Article PDF
Use our pre-submission checklist
Avoid common mistakes on your manuscript.
Rights and permissions
About this article
Cite this article
Systematischen Gefährdungsanalyse der IT. Datenschutz Datensich 38, 642 (2014). https://doi.org/10.1007/s11623-014-0253-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-014-0253-z