{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T17:52:10Z","timestamp":1770573130994,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T00:00:00Z","timestamp":1534464000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11623-018-0999-9","type":"journal-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T15:18:39Z","timestamp":1534519119000},"page":"558-565","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["K\u00fcnstliche Intelligenz"],"prefix":"10.1007","volume":"42","author":[{"given":"Martin","family":"Rost","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,17]]},"reference":[{"key":"999_CR1","first-page":"7","volume":"1","author":"K. Bock","year":"2018","unstructured":"Bock, Kirsten\/Robrahn, Rasmus, 2018: Schutzziele als Optimierungsgebote; in: DuD\u2013Datenschutz und Datensicherheit, 42. Jahrgang, Heft 1: 7\u201312.","journal-title":"DuD\u2013Datenschutz und Datensicherheit"},{"key":"999_CR2","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/s00287-017-1059-9","volume":"4","author":"N. Diakopoulos","year":"2017","unstructured":"Diakopoulos, Nicholas\/Deussen, Oliver, 2017: Brauchen wir eine Rechenschaftspflicht f\u00fcr algorithmische Entscheidungen? in: Informatik\u2013Spektrum, Ausgabe 4: 362\u2013366.","journal-title":"Informatik\u2013Spektrum"},{"key":"999_CR3","unstructured":"DSK 2018: Handbuch zur SDM\u2013Methodik, V1.1, \n                    https:\/\/doi.org\/datenschutzzentrum.de\/uploads\/sdm\/SDM-Handbuch.pdf\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR4","unstructured":"Forum Privatheit: \u201eWhitepaper \u201aDatenschutzfolgenabsch\u00e4tzung\u2018\u201c, V3.0, \n                    https:\/\/doi.org\/forum-privatheit.de\/forum-privatheit-de\/publikationen-und-downloads\/veroeffentlichungen-des-forums\/themenpapiere-white-paper\/Forum-Privatheit=WP-DSFA-3-Auflage-2017-11-29.pdf\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR5","unstructured":"Fraunhofer 2018: Maschinelles Lernen\u2013Eine Analyse zu Kompetenzen, Forschung und Anwendung; \n                    https:\/\/doi.org\/bigdata.fraunhofer.de\/de\/big-data\/kuenstliche-intelligenz-und-maschinelles-lernen\/ml-studie.html\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR6","volume-title":"Urmensch und Sp\u00e4tkultur","author":"A. Gehlen","year":"1956","unstructured":"Gehlen, Arnold, 1956: Urmensch und Sp\u00e4tkultur, Bonn, Athen\u00e4um."},{"issue":"7","key":"999_CR7","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11623-018-0976-3","volume":"42","author":"S. Gonscherowski","year":"2018","unstructured":"Gonscherowski, Susan\/Hansen, Marit\/Rost, Martin, 2018: Resilienz\u2013eine neue Anforderung aus der Datenschutz\u2013Grundverordnung; in: DuD\u2013Datenschutz und Datensicherheit, 42. Jahrgang, Heft 7: 43\u201348.","journal-title":"DuD\u2013Datenschutz und Datensicherheit"},{"issue":"1","key":"999_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s11623-012-0007-8","volume":"36","author":"M. Hansen","year":"2012","unstructured":"Hansen, Marit\/Thiel, Christian, 2012: Cyber\u2013Physical\u2013Systems und Privatsph\u00e4renschutz; DuD\u2013Datenschutz und Datensicherheit, 36. Jahrgang, Heft 1: 26\u201330.","journal-title":"DuD\u2013Datenschutz und Datensicherheit"},{"key":"999_CR9","doi-asserted-by":"publisher","DOI":"10.1186\/s40504-017-0050-1","volume-title":"Towards new human rights in the age of neuroscience and neurotechnology","author":"M. Ienca","year":"2017","unstructured":"Ienca, Marcello\/Andorno, Roberto, 2017: Towards new human rights in the age of neuroscience and neurotechnology; in: Life Sciences, Society and Policy, \n                    https:\/\/doi.org\/10.1186\/s40504-017-0050-1\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR10","volume-title":"Anmerkungen zur KI\u2013Strategie Europas\u201c im Rahmen eines Gutachterkommentars \u201eEU\u2013Strategie zur K\u00fcnstlichen Intelligenz\u201c","author":"C. Kappes","year":"2018","unstructured":"Kappes, Christoph, 2018: \u201eAnmerkungen zur KI\u2013Strategie Europas\u201c im Rahmen eines Gutachterkommentars \u201eEU\u2013Strategie zur K\u00fcnstlichen Intelligenz\u201c, \n                    https:\/\/doi.org\/christophkappes.de\/\n                    \n                  (Abruf 18.7.2018)."},{"key":"999_CR11","volume-title":"Asimovs Robotergesetze\u2013Was leisten sie wirklich? Telepolis","author":"G. La\u00dfmann","year":"2018","unstructured":"La\u00dfmann, G\u00fcnter, 2018: Asimovs Robotergesetze\u2013Was leisten sie wirklich? Telepolis."},{"key":"999_CR12","volume-title":"Die Gesellschaft der Gesellschaft, 1. Aufl.","author":"N. Luhmann","year":"1997","unstructured":"Luhmann, Niklas, 1997: Die Gesellschaft der Gesellschaft, 1. Aufl., Frankfurt am Main, Suhrkamp."},{"key":"999_CR13","volume-title":"Das Digital\u2013Markt, Wertsch\u00f6pfung und Gerechtigkeit im Datenkapitalismus","author":"V. Mayer\u2013Sch\u00f6nberger","year":"2017","unstructured":"Mayer\u2013Sch\u00f6nberger, Viktor\/Ramge, Thomas, 2017: Das Digital\u2013Markt, Wertsch\u00f6pfung und Gerechtigkeit im Datenkapitalismus, 1. Aufl., Berlin, Econ."},{"key":"999_CR14","volume-title":"Die Daten die ich rief\u2013Wie wir unsere Freiheit an Gro\u00dfkonzerne verkaufen","author":"K. Nocun","year":"2018","unstructured":"Nocun, Katharina, 2018: Die Daten die ich rief\u2013Wie wir unsere Freiheit an Gro\u00dfkonzerne verkaufen, 1. Aufl., K\u00f6ln, L\u00fcbbe."},{"key":"999_CR15","first-page":"68","volume":"2","author":"C. Otto","year":"2018","unstructured":"Otto, Claudia, 2018: Das dritte Ich\u2013Ist die\u201aSchizophrenie \u2018k\u00fcnstlich intelligenter Systeme behandelbar?In: Recht innovativ, Ausgabe 2: 68\u201388. \n                    https:\/\/doi.org\/rechtinnovativ.online\/assets\/recht-innovativ-(ri)-02218.pdf\n                    \n                   (Abruf 18.7.2018).","journal-title":"Recht innovativ, Ausgabe"},{"key":"999_CR16","volume-title":"Geschichte und Theorie des Datenschutzes","author":"J. Pohle","year":"2017","unstructured":"Pohle, J\u00f6rg, 2017: Geschichte und Theorie des Datenschutzes, \n                    https:\/\/doi.org\/edoc.huberlin.de\/handle\/18452\/19886\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR17","volume-title":"Mensch und Maschine\u2013Wie k\u00fcnstliche Intelligenz und Roboter unser Leben ver\u00e4ndern","author":"T. Ramge","year":"2018","unstructured":"Ramge, Thomas, 2018: Mensch und Maschine\u2013Wie k\u00fcnstliche Intelligenz und Roboter unser Leben ver\u00e4ndern, 2. Aufl., Stuttgart, Reclam."},{"key":"999_CR18","volume-title":"Der Algorithmus kann 42 Dimensionen einer Pers\u00f6nlichkeit messen\u201c","author":"M. R\u00f6vekamp","year":"2018","unstructured":"R\u00f6vekamp, Marie, 2018: \u201eDer Algorithmus kann 42 Dimensionen einer Pers\u00f6nlichkeit messen\u201c; in: Der Tagesspiegel, 02.07.2018, \n                    https:\/\/doi.org\/tagesspiegel.de\/wirtschaft\/kuenstliche-intelligenz-der-algorithmus-kann-42-dimensioneneiner-persoenlichkeit-messen\/22756300.html\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR19","doi-asserted-by":"crossref","unstructured":"Rost, Martin, 2013: Soziologie des Datenschutzes; DuD\u2013Datenschutz und Datensicherheit, Heft 2: 85\u201391.","DOI":"10.1007\/s11623-013-0023-3"},{"key":"999_CR20","doi-asserted-by":"crossref","unstructured":"Rost, Martin, 2018: Ordnung der Schutzziele; in: DuD\u2013Datenschutz und Datensicherheit, Heft 1: 13\u201318.","DOI":"10.1007\/s11623-018-0883-7"},{"key":"999_CR21","volume-title":"Auf eigenen F\u00fc\u00dfen\u2013Machinen\u2013Learning in der Industrie","author":"C. Scheiderer","year":"2018","unstructured":"Scheiderer, Christian\/Maisen, Tobias, 2018: Auf eigenen F\u00fc\u00dfen\u2013Machinen\u2013Learning in der Industrie; in: iX\u2013Special 2018, Internet Of Things: 48\u201350."},{"key":"999_CR22","volume-title":"Digital Politics\u2013So ver\u00e4ndert das Netz Demokratie","author":"A. Sowa","year":"2017","unstructured":"Sowa, Aleksandra, 2017: Digital Politics\u2013So ver\u00e4ndert das Netz Demokratie, 1. Aufl., Bonn, Dietz."},{"key":"999_CR23","volume-title":"Leben 3.0\u2013Mensch sein im Zeitalter K\u00fcnstlicher Intelligenz","author":"M. Tegmark","year":"2017","unstructured":"Tegmark, Max, 2017: Leben 3.0\u2013Mensch sein im Zeitalter K\u00fcnstlicher Intelligenz, 2. Aufl., Berlin, Ullstein."},{"key":"999_CR24","volume-title":"Aggregating Private Sparse Learning Models Using Multi\u2013Party Computation","author":"L. Tian","year":"2016","unstructured":"Tian, Lu\/Jayaraman, Bargav\/Gu, Quanquan\/Evans, David, 2016: Aggregating Private Sparse Learning Models Using Multi\u2013Party Computation; in: Workshop on Private Multi\u2013Party Machine Learning (NIPS 2016), Barcelona, Spain, \n                    https:\/\/doi.org\/oblivc.org\/docs\/pmpml.pdf\n                    \n                   (Abruf 18.7.2018)."},{"key":"999_CR25","volume-title":"K\u00fcnstliche Intelligenz als Grundlage autonomer Systeme","author":"W. Wahlster","year":"2017","unstructured":"Wahlster, Wolfgang, 2017: K\u00fcnstliche Intelligenz als Grundlage autonomer Systeme, \n                    https:\/\/doi.org\/stiftung-jgsp.uni-mainz.de\/Bilder_allgemein\/Beitrag_Autonome_Systeme-Informatik-Spektrum-Wahlster.pdf\n                    \n                   (Abruf 18.7.2018)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0999-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0999-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0999-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T23:25:58Z","timestamp":1565997958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0999-9"}},"subtitle":["Normative und operative Anforderungen des Datenschutzes"],"short-title":[],"issued":{"date-parts":[[2018,8,17]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["999"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0999-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,17]]},"assertion":[{"value":"17 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}