {Schadensersatzanspr{\"{u}}che im Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {103--106},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1570-2},
  doi       = {10.1007/s11623-022-1570-2},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchurmannB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seegebarth22,
  author    = {Christian Seegebarth},
  title     = {eIDAS-Novellierung 2021 - erste Analyse des Proposals},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {5--8},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1551-5},
  doi       = {10.1007/s11623-022-1551-5},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Seegebarth22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stapf22,
  author    = {Ingrid Stapf},
  title     = {Das Recht auf eine offene Zukunft},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {339--345},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1616-5},
  doi       = {10.1007/s11623-022-1616-5},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Stapf22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld22,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Grundrechtsschutz: Antworten auf pandemiebedingte Einschr{\"{a}}nkungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {336--337},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1614-7},
  doi       = {10.1007/s11623-022-1614-7},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vasquez22,
  author    = {Sheila Vasquez},
  title     = {Privacy by Design und das autonome Fahrzeug},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {98--102},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1569-8},
  doi       = {10.1007/s11623-022-1569-8},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Vasquez22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vassilaki22,
  author    = {Irini E. Vassilaki},
  title     = {Anleitung zu sexuellem Missbrauch von Kindern gem. {\textsection}
               176e StGB},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {107--110},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1571-1},
  doi       = {10.1007/s11623-022-1571-1},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Vassilaki22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22,
  author    = {Thilo Weichert},
  title     = {Anmerkung zum Urteil des {OVG} Schleswig-Holstein vom 25.11.2021 -
               Unzul{\"{a}}ssigkeit einer Facebook-Fanpage},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {239--241},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1595-6},
  doi       = {10.1007/s11623-022-1595-6},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22a,
  author    = {Thilo Weichert},
  title     = {Die Ernennung von Mitgliedern nach Art. 53 {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {371--375},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1622-7},
  doi       = {10.1007/s11623-022-1622-7},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert22b,
  author    = {Thilo Weichert},
  title     = {Was das Abtreibungsrecht in den {USA} mit Datenschutz zu tun hat},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {511--515},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1649-9},
  doi       = {10.1007/s11623-022-1649-9},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert22b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weiss22,
  author    = {Andreas Weiss},
  title     = {Gaia-X - Grundlagen f{\"{u}}r den Aufbau f{\"{o}}derierter,
               digitaler {\"{O}}kosysteme nach europ{\"{a}}ischen Regeln},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {227--232},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1593-8},
  doi       = {10.1007/s11623-022-1593-8},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weiss22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wichmann22,
  author    = {Markus Wichmann},
  title     = {TeleTrusT European Bridge {CA}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {4},
  pages     = {215--216},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1590-y},
  doi       = {10.1007/s11623-022-1590-y},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wichmann22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Will22,
  author    = {Michael Will},
  title     = {E-Mail-Accounts im Visier von Cyberkriminellen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {485--486},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1644-1},
  doi       = {10.1007/s11623-022-1644-1},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Will22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wonnemann22,
  author    = {Claus Wonnemann},
  title     = {Cyber-Security entlang der IoT-Lieferkette},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {455--458},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1638-z},
  doi       = {10.1007/s11623-022-1638-z},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wonnemann22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22,
  title     = {Verarbeitungen des Datums , , Impfstatus" von Besch{\"{a}}ftigten
               durch die Arbeitgeberin oder den Arbeitgeber},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {4},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1550-6},
  doi       = {10.1007/s11623-022-1550-6},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22a,
  title     = {{\"{O}}ffentliche Verwaltung - Digitalisierung 2022},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {52},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1560-4},
  doi       = {10.1007/s11623-022-1560-4},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22aa,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {584--591},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1663-y},
  doi       = {10.1007/s11623-022-1663-y},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22aa.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22ab,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {9},
  pages     = {592--600},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1664-x},
  doi       = {10.1007/s11623-022-1664-x},
  timestamp = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22ab.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22b,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {53--63},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1561-3},
  doi       = {10.1007/s11623-022-1561-3},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22c,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {1},
  pages     = {64--72},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1562-2},
  doi       = {10.1007/s11623-022-1562-2},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22d,
  title     = {{DSK:} Neue Orientierungshilfe f{\"{u}}r Anbieter: innen von
               Telemedien},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {76},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1564-0},
  doi       = {10.1007/s11623-022-1564-0},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22e,
  title     = {Whistleblowing - Fehlende Umsetzung einer EU-Richtlinie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {111--112},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1572-0},
  doi       = {10.1007/s11623-022-1572-0},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22f,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {113--121},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1573-z},
  doi       = {10.1007/s11623-022-1573-z},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22g,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {122--128},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1574-y},
  doi       = {10.1007/s11623-022-1574-y},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22h,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {2},
  pages     = {128--132},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1575-x},
  doi       = {10.1007/s11623-022-1575-x},
  timestamp = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22i,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {176--186},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1584-9},
  doi       = {10.1007/s11623-022-1584-9},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22j,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {3},
  pages     = {187--196},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1585-8},
  doi       = {10.1007/s11623-022-1585-8},
  timestamp = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X22j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22k,
  title     = {103. Datenschutzkonferenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {310--311},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1609-4},
  doi       = {10.1007/s11623-022-1609-4},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22k.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22l,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {312--318},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1610-y},
  doi       = {10.1007/s11623-022-1610-y},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22l.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22m,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {5},
  pages     = {319--327},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1611-x},
  doi       = {10.1007/s11623-022-1611-x},
  timestamp = {Thu, 19 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22m.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22n,
  title     = {Information zur Nutzung von Facebook-Fanpages},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {338},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1615-6},
  doi       = {10.1007/s11623-022-1615-6},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22n.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22o,
  title     = {Einwilligung eines Kindes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {390},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1626-3},
  doi       = {10.1007/s11623-022-1626-3},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22o.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22p,
  title     = {Einwilligung eines Kindes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {391--398},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1627-2},
  doi       = {10.1007/s11623-022-1627-2},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22p.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22q,
  title     = {DuD Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {6},
  pages     = {399--408},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1628-1},
  doi       = {10.1007/s11623-022-1628-1},
  timestamp = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22q.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22r,
  title     = {Digitalisierung ist kein Selbstzweck!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {409},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1629-0},
  doi       = {10.1007/s11623-022-1629-0},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22r.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22s,
  title     = {Die Zeit f{\"{u}}r ein Besch{\"{a}}ftigtendatenschutzgesetz
               ist , , Jetzt"!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {459--460},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1639-y},
  doi       = {10.1007/s11623-022-1639-y},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22s.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22t,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {461--470},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1640-5},
  doi       = {10.1007/s11623-022-1640-5},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22t.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22u,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {471--477},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1641-4},
  doi       = {10.1007/s11623-022-1641-4},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22u.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22v,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {7},
  pages     = {477--480},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1642-3},
  doi       = {10.1007/s11623-022-1642-3},
  timestamp = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22v.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22w,
  title     = {Aufgel{\"{o}}ste Verantwortung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {481},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1643-2},
  doi       = {10.1007/s11623-022-1643-2},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22w.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22x,
  title     = {Mehr Rechtssicherheit f{\"{u}}r die IT-Sicherheitsforschung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {516--517},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1650-3},
  doi       = {10.1007/s11623-022-1650-3},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22x.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22y,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {518--525},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1651-2},
  doi       = {10.1007/s11623-022-1651-2},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22y.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X22z,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {526--532},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1652-1},
  doi       = {10.1007/s11623-022-1652-1},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X22z.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZunabovicG22,
  author    = {Sandra Zunabovic and
               Rainer W. Gerling},
  title     = {IT-Sicherheit in der Arztpraxis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {46},
  number    = {8},
  pages     = {499--504},
  year      = {2022},
  url       = {https://doi.org/10.1007/s11623-022-1647-y},
  doi       = {10.1007/s11623-022-1647-y},
  timestamp = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ZunabovicG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Amend21,
  author    = {Arlette Amend},
  title     = {Anwaltliche Geheimhaltungspflicht vs. Datenschutzaufsicht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {265--270},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1431-4},
  doi       = {10.1007/s11623-021-1431-4},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Amend21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Barth21,
  author    = {Marlene Barth},
  title     = {A Case Study on Data Portability},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {190--197},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1416-3},
  doi       = {10.1007/s11623-021-1416-3},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Barth21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BartschW21,
  author    = {Markus Bartsch and
               Markus Wagner},
  title     = {Automotive Security mit der On-Board Telematics Platform {(OTP)}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {90--94},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1396-3},
  doi       = {10.1007/s11623-021-1396-3},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BartschW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Birk21,
  author    = {Dominik Birk},
  title     = {Managed Security Services: Hilfe oder Herausforderung f{\"{u}}r
               die Informationssicherheit?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {676--679},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1513-3},
  doi       = {10.1007/s11623-021-1513-3},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Birk21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Blankertz21,
  author    = {Aline Blankertz},
  title     = {Vertrauliche Datentreuhand},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {789--793},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1538-7},
  doi       = {10.1007/s11623-021-1538-7},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Blankertz21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann21,
  author    = {Dominik Bleckmann},
  title     = {Aus Schaden wird man klug - Warum {KRITIS} wichtig ist},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {577},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1492-4},
  doi       = {10.1007/s11623-021-1492-4},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bleckmann21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Block21,
  author    = {Helga Block},
  title     = {Zugriffe von Strafverfolgungsbeh{\"{o}}rden auf Corona-Kontaktlisten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {4},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1380-3},
  doi       = {10.1007/s11623-020-1380-3},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Block21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boenisch21,
  author    = {Franziska Boenisch},
  title     = {Privatsph{\"{a}}re und Maschinelles Lernen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {448--452},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1469-3},
  doi       = {10.1007/s11623-021-1469-3},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Boenisch21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BosseDW21,
  author    = {Christian K. Bosse and
               Aljoscha Dietrich and
               Andreas We{\ss}ner},
  title     = {Selbstbewertungsinstrument f{\"{u}}r den betrieblichen Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {23--27},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1384-z},
  doi       = {10.1007/s11623-020-1384-z},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BosseDW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Braun21,
  author    = {Sven Braun},
  title     = {Kontrollen risikoreicher Verarbeitungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {126--130},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1402-9},
  doi       = {10.1007/s11623-021-1402-9},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Braun21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BretthauerAB21,
  author    = {Sebastian Bretthauer and
               Arno Appenzeller and
               Pascal Birnstill},
  title     = {Datensouver{\"{a}}nit{\"{a}}t f{\"{u}}r Patienten im
               Gesundheitswesen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {173--179},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1413-6},
  doi       = {10.1007/s11623-021-1413-6},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BretthauerAB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {131--141},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1403-8},
  doi       = {10.1007/s11623-021-1403-8},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21a,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {272--283},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1433-2},
  doi       = {10.1007/s11623-021-1433-2},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21b,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {336--343},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1445-y},
  doi       = {10.1007/s11623-021-1445-y},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21c,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {405--416},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1461-y},
  doi       = {10.1007/s11623-021-1461-y},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21d,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {480--486},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1476-4},
  doi       = {10.1007/s11623-021-1476-4},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21e,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {553--562},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1488-0},
  doi       = {10.1007/s11623-021-1488-0},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21f,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {628--635},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1504-4},
  doi       = {10.1007/s11623-021-1504-4},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21g,
  author    = {Benedikt Buchner},
  title     = {Widerrufbarkeit der Einwilligung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {831},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1545-8},
  doi       = {10.1007/s11623-021-1545-8},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner21h,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {832--841},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1546-7},
  doi       = {10.1007/s11623-021-1546-7},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner21h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuchnerHHPKSS21,
  author    = {Benedikt Buchner and
               Anna Christine Haber and
               Horst Karl Hahn and
               Fabian Prasser and
               Harald Kusch and
               Ulrich Sax and
               Carsten Oliver Schmidt},
  title     = {Das Modell der Datentreuhand in der medizinischen Forschung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {806--810},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1534-y},
  doi       = {10.1007/s11623-021-1534-y},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BuchnerHHPKSS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterP21,
  author    = {Ulla Coester and
               Norbert Pohlmann},
  title     = {Vertrauen - ein elementarer Aspekt der digitalen Zukunft},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {120--125},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1401-x},
  doi       = {10.1007/s11623-021-1401-x},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/CoesterP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad21,
  author    = {Conrad Sebastian Conrad},
  title     = {Die , , Verarbeitung" im Sinne der {DSGVO} - und die Realit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {603--608},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1499-x},
  doi       = {10.1007/s11623-021-1499-x},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DielKSS21,
  author    = {Sarah Diel and
               Matthias Kohn and
               Janine Schleper and
               Annika Selzer},
  title     = {Datenschutzmetriken im Besch{\"{a}}ftigungsverh{\"{a}}ltnis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {821--825},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1543-x},
  doi       = {10.1007/s11623-021-1543-x},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/DielKSS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DietrichBS21,
  author    = {Aljoscha Dietrich and
               Christian K. Bosse and
               Hartmut Schmitt},
  title     = {Kontrolle und {\"{U}}berwachung von Besch{\"{a}}ftigten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {5--10},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1381-2},
  doi       = {10.1007/s11623-020-1381-2},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DietrichBS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Djeffal21,
  author    = {Christian Djeffal},
  title     = {Art. 22 {DSGVO} als sozio-technische Gestaltungsnorm},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {529--533},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1484-4},
  doi       = {10.1007/s11623-021-1484-4},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Djeffal21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DopmannMFT21,
  author    = {Christoph D{\"{o}}pmann and
               Matthias Marx and
               Hannes Federrath and
               Florian Tschorsch},
  title     = {Tor Relays an Universit{\"{a}}ten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {320--325},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1442-1},
  doi       = {10.1007/s11623-021-1442-1},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DopmannMFT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DopmannMFT21a,
  author    = {Christoph D{\"{o}}pmann and
               Matthias Marx and
               Hannes Federrath and
               Florian Tschorsch},
  title     = {Erratum zu: Tor Relays an Universit{\"{a}}ten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {849},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1533-z},
  doi       = {10.1007/s11623-021-1533-z},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/DopmannMFT21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DreyerK21,
  author    = {Bastian Dreyer and
               Gerhard Kramarz{-}von Kohout},
  title     = {Modernisierung der Telekommunikation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {747--754},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1528-9},
  doi       = {10.1007/s11623-021-1528-9},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/DreyerK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eckhardt21,
  author    = {Jens Eckhardt},
  title     = {Wann ist ein IoT-Ger{\"{a}}t datenschutzrelevant?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {107--113},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1399-0},
  doi       = {10.1007/s11623-021-1399-0},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Eckhardt21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eichenhofer21,
  author    = {Johannes Eichenhofer},
  title     = {Stand und Perspektiven einer Global Governance der Internet Privacy},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {159--162},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1410-9},
  doi       = {10.1007/s11623-021-1410-9},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Eichenhofer21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EscheMN21,
  author    = {Marko Esche and
               Reinhard Meyer and
               Martin Nischwitz},
  title     = {Conformity assessment of measuring instruments with artificial intelligence},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {184--189},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1415-4},
  doi       = {10.1007/s11623-021-1415-4},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/EscheMN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber21,
  author    = {Eberhard von Faber},
  title     = {Zur Zukunft des IT-Sicherheitsmanagements angesichts des Wandels von
               Technik und Serviceerbringung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {691--697},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1516-0},
  doi       = {10.1007/s11623-021-1516-0},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerGG21,
  author    = {Arno Fiedler and
               Ernst{-}G{\"{u}}nter Giessmann and
               Franziska Granc},
  title     = {Rechtskonforme Pr{\"{u}}fung elektronischer Signaturen gestern
               und heute},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {654--658},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1509-z},
  doi       = {10.1007/s11623-021-1509-z},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerGG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerTT21,
  author    = {Arno Fiedler and
               Christoph Thiel and
               Christian Thiel},
  title     = {Verl{\"{a}}ssliche Personenidentifizierung mittels Techniken
               der K{\"{u}}nstlichen Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {462--466},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1472-8},
  doi       = {10.1007/s11623-021-1472-8},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerTT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FlieheB21,
  author    = {Marc Fliehe and
               Elisa Brummel},
  title     = {Eckpunkte eines sicheren {\"{O}}kosystems f{\"{u}}r KI-Anwendungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {444--447},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1468-4},
  doi       = {10.1007/s11623-021-1468-4},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FlieheB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox21,
  author    = {Dirk Fox},
  title     = {Umsetzungsfragen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {153},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1407-4},
  doi       = {10.1007/s11623-021-1407-4},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox21a,
  author    = {Dirk Fox},
  title     = {Lesen bildet},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {293},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1436-z},
  doi       = {10.1007/s11623-021-1436-z},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox21b,
  author    = {Dirk Fox},
  title     = {Phishing},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {717},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1521-3},
  doi       = {10.1007/s11623-021-1521-3},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox21b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FoxT21,
  author    = {Dirk Fox and
               Christian Titze},
  title     = {Phishing Awareness durch Gamification},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {727--732},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1524-0},
  doi       = {10.1007/s11623-021-1524-0},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FoxT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn21,
  author    = {Christian L. Geminn},
  title     = {Datenschutz bei Sprachassistenten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {509--514},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1481-7},
  doi       = {10.1007/s11623-021-1481-7},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Geminn21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gisch21,
  author    = {Mathias Gisch},
  title     = {F{\"{u}}hrungsinformationssysteme in der {\"{o}}ffentlichen
               Verwaltung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {11--18},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1382-1},
  doi       = {10.1007/s11623-020-1382-1},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Gisch21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gola21,
  author    = {Peter Gola},
  title     = {Das Verbandssanktionengesetz-E und betriebliche Datenschutzbeauftragte},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {472--478},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1474-6},
  doi       = {10.1007/s11623-021-1474-6},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gola21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Golla21,
  author    = {Sebastian Golla},
  title     = {Volatiles Datenschutzbu{\ss}geld},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {180--183},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1414-5},
  doi       = {10.1007/s11623-021-1414-5},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Golla21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber21,
  author    = {Joachim Gruber},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {350--352},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1447-9},
  doi       = {10.1007/s11623-021-1447-9},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gruber21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen21,
  author    = {Marit Hansen},
  title     = {Informationssicherheit: Aufgabe f{\"{u}}r die Datenschutzaufsicht?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {234--238},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1425-2},
  doi       = {10.1007/s11623-021-1425-2},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Hansen21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HansenP21,
  author    = {Marit Hansen and
               Thomas Probst},
  title     = {Die ambivalente Beziehung zwischen eGovernment und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {664--668},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1511-5},
  doi       = {10.1007/s11623-021-1511-5},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HansenP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeidrichW21,
  author    = {Joerg Heidrich and
               Christoph Wegener},
  title     = {Dauerhaft sicher zu Hause},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {680--685},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1514-2},
  doi       = {10.1007/s11623-021-1514-2},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HeidrichW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HofBB21,
  author    = {Hans{-}Joachim Hof and
               Dominik Bayerl and
               Kevin Klaus Gomez Buquerin},
  title     = {{\"{U}}berwachung in modernen Fahrzeugen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {399--403},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1459-5},
  doi       = {10.1007/s11623-021-1459-5},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HofBB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoffmannK21,
  author    = {Hanna Hoffmann and
               Johannes Kevekordes},
  title     = {Das Right to Explanation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {609--615},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1500-8},
  doi       = {10.1007/s11623-021-1500-8},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HoffmannK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hohne21,
  author    = {Marina Marie{-}Claire H{\"{o}}hne},
  title     = {Nachvollziehbare K{\"{u}}nstliche Intelligenz: Methoden, Chancen
               und Risiken},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {453--456},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1470-x},
  doi       = {10.1007/s11623-021-1470-x},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hohne21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/IaconoS21,
  author    = {Luigi Lo Iacono and
               Hartmut Schmitt},
  title     = {Informationelle Selbstbestimmung am Arbeitsplatz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {1},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1379-9},
  doi       = {10.1007/s11623-020-1379-9},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/IaconoS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jung21,
  author    = {Marco M{\"{u}}ller{-}ter Jung},
  title     = {Datenschutz im Internet der Dinge},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {114--119},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1400-y},
  doi       = {10.1007/s11623-021-1400-y},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Jung21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kammerloher21,
  author    = {Dominik Kammerloher},
  title     = {Cybersecurity: Ein sicheres Fundament f{\"{u}}r den digitalen
               Staat},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {649--653},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1508-0},
  doi       = {10.1007/s11623-021-1508-0},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kammerloher21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KarlH21,
  author    = {Wilfried Karl and
               Christian Hummert},
  title     = {Digitale Souver{\"{a}}nit{\"{a}}t: Die Rolle der ZITiS in
               der deutschen Cybersicherheitsarchitektur},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {223--228},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1423-4},
  doi       = {10.1007/s11623-021-1423-4},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KarlH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KastropP21,
  author    = {Christian Kastrop and
               Dominic Ponattu},
  title     = {K{\"{u}}nstliche Intelligenz muss dem Gemeinwohl dienen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {434--437},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1466-6},
  doi       = {10.1007/s11623-021-1466-6},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KastropP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber21,
  author    = {Ulrich Kelber},
  title     = {Zu {\"{u}}berarbeiteten Standarddatenschutzklauseln und zur Data-Mining
               Entscheidung des BVerfG},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {158},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1409-2},
  doi       = {10.1007/s11623-021-1409-2},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber21a,
  author    = {Ulrich Kelber},
  title     = {K{\"{u}}nstliche Intelligenz im Bereich der Strafverfolgung und
               Gefahrenabwehr},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {780--782},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1536-9},
  doi       = {10.1007/s11623-021-1536-9},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kellermann21,
  author    = {Gero Kellermann},
  title     = {Die Meinungsfreiheit als verfassungspolitische Herausforderung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {363--367},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1451-0},
  doi       = {10.1007/s11623-021-1451-0},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kellermann21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerP21,
  author    = {Dennis{-}Kenji Kipker and
               Sebastian Pape},
  title     = {Case Study: Checking a Serious Security-Awareness Game for its Legal
               Adequacy},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {310--314},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1440-3},
  doi       = {10.1007/s11623-021-1440-3},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS21,
  author    = {Dennis{-}Kenji Kipker and
               Dario Scholz},
  title     = {Das IT-Sicherheitsgesetz 2.0},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {40--45},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1387-9},
  doi       = {10.1007/s11623-020-1387-9},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KlausWLW21,
  author    = {Marko Klaus and
               Dominik Wei{\ss}haar and
               Andreas Lang and
               Enrico Weide},
  title     = {Identifizierung relevanter Schutzziele},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {738--741},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1526-y},
  doi       = {10.1007/s11623-021-1526-y},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KlausWLW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KneuperJ21,
  author    = {Ralf Kneuper and
               Sven Jacobs},
  title     = {Softwaretest mit Originaldaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {163--167},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1411-8},
  doi       = {10.1007/s11623-021-1411-8},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KneuperJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KowalskiIM21,
  author    = {Bernd Kowalski and
               Matthias Intemann and
               Tobias M{\"{u}}hlenbruch},
  title     = {Bedeutung des Cybersecurity Acts f{\"{u}}r die IT-Sicherheitszertifizierung
               in Deutschland und Europa},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {244--248},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1427-0},
  doi       = {10.1007/s11623-021-1427-0},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KowalskiIM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KreutzerS21,
  author    = {Michael Kreutzer and
               Markus Schneider},
  title     = {Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {249--253},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1428-z},
  doi       = {10.1007/s11623-021-1428-z},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KreutzerS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kroschwald21,
  author    = {Steffen Kroschwald},
  title     = {K{\"{u}}nstliche Intelligenz im autonomen Auto},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {522--528},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1483-5},
  doi       = {10.1007/s11623-021-1483-5},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kroschwald21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann21,
  author    = {Dieter Kugelmann},
  title     = {Ein Jahr Corona-Pandemie - Mehr Digitalisierung braucht effizienteren
               Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {297},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1437-y},
  doi       = {10.1007/s11623-021-1437-y},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann21a,
  author    = {Dieter Kugelmann},
  title     = {EU-Vorschlag zu K{\"{u}}nstlicher Intelligenz muss aus Datenschutz-Perspektive
               durchleuchtet werden},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {433},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1465-7},
  doi       = {10.1007/s11623-021-1465-7},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann21b,
  author    = {Dieter Kugelmann},
  title     = {K{\"{u}}nstliche Intelligenz aus Sicht der Datenschutzaufsicht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {503--508},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1480-8},
  doi       = {10.1007/s11623-021-1480-8},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann21b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling21,
  author    = {J{\"{u}}rgen K{\"{u}}hling},
  title     = {Scoring, Plausibilisierung und Imputation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {168--172},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1412-7},
  doi       = {10.1007/s11623-021-1412-7},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kuhling21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling21a,
  author    = {J{\"{u}}rgen K{\"{u}}hling},
  title     = {Der datenschutzrechtliche Rahmen f{\"{u}}r Datentreuh{\"{a}}nder},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {783--788},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1537-8},
  doi       = {10.1007/s11623-021-1537-8},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kuhling21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingB21,
  author    = {J{\"{u}}rgen K{\"{u}}hling and
               Benedikt Buchner},
  title     = {Datentreuh{\"{a}}nder},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {777},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1535-x},
  doi       = {10.1007/s11623-021-1535-x},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KuhlingB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhneRZ21,
  author    = {Christian Ricardo K{\"{u}}hne and
               Martin Rost and
               Stefan Zwierlein},
  title     = {Risiken in 3D},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {742--746},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1527-x},
  doi       = {10.1007/s11623-021-1527-x},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KuhneRZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kunast21,
  author    = {Renate K{\"{u}}nast},
  title     = {Hass im Netz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {368--370},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1452-z},
  doi       = {10.1007/s11623-021-1452-z},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kunast21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lahmann21,
  author    = {Henning Lahmann},
  title     = {Zur operativen Zusammenarbeit zwischen Staat und Wirtschaft in der
               Cybersicherheit in Deutschland},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {239--243},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1426-1},
  doi       = {10.1007/s11623-021-1426-1},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Lahmann21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeichtM21,
  author    = {Maximilian Leicht and
               Frederik M{\"{o}}llers},
  title     = {Zur (Un-)Sicherheit von Zwei-Faktor-Authentifizierung via {SMS}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {541--545},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1486-2},
  doi       = {10.1007/s11623-021-1486-2},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LeichtM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LewinskiH21,
  author    = {Kai von Lewinski and
               Johanna H{\"{a}}hnle},
  title     = {Was informatisch richtig ist, kann auch juristisch recht sein},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {686--690},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1515-1},
  doi       = {10.1007/s11623-021-1515-1},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LewinskiH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LipowiczS21,
  author    = {Irena Lipowicz and
               Grazyna Szpor},
  title     = {Neue Aspekte der Desinformation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {381--384},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1455-9},
  doi       = {10.1007/s11623-021-1455-9},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LipowiczS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LoberLDR21,
  author    = {Lena Isabell L{\"{o}}ber and
               Sebastian Lange and
               Klaus David and
               Alexander Ro{\ss}nagel},
  title     = {Datenschutzfreundliche Algorithmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {616--622},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1501-7},
  doi       = {10.1007/s11623-021-1501-7},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LoberLDR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mangels21,
  author    = {Fabian Mangels},
  title     = {{KRITIS} zu Zeiten einer Pandemie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {579--583},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1494-2},
  doi       = {10.1007/s11623-021-1494-2},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mangels21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Margraf21,
  author    = {Marian Margraf},
  title     = {Systeme der K{\"{u}}nstlichen Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {429},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1464-8},
  doi       = {10.1007/s11623-021-1464-8},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Margraf21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarkertB21,
  author    = {Karla Markert and
               Konstantin B{\"{o}}ttinger},
  title     = {Robuste Lernverfahren},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {457--461},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1471-9},
  doi       = {10.1007/s11623-021-1471-9},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MarkertB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Martius21,
  author    = {Kai Martius},
  title     = {{SINA:} IT-Sicherheit als Infrastruktur betrachtet},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {659--663},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1510-6},
  doi       = {10.1007/s11623-021-1510-6},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Martius21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester21,
  author    = {Britta Alexandra Mester},
  title     = {{KRITIS} als Teil einer modernen Gesellschaft},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {573},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1491-5},
  doi       = {10.1007/s11623-021-1491-5},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester21a,
  author    = {Britta Alexandra Mester},
  title     = {Kritische Infrastrukturen {(KRITIS)}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {627},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1503-5},
  doi       = {10.1007/s11623-021-1503-5},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Milde21,
  author    = {Thomas Milde},
  title     = {Business Continuity im F{\"{o}}deralismus},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {669--675},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1512-4},
  doi       = {10.1007/s11623-021-1512-4},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Milde21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mohle21,
  author    = {Jan{-}Peter M{\"{o}}hle},
  title     = {Totalrevision des Schweizer Datenschutzgesetzes - Ende gut, alles
               gut?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {598--602},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1498-y},
  doi       = {10.1007/s11623-021-1498-y},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mohle21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Molnar-Gabor21,
  author    = {Fruzsina Molnar{-}Gabor},
  title     = {Ausgestaltung der Einwilligung in die Datenspende f{\"{u}}r die
               Gesundheitsforschung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {799--805},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1540-0},
  doi       = {10.1007/s11623-021-1540-0},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Molnar-Gabor21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MorgensternPC21,
  author    = {Maik Morgenstern and
               Olaf Pursche and
               Eric Clausing},
  title     = {Die Sicherheitslage im IoT-Umfeld},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {102--106},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1398-1},
  doi       = {10.1007/s11623-021-1398-1},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/MorgensternPC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Niewohner21,
  author    = {Mario Niew{\"{o}}hner},
  title     = {NetzDG und Meinungsfreiheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {391--395},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1457-7},
  doi       = {10.1007/s11623-021-1457-7},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Niewohner21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel21,
  author    = {Maurice Oettel},
  title     = {Wesensdaten: Regulierungsl{\"{u}}cke im derzeitigen Datenschutzrecht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {623--626},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1502-6},
  doi       = {10.1007/s11623-021-1502-6},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Oettel21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OttmannPSSRF21,
  author    = {Jenny Ottmann and
               Johannes Pollach and
               Nicole Scheler and
               Janine Schneider and
               Christian R{\"{u}}ckert and
               Felix C. Freiling},
  title     = {Zur Blackbox-Problematik im Bereich Mobilfunkforensik},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {546--552},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1487-1},
  doi       = {10.1007/s11623-021-1487-1},
  timestamp = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/OttmannPSSRF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetrlicD21,
  author    = {Ronald Petrlic and
               Leo Dessani},
  title     = {E-Mail-Sicherheit auf dem Pr{\"{u}}fstand},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {534--540},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1485-3},
  doi       = {10.1007/s11623-021-1485-3},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PetrlicD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pfrang21,
  author    = {Sebastian Pfrang},
  title     = {Aufz{\"{a}}hlung der datenschutzrechtlichen Grunds{\"{a}}tze
               gem{\"{a}}{\ss} Art. 5 {DS-GVO} in Betriebsvereinbarungen?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {396--398},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1458-6},
  doi       = {10.1007/s11623-021-1458-6},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Pfrang21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PilgermannSSW21,
  author    = {Michael Pilgermann and
               Stefan Stein and
               Thomas Schrader and
               Simon Weber},
  title     = {Angriffserkennung beim Betrieb von {KRITIS} gem{\"{a}}{\ss} IT-Sicherheitsgesetz
               2.0},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {733--737},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1525-z},
  doi       = {10.1007/s11623-021-1525-z},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PilgermannSSW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann21,
  author    = {Norbert Pohlmann},
  title     = {Sicherheitsbedarf von IoT-Anwendungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {73},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1391-8},
  doi       = {10.1007/s11623-021-1391-8},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Pohlmann21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann21a,
  author    = {Norbert Pohlmann},
  title     = {Chancen und Risiken von Smart Home},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {95--101},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1397-2},
  doi       = {10.1007/s11623-021-1397-2},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Pohlmann21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PolstTDF21,
  author    = {Svenja Polst and
               Jan Tolsdorf and
               Florian Dehling and
               Denis Feth},
  title     = {Verarbeitung von Besch{\"{a}}ftigtendaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {19--22},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1383-0},
  doi       = {10.1007/s11623-020-1383-0},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PolstTDF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PotthoffS21,
  author    = {Tobias S. Potthoff and
               Dorothee Schrief},
  title     = {Gesch{\"{a}}ftsrelevanz Datenschutz spezifischer Zertifizierungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {326--329},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1443-0},
  doi       = {10.1007/s11623-021-1443-0},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PotthoffS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Raji21,
  author    = {Behrang Raji},
  title     = {Rechtliche Bewertung synthetischer Daten f{\"{u}}r KI-Systeme},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {303--309},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1439-9},
  doi       = {10.1007/s11623-021-1439-9},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Raji21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReichmannEBKMSB21,
  author    = {Henrik Reichmann and
               Malte Elson and
               Nele Borgert and
               Dennis{-}Kenji Kipker and
               Rainer Malaka and
               Karsten Sohr and
               Mehrdad Bahrini},
  title     = {Erfahrbarer Datenschutz und IT-Sicherheit in Smart Home-Anwendungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {259--264},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1430-5},
  doi       = {10.1007/s11623-021-1430-5},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/ReichmannEBKMSB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21,
  author    = {Helmut Reimer},
  title     = {Der Abnutzungseffekt gro{\ss}er Visionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {76--77},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1392-7},
  doi       = {10.1007/s11623-021-1392-7},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21a,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {142--148},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1404-7},
  doi       = {10.1007/s11623-021-1404-7},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21b,
  author    = {Helmut Reimer},
  title     = {Herausforderungen durch neue Konzepte},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {271},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1432-3},
  doi       = {10.1007/s11623-021-1432-3},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21c,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {284--290},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1434-1},
  doi       = {10.1007/s11623-021-1434-1},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21d,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {344--350},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1446-x},
  doi       = {10.1007/s11623-021-1446-x},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21e,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {417--424},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1462-x},
  doi       = {10.1007/s11623-021-1462-x},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21f,
  author    = {Helmut Reimer},
  title     = {{KI:} Zwischen Realit{\"{a}}t und Vision},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {479},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1475-5},
  doi       = {10.1007/s11623-021-1475-5},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21g,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {487--496},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1477-3},
  doi       = {10.1007/s11623-021-1477-3},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21h,
  author    = {Helmut Reimer},
  title     = {Report 08-2021},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {563--569},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1489-z},
  doi       = {10.1007/s11623-021-1489-z},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21i,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {636--644},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1505-3},
  doi       = {10.1007/s11623-021-1505-3},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer21j,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {842--849},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1547-6},
  doi       = {10.1007/s11623-021-1547-6},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer21j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RemyS21,
  author    = {Jan Remy and
               Ralf Stettner},
  title     = {Cybersicherheit als Aufgabe der L{\"{a}}nder},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {254--258},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1429-y},
  doi       = {10.1007/s11623-021-1429-y},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RemyS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riemenschneider21,
  author    = {Severin Riemenschneider and
               Marina Lutz},
  title     = {{\#}HateSpeech - Shitstorms als Kampfmittel organisierter Strukturen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {371--374},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1453-y},
  doi       = {10.1007/s11623-021-1453-y},
  timestamp = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Riemenschneider21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel21,
  author    = {Alexander Ro{\ss}nagel},
  title     = {K{\"{u}}nstliche Intelligenz datenschutzrechtlich gestalten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {497--498},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1478-2},
  doi       = {10.1007/s11623-021-1478-2},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schafer21,
  author    = {Burkhard Schafer},
  title     = {Death by a Thousand Cuts: Cumulative Data Effects and the Corbyn Affair},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {385--390},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1456-8},
  doi       = {10.1007/s11623-021-1456-8},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schafer21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schallbruch21,
  author    = {Martin Schallbruch},
  title     = {Cybersicherheitsarchitektur - Gro{\ss}baustelle ohne Plan},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {217},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1420-7},
  doi       = {10.1007/s11623-021-1420-7},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Schallbruch21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schallbruch21a,
  author    = {Martin Schallbruch},
  title     = {Mehr Unabh{\"{a}}ngigkeit f{\"{u}}r das BSI?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {229--233},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1424-3},
  doi       = {10.1007/s11623-021-1424-3},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Schallbruch21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schallbruch21b,
  author    = {Martin Schallbruch},
  title     = {EU-Regulierung der K{\"{u}}nstlichen Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {438--443},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1467-5},
  doi       = {10.1007/s11623-021-1467-5},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schallbruch21b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchindlerH21,
  author    = {Stephan Schindler and
               Gerrit Hornung},
  title     = {Datenschutz bei der biometrischen Gesichtserkennung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {515--521},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1482-6},
  doi       = {10.1007/s11623-021-1482-6},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchindlerH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmittG21,
  author    = {Hartmut Schmitt and
               Eduard C. Groen},
  title     = {Qualit{\"{a}}tsmodell zur F{\"{o}}rderung des Besch{\"{a}}ftigtendatenschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {28--32},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1385-y},
  doi       = {10.1007/s11623-020-1385-y},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchmittG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmittG21a,
  author    = {Hartmut Schmitt and
               Eduard C. Groen},
  title     = {Erratum zu: Qualit{\"{a}}tsmodell zur F{\"{o}}rderung des
               Besch{\"{a}}ftigtendatenschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {148},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1405-6},
  doi       = {10.1007/s11623-021-1405-6},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchmittG21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe21,
  author    = {Maximilian Schnebbe},
  title     = {{TTDSG}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {404},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1460-z},
  doi       = {10.1007/s11623-021-1460-z},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schnebbe21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS21,
  author    = {Dominik Schrahe and
               Thomas St{\"{a}}dter},
  title     = {COVID-19-Impf- und -Testnachweise},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {315--319},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1441-2},
  doi       = {10.1007/s11623-021-1441-2},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchraheS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulteS21,
  author    = {Laura Schulte and
               Johanna Schmale},
  title     = {Vertragliche Absicherung internationaler Datentransfers},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {46--54},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1388-8},
  doi       = {10.1007/s11623-020-1388-8},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchulteS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwartmannB21,
  author    = {Rolf Schwartmann and
               Kristin Benedikt},
  title     = {Anerkannte Dienste der Einwilligungsverwaltung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {811--815},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1541-z},
  doi       = {10.1007/s11623-021-1541-z},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchwartmannB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerT21,
  author    = {Annika Selzer and
               Ingo J. Timm},
  title     = {Potenziale anonymer Datenverarbeitungen nutzen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {816--820},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1542-y},
  doi       = {10.1007/s11623-021-1542-y},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SelzerT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerT21a,
  author    = {Annika Selzer and
               Ingo J. Timm},
  title     = {Gestaltung eines Treuhand-Systems zum anonymen Datenaustausch in einer
               Smart-City-Umgebung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {826--830},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1544-9},
  doi       = {10.1007/s11623-021-1544-9},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SelzerT21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Smoltczyk21,
  author    = {Maja Smoltczyk},
  title     = {Datenschutz ist kein Hindernis f{\"{u}}r digitalen Unterricht
               - Schulen brauchen Unterst{\"{u}}tzung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {222},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1422-5},
  doi       = {10.1007/s11623-021-1422-5},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Smoltczyk21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Specht-Riemenschneider21,
  author    = {Louisa Specht{-}Riemenschneider and
               Lea Lorbach},
  title     = {Rechtsschutz gegen Pers{\"{o}}nlichkeitsrechtsverletzungen im
               Netz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {375--380},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1454-x},
  doi       = {10.1007/s11623-021-1454-x},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Specht-Riemenschneider21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Specht-Riemenschneider21a,
  author    = {Louisa Specht{-}Riemenschneider and
               Lea Lorbach},
  title     = {Rechtsschutz gegen Pers{\"{o}}nlichkeitsrechtsverletzungen im
               Netz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {7},
  pages     = {467--471},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1473-7},
  doi       = {10.1007/s11623-021-1473-7},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Specht-Riemenschneider21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steinrotter21,
  author    = {Bj{\"{o}}rn Steinr{\"{o}}tter},
  title     = {Das Konzept einer datenaltruistischen Organisation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {794--798},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1539-6},
  doi       = {10.1007/s11623-021-1539-6},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Steinrotter21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stradomsky21,
  author    = {Christopher Stradomsky},
  title     = {{KRITIS} - Der Weg zum Audit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {589--593},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1496-0},
  doi       = {10.1007/s11623-021-1496-0},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Stradomsky21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sunderman21,
  author    = {Steffen Sunderman},
  title     = {Abdingbarkeit technischer oder organisatorischer Ma{\ss}nahmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {594--597},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1497-z},
  doi       = {10.1007/s11623-021-1497-z},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Sunderman21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tiedemann21,
  author    = {Jan Tiedemann},
  title     = {Digitalisierung der industriellen Dinge},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {83--89},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1395-4},
  doi       = {10.1007/s11623-021-1395-4},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Tiedemann21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld21,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Keine unbedingte Toleranz f{\"{u}}r Feinde der Freiheit!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {359--362},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1450-1},
  doi       = {10.1007/s11623-021-1450-1},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB21,
  author    = {Marie{-}Theres Tinnefeld and
               Benedikt Buchner},
  title     = {Toleranz, Meinungsfreiheit und Pers{\"{o}}nlichkeitsschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {353},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1448-8},
  doi       = {10.1007/s11623-021-1448-8},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TinnefeldB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TolsdorfDF21,
  author    = {Jan Tolsdorf and
               Florian Dehling and
               Denis Feth},
  title     = {Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {33--39},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1386-x},
  doi       = {10.1007/s11623-020-1386-x},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/TolsdorfDF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerBABLT21,
  author    = {Melanie Volkamer and
               Benjamin Berens and
               Lukas Aldag and
               Milan Burgdorf and
               Andreas Lorenz and
               Marie{-}Claire Thiery},
  title     = {NoPhish-Challenge-Karten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {721--726},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1523-1},
  doi       = {10.1007/s11623-021-1523-1},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/VolkamerBABLT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener21,
  author    = {Christoph Wegener},
  title     = {Digitalisierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {645},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1506-2},
  doi       = {10.1007/s11623-021-1506-2},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wegener21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert21,
  author    = {Thilo Weichert},
  title     = {Aufbewahrung nach Handels- und Steuerrecht - oder L{\"{o}}schung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {755--757},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1529-8},
  doi       = {10.1007/s11623-021-1529-8},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wiest21,
  author    = {Simon Wiest},
  title     = {{ENIGMA} {R.D.E}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {298--302},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1438-x},
  doi       = {10.1007/s11623-021-1438-x},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wiest21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wilczek21,
  author    = {Marc Wilczek},
  title     = {IoT - die untersch{\"{a}}tzte Gefahr f{\"{u}}r IT-Sicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {79--82},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1394-5},
  doi       = {10.1007/s11623-021-1394-5},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Wilczek21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Woitke21,
  author    = {Annika Woitke},
  title     = {Pr{\"{u}}fgrundlagen nach {\textsection} 8a},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {584--588},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1495-1},
  doi       = {10.1007/s11623-021-1495-1},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Woitke21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wunsche21,
  author    = {Kai E. W{\"{u}}nsche},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {290--292},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1435-0},
  doi       = {10.1007/s11623-021-1435-0},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Wunsche21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {55--63},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1389-7},
  doi       = {10.1007/s11623-020-1389-7},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21a,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {1},
  pages     = {64--72},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-020-1390-1},
  doi       = {10.1007/s11623-020-1390-1},
  timestamp = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21b,
  title     = {Betreiber von Webseiten ben{\"{o}}tigen Rechtssicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {78},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1393-6},
  doi       = {10.1007/s11623-021-1393-6},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21c,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {2},
  pages     = {149--152},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1406-5},
  doi       = {10.1007/s11623-021-1406-5},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21d,
  title     = {Gretchenfrage},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {157},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1408-3},
  doi       = {10.1007/s11623-021-1408-3},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21e,
  title     = {Instrumente f{\"{u}}r Drittstaaten-Transfers},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {198},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1417-2},
  doi       = {10.1007/s11623-021-1417-2},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21f,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {199--207},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1418-1},
  doi       = {10.1007/s11623-021-1418-1},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21g,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {3},
  pages     = {208--216},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1419-0},
  doi       = {10.1007/s11623-021-1419-0},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21h,
  title     = {Pandemie und Digitalisierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {4},
  pages     = {221},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1421-6},
  doi       = {10.1007/s11623-021-1421-6},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21i,
  title     = {Impfnachweis, Nachweis negativen Testergebnisses und Genesungsnachweis
               geh{\"{o}}ren gesetzlich geregelt!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {357--358},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1449-7},
  doi       = {10.1007/s11623-021-1449-7},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21j,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {6},
  pages     = {425--428},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1463-9},
  doi       = {10.1007/s11623-021-1463-9},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21k,
  title     = {40. Konferenz der Informationsfreiheitsbeauftragten vom 02. Juni 2021
               - Entschlie{\ss}ungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {502},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1479-1},
  doi       = {10.1007/s11623-021-1479-1},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21k.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21l,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {8},
  pages     = {570--572},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1490-6},
  doi       = {10.1007/s11623-021-1490-6},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21l.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21m,
  title     = {Erg{\"{a}}nzende Pr{\"{u}}fungen und Ma{\ss}nahmen trotz
               neuer EU-Standardvertragsklauseln f{\"{u}}r Datenexporte n{\"{o}}tig},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {9},
  pages     = {578},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1493-3},
  doi       = {10.1007/s11623-021-1493-3},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21m.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21n,
  title     = {L{\"{a}}nder{\"{u}}bergreifende Datenschutz-Pr{\"{u}}fung
               von Medien-Webseiten: Nachbesserungen n{\"{o}}tig},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {648},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1507-1},
  doi       = {10.1007/s11623-021-1507-1},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21n.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21o,
  title     = {Kryptographie und Benutzerfreundlichkeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {698},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1517-z},
  doi       = {10.1007/s11623-021-1517-z},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21o.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21p,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {699--705},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1518-y},
  doi       = {10.1007/s11623-021-1518-y},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21p.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21q,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {706--713},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1519-x},
  doi       = {10.1007/s11623-021-1519-x},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21q.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21r,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {10},
  pages     = {713--716},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1520-4},
  doi       = {10.1007/s11623-021-1520-4},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X21r.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21s,
  title     = {Berliner Aufsichtsbeh{\"{o}}rde konfrontiert Webseiten-Betreibende
               mit rechtswidrigem Tracking},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {720},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1522-2},
  doi       = {10.1007/s11623-021-1522-2},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21s.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21t,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {758--764},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1530-2},
  doi       = {10.1007/s11623-021-1530-2},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21t.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21u,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {765--772},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1531-1},
  doi       = {10.1007/s11623-021-1531-1},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21u.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21v,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {11},
  pages     = {772--776},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1532-0},
  doi       = {10.1007/s11623-021-1532-0},
  timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21v.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X21w,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {12},
  pages     = {850--852},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1548-5},
  doi       = {10.1007/s11623-021-1548-5},
  timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X21w.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ziegler21,
  author    = {Stephanie Ziegler},
  title     = {Typisierte Ma{\ss}nahmenpl{\"{a}}ne f{\"{u}}r IT-Sicherheit
               im Mittelstand},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {45},
  number    = {5},
  pages     = {330--335},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11623-021-1444-z},
  doi       = {10.1007/s11623-021-1444-z},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Ziegler21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Atug20,
  author    = {Manuel Atug},
  title     = {Zertifizierungen im Kontext KRITIScher Infrastrukturen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {668--671},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1346-5},
  doi       = {10.1007/s11623-020-1346-5},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Atug20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Baum20,
  author    = {Gerhart Baum},
  title     = {Nachruf auf Burkhard Hirsch},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {351--352},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1282-4},
  doi       = {10.1007/s11623-020-1282-4},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Baum20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckat20,
  author    = {Alexander Bleckat},
  title     = {Anwendbarkeit der Datenschutzgrundverordnung auf k{\"{u}}nstliche
               Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {194--198},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1250-z},
  doi       = {10.1007/s11623-020-1250-z},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Bleckat20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BremertHKP20,
  author    = {Benjamin Bremert and
               Marit Hansen and
               Barbara K{\"{o}}rffer and
               Sven Polenz},
  title     = {Pandemie und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {791--795},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1368-z},
  doi       = {10.1007/s11623-020-1368-z},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BremertHKP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breyer20,
  author    = {Jonas Breyer},
  title     = {Der neue {\textsection} 2 {BORA}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {189--193},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1249-5},
  doi       = {10.1007/s11623-020-1249-5},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Breyer20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {476--484},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1309-x},
  doi       = {10.1007/s11623-020-1309-x},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20a,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {544--554},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1322-0},
  doi       = {10.1007/s11623-020-1322-0},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20b,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {685--699},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1351-8},
  doi       = {10.1007/s11623-020-1351-8},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bungeroth20,
  author    = {Christian Bungeroth},
  title     = {Vertrauen in Programme f{\"{u}}r IT-Sicherheit aufbauen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {240--244},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1259-3},
  doi       = {10.1007/s11623-020-1259-3},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Bungeroth20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ChenHK20,
  author    = {Jihong Chen and
               Lu Han and
               Dennis{-}Kenji Kipker},
  title     = {An Introduction into the New Chinese Data Protection Legal Framework},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {52--57},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1222-3},
  doi       = {10.1007/s11623-019-1222-3},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/ChenHK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Coester20,
  author    = {Ulla Coester},
  title     = {Vertrauensw{\"{u}}rdige {KI} - zwischen Anspruch und Wirklichkeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {245--249},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1260-x},
  doi       = {10.1007/s11623-020-1260-x},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Coester20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterF20,
  author    = {Ulla Coester and
               Bernd Fuhlert},
  title     = {Gesichtserkennung - eine Frage der Ethik?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {48--51},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1221-4},
  doi       = {10.1007/s11623-019-1221-4},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/CoesterF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad20,
  author    = {Conrad Sebastian Conrad},
  title     = {Datenschutz bei Zukunftsmodellen: Nur mit Einwilligung m{\"{o}}glich?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {611--616},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1334-9},
  doi       = {10.1007/s11623-020-1334-9},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DickhautJRL20,
  author    = {Ernestine Dickhaut and
               Andreas Janson and
               Alexander Ro{\ss}nagel and
               Jan Marco Leimeister},
  title     = {Interdisziplin{\"{a}}re Anforderungsmuster f{\"{u}}r smarte
               pers{\"{o}}nliche Assistenten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {579--583},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1328-7},
  doi       = {10.1007/s11623-020-1328-7},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DickhautJRL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DickhautTJ20,
  author    = {Ernestine Dickhaut and
               Laura Friederike Thies and
               Andreas Janson},
  title     = {Die Kodifizierung von Gestaltungswissen in interdisziplin{\"{a}}ren
               Entwurfsmustern},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {584--588},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1329-6},
  doi       = {10.1007/s11623-020-1329-6},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DickhautTJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix20,
  author    = {Alexander Dix},
  title     = {Die deutsche Corona Warn-App - ein gelungenes Beispiel f{\"{u}}r
               Privacy by Design?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {779--785},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1366-1},
  doi       = {10.1007/s11623-020-1366-1},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Dix20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DolleHC20,
  author    = {Wilhelm Dolle and
               Julian Herlinghaus and
               Marian Corbe},
  title     = {Sinn und Unsinn von Zertifizierungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {641--644},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1340-y},
  doi       = {10.1007/s11623-020-1340-y},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DolleHC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FahrmannA20,
  author    = {Jan F{\"{a}}hrmann and
               Clemens Arzt},
  title     = {Polizeilicher Umgang mit personenbezogenen Daten in der Corona-Pandemie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {801--805},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1370-5},
  doi       = {10.1007/s11623-020-1370-5},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FahrmannA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerD20,
  author    = {Arno Fiedler and
               Christian Drews},
  title     = {Vertrauen in der digitalen Welt auf , , Treu und Glauben"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {231--235},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1257-5},
  doi       = {10.1007/s11623-020-1257-5},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20,
  author    = {Dirk Fox},
  title     = {Offene Herausforderungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {81},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1227-y},
  doi       = {10.1007/s11623-020-1227-y},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20a,
  author    = {Dirk Fox},
  title     = {Beben},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {497},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1312-2},
  doi       = {10.1007/s11623-020-1312-2},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20b,
  author    = {Dirk Fox},
  title     = {Die Praxis sollte das Ergebnis des Nachdenkens sein. Hermann Hesse},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {709},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1353-6},
  doi       = {10.1007/s11623-020-1353-6},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrankB20,
  author    = {Guido Frank and
               Thomas Becker},
  title     = {Aus dem Nirwana},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {456--461},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1305-1},
  doi       = {10.1007/s11623-020-1305-1},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FrankB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FreyeKEM20,
  author    = {Merle Freye and
               Dennis{-}Kenji Kipker and
               Rindstone B. Ezekiel and
               Doreen F. Mwamlangala},
  title     = {Strengthening protection of personal data in the health sector: a
               comparative analysis of the Tanzanian and German eHealth system},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {393--397},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1291-3},
  doi       = {10.1007/s11623-020-1291-3},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FreyeKEM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrickeL20,
  author    = {Frank Fricke and
               Philipp L{\"{o}}hr},
  title     = {Datenschutzrechtliche Zul{\"{a}}ssigkeitspr{\"{u}}fungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {169--171},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1245-9},
  doi       = {10.1007/s11623-020-1245-9},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FrickeL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn20,
  author    = {Christian L. Geminn},
  title     = {Betroffenenrechte verbessern},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {307--311},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1273-5},
  doi       = {10.1007/s11623-020-1273-5},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Geminn20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeminnSWAV20,
  author    = {Christian L. Geminn and
               Jessica M. Szczuka and
               Carina Weber and
               Andr{\'{e}} Artelt and
               Lina Varonina},
  title     = {Kinder als Nutzende smarter Sprachassistenten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {606--610},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1333-x},
  doi       = {10.1007/s11623-020-1333-x},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GeminnSWAV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingGHP20,
  author    = {Rainer W. Gerling and
               Sebastian Gerling and
               Stefan Hessel and
               Ronald Petrlic},
  title     = {Stand der Technik bei Videokonferenzen - und die Interpretation der
               Aufsichtsbeh{\"{o}}rden},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {740--747},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1359-0},
  doi       = {10.1007/s11623-020-1359-0},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GerlingGHP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Glatzner20,
  author    = {Florian Glatzner},
  title     = {Profilbildung und algorithmenbasierte Entscheidungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {312--315},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1274-4},
  doi       = {10.1007/s11623-020-1274-4},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Glatzner20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GohrKS20,
  author    = {Aron Gohr and
               Dominik Klein and
               Werner Schindler},
  title     = {Verr{\"{a}}terischer Stromverbrauch},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {431--435},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1300-6},
  doi       = {10.1007/s11623-020-1300-6},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GohrKS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gomez-BarreroKB20,
  author    = {Marta Gomez{-}Barrero and
               Jascha Kolberg and
               Christoph Busch},
  title     = {Erkennung von Pr{\"{a}}sentationsangriffen auf Fingerabdruck
               Systemen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {26--31},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1217-0},
  doi       = {10.1007/s11623-019-1217-0},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gomez-BarreroKB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grafenstein20,
  author    = {Max von Grafenstein},
  title     = {Innovationsoffener Datenschutz durch Folgenabsch{\"{a}}tzungen
               und Technikgestaltung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {172--175},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1246-8},
  doi       = {10.1007/s11623-020-1246-8},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Grafenstein20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichK20,
  author    = {Ludwig Gramlich and
               Kerstin Kreul},
  title     = {Novellierung des Post-Datenschutzes in Deutschland},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {469--474},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1307-z},
  doi       = {10.1007/s11623-020-1307-z},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GramlichK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grethel20,
  author    = {Monika Grethel},
  title     = {Einsatz von WhatsApp durch saarl{\"{a}}ndische Kommunen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {148},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1240-1},
  doi       = {10.1007/s11623-020-1240-1},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Grethel20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrubeHSS20,
  author    = {Tim Grube and
               Alexander Heinrich and
               Jan{-}Philipp Stroscher and
               Sabrina Schomberg},
  title     = {Datensicherheit von Corona-Apps nach der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {501--505},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1314-0},
  doi       = {10.1007/s11623-020-1314-0},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GrubeHSS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber20,
  author    = {Joachim Gruber},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {492--496},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1311-3},
  doi       = {10.1007/s11623-020-1311-3},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gruber20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GuhrKM20,
  author    = {Alisha G{\"{u}}hr and
               Irene Karper and
               S{\"{o}}nke Maseberg},
  title     = {Der lange Weg zur Akkreditierung nach Art. 42 {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {649--653},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1342-9},
  doi       = {10.1007/s11623-020-1342-9},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GuhrKM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Haas20,
  author    = {Werner Haas},
  title     = {Sicherheit auf Sand gebaut?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {441--445},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1302-4},
  doi       = {10.1007/s11623-020-1302-4},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Haas20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HamacherKKS20,
  author    = {Kay Hamacher and
               Stefan Katzenbeisser and
               Tobias Kussel and
               Sebastian Stammler},
  title     = {Genomische Daten und der Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {87--93},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1229-9},
  doi       = {10.1007/s11623-020-1229-9},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HamacherKKS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeckmannST20,
  author    = {Benjamin Heckmann and
               Florian Schweighart and
               Markus Tasch},
  title     = {{JOINED-VIV:} Umsetzung der {DSGVO} mittels {SDM} und unter Einbindung
               des {BSI} IT-Grundschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {663--667},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1345-6},
  doi       = {10.1007/s11623-020-1345-6},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HeckmannST20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henniger20,
  author    = {Olaf Henniger},
  title     = {Neue Normen f{\"{u}}r biometrische Datenaustauschformate},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {43--47},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1220-5},
  doi       = {10.1007/s11623-019-1220-5},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Henniger20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HesselP20,
  author    = {Stefan Hessel and
               Karin Potel},
  title     = {Zur Notwendigkeit einer Data Breach Notification bei Datentr{\"{a}}gerverschl{\"{u}}sselung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {94--97},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1230-3},
  doi       = {10.1007/s11623-020-1230-3},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/HesselP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeuftF20,
  author    = {Matthias Heuft and
               Dirk Feldhusen},
  title     = {Angriffe auf Chips in Reisep{\"{a}}ssen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {436--440},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1301-5},
  doi       = {10.1007/s11623-020-1301-5},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HeuftF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HobertB20,
  author    = {Sebastian Hobert and
               Florian Berens},
  title     = {Chatbot-basierte Lernsysteme als k{\"{u}}nstliche Tutoren in
               der Lehre},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {594--599},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1331-z},
  doi       = {10.1007/s11623-020-1331-z},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HobertB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HobertB20a,
  author    = {Sebastian Hobert and
               Florian Berens},
  title     = {Chatbot-basierte Lernsysteme alsk{\"{u}}nstliche Tutoren in der
               Lehre},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {600--605},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1332-y},
  doi       = {10.1007/s11623-020-1332-y},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HobertB20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenP20,
  author    = {Thomas Hoeren and
               Stefan Pinelli},
  title     = {Datenschutz im neuen chinesischen Zivilgesetzbuch},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {678--680},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1348-3},
  doi       = {10.1007/s11623-020-1348-3},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HoerenP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JahnelGW20,
  author    = {Tina Jahnel and
               Ansgar Gerhardus and
               Julian Wienert},
  title     = {Digitales Contact Tracing: Dilemma zwischen Datenschutz und Public
               Health Nutzenbewertung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {786--790},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1367-0},
  doi       = {10.1007/s11623-020-1367-0},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JahnelGW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JaspersJ20,
  author    = {Andreas Jaspers and
               Tobias Jacquemain},
  title     = {Datenschutz-Grundverordnung - Praxiserfahrungen und Evaluation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {297--301},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1271-7},
  doi       = {10.1007/s11623-020-1271-7},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JaspersJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jelinek20,
  author    = {Andrea Jelinek},
  title     = {{FAQ} on the judgment of the Court of Justice of the European Union
               in Case {C-311/18} - Data Protection Commissioner v Facebook Ireland
               Ltd and Maximillian Schrems},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {681--683},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1349-2},
  doi       = {10.1007/s11623-020-1349-2},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Jelinek20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JohnW20,
  author    = {Nicolas John and
               Maximilian Wellmann},
  title     = {Datenschutzrechtliche Fragestellungen zur Auswahl von Videokonferenztools},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {506--510},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1315-z},
  doi       = {10.1007/s11623-020-1315-z},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JohnW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20,
  author    = {Ulrich Kelber},
  title     = {BfDI verh{\"{a}}ngt Geldbu{\ss}en gegen Telekommunikationsdienstleister},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {85--86},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1228-x},
  doi       = {10.1007/s11623-020-1228-x},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20a,
  author    = {Ulrich Kelber},
  title     = {Nicht Daten sind der Rohstoff des 21. Jahrhunderts, sondern Vertrauen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {226--227},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1255-7},
  doi       = {10.1007/s11623-020-1255-7},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20b,
  author    = {Ulrich Kelber},
  title     = {BfDI zu Folgen der Gesetzgebung des {PDSG}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {640},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1339-4},
  doi       = {10.1007/s11623-020-1339-4},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kelber20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker20,
  author    = {Dennis{-}Kenji Kipker},
  title     = {{EU} Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {263--265},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1264-6},
  doi       = {10.1007/s11623-020-1264-6},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker20a,
  author    = {Dennis{-}Kenji Kipker},
  title     = {{EU} Cybersecurity Act and Certification Schemes: an up-to-date progress
               report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {390--392},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1290-4},
  doi       = {10.1007/s11623-020-1290-4},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerB20,
  author    = {Dennis{-}Kenji Kipker and
               Benedikt Buchner},
  title     = {Digitale Herausforderungen der Corona-Pandemie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {773--775},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1364-3},
  doi       = {10.1007/s11623-020-1364-3},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klink-StraubS20,
  author    = {Judith Klink{-}Straub and
               Tobias Straub},
  title     = {Der Auskunftsanspruch bei Pr{\"{u}}fungsunterlagen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {672--677},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1347-4},
  doi       = {10.1007/s11623-020-1347-4},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Klink-StraubS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KnieperT20,
  author    = {Thomas Knieper and
               Marie{-}Theres Tinnefeld},
  title     = {Politische Satiren und Karikaturen - eine Bastion offener Demokratien?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {375--380},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1287-z},
  doi       = {10.1007/s11623-020-1287-z},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KnieperT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KnuchelE20,
  author    = {Christian Knuchel and
               Nico Ebert},
  title     = {DSGVO-konformes L{\"{o}}schen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {126--127},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1235-y},
  doi       = {10.1007/s11623-020-1235-y},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KnuchelE20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KochPW20,
  author    = {Manuel Koch and
               Andrea Pawils and
               Enrico Weide},
  title     = {Das Standard-Datenschutzmodell in der Telematikinfrastruktur},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {104--110},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1232-1},
  doi       = {10.1007/s11623-020-1232-1},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KochPW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Krasemann20,
  author    = {Henry Krasemann},
  title     = {Der aktuelle Stand der Datenschutz- Zertifizierung und Akkreditierung
               in Deutschland und Europa},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {645--648},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1341-x},
  doi       = {10.1007/s11623-020-1341-x},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Krasemann20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20,
  author    = {Dieter Kugelmann},
  title     = {Kann und darf das Handy gegen Corona helfen?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {350},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1281-5},
  doi       = {10.1007/s11623-020-1281-5},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20a,
  author    = {Dieter Kugelmann},
  title     = {Rolle, Strategien, Aktionsplan 2020},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {430},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1299-8},
  doi       = {10.1007/s11623-020-1299-8},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20b,
  author    = {Dieter Kugelmann},
  title     = {Neue Welle von Schadsoftware - Anstieg von Datenpannen in diesen Tagen
               aufgrund von Phishing Mails},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {500},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1313-1},
  doi       = {10.1007/s11623-020-1313-1},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugler20,
  author    = {Dennis K{\"{u}}gler},
  title     = {Expedition in den Nanokosmos},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {425},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1297-x},
  doi       = {10.1007/s11623-020-1297-x},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugler20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuglerR20,
  author    = {Dennis K{\"{u}}gler and
               Helmut Reimer},
  title     = {Was tun? Sicherheitsl{\"{u}}cken in Hardware},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {475},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1308-y},
  doi       = {10.1007/s11623-020-1308-y},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KuglerR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling20,
  author    = {J{\"{u}}rgen K{\"{u}}hling},
  title     = {Privatheit am Arbeitsplatz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {182--188},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1248-6},
  doi       = {10.1007/s11623-020-1248-6},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Kuhling20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KusS20,
  author    = {Mehmet Kus and
               Karsten Sohr},
  title     = {Praktische Erfahrungen und Ans{\"{a}}tze f{\"{u}}r {\^{a}}Security
               by Design' auf Basis der STRIDE-Methodik},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {750--754},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1361-6},
  doi       = {10.1007/s11623-020-1361-6},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KusS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Labusga20,
  author    = {Jan{-}Hendrik Labusga},
  title     = {Die Fristberechnung beim Data Breach},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {735--739},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1358-1},
  doi       = {10.1007/s11623-020-1358-1},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Labusga20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lower20,
  author    = {Daniel L{\"{o}}wer},
  title     = {Vertrauen im E-Commerce},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {236--239},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1258-4},
  doi       = {10.1007/s11623-020-1258-4},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Lower20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierFW20,
  author    = {Dominik Maier and
               Fabian Franzen and
               Manuela Wagner},
  title     = {Mehr schlecht als Recht: Grauzone Sicherheitsforschung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {511--517},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1316-y},
  doi       = {10.1007/s11623-020-1316-y},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MaierFW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MargrafB20,
  author    = {Marian Margraf and
               Nicolas Buchmann},
  title     = {Gew{\"{a}}hrleistung langfristiger Sicherheit f{\"{u}}r
               Breeder-Dokumente durch Biometrie und Blockchain-Technologie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {32--37},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1218-z},
  doi       = {10.1007/s11623-019-1218-z},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/MargrafB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Martin20,
  author    = {Nicholas Martin},
  title     = {Corona-Eind{\"{a}}mmung in Taiwan},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {815--818},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1373-2},
  doi       = {10.1007/s11623-020-1373-2},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Martin20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinMSFH20,
  author    = {Nicholas Martin and
               Britta Alexandra Mester and
               Ina Schiering and
               Michael Friedewald and
               Dara Hallinan},
  title     = {Datenschutz-Folgenabsch{\"{a}}tzung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {149--153},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1241-0},
  doi       = {10.1007/s11623-020-1241-0},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MartinMSFH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinSF20,
  author    = {Nicholas Martin and
               Ina Schiering and
               Michael Friedewald},
  title     = {Methoden der Datenschutz-Folgenabsch{\"{a}}tzung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {154--160},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1242-z},
  doi       = {10.1007/s11623-020-1242-z},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MartinSF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MayerBDSV20,
  author    = {Peter Mayer and
               Fabian Ballreich and
               Reyhan D{\"{u}}zg{\"{u}}n and
               Christian Schwartz and
               Melanie Volkamer},
  title     = {Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {522--527},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1318-9},
  doi       = {10.1007/s11623-020-1318-9},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MayerBDSV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MerkleRSB20,
  author    = {Johannes Merkle and
               Christian Rathgeb and
               Ulrich Scherhag and
               Christoph Busch},
  title     = {Morphing-Angriffe},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {38--42},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1219-y},
  doi       = {10.1007/s11623-019-1219-y},
  timestamp = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/MerkleRSB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester20,
  author    = {Britta Alexandra Mester},
  title     = {Datenschutz-Folgenabsch{\"{a}}tzung - Chance des Datenschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {145},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1239-7},
  doi       = {10.1007/s11623-020-1239-7},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Mester20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Miller20,
  author    = {Felix Miller},
  title     = {Root-of-Trust-Architekturen als Open-Source-Hardware und deren Zertifizierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {451--455},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1304-2},
  doi       = {10.1007/s11623-020-1304-2},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Miller20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NagelePS20,
  author    = {Peter N{\"{a}}gele and
               Ronald Petrlic and
               Frank Schemmel},
  title     = {Die Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {719--728},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1356-3},
  doi       = {10.1007/s11623-020-1356-3},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/NagelePS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen20,
  author    = {Kim Nguyen},
  title     = {Vertrauen ist die Basis f{\"{u}}r Digitale Souver{\"{a}}nit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {221},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1253-9},
  doi       = {10.1007/s11623-020-1253-9},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Nguyen20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen20a,
  author    = {Kim Nguyen},
  title     = {Der Lebenszyklus von Souver{\"{a}}nit{\"{a}}t und Vertrauen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {228--230},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1256-6},
  doi       = {10.1007/s11623-020-1256-6},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Nguyen20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Niekrenz20,
  author    = {Elisabeth Niekrenz},
  title     = {E-Evidence-Verordnung: Datenzugriff durch Strafverfolgungbeh{\"{o}}rden
               aus dem Ausland?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {535--536},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1320-2},
  doi       = {10.1007/s11623-020-1320-2},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Niekrenz20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel20,
  author    = {Maurice Oettel},
  title     = {Smart Human und der Schutz der Gedanken},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {386--389},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1289-x},
  doi       = {10.1007/s11623-020-1289-x},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Oettel20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel20a,
  author    = {Maurice Oettel},
  title     = {Datensparsame Daten{\"{u}}bertragbarkeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {819--823},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1374-1},
  doi       = {10.1007/s11623-020-1374-1},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Oettel20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri20,
  author    = {Thomas Petri},
  title     = {Rechtsprechung zur {DSGVO} in den Jahren 2019 - 2020 - eine Auswahl},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {810--814},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1372-3},
  doi       = {10.1007/s11623-020-1372-3},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Petri20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollmann20,
  author    = {Maren Pollmann},
  title     = {Weltweites Vergessenwerden? Zur r{\"{a}}umlichen Reichweite des
               Rechts auf Auslistung bei Suchmaschinen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {365--368},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1285-1},
  doi       = {10.1007/s11623-020-1285-1},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Pollmann20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PrietzRS20,
  author    = {Christian Prietz and
               Martin Rost and
               Julia Stoll},
  title     = {Pr{\"{u}}fverfahren zur datenschutzrechtlichen Zertifizierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {654--658},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1343-8},
  doi       = {10.1007/s11623-020-1343-8},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PrietzRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rathgeb20,
  author    = {Christian Rathgeb},
  title     = {Neue Herausforderungen f{\"{u}}r biometrische Technologien},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {1},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1211-6},
  doi       = {10.1007/s11623-019-1211-6},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rathgeb20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20,
  author    = {Helmut Reimer},
  title     = {Der Unterschied},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {429},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1298-9},
  doi       = {10.1007/s11623-020-1298-9},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20a,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {485--491},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1310-4},
  doi       = {10.1007/s11623-020-1310-4},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20b,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {555--564},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1323-z},
  doi       = {10.1007/s11623-020-1323-z},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20c,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {700--708},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1352-7},
  doi       = {10.1007/s11623-020-1352-7},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer20c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW20,
  author    = {Helmut Reimer and
               Christoph Wegener},
  title     = {Datenschutz in Krisenzeiten oder Krise des Datenschutzes?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {684},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1350-9},
  doi       = {10.1007/s11623-020-1350-9},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ReimerW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reinhardt20,
  author    = {J{\"{o}}rn Reinhardt},
  title     = {, , Recht auf Vergessen" auf Franz{\"{o}}sisch},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {361--364},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1284-2},
  doi       = {10.1007/s11623-020-1284-2},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reinhardt20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RiebeHDLRFR20,
  author    = {Thea Riebe and
               Jasmin Haunschild and
               Felix Divo and
               Matthias Lang and
               Gerbert Roitburd and
               Jonas Franken and
               Christian Reuter},
  title     = {Die Vorratsdatenspeicherung in Europa},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {316--321},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1275-3},
  doi       = {10.1007/s11623-020-1275-3},
  timestamp = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/RiebeHDLRFR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Roosendaal20,
  author    = {Arnold Roosendaal},
  title     = {DPIAs in practice - a strategic instrument for compliance},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {166--168},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1244-x},
  doi       = {10.1007/s11623-020-1244-x},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Roosendaal20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Evaluation nutzen!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {281--283},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1267-3},
  doi       = {10.1007/s11623-020-1267-3},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20a,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Evaluation der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {287--292},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1269-1},
  doi       = {10.1007/s11623-020-1269-1},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20b,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Smarte Pers{\"{o}}nliche Assistenten gestalten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {565--566},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1324-y},
  doi       = {10.1007/s11623-020-1324-y},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RostW20,
  author    = {Martin Rost and
               Sebastian Welke},
  title     = {{SDM} 2.0 und {ITIL} 4 , , verschr{\"{a}}nkt"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {258--262},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1263-7},
  doi       = {10.1007/s11623-020-1263-7},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RostW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchieringMFMS20,
  author    = {Ina Schiering and
               Britta Alexandra Mester and
               Michael Friedewald and
               Nicholas Martin},
  title     = {Datenschutz-Risiken partizipativ identifizieren und analysieren},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {161--165},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1243-y},
  doi       = {10.1007/s11623-020-1243-y},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchieringMFMS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlegel20,
  author    = {Daniela Schlegel},
  title     = {Vertrauenskrise in die digitale Welt?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {254--257},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1262-8},
  doi       = {10.1007/s11623-020-1262-8},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Schlegel20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schleipfer20,
  author    = {Stefan Schleipfer},
  title     = {Ende-zu-Ende-Verschl{\"{u}}sselung von E-Mails},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {748--749},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1360-7},
  doi       = {10.1007/s11623-020-1360-7},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Schleipfer20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe20,
  author    = {Maximilian Schnebbe},
  title     = {Digitale Assistenzsysteme in der Industrie und Produktion},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {398--400},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1292-2},
  doi       = {10.1007/s11623-020-1292-2},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schnebbe20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS20,
  author    = {Dominik Schrahe and
               Thomas St{\"{a}}dter},
  title     = {Gesundheits-Apps auf Rezept und Forschung mit Gesundheitsdaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {713--718},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1355-4},
  doi       = {10.1007/s11623-020-1355-4},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchraheS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulteW20,
  author    = {Laura Schulte and
               Tim Wambach},
  title     = {Zielkonflikte zwischen Datenschutz und IT-Sicherheit im Kontext der
               Aufkl{\"{a}}rung von Sicherheitsvorf{\"{a}}llen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {462--468},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1306-0},
  doi       = {10.1007/s11623-020-1306-0},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchulteW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz20,
  author    = {Sebastian Schulz},
  title     = {Die Evaluation der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {302--306},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1272-6},
  doi       = {10.1007/s11623-020-1272-6},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schulz20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seiter20,
  author    = {Stefan R. Seiter},
  title     = {Wer bestimmt {\"{u}}ber uns?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {571},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1325-x},
  doi       = {10.1007/s11623-020-1325-x},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Seiter20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sleiman20,
  author    = {Mohamed Bou Sleiman},
  title     = {Das Corona-Virus - Ein Katalysator f{\"{u}}r Cyberkriminalit{\"{a}}t?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {806--809},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1371-4},
  doi       = {10.1007/s11623-020-1371-4},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Sleiman20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Smoltczyk20,
  author    = {Maja Smoltczyk},
  title     = {Nach "Schrems II": Europa braucht digitale Eigenst{\"{a}}ndigkeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {572},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1326-9},
  doi       = {10.1007/s11623-020-1326-9},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Smoltczyk20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SowaR20,
  author    = {Aleksandra Sowa and
               Martin Rost},
  title     = {Die {ISO} 27701 und das {SDM-V2} im Lichte der Umsetzung der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {659--662},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1344-7},
  doi       = {10.1007/s11623-020-1344-7},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SowaR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SpeithBEPP20,
  author    = {Julian Speith and
               Steffen Becker and
               Maik Ender and
               Endres Puschner and
               Christof Paar},
  title     = {Hardware-Trojaner},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {7},
  pages     = {446--450},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1303-3},
  doi       = {10.1007/s11623-020-1303-3},
  timestamp = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Streinz20,
  author    = {Rudolf Streinz},
  title     = {, , Recht auf Vergessenwerden" zwischen Unionsrecht und Verfassungsrecht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {353--360},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1283-3},
  doi       = {10.1007/s11623-020-1283-3},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Streinz20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TamsS20,
  author    = {Benjamin Tams and
               Michael Schwaiger},
  title     = {Die Bedeutung qualit{\"{a}}tsgesicherter biometrischer Daten
               f{\"{u}}r das {EU} Einreise-/Ausreisesystem {(EES)}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {23--25},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1216-1},
  doi       = {10.1007/s11623-019-1216-1},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/TamsS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThielT20,
  author    = {Christoph Thiel and
               Christian Thiel},
  title     = {Distributed Ledger Technologie {(DLT)} im Kontext europ{\"{a}}ischer
               Vertrauensdienste},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {250--253},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1261-9},
  doi       = {10.1007/s11623-020-1261-9},
  timestamp = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ThielT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThiesDJRL020,
  author    = {Laura Friederike Thies and
               Ernestine Dickhaut and
               Andreas Janson and
               Alexander Ro{\ss}nagel and
               Jan Marco Leimeister and
               Matthias S{\"{o}}llner},
  title     = {Die Simulationsstudie als Evaluationsmethode},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {589--593},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1330-0},
  doi       = {10.1007/s11623-020-1330-0},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ThiesDJRL020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThiesJK020,
  author    = {Laura Friederike Thies and
               Silke Jandt and
               Robin Knote and
               Matthias S{\"{o}}llner},
  title     = {Konflikt{\"{a}}re Anforderungen an smarte pers{\"{o}}nliche
               Assistenten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {573--578},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1327-8},
  doi       = {10.1007/s11623-020-1327-8},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ThiesJK020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld20,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Die Bedeutung von Informanten f{\"{u}}r Presse und Demokratie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {381--385},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1288-y},
  doi       = {10.1007/s11623-020-1288-y},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB20,
  author    = {Marie{-}Theres Tinnefeld and
               Benedikt Buchner},
  title     = {Gundrechtliche Freiheiten in St{\"{o}}rf{\"{a}}llen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {345--346},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1280-6},
  doi       = {10.1007/s11623-020-1280-6},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TinnefeldB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TolsdorfBDFS20,
  author    = {Jan Tolsdorf and
               Christian K. Bosse and
               Aljoscha Dietrich and
               Denis Feth and
               Hartmut Schmitt},
  title     = {Privatheit am Arbeitsplatz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {176--181},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1247-7},
  doi       = {10.1007/s11623-020-1247-7},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TolsdorfBDFS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TonnissenT20,
  author    = {Stefan T{\"{o}}nnissen and
               Frank Teuteberg},
  title     = {{DSGVO} und die Blockchain},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {322--327},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1276-2},
  doi       = {10.1007/s11623-020-1276-2},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TonnissenT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TwickelBB20,
  author    = {Arndt von Twickel and
               Jennifer Breuer and
               Ralph Breithaupt},
  title     = {Vereinbarkeit von Biometrieforschung und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {9--15},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1214-3},
  doi       = {10.1007/s11623-019-1214-3},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/TwickelBB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Uhl20,
  author    = {Andreas Uhl},
  title     = {Venen Biometrie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {16--22},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1215-2},
  doi       = {10.1007/s11623-019-1215-2},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Uhl20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ulmenstein20,
  author    = {Ulrich Freiherr von Ulmenstein},
  title     = {Datensouver{\"{a}}nit{\"{a}}t durch repr{\"{a}}sentative
               Rechtswahrnehmung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {528--534},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1319-8},
  doi       = {10.1007/s11623-020-1319-8},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Ulmenstein20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese20,
  author    = {Sven Venzke{-}Caprarese},
  title     = {Zur Praxistauglichkeit des Datenschutzes in der digitalen Kommunikation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {796--800},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1369-y},
  doi       = {10.1007/s11623-020-1369-y},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Venzke-Caprarese20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VogelgesangMS20,
  author    = {Stephanie Vogelgesang and
               Frederik M{\"{o}}llers and
               Tim Schneider},
  title     = {Strafrechtliche Relevanz von AdCloaking},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {537--543},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1321-1},
  doi       = {10.1007/s11623-020-1321-1},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/VogelgesangMS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerH20,
  author    = {Melanie Volkamer and
               Tobias Hilt},
  title     = {Sensibilisierung f{\"{u}}r Phishing und andere betr{\"{u}}gerische
               Nachrichten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {121--125},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1234-z},
  doi       = {10.1007/s11623-020-1234-z},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/VolkamerH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerSB20,
  author    = {Melanie Volkamer and
               Martina Angela Sasse and
               Franziska Boehm},
  title     = {Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {8},
  pages     = {518--521},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1317-x},
  doi       = {10.1007/s11623-020-1317-x},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/VolkamerSB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner20,
  author    = {Manuela Wagner},
  title     = {IT-Sicherheitsforschung in rechtlicher Grauzone},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {111--120},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1233-0},
  doi       = {10.1007/s11623-020-1233-0},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Wagner20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener20,
  author    = {Christoph Wegener},
  title     = {Papier ist geduldig},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {10},
  pages     = {637},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1338-5},
  doi       = {10.1007/s11623-020-1338-5},
  timestamp = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wegener20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert20,
  author    = {Thilo Weichert},
  title     = {Die DSGVO, ein - ganz guter - Anfang},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {293--296},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1270-8},
  doi       = {10.1007/s11623-020-1270-8},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weik20,
  author    = {Ramona Weik},
  title     = {Die Datenkopie nach Artikel 15 Abs. 3 {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {98--103},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1231-2},
  doi       = {10.1007/s11623-020-1231-2},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Weik20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeikD20,
  author    = {Ramona Weik and
               Andreas Diehl},
  title     = {Die Beantwortung von Auskunftsersuchen nach Art. 15 {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {729--734},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1357-2},
  doi       = {10.1007/s11623-020-1357-2},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/WeikD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Will20,
  author    = {Michael Will},
  title     = {Brauchen wir eine Zentralisierung der Datenschutzaufsicht?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {369--374},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1286-0},
  doi       = {10.1007/s11623-020-1286-0},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Will20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20,
  title     = {Trickkiste Biometrie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {5},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1212-5},
  doi       = {10.1007/s11623-019-1212-5},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20a,
  title     = {{DSK:} Standard-Datenschutzmodell {V2}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {6--8},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1213-4},
  doi       = {10.1007/s11623-019-1213-4},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20aa,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {764--772},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1363-4},
  doi       = {10.1007/s11623-020-1363-4},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20aa.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ab,
  title     = {Bewertung der {DSK} zu MS-Office 365: Nachbesserungen geboten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {778},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1365-2},
  doi       = {10.1007/s11623-020-1365-2},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20ab.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ac,
  title     = {Cyber-Sicherheitsstrategie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {824},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1375-0},
  doi       = {10.1007/s11623-020-1375-0},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20ac.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ad,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {825--834},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1376-z},
  doi       = {10.1007/s11623-020-1376-z},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20ad.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ae,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {835--841},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1377-y},
  doi       = {10.1007/s11623-020-1377-y},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20ae.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20af,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {12},
  pages     = {841--844},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1378-x},
  doi       = {10.1007/s11623-020-1378-x},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20af.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20b,
  title     = {98. {DSK} Trier, 06. - 07. November 2019, Entschlie{\ss}ungen und
               Empfehlungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {58--60},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1223-2},
  doi       = {10.1007/s11623-019-1223-2},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20c,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {61--71},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1224-1},
  doi       = {10.1007/s11623-019-1224-1},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20d,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {72--77},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1225-0},
  doi       = {10.1007/s11623-019-1225-0},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20e,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {1},
  pages     = {77--80},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-019-1226-z},
  doi       = {10.1007/s11623-019-1226-z},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20f,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {128--133},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1236-x},
  doi       = {10.1007/s11623-020-1236-x},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20g,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {134--140},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1237-9},
  doi       = {10.1007/s11623-020-1237-9},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20h,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {2},
  pages     = {141--144},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1238-8},
  doi       = {10.1007/s11623-020-1238-8},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20i,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {199--211},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1251-y},
  doi       = {10.1007/s11623-020-1251-y},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20j,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {3},
  pages     = {212--220},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1252-x},
  doi       = {10.1007/s11623-020-1252-x},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20k,
  title     = {Vorsicht - Glatteis!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {225},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1254-8},
  doi       = {10.1007/s11623-020-1254-8},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20k.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20l,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {266--271},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1265-5},
  doi       = {10.1007/s11623-020-1265-5},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20l.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20m,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {4},
  pages     = {272--280},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1266-4},
  doi       = {10.1007/s11623-020-1266-4},
  timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20m.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20n,
  title     = {Datenschutzrechtliche Informationen im Zusammenhang mit der Corona-Pandemie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {286},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1268-2},
  doi       = {10.1007/s11623-020-1268-2},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20n.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20o,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {328--334},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1277-1},
  doi       = {10.1007/s11623-020-1277-1},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20o.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20p,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {335--340},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1278-0},
  doi       = {10.1007/s11623-020-1278-0},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20p.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20q,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {5},
  pages     = {341--344},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1279-z},
  doi       = {10.1007/s11623-020-1279-z},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20q.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20r,
  title     = {K{\"{u}}ndigung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {401},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1293-1},
  doi       = {10.1007/s11623-020-1293-1},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20r.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20s,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {402--412},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1294-0},
  doi       = {10.1007/s11623-020-1294-0},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20s.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20t,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {413--421},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1295-z},
  doi       = {10.1007/s11623-020-1295-z},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20t.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20u,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {6},
  pages     = {421--424},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1296-y},
  doi       = {10.1007/s11623-020-1296-y},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20u.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20v,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {617--625},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1335-8},
  doi       = {10.1007/s11623-020-1335-8},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20v.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20w,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {626--632},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1336-7},
  doi       = {10.1007/s11623-020-1336-7},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20w.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20x,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {9},
  pages     = {632--636},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1337-6},
  doi       = {10.1007/s11623-020-1337-6},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X20x.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20y,
  title     = {Registermodernisierung verfassungskonform umsetzen!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {712},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1354-5},
  doi       = {10.1007/s11623-020-1354-5},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20y.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20z,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {44},
  number    = {11},
  pages     = {755--763},
  year      = {2020},
  url       = {https://doi.org/10.1007/s11623-020-1362-5},
  doi       = {10.1007/s11623-020-1362-5},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X20z.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AchenbachK19,
  author    = {Dirk Achenbach and
               Stefan Krebs},
  title     = {Pilotprojekt Cyberwehr Baden-W{\"{u}}rttemberg},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {719--722},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1195-2},
  doi       = {10.1007/s11623-019-1195-2},
  timestamp = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/AchenbachK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AhmadHK19,
  author    = {Jawad Ahmad and
               Detlef H{\"{u}}hnlein and
               Ulrike Korte},
  title     = {Sichere Digitalisierung mit {TR-RESISCAN} und {TR-ESOR}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {203--208},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1093-7},
  doi       = {10.1007/s11623-019-1093-7},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/AhmadHK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Aretz19,
  author    = {Christian Aretz},
  title     = {Meine Daten, meine Kontrolle},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {13--16},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1053-2},
  doi       = {10.1007/s11623-019-1053-2},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Aretz19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AuerbachSKT19,
  author    = {Benedikt Auerbach and
               Mary Shnayien and
               Eike Kiltz and
               Anna Tuschling},
  title     = {Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {706--712},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1193-4},
  doi       = {10.1007/s11623-019-1193-4},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/AuerbachSKT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeckerWPR19,
  author    = {Steffen Becker and
               Carina Wiesen and
               Christof Paar and
               Nikol Rummel},
  title     = {Wie arbeiten Reverse Engineers?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {686--690},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1190-7},
  doi       = {10.1007/s11623-019-1190-7},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BeckerWPR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Beissel19,
  author    = {Stefan Bei{\ss}el},
  title     = {Evaluation von Security-Awareness-Ma{\ss}nahmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {287--291},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1109-3},
  doi       = {10.1007/s11623-019-1109-3},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Beissel19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BenderMR19,
  author    = {Jens Bender and
               Bj{\"{o}}rn Metzler and
               Niels R{\"{a}}th},
  title     = {Neues vom Online-Ausweis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {194--197},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1091-9},
  doi       = {10.1007/s11623-019-1091-9},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BenderMR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann19,
  author    = {Dominik Bleckmann},
  title     = {Anforderungen der Datenschutz-Grundverordnung an Labore},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {137--142},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1080-z},
  doi       = {10.1007/s11623-019-1080-z},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Bleckmann19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BleckmannFHS19,
  author    = {Felix Bleckmann and
               Guido Frank and
               Michael Hoppe and
               Thomas Schnattinger},
  title     = {Notifizierung von eID-Systemen gem{\"{a}}{\ss} eIDAS},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {189--193},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1090-x},
  doi       = {10.1007/s11623-019-1090-x},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BleckmannFHS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Block19,
  author    = {Helga Block},
  title     = {Technische Anforderungen an technische und organisatorische Ma{\ss}nahmen
               beim E-Mail-Versand},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {64},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1064-z},
  doi       = {10.1007/s11623-019-1064-z},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Block19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boehme-Nessler19,
  author    = {Volker Boehme{-}Ne{\ss}ler},
  title     = {Gl{\"{a}}serne Prostituierte?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {342--346},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1119-1},
  doi       = {10.1007/s11623-019-1119-1},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Boehme-Nessler19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BonninghoffHKKN19,
  author    = {Benedikt T. B{\"{o}}nninghoff and
               Steffen Hessler and
               Dorothea Kolossa and
               Kerstin Kucharczik and
               Robert M. Nickel and
               Karin Pittner},
  title     = {Autorschaftsanalyse},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {691--699},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1191-6},
  doi       = {10.1007/s11623-019-1191-6},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BonninghoffHKKN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BorellS19,
  author    = {Anne Borell and
               Stephan Schindler},
  title     = {Polizei und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {767--773},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1203-6},
  doi       = {10.1007/s11623-019-1203-6},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BorellS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunSHM19,
  author    = {Daniel Braun and
               Elena Scepankova and
               Patrick Holl and
               Florian Matthes},
  title     = {The Potential of Customer-Centered LegalTech},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {760--766},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1202-7},
  doi       = {10.1007/s11623-019-1202-7},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BraunSHM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BrendelG19,
  author    = {Jacqueline Brendel and
               Nina Gerber},
  title     = {Sichere Instant Messaging Apps},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {276--280},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1107-5},
  doi       = {10.1007/s11623-019-1107-5},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BrendelG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BreyerD19,
  author    = {Jonas Breyer and
               Sven Duensing},
  title     = {Haftpflicht-Versicherungsschutz f{\"{u}}r Datenschutzbeauftragte
               nach der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {86--89},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1069-7},
  doi       = {10.1007/s11623-019-1069-7},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BreyerD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuchmannE19,
  author    = {Erik Buchmann and
               Susanne Eichhorn},
  title     = {Auskunftsersuchen nach Art. 15 {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {65--70},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1065-y},
  doi       = {10.1007/s11623-019-1065-y},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BuchmannE19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner19,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {234--242},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1099-1},
  doi       = {10.1007/s11623-019-1099-1},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner19a,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {723--731},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1196-1},
  doi       = {10.1007/s11623-019-1196-1},
  timestamp = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner19b,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {793--800},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1208-1},
  doi       = {10.1007/s11623-019-1208-1},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buttarelli19,
  author    = {Giovanni Buttarelli},
  title     = {{EDPS} calls for closer alignment between consumer and data protection
               rules in the {EU}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {6},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1051-4},
  doi       = {10.1007/s11623-019-1051-4},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buttarelli19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad19,
  author    = {Conrad Sebastian Conrad},
  title     = {Freelancer als Auftragsverarbeiter?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {134--136},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1079-5},
  doi       = {10.1007/s11623-019-1079-5},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad19a,
  author    = {Conrad Sebastian Conrad},
  title     = {Die Verantwortlichkeit in der Realit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {563--568},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1164-9},
  doi       = {10.1007/s11623-019-1164-9},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DammF19,
  author    = {Frank Damm and
               Hans{-}Peter Fischer},
  title     = {Lieferkette: Wie Cyber-Security von ad{\"{a}}quater Zusammenarbeit
               abh{\"{a}}ngt},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {418--425},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1137-z},
  doi       = {10.1007/s11623-019-1137-z},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DammF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DeiningerMB19,
  author    = {Axel Deininger and
               Kai Martius and
               Sebastian Barchnicki},
  title     = {Perspektiven und zuk{\"{u}}nftige Entwicklung der deutschen IT-Sicherheitswirtschaft},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {652--655},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1182-7},
  doi       = {10.1007/s11623-019-1182-7},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DeiningerMB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dunkel19,
  author    = {Heiko D{\"{u}}nkel},
  title     = {Kollektiver Rechtsschutz bei Datenschutzrechtsverst{\"{o}}{\ss}en},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {483--487},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1148-9},
  doi       = {10.1007/s11623-019-1148-9},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Dunkel19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurmusSP19,
  author    = {Erdem Durmus and
               Annika Selzer and
               Ulrich Pordesch},
  title     = {Das L{\"{o}}schen nach der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {786--791},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1206-3},
  doi       = {10.1007/s11623-019-1206-3},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DurmusSP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ertel19,
  author    = {Sebastian Ertel},
  title     = {Wer sch{\"{u}}tzt uns eigentlich?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {125},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1076-8},
  doi       = {10.1007/s11623-019-1076-8},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Ertel19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19,
  author    = {Eberhard von Faber},
  title     = {Null-Fehler-Sicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {393},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1131-5},
  doi       = {10.1007/s11623-019-1131-5},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19a,
  author    = {Eberhard von Faber},
  title     = {IT-Sicherheit 5.0},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {397},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1132-4},
  doi       = {10.1007/s11623-019-1132-4},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19b,
  author    = {Eberhard von Faber},
  title     = {Methoden: , , Secured by definition'' und die Umsetzung von Prinzipien
               aus dem Qualit{\"{a}}tsmanagement},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {410--417},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1136-0},
  doi       = {10.1007/s11623-019-1136-0},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FaberK19,
  author    = {Eberhard von Faber and
               Arndt Kohler},
  title     = {Die L{\"{u}}cke: Informationssicherheit in Systemen mit k{\"{u}}nstlicher
               Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {434--439},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1139-x},
  doi       = {10.1007/s11623-019-1139-x},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FaberK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FarkeRDG19,
  author    = {Florian Farke and
               Jan Rensinghoff and
               Markus D{\"{u}}rmuth and
               Tobias Gostomzyk},
  title     = {Recht auf Vergessen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {681--685},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1189-0},
  doi       = {10.1007/s11623-019-1189-0},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FarkeRDG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox19,
  author    = {Dirk Fox},
  title     = {Der Teufel und die Details},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {61},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1063-0},
  doi       = {10.1007/s11623-019-1063-0},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox19a,
  author    = {Dirk Fox},
  title     = {Bewegung im Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {253},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1102-x},
  doi       = {10.1007/s11623-019-1102-x},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox19b,
  author    = {Dirk Fox},
  title     = {Vom Wert des Fl{\"{u}}chtigen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {679},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1187-2},
  doi       = {10.1007/s11623-019-1187-2},
  timestamp = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FriedewaldSM19,
  author    = {Michael Friedewald and
               Ina Schiering and
               Nicholas Martin},
  title     = {Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {473--477},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1146-y},
  doi       = {10.1007/s11623-019-1146-y},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FriedewaldSM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlM19,
  author    = {Armin Gerl and
               Bianca Meier},
  title     = {The Layered Privacy Language Art. 12 - 14 {GDPR} Extension - Privacy
               Enhancing User Interfaces},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {747--752},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1200-9},
  doi       = {10.1007/s11623-019-1200-9},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GerlM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gola19,
  author    = {Peter Gola},
  title     = {Das Gesch{\"{a}}ftsgeheimnisgesetz und die Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {569--574},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1165-8},
  doi       = {10.1007/s11623-019-1165-8},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gola19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hagemeier19,
  author    = {Heike Hagemeier},
  title     = {Kryptografie - heute und zuk{\"{u}}nftig},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {631--635},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1178-3},
  doi       = {10.1007/s11623-019-1178-3},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hagemeier19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hartge19,
  author    = {Dagmar Hartge},
  title     = {Automatische Kennzeichenfahndung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {680},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1188-1},
  doi       = {10.1007/s11623-019-1188-1},
  timestamp = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hartge19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeinemannS19,
  author    = {Andreas Heinemann and
               Tobias Straub},
  title     = {Datenschutz muss benutzbar sein},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {7--12},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1052-3},
  doi       = {10.1007/s11623-019-1052-3},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/HeinemannS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hellerbach19,
  author    = {Amin Hellerbach},
  title     = {Abstrahlsicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {636--639},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1179-2},
  doi       = {10.1007/s11623-019-1179-2},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hellerbach19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HelmKMS19,
  author    = {Alexander Helm and
               Laura Kocksch and
               Alexander May and
               Estrid S{\o}rensen},
  title     = {Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer
               Aushandlungsprozess},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {713--718},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1194-3},
  doi       = {10.1007/s11623-019-1194-3},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HelmKMS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannLHA19,
  author    = {Eckehard Hermann and
               Harald Lampesberger and
               Lena Heimberger and
               Michael Altenhuber},
  title     = {Authentizit{\"{a}}t und Integrit{\"{a}}t des Aufnahmekontextes
               von Bildern},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {281--286},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1108-4},
  doi       = {10.1007/s11623-019-1108-4},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/HermannLHA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HonscheidH19,
  author    = {Christoph H{\"{o}}nscheid and
               Christian Heinze},
  title     = {Hohe Datensicherheit und Usability sind kein Widerspruch},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {33--34},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1057-y},
  doi       = {10.1007/s11623-019-1057-y},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/HonscheidH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hornung19,
  author    = {Gerrit Hornung},
  title     = {Implementierungsstrategien f{\"{u}}r effektiven Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {741--742},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1198-z},
  doi       = {10.1007/s11623-019-1198-z},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hornung19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoudeauHW19,
  author    = {Detlef Houdeau and
               Tina H{\"{u}}hnlein and
               Klaus{-}Dieter Wolfenstetter},
  title     = {Digitale Identit{\"{a}}t als Fundament der vertrauensw{\"{u}}rdigen
               Transformation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {209--213},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1094-6},
  doi       = {10.1007/s11623-019-1094-6},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HoudeauHW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HuhnleinH19,
  author    = {Tina H{\"{u}}hnlein and
               Detlef H{\"{u}}hnlein},
  title     = {Aufbruchsstimmung im eIDAS-{\"{O}}kosystem},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {185},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1088-4},
  doi       = {10.1007/s11623-019-1088-4},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HuhnleinH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HuhnleinKKR19,
  author    = {Detlef H{\"{u}}hnlein and
               Ulrike Korte and
               Andreas K{\"{u}}hne and
               Andrea R{\"{o}}ck},
  title     = {Neue APIs f{\"{u}}r das eIDAS-{\"{O}}kosystem},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {198--202},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1092-8},
  doi       = {10.1007/s11623-019-1092-8},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HuhnleinKKR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KellerH19,
  author    = {Ivo Keller and
               Friedrich{-}L. Holl},
  title     = {Kriterien: Wie Security auch f{\"{u}}r Safety verantwortlich
               wird},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {426--433},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1138-y},
  doi       = {10.1007/s11623-019-1138-y},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KellerH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker19,
  author    = {Dennis{-}Kenji Kipker},
  title     = {2. DSAnpUG-EU und die Talfahrt des deutschen Datenschutzrechts},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {371--372},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1124-4},
  doi       = {10.1007/s11623-019-1124-4},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker19a,
  author    = {Dennis{-}Kenji Kipker},
  title     = {Chinese Cybersecurity Law: Update zu den aktuellen Entwicklungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {583--586},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1167-6},
  doi       = {10.1007/s11623-019-1167-6},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker19b,
  author    = {Dennis{-}Kenji Kipker},
  title     = {{EU} Cybersicherheitsregulierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {792},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1207-2},
  doi       = {10.1007/s11623-019-1207-2},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerW19,
  author    = {Dennis{-}Kenji Kipker and
               Michael Walkusz},
  title     = {Hersteller- und Verk{\"{a}}uferpflichten bei softwarebezogenen
               IT-Sicherheitsupdates},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {513--517},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1154-y},
  doi       = {10.1007/s11623-019-1154-y},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KneuperM19,
  author    = {Ralf Kneuper and
               Martin Macke},
  title     = {Rolle der Transportverschl{\"{u}}sselung f{\"{u}}r die sichere
               E-Mail-Kommunikation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {76--80},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1067-9},
  doi       = {10.1007/s11623-019-1067-9},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KneuperM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KneuperP19,
  author    = {Ralf Kneuper and
               Mark Perlitz},
  title     = {Datenschutz bei nutzungsbasierter Online-Werbung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {502--506},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1152-0},
  doi       = {10.1007/s11623-019-1152-0},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KneuperP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koenig19,
  author    = {Christian Koenig},
  title     = {Die Digitale Kopie von Briefsendungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {551--558},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1162-y},
  doi       = {10.1007/s11623-019-1162-y},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Koenig19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KohoutT19,
  author    = {Gerhard Kramarz{-}von Kohout and
               Ren{\'{e}} Thiele},
  title     = {Projekt "SiReNE": Wie kann ein Notruf 110/112 m{\"{o}}glichst
               {\"{u}}berall helfen?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {90--96},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1070-1},
  doi       = {10.1007/s11623-019-1070-1},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KohoutT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KohoutT19a,
  author    = {Gerhard Kramarz{-}von Kohout and
               Ren{\'{e}} Thiele},
  title     = {Notruf: {EU} schl{\"{a}}gt neues Kapitel auf},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {292--300},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1110-x},
  doi       = {10.1007/s11623-019-1110-x},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KohoutT19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kornwachs19,
  author    = {Klaus Kornwachs},
  title     = {Smart Robots - Smart Ethics?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {332--341},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1118-2},
  doi       = {10.1007/s11623-019-1118-2},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kornwachs19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann19,
  author    = {Dieter Kugelmann},
  title     = {Rahmenbedingungen f{\"{u}}r eine digitale Gesundheitsversorgung
               aktiv gestalten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {398},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1133-3},
  doi       = {10.1007/s11623-019-1133-3},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhlingS19,
  author    = {J{\"{u}}rgen K{\"{u}}hling and
               Florian Sackmann},
  title     = {Die Musterfeststellungsklage nach Datenschutzverst{\"{o}}{\ss}en
               - ein unkalkulierbares Risiko f{\"{u}}r Unternehmen?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {347--352},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1120-8},
  doi       = {10.1007/s11623-019-1120-8},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KuhlingS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KulykGVH19,
  author    = {Oksana Kulyk and
               Nina Gerber and
               Melanie Volkamer and
               Annika Hilt},
  title     = {Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {81--85},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1068-8},
  doi       = {10.1007/s11623-019-1068-8},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KulykGVH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kunnert19,
  author    = {Gerhard Kunnert},
  title     = {Das Aus f{\"{u}}r Social-/Media-Plug-ins?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {257--264},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1104-8},
  doi       = {10.1007/s11623-019-1104-8},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kunnert19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KurthK19,
  author    = {Helmut Kurth and
               Gerald Krummeck},
  title     = {Sicher bauen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {640--647},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1180-9},
  doi       = {10.1007/s11623-019-1180-9},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KurthK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LangeW19,
  author    = {Vera Lange and
               Melanie Winkler},
  title     = {Rechtliche Grundlagen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {611--613},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1174-7},
  doi       = {10.1007/s11623-019-1174-7},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LangeW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LudemannP19,
  author    = {Volker L{\"{u}}demann and
               Patrick Pokrant},
  title     = {Die Einwilligung beim Smart Metering},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {365--370},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1123-5},
  doi       = {10.1007/s11623-019-1123-5},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LudemannP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierB19,
  author    = {Natalie Maier and
               Tamer Bile},
  title     = {Die Zertifizierung nach der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {478--482},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1147-x},
  doi       = {10.1007/s11623-019-1147-x},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MaierB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierLTRS19,
  author    = {Natalie Maier and
               Sebastian Lins and
               Heiner Teigeler and
               Alexander Ro{\ss}nagel and
               Ali Sunyaev},
  title     = {Die Zertifizierung von Cloud-Diensten nach der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {225--229},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1097-3},
  doi       = {10.1007/s11623-019-1097-3},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MaierLTRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Makulilo19,
  author    = {Alex B. Makulilo},
  title     = {Privacy under siege? {A} critical analysis of the tele-traffic monitoring
               system in Tanzania},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {361--364},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1122-6},
  doi       = {10.1007/s11623-019-1122-6},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Makulilo19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Margraf19,
  author    = {Marian Margraf},
  title     = {IT-Sicherheit und Datenschutz: Nutzergerecht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {1},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1049-y},
  doi       = {10.1007/s11623-019-1049-y},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Margraf19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinF19,
  author    = {Nicholas Martin and
               Michael Friedewald},
  title     = {Warum Unternehmen sich (nicht) an Recht und Gesetz halten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {493--497},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1150-2},
  doi       = {10.1007/s11623-019-1150-2},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MartinF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mayr19,
  author    = {Michael Mayr},
  title     = {Kompetenzen: Menschen entscheiden {\"{u}}ber den Erfolg},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {399--402},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1134-2},
  doi       = {10.1007/s11623-019-1134-2},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mayr19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MeissnerS19,
  author    = {Christian Mei{\ss}ner and
               Klaus Peter S{\"{o}}llner},
  title     = {Smarte Mobilit{\"{a}}t mit FiftyFifty Taxi},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {230--233},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1098-2},
  doi       = {10.1007/s11623-019-1098-2},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MeissnerS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester19,
  author    = {Britta Alexandra Mester},
  title     = {Auftrags(daten)verarbeitung - Nur eine {\"{A}}nderung der Bezeichnung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {121},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1075-9},
  doi       = {10.1007/s11623-019-1075-9},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Mester19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester19a,
  author    = {Britta Alexandra Mester},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {249--252},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1101-y},
  doi       = {10.1007/s11623-019-1101-y},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester19b,
  author    = {Britta Alexandra Mester},
  title     = {Blockchain und Co. - Was bringt uns die Entwicklung der Technik?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {537},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1158-7},
  doi       = {10.1007/s11623-019-1158-7},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MesterS19,
  author    = {Britta Alexandra Mester and
               Christoph Schnabel},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {807--812},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1210-7},
  doi       = {10.1007/s11623-019-1210-7},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MesterS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mino-Vasquez19,
  author    = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez},
  title     = {The Protection of Genetic Data under the General Data Protection regulation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {154--158},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1083-9},
  doi       = {10.1007/s11623-019-1083-9},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Mino-Vasquez19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mueller19,
  author    = {Johannes Karl Martin Mueller},
  title     = {Dateneigentum in der vierten industriellen Revolution?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {159--166},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1084-8},
  doi       = {10.1007/s11623-019-1084-8},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Mueller19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NuskeORS19,
  author    = {Niclas N{\"{u}}ske and
               Christian Olenberger and
               Daniel Rau and
               Fabian Schmied},
  title     = {Privacy Bots},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {28--32},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1056-z},
  doi       = {10.1007/s11623-019-1056-z},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/NuskeORS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OhlendorfSM19,
  author    = {Tim Ohlendorf and
               Wolfgang Studier and
               Marian Margraf},
  title     = {Digitale Identit{\"{a}}ten auf dem Smartphone},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {17--22},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1054-1},
  doi       = {10.1007/s11623-019-1054-1},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/OhlendorfSM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ozturk19,
  author    = {Ebru {\"{O}}zt{\"{u}}rk},
  title     = {Arbeitnehmer{\"{u}}berlassung DS-GVO-konform l{\"{o}}sen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {143--148},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1081-y},
  doi       = {10.1007/s11623-019-1081-y},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Ozturk19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PaeschkeFW19,
  author    = {Manfred Paeschke and
               Walter Fumy and
               Andreas Wilke},
  title     = {Ensuring Security {\&} Trust in a Post-Quantum Environment},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {440--443},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1140-4},
  doi       = {10.1007/s11623-019-1140-4},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PaeschkeFW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetersenBMFB19,
  author    = {Tom Petersen and
               Maximilian Blochberger and
               Tobias Mueller and
               Hannes Federrath and
               Christian{-}Alexander Behrendt},
  title     = {Sichere und datenschutzgerechte Umsetzung medizinischer Register},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {507--512},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1153-z},
  doi       = {10.1007/s11623-019-1153-z},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PetersenBMFB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petrlic19,
  author    = {Ronald Petrlic},
  title     = {Identit{\"{a}}tspr{\"{u}}fung bei elektronischen Auskunftsersuchen
               nach Art. 15 {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {71--75},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1066-x},
  doi       = {10.1007/s11623-019-1066-x},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Petrlic19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PfeifferS19,
  author    = {Stefan Pfeiffer and
               Martin Seiffert},
  title     = {Security-Management-as-a-Service},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {23--27},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1055-0},
  doi       = {10.1007/s11623-019-1055-0},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PfeifferS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19,
  author    = {Helmut Reimer},
  title     = {Festakt: Amtswechsel beim BfDI},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {188},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1089-3},
  doi       = {10.1007/s11623-019-1089-3},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19a,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {243--249},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1100-z},
  doi       = {10.1007/s11623-019-1100-z},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19b,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {732--740},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1197-0},
  doi       = {10.1007/s11623-019-1197-0},
  timestamp = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer19c,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {801--807},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1209-0},
  doi       = {10.1007/s11623-019-1209-0},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer19c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riechert19,
  author    = {Anne Riechert},
  title     = {Dateneigentum - ein unaufl{\"{o}}sbarer Interessenkonflikt?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {353--360},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1121-7},
  doi       = {10.1007/s11623-019-1121-7},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Riechert19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riess19,
  author    = {Joachim Rie{\ss}},
  title     = {Innovationen der {DSGVO} in der Praxis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {498--501},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1151-1},
  doi       = {10.1007/s11623-019-1151-1},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Riess19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RohdeS19,
  author    = {Martina Rohde and
               Werner Schindler},
  title     = {K{\"{u}}nstliche Intelligenz in Evaluierung und Zulassung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {627--630},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1177-4},
  doi       = {10.1007/s11623-019-1177-4},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/RohdeS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel19,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Unvollende Innovationen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {461--462},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1143-1},
  doi       = {10.1007/s11623-019-1143-1},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel19a,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Innovationen der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {467--472},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1145-z},
  doi       = {10.1007/s11623-019-1145-z},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelW19,
  author    = {Heiko Ro{\ss}nagel and
               Sven Wagner},
  title     = {LIGHTest},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {220--224},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1096-4},
  doi       = {10.1007/s11623-019-1096-4},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RossnagelW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost19,
  author    = {Maria Christina Rost},
  title     = {Datenschutzsanktionen: scharfes Schwert oder Papiertiger?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {488--492},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1149-8},
  doi       = {10.1007/s11623-019-1149-8},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rost19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Salami19,
  author    = {Emmanuel Salami},
  title     = {Nigerian data protection law},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {575--582},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1166-7},
  doi       = {10.1007/s11623-019-1166-7},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Salami19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schmale19,
  author    = {Wolfgang Schmale},
  title     = {(Daten-)Schutz von Privatheit im digitalen Zeitalter},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {327--331},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1117-3},
  doi       = {10.1007/s11623-019-1117-3},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schmale19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe19,
  author    = {Maximilian Schnebbe},
  title     = {DSB-Bestellpflicht und Datenschutzfolgeabsch{\"{a}}tzung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {373--374},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1125-3},
  doi       = {10.1007/s11623-019-1125-3},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schnebbe19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchombergBJH19,
  author    = {Sabrina Schomberg and
               Torben Jan Barev and
               Andreas Janson and
               Felix Hupfeld},
  title     = {Ansatz zur Umsetzung von Datenschutz nach der {DSGVO} im Arbeitsumfeld:
               Datenschutz durch Nudging},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {774--780},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1204-5},
  doi       = {10.1007/s11623-019-1204-5},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchombergBJH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS19,
  author    = {Dominik Schrahe and
               Thomas St{\"{a}}dter},
  title     = {Integration von Informationssicherheits- und Datenschutzmanagement},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {265--269},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1105-7},
  doi       = {10.1007/s11623-019-1105-7},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchraheS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schwabe19,
  author    = {Sebastian Schw{\"{a}}be},
  title     = {Technische Umsetzung beim Webtracking},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {559--562},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1163-x},
  doi       = {10.1007/s11623-019-1163-x},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schwabe19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwenkWH19,
  author    = {J{\"{o}}rg Schwenk and
               Tobias Wich and
               Detlef H{\"{u}}hnlein},
  title     = {Moderne Vertrauensdienste f{\"{u}}r vertrauensw{\"{u}}rdige
               Transaktionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {4},
  pages     = {214--219},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1095-5},
  doi       = {10.1007/s11623-019-1095-5},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchwenkWH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seiter19,
  author    = {Stefan R. Seiter},
  title     = {Auftragsverarbeitung nach der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {127--133},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1078-6},
  doi       = {10.1007/s11623-019-1078-6},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Seiter19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SimonM19,
  author    = {Kai Simon and
               Cornelius Moucha},
  title     = {Sicherheit und Datenschutz im Lebenszyklus von Informationssystemen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {97--101},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1071-0},
  doi       = {10.1007/s11623-019-1071-0},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SimonM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SonnenbergB19,
  author    = {Frank Sonnenberg and
               Thomas Borsch},
  title     = {Innovative Instrumente und Methoden der Zulassung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {619--626},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1176-5},
  doi       = {10.1007/s11623-019-1176-5},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SonnenbergB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SonnenbergBR19,
  author    = {Frank Sonnenberg and
               Thomas Borsch and
               Martina Rohde},
  title     = {VS-Zulassung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {614--618},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1175-6},
  doi       = {10.1007/s11623-019-1175-6},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SonnenbergBR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stach19,
  author    = {Christoph Stach},
  title     = {Datenschutzkonzepte f{\"{u}}r Zeitreihendaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {753--759},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1201-8},
  doi       = {10.1007/s11623-019-1201-8},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Stach19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steinacker19,
  author    = {Angelika Steinacker},
  title     = {Architekturen: Sicherheit im Internet der Dinge (IoT)},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {403--409},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1135-1},
  doi       = {10.1007/s11623-019-1135-1},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Steinacker19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stock-HomburgH19,
  author    = {Ruth Stock{-}Homburg and
               Christian Holthaus},
  title     = {{CHOIVACY} - Ein mehrdimensionaler Ansatz zur Bewertung des Privacy-Managements
               von Unternehmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {35--40},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1058-x},
  doi       = {10.1007/s11623-019-1058-x},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Stock-HomburgH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stradomsky19,
  author    = {Christopher Stradomsky},
  title     = {{TR-ESOR} vs. Blockchain},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {547--550},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1161-z},
  doi       = {10.1007/s11623-019-1161-z},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Stradomsky19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld19,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {70 Jahre Grundgesetz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {324--325},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1115-5},
  doi       = {10.1007/s11623-019-1115-5},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB19,
  author    = {Marie{-}Theres Tinnefeld and
               Benedikt Buchner},
  title     = {Recht und Ethik im digitalen Zeitalter},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {321},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1114-6},
  doi       = {10.1007/s11623-019-1114-6},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TinnefeldB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/UtzKHT19,
  author    = {Christine Utz and
               Stephan Kolo{\ss}a and
               Thorsten Holz and
               Pierre Thielb{\"{o}}rger},
  title     = {Die {DSGVO} als internationales Vorbild?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {700--705},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1192-5},
  doi       = {10.1007/s11623-019-1192-5},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/UtzKHT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese19,
  author    = {Sven Venzke{-}Caprarese},
  title     = {Blockchain-Shops im Web3},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {541--546},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1160-0},
  doi       = {10.1007/s11623-019-1160-0},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Venzke-Caprarese19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wehrhahn-Aklender19,
  author    = {Aljona Wehrhahn{-}Aklender},
  title     = {Verschlusssachen verarbeitende Cloud},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {648--651},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1181-8},
  doi       = {10.1007/s11623-019-1181-8},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wehrhahn-Aklender19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert19,
  author    = {Thilo Weichert},
  title     = {Genetische Genealogie und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {149--153},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1082-x},
  doi       = {10.1007/s11623-019-1082-x},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Welsch19,
  author    = {G{\"{u}}nter Welsch},
  title     = {Fr{\"{u}}her war alles besser?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {605},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1171-x},
  doi       = {10.1007/s11623-019-1171-x},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Welsch19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wessels19,
  author    = {Michael Wessels},
  title     = {Schmerzensgeld bei Verst{\"{o}}{\ss}en gegen die {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {781--785},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1205-4},
  doi       = {10.1007/s11623-019-1205-4},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wessels19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WichmannSP19,
  author    = {Astrid Wichmann and
               M. Angela Sasse and
               Christof Paar},
  title     = {IT-Sicherheit ist mehr als Technik},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {11},
  pages     = {673--674},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1186-3},
  doi       = {10.1007/s11623-019-1186-3},
  timestamp = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WichmannSP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19,
  title     = {M{\"{a}}rchenhaft},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {5},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1050-5},
  doi       = {10.1007/s11623-019-1050-5},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19a,
  title     = {Entschlie{\ss}ung und Orientierungshilfe},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {41--42},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1059-9},
  doi       = {10.1007/s11623-019-1059-9},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19aa,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {534--536},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1157-8},
  doi       = {10.1007/s11623-019-1157-8},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19aa.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ab,
  title     = {26. T{\"{a}}tigkeitsbericht 2018/2019},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {540},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1159-6},
  doi       = {10.1007/s11623-019-1159-6},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ab.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ac,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {587--594},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1168-5},
  doi       = {10.1007/s11623-019-1168-5},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ac.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ad,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {595--600},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1169-4},
  doi       = {10.1007/s11623-019-1169-4},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ad.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ae,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {9},
  pages     = {600--604},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1170-y},
  doi       = {10.1007/s11623-019-1170-y},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ae.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19af,
  title     = {Die Awareness-Verschleierung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {608--609},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1172-9},
  doi       = {10.1007/s11623-019-1172-9},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19af.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ag,
  title     = {Br{\"{u}}ssel: Podiumsdiskussion zu Datenschutz und Wettbewerb
               am 10. Juli 2019},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {610},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1173-8},
  doi       = {10.1007/s11623-019-1173-8},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ag.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ah,
  title     = {Beijing {AI} Principles},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {656},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1183-6},
  doi       = {10.1007/s11623-019-1183-6},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ah.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ai,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {657--662},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1184-5},
  doi       = {10.1007/s11623-019-1184-5},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ai.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19aj,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {10},
  pages     = {663--672},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1185-4},
  doi       = {10.1007/s11623-019-1185-4},
  timestamp = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19aj.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19ak,
  title     = {DSK-Zwischenkonferenz am 12. September 2019 in Mainz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {12},
  pages     = {746},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1199-y},
  doi       = {10.1007/s11623-019-1199-y},
  timestamp = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19ak.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19b,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {43--49},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1060-3},
  doi       = {10.1007/s11623-019-1060-3},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19c,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {50--57},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1061-2},
  doi       = {10.1007/s11623-019-1061-2},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19d,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {1},
  pages     = {57--60},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1062-1},
  doi       = {10.1007/s11623-019-1062-1},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19e,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {102--109},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1072-z},
  doi       = {10.1007/s11623-019-1072-z},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19f,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {110--117},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1073-y},
  doi       = {10.1007/s11623-019-1073-y},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19g,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {2},
  pages     = {117--120},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1074-x},
  doi       = {10.1007/s11623-019-1074-x},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19h,
  title     = {{EDPS} Opinion 10/2018 on the Commission: Package on free and fair
               European elections},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {126},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1077-7},
  doi       = {10.1007/s11623-019-1077-7},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19i,
  title     = {Joint Control},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {167},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1085-7},
  doi       = {10.1007/s11623-019-1085-7},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19j,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {168--174},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1086-6},
  doi       = {10.1007/s11623-019-1086-6},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19k,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {3},
  pages     = {175--184},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1087-5},
  doi       = {10.1007/s11623-019-1087-5},
  timestamp = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X19k.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19l,
  title     = {{DSK} zu Daten{\"{u}}bermittlungen aus Deutschland in das Vereinigte
               K{\"{o}}nigreich Gro{\ss}britannien und Nordirland nach dem "Brexit"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {256},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1103-9},
  doi       = {10.1007/s11623-019-1103-9},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19l.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19m,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {301--307},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1111-9},
  doi       = {10.1007/s11623-019-1111-9},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19m.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19n,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {308--313},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1112-8},
  doi       = {10.1007/s11623-019-1112-8},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19n.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19o,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {314--320},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1113-7},
  doi       = {10.1007/s11623-019-1113-7},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19o.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19p,
  title     = {97. {DSK} am 3. und 4. April 2019 auf dem Hambacher Schloss},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {326},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1116-4},
  doi       = {10.1007/s11623-019-1116-4},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19p.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19q,
  title     = {Hambacher Erkl{\"{a}}rung zur K{\"{u}}nstlichen Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {375--376},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1126-2},
  doi       = {10.1007/s11623-019-1126-2},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19q.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19r,
  title     = {IT-Sicherheitsrecht 2.0},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {377},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1127-1},
  doi       = {10.1007/s11623-019-1127-1},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19r.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19s,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {378--383},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1128-0},
  doi       = {10.1007/s11623-019-1128-0},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19s.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19t,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {384--388},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1129-z},
  doi       = {10.1007/s11623-019-1129-z},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19t.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19u,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {6},
  pages     = {388--392},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1130-6},
  doi       = {10.1007/s11623-019-1130-6},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19u.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19v,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {444--452},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1141-3},
  doi       = {10.1007/s11623-019-1141-3},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19v.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19w,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {7},
  pages     = {453--460},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1142-2},
  doi       = {10.1007/s11623-019-1142-2},
  timestamp = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19w.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19x,
  title     = {Informationsfreiheit by Design},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {466},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1144-0},
  doi       = {10.1007/s11623-019-1144-0},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19x.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19y,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {518--526},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1155-x},
  doi       = {10.1007/s11623-019-1155-x},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19y.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X19z,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {8},
  pages     = {527--534},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1156-9},
  doi       = {10.1007/s11623-019-1156-9},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X19z.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZanderSB19,
  author    = {Tim Zander and
               Anne Steinbr{\"{u}}ck and
               Pascal Birnstill},
  title     = {Spieltheoretische Modellierung der Verarbeitung personenbezogener
               Daten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {43},
  number    = {5},
  pages     = {270--275},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11623-019-1106-6},
  doi       = {10.1007/s11623-019-1106-6},
  timestamp = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ZanderSB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Banon18,
  author    = {Miguel Ba{\~{n}}{\'{o}}n},
  title     = {Assurance and {IT} Development Paces and Challenges},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {407--410},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0968-3},
  doi       = {10.1007/s11623-018-0968-3},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Banon18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BarchnickiP18,
  author    = {Sebastian Barchnicki and
               Norbert Pohlmann},
  title     = {Was IT-Sicherheitsindustrie und Anwender voneinander lernen k{\"{o}}nnen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {246--251},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0916-2},
  doi       = {10.1007/s11623-018-0916-2},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BarchnickiP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BartelsB18,
  author    = {Karsten U. Bartels and
               Merlin Backer},
  title     = {Die Ber{\"{u}}cksichtigung des Stands der Technik in der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {214--219},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0910-8},
  doi       = {10.1007/s11623-018-0910-8},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BartelsB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Benzmuller18,
  author    = {Ralf Benzm{\"{u}}ller},
  title     = {Machine Learning und Virenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {224--230},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0912-6},
  doi       = {10.1007/s11623-018-0912-6},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Benzmuller18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeyererMR18,
  author    = {J{\"{u}}rgen Beyerer and
               J{\"{o}}rn M{\"{u}}ller{-}Quade and
               Ralf H. Reussner},
  title     = {Karlsruher Thesen zur Digitalen Souver{\"{a}}nit{\"{a}}t
               Europas},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {277--280},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0940-2},
  doi       = {10.1007/s11623-018-0940-2},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BeyererMR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bieker18,
  author    = {Felix Bieker},
  title     = {Die Risikoanalyse nach dem neuen EU-Datenschutzrecht und dem Standard-Datenschutzmodell},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {27--31},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0886-4},
  doi       = {10.1007/s11623-018-0886-4},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Bieker18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerBH18,
  author    = {Felix Bieker and
               Benjamin Bremert and
               Marit Hansen},
  title     = {Die Risikobeurteilung nach der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {492--496},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0986-1},
  doi       = {10.1007/s11623-018-0986-1},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BiekerBH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerBH18a,
  author    = {Felix Bieker and
               Benjamin Bremert and
               Marit Hansen},
  title     = {Verantwortlichkeit und Einsatz von Algorithmen bei {\"{o}}ffentlichen
               Stellen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {608--612},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1010-5},
  doi       = {10.1007/s11623-018-1010-5},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BiekerBH18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BihlmayerEL18,
  author    = {Thomas Bihlmayer and
               Philipp Ehmann and
               Henning Lesch},
  title     = {Kommissionsvorschlag zu e-Privacy verhindert Vereinheitlichung des
               Datenschutzes in Europa},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {241--245},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0915-3},
  doi       = {10.1007/s11623-018-0915-3},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BihlmayerEL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BileGW18,
  author    = {Tamer Bile and
               Ludwig Gramlich and
               Michael W{\"{a}}chter},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {266--270},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0920-6},
  doi       = {10.1007/s11623-018-0920-6},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BileGW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitkom18,
  author    = {Bitkom},
  title     = {Digitale Souver{\"{a}}nit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {294--300},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0944-y},
  doi       = {10.1007/s11623-018-0944-y},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bitkom18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann18,
  author    = {Dominik Bleckmann},
  title     = {Wahres Ungl{\"{u}}ck bringt der falsche Wahn},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {136--137},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0922-4},
  doi       = {10.1007/s11623-018-0922-4},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bleckmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann18a,
  author    = {Dominik Bleckmann},
  title     = {K{\"{u}}nstliche Intelligenz - Fluch oder Segen?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {539},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0994-1},
  doi       = {10.1007/s11623-018-0994-1},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bleckmann18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunHB18,
  author    = {Steffen Braun and
               Tobias Henzler and
               Anders Berg},
  title     = {Nutzeridentifikation mit mobilen Endger{\"{a}}ten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {673--679},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1023-0},
  doi       = {10.1007/s11623-018-1023-0},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BraunHB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breyer18,
  author    = {Jonas Breyer},
  title     = {Verarbeitungsgrunds{\"{a}}tze und Rechenschaftspflicht nach Art.
               5 {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {311--317},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0947-8},
  doi       = {10.1007/s11623-018-0947-8},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Breyer18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BroadnaxLMMN18,
  author    = {Brandon Broadnax and
               Bernhard L{\"{o}}we and
               Jeremias Mechler and
               J{\"{o}}rn M{\"{u}}ller{-}Quade and
               Matthias Nagel},
  title     = {Sicherheit auf festem Fundament},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {74--78},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0897-1},
  doi       = {10.1007/s11623-018-0897-1},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BroadnaxLMMN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brockmann18,
  author    = {Hans{-}Christian Brockmann},
  title     = {Effizientes und verantwortungsvolles Datenmanagement im Zeitalter
               der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {634--639},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1015-0},
  doi       = {10.1007/s11623-018-1015-0},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Brockmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Burri18,
  author    = {Thomas Burri},
  title     = {K{\"{u}}nstliche Intelligenz und internationales Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {603--607},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1009-y},
  doi       = {10.1007/s11623-018-1009-y},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Burri18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18,
  author    = {Conrad Sebastian Conrad},
  title     = {Gilt das Vereinigte K{\"{o}}nigreich k{\"{u}}nftig als ein
               Drittland?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {159--160},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0928-y},
  doi       = {10.1007/s11623-018-0928-y},
  timestamp = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18a,
  author    = {Conrad Sebastian Conrad},
  title     = {Kann die K{\"{u}}nstliche Intelligenz den Menschen entschl{\"{u}}sseln?
               - Neue Forderungen zum Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {541--546},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0996-z},
  doi       = {10.1007/s11623-018-0996-z},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad18b,
  author    = {Conrad Sebastian Conrad},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {798--802},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1048-4},
  doi       = {10.1007/s11623-018-1048-4},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Debski18,
  author    = {Andrzej Debski},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {400--402},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0965-6},
  doi       = {10.1007/s11623-018-0965-6},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Debski18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DiepenbrockS18,
  author    = {Andreas Diepenbrock and
               Sabine Sachweh},
  title     = {Ein konzeptionelles Rahmenwerk f{\"{u}}r die Integration Digitaler
               Souver{\"{a}}nit{\"{a}}t in Softwarearchitekturen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {281--285},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0941-1},
  doi       = {10.1007/s11623-018-0941-1},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/DiepenbrockS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DreyerK18,
  author    = {Bastian Dreyer and
               Gerhard Kramarz{-}von Kohout},
  title     = {Notruf 110 / 112: Technische Richtlinie Notrufverbindungen {(TR} Notruf)
               2.0},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {510--517},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0989-y},
  doi       = {10.1007/s11623-018-0989-y},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DreyerK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dullien18,
  author    = {Thomas Dullien},
  title     = {Maschinelles Lernen und k{\"{u}}nstliche Intelligenz in der Informationssicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {618--622},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1012-3},
  doi       = {10.1007/s11623-018-1012-3},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Dullien18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DurigF18,
  author    = {Markus D{\"{u}}rig and
               Matthias Fischer},
  title     = {Cybersicherheit in Kritischen Infrastrukturen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {209--213},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0909-1},
  doi       = {10.1007/s11623-018-0909-1},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DurigF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtM18,
  author    = {Jens Eckhardt and
               Konrad Menz},
  title     = {Datenschutz-Grundverordnung: Neuer Schutz - neue Spannungsverh{\"{a}}ltnisse},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {131--133},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0921-5},
  doi       = {10.1007/s11623-018-0921-5},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EckhardtM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtM18a,
  author    = {Jens Eckhardt and
               Konrad Menz},
  title     = {Bu{\ss}geldsanktionen der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {139--144},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0924-2},
  doi       = {10.1007/s11623-018-0924-2},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EckhardtM18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EsslingerM18,
  author    = {Bernhard Esslinger and
               Hern{\^{a}}ni Marques},
  title     = {Verfahren und Implementationen von "pretty Easy privacy" (pEp)},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {101--105},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0901-9},
  doi       = {10.1007/s11623-018-0901-9},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/EsslingerM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FerrareseD18,
  author    = {Barbara Ferrarese and
               Alexander Dix},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {59--62},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0892-6},
  doi       = {10.1007/s11623-018-0892-6},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/FerrareseD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerT18,
  author    = {Arno Fiedler and
               Christoph Thiel},
  title     = {Chancen europ{\"{a}}ischer Standards f{\"{u}}r die Zertifizierung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {434--436},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0974-5},
  doi       = {10.1007/s11623-018-0974-5},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerTT18,
  author    = {Arno Fiedler and
               Christian Thiel and
               Christoph Thiel},
  title     = {Umsetzung technischer Anforderungen der {DSGVO} mittels eIDAS-VO-konformer
               Vertrauensdienste},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {236--240},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0914-4},
  doi       = {10.1007/s11623-018-0914-4},
  timestamp = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerTT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18,
  author    = {Dirk Fox},
  title     = {Stand der Forschung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {63},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0893-5},
  doi       = {10.1007/s11623-018-0893-5},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18a,
  author    = {Dirk Fox},
  title     = {Digitale Souver{\"{a}}nit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {271},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0938-9},
  doi       = {10.1007/s11623-018-0938-9},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18b,
  author    = {Dirk Fox},
  title     = {Modell und Wirklichkeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {667},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1020-3},
  doi       = {10.1007/s11623-018-1020-3},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox18c,
  author    = {Dirk Fox},
  title     = {Des Kaisers neue Kleider},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {671},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1021-2},
  doi       = {10.1007/s11623-018-1021-2},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox18c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FumyR18,
  author    = {Walter Fumy and
               Helmut Reimer},
  title     = {Vertrauen ist gut ... Zertifizierung ist besser!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {403},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0966-5},
  doi       = {10.1007/s11623-018-0966-5},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FumyR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn18,
  author    = {Christian L. Geminn},
  title     = {Wissenschaftliche Forschung und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {640--646},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1016-z},
  doi       = {10.1007/s11623-018-1016-z},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Geminn18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerberZHEVH18,
  author    = {Nina Gerber and
               Verena Zimmermann and
               Birgit Henhapl and
               Sinem Emer{\"{o}}z and
               Melanie Volkamer and
               Tobias Hilt},
  title     = {Nutzerwahrnehmung der Ende-zu-Ende-Verschl{\"{u}}sselung in WhatsApp},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {680--685},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1024-z},
  doi       = {10.1007/s11623-018-1024-z},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GerberZHEVH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gerhold18,
  author    = {Maximilian Gerhold},
  title     = {40 Jahre {CNIL} - Ein Blick auf den franz{\"{o}}sischen Gendarmen
               des Privatlebens},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {368--372},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0958-5},
  doi       = {10.1007/s11623-018-0958-5},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gerhold18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GollaHB18,
  author    = {Sebastian J. Golla and
               Henning Hofmann and
               Matthias B{\"{a}}cker},
  title     = {Connecting the Dots},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {89--100},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0900-x},
  doi       = {10.1007/s11623-018-0900-x},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/GollaHB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Golland18,
  author    = {Alexander Golland},
  title     = {Der r{\"{a}}umliche Anwendungsbereich der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {351--357},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0955-8},
  doi       = {10.1007/s11623-018-0955-8},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Golland18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GonscherowskiHR18,
  author    = {Susan Gonscherowski and
               Marit Hansen and
               Martin Rost},
  title     = {Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {442--446},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0976-3},
  doi       = {10.1007/s11623-018-0976-3},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GonscherowskiHR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichG18,
  author    = {Ludwig Gramlich and
               Joachim Gruber},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {199--202},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0937-x},
  doi       = {10.1007/s11623-018-0937-x},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GramlichG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP18,
  author    = {Ludwig Gramlich and
               Thomas Petri},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {127--130},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0905-5},
  doi       = {10.1007/s11623-018-0905-5},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/GramlichP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichP18a,
  author    = {Ludwig Gramlich and
               Thomas Petri},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {663--666},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1019-9},
  doi       = {10.1007/s11623-018-1019-9},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GramlichP18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GriesbeckG18,
  author    = {Michael Griesbeck and
               Ludwig Gramlich},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {590--594},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1005-2},
  doi       = {10.1007/s11623-018-1005-2},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GriesbeckG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HackenjosMR18,
  author    = {Timon Hackenjos and
               Jeremias Mechler and
               Jochen Rill},
  title     = {IT-Sicherheit - ein rechtsfreier Raum?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {286--290},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0942-0},
  doi       = {10.1007/s11623-018-0942-0},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HackenjosMR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen18,
  author    = {Marit Hansen},
  title     = {Transparenz der Verwaltung auch beim Einsatz von Algorithmen und K{\"{u}}nstlicher
               Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {733},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1035-9},
  doi       = {10.1007/s11623-018-1035-9},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Hansen18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hartmann18,
  author    = {Mark Hartmann},
  title     = {Machine Learning und IT-Security},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {231--235},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0913-5},
  doi       = {10.1007/s11623-018-0913-5},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hartmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hemker18,
  author    = {Thomas Hemker},
  title     = {Machen Maschinen die Welt sicherer?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {629--633},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1014-1},
  doi       = {10.1007/s11623-018-1014-1},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hemker18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henseler-UngerH18,
  author    = {Iris Henseler{-}Unger and
               Annette Hillebrand},
  title     = {Aktuelle Lage der IT-Sicherheit in {KMU}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {686--690},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1025-y},
  doi       = {10.1007/s11623-018-1025-y},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Henseler-UngerH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenV18,
  author    = {Thomas Hoeren and
               Jonas V{\"{o}}lkel},
  title     = {Informationsabfrage {\"{u}}ber Domain-verantwortliche nach der
               {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {161--164},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0929-x},
  doi       = {10.1007/s11623-018-0929-x},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HoerenV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoidnR18,
  author    = {Dominik Hoidn and
               Alexander Ro{\ss}nagel},
  title     = {Anpassung des Sozialdatenschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {487--491},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0985-2},
  doi       = {10.1007/s11623-018-0985-2},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HoidnR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Holzel18,
  author    = {Julian H{\"{o}}lzel},
  title     = {Anonymisierungstechniken und das Datenschutzrecht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {502--509},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0988-z},
  doi       = {10.1007/s11623-018-0988-z},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Holzel18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Humphreys18,
  author    = {Edward Humphreys},
  title     = {The Future Landscape of {ISMS} Standards},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {421--423},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0971-8},
  doi       = {10.1007/s11623-018-0971-8},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Humphreys18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HusemannPS18,
  author    = {Charlotte Husemann and
               Fabian Pittroff and
               Andreas D. Schulz},
  title     = {Fitness-Tracking als Informationsproblem},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {694--700},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1027-9},
  doi       = {10.1007/s11623-018-1027-9},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/HusemannPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JakobiSS18,
  author    = {Timo Jakobi and
               Gunnar Stevens and
               Anna{-}Magdalena Seufert},
  title     = {Privacy-By-Design f{\"{u}}r das Connected Car: Architekturen
               aus Verbrauchersicht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {704--707},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1029-7},
  doi       = {10.1007/s11623-018-1029-7},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/JakobiSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JakschD18,
  author    = {Christian Jaksch and
               Gerrit von Daacke},
  title     = {Datenschutzbeauftragter und Datenschutz-Organisation unter der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {758--763},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1040-z},
  doi       = {10.1007/s11623-018-1040-z},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/JakschD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jensen18,
  author    = {Meiko Jensen},
  title     = {Zur Messbarkeit von Schutzzielen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {23--26},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0885-5},
  doi       = {10.1007/s11623-018-0885-5},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Jensen18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KieselmannW18,
  author    = {Olga Kieselmann and
               Arno Wacker},
  title     = {L{\"{o}}schen im Internet - rechtlich gefordert und technisch
               m{\"{o}}glich!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {437--441},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0975-4},
  doi       = {10.1007/s11623-018-0975-4},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KieselmannW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker18,
  author    = {Dennis{-}Kenji Kipker},
  title     = {Stellungnahme der {EAID}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {252--253},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0917-1},
  doi       = {10.1007/s11623-018-0917-1},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker18a,
  author    = {Dennis{-}Kenji Kipker},
  title     = {VPN-Tunnelabschaltung und "Chinese Cybersecurity Law"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {574--575},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1001-6},
  doi       = {10.1007/s11623-018-1001-6},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18,
  author    = {Dennis{-}Kenji Kipker and
               Mattea Stelter},
  title     = {Datenschutz unter MiFID {II}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {364--367},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0957-6},
  doi       = {10.1007/s11623-018-0957-6},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18a,
  author    = {Dennis{-}Kenji Kipker and
               Dario Scholz},
  title     = {{EU} Cybersecurity-Verordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {701--703},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1028-8},
  doi       = {10.1007/s11623-018-1028-8},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerS18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerS18b,
  author    = {Dennis{-}Kenji Kipker and
               Dario Scholz},
  title     = {Cybersicherheit und Datenschutz in China},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {768--771},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1042-x},
  doi       = {10.1007/s11623-018-1042-x},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerS18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kohler18,
  author    = {Thomas R. K{\"{o}}hler},
  title     = {Datenschutz im vernetzten Fahrzeug},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {376--379},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0960-y},
  doi       = {10.1007/s11623-018-0960-y},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kohler18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KowalskiI18,
  author    = {Bernd Kowalski and
               Matthias Intemann},
  title     = {Perspektiven der IT-Sicherheits-Zertifizierung f{\"{u}}r Europas
               M{\"{a}}rkte},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {415--419},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0970-9},
  doi       = {10.1007/s11623-018-0970-9},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KowalskiI18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kranig18,
  author    = {Thomas Kranig},
  title     = {Bayerisches Landesamt f{\"{u}}r Datenschutzaufsicht Verbindliche
               Datenschutzvorschriften {(BCR)} f{\"{u}}r die Allianz-Gruppe
               genehmigt},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {406},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0967-4},
  doi       = {10.1007/s11623-018-0967-4},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kranig18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann18,
  author    = {Dieter Kugelmann},
  title     = {Die Anpassung der Fachgesetze an die {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {482--486},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0984-3},
  doi       = {10.1007/s11623-018-0984-3},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuhnlRS18,
  author    = {Christina K{\"{u}}hnl and
               Kerstin Rohrer and
               Nick Kai Schneider},
  title     = {Ein europ{\"{a}}ischer Gesundheitsdatenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {735--740},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1036-8},
  doi       = {10.1007/s11623-018-1036-8},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KuhnlRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lachenmann18,
  author    = {Matthias Lachenmann},
  title     = {Bodycams: Nutzung durch private Sicherheitsdienste},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {777--781},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1044-8},
  doi       = {10.1007/s11623-018-1044-8},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Lachenmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lander18,
  author    = {Konferenz der unabh{\"{a}}ngigen Datenschutzaufsichtsbeh{\"{o}}rden des Bundes und der L{\"{a}}nder},
  title     = {Beschluss der {DSK} zu Facebook Fanpages D{\"{u}}sseldorf, 5.
               September 2018},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {672},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1022-1},
  doi       = {10.1007/s11623-018-1022-1},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Lander18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LeitoldK18,
  author    = {Herbert Leitold and
               Daniel Konrad},
  title     = {Erfahrungen aus eIDAS Zertifizierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {429--433},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0973-6},
  doi       = {10.1007/s11623-018-0973-6},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/LeitoldK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lorenz18,
  author    = {Bernd Lorenz},
  title     = {Datenschutzrechtliche Fragen offener E-Mail-Verteiler},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {178--180},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0933-1},
  doi       = {10.1007/s11623-018-0933-1},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Lorenz18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarnauBH18,
  author    = {Ninja Marnau and
               Pascal Berrang and
               Mathias Humbert},
  title     = {Anonymisierungsverfahren f{\"{u}}r genetische Daten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {83--88},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0899-z},
  doi       = {10.1007/s11623-018-0899-z},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/MarnauBH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MayerKV18,
  author    = {Peter Mayer and
               Alexandra Kunz and
               Melanie Volkamer},
  title     = {Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {307--310},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0946-9},
  doi       = {10.1007/s11623-018-0946-9},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/MayerKV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18,
  author    = {Britta Alexandra Mester},
  title     = {Haftungsrisiko i. S. d. {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {181},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0934-0},
  doi       = {10.1007/s11623-018-0934-0},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18a,
  author    = {Britta Alexandra Mester},
  title     = {Datenschutzrechtliche Herausforderung der "K{\"{u}}nstlichen
               Intelligenz" {(KI)}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {535},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0993-2},
  doi       = {10.1007/s11623-018-0993-2},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester18b,
  author    = {Britta Alexandra Mester},
  title     = {K{\"{u}}nstliche Intelligenz {(KI)} in Zeiten des Datenschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {576},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1002-5},
  doi       = {10.1007/s11623-018-1002-5},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mino-VasquezS18,
  author    = {Ver{\'{o}}nica Mi{\~{n}}o{-}V{\'{a}}squez and
               Peter Suhren},
  title     = {Liability for injuries according to {GDPR}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {151--155},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0926-0},
  doi       = {10.1007/s11623-018-0926-0},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mino-VasquezS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mitrakas18,
  author    = {Andreas Mitrakas},
  title     = {The emerging {EU} framework on cybersecurity certification},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {411--414},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0969-2},
  doi       = {10.1007/s11623-018-0969-2},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mitrakas18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Msumi18,
  author    = {Mbiki M. Msumi},
  title     = {An Overview of eHealth Regulations in Tanzania},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {373--375},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0959-4},
  doi       = {10.1007/s11623-018-0959-4},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Msumi18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NeumannRVKS18,
  author    = {Stephan Neumann and
               Benjamin Reinheimer and
               Melanie Volkamer and
               Alexandra Kunz and
               Christian Schwartz},
  title     = {Effektiver Schutz vor betr{\"{u}}gerischen Nachrichten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {301--306},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0945-x},
  doi       = {10.1007/s11623-018-0945-x},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/NeumannRVKS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen18,
  author    = {Kim Nguyen},
  title     = {Certification of eIDAS trust services and new global transparency
               trends},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {424--428},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0972-7},
  doi       = {10.1007/s11623-018-0972-7},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Nguyen18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nordrhein-Westfalen18,
  author    = {LfDI Nordrhein{-}Westfalen and
               Helga Block},
  title     = {Datenschutzkonferenz - Nordrhein-Westfalen {\"{u}}bernimmt Vorsitz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {138},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0923-3},
  doi       = {10.1007/s11623-018-0923-3},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Nordrhein-Westfalen18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nurnberger18,
  author    = {Stefan N{\"{u}}rnberger},
  title     = {Datenverarbeitung im (vernetzten) Fahrzeug},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {79--82},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0898-0},
  doi       = {10.1007/s11623-018-0898-0},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Nurnberger18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18,
  author    = {Thomas Petri},
  title     = {Faire und transparente Verarbeitung, Informationsrechte und Rahmenbedingungen
               f{\"{u}}r ihre Beschr{\"{a}}nkung - zur Auslegung der Art.
               12 ff. und 23 {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {347--350},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0954-9},
  doi       = {10.1007/s11623-018-0954-9},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Petri18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18a,
  author    = {Thomas Petri},
  title     = {Bitte weniger Hysterie im Umgang mit der Datenschutz-Grundverordnung!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {727--728},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1033-y},
  doi       = {10.1007/s11623-018-1033-y},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Petri18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri18b,
  author    = {Thomas Petri},
  title     = {Kliniken melden Datenschutzverst{\"{o}}{\ss}e nach Art. 33 {DSGVO}
               - erste Erfahrungen einer Aufsichtsbeh{\"{o}}rde},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {753--757},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1039-5},
  doi       = {10.1007/s11623-018-1039-5},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Petri18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petrlic18,
  author    = {Ronald Petrlic},
  title     = {{HTTPS} im Lichte der {DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {691--693},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1026-x},
  doi       = {10.1007/s11623-018-1026-x},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Petrlic18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pfrang18,
  author    = {Sebastian Pfrang},
  title     = {Die "nicht-dateim{\"{a}}{\ss}ige" Verarbeitung von Besch{\"{a}}ftigtendaten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {380--382},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0961-x},
  doi       = {10.1007/s11623-018-0961-x},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Pfrang18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohle18,
  author    = {J{\"{o}}rg Pohle},
  title     = {Zur Zeitdimension der Schutzziele},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {19--22},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0884-6},
  doi       = {10.1007/s11623-018-0884-6},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Pohle18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann18,
  author    = {Norbert Pohlmann},
  title     = {Europa treibt die IT-Sicherheit voran},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {203},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0906-4},
  doi       = {10.1007/s11623-018-0906-4},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Pohlmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR18,
  author    = {Norbert Pohlmann and
               Rene Riedel},
  title     = {Strafverfolgung darf die IT-Sicherheit im Internet nicht schw{\"{a}}chen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {37--44},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0888-2},
  doi       = {10.1007/s11623-018-0888-2},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PohlmannR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollmann18,
  author    = {Maren Pollmann},
  title     = {Das Marktortprinzip in der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {383},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0962-9},
  doi       = {10.1007/s11623-018-0962-9},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Pollmann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiel18,
  author    = {Philipp Quiel},
  title     = {Blockchain-Technologie im Fokus von Art. 8 {GRC} und {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {566--573},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1000-7},
  doi       = {10.1007/s11623-018-1000-7},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Quiel18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer18,
  author    = {Helmut Reimer},
  title     = {Online-Durchsuchung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {5},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0880-x},
  doi       = {10.1007/s11623-018-0880-x},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer18a,
  author    = {Helmut Reimer},
  title     = {Gro{\ss}sprech: Vorreiter und Vorreiterrolle},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {207},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0907-3},
  doi       = {10.1007/s11623-018-0907-3},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerSB18,
  author    = {Helmut Reimer and
               Peter Schaar and
               Helmut B{\"{a}}umler},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {465--470},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0980-7},
  doi       = {10.1007/s11623-018-0980-7},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ReimerSB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW18,
  author    = {Helmut Reimer and
               Christoph Wegener},
  title     = {K{\"{u}}nstliche Intelligenz: Vorsicht Hype!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {599--600},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1007-0},
  doi       = {10.1007/s11623-018-1007-0},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ReimerW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Riemer18,
  author    = {Dieter Riemer},
  title     = {Die DONot - ein Nachruf},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {772--776},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1043-9},
  doi       = {10.1007/s11623-018-1043-9},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Riemer18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RobrahnB18,
  author    = {Rasmus Robrahn and
               Kirsten Bock},
  title     = {Schutzziele als Optimierungsgebote},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {7--11},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0882-8},
  doi       = {10.1007/s11623-018-0882-8},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RobrahnB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rocher18,
  author    = {Dror{-}John R{\"{o}}cher},
  title     = {Cyber Threat Intelligence 101},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {623--628},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1013-2},
  doi       = {10.1007/s11623-018-1013-2},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rocher18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RohrKG18,
  author    = {Sebastian Rohr and
               Dennis{-}Kenji Kipker and
               Ludwig Gramlich},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {722--726},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1032-z},
  doi       = {10.1007/s11623-018-1032-z},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RohrKG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Nationale Anpassung des Datenschutzrechts},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {471--472},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0981-6},
  doi       = {10.1007/s11623-018-0981-6},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18a,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Kontinuit{\"{a}}t oder Innovation?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {477--481},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0983-4},
  doi       = {10.1007/s11623-018-0983-4},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel18b,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Umsetzung der Unionsregelungen zum Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {741--745},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1037-7},
  doi       = {10.1007/s11623-018-1037-7},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18,
  author    = {Martin Rost},
  title     = {Schutzziele im Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {1},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0879-3},
  doi       = {10.1007/s11623-018-0879-3},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rost18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18a,
  author    = {Martin Rost},
  title     = {Die Ordnung der Schutzziele},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {13--17},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0883-7},
  doi       = {10.1007/s11623-018-0883-7},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Rost18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost18b,
  author    = {Martin Rost},
  title     = {K{\"{u}}nstliche Intelligenz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {558--565},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0999-9},
  doi       = {10.1007/s11623-018-0999-9},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rost18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RothmannB18,
  author    = {Robert Rothmann and
               Benedikt Buchner},
  title     = {Der typische Facebook-Nutzer zwischen Recht und Realit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {342--346},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0953-x},
  doi       = {10.1007/s11623-018-0953-x},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/RothmannB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Saive18,
  author    = {David Saive},
  title     = {R{\"{u}}ckabwicklung von Blockchain-Transaktionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {764--767},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1041-y},
  doi       = {10.1007/s11623-018-1041-y},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Saive18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schadt18,
  author    = {Achim Schadt},
  title     = {Vernetzung im {OP} - Echtzeitdaten als {\"{a}}rztliche Dokumentation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {169--173},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0931-3},
  doi       = {10.1007/s11623-018-0931-3},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schadt18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schael18,
  author    = {Christopher Schael},
  title     = {K{\"{u}}nstliche Intelligenz in der modernen Gesellschaft},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {547--551},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0997-y},
  doi       = {10.1007/s11623-018-0997-y},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schael18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlehahn18,
  author    = {Eva Schlehahn},
  title     = {Die Methodik des Standard-Datenschutzmodells im Bereich der {\"{o}}ffentlichen
               Sicherheit und Justiz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {32--36},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0887-3},
  doi       = {10.1007/s11623-018-0887-3},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Schlehahn18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchroderAW18,
  author    = {Christian Schr{\"{o}}der and
               Amelie von Alten and
               Robert Weinhold},
  title     = {Stolpersteine der {DSGVO} f{\"{u}}r multinationale Unternehmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {746--752},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1038-6},
  doi       = {10.1007/s11623-018-1038-6},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/SchroderAW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SparenbergP18,
  author    = {Michael Sparenberg and
               Norbert Pohlmann},
  title     = {Cybersecurity made in {EU}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {220--223},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0911-7},
  doi       = {10.1007/s11623-018-0911-7},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SparenbergP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Steffen18,
  author    = {Nils Steffen},
  title     = {Zivilrechtliche Haftung von Datenschutzbeauftragten f{\"{u}}r
               Bu{\ss}gelder},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {145--150},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0925-1},
  doi       = {10.1007/s11623-018-0925-1},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Steffen18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Strauss18,
  author    = {Stefan Strau{\ss}},
  title     = {Identifizierbarkeit in soziotechnischen Systemen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {497--501},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0987-0},
  doi       = {10.1007/s11623-018-0987-0},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Strauss18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Supervisor18,
  author    = {European Data Protection Supervisor},
  title     = {{EDPS} calls for consistency in {EU} approach to criminal records},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {68},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0895-3},
  doi       = {10.1007/s11623-018-0895-3},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Supervisor18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tassi18,
  author    = {Smaro Tassi},
  title     = {Das Verh{\"{a}}ltnis von Sach- und Datenhehlerei},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {165--168},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0930-4},
  doi       = {10.1007/s11623-018-0930-4},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tassi18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Thiel18,
  author    = {Barbara Thiel},
  title     = {Merkblatt f{\"{u}}r die Nutzung von "WhatsApp" in Unternehmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {601--602},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1008-z},
  doi       = {10.1007/s11623-018-1008-z},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Thiel18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Vom Schwein und anderen Querschnittsmaterien in der Union},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {67},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0894-4},
  doi       = {10.1007/s11623-018-0894-4},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18a,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Herausforderungen im europ{\"{a}}ischen Kulturerbejahr 2018 -
               einige fragmentarische Betrachtungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {339--341},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0952-y},
  doi       = {10.1007/s11623-018-0952-y},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld18b,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Joseph Weizenbaum und die Utopie vom ganzen Menschen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {733},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1034-x},
  doi       = {10.1007/s11623-018-1034-x},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB18,
  author    = {Marie{-}Theres Tinnefeld and
               Benedikt Buchner},
  title     = {Rechtskultur dank EU-Datenschutz?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {335},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0950-0},
  doi       = {10.1007/s11623-018-0950-0},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TinnefeldB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese18,
  author    = {Sven Venzke{-}Caprarese},
  title     = {Haftungsrisiko Webtracking},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {156--158},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0927-z},
  doi       = {10.1007/s11623-018-0927-z},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Venzke-Caprarese18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Vosshoff18,
  author    = {Andrea Vo{\ss}hoff},
  title     = {Dialogkonferenz "Datenschutz f{\"{u}}r Kinder": Belange der Kinder
               st{\"{a}}rker ber{\"{u}}cksichtigen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {540},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0995-0},
  doi       = {10.1007/s11623-018-0995-0},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Vosshoff18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterG18,
  author    = {Michael W{\"{a}}chter and
               Ludwig Gramlich},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {531--534},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0992-3},
  doi       = {10.1007/s11623-018-0992-3},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WachterG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WaltlV18,
  author    = {Bernhard Waltl and
               Roland Vogl},
  title     = {Increasing Transparency in Algorithmic- Decision-Making with Explainable
               {AI}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {613--617},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1011-4},
  doi       = {10.1007/s11623-018-1011-4},
  timestamp = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/WaltlV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WaschetzkiS18,
  author    = {Michael Waschetzki and
               Martin Steinebach},
  title     = {Digitale Wasserzeichen in der Kriminalistik},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {69--73},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0896-2},
  doi       = {10.1007/s11623-018-0896-2},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/WaschetzkiS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeberRKKSK18,
  author    = {Arnd Weber and
               Steffen Reith and
               Michael Kasper and
               Dirk Kuhlmann and
               Jean{-}Pierre Seifert and
               Christoph Krau{\ss}},
  title     = {Souver{\"{a}}nit{\"{a}}t und die IT-Wertsch{\"{o}}pfungskette},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {291--293},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0943-z},
  doi       = {10.1007/s11623-018-0943-z},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WeberRKKSK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener18,
  author    = {Christoph Wegener},
  title     = {Chancen und Risiken intelligenter Systeme},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {595},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1006-1},
  doi       = {10.1007/s11623-018-1006-1},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wegener18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert18,
  author    = {Thilo Weichert},
  title     = {Forensische DNA-Analysen und der Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {358--363},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0956-7},
  doi       = {10.1007/s11623-018-0956-7},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeidenhammerG18,
  author    = {Detlef Weidenhammer and
               Rocco Gundlach},
  title     = {Wer kennt den "Stand der Technik"?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {106--110},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0902-8},
  doi       = {10.1007/s11623-018-0902-8},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/WeidenhammerG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wennemann18,
  author    = {Thomas Wennemann},
  title     = {{TOM} und die Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {174--177},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0932-2},
  doi       = {10.1007/s11623-018-0932-2},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wennemann18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wessels18,
  author    = {Michael Wessels},
  title     = {Abmahnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {782},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1045-7},
  doi       = {10.1007/s11623-018-1045-7},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Wessels18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wojak18,
  author    = {Stefanie Wojak},
  title     = {Intelligente Kollektiv-Algorithmen in der Personalverwaltung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {553--557},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0998-x},
  doi       = {10.1007/s11623-018-0998-x},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Wojak18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18,
  title     = {94. {DSK} am 08./09. November 2017 in Oldenburg},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {6},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0881-9},
  doi       = {10.1007/s11623-018-0881-9},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18a,
  title     = {94. Datenschutz-Konferenz am 08./09. November 2017 in Oldenburg -
               Entschlie{\ss}ungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {45--46},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0889-1},
  doi       = {10.1007/s11623-018-0889-1},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18aa,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {708--715},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1030-1},
  doi       = {10.1007/s11623-018-1030-1},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18aa.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18ab,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {11},
  pages     = {716--722},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1031-0},
  doi       = {10.1007/s11623-018-1031-0},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18ab.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18ac,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {783--791},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1046-6},
  doi       = {10.1007/s11623-018-1046-6},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18ac.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18ad,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {12},
  pages     = {792--798},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1047-5},
  doi       = {10.1007/s11623-018-1047-5},
  timestamp = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18ad.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18b,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {47--53},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0890-8},
  doi       = {10.1007/s11623-018-0890-8},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18c,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {1},
  pages     = {54--59},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0891-7},
  doi       = {10.1007/s11623-018-0891-7},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18d,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {111--120},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0903-7},
  doi       = {10.1007/s11623-018-0903-7},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18e,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {2},
  pages     = {121--127},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0904-6},
  doi       = {10.1007/s11623-018-0904-6},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X18e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18f,
  title     = {Der Europ{\"{a}}ische Datenschutzausschuss},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {208},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0908-2},
  doi       = {10.1007/s11623-018-0908-2},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18g,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {254--260},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0918-0},
  doi       = {10.1007/s11623-018-0918-0},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18h,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {4},
  pages     = {261--266},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0919-z},
  doi       = {10.1007/s11623-018-0919-z},
  timestamp = {Wed, 04 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18i,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {182--192},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0935-z},
  doi       = {10.1007/s11623-018-0935-z},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18j,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {3},
  pages     = {193--199},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0936-y},
  doi       = {10.1007/s11623-018-0936-y},
  timestamp = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18k,
  title     = {Datenschutz einbauen! - Appell an die Hersteller und Betreiber am
               Safer Internet Day 2018},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {275--276},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0939-8},
  doi       = {10.1007/s11623-018-0939-8},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18k.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18l,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {318--321},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0948-7},
  doi       = {10.1007/s11623-018-0948-7},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18l.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18m,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {5},
  pages     = {327--334},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0949-6},
  doi       = {10.1007/s11623-018-0949-6},
  timestamp = {Fri, 25 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18m.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18n,
  title     = {Facebook in der Verantwortung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {338},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0951-z},
  doi       = {10.1007/s11623-018-0951-z},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18n.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18o,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {384--392},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0963-8},
  doi       = {10.1007/s11623-018-0963-8},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18o.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18p,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {6},
  pages     = {393--400},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0964-7},
  doi       = {10.1007/s11623-018-0964-7},
  timestamp = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18p.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18q,
  title     = {95. Datenschutz-Konferenz am 25./26. April 2018 in D{\"{u}}sseldorf},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {447--448},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0977-2},
  doi       = {10.1007/s11623-018-0977-2},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18q.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18r,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {449--459},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0978-1},
  doi       = {10.1007/s11623-018-0978-1},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18r.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18s,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {7},
  pages     = {460--465},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0979-0},
  doi       = {10.1007/s11623-018-0979-0},
  timestamp = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18s.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18t,
  title     = {Entschlie{\ss}ung vom 6. Juni 2018},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {476},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0982-5},
  doi       = {10.1007/s11623-018-0982-5},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18t.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18u,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {518--525},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0990-5},
  doi       = {10.1007/s11623-018-0990-5},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18u.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18v,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {8},
  pages     = {526--531},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-0991-4},
  doi       = {10.1007/s11623-018-0991-4},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18v.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18w,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {577--583},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1003-4},
  doi       = {10.1007/s11623-018-1003-4},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18w.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18x,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {9},
  pages     = {584--590},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1004-3},
  doi       = {10.1007/s11623-018-1004-3},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18x.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18y,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {647--656},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1017-y},
  doi       = {10.1007/s11623-018-1017-y},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18y.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X18z,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {42},
  number    = {10},
  pages     = {657--663},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11623-018-1018-x},
  doi       = {10.1007/s11623-018-1018-x},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X18z.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AchenbachBR17,
  author    = {Dirk Achenbach and
               Ingmar Baumgart and
               Jochen Rill},
  title     = {Die Blockchain im Rampenlicht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {673--677},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0856-2},
  doi       = {10.1007/s11623-017-0856-2},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/AchenbachBR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BarteltEI17,
  author    = {Andreas Bartelt and
               Susanne Eisenmann and
               Markus Ihle},
  title     = {Langzeitabsicherung von Automobilen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {211--216},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0760-9},
  doi       = {10.1007/s11623-017-0760-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BarteltEI17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BaumHL17,
  author    = {Gerhart Baum and
               Burkhard Hirsch and
               Sabine Leutheusser{-}Schnarrenberger},
  title     = {Grundrechte und Sicherheitsaufgaben des Staates - ein europ{\"{a}}isches
               Thema},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {337--342},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0787-y},
  doi       = {10.1007/s11623-017-0787-y},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BaumHL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bergt17,
  author    = {Matthias Bergt},
  title     = {Sanktionierung von Verst{\"{o}}{\ss}en gegen die Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {555--561},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0830-z},
  doi       = {10.1007/s11623-017-0830-z},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bergt17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BiekerH17,
  author    = {Felix Bieker and
               Marit Hansen},
  title     = {Normen des technischen Datenschutzes nach der europ{\"{a}}ischen
               Datenschutzreform},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {285--289},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0776-1},
  doi       = {10.1007/s11623-017-0776-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BiekerH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bischof17,
  author    = {Claudia Bischof},
  title     = {Drohnen im rechtlichen Praxistest},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {142--146},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0745-8},
  doi       = {10.1007/s11623-017-0745-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bischof17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitz17,
  author    = {Gunter Bitz},
  title     = {IoT - Internet of What?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {601},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0839-3},
  doi       = {10.1007/s11623-017-0839-3},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bitz17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitz17a,
  author    = {Gunter Bitz},
  title     = {Datenschutzw{\"{u}}ste IoT},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {636},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0847-3},
  doi       = {10.1007/s11623-017-0847-3},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bitz17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckmann17,
  author    = {Dominik Bleckmann},
  title     = {Des Guten zu viel - Grenzen des Unionszollkodex},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {713--714},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0863-3},
  doi       = {10.1007/s11623-017-0863-3},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Bleckmann17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BohmeP17,
  author    = {Rainer B{\"{o}}hme and
               Paulina Pesch},
  title     = {Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {473--481},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0815-y},
  doi       = {10.1007/s11623-017-0815-y},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BohmeP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BohmerM17,
  author    = {Wolfgang B{\"{o}}hmer and
               Thomas Milde},
  title     = {IT-Grundschutz bei einem Telekommunikationsdienstleister},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {104--110},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0737-8},
  doi       = {10.1007/s11623-017-0737-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BohmerM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BroadnaxMMNR17,
  author    = {Brandon Broadnax and
               Jeremias Mechler and
               J{\"{o}}rn M{\"{u}}ller{-}Quade and
               Matthias Nagel and
               Jochen Rill},
  title     = {Sicherheit relativ definieren},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {24--28},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0720-4},
  doi       = {10.1007/s11623-017-0720-4},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BroadnaxMMNR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner17,
  author    = {Benedikt Buchner},
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {688--695},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0859-z},
  doi       = {10.1007/s11623-017-0859-z},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuchnerK17,
  author    = {Benedikt Buchner and
               J{\"{u}}rgen K{\"{u}}hling},
  title     = {Sch{\"{o}}ne neue Datenschutzordnung 2018?!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {529},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0824-x},
  doi       = {10.1007/s11623-017-0824-x},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BuchnerK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuchnerK17a,
  author    = {Benedikt Buchner and
               J{\"{u}}rgen K{\"{u}}hling},
  title     = {Die Einwilligung in der Datenschutzordnung 2018},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {544--548},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0828-6},
  doi       = {10.1007/s11623-017-0828-6},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/BuchnerK17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad17,
  author    = {Conrad Sebastian Conrad},
  title     = {K{\"{u}}nstliche Intelligenz - Die Risiken f{\"{u}}r den
               Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {740--744},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0870-4},
  doi       = {10.1007/s11623-017-0870-4},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Conrad17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ConradVG17,
  author    = {Conrad Sebastian Conrad and
               Sven Venzke{-}Caprarese and
               Ludwig Gramlich},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {703--708},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0861-5},
  doi       = {10.1007/s11623-017-0861-5},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/ConradVG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CooperW17,
  author    = {Daniel Cooper and
               Hilary Wandall},
  title     = {Scaling data protection globally through interoperable accountability},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {74--76},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0731-1},
  doi       = {10.1007/s11623-017-0731-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/CooperW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Diercks17,
  author    = {Nina Diercks},
  title     = {Video-Interviews in Personalauswahlverfahren},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {750--756},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0872-2},
  doi       = {10.1007/s11623-017-0872-2},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Diercks17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DrahanskyGS17,
  author    = {Martin Drahansk{\'{y}} and
               Tom{\'{a}}s Goldmann and
               Martin Spurn{\'{y}}},
  title     = {Gesichtsdetektion und -erkennung in Videos aus {\"{o}}ffentlichen
               Kamerasystemen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {415--421},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0804-1},
  doi       = {10.1007/s11623-017-0804-1},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DrahanskyGS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DrahanskyKPB17,
  author    = {Martin Drahansk{\'{y}} and
               Ondrej Kanich and
               Radim Pernick{\'{y}} and
               Step{\'{a}}nka Barotov{\'{a}}},
  title     = {Verarbeitung von besch{\"{a}}digten Fingerabdr{\"{u}}cken
               in der polizeilichen Praxis},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {407--414},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0803-2},
  doi       = {10.1007/s11623-017-0803-2},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DrahanskyKPB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DreyerK17,
  author    = {Bastian Dreyer and
               Gerhard Kramarz{-}von Kohout},
  title     = {Notruf: VoLTE mit neuen Merkmalen, EU-Regulierung mit neuen Akzenten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {679--685},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0857-1},
  doi       = {10.1007/s11623-017-0857-1},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/DreyerK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EinzingerS17,
  author    = {Kurt Einzinger and
               Florian Skopik},
  title     = {{\"{U}}ber die datenschutzrechtliche Problematik in CERTs/CSIRTs-Netzwerken},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {572--576},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0833-9},
  doi       = {10.1007/s11623-017-0833-9},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EinzingerS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ElmasllariP17,
  author    = {Erion Elmasllari and
               Jonas Plass},
  title     = {Domain and requirements for a wearable-based doping control system},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {717--720},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0865-1},
  doi       = {10.1007/s11623-017-0865-1},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/ElmasllariP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eschholz17,
  author    = {Stefanie Eschholz},
  title     = {Big Data-Scoring unter dem Einfluss der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {180--185},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0752-9},
  doi       = {10.1007/s11623-017-0752-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Eschholz17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EulerCK17,
  author    = {Thorsten Euler and
               Vanessa Cobus and
               Marion Koelle},
  title     = {Nummernschilder f{\"{u}}r Drohnen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {147--151},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0746-7},
  doi       = {10.1007/s11623-017-0746-7},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EulerCK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FaberS17,
  author    = {Eberhard von Faber and
               Walter Sedlacek},
  title     = {Spieltheorie im Dienst der IT-Sicherheit im Internet-der-Dinge},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {440--447},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0808-x},
  doi       = {10.1007/s11623-017-0808-x},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FaberS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Falque-Pierrotin17,
  author    = {Isabelle Falque{-}Pierrotin},
  title     = {Open Letter onto the WhatsApp Chief Executive Officer Jan Koum},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {6},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0715-1},
  doi       = {10.1007/s11623-017-0715-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Falque-Pierrotin17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerD17,
  author    = {Arno Fiedler and
               Christian Drews},
  title     = {Europaweite Vertrauensdienste, auch f{\"{u}}r die Automotive-IT?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {239--241},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0765-4},
  doi       = {10.1007/s11623-017-0765-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox17,
  author    = {Dirk Fox},
  title     = {Rettungsleck},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {5},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0714-2},
  doi       = {10.1007/s11623-017-0714-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox17a,
  author    = {Dirk Fox},
  title     = {Gl{\"{u}}ckliche Sklaven},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {67},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0728-9},
  doi       = {10.1007/s11623-017-0728-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox17b,
  author    = {Dirk Fox},
  title     = {Tr{\"{a}}gheitsprinzip},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {275},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0772-5},
  doi       = {10.1007/s11623-017-0772-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox17b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox17c,
  author    = {Dirk Fox},
  title     = {Bitcoin},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {507},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0821-0},
  doi       = {10.1007/s11623-017-0821-0},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox17c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox17d,
  author    = {Dirk Fox},
  title     = {{\"{A}}nderungen voraus},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {657},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0851-7},
  doi       = {10.1007/s11623-017-0851-7},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox17d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox17e,
  author    = {Dirk Fox},
  title     = {Neuland},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {661},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0852-6},
  doi       = {10.1007/s11623-017-0852-6},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Fox17e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy17,
  author    = {Walter Fumy},
  title     = {Kryptographie im Wandel},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {1},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0713-3},
  doi       = {10.1007/s11623-017-0713-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fumy17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy17a,
  author    = {Walter Fumy},
  title     = {Quantencomputer und die Zukunft der Kryptographie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {13--16},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0717-z},
  doi       = {10.1007/s11623-017-0717-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fumy17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gardyan-Eisenlohr17,
  author    = {Eva Gardyan{-}Eisenlohr and
               Kornel Kn{\"{o}}pfle},
  title     = {Accountability f{\"{u}}r Datenschutz in einem globalen Unternehmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {69--73},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0730-2},
  doi       = {10.1007/s11623-017-0730-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gardyan-Eisenlohr17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn17,
  author    = {Christian L. Geminn},
  title     = {Risikoad{\"{a}}quate Regelungen f{\"{u}}r das Internet der
               Dienste und Dinge?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {295--299},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0778-z},
  doi       = {10.1007/s11623-017-0778-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Geminn17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GolaTS17,
  author    = {Peter Gola and
               Gregor Th{\"{u}}sing and
               Maximilian Schmidt},
  title     = {Was wird aus dem Besch{\"{a}}ftigtendatenschutz?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {244--249},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0767-2},
  doi       = {10.1007/s11623-017-0767-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GolaTS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gomez-Barrero17,
  author    = {Marta Gomez{-}Barrero},
  title     = {Biometrie und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {448},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0809-9},
  doi       = {10.1007/s11623-017-0809-9},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gomez-Barrero17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gomez-BarreroR17,
  author    = {Marta Gomez{-}Barrero and
               Helmut Reimer},
  title     = {Biometrie - die Herausforderungen bleiben!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {397},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0799-7},
  doi       = {10.1007/s11623-017-0799-7},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gomez-BarreroR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gomez-BarreroRB17,
  author    = {Marta Gomez{-}Barrero and
               Christian Rathgeb and
               Christoph Busch},
  title     = {Standardisierung von Biometric Template Protection},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {422--426},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0805-0},
  doi       = {10.1007/s11623-017-0805-0},
  timestamp = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Gomez-BarreroRB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gramlich17,
  author    = {Ludwig Gramlich},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {465--468},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0812-1},
  doi       = {10.1007/s11623-017-0812-1},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gramlich17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrimmH17,
  author    = {R{\"{u}}diger Grimm and
               Andreas Heinemann},
  title     = {Alle reden {\"{u}}ber Blockchain},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {469},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0813-0},
  doi       = {10.1007/s11623-017-0813-0},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GrimmH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrottenthalerF17,
  author    = {Martin Grottenthaler and
               J{\"{u}}rgen Fu{\ss}},
  title     = {MailCoin},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {487--491},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0817-9},
  doi       = {10.1007/s11623-017-0817-9},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GrottenthalerF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber17,
  author    = {Joachim Gruber},
  title     = {Gewerblicher Rechtsschutz: Regelungen zum elektronischen Rechtsverkehr},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {633--635},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0846-4},
  doi       = {10.1007/s11623-017-0846-4},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Gruber17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HartmannG17,
  author    = {Kim Hartmann and
               Keir Giles},
  title     = {Shifting the Core},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {434--439},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0807-y},
  doi       = {10.1007/s11623-017-0807-y},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HartmannG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HartungB17,
  author    = {J{\"{u}}rgen Hartung and
               Lisa B{\"{u}}ttgen},
  title     = {Die Auftragsverarbeitung nach der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {549--554},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0829-5},
  doi       = {10.1007/s11623-017-0829-5},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HartungB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Heine17,
  author    = {Alexander Heine},
  title     = {Steuerdaten im Fokus des Datenschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {368--370},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0793-0},
  doi       = {10.1007/s11623-017-0793-0},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Heine17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeinemannR17,
  author    = {Andreas Heinemann and
               Karl Rihaczek},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {49--55},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0725-z},
  doi       = {10.1007/s11623-017-0725-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HeinemannR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HemkerM17,
  author    = {Thomas Hemker and
               Olaf Mischkovsky},
  title     = {Erforderliche Schutzma{\ss}nahmen f{\"{u}}r das (vernetzte) Auto},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {233--238},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0764-5},
  doi       = {10.1007/s11623-017-0764-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HemkerM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Herber17,
  author    = {Torben J. Herber},
  title     = {Dopingkontrollen - Privatsph{\"{a}}re f{\"{u}}r Athleten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {709},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0862-4},
  doi       = {10.1007/s11623-017-0862-4},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Herber17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Herber17a,
  author    = {Torben J. Herber},
  title     = {Datenschutzrechtliche Grenzen des deutschen Dopingkontrollsystems},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {735--739},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0869-x},
  doi       = {10.1007/s11623-017-0869-x},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Herber17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HerberJZ17,
  author    = {Torben J. Herber and
               Marc Jentsch and
               Sebastian Zickau},
  title     = {Datenschutz und Dopingkontrollen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {427--433},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0806-z},
  doi       = {10.1007/s11623-017-0806-z},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HerberJZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HimstedtGH17,
  author    = {Sebastian Himstedt and
               Ludwig Gramlich and
               Tobias Herbst},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {123--128},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0740-0},
  doi       = {10.1007/s11623-017-0740-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HimstedtGH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hladjk17,
  author    = {J{\"{o}}rg Hladjk},
  title     = {Internationale Daten{\"{u}}bermittlungen auf der Grundlage eines
               Angemessenheitsbeschlusses nach der {EU-DSGVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {77--79},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0732-0},
  doi       = {10.1007/s11623-017-0732-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hladjk17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JagerAQ17,
  author    = {Hubert A. J{\"{a}}ger and
               Lamya Abdullah and
               Juan Quintero},
  title     = {Vertrauensw{\"{u}}rdiges Backend},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {729--734},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0868-y},
  doi       = {10.1007/s11623-017-0868-y},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/JagerAQ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jandt17,
  author    = {Silke Jandt},
  title     = {Datenschutz durch Technik in der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {562--566},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0831-y},
  doi       = {10.1007/s11623-017-0831-y},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Jandt17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JohannesR17,
  author    = {Paul C. Johannes and
               Philipp Richter},
  title     = {Privilegierte Verarbeitung im {BDSG-E}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {300--305},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0779-y},
  doi       = {10.1007/s11623-017-0779-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JohannesR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kamp17,
  author    = {Thorsten Kamp},
  title     = {Passw{\"{o}}rter - {A} new hope},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {134--135},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0742-y},
  doi       = {10.1007/s11623-017-0742-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kamp17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KieckP17,
  author    = {Annika Kieck and
               Dirk Pohl},
  title     = {Zum Anwendungsbereich des europ{\"{a}}ischen Datenschutzrechts},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {567--571},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0832-x},
  doi       = {10.1007/s11623-017-0832-x},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KieckP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KiometzisU17,
  author    = {Michael Kiometzis and
               Markus Ullmann},
  title     = {Fahrdaten f{\"{u}}r alle?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {227--232},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0763-6},
  doi       = {10.1007/s11623-017-0763-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KiometzisU17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker17,
  author    = {Dennis{-}Kenji Kipker},
  title     = {Transparenzanforderungen an den Einsatz polizeilicher "Body-Cams"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {165--168},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0749-4},
  doi       = {10.1007/s11623-017-0749-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerMR17,
  author    = {Dennis{-}Kenji Kipker and
               Sven M{\"{u}}ller and
               Matthias Rass},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {781--784},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0878-9},
  doi       = {10.1007/s11623-017-0878-9},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerMR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klar17,
  author    = {Manuel Klar},
  title     = {Die extraterritoriale Wirkung des neuen europ{\"{a}}ischen Datenschutzrechts},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {533--537},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0826-8},
  doi       = {10.1007/s11623-017-0826-8},
  timestamp = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Klar17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klein-HennigS17,
  author    = {Martin Klein{-}Hennig and
               Felix Schmidt},
  title     = {Zur{\"{u}}ck auf Los - Die IT-Sicherheit zur{\"{u}}ck in
               der Steinzeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {605--611},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0841-9},
  doi       = {10.1007/s11623-017-0841-9},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Klein-HennigS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Knopp17,
  author    = {Michael Knopp},
  title     = {Stand der Technik},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {663--666},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0854-4},
  doi       = {10.1007/s11623-017-0854-4},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Knopp17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KoelleBCHB17,
  author    = {Marion Koelle and
               Yvonne Br{\"{u}}ck and
               Vanessa Cobus and
               Wilko Heuten and
               Susanne Boll},
  title     = {Respektvolle tragbare Kameras?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {152--158},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0747-6},
  doi       = {10.1007/s11623-017-0747-6},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KoelleBCHB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KoepkeLPZ17,
  author    = {Heiko Koepke and
               Thorben Lenze and
               Mario Pietersz and
               Christian T. Zenger},
  title     = {IoT-Schl{\"{u}}sselmanagement},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {617--622},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0843-7},
  doi       = {10.1007/s11623-017-0843-7},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KoepkeLPZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Krader17,
  author    = {Gabriela Krader},
  title     = {Stein auf Stein},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {61--62},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0727-x},
  doi       = {10.1007/s11623-017-0727-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Krader17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KraussPRZ17,
  author    = {Christoph Krau{\ss} and
               Thilo Von Pape and
               Rasmus Robrahn and
               Daniel Zelle},
  title     = {Selbstdatenschutz im vernetzten Fahrzeug},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {217--222},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0761-8},
  doi       = {10.1007/s11623-017-0761-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KraussPRZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kubis17,
  author    = {Marcel Kubis},
  title     = {Das "Recht auf Vergessenwerden"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {583},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0835-7},
  doi       = {10.1007/s11623-017-0835-7},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kubis17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann17,
  author    = {Dieter Kugelmann},
  title     = {Zukunftsweisende Datenschutzund Transparenz-Projekte in Rheinland-Pfalz
               ausgezeichnet},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {604},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0840-x},
  doi       = {10.1007/s11623-017-0840-x},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugelmann17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugler17,
  author    = {Dennis K{\"{u}}gler},
  title     = {Des Deutschen liebstes Kind},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {205},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0757-4},
  doi       = {10.1007/s11623-017-0757-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kugler17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lander17,
  title     = {Datenschutzbeauftragte des Bundes und der L{\"{a}}nder: Ergebnisse
               und Entschlie{\ss}ungen der 92. {DSK} am 09. und 10. November 2016
               in K{\"{u}}hlungsborn},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {39--41},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0723-1},
  doi       = {10.1007/s11623-017-0723-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Lander17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lorenz17,
  author    = {Bernd Lorenz},
  title     = {Datensicherheit von E-Mails},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {757--760},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0873-1},
  doi       = {10.1007/s11623-017-0873-1},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Lorenz17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Maier17,
  author    = {Natalie Maier},
  title     = {Der Besch{\"{a}}ftigtendatenschutz nach der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {169--174},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0750-y},
  doi       = {10.1007/s11623-017-0750-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Maier17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Makulilo17,
  author    = {Alex B. Makulilo},
  title     = {African accession to Council of Europe Privacy Convention 108},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {364--367},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0792-1},
  doi       = {10.1007/s11623-017-0792-1},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Makulilo17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Marcinkowski17,
  author    = {Bartosz Marcinkowski},
  title     = {Can the United States provide a higher standard of personal data protection
               than the EU?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {360--363},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0791-2},
  doi       = {10.1007/s11623-017-0791-2},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Marcinkowski17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Margraf17,
  author    = {Marian Margraf},
  title     = {Datenschutz und -sicherheit in einer zunehmend vernetzten Welt},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {21--23},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0719-x},
  doi       = {10.1007/s11623-017-0719-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Margraf17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester17,
  author    = {Britta Alexandra Mester},
  title     = {Smart Cams},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {186},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0753-8},
  doi       = {10.1007/s11623-017-0753-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Mester17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester17a,
  author    = {Britta Alexandra Mester},
  title     = {Anti Doping Administration {\&} Management System {(ADAMS)}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {765},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0875-z},
  doi       = {10.1007/s11623-017-0875-z},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Mester17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Michl17,
  author    = {Walther Michl},
  title     = {Das Verh{\"{a}}ltnis zwischen Art. 7 und Art. 8 GRCh - zur Bestimmung
               der Grundlage des Datenschutzgrundrechts im EU-Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {349--353},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0789-9},
  doi       = {10.1007/s11623-017-0789-9},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Michl17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muller17,
  author    = {Daniel M{\"{u}}ller},
  title     = {Cloud Computing: Der strafrechtliche Schutz der Datenvertraulichkeit
               vor potentiellen Insiderangriffen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {371--376},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0794-z},
  doi       = {10.1007/s11623-017-0794-z},
  timestamp = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Muller17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen17,
  author    = {Kim Nguyen},
  title     = {Zertifizierungsdienste in der Post-Quantum-{\"{A}}ra},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {17--20},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0718-y},
  doi       = {10.1007/s11623-017-0718-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Nguyen17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NguyenI17,
  author    = {Hoai Viet Nguyen and
               Luigi Lo Iacono},
  title     = {Sicherheit f{\"{u}}r REST-basierte Systeme},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {99--103},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0736-9},
  doi       = {10.1007/s11623-017-0736-9},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/NguyenI17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PeschB17,
  author    = {Paulina Pesch and
               Rainer B{\"{o}}hme},
  title     = {Datenschutz trotz {\"{o}}ffentlicher Blockchain?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {93--98},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0735-x},
  doi       = {10.1007/s11623-017-0735-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/PeschB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petrlic17,
  author    = {Ronald Petrlic},
  title     = {Wunderwaffe Verschl{\"{u}}sselung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {306--307},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0780-5},
  doi       = {10.1007/s11623-017-0780-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Petrlic17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetrlicM17,
  author    = {Ronald Petrlic and
               Klaus Manny},
  title     = {Wie sicher ist der Zugriff auf Websites im Internet?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {88--92},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0734-y},
  doi       = {10.1007/s11623-017-0734-y},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PetrlicM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pordesch17,
  author    = {Ulrich Pordesch},
  title     = {{DIN} {ISO/IEC} 27001-orientiertes {ISMS}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {667--671},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0855-3},
  doi       = {10.1007/s11623-017-0855-3},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Pordesch17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PospisilGHH17,
  author    = {Bettina Pospisil and
               Matthias Gusenbauer and
               Edith Huber and
               Otto Hellwig},
  title     = {Cyber-Sicherheitsstrategien - Umsetzung von Zielen durch Kooperation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {628--632},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0845-5},
  doi       = {10.1007/s11623-017-0845-5},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/PospisilGHH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Putschli17,
  author    = {Clemens Putschli},
  title     = {Wearables und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {721--723},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0866-0},
  doi       = {10.1007/s11623-017-0866-0},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Putschli17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReibachG17,
  author    = {Boris Reibach and
               Joachim Gruber},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {393--396},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0798-8},
  doi       = {10.1007/s11623-017-0798-8},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ReibachG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer17,
  author    = {Helmut Reimer},
  title     = {Europa und der Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {209},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0758-3},
  doi       = {10.1007/s11623-017-0758-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer17a,
  author    = {Helmut Reimer},
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {696--702},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0860-6},
  doi       = {10.1007/s11623-017-0860-6},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Reimer17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rose17,
  author    = {Edgar Rose},
  title     = {Datenbrillen, Drohnen, Dashcams ..},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {137--141},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0744-9},
  doi       = {10.1007/s11623-017-0744-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rose17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel17,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Entwurf eines neuen Bundesdatenschutzgesetzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {269--270},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0771-6},
  doi       = {10.1007/s11623-017-0771-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel17a,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Gesetzgebung im Rahmen der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {277--281},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0774-3},
  doi       = {10.1007/s11623-017-0774-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel17b,
  author    = {Alexander Ro{\ss}nagel},
  title     = {Datenschutzgesetzgebung f{\"{u}}r {\"{o}}ffentliche Interessen
               und den Besch{\"{a}}ftigungskontext},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {290--294},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0777-0},
  doi       = {10.1007/s11623-017-0777-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Rossnagel17b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RuckeshauserBM17,
  author    = {Nadine R{\"{u}}ckesh{\"{a}}user and
               Christian Brenig and
               G{\"{u}}nter M{\"{u}}ller},
  title     = {Blockchains als Grundlage digitaler Gesch{\"{a}}ftsmodelle},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {492--496},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0818-8},
  doi       = {10.1007/s11623-017-0818-8},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/RuckeshauserBM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RuhmannB17,
  author    = {Ingo Ruhmann and
               Ute Bernhardt},
  title     = {Der EuGH-Entscheid als Ansto{\ss} f{\"{u}}r mehr Rechtssicherheit
               in der IT-Sicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {34--38},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0722-2},
  doi       = {10.1007/s11623-017-0722-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/RuhmannB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schafer17,
  author    = {Burkhard Schafer},
  title     = {No Data Protection please, we are British - Privacy, Porn and Prurience
               in the Digital Economy Bill},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {354--359},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0790-3},
  doi       = {10.1007/s11623-017-0790-3},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schafer17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchanzenbachZ17,
  author    = {Martin Schanzenbach and
               Sebastian Zickau},
  title     = {Identity and access management in a doping control use case},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {724--728},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0867-z},
  doi       = {10.1007/s11623-017-0867-z},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchanzenbachZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmaleT17,
  author    = {Wolfgang Schmale and
               Marie{-}Theres Tinnefeld},
  title     = {Europa durch Menschenrechte},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {343--347},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0788-x},
  doi       = {10.1007/s11623-017-0788-x},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SchmaleT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schmeh17,
  author    = {Klaus Schmeh},
  title     = {Neue Signatur-Gesetzgebung: Sind aller guten Dinge drei?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {29--33},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0721-3},
  doi       = {10.1007/s11623-017-0721-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Schmeh17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Selzer17,
  author    = {Annika Selzer},
  title     = {Die Zukunft von Auftragsdatenverarbeitungskontrollen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {242--243},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0766-3},
  doi       = {10.1007/s11623-017-0766-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Selzer17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SillaberW17,
  author    = {Christian Sillaber and
               Bernhard Waltl},
  title     = {Life Cycle of Smart Contracts in Blockchain Ecosystems},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {497--500},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0819-7},
  doi       = {10.1007/s11623-017-0819-7},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/SillaberW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Smoltczyk17,
  author    = {Maja Smoltczyk},
  title     = {Identit{\"{a}}tsdiebstahl darf nicht als allgemeines Gesch{\"{a}}ftsrisiko
               hingenommen werden},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {662},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0853-5},
  doi       = {10.1007/s11623-017-0853-5},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Smoltczyk17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sperlich17,
  author    = {Tim Sperlich},
  title     = {Das Recht auf Daten{\"{u}}bertragbarkeit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {377},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0795-y},
  doi       = {10.1007/s11623-017-0795-y},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Sperlich17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stommel17,
  author    = {Sebastian Stommel},
  title     = {Blockchain-{\"{O}}kosysteme},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {7--12},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0716-0},
  doi       = {10.1007/s11623-017-0716-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Stommel17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/StrassheimS17,
  author    = {Alexander Stra{\ss}heim and
               Sebastian Schreiber},
  title     = {IoT-Penetrationstest},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {623--627},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0844-6},
  doi       = {10.1007/s11623-017-0844-6},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/StrassheimS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/StrubbeTW17,
  author    = {Thomas Strubbe and
               Nicolas Then{\'{e}}e and
               Christian Wieschebrink},
  title     = {IT-Sicherheit in Kooperativen Intelligenten Verkehrssystemen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {223--226},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0762-7},
  doi       = {10.1007/s11623-017-0762-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/StrubbeTW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Strunz17,
  author    = {Martin Strunz},
  title     = {Open Source Biometrie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {401--402},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0801-4},
  doi       = {10.1007/s11623-017-0801-4},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Strunz17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Taeger17,
  author    = {J{\"{u}}rgen Taeger},
  title     = {Smart Cams - Video{\"{u}}berwachung 4.0?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {129--130},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0741-z},
  doi       = {10.1007/s11623-017-0741-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Taeger17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tassi17,
  author    = {Smaro Tassi},
  title     = {Digitaler Hausfriedensbruch},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {175--179},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0751-x},
  doi       = {10.1007/s11623-017-0751-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tassi17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tassi17a,
  author    = {Smaro Tassi},
  title     = {Die Einf{\"{u}}hrung der Datenhehlerei},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {745--749},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0871-3},
  doi       = {10.1007/s11623-017-0871-3},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Tassi17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TillenburgT17,
  author    = {Gereon Tillenburg and
               Robin Tillenburg},
  title     = {Blutspenden leicht (und datensicher) gemacht - dank Handvenenscan},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {403--405},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0802-3},
  doi       = {10.1007/s11623-017-0802-3},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TillenburgT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld17,
  author    = {Marie{-}Theres Tinnefeld},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {266--268},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0770-7},
  doi       = {10.1007/s11623-017-0770-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Tinnefeld17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB17,
  author    = {Marie{-}Theres Tinnefeld and
               Benedikt Buchner},
  title     = {Europ{\"{a}}ische Rechtskultur},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {333},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0785-0},
  doi       = {10.1007/s11623-017-0785-0},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TinnefeldB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldK17,
  author    = {Marie{-}Theres Tinnefeld and
               Karsten Krupna},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {598--600},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0838-4},
  doi       = {10.1007/s11623-017-0838-4},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/TinnefeldK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Velzen17,
  author    = {Jay Thoden van Velzen},
  title     = {Securing the Insecurable?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {613--616},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0842-8},
  doi       = {10.1007/s11623-017-0842-8},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Velzen17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese17,
  author    = {Sven Venzke{-}Caprarese},
  title     = {Retargeting in der Onlinewerbung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {577--582},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0834-8},
  doi       = {10.1007/s11623-017-0834-8},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Venzke-Caprarese17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VogelgesangMHP17,
  author    = {Stephanie Vogelgesang and
               Frederik M{\"{o}}llers and
               Stefan Hessel and
               Karin Potel},
  title     = {Auf der Jagd nach Schwachstellen - Eine strafrechtliche Bewertung
               von Portscans},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {501--506},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0820-1},
  doi       = {10.1007/s11623-017-0820-1},
  timestamp = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/VogelgesangMHP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Voitel17,
  author    = {Bj{\"{o}}rn Voitel},
  title     = {Sind Hash-Werte personenbezogene Daten?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {11},
  pages     = {686--687},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0858-0},
  doi       = {10.1007/s11623-017-0858-0},
  timestamp = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Voitel17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterGT17,
  author    = {Michael W{\"{a}}chter and
               Ludwig Gramlich and
               Marie{-}Theres Tinnefeld},
  title     = {B{\"{u}}cher},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {56--60},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0726-y},
  doi       = {10.1007/s11623-017-0726-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WachterGT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterP17,
  author    = {Michael W{\"{a}}chter and
               Thomas Petri},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {653--656},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0850-8},
  doi       = {10.1007/s11623-017-0850-8},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WachterP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WagnerBKB17,
  author    = {Paul Georg Wagner and
               Pascal Birnstill and
               Erik Krempel and
               Sebastian Bretthauer},
  title     = {Auf dem Weg zu datenschutzfreundlichen Dashcams},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {159--164},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0748-5},
  doi       = {10.1007/s11623-017-0748-5},
  timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WagnerBKB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weber17,
  author    = {Heiko Weber},
  title     = {Internationale Datenverarbeitung und systematisches Datenschutzmanagement
               mit der Datenschutz-Grundverordnung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {282--284},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0775-2},
  doi       = {10.1007/s11623-017-0775-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weber17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert17,
  author    = {Thilo Weichert},
  title     = {"Sensitive Daten" revisited},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {538--543},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0827-7},
  doi       = {10.1007/s11623-017-0827-7},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Weichert17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WieflingIS17,
  author    = {Stephan Wiefling and
               Luigi Lo Iacono and
               Frederik Sandbrink},
  title     = {Anwendung der Blockchain au{\ss}erhalb von Geldw{\"{a}}hrungen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {482--486},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0816-x},
  doi       = {10.1007/s11623-017-0816-x},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/WieflingIS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {1},
  pages     = {42--48},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0724-0},
  doi       = {10.1007/s11623-017-0724-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17a,
  title     = {Entschlie{\ss}ung der Konferenz der Informationsfreiheitsbeauftragten
               vom 2. Dezember 2016},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {68},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0729-8},
  doi       = {10.1007/s11623-017-0729-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17aa,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {637--644},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0848-2},
  doi       = {10.1007/s11623-017-0848-2},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17aa.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17ab,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {10},
  pages     = {645--653},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0849-1},
  doi       = {10.1007/s11623-017-0849-1},
  timestamp = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17ab.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17ac,
  title     = {Internationale Datenschutzkonferenz stellt Datenschutzanforderungen
               an das automatisierte und vernetzte Fahren},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {715},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0864-2},
  doi       = {10.1007/s11623-017-0864-2},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X17ac.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17ad,
  title     = {{DSK:} Datenschutz und Informationsfreiheit als Elemente einer stabilen
               Demokratie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {761--764},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0874-0},
  doi       = {10.1007/s11623-017-0874-0},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X17ad.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17ae,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {766--774},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0876-y},
  doi       = {10.1007/s11623-017-0876-y},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X17ae.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17af,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {12},
  pages     = {775--781},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0877-x},
  doi       = {10.1007/s11623-017-0877-x},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/X17af.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17b,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {111--117},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0738-7},
  doi       = {10.1007/s11623-017-0738-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17c,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {118--122},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0739-6},
  doi       = {10.1007/s11623-017-0739-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17d,
  title     = {Article 29 Data Protection Working Party: Guidelines on the right
               to data portability, adopted on 13 December 2016},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {136},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0743-x},
  doi       = {10.1007/s11623-017-0743-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17e,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {187--196},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0754-7},
  doi       = {10.1007/s11623-017-0754-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17f,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {197--201},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0755-6},
  doi       = {10.1007/s11623-017-0755-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17g,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {3},
  pages     = {201--204},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0756-5},
  doi       = {10.1007/s11623-017-0756-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17g.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17h,
  title     = {Entschlie{\ss}ung der {DSK} des Bundes und der L{\"{a}}nder vom
               24. Januar 2017},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {210},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0759-2},
  doi       = {10.1007/s11623-017-0759-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17h.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17i,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {250--259},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0768-1},
  doi       = {10.1007/s11623-017-0768-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17i.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17j,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {4},
  pages     = {260--265},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0769-0},
  doi       = {10.1007/s11623-017-0769-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17j.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17k,
  title     = {Gemeinsame Entschlie{\ss}ung des Treffens der europ{\"{a}}ischen
               Informationsfreiheitsbeauftragten vom 24. Februar 2017},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {276},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0773-4},
  doi       = {10.1007/s11623-017-0773-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17k.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17l,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {314--323},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0782-3},
  doi       = {10.1007/s11623-017-0782-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17l.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17m,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {324--329},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0783-2},
  doi       = {10.1007/s11623-017-0783-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17m.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17n,
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {329--332},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0784-1},
  doi       = {10.1007/s11623-017-0784-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17n.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17o,
  title     = {93. {DSK} am 29./30. M{\"{a}}rz 2017 in G{\"{o}}ttingen
               - G{\"{o}}ttinger Erkl{\"{a}}rung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {336},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0786-z},
  doi       = {10.1007/s11623-017-0786-z},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17o.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17p,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {378--386},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0796-x},
  doi       = {10.1007/s11623-017-0796-x},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17p.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17q,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {6},
  pages     = {387--393},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0797-9},
  doi       = {10.1007/s11623-017-0797-9},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17q.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17r,
  title     = {Entschlie{\ss}ung der Informationsfreiheitsbeauftragten der L{\"{a}}nder
               vom 24. April 2017},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {400},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0800-5},
  doi       = {10.1007/s11623-017-0800-5},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17r.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17s,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {449--457},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0810-3},
  doi       = {10.1007/s11623-017-0810-3},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17s.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17t,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {7},
  pages     = {458--464},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0811-2},
  doi       = {10.1007/s11623-017-0811-2},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17t.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17u,
  title     = {{EU-U.S.} Privacy Shield: Informationen und Beschwerdeformulare f{\"{u}}r
               Betroffene},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {472},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0814-z},
  doi       = {10.1007/s11623-017-0814-z},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17u.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17v,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {508--518},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0822-z},
  doi       = {10.1007/s11623-017-0822-z},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17v.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17w,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {8},
  pages     = {519--528},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0823-y},
  doi       = {10.1007/s11623-017-0823-y},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17w.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17x,
  title     = {Entschlie{\ss}ungen der 33. Konferenz der Informationsfreiheitsbeauftragten
               in Deutschland vom 13. Juni 2017 in Mainz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {532},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0825-9},
  doi       = {10.1007/s11623-017-0825-9},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17x.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17y,
  title     = {DuD Recht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {584--592},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0836-6},
  doi       = {10.1007/s11623-017-0836-6},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17y.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X17z,
  title     = {Report},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {9},
  pages     = {593--597},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0837-5},
  doi       = {10.1007/s11623-017-0837-5},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/X17z.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZerrB17,
  author    = {Konrad Zerr and
               Alexander Benner},
  title     = {Kennzahlen eines mitarbeiterorientierten Sicherheitsmanagements},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {2},
  pages     = {80--87},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0733-z},
  doi       = {10.1007/s11623-017-0733-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ZerrB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZimmermannHVV17,
  author    = {Verena Zimmermann and
               Birgit Henhapl and
               Melanie Volkamer and
               Joachim Vogt},
  title     = {Ende-zu-Ende sichere E-Mail-Kommunikation},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {41},
  number    = {5},
  pages     = {308--313},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11623-017-0781-4},
  doi       = {10.1007/s11623-017-0781-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/ZimmermannHVV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AmendolaK16,
  author    = {Sandro Amendola and
               Detlef Kraus},
  title     = {Sichere Internet-Zahlungsdienste durch starke Kundenauthentifizierung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {4},
  pages     = {235--238},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0586-x},
  doi       = {10.1007/s11623-016-0586-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/AmendolaK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Backes16,
  author    = {Michael Backes},
  title     = {Herausforderungen des Internet of Things},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {8},
  pages     = {489--490},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0642-6},
  doi       = {10.1007/s11623-016-0642-6},
  timestamp = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Backes16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bausewein16,
  author    = {Christoph Bausewein},
  title     = {Bewerberauswahl und Personalentwicklung mittels psychologischer Eignungstests},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {3},
  pages     = {139--143},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0564-3},
  doi       = {10.1007/s11623-016-0564-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bausewein16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeckerS16,
  author    = {Carlos Becker and
               Sandra Seubert},
  title     = {Privatheit, kommunikative Freiheit und Demokratie},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {2},
  pages     = {73--78},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0549-2},
  doi       = {10.1007/s11623-016-0549-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BeckerS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BenderK16,
  author    = {Jens Bender and
               Dennis K{\"{u}}gler},
  title     = {Was ist starke Authentisierung?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {4},
  pages     = {212--216},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0580-3},
  doi       = {10.1007/s11623-016-0580-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BenderK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Block16,
  author    = {Helga Block},
  title     = {Abschnittskontrolle (Section Control) und Datenschutz},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {11},
  pages     = {706},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0687-6},
  doi       = {10.1007/s11623-016-0687-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Block16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boehme-Nessler16,
  author    = {Volker Boehme{-}Ne{\ss}ler},
  title     = {Das Ende der Anonymit{\"{a}}t},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {7},
  pages     = {419--423},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0629-3},
  doi       = {10.1007/s11623-016-0629-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Boehme-Nessler16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bolsinger16,
  author    = {Harald J. Bolsinger},
  title     = {Wo bleibt die digitale Dividende f{\"{u}}r Europas Konsumenten?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {6},
  pages     = {382--385},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0619-5},
  doi       = {10.1007/s11623-016-0619-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Bolsinger16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner16,
  author    = {Benedikt Buchner},
  title     = {Grunds{\"{a}}tze und Rechtm{\"{a}}{\ss}igkeit der Datenverarbeitung
               unter der {DS-GVO}},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {3},
  pages     = {155--161},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0567-0},
  doi       = {10.1007/s11623-016-0567-0},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/Buchner16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BudurushiHV16,
  author    = {Jurlind Budurushi and
               Annika Hilt and
               Melanie Volkamer},
  title     = {"E-Mail made in Germany"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {5},
  pages     = {300--304},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0600-3},
  doi       = {10.1007/s11623-016-0600-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BudurushiHV16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BunkG16,
  author    = {Patrick Bunk and
               Patrick Goldschmidt},
  title     = {Big Data und die Dual-Use Problematik am Beispiel {\"{o}}ffentlicher
               Daten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {7},
  pages     = {463--467},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0637-3},
  doi       = {10.1007/s11623-016-0637-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BunkG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuschGW16,
  author    = {Birgit Schmidt am Busch and
               Ulrich M. Gassner and
               Ferdinand Wollenschl{\"{a}}ger},
  title     = {Der Augsburg-M{\"{u}}nchner-Entwurf eines Biobankgesetzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {6},
  pages     = {365--370},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0615-9},
  doi       = {10.1007/s11623-016-0615-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/BuschGW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Clarke16,
  author    = {Roger Clarke},
  title     = {A framework for analysing technology's negative and positive impacts
               on freedom and privacy},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {2},
  pages     = {79--83},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0550-9},
  doi       = {10.1007/s11623-016-0550-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Clarke16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Debski16,
  author    = {Andrzej Debski},
  title     = {Cloud-Risiken und wie Anwenderunternehmen ihnen begegnen sollten},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {659--666},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0678-7},
  doi       = {10.1007/s11623-016-0678-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Debski16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtK16,
  author    = {Jens Eckhardt and
               Rudi Kramer},
  title     = {Auftragsdatenverarbeitung beim Einsatz von Pers{\"{o}}nlichkeitsanalysetools},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {3},
  pages     = {144--149},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0565-2},
  doi       = {10.1007/s11623-016-0565-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EckhardtK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eichenhofer16,
  author    = {Johannes Eichenhofer},
  title     = {Privatheitsgef{\"{a}}hrdungen durch Private},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {2},
  pages     = {84--88},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0551-8},
  doi       = {10.1007/s11623-016-0551-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Eichenhofer16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EntschewN16,
  author    = {Enrico Entschew and
               Kim Nguyen},
  title     = {Neue Anwendungsszenarien f{\"{u}}r die 2-Faktor Authentifizierung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {4},
  pages     = {231--234},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0585-y},
  doi       = {10.1007/s11623-016-0585-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EntschewN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ernst16,
  author    = {Stefan Ernst},
  title     = {Kundendaten und der "Asset Deal" - Ein Datenschutzproblem},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {12},
  pages     = {792--796},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0705-8},
  doi       = {10.1007/s11623-016-0705-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Ernst16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EsslingerSSW16,
  author    = {Bernhard Esslinger and
               Ludger Schmidt and
               Benjamin Strenge and
               Arno Wacker},
  title     = {Unpopul{\"{a}}re E-Mail-Verschl{\"{u}}sselung - Aufl{\"{o}}sung
               des Henne-Ei-Problems},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {5},
  pages     = {283--289},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0597-7},
  doi       = {10.1007/s11623-016-0597-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/EsslingerSSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber16,
  author    = {Eberhard von Faber},
  title     = {Digitalisierung, IT-Outsourcing, Informationssicherheit},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {629},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0671-1},
  doi       = {10.1007/s11623-016-0671-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber16a,
  author    = {Eberhard von Faber},
  title     = {Organisation und Absicherung einer industriellen IT-Produktion},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {647--653},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0676-9},
  doi       = {10.1007/s11623-016-0676-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber16b,
  author    = {Eberhard von Faber},
  title     = {IT-Outsourcing - Sicherheit neu denken!},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {680},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0681-z},
  doi       = {10.1007/s11623-016-0681-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Faber16b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerTT16,
  author    = {Arno Fiedler and
               Christian Thiel and
               Christoph Thiel},
  title     = {Organisations{\"{u}}bergreifendes Sicherheits- und Servicemanagement
               mittels eIDAS-konformer Vertrauensdienste},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {675--679},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0680-0},
  doi       = {10.1007/s11623-016-0680-0},
  timestamp = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/FiedlerTT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox16,
  author    = {Dirk Fox},
  title     = {Wie finden wir Fehler?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {11},
  pages     = {701},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0685-8},
  doi       = {10.1007/s11623-016-0685-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Fox16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Franck16,
  author    = {Lorenz Franck},
  title     = {"Nie wieder Schreddern" - Drei Datenschutzstempel im Test},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {3},
  pages     = {172--174},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0570-5},
  doi       = {10.1007/s11623-016-0570-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Franck16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn16,
  author    = {Christian L. Geminn},
  title     = {Das Smart Home als Herausforderung f{\"{u}}r das Datenschutzrecht},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {9},
  pages     = {575--580},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0661-3},
  doi       = {10.1007/s11623-016-0661-3},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Geminn16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingR16,
  author    = {Sebastian Gerling and
               Christian Rossow},
  title     = {Angreiferjagd im "Internet der Dinge"},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {8},
  pages     = {507--510},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0647-1},
  doi       = {10.1007/s11623-016-0647-1},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GerlingR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Giegerich16,
  author    = {Hans{-}J. Giegerich},
  title     = {Leitgedanken zur Einf{\"{u}}hrung von E-Mail-Verschl{\"{u}}sselung
               im Unternehmen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {5},
  pages     = {278--282},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0596-8},
  doi       = {10.1007/s11623-016-0596-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Giegerich16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GriesserB16,
  author    = {Marcus Griesser and
               Werner Buntschu},
  title     = {Vertrauen oder Wissen? Eine Risikobetrachtung f{\"{u}}r sicheres
               IT-Outsourcing},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {640--646},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0675-x},
  doi       = {10.1007/s11623-016-0675-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GriesserB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrimmF16,
  author    = {R{\"{u}}diger Grimm and
               Dirk Fox},
  title     = {Privatheit ist mehr als R{\"{u}}ckzug},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {2},
  pages     = {65},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0546-5},
  doi       = {10.1007/s11623-016-0546-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/GrimmF16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grunder16,
  author    = {Torsten Gr{\"{u}}nder},
  title     = {Partnerschaftsgestaltung f{\"{u}}r sicheres IT-Outsourcing},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {10},
  pages     = {667--674},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0679-6},
  doi       = {10.1007/s11623-016-0679-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Grunder16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hammer16,
  author    = {Volker Hammer},
  title     = {{DIN} 66398},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {8},
  pages     = {528--533},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0651-5},
  doi       = {10.1007/s11623-016-0651-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hammer16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen16,
  author    = {Marit Hansen},
  title     = {Datenschutz-Folgenabsch{\"{a}}tzung - ger{\"{u}}stet f{\"{u}}r
               Datenschutzvorsorge?},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {9},
  pages     = {587--591},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0663-1},
  doi       = {10.1007/s11623-016-0663-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Hansen16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Herbst16,
  author    = {Tobias Herbst},
  title     = {Rechtliche und ethische Probleme des Umgangs mit Proben und Daten
               bei gro{\ss}en Biobanken},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {6},
  pages     = {371--375},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0616-8},
  doi       = {10.1007/s11623-016-0616-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Herbst16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HerfertSW16,
  author    = {Michael Herfert and
               Annika Selzer and
               Ulrich Waldmann},
  title     = {Laientaugliche Schl{\"{u}}sselgenerierung f{\"{u}}r die
               Ende-zu-Ende-Verschl{\"{u}}sselung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {5},
  pages     = {290--294},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0598-6},
  doi       = {10.1007/s11623-016-0598-6},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/HerfertSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HuberHQ16,
  author    = {Edith Huber and
               Otto Hellwig and
               Gerald Quirchmayr},
  title     = {Wissensaustausch und Vertrauen unter Computer Emergency Response Teams
               - eine europ{\"{a}}ische Herausforderung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {3},
  pages     = {162--166},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0568-z},
  doi       = {10.1007/s11623-016-0568-z},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dud/HuberHQ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jacobson16,
  author    = {Gunnar Jacobson},
  title     = {Schl{\"{u}}sselverteilung f{\"{u}}r Mobilger{\"{a}}te},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {4},
  pages     = {217--221},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0581-2},
  doi       = {10.1007/s11623-016-0581-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Jacobson16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JagerKSW16,
  author    = {Bernd J{\"{a}}ger and
               Reiner Kraft and
               Annika Selzer and
               Ulrich Waldmann},
  title     = {Die Kontrolle des Umsetzungsgrades des Zugangs- und Zugriffsschutzes},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {4},
  pages     = {239--243},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0587-9},
  doi       = {10.1007/s11623-016-0587-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JagerKSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JagerKSW16a,
  author    = {Bernd J{\"{a}}ger and
               Reiner Kraft and
               Annika Selzer and
               Ulrich Waldmann},
  title     = {Die teilautomatisierte Verifizierung der getrennten Verarbeitung in
               der Cloud},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {5},
  pages     = {305--309},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0601-2},
  doi       = {10.1007/s11623-016-0601-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JagerKSW16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jandt16,
  author    = {Silke Jandt},
  title     = {Smart Health},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {9},
  pages     = {571--574},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0660-4},
  doi       = {10.1007/s11623-016-0660-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Jandt16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JaritzI16,
  author    = {Aline Jaritz and
               Luigi Lo Iacono},
  title     = {Untersuchung des Datenverkehrs aktueller Smart-TVs},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {8},
  pages     = {511--518},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0648-0},
  doi       = {10.1007/s11623-016-0648-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JaritzI16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jendrian16,
  author    = {Kai Jendrian},
  title     = {Spielerische Bedrohungsanalyse},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {11},
  pages     = {749--750},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0695-6},
  doi       = {10.1007/s11623-016-0695-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Jendrian16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JerchelS16,
  author    = {Kerstin Jerchel and
               Jens M. Schubert},
  title     = {Bech{\"{a}}ftigtendatenschutz - Neustart nach europ{\"{a}}ischer
               Art},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {12},
  pages     = {769},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0699-2},
  doi       = {10.1007/s11623-016-0699-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JerchelS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JerchelS16a,
  author    = {Kerstin Jerchel and
               Jens M. Schubert},
  title     = {Neustart im Datenschutz f{\"{u}}r Besch{\"{a}}ftigte},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {12},
  pages     = {782--786},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0703-x},
  doi       = {10.1007/s11623-016-0703-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/JerchelS16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Katzenbeisser16,
  author    = {Stefan Katzenbeisser},
  title     = {Technischer Schutz vor geheimdienstlicher {\"{U}}berwachung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {2},
  pages     = {98--100},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0554-5},
  doi       = {10.1007/s11623-016-0554-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Katzenbeisser16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker16,
  author    = {Dennis{-}Kenji Kipker},
  title     = {Forschungsklauseln},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {6},
  pages     = {394},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0622-x},
  doi       = {10.1007/s11623-016-0622-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker16a,
  author    = {Dennis{-}Kenji Kipker},
  title     = {Unbestimmte Rechtsbegriffe},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {9},
  pages     = {610},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0667-x},
  doi       = {10.1007/s11623-016-0667-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/Kipker16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerP16,
  author    = {Dennis{-}Kenji Kipker and
               Mikola Preu{\ss}},
  title     = {Rezensionen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {40},
  number    = {9},
  pages     = {625--628},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11623-016-0670-2},
  doi       = {10.1007/s11623-016-0670-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dud/KipkerP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics