Search dblp for Publications

export results for "toc:db/journals/dud/dud44.bht:"

 download as .bib file

@article{DBLP:journals/dud/Atug20,
  author       = {Manuel Atug},
  title        = {Zertifizierungen im Kontext KRITIScher Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {668--671},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1346-5},
  doi          = {10.1007/S11623-020-1346-5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Atug20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Baum20,
  author       = {Gerhart Baum},
  title        = {Nachruf auf Burkhard Hirsch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {351--352},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1282-4},
  doi          = {10.1007/S11623-020-1282-4},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Baum20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleckat20,
  author       = {Alexander Bleckat},
  title        = {Anwendbarkeit der Datenschutzgrundverordnung auf k{\"{u}}nstliche
                  Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {194--198},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1250-z},
  doi          = {10.1007/S11623-020-1250-Z},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bleckat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BremertHKP20,
  author       = {Benjamin Bremert and
                  Marit Hansen and
                  Barbara K{\"{o}}rffer and
                  Sven Polenz},
  title        = {Pandemie und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {791--795},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1368-z},
  doi          = {10.1007/S11623-020-1368-Z},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BremertHKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Breyer20,
  author       = {Jonas Breyer},
  title        = {Der neue {\textsection} 2 {BORA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {189--193},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1249-5},
  doi          = {10.1007/S11623-020-1249-5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Breyer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {476--484},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1309-x},
  doi          = {10.1007/S11623-020-1309-X},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20a,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {544--554},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1322-0},
  doi          = {10.1007/S11623-020-1322-0},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner20b,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {685--699},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1351-8},
  doi          = {10.1007/S11623-020-1351-8},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bungeroth20,
  author       = {Christian Bungeroth},
  title        = {Vertrauen in Programme f{\"{u}}r IT-Sicherheit aufbauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {240--244},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1259-3},
  doi          = {10.1007/S11623-020-1259-3},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bungeroth20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ChenHK20,
  author       = {Jihong Chen and
                  Lu Han and
                  Dennis{-}Kenji Kipker},
  title        = {An Introduction into the New Chinese Data Protection Legal Framework},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {52--57},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1222-3},
  doi          = {10.1007/S11623-019-1222-3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ChenHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Coester20,
  author       = {Ulla Coester},
  title        = {Vertrauensw{\"{u}}rdige {KI} - zwischen Anspruch und Wirklichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {245--249},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1260-x},
  doi          = {10.1007/S11623-020-1260-X},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Coester20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CoesterF20,
  author       = {Ulla Coester and
                  Bernd Fuhlert},
  title        = {Gesichtserkennung - eine Frage der Ethik?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {48--51},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1221-4},
  doi          = {10.1007/S11623-019-1221-4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/CoesterF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Conrad20,
  author       = {Conrad Sebastian Conrad},
  title        = {Datenschutz bei Zukunftsmodellen: Nur mit Einwilligung m{\"{o}}glich?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {611--616},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1334-9},
  doi          = {10.1007/S11623-020-1334-9},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Conrad20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DickhautJRL20,
  author       = {Ernestine Dickhaut and
                  Andreas Janson and
                  Alexander Ro{\ss}nagel and
                  Jan Marco Leimeister},
  title        = {Interdisziplin{\"{a}}re Anforderungsmuster f{\"{u}}r smarte
                  pers{\"{o}}nliche Assistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {579--583},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1328-7},
  doi          = {10.1007/S11623-020-1328-7},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DickhautJRL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DickhautTJ20,
  author       = {Ernestine Dickhaut and
                  Laura Friederike Thies and
                  Andreas Janson},
  title        = {Die Kodifizierung von Gestaltungswissen in interdisziplin{\"{a}}ren
                  Entwurfsmustern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {584--588},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1329-6},
  doi          = {10.1007/S11623-020-1329-6},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DickhautTJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix20,
  author       = {Alexander Dix},
  title        = {Die deutsche Corona Warn-App - ein gelungenes Beispiel f{\"{u}}r
                  Privacy by Design?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {779--785},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1366-1},
  doi          = {10.1007/S11623-020-1366-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Dix20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DolleHC20,
  author       = {Wilhelm Dolle and
                  Julian Herlinghaus and
                  Marian Corbe},
  title        = {Sinn und Unsinn von Zertifizierungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {641--644},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1340-y},
  doi          = {10.1007/S11623-020-1340-Y},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DolleHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FahrmannA20,
  author       = {Jan F{\"{a}}hrmann and
                  Clemens Arzt},
  title        = {Polizeilicher Umgang mit personenbezogenen Daten in der Corona-Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {801--805},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1370-5},
  doi          = {10.1007/S11623-020-1370-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FahrmannA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerD20,
  author       = {Arno Fiedler and
                  Christian Drews},
  title        = {Vertrauen in der digitalen Welt auf , , Treu und Glauben"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {231--235},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1257-5},
  doi          = {10.1007/S11623-020-1257-5},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20,
  author       = {Dirk Fox},
  title        = {Offene Herausforderungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {81},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1227-y},
  doi          = {10.1007/S11623-020-1227-Y},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20a,
  author       = {Dirk Fox},
  title        = {Beben},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {497},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1312-2},
  doi          = {10.1007/S11623-020-1312-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox20b,
  author       = {Dirk Fox},
  title        = {Die Praxis sollte das Ergebnis des Nachdenkens sein. Hermann Hesse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {709},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1353-6},
  doi          = {10.1007/S11623-020-1353-6},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrankB20,
  author       = {Guido Frank and
                  Thomas Becker},
  title        = {Aus dem Nirwana},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {456--461},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1305-1},
  doi          = {10.1007/S11623-020-1305-1},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FrankB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FreyeKEM20,
  author       = {Merle Freye and
                  Dennis{-}Kenji Kipker and
                  Rindstone B. Ezekiel and
                  Doreen F. Mwamlangala},
  title        = {Strengthening protection of personal data in the health sector: a
                  comparative analysis of the Tanzanian and German eHealth system},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {393--397},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1291-3},
  doi          = {10.1007/S11623-020-1291-3},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FreyeKEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FrickeL20,
  author       = {Frank Fricke and
                  Philipp L{\"{o}}hr},
  title        = {Datenschutzrechtliche Zul{\"{a}}ssigkeitspr{\"{u}}fungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {169--171},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1245-9},
  doi          = {10.1007/S11623-020-1245-9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/FrickeL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Geminn20,
  author       = {Christian L. Geminn},
  title        = {Betroffenenrechte verbessern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {307--311},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1273-5},
  doi          = {10.1007/S11623-020-1273-5},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Geminn20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GeminnSWAV20,
  author       = {Christian L. Geminn and
                  Jessica M. Szczuka and
                  Carina Weber and
                  Andr{\'{e}} Artelt and
                  Lina Varonina},
  title        = {Kinder als Nutzende smarter Sprachassistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {606--610},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1333-x},
  doi          = {10.1007/S11623-020-1333-X},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GeminnSWAV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingGHP20,
  author       = {Rainer W. Gerling and
                  Sebastian Gerling and
                  Stefan Hessel and
                  Ronald Petrlic},
  title        = {Stand der Technik bei Videokonferenzen - und die Interpretation der
                  Aufsichtsbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {740--747},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1359-0},
  doi          = {10.1007/S11623-020-1359-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlingGHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Glatzner20,
  author       = {Florian Glatzner},
  title        = {Profilbildung und algorithmenbasierte Entscheidungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {312--315},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1274-4},
  doi          = {10.1007/S11623-020-1274-4},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Glatzner20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GohrKS20,
  author       = {Aron Gohr and
                  Dominik Klein and
                  Werner Schindler},
  title        = {Verr{\"{a}}terischer Stromverbrauch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {431--435},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1300-6},
  doi          = {10.1007/S11623-020-1300-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GohrKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gomez-BarreroKB20,
  author       = {Marta Gomez{-}Barrero and
                  Jascha Kolberg and
                  Christoph Busch},
  title        = {Erkennung von Pr{\"{a}}sentationsangriffen auf Fingerabdruck
                  Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {26--31},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1217-0},
  doi          = {10.1007/S11623-019-1217-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gomez-BarreroKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grafenstein20,
  author       = {Max von Grafenstein},
  title        = {Innovationsoffener Datenschutz durch Folgenabsch{\"{a}}tzungen
                  und Technikgestaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {172--175},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1246-8},
  doi          = {10.1007/S11623-020-1246-8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Grafenstein20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichK20,
  author       = {Ludwig Gramlich and
                  Kerstin Kreul},
  title        = {Novellierung des Post-Datenschutzes in Deutschland},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {469--474},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1307-z},
  doi          = {10.1007/S11623-020-1307-Z},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grethel20,
  author       = {Monika Grethel},
  title        = {Einsatz von WhatsApp durch saarl{\"{a}}ndische Kommunen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {148},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1240-1},
  doi          = {10.1007/S11623-020-1240-1},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Grethel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrubeHSS20,
  author       = {Tim Grube and
                  Alexander Heinrich and
                  Jan{-}Philipp Stroscher and
                  Sabrina Schomberg},
  title        = {Datensicherheit von Corona-Apps nach der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {501--505},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1314-0},
  doi          = {10.1007/S11623-020-1314-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrubeHSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gruber20,
  author       = {Joachim Gruber},
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {492--496},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1311-3},
  doi          = {10.1007/S11623-020-1311-3},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gruber20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GuhrKM20,
  author       = {Alisha G{\"{u}}hr and
                  Irene Karper and
                  S{\"{o}}nke Maseberg},
  title        = {Der lange Weg zur Akkreditierung nach Art. 42 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {649--653},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1342-9},
  doi          = {10.1007/S11623-020-1342-9},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GuhrKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Haas20,
  author       = {Werner Haas},
  title        = {Sicherheit auf Sand gebaut?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {441--445},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1302-4},
  doi          = {10.1007/S11623-020-1302-4},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Haas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HamacherKKS20,
  author       = {Kay Hamacher and
                  Stefan Katzenbeisser and
                  Tobias Kussel and
                  Sebastian Stammler},
  title        = {Genomische Daten und der Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {87--93},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1229-9},
  doi          = {10.1007/S11623-020-1229-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HamacherKKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeckmannST20,
  author       = {Benjamin Heckmann and
                  Florian Schweighart and
                  Markus Tasch},
  title        = {{JOINED-VIV:} Umsetzung der {DSGVO} mittels {SDM} und unter Einbindung
                  des {BSI} IT-Grundschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {663--667},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1345-6},
  doi          = {10.1007/S11623-020-1345-6},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeckmannST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henniger20,
  author       = {Olaf Henniger},
  title        = {Neue Normen f{\"{u}}r biometrische Datenaustauschformate},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {43--47},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1220-5},
  doi          = {10.1007/S11623-019-1220-5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Henniger20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HesselP20,
  author       = {Stefan Hessel and
                  Karin Potel},
  title        = {Zur Notwendigkeit einer Data Breach Notification bei Datentr{\"{a}}gerverschl{\"{u}}sselung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {94--97},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1230-3},
  doi          = {10.1007/S11623-020-1230-3},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HesselP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeuftF20,
  author       = {Matthias Heuft and
                  Dirk Feldhusen},
  title        = {Angriffe auf Chips in Reisep{\"{a}}ssen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {436--440},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1301-5},
  doi          = {10.1007/S11623-020-1301-5},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeuftF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HobertB20,
  author       = {Sebastian Hobert and
                  Florian Berens},
  title        = {Chatbot-basierte Lernsysteme als k{\"{u}}nstliche Tutoren in
                  der Lehre},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {594--599},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1331-z},
  doi          = {10.1007/S11623-020-1331-Z},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HobertB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HobertB20a,
  author       = {Sebastian Hobert and
                  Florian Berens},
  title        = {Chatbot-basierte Lernsysteme alsk{\"{u}}nstliche Tutoren in der
                  Lehre},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {600--605},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1332-y},
  doi          = {10.1007/S11623-020-1332-Y},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HobertB20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenP20,
  author       = {Thomas Hoeren and
                  Stefan Pinelli},
  title        = {Datenschutz im neuen chinesischen Zivilgesetzbuch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {678--680},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1348-3},
  doi          = {10.1007/S11623-020-1348-3},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoerenP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JahnelGW20,
  author       = {Tina Jahnel and
                  Ansgar Gerhardus and
                  Julian Wienert},
  title        = {Digitales Contact Tracing: Dilemma zwischen Datenschutz und Public
                  Health Nutzenbewertung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {786--790},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1367-0},
  doi          = {10.1007/S11623-020-1367-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JahnelGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JaspersJ20,
  author       = {Andreas Jaspers and
                  Tobias Jacquemain},
  title        = {Datenschutz-Grundverordnung - Praxiserfahrungen und Evaluation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {297--301},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1271-7},
  doi          = {10.1007/S11623-020-1271-7},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JaspersJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jelinek20,
  author       = {Andrea Jelinek},
  title        = {{FAQ} on the judgment of the Court of Justice of the European Union
                  in Case {C-311/18} - Data Protection Commissioner v Facebook Ireland
                  Ltd and Maximillian Schrems},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {681--683},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1349-2},
  doi          = {10.1007/S11623-020-1349-2},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jelinek20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JohnW20,
  author       = {Nicolas John and
                  Maximilian Wellmann},
  title        = {Datenschutzrechtliche Fragestellungen zur Auswahl von Videokonferenztools},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {506--510},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1315-z},
  doi          = {10.1007/S11623-020-1315-Z},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JohnW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20,
  author       = {Ulrich Kelber},
  title        = {BfDI verh{\"{a}}ngt Geldbu{\ss}en gegen Telekommunikationsdienstleister},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {85--86},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1228-x},
  doi          = {10.1007/S11623-020-1228-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20a,
  author       = {Ulrich Kelber},
  title        = {Nicht Daten sind der Rohstoff des 21. Jahrhunderts, sondern Vertrauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {226--227},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1255-7},
  doi          = {10.1007/S11623-020-1255-7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kelber20b,
  author       = {Ulrich Kelber},
  title        = {BfDI zu Folgen der Gesetzgebung des {PDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {640},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1339-4},
  doi          = {10.1007/S11623-020-1339-4},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kelber20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker20,
  author       = {Dennis{-}Kenji Kipker},
  title        = {{EU} Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {263--265},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1264-6},
  doi          = {10.1007/S11623-020-1264-6},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kipker20a,
  author       = {Dennis{-}Kenji Kipker},
  title        = {{EU} Cybersecurity Act and Certification Schemes: an up-to-date progress
                  report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {390--392},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1290-4},
  doi          = {10.1007/S11623-020-1290-4},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kipker20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerB20,
  author       = {Dennis{-}Kenji Kipker and
                  Benedikt Buchner},
  title        = {Digitale Herausforderungen der Corona-Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {773--775},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1364-3},
  doi          = {10.1007/S11623-020-1364-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klink-StraubS20,
  author       = {Judith Klink{-}Straub and
                  Tobias Straub},
  title        = {Der Auskunftsanspruch bei Pr{\"{u}}fungsunterlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {672--677},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1347-4},
  doi          = {10.1007/S11623-020-1347-4},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Klink-StraubS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KnieperT20,
  author       = {Thomas Knieper and
                  Marie{-}Theres Tinnefeld},
  title        = {Politische Satiren und Karikaturen - eine Bastion offener Demokratien?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {375--380},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1287-z},
  doi          = {10.1007/S11623-020-1287-Z},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KnieperT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KnuchelE20,
  author       = {Christian Knuchel and
                  Nico Ebert},
  title        = {DSGVO-konformes L{\"{o}}schen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {126--127},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1235-y},
  doi          = {10.1007/S11623-020-1235-Y},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KnuchelE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KochPW20,
  author       = {Manuel Koch and
                  Andrea Pawils and
                  Enrico Weide},
  title        = {Das Standard-Datenschutzmodell in der Telematikinfrastruktur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {104--110},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1232-1},
  doi          = {10.1007/S11623-020-1232-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KochPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Krasemann20,
  author       = {Henry Krasemann},
  title        = {Der aktuelle Stand der Datenschutz- Zertifizierung und Akkreditierung
                  in Deutschland und Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {645--648},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1341-x},
  doi          = {10.1007/S11623-020-1341-X},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Krasemann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20,
  author       = {Dieter Kugelmann},
  title        = {Kann und darf das Handy gegen Corona helfen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {350},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1281-5},
  doi          = {10.1007/S11623-020-1281-5},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20a,
  author       = {Dieter Kugelmann},
  title        = {Rolle, Strategien, Aktionsplan 2020},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {430},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1299-8},
  doi          = {10.1007/S11623-020-1299-8},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann20b,
  author       = {Dieter Kugelmann},
  title        = {Neue Welle von Schadsoftware - Anstieg von Datenpannen in diesen Tagen
                  aufgrund von Phishing Mails},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {500},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1313-1},
  doi          = {10.1007/S11623-020-1313-1},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugler20,
  author       = {Dennis K{\"{u}}gler},
  title        = {Expedition in den Nanokosmos},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {425},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1297-x},
  doi          = {10.1007/S11623-020-1297-X},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugler20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KuglerR20,
  author       = {Dennis K{\"{u}}gler and
                  Helmut Reimer},
  title        = {Was tun? Sicherheitsl{\"{u}}cken in Hardware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {475},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1308-y},
  doi          = {10.1007/S11623-020-1308-Y},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KuglerR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kuhling20,
  author       = {J{\"{u}}rgen K{\"{u}}hling},
  title        = {Privatheit am Arbeitsplatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {182--188},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1248-6},
  doi          = {10.1007/S11623-020-1248-6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Kuhling20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KusS20,
  author       = {Mehmet Kus and
                  Karsten Sohr},
  title        = {Praktische Erfahrungen und Ans{\"{a}}tze f{\"{u}}r {\^{a}}Security
                  by Design' auf Basis der STRIDE-Methodik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {750--754},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1361-6},
  doi          = {10.1007/S11623-020-1361-6},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KusS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Labusga20,
  author       = {Jan{-}Hendrik Labusga},
  title        = {Die Fristberechnung beim Data Breach},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {735--739},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1358-1},
  doi          = {10.1007/S11623-020-1358-1},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Labusga20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lower20,
  author       = {Daniel L{\"{o}}wer},
  title        = {Vertrauen im E-Commerce},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {236--239},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1258-4},
  doi          = {10.1007/S11623-020-1258-4},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Lower20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MaierFW20,
  author       = {Dominik Christian Maier and
                  Fabian Franzen and
                  Manuela Wagner},
  title        = {Mehr schlecht als Recht: Grauzone Sicherheitsforschung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {511--517},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1316-y},
  doi          = {10.1007/S11623-020-1316-Y},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MaierFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MargrafB20,
  author       = {Marian Margraf and
                  Nicolas Buchmann},
  title        = {Gew{\"{a}}hrleistung langfristiger Sicherheit f{\"{u}}r
                  Breeder-Dokumente durch Biometrie und Blockchain-Technologie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {32--37},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1218-z},
  doi          = {10.1007/S11623-019-1218-Z},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MargrafB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Martin20,
  author       = {Nicholas Martin},
  title        = {Corona-Eind{\"{a}}mmung in Taiwan},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {815--818},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1373-2},
  doi          = {10.1007/S11623-020-1373-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Martin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinMSFH20,
  author       = {Nicholas Martin and
                  Britta Alexandra Mester and
                  Ina Schiering and
                  Michael Friedewald and
                  Dara Hallinan},
  title        = {Datenschutz-Folgenabsch{\"{a}}tzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {149--153},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1241-0},
  doi          = {10.1007/S11623-020-1241-0},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MartinMSFH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartinSF20,
  author       = {Nicholas Martin and
                  Ina Schiering and
                  Michael Friedewald},
  title        = {Methoden der Datenschutz-Folgenabsch{\"{a}}tzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {154--160},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1242-z},
  doi          = {10.1007/S11623-020-1242-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MartinSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MayerBDSV20,
  author       = {Peter Mayer and
                  Fabian Ballreich and
                  Reyhan D{\"{u}}zg{\"{u}}n and
                  Christian Schwartz and
                  Melanie Volkamer},
  title        = {Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {522--527},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1318-9},
  doi          = {10.1007/S11623-020-1318-9},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MayerBDSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MerkleRSB20,
  author       = {Johannes Merkle and
                  Christian Rathgeb and
                  Ulrich Scherhag and
                  Christoph Busch},
  title        = {Morphing-Angriffe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {38--42},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1219-y},
  doi          = {10.1007/S11623-019-1219-Y},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MerkleRSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester20,
  author       = {Britta Alexandra Mester},
  title        = {Datenschutz-Folgenabsch{\"{a}}tzung - Chance des Datenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {145},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1239-7},
  doi          = {10.1007/S11623-020-1239-7},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Mester20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Miller20,
  author       = {Felix Miller},
  title        = {Root-of-Trust-Architekturen als Open-Source-Hardware und deren Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {451--455},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1304-2},
  doi          = {10.1007/S11623-020-1304-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Miller20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NagelePS20,
  author       = {Peter N{\"{a}}gele and
                  Ronald Petrlic and
                  Frank Schemmel},
  title        = {Die Datenschutz-Folgenabsch{\"{a}}tzung in der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {719--728},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1356-3},
  doi          = {10.1007/S11623-020-1356-3},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/NagelePS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen20,
  author       = {Kim Nguyen},
  title        = {Vertrauen ist die Basis f{\"{u}}r Digitale Souver{\"{a}}nit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {221},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1253-9},
  doi          = {10.1007/S11623-020-1253-9},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen20a,
  author       = {Kim Nguyen},
  title        = {Der Lebenszyklus von Souver{\"{a}}nit{\"{a}}t und Vertrauen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {228--230},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1256-6},
  doi          = {10.1007/S11623-020-1256-6},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Niekrenz20,
  author       = {Elisabeth Niekrenz},
  title        = {E-Evidence-Verordnung: Datenzugriff durch Strafverfolgungbeh{\"{o}}rden
                  aus dem Ausland?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {535--536},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1320-2},
  doi          = {10.1007/S11623-020-1320-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Niekrenz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel20,
  author       = {Maurice Oettel},
  title        = {Smart Human und der Schutz der Gedanken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {386--389},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1289-x},
  doi          = {10.1007/S11623-020-1289-X},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Oettel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Oettel20a,
  author       = {Maurice Oettel},
  title        = {Datensparsame Daten{\"{u}}bertragbarkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {819--823},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1374-1},
  doi          = {10.1007/S11623-020-1374-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Oettel20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri20,
  author       = {Thomas Petri},
  title        = {Rechtsprechung zur {DSGVO} in den Jahren 2019 - 2020 - eine Auswahl},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {810--814},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1372-3},
  doi          = {10.1007/S11623-020-1372-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Petri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pollmann20,
  author       = {Maren Pollmann},
  title        = {Weltweites Vergessenwerden? Zur r{\"{a}}umlichen Reichweite des
                  Rechts auf Auslistung bei Suchmaschinen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {365--368},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1285-1},
  doi          = {10.1007/S11623-020-1285-1},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pollmann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PrietzRS20,
  author       = {Christian Prietz and
                  Martin Rost and
                  Julia Stoll},
  title        = {Pr{\"{u}}fverfahren zur datenschutzrechtlichen Zertifizierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {654--658},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1343-8},
  doi          = {10.1007/S11623-020-1343-8},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PrietzRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rathgeb20,
  author       = {Christian Rathgeb},
  title        = {Neue Herausforderungen f{\"{u}}r biometrische Technologien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1211-6},
  doi          = {10.1007/S11623-019-1211-6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Rathgeb20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20,
  author       = {Helmut Reimer},
  title        = {Der Unterschied},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {429},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1298-9},
  doi          = {10.1007/S11623-020-1298-9},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20a,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {485--491},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1310-4},
  doi          = {10.1007/S11623-020-1310-4},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20b,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {555--564},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1323-z},
  doi          = {10.1007/S11623-020-1323-Z},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer20c,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {700--708},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1352-7},
  doi          = {10.1007/S11623-020-1352-7},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW20,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {Datenschutz in Krisenzeiten oder Krise des Datenschutzes?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {684},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1350-9},
  doi          = {10.1007/S11623-020-1350-9},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reinhardt20,
  author       = {J{\"{o}}rn Reinhardt},
  title        = {, , Recht auf Vergessen" auf Franz{\"{o}}sisch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {361--364},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1284-2},
  doi          = {10.1007/S11623-020-1284-2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Reinhardt20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RiebeHDLRFR20,
  author       = {Thea Riebe and
                  Jasmin Haunschild and
                  Felix Divo and
                  Matthias Lang and
                  Gerbert Roitburd and
                  Jonas Franken and
                  Christian Reuter},
  title        = {Die Vorratsdatenspeicherung in Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {316--321},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1275-3},
  doi          = {10.1007/S11623-020-1275-3},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RiebeHDLRFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Roosendaal20,
  author       = {Arnold Roosendaal},
  title        = {DPIAs in practice - a strategic instrument for compliance},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {166--168},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1244-x},
  doi          = {10.1007/S11623-020-1244-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Roosendaal20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Evaluation nutzen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {281--283},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1267-3},
  doi          = {10.1007/S11623-020-1267-3},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20a,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Evaluation der Datenschutz-Grundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {287--292},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1269-1},
  doi          = {10.1007/S11623-020-1269-1},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel20b,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Smarte Pers{\"{o}}nliche Assistenten gestalten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {565--566},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1324-y},
  doi          = {10.1007/S11623-020-1324-Y},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RostW20,
  author       = {Martin Rost and
                  Sebastian Welke},
  title        = {{SDM} 2.0 und {ITIL} 4 , , verschr{\"{a}}nkt"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {258--262},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1263-7},
  doi          = {10.1007/S11623-020-1263-7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RostW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchieringMFMS20,
  author       = {Ina Schiering and
                  Britta Alexandra Mester and
                  Michael Friedewald and
                  Nicholas Martin},
  title        = {Datenschutz-Risiken partizipativ identifizieren und analysieren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {161--165},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1243-y},
  doi          = {10.1007/S11623-020-1243-Y},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchieringMFMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schlegel20,
  author       = {Daniela Schlegel},
  title        = {Vertrauenskrise in die digitale Welt?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {254--257},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1262-8},
  doi          = {10.1007/S11623-020-1262-8},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schlegel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schleipfer20,
  author       = {Stefan Schleipfer},
  title        = {Ende-zu-Ende-Verschl{\"{u}}sselung von E-Mails},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {748--749},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1360-7},
  doi          = {10.1007/S11623-020-1360-7},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Schleipfer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnebbe20,
  author       = {Maximilian Schnebbe},
  title        = {Digitale Assistenzsysteme in der Industrie und Produktion},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {398--400},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1292-2},
  doi          = {10.1007/S11623-020-1292-2},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnebbe20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchraheS20,
  author       = {Dominik Schrahe and
                  Thomas St{\"{a}}dter},
  title        = {Gesundheits-Apps auf Rezept und Forschung mit Gesundheitsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {713--718},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1355-4},
  doi          = {10.1007/S11623-020-1355-4},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SchraheS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulteW20,
  author       = {Laura Schulte and
                  Tim Wambach},
  title        = {Zielkonflikte zwischen Datenschutz und IT-Sicherheit im Kontext der
                  Aufkl{\"{a}}rung von Sicherheitsvorf{\"{a}}llen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {462--468},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1306-0},
  doi          = {10.1007/S11623-020-1306-0},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchulteW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz20,
  author       = {Sebastian Schulz},
  title        = {Die Evaluation der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {302--306},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1272-6},
  doi          = {10.1007/S11623-020-1272-6},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schulz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seiter20,
  author       = {Stefan R. Seiter},
  title        = {Wer bestimmt {\"{u}}ber uns?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {571},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1325-x},
  doi          = {10.1007/S11623-020-1325-X},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Seiter20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sleiman20,
  author       = {Mohamed Bou Sleiman},
  title        = {Das Corona-Virus - Ein Katalysator f{\"{u}}r Cyberkriminalit{\"{a}}t?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {806--809},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1371-4},
  doi          = {10.1007/S11623-020-1371-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Sleiman20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Smoltczyk20,
  author       = {Maja Smoltczyk},
  title        = {Nach "Schrems II": Europa braucht digitale Eigenst{\"{a}}ndigkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {572},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1326-9},
  doi          = {10.1007/S11623-020-1326-9},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Smoltczyk20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SowaR20,
  author       = {Aleksandra Sowa and
                  Martin Rost},
  title        = {Die {ISO} 27701 und das {SDM-V2} im Lichte der Umsetzung der {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {659--662},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1344-7},
  doi          = {10.1007/S11623-020-1344-7},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SowaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SpeithBEPP20,
  author       = {Julian Speith and
                  Steffen Becker and
                  Maik Ender and
                  Endres Puschner and
                  Christof Paar},
  title        = {Hardware-Trojaner},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {446--450},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1303-3},
  doi          = {10.1007/S11623-020-1303-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Streinz20,
  author       = {Rudolf Streinz},
  title        = {, , Recht auf Vergessenwerden" zwischen Unionsrecht und Verfassungsrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {353--360},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1283-3},
  doi          = {10.1007/S11623-020-1283-3},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Streinz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TamsS20,
  author       = {Benjamin Tams and
                  Michael Schwaiger},
  title        = {Die Bedeutung qualit{\"{a}}tsgesicherter biometrischer Daten
                  f{\"{u}}r das {EU} Einreise-/Ausreisesystem {(EES)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {23--25},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1216-1},
  doi          = {10.1007/S11623-019-1216-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TamsS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThielT20,
  author       = {Christoph Thiel and
                  Christian Thiel},
  title        = {Distributed Ledger Technologie {(DLT)} im Kontext europ{\"{a}}ischer
                  Vertrauensdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {250--253},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1261-9},
  doi          = {10.1007/S11623-020-1261-9},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ThielT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThiesDJRL020,
  author       = {Laura Friederike Thies and
                  Ernestine Dickhaut and
                  Andreas Janson and
                  Alexander Ro{\ss}nagel and
                  Jan Marco Leimeister and
                  Matthias S{\"{o}}llner},
  title        = {Die Simulationsstudie als Evaluationsmethode},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {589--593},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1330-0},
  doi          = {10.1007/S11623-020-1330-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ThiesDJRL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ThiesJK020,
  author       = {Laura Friederike Thies and
                  Silke Jandt and
                  Robin Knote and
                  Matthias S{\"{o}}llner},
  title        = {Konflikt{\"{a}}re Anforderungen an smarte pers{\"{o}}nliche
                  Assistenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {573--578},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1327-8},
  doi          = {10.1007/S11623-020-1327-8},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ThiesJK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld20,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Die Bedeutung von Informanten f{\"{u}}r Presse und Demokratie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {381--385},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1288-y},
  doi          = {10.1007/S11623-020-1288-Y},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB20,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Gundrechtliche Freiheiten in St{\"{o}}rf{\"{a}}llen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {345--346},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1280-6},
  doi          = {10.1007/S11623-020-1280-6},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TolsdorfBDFS20,
  author       = {Jan Tolsdorf and
                  Christian K. Bosse and
                  Aljoscha Dietrich and
                  Denis Feth and
                  Hartmut Schmitt},
  title        = {Privatheit am Arbeitsplatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {176--181},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1247-7},
  doi          = {10.1007/S11623-020-1247-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TolsdorfBDFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TonnissenT20,
  author       = {Stefan T{\"{o}}nnissen and
                  Frank Teuteberg},
  title        = {{DSGVO} und die Blockchain},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {322--327},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1276-2},
  doi          = {10.1007/S11623-020-1276-2},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TonnissenT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TwickelBB20,
  author       = {Arndt von Twickel and
                  Jennifer Breuer and
                  Ralph Breithaupt},
  title        = {Vereinbarkeit von Biometrieforschung und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {9--15},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1214-3},
  doi          = {10.1007/S11623-019-1214-3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/TwickelBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Uhl20,
  author       = {Andreas Uhl},
  title        = {Venen Biometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {16--22},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1215-2},
  doi          = {10.1007/S11623-019-1215-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Uhl20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ulmenstein20,
  author       = {Ulrich Freiherr von Ulmenstein},
  title        = {Datensouver{\"{a}}nit{\"{a}}t durch repr{\"{a}}sentative
                  Rechtswahrnehmung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {528--534},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1319-8},
  doi          = {10.1007/S11623-020-1319-8},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ulmenstein20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke-Caprarese20,
  author       = {Sven Venzke{-}Caprarese},
  title        = {Zur Praxistauglichkeit des Datenschutzes in der digitalen Kommunikation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {796--800},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1369-y},
  doi          = {10.1007/S11623-020-1369-Y},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke-Caprarese20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VogelgesangMS20,
  author       = {Stephanie Vogelgesang and
                  Frederik M{\"{o}}llers and
                  Tim Schneider},
  title        = {Strafrechtliche Relevanz von AdCloaking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {537--543},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1321-1},
  doi          = {10.1007/S11623-020-1321-1},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VogelgesangMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerH20,
  author       = {Melanie Volkamer and
                  Tobias Hilt},
  title        = {Sensibilisierung f{\"{u}}r Phishing und andere betr{\"{u}}gerische
                  Nachrichten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {121--125},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1234-z},
  doi          = {10.1007/S11623-020-1234-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VolkamerH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/VolkamerSB20,
  author       = {Melanie Volkamer and
                  Martina Angela Sasse and
                  Franziska Boehm},
  title        = {Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {8},
  pages        = {518--521},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1317-x},
  doi          = {10.1007/S11623-020-1317-X},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/VolkamerSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner20,
  author       = {Manuela Wagner},
  title        = {IT-Sicherheitsforschung in rechtlicher Grauzone},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {111--120},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1233-0},
  doi          = {10.1007/S11623-020-1233-0},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener20,
  author       = {Christoph Wegener},
  title        = {Papier ist geduldig},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {10},
  pages        = {637},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1338-5},
  doi          = {10.1007/S11623-020-1338-5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert20,
  author       = {Thilo Weichert},
  title        = {Die DSGVO, ein - ganz guter - Anfang},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {293--296},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1270-8},
  doi          = {10.1007/S11623-020-1270-8},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weik20,
  author       = {Ramona Weik},
  title        = {Die Datenkopie nach Artikel 15 Abs. 3 {DS-GVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {98--103},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1231-2},
  doi          = {10.1007/S11623-020-1231-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Weik20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeikD20,
  author       = {Ramona Weik and
                  Andreas Diehl},
  title        = {Die Beantwortung von Auskunftsersuchen nach Art. 15 {DSGVO}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {729--734},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1357-2},
  doi          = {10.1007/S11623-020-1357-2},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeikD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Will20,
  author       = {Michael Will},
  title        = {Brauchen wir eine Zentralisierung der Datenschutzaufsicht?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {369--374},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1286-0},
  doi          = {10.1007/S11623-020-1286-0},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Will20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20,
  title        = {Trickkiste Biometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {5},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1212-5},
  doi          = {10.1007/S11623-019-1212-5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20a,
  title        = {{DSK:} Standard-Datenschutzmodell {V2}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {6--8},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1213-4},
  doi          = {10.1007/S11623-019-1213-4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20aa,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {764--772},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1363-4},
  doi          = {10.1007/S11623-020-1363-4},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ab,
  title        = {Bewertung der {DSK} zu MS-Office 365: Nachbesserungen geboten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {778},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1365-2},
  doi          = {10.1007/S11623-020-1365-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ac,
  title        = {Cyber-Sicherheitsstrategie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {824},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1375-0},
  doi          = {10.1007/S11623-020-1375-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ad,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {825--834},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1376-z},
  doi          = {10.1007/S11623-020-1376-Z},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20ae,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {835--841},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1377-y},
  doi          = {10.1007/S11623-020-1377-Y},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20af,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {12},
  pages        = {841--844},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1378-x},
  doi          = {10.1007/S11623-020-1378-X},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20b,
  title        = {98. {DSK} Trier, 06. - 07. November 2019, Entschlie{\ss}ungen und
                  Empfehlungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {58--60},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1223-2},
  doi          = {10.1007/S11623-019-1223-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20c,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {61--71},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1224-1},
  doi          = {10.1007/S11623-019-1224-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20d,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {72--77},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1225-0},
  doi          = {10.1007/S11623-019-1225-0},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20e,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {1},
  pages        = {77--80},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-019-1226-z},
  doi          = {10.1007/S11623-019-1226-Z},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20f,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {128--133},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1236-x},
  doi          = {10.1007/S11623-020-1236-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20g,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {134--140},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1237-9},
  doi          = {10.1007/S11623-020-1237-9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20h,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {2},
  pages        = {141--144},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1238-8},
  doi          = {10.1007/S11623-020-1238-8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20i,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {199--211},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1251-y},
  doi          = {10.1007/S11623-020-1251-Y},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20j,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {3},
  pages        = {212--220},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1252-x},
  doi          = {10.1007/S11623-020-1252-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20k,
  title        = {Vorsicht - Glatteis!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {225},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1254-8},
  doi          = {10.1007/S11623-020-1254-8},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20l,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {266--271},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1265-5},
  doi          = {10.1007/S11623-020-1265-5},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20m,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {4},
  pages        = {272--280},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1266-4},
  doi          = {10.1007/S11623-020-1266-4},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20n,
  title        = {Datenschutzrechtliche Informationen im Zusammenhang mit der Corona-Pandemie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {286},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1268-2},
  doi          = {10.1007/S11623-020-1268-2},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20o,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {328--334},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1277-1},
  doi          = {10.1007/S11623-020-1277-1},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20p,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {335--340},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1278-0},
  doi          = {10.1007/S11623-020-1278-0},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20q,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {5},
  pages        = {341--344},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1279-z},
  doi          = {10.1007/S11623-020-1279-Z},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20r,
  title        = {K{\"{u}}ndigung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {401},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1293-1},
  doi          = {10.1007/S11623-020-1293-1},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20s,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {402--412},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1294-0},
  doi          = {10.1007/S11623-020-1294-0},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20t,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {413--421},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1295-z},
  doi          = {10.1007/S11623-020-1295-Z},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20u,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {6},
  pages        = {421--424},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1296-y},
  doi          = {10.1007/S11623-020-1296-Y},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20v,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {617--625},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1335-8},
  doi          = {10.1007/S11623-020-1335-8},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20w,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {626--632},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1336-7},
  doi          = {10.1007/S11623-020-1336-7},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20x,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {9},
  pages        = {632--636},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1337-6},
  doi          = {10.1007/S11623-020-1337-6},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X20x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20y,
  title        = {Registermodernisierung verfassungskonform umsetzen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {712},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1354-5},
  doi          = {10.1007/S11623-020-1354-5},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X20z,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {755--763},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1362-5},
  doi          = {10.1007/S11623-020-1362-5},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/X20z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics