[{"citation":{"mla":"Wex, Felix, et al. “Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units.” <i>International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012</i>, 2012.","short":"F. Wex, G. Schryen, D. Neumann, in: International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 2012.","bibtex":"@inproceedings{Wex_Schryen_Neumann_2012, title={Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units}, booktitle={International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2012} }","apa":"Wex, F., Schryen, G., &#38; Neumann, D. (2012). Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In <i>International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012</i>.","ama":"Wex F, Schryen G, Neumann D. Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In: <i>International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012</i>. ; 2012.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units,” in <i>International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012</i>, 2012.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units.” In <i>International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012</i>, 2012."},"year":"2012","has_accepted_license":"1","title":"Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units","author":[{"first_name":"Felix","last_name":"Wex","full_name":"Wex, Felix"},{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"},{"last_name":"Neumann","full_name":"Neumann, Dirk","first_name":"Dirk"}],"date_created":"2018-11-14T11:16:58Z","oa":"1","date_updated":"2022-01-06T07:02:01Z","status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":614029,"access_level":"open_access","file_name":"Proceedings version - 152.pdf","file_id":"6176","date_updated":"2018-12-13T15:14:20Z","date_created":"2018-12-11T14:59:44Z","creator":"hsiemes"}],"publication":"International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012","type":"conference","file_date_updated":"2018-12-13T15:14:20Z","language":[{"iso":"eng"}],"extern":"1","ddc":["000"],"department":[{"_id":"277"}],"user_id":"61579","_id":"5579"},{"title":"IS Design Thinking in Disaster Management Research","oa":"1","date_updated":"2022-01-06T07:02:08Z","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"},{"first_name":"Felix","full_name":"Wex, Felix","last_name":"Wex"}],"date_created":"2018-11-14T13:59:23Z","year":"2012","citation":{"chicago":"Schryen, Guido, and Felix Wex. “IS Design Thinking in Disaster Management Research.” In <i>45th Hawaii International Conference on System Sciences</i>, 2012.","ieee":"G. Schryen and F. Wex, “IS Design Thinking in Disaster Management Research,” in <i>45th Hawaii International Conference on System Sciences</i>, 2012.","ama":"Schryen G, Wex F. IS Design Thinking in Disaster Management Research. In: <i>45th Hawaii International Conference on System Sciences</i>. ; 2012.","bibtex":"@inproceedings{Schryen_Wex_2012, title={IS Design Thinking in Disaster Management Research}, booktitle={45th Hawaii International Conference on System Sciences}, author={Schryen, Guido and Wex, Felix}, year={2012} }","short":"G. Schryen, F. Wex, in: 45th Hawaii International Conference on System Sciences, 2012.","mla":"Schryen, Guido, and Felix Wex. “IS Design Thinking in Disaster Management Research.” <i>45th Hawaii International Conference on System Sciences</i>, 2012.","apa":"Schryen, G., &#38; Wex, F. (2012). IS Design Thinking in Disaster Management Research. In <i>45th Hawaii International Conference on System Sciences</i>."},"has_accepted_license":"1","ddc":["000"],"extern":"1","file_date_updated":"2018-12-13T15:14:09Z","language":[{"iso":"eng"}],"_id":"5615","department":[{"_id":"277"}],"user_id":"61579","status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":207629,"file_name":"PID2061325.pdf","access_level":"open_access","file_id":"6175","date_updated":"2018-12-13T15:14:09Z","creator":"hsiemes","date_created":"2018-12-11T14:58:56Z"}],"publication":"45th Hawaii International Conference on System Sciences","type":"conference"},{"user_id":"61579","department":[{"_id":"277"}],"_id":"5638","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:15:22Z","extern":"1","ddc":["000"],"type":"journal_article","publication":"Die Zeit","file":[{"date_created":"2018-12-11T15:01:42Z","creator":"hsiemes","date_updated":"2018-12-13T15:15:22Z","access_level":"open_access","file_name":"Zeit_Artikel_16_4_2012.pdf","file_id":"6179","file_size":260775,"content_type":"application/pdf","relation":"main_file"}],"status":"public","date_created":"2018-11-14T14:32:11Z","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"date_updated":"2022-01-06T07:02:16Z","oa":"1","title":"Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012)","has_accepted_license":"1","citation":{"ama":"Schryen G. Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012). <i>Die Zeit</i>. 2012.","ieee":"G. Schryen, “Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012),” <i>Die Zeit</i>, 2012.","chicago":"Schryen, Guido. “Profis Im Netz: Soziale Netzwerke Könnten in Unternehmen Viel Mehr Nutzen Stiften - Woran Hakt Es?, In: Die Zeit (12.04.2012).” <i>Die Zeit</i>, 2012.","apa":"Schryen, G. (2012). Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012). <i>Die Zeit</i>.","bibtex":"@article{Schryen_2012, title={Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012)}, journal={Die Zeit}, author={Schryen, Guido}, year={2012} }","short":"G. Schryen, Die Zeit (2012).","mla":"Schryen, Guido. “Profis Im Netz: Soziale Netzwerke Könnten in Unternehmen Viel Mehr Nutzen Stiften - Woran Hakt Es?, In: Die Zeit (12.04.2012).” <i>Die Zeit</i>, 2012."},"year":"2012"},{"title":"Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear","oa":"1","publisher":"Information Multimedia Communication imc","date_updated":"2022-01-06T07:02:17Z","date_created":"2018-11-14T14:33:39Z","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"year":"2012","citation":{"apa":"Schryen, G. (2012). Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management &#38; Consulting, to appear. <i>IM Information Management &#38; Consulting</i>.","mla":"Schryen, Guido. “Soziale Netzwerke in Unternehmenskontexten - Potentiale Und Anforderungen, in: Information Management &#38; Consulting, to Appear.” <i>IM Information Management &#38; Consulting</i>, Information Multimedia Communication imc, 2012.","short":"G. Schryen, IM Information Management &#38; Consulting (2012).","bibtex":"@article{Schryen_2012, title={Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management &#38; Consulting, to appear}, journal={IM Information Management &#38; Consulting}, publisher={Information Multimedia Communication imc}, author={Schryen, Guido}, year={2012} }","chicago":"Schryen, Guido. “Soziale Netzwerke in Unternehmenskontexten - Potentiale Und Anforderungen, in: Information Management &#38; Consulting, to Appear.” <i>IM Information Management &#38; Consulting</i>, 2012.","ieee":"G. Schryen, “Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management &#38; Consulting, to appear,” <i>IM Information Management &#38; Consulting</i>, 2012.","ama":"Schryen G. Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management &#38; Consulting, to appear. <i>IM Information Management &#38; Consulting</i>. 2012."},"has_accepted_license":"1","ddc":["000"],"extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:13:58Z","_id":"5639","department":[{"_id":"277"}],"user_id":"61579","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-13T15:13:58Z","creator":"hsiemes","date_created":"2018-12-11T14:58:26Z","file_size":467370,"file_id":"6174","file_name":"IM-Artikel.pdf","access_level":"open_access"}],"publication":"IM Information Management & Consulting","type":"journal_article"},{"language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:13:46Z","extern":"1","ddc":["000"],"department":[{"_id":"277"}],"user_id":"61579","_id":"5684","status":"public","file":[{"date_updated":"2018-12-13T15:13:46Z","date_created":"2018-12-11T14:57:26Z","creator":"hsiemes","file_size":606840,"file_name":"ICIS PROCEEDINGS VERSION.pdf","file_id":"6173","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"publication":"Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)","type":"conference","title":"Automated Negotiations Under Uncertain Preferences","author":[{"first_name":"Fabian","full_name":"Lang, Fabian","last_name":"Lang"},{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"},{"full_name":"Fink, Andreas","last_name":"Fink","first_name":"Andreas"}],"date_created":"2018-11-14T15:44:41Z","oa":"1","date_updated":"2022-01-06T07:02:32Z","citation":{"apa":"Lang, F., Schryen, G., &#38; Fink, A. (2011). Automated Negotiations Under Uncertain Preferences. In <i>Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)</i>.","bibtex":"@inproceedings{Lang_Schryen_Fink_2011, title={Automated Negotiations Under Uncertain Preferences}, booktitle={Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)}, author={Lang, Fabian and Schryen, Guido and Fink, Andreas}, year={2011} }","short":"F. Lang, G. Schryen, A. Fink, in: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.","mla":"Lang, Fabian, et al. “Automated Negotiations Under Uncertain Preferences.” <i>Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)</i>, 2011.","ama":"Lang F, Schryen G, Fink A. Automated Negotiations Under Uncertain Preferences. In: <i>Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)</i>. ; 2011.","chicago":"Lang, Fabian, Guido Schryen, and Andreas Fink. “Automated Negotiations Under Uncertain Preferences.” In <i>Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)</i>, 2011.","ieee":"F. Lang, G. Schryen, and A. Fink, “Automated Negotiations Under Uncertain Preferences,” in <i>Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)</i>, 2011."},"year":"2011","has_accepted_license":"1"},{"year":"2011","citation":{"ieee":"C. Bodenstein, G. Schryen, and D. Neumann, “Reducing Datacenter Energy Usage through Efficient Job Allocation,” in <i>Proceedings of the 19th European Conference on Information Systems (ECIS 2011)</i>, 2011.","chicago":"Bodenstein, Christian, Guido Schryen, and Dirk Neumann. “Reducing Datacenter Energy Usage through Efficient Job Allocation.” In <i>Proceedings of the 19th European Conference on Information Systems (ECIS 2011)</i>, 2011.","ama":"Bodenstein C, Schryen G, Neumann D. Reducing Datacenter Energy Usage through Efficient Job Allocation. In: <i>Proceedings of the 19th European Conference on Information Systems (ECIS 2011)</i>. ; 2011.","short":"C. Bodenstein, G. Schryen, D. Neumann, in: Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.","mla":"Bodenstein, Christian, et al. “Reducing Datacenter Energy Usage through Efficient Job Allocation.” <i>Proceedings of the 19th European Conference on Information Systems (ECIS 2011)</i>, 2011.","bibtex":"@inproceedings{Bodenstein_Schryen_Neumann_2011, title={Reducing Datacenter Energy Usage through Efficient Job Allocation}, booktitle={Proceedings of the 19th European Conference on Information Systems (ECIS 2011)}, author={Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2011} }","apa":"Bodenstein, C., Schryen, G., &#38; Neumann, D. (2011). Reducing Datacenter Energy Usage through Efficient Job Allocation. In <i>Proceedings of the 19th European Conference on Information Systems (ECIS 2011)</i>."},"has_accepted_license":"1","title":"Reducing Datacenter Energy Usage through Efficient Job Allocation","oa":"1","date_updated":"2022-01-06T07:02:34Z","author":[{"last_name":"Bodenstein","full_name":"Bodenstein, Christian","first_name":"Christian"},{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"},{"first_name":"Dirk","last_name":"Neumann","full_name":"Neumann, Dirk"}],"date_created":"2018-11-14T15:48:00Z","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-13T15:15:52Z","creator":"hsiemes","date_created":"2018-12-11T15:04:23Z","file_size":210256,"access_level":"open_access","file_id":"6182","file_name":"ECIS_2011_-_REDUCING_DATACENTER_ENERGY_USAGE_THROUGH_EFFICIENT_JOB_ALLOCATION.pdf"}],"publication":"Proceedings of the 19th European Conference on Information Systems (ECIS 2011)","type":"conference","ddc":["000"],"extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:15:52Z","_id":"5689","department":[{"_id":"277"}],"user_id":"61579"},{"type":"conference","publication":"Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)","file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-11T15:03:15Z","creator":"hsiemes","date_updated":"2018-12-13T15:15:31Z","access_level":"open_access","file_name":"131.pdf","file_id":"6180","file_size":286447}],"status":"public","_id":"5581","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"file_date_updated":"2018-12-13T15:15:31Z","language":[{"iso":"eng"}],"extern":"1","has_accepted_license":"1","year":"2011","citation":{"short":"F. Wex, G. Schryen, D. Neumann, in: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), 2011.","mla":"Wex, Felix, et al. “Intelligent Decision Support for Centralized Coordination during Emergency Response.” <i>Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)</i>, 2011.","bibtex":"@inproceedings{Wex_Schryen_Neumann_2011, title={Intelligent Decision Support for Centralized Coordination during Emergency Response}, booktitle={Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2011} }","apa":"Wex, F., Schryen, G., &#38; Neumann, D. (2011). Intelligent Decision Support for Centralized Coordination during Emergency Response. In <i>Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)</i>.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Intelligent Decision Support for Centralized Coordination during Emergency Response.” In <i>Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)</i>, 2011.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Intelligent Decision Support for Centralized Coordination during Emergency Response,” in <i>Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)</i>, 2011.","ama":"Wex F, Schryen G, Neumann D. Intelligent Decision Support for Centralized Coordination during Emergency Response. In: <i>Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)</i>. ; 2011."},"date_updated":"2022-01-06T07:02:02Z","oa":"1","date_created":"2018-11-14T11:17:44Z","author":[{"first_name":"Felix","full_name":"Wex, Felix","last_name":"Wex"},{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"first_name":"Dirk","last_name":"Neumann","full_name":"Neumann, Dirk"}],"title":"Intelligent Decision Support for Centralized Coordination during Emergency Response"},{"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"first_name":"Melanie","last_name":"Volkamer","full_name":"Volkamer, Melanie"},{"first_name":"Sebastian","last_name":"Ries","full_name":"Ries, Sebastian"}],"date_created":"2018-11-14T14:01:37Z","oa":"1","date_updated":"2022-01-06T07:02:10Z","title":"A formal approach towards measuring trust in distributed systems","has_accepted_license":"1","citation":{"short":"G. Schryen, M. Volkamer, S. Ries, in: Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.","bibtex":"@inproceedings{Schryen_Volkamer_Ries_2011, title={A formal approach towards measuring trust in distributed systems}, booktitle={Proceedings of the 26th Annual ACM Symposium on Applied Computing}, author={Schryen, Guido and Volkamer, Melanie and Ries, Sebastian}, year={2011} }","mla":"Schryen, Guido, et al. “A Formal Approach towards Measuring Trust in Distributed Systems.” <i>Proceedings of the 26th Annual ACM Symposium on Applied Computing</i>, 2011.","apa":"Schryen, G., Volkamer, M., &#38; Ries, S. (2011). A formal approach towards measuring trust in distributed systems. In <i>Proceedings of the 26th Annual ACM Symposium on Applied Computing</i>.","ieee":"G. Schryen, M. Volkamer, and S. Ries, “A formal approach towards measuring trust in distributed systems,” in <i>Proceedings of the 26th Annual ACM Symposium on Applied Computing</i>, 2011.","chicago":"Schryen, Guido, Melanie Volkamer, and Sebastian Ries. “A Formal Approach towards Measuring Trust in Distributed Systems.” In <i>Proceedings of the 26th Annual ACM Symposium on Applied Computing</i>, 2011.","ama":"Schryen G, Volkamer M, Ries S. A formal approach towards measuring trust in distributed systems. In: <i>Proceedings of the 26th Annual ACM Symposium on Applied Computing</i>. ; 2011."},"year":"2011","user_id":"61579","department":[{"_id":"277"}],"_id":"5619","file_date_updated":"2018-12-13T15:16:04Z","extern":"1","language":[{"iso":"eng"}],"ddc":["000"],"type":"conference","publication":"Proceedings of the 26th Annual ACM Symposium on Applied Computing","file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-11T15:06:53Z","date_updated":"2018-12-13T15:16:04Z","access_level":"open_access","file_name":"p1739-schryen.pdf","file_id":"6183","file_size":453557}],"status":"public"},{"file":[{"creator":"hsiemes","date_created":"2018-12-11T15:03:56Z","date_updated":"2018-12-13T15:15:42Z","file_id":"6181","access_level":"open_access","file_name":"CACM article.pdf","file_size":1020040,"content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"journal_article","publication":"Communications of the ACM (CACM)","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:15:42Z","extern":"1","ddc":["000"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5640","citation":{"mla":"Schryen, Guido. “Is Open Source Security a Myth? What Do Vulnerability and Patch Data Say?” <i>Communications of the ACM (CACM)</i>, vol. Vol. 54, no. No. 5, Association for Computing Machinery, 2011, pp. 130–39.","short":"G. Schryen, Communications of the ACM (CACM) Vol. 54 (2011) 130–139.","bibtex":"@article{Schryen_2011, title={Is open source security a myth? What do vulnerability and patch data say?}, volume={Vol. 54}, number={No. 5}, journal={Communications of the ACM (CACM)}, publisher={Association for Computing Machinery}, author={Schryen, Guido}, year={2011}, pages={130–139} }","apa":"Schryen, G. (2011). Is open source security a myth? What do vulnerability and patch data say? <i>Communications of the ACM (CACM)</i>, <i>Vol. 54</i>(No. 5), 130–139.","ama":"Schryen G. Is open source security a myth? What do vulnerability and patch data say? <i>Communications of the ACM (CACM)</i>. 2011;Vol. 54(No. 5):130-139.","chicago":"Schryen, Guido. “Is Open Source Security a Myth? What Do Vulnerability and Patch Data Say?” <i>Communications of the ACM (CACM)</i> Vol. 54, no. No. 5 (2011): 130–39.","ieee":"G. Schryen, “Is open source security a myth? What do vulnerability and patch data say?,” <i>Communications of the ACM (CACM)</i>, vol. Vol. 54, no. No. 5, pp. 130–139, 2011."},"page":"130-139","year":"2011","issue":"No. 5","has_accepted_license":"1","title":"Is open source security a myth? What do vulnerability and patch data say?","author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"date_created":"2018-11-14T14:34:54Z","volume":"Vol. 54","date_updated":"2022-01-06T07:02:17Z","publisher":"Association for Computing Machinery","oa":"1"},{"citation":{"apa":"Schryen, G. (2011). Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In <i>IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki</i>.","mla":"Schryen, Guido. “Seeking the VALUE in IS Business Value Research - An Agenda for Investigating Synergies Between Socio-Organizational Change, IS Capabilities Change, and IS Innovation.” <i>IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki</i>, 2011.","bibtex":"@inproceedings{Schryen_2011, title={Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation}, booktitle={IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki}, author={Schryen, Guido}, year={2011} }","short":"G. Schryen, in: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.","chicago":"Schryen, Guido. “Seeking the VALUE in IS Business Value Research - An Agenda for Investigating Synergies Between Socio-Organizational Change, IS Capabilities Change, and IS Innovation.” In <i>IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki</i>, 2011.","ieee":"G. Schryen, “Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation,” in <i>IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki</i>, 2011.","ama":"Schryen G. Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In: <i>IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki</i>. ; 2011."},"year":"2011","has_accepted_license":"1","title":"Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation","date_created":"2018-11-14T14:35:30Z","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"date_updated":"2022-01-06T07:02:18Z","oa":"1","file":[{"date_updated":"2018-12-13T15:16:26Z","creator":"hsiemes","date_created":"2018-12-11T15:07:46Z","file_size":291468,"access_level":"open_access","file_name":"REVISION - Seeking the value in IS value research.pdf","file_id":"6184","content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"conference","publication":"IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:16:26Z","extern":"1","ddc":["000"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5641"},{"year":"2010","citation":{"bibtex":"@inproceedings{Finkbeiner_Bodenstein_Schryen_Neumann_2010, title={Applying heuristic methods for job scheduling in storage markets}, booktitle={18th European Conference on Information Systems (ECIS 2010)}, author={Finkbeiner, Josef and Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2010} }","mla":"Finkbeiner, Josef, et al. “Applying Heuristic Methods for Job Scheduling in Storage Markets.” <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","short":"J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.","apa":"Finkbeiner, J., Bodenstein, C., Schryen, G., &#38; Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In <i>18th European Conference on Information Systems (ECIS 2010)</i>.","ieee":"J. Finkbeiner, C. Bodenstein, G. Schryen, and D. Neumann, “Applying heuristic methods for job scheduling in storage markets,” in <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","chicago":"Finkbeiner, Josef, Christian Bodenstein, Guido Schryen, and Dirk Neumann. “Applying Heuristic Methods for Job Scheduling in Storage Markets.” In <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","ama":"Finkbeiner J, Bodenstein C, Schryen G, Neumann D. Applying heuristic methods for job scheduling in storage markets. In: <i>18th European Conference on Information Systems (ECIS 2010)</i>. ; 2010."},"has_accepted_license":"1","title":"Applying heuristic methods for job scheduling in storage markets","oa":"1","date_updated":"2022-01-06T07:02:32Z","date_created":"2018-11-14T15:45:11Z","author":[{"full_name":"Finkbeiner, Josef","last_name":"Finkbeiner","first_name":"Josef"},{"first_name":"Christian","full_name":"Bodenstein, Christian","last_name":"Bodenstein"},{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"full_name":"Neumann, Dirk","last_name":"Neumann","first_name":"Dirk"}],"abstract":[{"text":"In double-sided markets for computing resources an optimal allocation schedule among job offers and requests subject to relevant capacity constraints can be determined. With increasing storage demands and emerging storage services the question how to schedule storage jobs becomes more and more interesting. Since such scheduling problems are often in the class NP-complete an exact computation is not feasible in practice. On the other hand an approximation to the optimal solution can easily be found by means of using heuristics. The problem with this attempt is that the suggested solution may not be exactly optimal and is thus less satisfying. Considering the two above mentioned solution approaches one can clearly find a trade-off between the optimality of the solution and the efficiency to get to a solution at all. This work proposes to apply and combine heuristics in optimization to gain from both of their benefits while reducing the problematic aspects. Following this method it is assumed to get closer to the optimal solution in a shorter time compared to a full optimization.","lang":"eng"}],"status":"public","file":[{"access_level":"open_access","file_name":"s1-ln7055316-1881058806-1939656818Hwf-1884822883IdV-5442784107055316PDF_HI0001.pdf","file_id":"6188","file_size":171336,"date_created":"2018-12-11T15:21:06Z","creator":"hsiemes","date_updated":"2018-12-13T15:19:40Z","relation":"main_file","content_type":"application/pdf"}],"publication":"18th European Conference on Information Systems (ECIS 2010)","type":"conference","keyword":["Decision Support System","Algorithms","Optimization","Market Engineering"],"ddc":["000"],"extern":"1","file_date_updated":"2018-12-13T15:19:40Z","language":[{"iso":"eng"}],"_id":"5685","department":[{"_id":"277"}],"user_id":"61579"},{"_id":"5690","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"keyword":["Posted Price","Ultimatum Game","Energy Efficiency","Mechanism Design"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:20:13Z","extern":"1","type":"conference","publication":"18th European Conference on Information Systems (ECIS 2010)","abstract":[{"lang":"eng","text":"In a world, where more and more businesses seem to trade in an online market, the supply of online services to supply the ever-growing demand could quickly reach its capacity limits. Online service providers may find themselves maxed out at peak operation levels during high-traffic timeslots but too little demand during low-traffic timeslots, although the latter is becoming less frequent. At this point not only deciding which user is allocated what level of service becomes essential, but also the magnitude of the service provided, can be controlled by pricing. Pricing is an important factor when efficient and acceptable allocation of resources between individuals must be reached. Without prices, transferring or sharing goods would be impossible. In sharing information, pricing a product however is not as simple as relatively pricing an apple or a pear. Often the costs, and hence the prices are simply unknown. Backed by this scenario, the online services market could be combined with the market design mechanism of diamonds. For this we propose an ultimatum pricing strategy which effectively allows for valuations to be accounted for, but no longer a necessity when pricing in grid, cloud or other online computing environments."}],"file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-13T15:20:13Z","date_created":"2018-12-11T15:22:41Z","creator":"hsiemes","file_size":247621,"file_id":"6191","access_level":"open_access","file_name":"Take it or leave it - ECIS - Proof.pdf"}],"status":"public","date_updated":"2022-01-06T07:02:34Z","oa":"1","author":[{"first_name":"Christian","last_name":"Bodenstein","full_name":"Bodenstein, Christian"},{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"full_name":"Neumann, Dirk","last_name":"Neumann","first_name":"Dirk"}],"date_created":"2018-11-14T15:48:39Z","title":"From \"Take-it-or-leave-it\" offers to \"Take-it-or-be-left-out\" Ultimatum - A trade mechanism for Online Services","has_accepted_license":"1","year":"2010","citation":{"ama":"Bodenstein C, Schryen G, Neumann D. From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In: <i>18th European Conference on Information Systems (ECIS 2010)</i>. ; 2010.","ieee":"C. Bodenstein, G. Schryen, and D. Neumann, “From ‘Take-it-or-leave-it’ offers to ‘Take-it-or-be-left-out’ Ultimatum - A trade mechanism for Online Services,” in <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","chicago":"Bodenstein, Christian, Guido Schryen, and Dirk Neumann. “From ‘Take-It-or-Leave-It’ Offers to ‘Take-It-or-Be-Left-out’ Ultimatum - A Trade Mechanism for Online Services.” In <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","apa":"Bodenstein, C., Schryen, G., &#38; Neumann, D. (2010). From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In <i>18th European Conference on Information Systems (ECIS 2010)</i>.","short":"C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.","bibtex":"@inproceedings{Bodenstein_Schryen_Neumann_2010, title={From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services}, booktitle={18th European Conference on Information Systems (ECIS 2010)}, author={Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2010} }","mla":"Bodenstein, Christian, et al. “From ‘Take-It-or-Leave-It’ Offers to ‘Take-It-or-Be-Left-out’ Ultimatum - A Trade Mechanism for Online Services.” <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010."}},{"_id":"5598","department":[{"_id":"277"}],"user_id":"61579","keyword":["distributed trust concepts","measuring etrust","Internet voting"],"ddc":["000"],"extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:16:50Z","publication":"Proceedings of the 23rd Bled eConference","type":"conference","abstract":[{"text":"Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia.","lang":"eng"}],"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-11T15:14:05Z","creator":"hsiemes","date_updated":"2018-12-13T15:16:50Z","file_name":"06_Schryen.pdf","file_id":"6185","access_level":"open_access","file_size":243413}],"oa":"1","date_updated":"2022-01-06T07:02:06Z","author":[{"full_name":"Volkamer, Melanie","last_name":"Volkamer","first_name":"Melanie"},{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"date_created":"2018-11-14T11:49:50Z","title":"Measuring eTrust in distributed systems - General Concept and Application to Internet Voting","has_accepted_license":"1","year":"2010","citation":{"ama":"Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: <i>Proceedings of the 23rd Bled EConference</i>. ; 2010.","chicago":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” In <i>Proceedings of the 23rd Bled EConference</i>, 2010.","ieee":"M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General Concept and Application to Internet Voting,” in <i>Proceedings of the 23rd Bled eConference</i>, 2010.","bibtex":"@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}, booktitle={Proceedings of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido}, year={2010} }","short":"M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.","mla":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” <i>Proceedings of the 23rd Bled EConference</i>, 2010.","apa":"Volkamer, M., &#38; Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In <i>Proceedings of the 23rd Bled eConference</i>."}},{"year":"2010","citation":{"chicago":"Schryen, Guido, and Rich Eliot. “Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest That We Have Asked the Wrong Question.” In <i>43rd Annual Hawaii International Conference on System Sciences</i>, 2010.","ieee":"G. Schryen and R. Eliot, “Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question,” in <i>43rd Annual Hawaii International Conference on System Sciences</i>, 2010.","ama":"Schryen G, Eliot R. Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In: <i>43rd Annual Hawaii International Conference on System Sciences</i>. ; 2010.","apa":"Schryen, G., &#38; Eliot, R. (2010). Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In <i>43rd Annual Hawaii International Conference on System Sciences</i>.","bibtex":"@inproceedings{Schryen_Eliot_2010, title={Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question}, booktitle={43rd Annual Hawaii International Conference on System Sciences}, author={Schryen, Guido and Eliot, Rich}, year={2010} }","short":"G. Schryen, R. Eliot, in: 43rd Annual Hawaii International Conference on System Sciences, 2010.","mla":"Schryen, Guido, and Rich Eliot. “Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest That We Have Asked the Wrong Question.” <i>43rd Annual Hawaii International Conference on System Sciences</i>, 2010."},"has_accepted_license":"1","title":"Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question","oa":"1","date_updated":"2022-01-06T07:02:14Z","author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"},{"first_name":"Rich","full_name":"Eliot, Rich","last_name":"Eliot"}],"date_created":"2018-11-14T14:23:45Z","abstract":[{"text":"While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments and the development of models is still weak. Addressing this research gap, this paper presents the first comprehensive empirical investigation of published vulnerabilities and patches of 17 widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. The empirical analysis uses comprehensive vulnerability data contained in the NIST National Vulnerability Database and a newly compiled data set of vulnerability patches. The results suggest that it is not the particular software development style that determines the severity of vulnerabilities and vendors? patching behavior, but rather the specific application type and the policy of the particular development community, respectively.","lang":"eng"}],"status":"public","file":[{"access_level":"open_access","file_id":"6192","file_name":"vendors behavior - UPDATED IEEE version.pdf","file_size":299380,"creator":"hsiemes","date_created":"2018-12-11T15:23:33Z","date_updated":"2018-12-13T15:20:23Z","relation":"main_file","content_type":"application/pdf"}],"publication":"43rd Annual Hawaii International Conference on System Sciences","type":"conference","ddc":["000"],"file_date_updated":"2018-12-13T15:20:23Z","language":[{"iso":"eng"}],"extern":"1","_id":"5631","department":[{"_id":"277"}],"user_id":"61579"},{"author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"},{"first_name":"Christian","full_name":"Bodenstein, Christian","last_name":"Bodenstein"}],"date_created":"2018-11-14T14:24:25Z","date_updated":"2022-01-06T07:02:14Z","oa":"1","title":"A decision-theoretic foundation of IS business value research","has_accepted_license":"1","citation":{"ama":"Schryen G, Bodenstein C. A decision-theoretic foundation of IS business value research. In: <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>. ; 2010.","ieee":"G. Schryen and C. Bodenstein, “A decision-theoretic foundation of IS business value research,” in <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","chicago":"Schryen, Guido, and Christian Bodenstein. “A Decision-Theoretic Foundation of IS Business Value Research.” In <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","short":"G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.","bibtex":"@inproceedings{Schryen_Bodenstein_2010, title={A decision-theoretic foundation of IS business value research}, booktitle={Proceedings of the 18th European Conference on Information Systems (ECIS 2010)}, author={Schryen, Guido and Bodenstein, Christian}, year={2010} }","mla":"Schryen, Guido, and Christian Bodenstein. “A Decision-Theoretic Foundation of IS Business Value Research.” <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","apa":"Schryen, G., &#38; Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>."},"year":"2010","department":[{"_id":"277"}],"user_id":"61579","_id":"5632","extern":"1","file_date_updated":"2018-12-13T15:20:37Z","language":[{"iso":"eng"}],"keyword":["Decision theory","IT value","IS assessment","IS evaluation"],"ddc":["000"],"publication":"Proceedings of the 18th European Conference on Information Systems (ECIS 2010)","type":"conference","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-13T15:20:37Z","date_created":"2018-12-11T15:24:22Z","creator":"hsiemes","file_size":174368,"access_level":"open_access","file_id":"6193","file_name":"IS business value - ECIS - Final Version.pdf"}],"abstract":[{"lang":"eng","text":"Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. Three research tasks are essential requisites on the path towards addressing this criticism: the synthesis of knowledge, the identification of lack of knowledge, and the proposition of paths for closing knowledge gaps. This paper considers each of these tasks by a) synthesizing key research findings based on a comprehensive literature review, b) identifying and unfolding key limitations of current research, and c) applying a decision-theoretic perspective, which opens new horizons to IS business value research and shows paths for overcoming the limitations. The adoption of this perspective results in a decision-theoretic foundation of IS business value research and includes the proposition of a consistent terminology and a research model that frames further research."}]},{"status":"public","editor":[{"last_name":"C. Freiling","full_name":"C. Freiling, Felix","first_name":"Felix"}],"type":"conference","extern":"1","file_date_updated":"2018-12-13T15:20:03Z","department":[{"_id":"277"}],"user_id":"61579","series_title":"GI-Edition: lecture notes in informatics. Proceedings","_id":"5642","intvolume":"       170","page":"289-304","citation":{"apa":"Schryen, G. (2010). A Fuzzy Model for IT Security Investments. In F. C. Freiling (Ed.), <i>Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\\\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin</i> (Vol. 170, pp. 289–304). Bonn: Gesellschaft für Informatik.","bibtex":"@inproceedings{Schryen_2010, place={Bonn}, series={GI-Edition: lecture notes in informatics. Proceedings}, title={A Fuzzy Model for IT Security Investments}, volume={170}, booktitle={Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\\\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin}, publisher={Gesellschaft für Informatik}, author={Schryen, Guido}, editor={C. Freiling, FelixEditor}, year={2010}, pages={289–304}, collection={GI-Edition: lecture notes in informatics. Proceedings} }","short":"G. Schryen, in: F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\\\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, Gesellschaft für Informatik, Bonn, 2010, pp. 289–304.","mla":"Schryen, Guido. “A Fuzzy Model for IT Security Investments.” <i>Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\\\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin</i>, edited by Felix C. Freiling, vol. 170, Gesellschaft für Informatik, 2010, pp. 289–304.","ama":"Schryen G. A Fuzzy Model for IT Security Investments. In: C. Freiling F, ed. <i>Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\\\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin</i>. Vol 170. GI-Edition: lecture notes in informatics. Proceedings. Bonn: Gesellschaft für Informatik; 2010:289-304.","chicago":"Schryen, Guido. “A Fuzzy Model for IT Security Investments.” In <i>Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\\\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin</i>, edited by Felix C. Freiling, 170:289–304. GI-Edition: Lecture Notes in Informatics. Proceedings. Bonn: Gesellschaft für Informatik, 2010.","ieee":"G. Schryen, “A Fuzzy Model for IT Security Investments,” in <i>Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\\\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin</i>, 2010, vol. 170, pp. 289–304."},"place":"Bonn","has_accepted_license":"1","volume":170,"author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"}],"oa":"1","date_updated":"2022-01-06T07:02:18Z","file":[{"date_updated":"2018-12-13T15:20:03Z","date_created":"2018-12-11T15:22:12Z","creator":"hsiemes","file_size":372660,"file_id":"6190","file_name":"security_fuzzy_LNI Version.pdf","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"abstract":[{"text":"This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed model is complementary to robabilistic approaches and useful in situations where probabilistic information is either unavailable or not appropriate to reliably predict future conditions. We ?rst present the speci?cation of a formal security language that allows to specify under which conditions a distributed system is protected against security violations. We show that each term of the security language can be transformed into an equivalent propositional logic term. Then we use propositional logic terms to de?ne a fuzzy set based decision model. This optimization model incorporates uncertainty with regard to the impact of investments on the achieved security levels of components of the distributed system. The model also accounts for budget and security constraints, in order to be applicable in practice.","lang":"eng"}],"publication":"Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\\\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\\\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin","language":[{"iso":"eng"}],"ddc":["000"],"year":"2010","title":"A Fuzzy Model for IT Security Investments","date_created":"2018-11-14T14:35:59Z","publisher":"Gesellschaft für Informatik"},{"title":"An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness","date_created":"2018-11-14T14:36:26Z","author":[{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"}],"oa":"1","date_updated":"2022-01-06T07:02:18Z","citation":{"ieee":"G. Schryen, “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness,” in <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>, 2010.","chicago":"Schryen, Guido. “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness.” In <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>, 2010.","ama":"Schryen G. An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In: <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>. ; 2010.","short":"G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.","mla":"Schryen, Guido. “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness.” <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>, 2010.","bibtex":"@inproceedings{Schryen_2010, title={An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness}, booktitle={Proceedings of the First Scandinavian Conference on Information Systems (SCIS)}, author={Schryen, Guido}, year={2010} }","apa":"Schryen, G. (2010). An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>."},"year":"2010","has_accepted_license":"1","extern":"1","file_date_updated":"2018-12-13T15:17:00Z","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Literature review","Business value","Information systems","Methodology","Theory"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5643","file":[{"creator":"hsiemes","date_created":"2018-12-11T15:14:51Z","date_updated":"2018-12-13T15:17:00Z","file_name":"2010_Book_ScandinavianInformationSystems - Schryen.pdf","access_level":"open_access","file_id":"6186","file_size":302340,"content_type":"application/pdf","relation":"main_file"}],"status":"public","abstract":[{"text":"Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research.","lang":"eng"}],"type":"conference","publication":"Proceedings of the First Scandinavian Conference on Information Systems (SCIS)"},{"page":"225-237","intvolume":"        52","citation":{"apa":"Schryen, G. (2010). Preserving knowledge on IS business value: what literature reviews have done. <i>Business \\&#38; Information Systems Engineering (BISE)</i>, <i>52</i>(4), 225–237.","bibtex":"@article{Schryen_2010, title={Preserving knowledge on IS business value: what literature reviews have done}, volume={52}, number={4}, journal={Business \\&#38; Information Systems Engineering (BISE)}, publisher={Springer}, author={Schryen, Guido}, year={2010}, pages={225–237} }","short":"G. Schryen, Business \\&#38; Information Systems Engineering (BISE) 52 (2010) 225–237.","mla":"Schryen, Guido. “Preserving Knowledge on IS Business Value: What Literature Reviews Have Done.” <i>Business \\&#38; Information Systems Engineering (BISE)</i>, vol. 52, no. 4, Springer, 2010, pp. 225–37.","ama":"Schryen G. Preserving knowledge on IS business value: what literature reviews have done. <i>Business \\&#38; Information Systems Engineering (BISE)</i>. 2010;52(4):225-237.","ieee":"G. Schryen, “Preserving knowledge on IS business value: what literature reviews have done,” <i>Business \\&#38; Information Systems Engineering (BISE)</i>, vol. 52, no. 4, pp. 225–237, 2010.","chicago":"Schryen, Guido. “Preserving Knowledge on IS Business Value: What Literature Reviews Have Done.” <i>Business \\&#38; Information Systems Engineering (BISE)</i> 52, no. 4 (2010): 225–37."},"has_accepted_license":"1","volume":52,"author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"oa":"1","date_updated":"2022-01-06T07:02:19Z","status":"public","type":"journal_article","file_date_updated":"2018-12-13T15:17:12Z","extern":"1","department":[{"_id":"277"}],"user_id":"61579","_id":"5644","year":"2010","issue":"4","title":"Preserving knowledge on IS business value: what literature reviews have done","date_created":"2018-11-14T14:38:02Z","publisher":"Springer","file":[{"relation":"main_file","content_type":"application/pdf","file_size":525443,"file_name":"BISE-PreservingknowledgeonISbusinessvalue-Manuscript-1.pdf","access_level":"open_access","file_id":"6187","date_updated":"2018-12-13T15:17:12Z","date_created":"2018-12-11T15:19:37Z","creator":"hsiemes"}],"abstract":[{"lang":"eng","text":"The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 90s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research."}],"publication":"Business \\& Information Systems Engineering (BISE)","language":[{"iso":"eng"}],"keyword":["Business value","Information systems","Literature review","Meta review"],"ddc":["000"]},{"has_accepted_license":"1","page":"225-237","intvolume":"        52","citation":{"apa":"Schryen, G. (2010). Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). <i>Wirtschaftsinformatik</i>, <i>52</i>(4), 225–237.","bibtex":"@article{Schryen_2010, title={Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done)}, volume={52}, number={4}, journal={Wirtschaftsinformatik}, publisher={Gabler; Springer}, author={Schryen, Guido}, year={2010}, pages={225–237} }","short":"G. Schryen, Wirtschaftsinformatik 52 (2010) 225–237.","mla":"Schryen, Guido. “Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews Zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done).” <i>Wirtschaftsinformatik</i>, vol. 52, no. 4, Gabler; Springer, 2010, pp. 225–37.","ama":"Schryen G. Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). <i>Wirtschaftsinformatik</i>. 2010;52(4):225-237.","chicago":"Schryen, Guido. “Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews Zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done).” <i>Wirtschaftsinformatik</i> 52, no. 4 (2010): 225–37.","ieee":"G. Schryen, “Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done),” <i>Wirtschaftsinformatik</i>, vol. 52, no. 4, pp. 225–237, 2010."},"date_updated":"2022-01-06T07:02:19Z","oa":"1","volume":52,"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"type":"journal_article","status":"public","_id":"5645","department":[{"_id":"277"}],"user_id":"61579","file_date_updated":"2018-12-13T15:19:50Z","extern":"1","issue":"4","year":"2010","publisher":"Gabler; Springer","date_created":"2018-11-14T14:38:45Z","title":"Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done)","publication":"Wirtschaftsinformatik","abstract":[{"text":"The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 1990s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-11T15:21:36Z","date_updated":"2018-12-13T15:19:50Z","file_id":"6189","access_level":"open_access","file_name":"Schryen2010_Article_ÖkonomischerWertVonInformation.pdf","file_size":850718}],"ddc":["000"],"language":[{"iso":"eng"}]},{"type":"conference","publication":"Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung","abstract":[{"text":"Der Beitrag diskutiert die kontroversen Ans{\\\"a}tze ? Verifizierung versus Evaluation/Zertifizierung ? zur Sicherung elektronischer Wahlen mit Wahlger{\\\"a}ten. Dabei spielt das Urteils des Bundesverfassungsgerichts [BVG099] eine zentrale Rolle. Hierin wird entschieden, dass die Zertifizierung des Wahlger{\\\"a}tes nicht ausreicht und es werden Verifizierungsfunktionen gefordert, die den W{\\\"a}hlern die M{\\\"o}glichkeit geben sich von der Integrit{\\\"a}t des Wahlergebnisses zu {\\\"u}berzeugen. Der Beitrag zeigt auf, dass auch mit der Implementierung entsprechender Verifizierungsfunktionen nicht auf Zertifizierung verzichtet werden kann, da an ein Wahlger{\\\"a}t auch andere Anforderungen wie etwa hinsichtlich des Wahlgeheimnisses gestellt werden. Es wird au{\\ss}erdem die Frage diskutiert, warum der Zertifizierung hinsichtlich dieser zus{\\\"a}tzlichen Anforderungen vertraut werden kann, w{\\\"a}hrend dies nicht der Fall bei der Integrit{\\\"a}tsanforderung ist.","lang":"eng"}],"file":[{"file_size":60870,"access_level":"open_access","file_id":"6313","file_name":"Elektronische Wahlen - GI 2009.pdf","date_updated":"2018-12-18T13:15:26Z","date_created":"2018-12-18T13:15:26Z","creator":"hsiemes","relation":"main_file","content_type":"application/pdf"}],"status":"public","_id":"5597","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"file_date_updated":"2018-12-18T13:15:26Z","extern":"1","language":[{"iso":"eng"}],"has_accepted_license":"1","year":"2009","citation":{"ama":"Volkamer M, Schryen G, Langer L, Schmidt A, Buchmann J. Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: <i>Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>. ; 2009.","ieee":"M. Volkamer, G. Schryen, L. Langer, A. Schmidt, and J. Buchmann, “Elektronische Wahlen: Verifizierung vs. Zertifizierung,” in <i>Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>, 2009.","chicago":"Volkamer, Melanie, Guido Schryen, Lucie Langer, Axel Schmidt, and Johannes Buchmann. “Elektronische Wahlen: Verifizierung vs. Zertifizierung.” In <i>Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>, 2009.","apa":"Volkamer, M., Schryen, G., Langer, L., Schmidt, A., &#38; Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In <i>Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>.","short":"M. Volkamer, G. Schryen, L. Langer, A. Schmidt, J. Buchmann, in: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.","mla":"Volkamer, Melanie, et al. “Elektronische Wahlen: Verifizierung vs. Zertifizierung.” <i>Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>, 2009.","bibtex":"@inproceedings{Volkamer_Schryen_Langer_Schmidt_Buchmann_2009, title={Elektronische Wahlen: Verifizierung vs. Zertifizierung}, booktitle={Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung}, author={Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes}, year={2009} }"},"oa":"1","date_updated":"2022-01-06T07:02:05Z","date_created":"2018-11-14T11:49:04Z","author":[{"last_name":"Volkamer","full_name":"Volkamer, Melanie","first_name":"Melanie"},{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"},{"first_name":"Lucie","full_name":"Langer, Lucie","last_name":"Langer"},{"full_name":"Schmidt, Axel","last_name":"Schmidt","first_name":"Axel"},{"full_name":"Buchmann, Johannes","last_name":"Buchmann","first_name":"Johannes"}],"title":"Elektronische Wahlen: Verifizierung vs. Zertifizierung"}]
