{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T22:23:20Z","timestamp":1648765400934},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11623-020-1345-6","type":"journal-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T13:02:46Z","timestamp":1599224566000},"page":"663-667","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["JOINED-VIV: Umsetzung der DSGVO mittels SDM und unter Einbindung des BSI IT-Grundschutzes"],"prefix":"10.1007","volume":"44","author":[{"given":"Benjamin","family":"Heckmann","sequence":"first","affiliation":[]},{"given":"Florian","family":"Schweighart","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Tasch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,4]]},"reference":[{"key":"1345_CR1","unstructured":"Das Standard-Datenschutzmodell (SDM), Version 2.0b \u2013 von der 99. Konferenz der unabh\u00e4ngigen Datenschutzbeh\u00f6rden des Bundes und der L\u00e4nder am 17. April 2020 beschlossen"},{"key":"1345_CR2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), BSI-Standard 200-2, IT-Grundschutz-Methodik, Oktober 2017"},{"issue":"1","key":"1345_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11623-018-0883-7","volume":"42","author":"M Rost","year":"2018","unstructured":"Rost, M., (2018): Die Ordnung der Schutzziele, in: Datenschutz und Datensicherheit 42. Jg., Heft 1, S. 13-18.","journal-title":"Datenschutz und Datensicherheit"},{"issue":"1","key":"1345_CR4","first-page":"6","volume":"43","author":"M Rost","year":"2020","unstructured":"Rost, Martin, 2020: DSK: Standard-Datenschutzmodell V2; in: DuD \u2013 Datenschutz und Datensicherheit, 43. Jahrgang, Heft 1: 6-7.","journal-title":"DuD \u2013 Datenschutz und Datensicherheit"},{"key":"1345_CR5","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), IT-Grundschutz-Kompendium, Edition 2019"},{"issue":"5","key":"1345_CR6","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s11623-019-1105-7","volume":"43","author":"D Schrahe","year":"2019","unstructured":"Schrahe, D., St\u00e4dter, T. (2019): Integration von Informationssicherheits- und Datenschutzmanagement, in: Datenschutz und Datensicherheit 43. Jg., Heft 5: S. 265\u2013269.","journal-title":"Datenschutz und Datensicherheit"},{"issue":"5","key":"1345_CR7","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11623-013-0111-4","volume":"37","author":"M Rost","year":"2013","unstructured":"Rost, Martin, 2013: Datenschutzmanagementsystem; in: DuD \u2013 Datenschutz und Datensicherheit, 37. Jahrgang, Heft 5: 295-300.","journal-title":"DuD \u2013 Datenschutz und Datensicherheit"},{"issue":"4","key":"1345_CR8","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s11623-020-1263-7","volume":"44","author":"M Rost","year":"2020","unstructured":"Rost, Martin \/ Welke, Sebastian, 2020: SDM 2.0 und ITIL 4 \u201everschr\u00e4nkt\u201c, in: DuD \u2013 Datenschutz und Datensicherheit, 44. Jahrgang, Heft 4: 258-262.","journal-title":"DuD \u2013 Datenschutz und Datensicherheit"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1345-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-020-1345-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1345-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T02:48:36Z","timestamp":1630723716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-020-1345-6"}},"subtitle":["Gew\u00e4hrleistung von Verf\u00fcgbarkeit, Integrit\u00e4t und Vertraulichkeit im Datenschutz mittels der\ntechnischen und organisatorischen Ma\u00dfnahmen des BSI IT-Grundschutzes"],"short-title":[],"issued":{"date-parts":[[2020,9,4]]},"references-count":8,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["1345"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1345-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,4]]},"assertion":[{"value":"4 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}