{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T19:15:07Z","timestamp":1776366907063,"version":"3.51.2"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T00:00:00Z","timestamp":1530230400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11623-018-0976-3","type":"journal-article","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T08:37:23Z","timestamp":1530261443000},"page":"442-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Resilienz \u2013 eine neue Anforderung aus der Datenschutz-Grundverordnung"],"prefix":"10.1007","volume":"42","author":[{"given":"Susan","family":"Gonscherowski","sequence":"first","affiliation":[]},{"given":"Marit","family":"Hansen","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Rost","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,29]]},"reference":[{"key":"976_CR1","first-page":"94","volume-title":"Runaround, in Astounding Science-Fiction, M\u00e4rz 1942","author":"Asimov","year":"1942","unstructured":"Asimov, (1942): Runaround, in Astounding Science-Fiction, M\u00e4rz 1942, 94\u2013103."},{"key":"976_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073286","volume-title":"Resilience is More than Availability","author":"Bishop","year":"2011","unstructured":"Bishop et al., (2011): Resilience is More than Availability, in Proc. 2011 New Security Paradigms Workshop."},{"issue":"1","key":"976_CR3","first-page":"30","volume":"42","author":"Bock\/Robrahn","year":"2018","unstructured":"Bock\/Robrahn, (2018): Schutzziele als Optimierungsgebote, in DuD 42(1), 30\u201335.","journal-title":"in DuD"},{"key":"976_CR4","first-page":"57","volume-title":"IEEE Computer 26 (12\/1993), 53\u201361, und 27 (1\/1994)","author":"Clarke, 1993\/","year":"1994","unstructured":"Clarke, 1993\/(1994): Asimov\u2019s Laws of Robotics\u2013Implications for Information Technology, IEEE Computer 26 (12\/1993), 53\u201361, und 27 (1\/1994), 57\u201366."},{"key":"976_CR5","first-page":"187","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"Dobson\/Randell","year":"1986","unstructured":"Dobson\/Randell, (1986): Building Reliable Secure Computing Systems out of Unreliable Insecure Components, in Proc. IEEE Symposium on Security and Privacy, 187\u2013193."},{"key":"976_CR6","volume-title":"Ontology and taxonomies of resilience, V1.0","author":"ENISA","year":"2011","unstructured":"ENISA, (2011): Ontology and taxonomies of resilience, V1.0."},{"key":"976_CR7","volume-title":"Datenschutzrecht: DSGVO mit BDSG (im Erscheinen)","author":"Hansen in Simitis\/Hornung\/Spiecker gen. D\u00f6hmann","year":"2018","unstructured":"Hansen in Simitis\/Hornung\/Spiecker gen. D\u00f6hmann, (2018): Datenschutzrecht: DSGVO mit BDSG (im Erscheinen)."},{"key":"976_CR8","unstructured":"Hjadjk in Ehmann\/Selmayr: Datenschutz-Grundverordnung: DS-GVO, 1. Auflage, M\u00fcnchen 2017."},{"key":"976_CR9","volume-title":"The Three Lines of Defense in effective Risk Management and Control","author":"IIA The Institute of Internal Auditors","year":"2013","unstructured":"IIA (The Institute of Internal Auditors), (2013): The Three Lines of Defense in effective Risk Management and Control. Position Paper, Januar 2013, \n                    https:\/\/www.theiia.org\/3-Lines-Defense."},{"key":"976_CR10","unstructured":"Jandt in K\u00fchling\/Buchner: Datenschutz-Grundverordnung, 1. Auflage, M\u00fcnchen 2017."},{"key":"976_CR11","unstructured":"Jergl in Gierschmann et al.: Kommentar Datenschutzgrundverordnung, K\u00f6ln 2018."},{"key":"976_CR12","volume-title":"Towards a Conceptual Framework for Resilience Engineering","author":"Madni\/Jackson","year":"2009","unstructured":"Madni\/Jackson, (2009): Towards a Conceptual Framework for Resilience Engineering, in IEEE Systems Journal Vol. 3 Issue 2."},{"key":"976_CR13","unstructured":"Martini in Paal\/Pauly: Datenschutz-Grundverordnung, 2. Auflage, M\u00fcnchen 2018."},{"key":"976_CR14","volume-title":"24th ACM Conference on Computer and Communications Security","author":"Mavroudis","year":"2017","unstructured":"Mavroudis et al., (2017): A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components, in 24th ACM Conference on Computer and Communications Security, 1583\u20131600."},{"key":"976_CR15","unstructured":"Piltz in Gola: Datenschutz-Grundverordnung VO (EU) 2016\/679: DS-GVO, 1. Auflage, M\u00fcnchen 2017."},{"key":"976_CR16","volume-title":"Ziele und Anforderungen","author":"Rost\/Bock","year":"2011","unstructured":"Rost\/Bock, (2011): Privacy By Design und die Neuen Schutzziele\u2013Grunds\u00e4tze, Ziele und Anforderungen, in DuD (42)1, 30\u201335."},{"key":"976_CR17","volume-title":"Zur Konditionierung von Technik und Recht mittels Schutzzielen, in Horbach (Hrsg.), (2013): Informatik 2013\u2013Informatik angepasst an Mensch","author":"Rost\/Storf","year":"2013","unstructured":"Rost\/Storf, (2013): Zur Konditionierung von Technik und Recht mittels Schutzzielen, in Horbach (Hrsg.), (2013): Informatik 2013\u2013Informatik angepasst an Mensch, Organisation und Umwelt, LNI, Vol P-220, 2149\u20132166."},{"key":"976_CR18","first-page":"13","volume-title":"Die Ordnung der Schutzziele","author":"Rost","year":"2018","unstructured":"Rost, (2018): Die Ordnung der Schutzziele, in DuD (42)1, 13\u201318."},{"key":"976_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"11","author":"Shamir","year":"1979","unstructured":"Shamir, (1979): How to Share a Secret, Comm. ACM 22, 11, 612\u2013613.","journal-title":"Comm. ACM 22"},{"key":"976_CR20","volume-title":"Resilienz By Design, Strategien f\u00fcr die technologischen Zukunftsthemen","author":"Thoma","year":"2014","unstructured":"Thoma, (2014): Resilienz By Design, Strategien f\u00fcr die technologischen Zukunftsthemen, acatech-Studien, April 2014."},{"issue":"4","key":"976_CR21","first-page":"300","volume":"43","author":"Wieland\/Wallenburg","year":"2013","unstructured":"Wieland\/Wallenburg, (2013): The influence of relational competencies on supply chain resilience: a relational view. International Journal of Physical Distribution & Logistics Management, Vol. 43 No. 4, 300\u2013320.","journal-title":"The influence of relational competencies on supply chain resilience: a relational view. International Journal of Physical Distribution & Logistics Management"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0976-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0976-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0976-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T19:17:19Z","timestamp":1561749439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0976-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,29]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["976"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0976-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,29]]},"assertion":[{"value":"29 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}