--- _id: '5560' author: - first_name: C full_name: Schwens, C last_name: Schwens - first_name: Rüdiger full_name: Kabst, Rüdiger id: '42362' last_name: Kabst citation: ama: 'Schwens C, Kabst R. How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation. International Business Review (IBR). 2009;18(5):509-522.' apa: 'Schwens, C., & Kabst, R. (2009). How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation. International Business Review (IBR), 18(5), 509–522.' bibtex: '@article{Schwens_Kabst_2009, title={How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation.}, volume={18}, number={5}, journal={ International Business Review (IBR)}, author={Schwens, C and Kabst, Rüdiger}, year={2009}, pages={509–522} }' chicago: 'Schwens, C, and Rüdiger Kabst. “How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation.” International Business Review (IBR) 18, no. 5 (2009): 509–22.' ieee: 'C. Schwens and R. Kabst, “How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation.,” International Business Review (IBR), vol. 18, no. 5, pp. 509–522, 2009.' mla: 'Schwens, C., and Rüdiger Kabst. “How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation.” International Business Review (IBR), vol. 18, no. 5, 2009, pp. 509–22.' short: C. Schwens, R. Kabst, International Business Review (IBR) 18 (2009) 509–522. date_created: 2018-11-14T10:10:58Z date_updated: 2022-01-06T07:01:59Z department: - _id: '274' intvolume: ' 18' issue: '5' language: - iso: eng page: 509-522 publication: ' International Business Review (IBR)' status: public title: 'How Early Opposed to Late Internationalizers Learn: Experience of Others and Paradigms of Interpretation.' type: journal_article user_id: '46632' volume: 18 year: '2009' ... --- _id: '5561' author: - first_name: M full_name: Baum, M last_name: Baum - first_name: C full_name: Schwens, C last_name: Schwens - first_name: Rüdiger full_name: Kabst, Rüdiger id: '42362' last_name: Kabst citation: ama: 'Baum M, Schwens C, Kabst R. Internationalisierung junger Technologieunternehmen: Der moderierende Einfluss der „Liabilities of Foreignness.“. Zeitschrift für Betriebswirtschaft (ZfB) . 2009;79(6):87-112.' apa: 'Baum, M., Schwens, C., & Kabst, R. (2009). Internationalisierung junger Technologieunternehmen: Der moderierende Einfluss der „Liabilities of Foreignness.“. Zeitschrift Für Betriebswirtschaft (ZfB). , 79(6), 87–112.' bibtex: '@article{Baum_Schwens_Kabst_2009, title={Internationalisierung junger Technologieunternehmen: Der moderierende Einfluss der „Liabilities of Foreignness.“}, volume={79}, number={6}, journal={Zeitschrift für Betriebswirtschaft (ZfB). }, author={Baum, M and Schwens, C and Kabst, Rüdiger}, year={2009}, pages={87–112} }' chicago: 'Baum, M, C Schwens, and Rüdiger Kabst. “Internationalisierung Junger Technologieunternehmen: Der Moderierende Einfluss Der „Liabilities of Foreignness.“.” Zeitschrift Für Betriebswirtschaft (ZfB). 79, no. 6 (2009): 87–112.' ieee: 'M. Baum, C. Schwens, and R. Kabst, “Internationalisierung junger Technologieunternehmen: Der moderierende Einfluss der „Liabilities of Foreignness.“,” Zeitschrift für Betriebswirtschaft (ZfB). , vol. 79, no. 6, pp. 87–112, 2009.' mla: 'Baum, M., et al. “Internationalisierung Junger Technologieunternehmen: Der Moderierende Einfluss Der „Liabilities of Foreignness.“.” Zeitschrift Für Betriebswirtschaft (ZfB). , vol. 79, no. 6, 2009, pp. 87–112.' short: M. Baum, C. Schwens, R. Kabst, Zeitschrift Für Betriebswirtschaft (ZfB). 79 (2009) 87–112. date_created: 2018-11-14T10:12:46Z date_updated: 2022-01-06T07:01:59Z department: - _id: '274' intvolume: ' 79' issue: '6' language: - iso: eng page: 87-112 publication: 'Zeitschrift für Betriebswirtschaft (ZfB). ' status: public title: 'Internationalisierung junger Technologieunternehmen: Der moderierende Einfluss der „Liabilities of Foreignness.“' type: journal_article user_id: '46632' volume: 79 year: '2009' ... --- _id: '5562' author: - first_name: S full_name: Strohmeier, S last_name: Strohmeier - first_name: Rüdiger full_name: Kabst, Rüdiger id: '42362' last_name: Kabst citation: ama: 'Strohmeier S, Kabst R. Organisational adoption of e-HRM in Europe: An empirical exploration of major adoption factors. . Journal of Managerial Psychology . 2009;24(6):482-501.' apa: 'Strohmeier, S., & Kabst, R. (2009). Organisational adoption of e-HRM in Europe: An empirical exploration of major adoption factors. . Journal of Managerial Psychology. , 24(6), 482–501.' bibtex: '@article{Strohmeier_Kabst_2009, title={Organisational adoption of e-HRM in Europe: An empirical exploration of major adoption factors. }, volume={24}, number={6}, journal={Journal of Managerial Psychology. }, author={Strohmeier, S and Kabst, Rüdiger}, year={2009}, pages={482–501} }' chicago: 'Strohmeier, S, and Rüdiger Kabst. “Organisational Adoption of E-HRM in Europe: An Empirical Exploration of Major Adoption Factors. .” Journal of Managerial Psychology. 24, no. 6 (2009): 482–501.' ieee: 'S. Strohmeier and R. Kabst, “Organisational adoption of e-HRM in Europe: An empirical exploration of major adoption factors. ,” Journal of Managerial Psychology. , vol. 24, no. 6, pp. 482–501, 2009.' mla: 'Strohmeier, S., and Rüdiger Kabst. “Organisational Adoption of E-HRM in Europe: An Empirical Exploration of Major Adoption Factors. .” Journal of Managerial Psychology. , vol. 24, no. 6, 2009, pp. 482–501.' short: S. Strohmeier, R. Kabst, Journal of Managerial Psychology. 24 (2009) 482–501. date_created: 2018-11-14T10:14:12Z date_updated: 2022-01-06T07:01:59Z department: - _id: '274' intvolume: ' 24' issue: '6' language: - iso: eng page: 482-501 publication: 'Journal of Managerial Psychology. ' status: public title: 'Organisational adoption of e-HRM in Europe: An empirical exploration of major adoption factors. ' type: journal_article user_id: '46632' volume: 24 year: '2009' ... --- _id: '5564' author: - first_name: Y K full_name: Park, Y K last_name: Park - first_name: Rüdiger full_name: Kabst, Rüdiger id: '42362' last_name: Kabst - first_name: Holger full_name: Steinmetz, Holger id: '43261' last_name: Steinmetz - first_name: M full_name: Turner, M last_name: Turner citation: ama: 'Park YK, Kabst R, Steinmetz H, Turner M. Organizational Commitment und Job Involvement in Deutschland und Südkorea: Eine bedürfnisorientierte empirische Analyse. Managementforschung . 2009;19:1-30.' apa: 'Park, Y. K., Kabst, R., Steinmetz, H., & Turner, M. (2009). Organizational Commitment und Job Involvement in Deutschland und Südkorea: Eine bedürfnisorientierte empirische Analyse. Managementforschung. , 19, 1–30.' bibtex: '@article{Park_Kabst_Steinmetz_Turner_2009, title={Organizational Commitment und Job Involvement in Deutschland und Südkorea: Eine bedürfnisorientierte empirische Analyse.}, volume={19}, journal={Managementforschung. }, author={Park, Y K and Kabst, Rüdiger and Steinmetz, Holger and Turner, M}, year={2009}, pages={1–30} }' chicago: 'Park, Y K, Rüdiger Kabst, Holger Steinmetz, and M Turner. “Organizational Commitment Und Job Involvement in Deutschland Und Südkorea: Eine Bedürfnisorientierte Empirische Analyse.” Managementforschung. 19 (2009): 1–30.' ieee: 'Y. K. Park, R. Kabst, H. Steinmetz, and M. Turner, “Organizational Commitment und Job Involvement in Deutschland und Südkorea: Eine bedürfnisorientierte empirische Analyse.,” Managementforschung. , vol. 19, pp. 1–30, 2009.' mla: 'Park, Y. K., et al. “Organizational Commitment Und Job Involvement in Deutschland Und Südkorea: Eine Bedürfnisorientierte Empirische Analyse.” Managementforschung. , vol. 19, 2009, pp. 1–30.' short: Y.K. Park, R. Kabst, H. Steinmetz, M. Turner, Managementforschung. 19 (2009) 1–30. date_created: 2018-11-14T10:26:51Z date_updated: 2022-01-06T07:01:59Z department: - _id: '274' intvolume: ' 19' language: - iso: eng page: 1-30 publication: 'Managementforschung. ' status: public title: 'Organizational Commitment und Job Involvement in Deutschland und Südkorea: Eine bedürfnisorientierte empirische Analyse.' type: journal_article user_id: '46632' volume: 19 year: '2009' ... --- _id: '5566' author: - first_name: H full_name: Steinmetz, H last_name: Steinmetz - first_name: P full_name: Schmidt, P last_name: Schmidt - first_name: A full_name: Tina-Booh, A last_name: Tina-Booh - first_name: S H full_name: Schwartz, S H last_name: Schwartz - first_name: S full_name: Wieczorek, S last_name: Wieczorek citation: ama: 'Steinmetz H, Schmidt P, Tina-Booh A, Schwartz SH, Wieczorek S. Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement. Quality and Quantity . 2009;43(4):599-616.' apa: 'Steinmetz, H., Schmidt, P., Tina-Booh, A., Schwartz, S. H., & Wieczorek, S. (2009). Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement. Quality and Quantity. , 43(4), 599–616.' bibtex: '@article{Steinmetz_Schmidt_Tina-Booh_Schwartz_Wieczorek_2009, title={Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement.}, volume={43}, number={4}, journal={Quality and Quantity. }, author={Steinmetz, H and Schmidt, P and Tina-Booh, A and Schwartz, S H and Wieczorek, S}, year={2009}, pages={599–616} }' chicago: 'Steinmetz, H, P Schmidt, A Tina-Booh, S H Schwartz, and S Wieczorek. “Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement.” Quality and Quantity. 43, no. 4 (2009): 599–616.' ieee: 'H. Steinmetz, P. Schmidt, A. Tina-Booh, S. H. Schwartz, and S. Wieczorek, “Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement.,” Quality and Quantity. , vol. 43, no. 4, pp. 599–616, 2009.' mla: 'Steinmetz, H., et al. “Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement.” Quality and Quantity. , vol. 43, no. 4, 2009, pp. 599–616.' short: H. Steinmetz, P. Schmidt, A. Tina-Booh, S.H. Schwartz, S. Wieczorek, Quality and Quantity. 43 (2009) 599–616. date_created: 2018-11-14T10:47:28Z date_updated: 2022-01-06T07:01:59Z department: - _id: '274' intvolume: ' 43' issue: '4' language: - iso: eng page: 599-616 publication: 'Quality and Quantity. ' status: public title: 'Testing Measurement Invariance Using Multigroup CFA: Differences between Educational Groups in Human Values Measurement.' type: journal_article user_id: '46632' volume: 43 year: '2009' ... --- _id: '5567' author: - first_name: N full_name: Beck, N last_name: Beck - first_name: Rüdiger full_name: Kabst, Rüdiger id: '42362' last_name: Kabst - first_name: P full_name: Walgenbach, P last_name: Walgenbach citation: ama: Beck N, Kabst R, Walgenbach P. The Cultural Dependence of Vocational Training. Journal of International Business Studies (JIBS) . 2009;40:1374-1395. apa: Beck, N., Kabst, R., & Walgenbach, P. (2009). The Cultural Dependence of Vocational Training. Journal of International Business Studies (JIBS). , 40, 1374–1395. bibtex: '@article{Beck_Kabst_Walgenbach_2009, title={The Cultural Dependence of Vocational Training.}, volume={40}, journal={Journal of International Business Studies (JIBS). }, author={Beck, N and Kabst, Rüdiger and Walgenbach, P}, year={2009}, pages={1374–1395} }' chicago: 'Beck, N, Rüdiger Kabst, and P Walgenbach. “The Cultural Dependence of Vocational Training.” Journal of International Business Studies (JIBS). 40 (2009): 1374–95.' ieee: N. Beck, R. Kabst, and P. Walgenbach, “The Cultural Dependence of Vocational Training.,” Journal of International Business Studies (JIBS). , vol. 40, pp. 1374–1395, 2009. mla: Beck, N., et al. “The Cultural Dependence of Vocational Training.” Journal of International Business Studies (JIBS). , vol. 40, 2009, pp. 1374–95. short: N. Beck, R. Kabst, P. Walgenbach, Journal of International Business Studies (JIBS). 40 (2009) 1374–1395. date_created: 2018-11-14T10:51:49Z date_updated: 2022-01-06T07:01:59Z department: - _id: '274' intvolume: ' 40' language: - iso: eng page: 1374-1395 publication: 'Journal of International Business Studies (JIBS). ' status: public title: The Cultural Dependence of Vocational Training. type: journal_article user_id: '46632' volume: 40 year: '2009' ... --- _id: '5597' abstract: - lang: eng text: Der Beitrag diskutiert die kontroversen Ans{\"a}tze ? Verifizierung versus Evaluation/Zertifizierung ? zur Sicherung elektronischer Wahlen mit Wahlger{\"a}ten. Dabei spielt das Urteils des Bundesverfassungsgerichts [BVG099] eine zentrale Rolle. Hierin wird entschieden, dass die Zertifizierung des Wahlger{\"a}tes nicht ausreicht und es werden Verifizierungsfunktionen gefordert, die den W{\"a}hlern die M{\"o}glichkeit geben sich von der Integrit{\"a}t des Wahlergebnisses zu {\"u}berzeugen. Der Beitrag zeigt auf, dass auch mit der Implementierung entsprechender Verifizierungsfunktionen nicht auf Zertifizierung verzichtet werden kann, da an ein Wahlger{\"a}t auch andere Anforderungen wie etwa hinsichtlich des Wahlgeheimnisses gestellt werden. Es wird au{\ss}erdem die Frage diskutiert, warum der Zertifizierung hinsichtlich dieser zus{\"a}tzlichen Anforderungen vertraut werden kann, w{\"a}hrend dies nicht der Fall bei der Integrit{\"a}tsanforderung ist. author: - first_name: Melanie full_name: Volkamer, Melanie last_name: Volkamer - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen - first_name: Lucie full_name: Langer, Lucie last_name: Langer - first_name: Axel full_name: Schmidt, Axel last_name: Schmidt - first_name: Johannes full_name: Buchmann, Johannes last_name: Buchmann citation: ama: 'Volkamer M, Schryen G, Langer L, Schmidt A, Buchmann J. Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung. ; 2009.' apa: 'Volkamer, M., Schryen, G., Langer, L., Schmidt, A., & Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung.' bibtex: '@inproceedings{Volkamer_Schryen_Langer_Schmidt_Buchmann_2009, title={Elektronische Wahlen: Verifizierung vs. Zertifizierung}, booktitle={Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung}, author={Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes}, year={2009} }' chicago: 'Volkamer, Melanie, Guido Schryen, Lucie Langer, Axel Schmidt, and Johannes Buchmann. “Elektronische Wahlen: Verifizierung vs. Zertifizierung.” In Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.' ieee: 'M. Volkamer, G. Schryen, L. Langer, A. Schmidt, and J. Buchmann, “Elektronische Wahlen: Verifizierung vs. Zertifizierung,” in Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.' mla: 'Volkamer, Melanie, et al. “Elektronische Wahlen: Verifizierung vs. Zertifizierung.” Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.' short: 'M. Volkamer, G. Schryen, L. Langer, A. Schmidt, J. Buchmann, in: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.' date_created: 2018-11-14T11:49:04Z date_updated: 2022-01-06T07:02:05Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:15:26Z date_updated: 2018-12-18T13:15:26Z file_id: '6313' file_name: Elektronische Wahlen - GI 2009.pdf file_size: 60870 relation: main_file file_date_updated: 2018-12-18T13:15:26Z has_accepted_license: '1' language: - iso: eng oa: '1' publication: Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung status: public title: 'Elektronische Wahlen: Verifizierung vs. Zertifizierung' type: conference user_id: '61579' year: '2009' ... --- _id: '5621' abstract: - lang: eng text: Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence. author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen - first_name: Eliot full_name: Rich, Eliot last_name: Rich citation: ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security. 2009;4(4 Part):729-744.' apa: 'Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.' bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \& Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }' chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” IEEE Transactions on Information Forensics \& Security 4, no. 4 Part (2009): 729–44.' ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” IEEE Transactions on Information Forensics \& Security, vol. 4, no. 4 Part, pp. 729–744, 2009.' mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” IEEE Transactions on Information Forensics \& Security, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.' short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744. date_created: 2018-11-14T14:06:44Z date_updated: 2022-01-06T07:02:12Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:16:07Z date_updated: 2018-12-18T13:16:07Z file_id: '6316' file_name: JOURNAL VERSION.pdf file_size: 1544790 relation: main_file file_date_updated: 2018-12-18T13:16:07Z has_accepted_license: '1' intvolume: ' 4' issue: 4 Part keyword: - e-voting - Internet voting - Internet election - security - verifiability - RIES - Estonia - Neuch{\^a}tel language: - iso: eng oa: '1' page: 729-744 publication: IEEE Transactions on Information Forensics \& Security publisher: IEEE status: public title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland' type: journal_article user_id: '61579' volume: 4 year: '2009' ... --- _id: '5625' abstract: - lang: eng text: The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who are interested in exploiting software vulnerabilities. This deployment has resulted in a debate ?full of religion? on the security of open source software compared to that of closed source software. However, beyond such arguments, only little quantitative analysis on this research issue has taken place. We discuss the state-of-the-art of the security debate and identify shortcomings. Based on these, we propose new metrics, which allows to answer the question to what extent the review process of open source and closed source development has helped to fix vulnerabilities. We illustrate the application of some of these metrics in a case study on OpenOffice (open source software) vs. Microsoft Office (closed source software). author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen - first_name: Rouven full_name: Kadura, Rouven last_name: Kadura citation: ama: 'Schryen G, Kadura R. Open Source vs. Closed Source Software: Towards Measuring Security. In: 24th Annual ACM Symposium on Applied Computing. ; 2009.' apa: 'Schryen, G., & Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In 24th Annual ACM Symposium on Applied Computing.' bibtex: '@inproceedings{Schryen_Kadura_2009, title={Open Source vs. Closed Source Software: Towards Measuring Security}, booktitle={24th Annual ACM Symposium on Applied Computing}, author={Schryen, Guido and Kadura, Rouven}, year={2009} }' chicago: 'Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software: Towards Measuring Security.” In 24th Annual ACM Symposium on Applied Computing, 2009.' ieee: 'G. Schryen and R. Kadura, “Open Source vs. Closed Source Software: Towards Measuring Security,” in 24th Annual ACM Symposium on Applied Computing, 2009.' mla: 'Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software: Towards Measuring Security.” 24th Annual ACM Symposium on Applied Computing, 2009.' short: 'G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.' date_created: 2018-11-14T14:12:27Z date_updated: 2022-01-06T07:02:13Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:14:09Z date_updated: 2018-12-18T13:14:09Z file_id: '6310' file_name: ACM VERSION.pdf file_size: 456497 relation: main_file file_date_updated: 2018-12-18T13:14:09Z has_accepted_license: '1' keyword: - Open source software - Closed source software - Security - Metrics language: - iso: eng oa: '1' publication: 24th Annual ACM Symposium on Applied Computing status: public title: 'Open Source vs. Closed Source Software: Towards Measuring Security' type: conference user_id: '61579' year: '2009' ... --- _id: '5646' abstract: - lang: eng text: While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments is still weak. Addressing this research gap, this paper presents a comprehensive empirical investigation of the patching behavior of software vendors/communities of widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. As the value of any empirical study relies on the quality of data available, this paper also discusses in detail data issues, explains to what extent the empirical analysis can be based on vulnerability data contained in the NIST National Vulnerability Database, and shows how data on vulnerability patches was collected by the author to support this study. The results of the analysis suggest that it is not the particular software development style that determines patching behavior, but rather the policy of the particular software vendor. author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Schryen G. A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: 5th International Conference on IT Security Incident Management \& IT Forensics. ; 2009.' apa: Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In 5th International Conference on IT Security Incident Management \& IT Forensics. bibtex: '@inproceedings{Schryen_2009, title={A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors}, booktitle={5th International Conference on IT Security Incident Management \& IT Forensics}, author={Schryen, Guido}, year={2009} }' chicago: Schryen, Guido. “A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.” In 5th International Conference on IT Security Incident Management \& IT Forensics, 2009. ieee: G. Schryen, “A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors,” in 5th International Conference on IT Security Incident Management \& IT Forensics, 2009. mla: Schryen, Guido. “A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.” 5th International Conference on IT Security Incident Management \& IT Forensics, 2009. short: 'G. Schryen, in: 5th International Conference on IT Security Incident Management \& IT Forensics, 2009.' date_created: 2018-11-14T14:40:04Z date_updated: 2022-01-06T07:02:19Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:14:48Z date_updated: 2018-12-18T13:14:48Z file_id: '6311' file_name: Conference Version.pdf file_size: 594302 relation: main_file file_date_updated: 2018-12-18T13:14:48Z has_accepted_license: '1' language: - iso: eng oa: '1' publication: 5th International Conference on IT Security Incident Management \& IT Forensics status: public title: A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors type: conference user_id: '61579' year: '2009' ...