000809656 001__ 809656 000809656 005__ 20230913074913.0 000809656 0247_ $$2ISSN$$a1860-6059 000809656 0247_ $$2ISSN$$a1866-3621 000809656 0247_ $$2WOS$$aWOS:000594475800001 000809656 0247_ $$2datacite_doi$$a10.18154/RWTH-2021-00053 000809656 0247_ $$2doi$$a10.18417/emisa.15.7 000809656 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85163748116 000809656 037__ $$aRWTH-2021-00053 000809656 041__ $$aEnglish 000809656 1001_ $$aKoschmider, Agnes$$b0$$eCorresponding author 000809656 245__ $$aTowards Privacy Preservation and Data Protection in Information System Design : an introduction to a special issue$$honline, print 000809656 260__ $$aBonn$$bGes. für Informatik$$c2020 000809656 300__ $$a1-2 000809656 3367_ $$00$$2EndNote$$aJournal Article 000809656 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article$$bjournal$$mjournal$$xEditorial 000809656 3367_ $$2BibTeX$$aARTICLE 000809656 3367_ $$2DRIVER$$aarticle 000809656 3367_ $$2DataCite$$aOutput Types/Journal article 000809656 3367_ $$2ORCID$$aJOURNAL_ARTICLE 000809656 500__ $$aSpecial Issue on Privacy in IS Design / Edited by Agnes Koschmider, Judith Michael, Nathalie Baracaldo 000809656 588__ $$aDataset connected to DataCite 000809656 591__ $$aGermany 000809656 591__ $$aUSA 000809656 7001_ $$0P:(DE-82)IDM03017$$aMichael, Judith$$b1$$urwth 000809656 7001_ $$aBaracaldo, Nathalie$$b2 000809656 773__ $$0PERI:(DE-600)2706766-X$$a10.18417/emisa.15.7$$p7$$tEnterprise modelling and information systems architectures$$v15$$x1860-6059$$y2020 000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.pdf$$yOpenAccess 000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.gif?subformat=icon$$xicon$$yOpenAccess 000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.jpg?subformat=icon-180$$xicon-180$$yOpenAccess 000809656 8564_ $$uhttps://publications.rwth-aachen.de/record/809656/files/809656.jpg?subformat=icon-700$$xicon-700$$yOpenAccess 000809656 909CO $$ooai:publications.rwth-aachen.de:809656$$popenaire$$popen_access$$pdriver$$pdnbdelivery$$pVDB 000809656 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03017$$aRWTH Aachen$$b1$$kRWTH 000809656 915__ $$0LIC:(DE-HGF)CCBYSA4$$2HGFVOC$$aCreative Commons Attribution-ShareAlike CC BY-SA 4.0 000809656 915__ $$0StatID:(DE-HGF)0112$$2StatID$$aWoS$$bEmerging Sources Citation Index$$d2020-09-06 000809656 915__ $$0StatID:(DE-HGF)0150$$2StatID$$aDBCoverage$$bWeb of Science Core Collection$$d2020-09-06 000809656 915__ $$0StatID:(DE-HGF)0199$$2StatID$$aDBCoverage$$bClarivate Analytics Master Journal List$$d2020-09-06 000809656 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess 000809656 9201_ $$0I:(DE-82)121510_20140620$$k121510$$lLehrstuhl für Informatik 3 (Software Engineering)$$x0 000809656 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1 000809656 961__ $$c2021-01-04T13:35:35.538093$$x2021-01-04T13:35:35.538093$$z2021-01-04 000809656 9801_ $$aFullTexts 000809656 980__ $$aI:(DE-82)120000_20140620 000809656 980__ $$aI:(DE-82)121510_20140620 000809656 980__ $$aUNRESTRICTED 000809656 980__ $$aVDB 000809656 980__ $$ajournal