TY - CHAP AB - Die in den letzten 25 Jahren weltweit und in Europa in den letzten zehn Jahren forcierte Liberalisierung der Telekommunikationsbranche stellt ein bemerkenswertes Beispiel für den erfolgreichen Wandel ordnungspolitischer Rahmenbedingungen dar. Die Erfolge dieser Reformprozesse sowie die daraus resultierenden institutionellen Lernprozesse waren auch für die übrigen netzgebundenen Industrien wie z.B. Energiewirtschaft, Bahn oder Post wegweisend. Thema dieses Aufsatzes ist das Spannungsfeld zwischen der Vermeidung von Diskriminierungsanreizen durch vertikale Separierung, möglichen Effizienzgewinnen und adäquaten Investitionsanreizen. Im Folgenden werden sowohl theoretische Grundlagen netzgebundener Industrien im Allgemeinen als auch theoretische Argumente für oder gegen eine vertikale Integration netzgebundener Industrien diskutiert. Die theoretischen Argumente werden anschließend beispielhaft auf den Bahnsektor, die Energiewirtschaft sowie die Wasserwirtschaft angewendet. AU - Haucap, Justus AU - Heimeshoff, Ulrich AU - Uhde, André ID - 5217 T2 - Gesellschaft für öffentliche Wirtschaft TI - Vertikale Entflechtung netzgebundener Industrien: Kosten und Nutzen aus ökonomischer Sicht ER - TY - JOUR AU - Broll, Udo AU - Gilroy, Bernard Michael AU - Lukas, Elmar ID - 5370 IS - 01 JF - Annals of Financial Economics TI - Managing Credit Risk with Credit Derivatives VL - 3 ER - TY - JOUR AU - Broll, Udo AU - Gilroy, Bernard Michael AU - Lukas, Elmar ID - 5373 IS - 01 JF - Annals of Financial Economics TI - Managing Credit Risk with Credit Derivatives VL - 3 ER - TY - JOUR AU - Kabst, Rüdiger ID - 5572 IS - 4 JF - Korean Journal of Economics. TI - A Different View to Atypical Work: Interim Management. VL - 25 ER - TY - JOUR AU - Weller, I AU - Kabst, Rüdiger ID - 5574 IS - 3 JF - Die Betriebswirtschaft (DBW). TI - Determinanten des Downsizings: Eine empirische Analyse mit den Daten des Cranfield Project on International HRM. VL - 67 ER - TY - JOUR AU - Koenig, C AU - Steinmetz, Holger AU - Frese, M AU - Rauch, A AU - Wang, Z M ID - 5577 JF - Journal of Evolutionary Economics. TI - Scenario-based scales measuring cultural orientations of business owners. VL - 17 ER - TY - CHAP AU - Schryen, Guido ED - Satesh, D. ED - Prabhakar, R. ID - 5650 T2 - Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research TI - A Scalable and Flexible Infrastructure Framework For Addressing Spam ER - TY - BOOK AU - Schryen, Guido ID - 5651 TI - Anti-Spam Measures: Analysis and Design ER - TY - JOUR AB - More than half of world-wide e-mail traffic ? an estimated total of several billion e-mails per day ? consists of spam. This is becoming a considerable disturbance to telecommunications. Spam is also closely related to other kinds of cyber crime as it possibly contains malicious software or is pursuing some kind of fraudulent aim, such as phishing. Besides technical and organizational measures, many countries have introduced anti-spam legislation. However, today's world-wide legislative coverage of spam is heterogeneous, and its effectiveness is controversially discussed. This article describes important parameters by which anti-spam legislation can vary and gives an overview and analysis of world-wide anti-spam legislation, including the European Directive 2002/58/EC, the U.S. CANSPAM Act of 2003, and international cooperation, such as the London Action Plan. The article then proceeds to discuss the effectiveness of current laws, and it identifies problems resulting from the fact that an international phenomenon is being addressed by national legislation. Finally, the article presents suggestions for overcoming some of these problems. AU - Schryen, Guido ID - 5652 IS - 1 JF - Information and Communications Technology Law TI - Anti-spam legislation: An analysis of laws and their effectiveness VL - 16 ER - TY - CHAP AU - Schryen, Guido ED - Satesh, D. ED - Prabhakar, R. ID - 5653 T2 - Spam: An Introduction TI - Approaches Addressing Spam ER - TY - CONF AB - Spamming remains a form of Internet abuse, which burdens the Internet infrastructure, is generally regarded as an annoyance, and is said to cause economic harm to the tune of about several billion US\$ per year. Many technological, organizational, and legislative anti-spam measures have already been proposed and implemented, but have not led to any substantial decrease in the number of spam e-mails. We propose here a new infrastructure framework that combines several anti-spam measures in a framework that features both a technological and an organizational facet. The key element of our infrastructure is a new organizational unit that reliably and transparently limits he number of e-mails that can be sent per day and per account. This paper first gives an overview of the framework, then it provides technological and organizational details of the infrastructure, the deployment of which depends to a large degree on its acceptance and propagation by the ICANN, the ISOC, and by large e-mail service providers. Finally, the paper discusses the limitations and drawbacks of the proposed framework. AU - Schryen, Guido ID - 5654 T2 - 40th Annual Hawaii International Conference on System Sciences TI - Armed for the spam battle - a technological and organizational infrastructure framework ER - TY - JOUR AB - Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment. AU - Schryen, Guido ID - 5655 IS - 2 JF - The Journal of Information Systems Security (AIS Special Interest Group in Security) KW - e-mail KW - spam KW - e-mail infrastructure KW - anti-spam measures KW - spamming options TI - Do anti-spam measures effectively cover the e-mail communication network? A formal approach VL - 3 ER - TY - CHAP AU - Schryen, Guido ED - Schulte, Heinz ID - 5656 T2 - Vom LAN zum Kommunikationsnetz - Systeme und Applikationen TI - Location Based Services ER - TY - CHAP AU - Schryen, Guido ED - Schulte, Heinz ID - 5657 T2 - Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Edition 02/2007 TI - Spam-Emails VL - 9/12 ER - TY - JOUR AB - Email communication is encumbered with a mass of email messages which their recipients have neither requested nor require. Even worse, the impacts of these messages are far from being simply an annoyance, as they also involve economic damage. This manuscript examines the resource ?email addresses?, which is vital for any potential bulk mailer and spammer. Both a methodology and a honeypot conceptualization for implementing an empirical analysis of the usage of email addresses placed on the Internet are proposed here. Their objective is to assess, on a quantitative basis, the extent of the current harassment and its development over time. This ?framework? is intended to be extensible to measuring the effectiveness of address-obscuring techniques. The implementation of a pilot honeypot is described, which led to key findings, some of them being: (1) Web placements attract more than two-thirds (70\%) of all honeypot spam emails, followed by newsgroup placements (28.6\%) and newsletter subscriptions (1.4\%), (2) the proportions of spam relating to the email addresses? top-level domain can be statistically assumed to be uniformly distributed, (3) More than 43\% of addresses on the web have been abused, whereas about 27\% was the case for addresses on newsgroups and only about 4\% was the case for addresses used for a newsletter subscription, (4) Regarding the development of email addresses? attractiveness for spammers over time, the service ?web sites? features a negative linear relationship, whereas the service ?Usenet? hows a negative exponential relationship. (5) Only 1.54\% of the spam emails showed an interrelation between the topic of the spam email and that of the location where the recipient?s address was placed, so that spammers are assumed to send their emails in a ?context insensitive? manner. The results of the empirical analysis motivate the need for the protection of email addresses through obscuration. We analyze this need by formulating requirements for address obscuring techniques and we reveal to which extent today?s most relevant approaches fulfill these requirements. AU - Schryen, Guido ID - 5658 IS - 5 JF - Computers & Security KW - Address-obfuscating techniques KW - email KW - empirical analysis KW - honeypot KW - security by design KW - security by obscurity KW - spam TI - The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis VL - 2 ER - TY - GEN AU - Gries, Thomas AU - Prior, Ulrich AU - Sureth-Sloane, Caren ID - 14939 TI - Taxation of Risky Investment and Paradoxical Investor Behavior VL - 26 ER - TY - GEN AU - Maiterth, Ralf AU - Sureth-Sloane, Caren ID - 14941 TI - Aufkommenswirkungen des Erbschaftsteuerreformvorschlags der CDU/CSU-Mittelstandsvereinigung ER - TY - JOUR AU - Müller, Jens ID - 14942 JF - FinanzBetrieb TI - Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften VL - 9 ER - TY - GEN AU - Müller, Heiko AU - Sureth-Sloane, Caren ID - 14943 TI - Group Simulation and Income Tax Statistics - How Big is the Error? VL - 24 ER - TY - GEN AU - Müller, Jens ID - 14944 TI - Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse der Werttreiber von Steuer- und Marktwerten VL - 25 ER - TY - CHAP AU - Sureth-Sloane, Caren ED - Allinger, Hanjo ED - Beckmann, Klaus ID - 14945 T2 - Festzeitschrift zur Emeritierung von Reinar Lüdeke: Regeln rationaler Finanzpolitik und ihre Anwendung TI - Investitionswirkungen von Übergangsregelungen bei Steuerreformen ER - TY - BOOK ED - Krallmann, Hermann ED - Schönherr, Marten ED - Trier, Matthias ID - 13202 SN - 978-3486584462 TI - Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik ER - TY - BOOK AU - Trier, Matthias ID - 13314 SN - 3836415402, 9783836415408 TI - Virtual Knowledge Communities - IT-supported Visualization and Analysis ER - TY - CHAP AU - Aier, Stephan AU - Haarlaender, Nico ED - Krallmann, Hermann ED - Schoenherr, Marten ED - Trier, Matthias ID - 13315 T2 - Systemanalyse im Unternehmen : Prozessorientierte Methoden der Wirtschaftsinformatik TI - Systemanalyse zur Verbesserung von Geschäftsprozessen VL - 5., vollst. überarb. Aufl. ER - TY - CONF AU - Herzog, Michael A. AU - Trier, Matthias ID - 13355 T2 - Proceedings Wirtschaftsinformatik 2007 TI - Generische Transformation von Learning-Content - Das MOCCA-Projekt VL - 2 ER - TY - CONF AU - Trier, Matthias AU - Bobrik, Annette AU - Bartels, Tilmann ID - 13357 T2 - Proceedings Wirtschaftsinformatik 2007 TI - Towards Understanding the Dynamics of Digital Communication Networks VL - 2 ER - TY - CONF AU - Luther, Michael AU - Trier, Matthias ID - 13362 T2 - Proceedings Wirtschaftsinformatik 2007 TI - Ein Ansatz zur prozessorientierten Evaluation von Learning Management Systemen VL - 2 ER - TY - CONF AB - IRIS (Information Systems Research in Scandinavia) Conference is an annual meeting for researchers in Scandinavia. Through 29 annual conference meetings a social network of co-authorships and general research collaboration has emerged. This article contributes a historical reflection and analysis of the social network of researchers associated with the IRIS in the period from 1978 to 2006. We make use of the network visualization and analysis tool called Commetrix. We will examine the influence of certain researchers in this network by identifying their betweenness centrality and degree centrality. We will reflect on the nature and characteristic of the research topics by analyzing the network of keywords found in the conference paper titles, and visualizing their representation in the network. AU - Molka-Danielsen, Judith AU - Trier, Matthias AU - Shlyk, Vadim AU - Bobrik, Annette AU - Nurminen, Markku I. ID - 13367 T2 - Proceedings of IRIS30, Tampere, 2007 TI - IRIS (1978-2006) Historical Reflection through Visual Analysis ER - TY - CHAP AU - Trier, Matthias ED - Herzog, Michael A. ID - 13370 T2 - Content Engineering TI - Content und Kommunikation: Von der Dichotomie zur Kombination ER - TY - CHAP AU - Trier, Matthias AU - Bobrik, A. ED - Krallmann , Hermann ED - Schönherr, Marten ED - Trier, Matthias ID - 13379 T2 - Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik TI - Systemanalyse im Wissensmanagement ER - TY - CHAP AU - Krallmann, Hermann AU - Trier, Matthias ED - Krallmann, Hermann ED - Schönherr, Marten ED - Trier, Matthias ID - 13380 KW - Prozessorientierung Systemanalyse Wirtschaftsinformatik ITeG_233 T2 - Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik TI - Systemanalyse ER - TY - CHAP AU - Trier, Matthias AU - Bobrik, A. AU - Neumann, N. AU - Wyssussek, B. ED - Krallmann, Hermann ED - Schönherr, Marten ED - Trier, Matthias ID - 13381 T2 - Systemanalyse im Unternehmen – Prozessorientierte Methoden in der Wirtschaftsinformatik TI - Systemtheorie und Modell ER - TY - CHAP AU - Bobrik, A. AU - Trier, Matthias ED - Krallmann, Hermann ED - Schönherr, Marten ED - Trier, Matthias ID - 13382 T2 - Systemanalyse im Unternehmen – Prozessorientierte Methoden in der Wirtschaftsinformatik TI - Modellüberblick ER - TY - CHAP AU - Frank, H. AU - Trier, Matthias ED - Krallmann, Hermann ED - Schönherr, Marten ED - Trier, Matthias ID - 13383 T2 - Systemanalyse im Unternehmen – Prozessorientierte Methoden in der Wirtschaftsinformatik TI - Projektmanagement ER - TY - CHAP AU - Bobrik, A. AU - Trier, Matthias ED - Müller, Claudia ED - Gronau, Norbert ID - 13384 T2 - Analyse sozialer Netzwerke und Social Software - Grundlagen und Anwendungsbeispiele TI - IT-gestützte Visualisierung und Analyse von virtuellen Kontaktnetzwerken - Anwendungsfelder, Methodik und Vorteile ER - TY - JOUR AU - Lück, Sonja ID - 31820 IS - 2 JF - Hochschulmanagement SN - 1860-3025 TI - Studentische Lehrevaluation im Rahmen neuer Studienstrukturen VL - 2 ER - TY - THES AU - Uhde, André ID - 36040 SN - 978-3-937519-67-8 TI - Selbstregulierungspotenzial in der Kreditwirtschaft : eine vertragstheoretische und evolutionsökonomische Analyse ER - TY - JOUR AU - Hertle, Eva AU - Nordhoff, Daniel AU - Sloane, Peter F. E. AU - Sureth-Sloane, Caren ID - 14940 IS - 4 JF - Zeitschrift für Berufs- und Wirtschaftspädagogik TI - CHE-Rating: Beschäftigungsfähigkeit (Employability) deutscher Bachelor-Absolventen: Das Fatale daran ist das Fatale darin! VL - 103 ER - TY - JOUR AU - Sureth-Sloane, Caren AU - Langeleh, Dirk ID - 14947 IS - 4 JF - Schmalenbach Business Review TI - The Degree of Integrating Corporate and Capital Gains Tax into Income Tax and Its Impact on Investment Decisions VL - 59 ER - TY - THES AU - Solbach, Fabian ID - 50339 TI - Anwendungspotenzial fuzzybasierter Kosten- und Investitionsentscheidungen im Projektmanagement ER - TY - JOUR AU - Schnedler, Wendelin AU - Oechssler, Jörg AU - Schmidt, Carsten ID - 5789 JF - Journal of Economic Dynamics and Control TI - On the Ingredients of Bubble Formation: Informed Traders and Communication ER - TY - JOUR AU - Schnedler, Wendelin AU - Friebel, Guido ID - 5787 JF - Journal of Economic Behavior & Organization TI - Team Governance: Empowerment or Hierarchical Control ER - TY - JOUR AU - Schnedler, Wendelin ID - 5788 JF - German Economic Review TI - You Don't Always Get What You Pay For ER - TY - JOUR AU - Haake, Claus-Jochen AU - Klaus, Bettina AU - Dimitrov, Dinko ID - 2498 IS - 1 JF - Economics Letters TI - Bundling in exchange markets with indivisible goods VL - 93 ER - TY - JOUR AU - Dimitrov, Dinko AU - Haake, Claus-Jochen ID - 2500 IS - 2 JF - Journal of Economics SN - 0931-8658 TI - Government versus Opposition: Who Should be Who in the 16th German Bundestag? VL - 89 ER - TY - CHAP AU - Betz, Stefan ED - Betz, Stefan ID - 2597 T2 - E-Business im industriellen Management - Theoretische Fundierung und praktische Umsetzung im Mittelstand TI - Auswahl einer E-Procurement-Strategie als betriebswirtschaftliches Entscheidungsproblem ER - TY - BOOK ED - Betz, Stefan ID - 2598 TI - E-Business im industriellen Management - Theoretische Fundierung und praktische Umsetzung im Mittelstand ER - TY - CHAP AU - Betz, Stefan ED - Betz, Stefan ID - 2599 T2 - E-Business im industriellen Management - Theoretische Fundierung und praktische Umsetzung im Mittelstand TI - Fuzzyfizierte Deckungsbeitragsrechnung für Produkte auf elektronischen Märkten ER - TY - CONF AU - Mueller, Jens ED - Bayar, Ali ID - 3705 T2 - EcoMod 2006 TI - How to close the value gap between market and tax values ER - TY - BOOK AU - Sureth-Sloane, Caren ID - 22915 SN - 9783835002685 TI - Steuerreformen und Übergangsprobleme bei Beteiligungsinvestitionen ER -