{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T21:10:12Z","timestamp":1720473012826},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T00:00:00Z","timestamp":1532995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11623-018-0988-z","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T17:09:11Z","timestamp":1533056951000},"page":"502-509","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anonymisierungstechniken und das Datenschutzrecht"],"prefix":"10.1007","volume":"42","author":[{"given":"Julian","family":"H\u00f6lzel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,31]]},"reference":[{"key":"988_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-Preserving Data Mining","author":"C. C. Aggarwal","year":"2008","unstructured":"Aggarwal, C. C., & Yu, P. S. (Hrsg.). (2008). Privacy-Preserving Data Mining. Springer US. https:\/\/doi.org\/10.1007\/978-0-387-70992-5"},{"key":"988_CR2","volume-title":"Stellungnahme 5\/2014 zu Anonymisierungstechniken","author":"Artikel-29-Datenschutzgruppe.","year":"2014","unstructured":"Artikel-29-Datenschutzgruppe. (2014). Stellungnahme 5\/2014 zu Anonymisierungstechniken (No. WP216)."},{"key":"988_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8274-2247-7","volume-title":"Lehrbuch der Softwaretechnik: Basiskonzepte und Requirements Engineering","author":"H. Balzert","year":"2009","unstructured":"Balzert, H. (2009). Lehrbuch der Softwaretechnik: Basiskonzepte und Requirements Engineering. Heidelberg: Spektrum Akademischer Verlag. https:\/\/doi.org\/10.1007\/978-3-8274-2247-7"},{"key":"988_CR4","first-page":"205","volume-title":"Zeitschrift f\u00fcr Datenschutz","author":"S. Brink","year":"2015","unstructured":"Brink, S., & Eckhardt, J. (2015). Wann ist ein Datum ein personenbezogenes Datum? Zeitschrift f\u00fcr Datenschutz, 205\u2013212."},{"key":"988_CR5","first-page":"63","volume":"8","author":"H. Burkert","year":"1979","unstructured":"Burkert, H. (1979). Die Eingrenzung des Zusatzwissens als Rettung der Anonymisierung. Datenverarbeitung im Recht, 8, 63\u201373.","journal-title":"Datenverarbeitung im Recht"},{"key":"988_CR6","doi-asserted-by":"publisher","DOI":"10.21832\/9781853599552","volume-title":"Translating Law","author":"D. Cao","year":"2007","unstructured":"Cao, D. (2007). Translating Law. Clevedon; Buffalo: Multilingual Matters."},{"issue":"1","key":"988_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/320434.320440","volume":"1","author":"P. P.-S. Chen","year":"1976","unstructured":"Chen, P. P.-S. (1976). The Entity-Relationship Model\u2013Toward a Unified View of Data. ACM Transactions on Database Systems, 1(1), 9\u201336. https:\/\/doi.org\/10.1145\/320434.320440","journal-title":"ACM Transactions on Database Systems"},{"issue":"429\u2013444","key":"988_CR8","first-page":"2","volume":"15","author":"T. Dalenius","year":"1977","unstructured":"Dalenius, T. (1977). Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15(429\u2013444), 2\u20131.","journal-title":"Statistik Tidskrift"},{"key":"988_CR9","volume-title":"Datenbanken und Datenschutz","author":"U. Dammann","year":"1973","unstructured":"Dammann, U., Karhausen, M., M\u00fcller, P., & Steinm\u00fcller, W. (1973). Datenbanken und Datenschutz. Frankfurt & New York: Herder & Herder."},{"key":"988_CR10","first-page":"1912","volume-title":"Non-Perturbative Masking Methods","author":"J. Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer, J. (2009). Non-Perturbative Masking Methods. In L. Liu & M. T. \u00d6szu (Hrsg.), Encyclopedia of Database Systems (S. 1912\u20131913). Boston, MA: Springer US. https:\/\/doi.org\/10.1007\/978-0-387-39940-9_1500"},{"key":"988_CR11","doi-asserted-by":"publisher","first-page":"990","DOI":"10.1109\/ARES.2008.97","volume-title":"A critique of k-anonymity and some of its enhancements. In Availability, Reliability and Security, 2008. ARES 08. Third International Conference on","author":"J. Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J., & Torra, V. (2008). A critique of k-anonymity and some of its enhancements. In Availability, Reliability and Security, 2008. ARES 08. Third International Conference on (S. 990\u2013993). IEEE."},{"key":"988_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7802-8","volume-title":"Statistical Confidentiality: Principles and Practice","author":"G. Duncan","year":"2011","unstructured":"Duncan, G., Elliot, M., & Salazar-Gonz\u00e1lez, J.-J. (2011). Statistical Confidentiality: Principles and Practice. New York, NY: Springer."},{"issue":"2","key":"988_CR13","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1080\/07350015.1989.10509729","volume":"7","author":"G. Duncan","year":"1989","unstructured":"Duncan, G., & Lambert, D. (1989). The risk of disclosure for microdata. Journal of Business & Economic Statistics, 7(2), 207\u2013217.","journal-title":"Journal of Business & Economic Statistics"},{"issue":"393","key":"988_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1080\/01621459.1986.10478229","volume":"81","author":"G. T. Duncan","year":"1986","unstructured":"Duncan, G. T., & Lambert, D. (1986). Disclosure-Limited Data Dissemination. Journal of the American Statistical Association, 81(393), 10\u201318. https:\/\/doi.org\/10.1080\/01621459.1986.10478229","journal-title":"Journal of the American Statistical Association"},{"key":"988_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1","volume-title":"Differential Privacy","author":"C. Dwork","year":"2006","unstructured":"Dwork, C. (2006). Differential Privacy. In Automata, Languages and Programming (S. 1\u201312). Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"988_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78478-4_1","volume-title":"An Ad Omnia Approach to Defining and Achieving Private Data Analysis","author":"C. Dwork","year":"2008","unstructured":"Dwork, C. (2008a). An Ad Omnia Approach to Defining and Achieving Private Data Analysis. In F. Bonchi, E. Ferrari, B. Malin, & Y. Saygin (Hrsg.), Privacy, Security, and Trust in KDD (Bd. 4890, S. 1\u201313). Berlin, Heidelberg: Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-78478-4_1"},{"key":"988_CR17","volume-title":"Differential Privacy: A Survey of Results","author":"C. Dwork","year":"2008","unstructured":"Dwork, C. (2008b). Differential Privacy: A Survey of Results. In M. Agrawal, D. Du, Z. Duan, & A. Li (Hrsg.), Theory and Applications of Models of Computation (Bd. 4978, S. 1\u201319). Berlin, Heidelberg: Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-79228-4_18"},{"key":"988_CR18","volume-title":"Communications of the ACM","author":"C. Dwork","year":"2011","unstructured":"Dwork, C. (2011). A firm foundation for private data analysis. Communications of the ACM, 54(1), 86. https:\/\/doi.org\/10.1145\/1866739.1866758"},{"key":"988_CR19","volume-title":"Protection of Privacy through Microaggregation","author":"E. L. Feige","year":"1970","unstructured":"Feige, E. L., & Watts, H. W. (1970). Protection of Privacy through Microaggregation. In R. L. Bisco (Hrsg.), Data Bases, Computers and the Social Sciences (S. 261\u2013272). New York: John Wiley & Sons."},{"key":"988_CR20","volume-title":"Introduction to privacy-preserving data publishing: concepts and techniques","author":"B. C. M. Fung","year":"2011","unstructured":"Fung, B. C. M., Wang, K., Fu, A. W.-C., & Yu, P. S. (2011). Introduction to privacy-preserving data publishing: concepts and techniques. Boca Raton: Chapman & Hall\/CRC."},{"key":"988_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15635-9","volume-title":"Statistik in Deutschland: 100 Jahre Deutsche Statistische Gesellschaft","author":"H. Grohmann","year":"2011","unstructured":"Grohmann, H., Kr\u00e4mer, W., & Steger, A. (2011). Statistik in Deutschland: 100 Jahre Deutsche Statistische Gesellschaft. Berlin Heidelberg: Springer-Verlag."},{"key":"988_CR22","first-page":"579","volume-title":"On the Ontology of Digital Identification","author":"G. Hogben","year":"2003","unstructured":"Hogben, G., Wilikens, M., & Vakalis, I. (2003). On the Ontology of Digital Identification. In On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3\u20137, 2003, Proceedings (S. 579\u2013593). https:\/\/doi.org\/10.1007\/978-3-540-39962-9_62"},{"key":"988_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-531-18929-1_9","volume-title":"Datenzugang und Datenschutz","author":"D. Huschka","year":"2013","unstructured":"Huschka, D., & Wagner, G. G. (2013). Datenzugang und Datenschutz. In S. Mau & N. M. Sch\u00f6neck (Hrsg.), Handw\u00f6rterbuch zur Gesellschaft Deutschlands (S. 144\u2013157). Wiesbaden: Springer Fachmedien Wiesbaden. https:\/\/doi.org\/10.1007\/978-3-531-18929-1_9"},{"key":"988_CR24","volume-title":"Datenschutz-Grundverordnung\u2013Kommentar","author":"J. K\u00fchling","year":"2017","unstructured":"K\u00fchling, J., & Buchner, B. (2017). Datenschutz-Grundverordnung\u2013Kommentar. M\u00fcnchen: C.H. Beck."},{"issue":"2","key":"988_CR25","first-page":"313","volume":"9","author":"D. Lambert","year":"1993","unstructured":"Lambert, D. (1993). Measures of disclosure risk and harm. Journal of Official Statistics, 9(2), 313.","journal-title":"Journal of Official Statistics"},{"key":"988_CR26","volume-title":"t-Closeness: Privacy Beyond k-Anonymity and l-Diversity","author":"N. Li","year":"2007","unstructured":"Li, N., Li, T., & Venkatasubramanian, S. (2007). t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In 2007 IEEE 23rd International Conference on Data Engineering. IEEE. https:\/\/doi.org\/10.1109\/icde.2007.367856"},{"key":"988_CR27","volume-title":"Encyclopedia of Database Systems","author":"L. Liu","year":"2012","unstructured":"Liu, L., & \u00d6zsu, M. T. (2012). Encyclopedia of Database Systems. USA: Springer US."},{"key":"988_CR28","volume-title":"Das Recht der Gesellschaft (1. Auflage)","author":"N. Luhmann","year":"1995","unstructured":"Luhmann, N. (1995). Das Recht der Gesellschaft (1. Auflage). Frankfurt am Main: Suhrkamp."},{"key":"988_CR29","volume-title":"Einf\u00fchrung in die Systemtheorie. (D. Baecker, Hrsg.) (2. Auflage)","author":"N. Luhmann","year":"2004","unstructured":"Luhmann, N. (2004). Einf\u00fchrung in die Systemtheorie. (D. Baecker, Hrsg.) (2. Auflage). Heidelberg: Carl-Auer-Systeme Verlag."},{"issue":"1","key":"988_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). L-diversity. ACM Transactions on Knowledge Discovery from Data, 1(1), 1\u201352. https:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"988_CR31","first-page":"20160118","volume-title":"Physical and Engineering Sciences","author":"D. K. Mulligan","year":"2016","unstructured":"Mulligan, D. K., Koopman, C., & Doty, N. (2016). Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160118. https:\/\/doi.org\/10.1098\/rsta.2016.0118"},{"key":"988_CR32","first-page":"954","volume-title":"Science","author":"H. B. Newcombe","year":"1959","unstructured":"Newcombe, H. B., Kennedy, J. M., Axford, S. J., & James, A. P. (1959). Automatic Linkage of Vital Records: Computers can be used to extract \u201efollow-up\u201c statistics of families from files of routine records. Science, 130(3381), 954\u2013959. https:\/\/doi.org\/10.1126\/science.130.3381.954"},{"issue":"4","key":"988_CR33","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1080\/07350015.1988.10509697","volume":"6","author":"G. Paa\u00df","year":"1988","unstructured":"Paa\u00df, G. (1988). Disclosure risk and disclosure avoidance for microdata. Journal of Business & Economic Statistics, 6(4), 487\u2013500.","journal-title":"Journal of Business & Economic Statistics"},{"key":"988_CR34","volume-title":"Datenzugang, Datenschutz und Anonymisierung","author":"G. Paa\u00df","year":"1985","unstructured":"Paa\u00df, G., & Wauschkuhn, U. (1985). Datenzugang, Datenschutz und Anonymisierung. M\u00fcnchen-Wien: Oldenbourg."},{"key":"988_CR35","volume-title":"Datenschutz und Technikgestaltung (PhD Thesis)","author":"J. Pohle","year":"2018","unstructured":"Pohle, J. (2018). Datenschutz und Technikgestaltung (PhD Thesis). Humboldt-Universit\u00e4t zu Berlin, Mathematisch-Naturwissenschaftliche Fakult\u00e4t. https:\/\/doi.org\/10.18452\/19136"},{"key":"988_CR36","first-page":"38","volume-title":"The Concept of Fact in Legal Science. In P. Nerhot (Hrsg.)","author":"F. Rigaux","year":"1990","unstructured":"Rigaux, F. (1990). The Concept of Fact in Legal Science. In P. Nerhot (Hrsg.), Law, Interpretation and Reality (S. 38\u201349). Dordrecht: Springer Netherlands. https:\/\/doi.org\/10.1007\/978-94-015-7875-2_4"},{"key":"988_CR37","volume-title":"Handbuch zur Anonymisierung wirtschaftsstatistischer Mikrodaten (Bd. 4)","author":"G. Ronning","year":"2005","unstructured":"Ronning, G., Sturm, R., H\u00f6hne, J., Lenz, R., Rosemann, M., Scheffler, M., & Vorgrimler, D. (2005). Handbuch zur Anonymisierung wirtschaftsstatistischer Mikrodaten (Bd. 4). Wiesbaden: Statistisches Bundesamt (zit.: Statistisches Bundesamt 2005)."},{"issue":"2","key":"988_CR38","first-page":"703","volume":"91","author":"I. S. Rubinstein","year":"2016","unstructured":"Rubinstein, I. S., & Hartzog, W. (2016). Anonymization and Risk. Washington Law Review, 91(2), 703\u2013760.","journal-title":"Washington Law Review"},{"key":"988_CR39","unstructured":"Schl\u00f6rer, J. (1980). Datenorientierte Verfahren der Anonymisierung\u2013Anonymisierung von Mikrodaten in der Forschung: Technische Aspekte. In M. Kaase, H.-J. Krupp, M. Pflanz, E. K. Scheuch, & S. Simitis (Hrsg.), Datenzugang und Datenschutz: Konsequenzen f\u00fcr die Forschung (1. Aufl., S. 118\u2013142). K\u00f6nigstein\/Ts.: Athen\u00e4um."},{"key":"988_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-89183-9_20","volume-title":"Threat Modeling and Risk Assessment","author":"B. Schneier","year":"2000","unstructured":"Schneier, B. (2000). Threat Modeling and Risk Assessment. In H. B\u00e4umler (Hrsg.), E-Privacy (S. 214\u2013229). Wiesbaden: Vieweg+Teubner Verlag. https:\/\/doi.org\/10.1007\/978-3-322-89183-9_20"},{"key":"988_CR41","unstructured":"Simitis, S. (1990). \u201eSensitive Daten\u201c: Zur Geschichte und Wirkung einer Fiktion. In E. Brem, J. N. Druey, E. A. Kramer, & I. Schwander (Hrsg.), Festschrift zum 65. Geburtstag von Mario M. Pedrazzini (S. 469\u2013493). Bern: St\u00e4mpfli & Cie."},{"issue":"1","key":"988_CR42","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF01228708","volume":"1","author":"S. Spaccapietra","year":"1992","unstructured":"Spaccapietra, S., Parent, C., & Dupont, Y. (1992a). Model Independent Assertions for Integration of Heterogeneous Schemas. The VLDB Journal, 1(1), 81\u2013126.","journal-title":"The VLDB Journal"},{"issue":"11","key":"988_CR43","first-page":"453","volume":"2","author":"W. Steinm\u00fcller","year":"1972","unstructured":"Steinm\u00fcller, W. (1972). Stellenwert der EDV in der \u00d6ffentlichen Verwaltung und Prinzipien des Datenschutzrechts. \u00d6ffentliche Verwaltung und Datenverarbeitung, 2(11), 453\u2013462.","journal-title":"\u00d6ffentliche Verwaltung und Datenverarbeitung"},{"key":"988_CR44","first-page":"205","volume":"12","author":"W. Steinm\u00fcller","year":"1983","unstructured":"Steinm\u00fcller, W. (1983). Personenkennzeichen, Versichertennummer und Personalausweis\u2013Eine systemanalytische und verfassungsrechtliche Studie zu Datenverbund und Datenschutz im Sozial-und Sicherheitsbereich. Datenverarbeitung im Recht, 12, 205\u2013318.","journal-title":"Datenverarbeitung im Recht"},{"key":"988_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48218-2","volume-title":"Datenschutz bei riskanten Systemen: Eine Konzeption entwickelt am Beispiel eines medizinischen Informationssystems (Bd. 13)","author":"W. Steinm\u00fcller","year":"1978","unstructured":"Steinm\u00fcller, W., Ermer, L., & Schimmel, W. (1978). Datenschutz bei riskanten Systemen: Eine Konzeption entwickelt am Beispiel eines medizinischen Informationssystems (Bd. 13). Springer. https:\/\/doi.org\/10.1007\/978-3-642-48218-2"},{"issue":"5","key":"988_CR46","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557\u2013570. https:\/\/doi.org\/10.1142\/s0218488502001648","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"1","key":"988_CR47","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s00778-010-0192-8","volume":"20","author":"M. Terrovitis","year":"2010","unstructured":"Terrovitis, M., Mamoulis, N., & Kalnis, P. (2010). Local and global recoding methods for anonymizing set-valued data. The VLDB Journal, 20(1), 83\u2013106. https:\/\/doi.org\/10.1007\/s00778-010-0192-8","journal-title":"The VLDB Journal"},{"key":"988_CR48","first-page":"687","volume-title":"Privacy in Data Mining","author":"V. Torra","year":"2009","unstructured":"Torra, V. (2009). Privacy in Data Mining. In O. Maimon & L. Rokach (Hrsg.), Data Mining and Knowledge Discovery Handbook (S. 687\u2013716). Boston, MA: Springer US. https:\/\/doi.org\/10.1007\/978-0-387-09823-4_35"},{"key":"988_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57358-8","volume-title":"Data Privacy: Foundations, New Developments and the Big Data Challenge","author":"V. Torra","year":"2017","unstructured":"Torra, V. (2017). Data Privacy: Foundations, New Developments and the Big Data Challenge. Springer. U.S."},{"key":"988_CR50","volume-title":"Records, Computers, and the Rights of Citizens: Report of the Secretary\u2019s Advisory Committee on Automated Personal Data Systems","author":"Department of Health, EducationWelfare.","year":"1973","unstructured":"Department of Health, Education & Welfare. (1973). Records, Computers, and the Rights of Citizens: Report of the Secretary\u2019s Advisory Committee on Automated Personal Data Systems (No. NO.(OS)73-94). Washington D.C."},{"key":"988_CR51","volume-title":"Verkettung digitaler Identit\u00e4ten: Projektnummer: PLI1563 (Version 1.0)","author":"Unabh\u00e4ngiges Landeszentrum f\u00fcr Datenschutz Schleswig-Holstein, Technische Universit\u00e4t Dresden, Hansen, M.,Meissner, S. Hrsg..","year":"2007","unstructured":"Unabh\u00e4ngiges Landeszentrum f\u00fcr Datenschutz Schleswig-Holstein, Technische Universit\u00e4t Dresden, Hansen, M., & Meissner, S. (Hrsg.). (2007). Verkettung digitaler Identit\u00e4ten: Projektnummer: PLI1563 (Version 1.0). Kiel: ULD (zit: ULD et al. 2007)."},{"key":"988_CR52","volume-title":"Privacy Preserving Data Mining (Bd. 19)","author":"J. Vaidya","year":"2006","unstructured":"Vaidya, J., Clifton, C. W., & Zhu, Y. M. (2006). Privacy Preserving Data Mining (Bd. 19). Springer US. https:\/\/doi.org\/10.1007\/978-0-387-29489-6"},{"key":"988_CR53","unstructured":"Volksz\u00e4hlung, 65 BVerfGE 1 (Bundesverfassungsgericht 1983)."},{"key":"988_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control (Bd. 155)","author":"L. Willenborg","year":"2001","unstructured":"Willenborg, L., & de Waal, T. (2001). Elements of Statistical Disclosure Control (Bd. 155). New York, NY: Springer New York. https:\/\/doi.org\/10.1007\/978-1-4613-0121-9"},{"key":"988_CR55","first-page":"391","volume-title":"Methodologische Aspekte der Organisationsmodellierung: Eine soziopragmatisch-konstruktivistische Perspektive. In U. Frank (Hrsg.)","author":"B. Wyssusek","year":"2004","unstructured":"Wyssusek, B. (2004). Methodologische Aspekte der Organisationsmodellierung: Eine soziopragmatisch-konstruktivistische Perspektive. In U. Frank (Hrsg.), Wissenschaftstheorie in \u00d6konomie und Wirtschaftsinformatik (S. 391\u2013416). Wiesbaden: Deutscher Universit\u00e4tsverlag. https:\/\/doi.org\/10.1007\/978-3-322-81127-1_18"},{"key":"988_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62004-6","volume-title":"Differential Privacy and Applications (Bd. 69)","author":"T. Zhu","year":"2017","unstructured":"Zhu, T., Li, G., Zhou, W., & Yu, P. S. (2017). Differential Privacy and Applications (Bd. 69). Cham: Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-62004-6"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0988-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0988-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0988-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T20:50:34Z","timestamp":1720471834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0988-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,31]]},"references-count":56,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["988"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0988-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,31]]},"assertion":[{"value":"31 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}