@inproceedings{5598, abstract = {{Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia.}}, author = {{Volkamer, Melanie and Schryen, Guido}}, booktitle = {{Proceedings of the 23rd Bled eConference}}, keywords = {{distributed trust concepts, measuring etrust, Internet voting}}, title = {{{Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}}}, year = {{2010}}, } @inproceedings{5631, abstract = {{While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments and the development of models is still weak. Addressing this research gap, this paper presents the first comprehensive empirical investigation of published vulnerabilities and patches of 17 widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. The empirical analysis uses comprehensive vulnerability data contained in the NIST National Vulnerability Database and a newly compiled data set of vulnerability patches. The results suggest that it is not the particular software development style that determines the severity of vulnerabilities and vendors? patching behavior, but rather the specific application type and the policy of the particular development community, respectively.}}, author = {{Schryen, Guido and Eliot, Rich}}, booktitle = {{43rd Annual Hawaii International Conference on System Sciences}}, title = {{{Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question}}}, year = {{2010}}, } @inproceedings{5632, abstract = {{Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. Three research tasks are essential requisites on the path towards addressing this criticism: the synthesis of knowledge, the identification of lack of knowledge, and the proposition of paths for closing knowledge gaps. This paper considers each of these tasks by a) synthesizing key research findings based on a comprehensive literature review, b) identifying and unfolding key limitations of current research, and c) applying a decision-theoretic perspective, which opens new horizons to IS business value research and shows paths for overcoming the limitations. The adoption of this perspective results in a decision-theoretic foundation of IS business value research and includes the proposition of a consistent terminology and a research model that frames further research.}}, author = {{Schryen, Guido and Bodenstein, Christian}}, booktitle = {{Proceedings of the 18th European Conference on Information Systems (ECIS 2010)}}, keywords = {{Decision theory, IT value, IS assessment, IS evaluation}}, title = {{{A decision-theoretic foundation of IS business value research}}}, year = {{2010}}, } @inproceedings{5642, abstract = {{This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed model is complementary to robabilistic approaches and useful in situations where probabilistic information is either unavailable or not appropriate to reliably predict future conditions. We ?rst present the speci?cation of a formal security language that allows to specify under which conditions a distributed system is protected against security violations. We show that each term of the security language can be transformed into an equivalent propositional logic term. Then we use propositional logic terms to de?ne a fuzzy set based decision model. This optimization model incorporates uncertainty with regard to the impact of investments on the achieved security levels of components of the distributed system. The model also accounts for budget and security constraints, in order to be applicable in practice.}}, author = {{Schryen, Guido}}, booktitle = {{Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin}}, editor = {{C. Freiling, Felix}}, pages = {{289--304}}, publisher = {{Gesellschaft für Informatik}}, title = {{{A Fuzzy Model for IT Security Investments}}}, volume = {{170}}, year = {{2010}}, } @inproceedings{5643, abstract = {{Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research.}}, author = {{Schryen, Guido}}, booktitle = {{Proceedings of the First Scandinavian Conference on Information Systems (SCIS)}}, keywords = {{Literature review, Business value, Information systems, Methodology, Theory}}, title = {{{An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness}}}, year = {{2010}}, } @article{5644, abstract = {{The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 90s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.}}, author = {{Schryen, Guido}}, journal = {{Business \& Information Systems Engineering (BISE)}}, keywords = {{Business value, Information systems, Literature review, Meta review}}, number = {{4}}, pages = {{225--237}}, publisher = {{Springer}}, title = {{{Preserving knowledge on IS business value: what literature reviews have done}}}, volume = {{52}}, year = {{2010}}, } @article{5645, abstract = {{The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 1990s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.}}, author = {{Schryen, Guido}}, journal = {{Wirtschaftsinformatik}}, number = {{4}}, pages = {{225--237}}, publisher = {{Gabler; Springer}}, title = {{{Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done)}}}, volume = {{52}}, year = {{2010}}, } @article{6475, author = {{Ertl, H. and Kremer, H.-Hugo}}, issn = {{1802-4637}}, journal = {{Orbis Scholae, Educational Change in the global context}}, pages = {{133--149}}, title = {{{Educational change and innovative teaching practice: a study of the impact of reforms on the work of lectures in vocational education and training in England and Germany}}}, year = {{2010}}, } @inbook{6476, author = {{Kremer, H.-Hugo and Zoyke, A.}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, pages = {{9--28}}, title = {{{Individuelle Förderung zur Kompetenzentwicklung in der beruflichen Bildung - Überlegungen zur Grundlegung eines Forschungs- und Entwicklungsbereichs}}}, year = {{2010}}, } @inbook{6477, author = {{Kremer, H.-Hugo}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, pages = {{29--54}}, title = {{{Neue Medien als Katalysator individueller Förderung in der Berufsbildung}}}, year = {{2010}}, } @inbook{6478, author = {{Kremer, H.-Hugo and Zoyke, A.}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, pages = {{71--122}}, title = {{{Individuelle Förderung im Reha-Vorbereitungslehrgang für besondere Zielgruppen - Entwicklung und Erprobung didaktisch-methodischer Reformsätze}}}, year = {{2010}}, } @inbook{6479, author = {{de Groot, C. and Kremer, H.-Hugo and Zoyke, A.}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, pages = {{123--144}}, title = {{{Individuelle Förderplanung - Rezeption und Einsatz im Übergangssystem}}}, year = {{2010}}, } @inbook{6480, author = {{Kremer, H.-Hugo}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, pages = {{145--164}}, title = {{{Berufsorientierung als Herausforderung und Chance für die schulisch strukturierten Bildungsgänge des Übergangssystems}}}, year = {{2010}}, } @inbook{6531, author = {{Kremer, H.-Hugo and Rüschen, E.}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, editor = {{Kremer, H.-Hugo and Zoyke, A.}}, pages = {{165--184}}, title = {{{Wie der Übergang gelingen kann - Empirische Explorationen zur beruflichen Orientierung von Jugendlichen im Übergangssystem}}}, year = {{2010}}, } @inbook{6546, author = {{Beutner, Marc and Kremer, H.-Hugo}}, booktitle = {{Individuelle Förderung in der beruflichen Bildung. Grundlegung und Annäherung im Kontext von Forschungs- und Entwicklungsprojekten}}, editor = {{Kremer, H.-Hugo and Zoyke, A.}}, pages = {{185--2014}}, title = {{{Kollektivstrukturen als Gestaltungselemente in der wirtschaftspädagogischen Begleitforschung }}}, year = {{2010}}, } @inbook{6841, author = {{Pferdt, F. G. and Kremer, H.-Hugo}}, booktitle = {{Jahrbuch Medienpädagogik 8. Medienkompetenz und Web 2.0}}, editor = {{Herzig, B. and Meister, D.M. and Moser, H. and Niesyto, H.}}, pages = {{289--309}}, title = {{{Berufliches Lernen mit Web 2.0 - Medienkompetenz und berufliche Handlungskompetenz im Duell?}}}, year = {{2010}}, } @inbook{6844, author = {{Buschfeld, D. and Kremer, H.-Hugo}}, booktitle = {{Handbuch Berufs- und Wirtschaftspädagogik}}, editor = {{Nickolaus, R. and Pätzold, G. and Reinisch, H. and Tramm, T.}}, pages = {{242--247}}, title = {{{Implementation von Curricula am Beispiel der Lernfeldinnovation}}}, year = {{2010}}, } @inbook{6845, author = {{Kremer, H.-Hugo}}, booktitle = {{Bildung und Unterricht in Zeiten von Google und Wikipedia}}, editor = {{Gauger, J.-D. and Kraus, J.}}, pages = {{59--88}}, title = {{{Bildung in Zeiten neuer Medien aus berufs- und wirtschaftspädagogischer Perspektive}}}, year = {{2010}}, } @article{6848, author = {{Kremer, H.-Hugo and Gebbe, M. and Wirth, W.}}, journal = {{Bewährungshilfe. Soziales - Strafrecht - Kriminalpolitik}}, number = {{1}}, pages = {{29--41}}, title = {{{Tandem: Ausbildungsfähigkeit von Gefangenen und Gewaltprävention im Strafvollzug}}}, year = {{2010}}, } @article{6849, author = {{Kremer, H.-Hugo and Frehe, Petra}}, journal = {{Wirtschaft und Erziehung}}, pages = {{395--399}}, title = {{{Individuelle Förderung - aber wie? Einblicke in das Innovationsprojekt InLab}}}, year = {{2010}}, }