{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T16:32:49Z","timestamp":1658507569353},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11623-013-0111-4","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T04:25:11Z","timestamp":1367468711000},"page":"295-300","source":"Crossref","is-referenced-by-count":6,"title":["Datenschutzmanagementsystem"],"prefix":"10.1007","volume":"37","author":[{"given":"Martin","family":"Rost","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"111_CR1","first-page":"425","volume-title":"Datenschutz-Schutzziele im Recht \u2014 Zum normativen Gehalt der Datenschutz-Schutzziele","author":"Bock \/ Meissner","year":"2012","unstructured":"Bock \/ Meissner, 2012: Datenschutz-Schutzziele im Recht \u2014 Zum normativen Gehalt der Datenschutz-Schutzziele; in: DuD 2012\/06: 425\u2013431."},{"key":"111_CR2","unstructured":"BSI-ISOGS, o.J.: ISO 27001-Zertifi zierung auf der Basis von IT-Grundschutz (verf\u00fcgbar im Internet)"},{"key":"111_CR3","volume-title":"Richtsnoeren beveiliging van persoonsgegevens","author":"CBP","year":"2013","unstructured":"CBP 2013: Richtsnoeren beveiliging van persoonsgegevens, \n                    http:\/\/www.cbpweb.nl\/downloads_rs\/rs_2013_richtsnoeren-beveiliging-persoonsgegevens.pdf\n                    \n                  , English-Summary: \n                    http:\/\/www.newsletter-nautadutilh.com\/downloads\/Privacy\/summary_guidelines_ENG.PDF\n                    \n                  ."},{"key":"111_CR4","volume-title":"A terminology for talking about privacy by data minimization: Anonymity","author":"M Hansen","year":"2010","unstructured":"Hansen, Marit \/ Pfitzmann, Andreas, 2010: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetec-tability, Unobservability, Pseudony-mity, and Identity Management, (v0.34) (verf\u00fcgbar im Internet)."},{"key":"111_CR5","unstructured":"ISO 27001, o.J.: Beuth-Verlag, \n                    http:\/\/www.beuth.de\/\n                    \n                  ."},{"key":"111_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-8165-6","volume-title":"IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz, Der Weg zur Zertifizierung","author":"H Kersten","year":"2011","unstructured":"Kersten, Heinrich; Reuter, J\u00fcrgen; Schr\u00f6der, Klaus-Werner, 2011: IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz, Der Weg zur Zertifizierung, 3. Auflage, Viewg+Teubner Verlag \/ Springer Fachmedien Wiesbaden.","edition":"3. Auflage"},{"key":"111_CR7","volume-title":"Datenschutzmanagement, WRS-Verlag","year":"2006","unstructured":"Kongehl, Gerhard (Hrsg.), 2006: Datenschutzmanagement, WRS-Verlag."},{"key":"111_CR8","volume-title":"Datenschutzmanagement-Standard","author":"Looman \/ Matz","year":"2010","unstructured":"Looman \/ Matz 2010: Datenschutzmanagement-Standard (verf\u00fcgbar im Internet)"},{"key":"111_CR9","first-page":"13","volume-title":"Datenschutz nach BSI-Grundschutz?","author":"M Meints","year":"2006","unstructured":"Meints, Martin, 2006: Datenschutz nach BSI-Grundschutz? in: DuD 2006\/10: 13\u201316."},{"key":"111_CR10","first-page":"91","volume-title":"Datenschutz durch Prozesse","author":"M Meints","year":"2007","unstructured":"Meints, Martin, 2007: Datenschutz durch Prozesse; in: DuD 2007\/02: 91\u201395."},{"key":"111_CR11","volume-title":"Kausalit\u00e4ten, Korrelationen und Datenschutzrecht","author":"J Pohle","year":"2013","unstructured":"Pohle, J\u00f6rg, 2013: Kausalit\u00e4ten, Korrelationen und Datenschutzrecht. Beitrag zum Workshop \u201eFundationes I: Geschichte und Theorie des Datenschutzes\u201c, im Erscheinen. \n                    http:\/\/waste.informatik.hu-berlin.de\/~pohle\/papers\/korrelationen_20130203.pdf\n                    \n                  ."},{"key":"111_CR12","first-page":"14","volume-title":"Musterprozesse zum Datenschutzmanagement","author":"C Prietz","year":"2012","unstructured":"Prietz, Christian, 2012: Musterprozesse zum Datenschutzmanagement, in: DuD 2012\/01: 14\u201319."},{"key":"111_CR13","first-page":"439","volume-title":"Generische Schutzma\u00dfnahmen f\u00fcr Datenschutz-Schutzziele","author":"T Probst","year":"2012","unstructured":"Probst, Thomas, 2012: Generische Schutzma\u00dfnahmen f\u00fcr Datenschutz-Schutzziele; in: DuD 2012\/06: 439\u2013444."},{"key":"111_CR14","first-page":"832","volume-title":"Anforderungen an ein Datenschutzmanagementsystem \u2014 Aufbau und Zertifizierung","author":"G Quiring-Kock","year":"2012","unstructured":"Quiring-Kock, Gisela, 2012: Anforderungen an ein Datenschutzmanagementsystem \u2014 Aufbau und Zertifizierung; in: DuD 2012\/11: 832\u2013836."},{"key":"111_CR15","first-page":"433","volume-title":"Standardisierte Datenschutzmodellierung","author":"M Rost","year":"2012","unstructured":"Rost, Martin, 2012: Standardisierte Datenschutzmodellierung; in: DuD 2012\/06: 433\u2013438."},{"key":"111_CR16","volume-title":"Eine kleine Geschichte des Pr\u00fcfens, Beitrag f\u00fcr den BSI-Sicherheitskongress 2013","author":"M Rost","year":"2013","unstructured":"Rost, Martin, 2013: Eine kleine Geschichte des Pr\u00fcfens, Beitrag f\u00fcr den BSI-Sicherheitskongress 2013 (Konferenzband ist im Erscheinen)."},{"key":"111_CR17","volume-title":"Informationen f\u00fcr die schleswig-holsteinische Wirtschaft: Betriebliches Datenschutzmanagement nach dem BDSG (verf\u00fcgbar im Internet)","author":"ULD","year":"2002","unstructured":"ULD, 2002: Informationen f\u00fcr die schleswig-holsteinische Wirtschaft: Betriebliches Datenschutzmanagement nach dem BDSG (verf\u00fcgbar im Internet)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0111-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0111-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0111-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0111-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:35Z","timestamp":1559398955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0111-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["111"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0111-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5]]}}}