{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T07:32:04Z","timestamp":1670571124314},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T00:00:00Z","timestamp":1514505600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11623-018-0883-7","type":"journal-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T09:36:40Z","timestamp":1514453800000},"page":"13-17","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Die Ordnung der Schutzziele"],"prefix":"10.1007","volume":"42","author":[{"given":"Martin","family":"Rost","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,29]]},"reference":[{"key":"883_CR1","doi-asserted-by":"crossref","unstructured":"Apelt, Maja \/ Tacke, Veronika (Hrsg.): Handbuch Organisationstypen, Wiesbaden, VS Verlag f\u00fcr Sozialwissenschaften","DOI":"10.1007\/978-3-531-93312-2"},{"key":"883_CR2","unstructured":"BverfG, 2008: Urteil vom 27. Februar 2008 zum \u201eGrundrecht auf Gew\u00e4hrleistung der Vertraulichkeit und Integrit\u00e4t informationstechnischer Systeme\u201c, Az. 1 BvR 595\/07, 1 BvR 370\/07, https:\/\/openjur. de\/u\/59199.html"},{"key":"883_CR3","unstructured":"CNIL, 2012: Measures for the privacy risk treatment, https:\/\/www.cnil.fr\/sites\/default\/files\/typo\/document\/ CNIL-PIA-3-GoodPractices.pdf"},{"key":"883_CR4","volume-title":"Grundrechtsinnovationen","author":"G Hornung","year":"2014","unstructured":"Hornung, Gerrit, 2014: Grundrechtsinnovationen, T\u00fcbingen, Mohr Siebeck"},{"key":"883_CR5","unstructured":"Kloepfer, Michael 2015: Seminar \u201eNeue Grundrechte\u2013Analyse und Vorschl\u00e4ge\u201c, http:\/\/kloepfer.rewi.huberlin."},{"key":"883_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-322-97093-0","volume-title":"Organisation und Entscheidung","author":"N Luhmann","year":"2000","unstructured":"Luhmann, Niklas 2000: Organisation und Entscheidung, Opladen\/Wiesbaden, Westdeutscher Verlag"},{"key":"883_CR7","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/s11623-009-0072-9","volume":"6","author":"M Rost","year":"2009","unstructured":"Rost, Martin; Pfitzmann, Andreas, 2009: Datenschutz-Schutzziele\u2013revisited; in: DuD\u2013Datenschutz und Datensicherheit, 33. Jahrgang, Heft 6: 353\u2013358","journal-title":"DuD\u2013Datenschutz und Datensicherheit, 33. Jahrgang, Heft"},{"key":"883_CR8","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s11623-012-0153-z","volume":"6","author":"M Rost","year":"2012","unstructured":"Rost, Martin, 2012: Standardisierte Datenschutzmodellierung; in: DuD\u2013Datenschutz und Datensicherheit, 36. Jahrgang, Heft 6: 433\u2013438","journal-title":"DuD\u2013Datenschutz und Datensicherheit, 36. Jahrgang, Heft"},{"key":"883_CR9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s11623-013-0023-3","volume":"2","author":"M Rost","year":"2013","unstructured":"Rost, Martin, 2013: Zur Soziologie des Datenschutzes; in: DuD\u2013Datenschutz und Datensicherheit, 37. Jahrgang, Heft 2: 85\u201391","journal-title":"DuD\u2013Datenschutz und Datensicherheit, 37. Jahrgang, Heft"},{"key":"883_CR10","first-page":"23","volume-title":"Sowa, Aleksandra, 2017: IT-Pr\u00fcfung, Sicherheitsaudit und Datenschutzmodell: Neue Ans\u00e4tze f\u00fcr die IT-Revision, 1. Auflage, Springer Vieweg, S.","author":"M Rost","year":"2017","unstructured":"Rost, Martin, 2017: Organisationen grundrechtskonform mit dem Standard-Datenschutzmodell gestalten, in: Sowa, Aleksandra, 2017: IT-Pr\u00fcfung, Sicherheitsaudit und Datenschutzmodell: Neue Ans\u00e4tze f\u00fcr die IT-Revision, 1. Auflage, Springer Vieweg, S. 23\u201356"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0883-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0883-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0883-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T09:36:56Z","timestamp":1514453816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0883-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,29]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["883"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0883-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,29]]}}}