{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:31:48Z","timestamp":1757619108621,"version":"3.44.0"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s11623-025-2122-3","type":"journal-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T05:34:17Z","timestamp":1753248857000},"page":"468-473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vorgehensmodell zur generischen DSFA im Kontext der Mitarbeiter:innen-\u00dcberwachung"],"prefix":"10.1007","volume":"49","author":[{"given":"Martin","family":"Rost","sequence":"first","affiliation":[]},{"given":"Anna","family":"Cardillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,23]]},"reference":[{"issue":"10","key":"2122_CR1","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1007\/s11623-024-1994-y","volume":"47","author":"A Cardillo","year":"2024","unstructured":"Cardillo, Anna; Rost, Martin 2024: Der SDM-W\u00fcrfel f\u00fcr Jurist:innen \u2013 Regelungsbedarfe f\u00fcr die Verarbeitungspraxis systematisch analysieren und bearbeiten; in: DuD \u2013 Datenschutz und Datensicherheit, 47. Jahrgang, Heft 10: 646-650.","journal-title":"DuD \u2013 Datenschutz und Datensicherheit"},{"issue":"01\/2025","key":"2122_CR2","first-page":"13","volume":"49","author":"A Cardillo","year":"2025","unstructured":"Cardillo, Anna, 2025: Im Verborgenen \u00fcberwacht? Ein Kommentar und Praxisbericht; in: Der Datenschutzberater, 49.\u00a0Jg, 01\/2025: 13-15.","journal-title":"Der Datenschutzberater"},{"key":"2122_CR3","unstructured":"Christl, Wolfie, 2024: A case study on intrusive surveillance and behavioral profiling for cybersecurity, insider risk detection and \u201ecompliance\u201d, Cracked Labs, August 2024 https:\/\/crackedlabs.org\/en\/data-work\/publications\/securityriskprofiling (dazu Podcast: https:\/\/www.heise.de\/hintergrund\/Auslegungssache-123-Neue-Dimensionen-der-Mitarbeiterueberwachung-10181275.html)."},{"key":"2122_CR4","unstructured":"DSK 2018: Kurzpapier Nr.\u00a05 \u2013 Datenschutz-Folgenabsch\u00e4tzung nach Art. 35 DS-GVO; https:\/\/www.datenschutzkonferenz-online.de\/media\/kp\/dsk_kpnr_5.pdf."},{"key":"2122_CR5","unstructured":"DSK 2025: Das Standard-Datenschutzmodell V3.1a; https:\/\/www.datenschutz-mv.de\/static\/DS\/Dateien\/Datenschutzmodell\/SDM-Methode-V31a.pdf."},{"key":"2122_CR6","unstructured":"Koch, Marie-Claire; Zota, Volker 2024: Totale Kontrolle: Wenn der Arbeitgeber jeden Klick protokolliert; in: Heise-Online, Interview, 2024-1216: https:\/\/www.heise.de\/hintergrund\/Die-digitale-Buechse-der-Pandora-Wie-Konzerne-ihre-Mitarbeiter-ueberwachen-10202107.html."},{"key":"2122_CR7","unstructured":"LDA 2018: \u201eListe der Verarbeitungst\u00e4tigkeiten, f\u00fcr die eine DSFA durchzuf\u00fchren ist\u201d; https:\/\/www.lda.bayern.de\/media\/themen\/dsfa_muss_liste_dsk_de.pdf."},{"key":"2122_CR8","unstructured":"LfD Bayern, 2024: Datenschutz-Folgenabsch\u00e4tzung (DSFA); https:\/\/www.datenschutz-bayern.de\/dsfa\/."},{"key":"2122_CR9","unstructured":"Paresh, Dave; Dell, Cameron; O\u2018Brien, Alexa, 2025: DOGE Sparks Surveillance Fear Across the US Government; in: WIRED 21.02.2025, https:\/\/www.wired.com\/story\/surveillance-privacy-doge-federal-employees\/"},{"key":"2122_CR10","unstructured":"Schmidt, J\u00fcrgen, 2024: Microsofts Security-Desaster: BSI ordnet Herausgabe von Informationen an, in: heise online, https:\/\/www.heise.de\/news\/BSI-verklagt-Microsoft-auf-Herausgabe-von-Informationen-zu-Security-Desaster-9721245.html."},{"key":"2122_CR11","unstructured":"Tenge, Armin, 2025: Data Governance mit Purview; in: iX, Nr.\u00a02, 2025, S. 48-53."},{"key":"2122_CR12","unstructured":"ULD 2014: Private sowie dienstliche Internet- und E-Mail-Nutzung; https:\/\/www.datenschutzzentrum.de\/artikel\/594-Private-sowie-dienstliche-Internet-und-E-Mail-Nutzung.html."},{"key":"2122_CR13","unstructured":"Weichert, Thilo; Schuler, Karin, 2020: Besondere Probleme im Besch\u00e4ftigtendatenschutz und Empfehlungen f\u00fcr ein Besch\u00e4ftigtendatenschutzgesetz, zur nationalen Umsetzung der DSGVO, Netzwerk Datenschutzexpertise; https:\/\/www.netzwerk-datenschutzexpertise.de\/sites\/default\/files\/gut_2020_beschdsg_final.pdf."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2122-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2122-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2122-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T13:03:16Z","timestamp":1757250196000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2122-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":13,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2122"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2122-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"23 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}