h1

h2

h3

h4

h5
h6
000809656 001__ 809656
000809656 005__ 20230913074913.0
000809656 0247_ $$2ISSN$$a1860-6059
000809656 0247_ $$2ISSN$$a1866-3621
000809656 0247_ $$2WOS$$aWOS:000594475800001
000809656 0247_ $$2datacite_doi$$a10.18154/RWTH-2021-00053
000809656 0247_ $$2doi$$a10.18417/emisa.15.7
000809656 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85163748116
000809656 037__ $$aRWTH-2021-00053
000809656 041__ $$aEnglish
000809656 1001_ $$aKoschmider, Agnes$$b0$$eCorresponding author
000809656 245__ $$aTowards Privacy Preservation and Data Protection in Information System Design : an introduction to a special issue$$honline, print
000809656 260__ $$aBonn$$bGes. für Informatik$$c2020
000809656 300__ $$a1-2
000809656 3367_ $$00$$2EndNote$$aJournal Article
000809656 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article$$bjournal$$mjournal$$xEditorial
000809656 3367_ $$2BibTeX$$aARTICLE
000809656 3367_ $$2DRIVER$$aarticle
000809656 3367_ $$2DataCite$$aOutput Types/Journal article
000809656 3367_ $$2ORCID$$aJOURNAL_ARTICLE
000809656 500__ $$aSpecial Issue on Privacy in IS Design / Edited by Agnes Koschmider, Judith Michael, Nathalie Baracaldo
000809656 588__ $$aDataset connected to DataCite
000809656 591__ $$aGermany
000809656 591__ $$aUSA
000809656 7001_ $$0P:(DE-82)IDM03017$$aMichael, Judith$$b1$$urwth
000809656 7001_ $$aBaracaldo, Nathalie$$b2
000809656 773__ $$0PERI:(DE-600)2706766-X$$a10.18417/emisa.15.7$$p7$$tEnterprise modelling and information systems architectures$$v15$$x1860-6059$$y2020
000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.pdf$$yOpenAccess
000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.gif?subformat=icon$$xicon$$yOpenAccess
000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.jpg?subformat=icon-180$$xicon-180$$yOpenAccess
000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.jpg?subformat=icon-700$$xicon-700$$yOpenAccess
000809656 909CO $$ooai:publications.rwth-aachen.de:809656$$popenaire$$popen_access$$pdriver$$pdnbdelivery$$pVDB
000809656 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03017$$aRWTH Aachen$$b1$$kRWTH
000809656 915__ $$0LIC:(DE-HGF)CCBYSA4$$2HGFVOC$$aCreative Commons Attribution-ShareAlike CC BY-SA 4.0
000809656 915__ $$0StatID:(DE-HGF)0112$$2StatID$$aWoS$$bEmerging Sources Citation Index$$d2020-09-06
000809656 915__ $$0StatID:(DE-HGF)0150$$2StatID$$aDBCoverage$$bWeb of Science Core Collection$$d2020-09-06
000809656 915__ $$0StatID:(DE-HGF)0199$$2StatID$$aDBCoverage$$bClarivate Analytics Master Journal List$$d2020-09-06
000809656 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000809656 9201_ $$0I:(DE-82)121510_20140620$$k121510$$lLehrstuhl für Informatik 3 (Software Engineering)$$x0
000809656 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1
000809656 961__ $$c2021-01-04T13:35:35.538093$$x2021-01-04T13:35:35.538093$$z2021-01-04
000809656 9801_ $$aFullTexts
000809656 980__ $$aI:(DE-82)120000_20140620
000809656 980__ $$aI:(DE-82)121510_20140620
000809656 980__ $$aUNRESTRICTED
000809656 980__ $$aVDB
000809656 980__ $$ajournal