---
_id: '4994'
author:
- first_name: Dorothea
  full_name: Alewell, Dorothea
  last_name: Alewell
- first_name: Katrin
  full_name: Bähring, Katrin
  last_name: Bähring
- first_name: Anne
  full_name: Canis, Anne
  last_name: Canis
- first_name: Sven
  full_name: Hauff, Sven
  last_name: Hauff
- first_name: Kirsten
  full_name: Thommes, Kirsten
  id: '72497'
  last_name: Thommes
citation:
  ama: Alewell D, Bähring K, Canis A, Hauff S, Thommes K. Outsourcing von Personalfunktionen.
    <i>Motive und Erfahrungen im Spiegel von Experteninterviews</i>. 2007;14(1):85.
  apa: Alewell, D., Bähring, K., Canis, A., Hauff, S., &#38; Thommes, K. (2007). Outsourcing
    von Personalfunktionen. <i>Motive und Erfahrungen im Spiegel von Experteninterviews</i>,
    <i>14</i>(1), 85.
  bibtex: '@article{Alewell_Bähring_Canis_Hauff_Thommes_2007, title={Outsourcing von
    Personalfunktionen}, volume={14}, number={1}, journal={Motive und Erfahrungen
    im Spiegel von Experteninterviews}, author={Alewell, Dorothea and Bähring, Katrin
    and Canis, Anne and Hauff, Sven and Thommes, Kirsten}, year={2007}, pages={85}
    }'
  chicago: 'Alewell, Dorothea, Katrin Bähring, Anne Canis, Sven Hauff, and Kirsten
    Thommes. “Outsourcing von Personalfunktionen.” <i>Motive und Erfahrungen im Spiegel
    von Experteninterviews</i> 14, no. 1 (2007): 85.'
  ieee: D. Alewell, K. Bähring, A. Canis, S. Hauff, and K. Thommes, “Outsourcing von
    Personalfunktionen,” <i>Motive und Erfahrungen im Spiegel von Experteninterviews</i>,
    vol. 14, no. 1, p. 85, 2007.
  mla: Alewell, Dorothea, et al. “Outsourcing von Personalfunktionen.” <i>Motive und
    Erfahrungen im Spiegel von Experteninterviews</i>, vol. 14, no. 1, 2007, p. 85.
  short: D. Alewell, K. Bähring, A. Canis, S. Hauff, K. Thommes, Motive und Erfahrungen
    im Spiegel von Experteninterviews 14 (2007) 85.
date_created: 2018-10-29T11:45:44Z
date_updated: 2022-01-06T07:01:34Z
department:
- _id: '178'
- _id: '184'
extern: '1'
intvolume: '        14'
issue: '1'
language:
- iso: ger
page: '85'
publication: Motive und Erfahrungen im Spiegel von Experteninterviews
publication_status: published
status: public
title: Outsourcing von Personalfunktionen
type: journal_article
user_id: '49071'
volume: 14
year: '2007'
...
---
_id: '5217'
abstract:
- lang: ger
  text: 'Die in den letzten 25 Jahren weltweit und in Europa in den letzten zehn Jahren
    forcierte Liberalisierung der Telekommunikationsbranche stellt ein bemerkenswertes
    Beispiel für den erfolgreichen Wandel ordnungspolitischer Rahmenbedingungen dar.
    Die Erfolge dieser Reformprozesse sowie die daraus resultierenden institutionellen
    Lernprozesse waren auch für die übrigen netzgebundenen Industrien wie z.B. Energiewirtschaft,
    Bahn oder Post wegweisend. Thema dieses Aufsatzes ist das Spannungsfeld zwischen
    der Vermeidung von Diskriminierungsanreizen durch vertikale Separierung, möglichen
    Effizienzgewinnen und adäquaten Investitionsanreizen. Im Folgenden werden sowohl
    theoretische Grundlagen netzgebundener Industrien im Allgemeinen als auch theoretische
    Argumente für oder gegen eine vertikale Integration netzgebundener Industrien
    diskutiert. Die theoretischen Argumente werden anschließend beispielhaft auf den
    Bahnsektor, die Energiewirtschaft sowie die Wasserwirtschaft angewendet. '
author:
- first_name: Justus
  full_name: Haucap, Justus
  last_name: Haucap
- first_name: Ulrich
  full_name: Heimeshoff, Ulrich
  last_name: Heimeshoff
- first_name: André
  full_name: Uhde, André
  id: '36049'
  last_name: Uhde
  orcid: https://orcid.org/0000-0002-8058-8857
citation:
  ama: 'Haucap J, Heimeshoff U, Uhde A. Vertikale Entflechtung netzgebundener Industrien:
    Kosten und Nutzen aus ökonomischer Sicht. In: Trennung von Infrastruktur und Betrieb,
    Beiträge zur öffentlichen Wirtschaft 25, ed. <i>Gesellschaft für öffentliche Wirtschaft</i>.
    Berlin; 2007:27-65.'
  apa: 'Haucap, J., Heimeshoff, U., &#38; Uhde, A. (2007). Vertikale Entflechtung
    netzgebundener Industrien: Kosten und Nutzen aus ökonomischer Sicht. In Trennung
    von Infrastruktur und Betrieb, Beiträge zur öffentlichen Wirtschaft 25 (Ed.),
    <i>Gesellschaft für öffentliche Wirtschaft</i> (pp. 27–65). Berlin.'
  bibtex: '@inbook{Haucap_Heimeshoff_Uhde_2007, place={Berlin}, title={Vertikale Entflechtung
    netzgebundener Industrien: Kosten und Nutzen aus ökonomischer Sicht}, booktitle={Gesellschaft
    für öffentliche Wirtschaft}, author={Haucap, Justus and Heimeshoff, Ulrich and
    Uhde, André}, editor={Trennung von Infrastruktur und Betrieb, Beiträge zur öffentlichen
    Wirtschaft 25Editor}, year={2007}, pages={27–65} }'
  chicago: 'Haucap, Justus, Ulrich Heimeshoff, and André Uhde. “Vertikale Entflechtung
    netzgebundener Industrien: Kosten und Nutzen aus ökonomischer Sicht.” In <i>Gesellschaft
    für öffentliche Wirtschaft</i>, edited by Trennung von Infrastruktur und Betrieb,
    Beiträge zur öffentlichen Wirtschaft 25, 27–65. Berlin, 2007.'
  ieee: 'J. Haucap, U. Heimeshoff, and A. Uhde, “Vertikale Entflechtung netzgebundener
    Industrien: Kosten und Nutzen aus ökonomischer Sicht,” in <i>Gesellschaft für
    öffentliche Wirtschaft</i>, Trennung von Infrastruktur und Betrieb, Beiträge zur
    öffentlichen Wirtschaft 25, Ed. Berlin, 2007, pp. 27–65.'
  mla: 'Haucap, Justus, et al. “Vertikale Entflechtung netzgebundener Industrien:
    Kosten und Nutzen aus ökonomischer Sicht.” <i>Gesellschaft für öffentliche Wirtschaft</i>,
    edited by Trennung von Infrastruktur und Betrieb, Beiträge zur öffentlichen Wirtschaft
    25, 2007, pp. 27–65.'
  short: 'J. Haucap, U. Heimeshoff, A. Uhde, in: Trennung von Infrastruktur und Betrieb,
    Beiträge zur öffentlichen Wirtschaft 25 (Ed.), Gesellschaft für öffentliche Wirtschaft,
    Berlin, 2007, pp. 27–65.'
corporate_editor:
- Trennung von Infrastruktur und Betrieb, Beiträge zur öffentlichen Wirtschaft 25
date_created: 2018-10-31T13:37:55Z
date_updated: 2022-01-06T07:01:47Z
department:
- _id: '186'
- _id: '188'
extern: '1'
language:
- iso: ger
page: 27-65
place: Berlin
publication: Gesellschaft für öffentliche Wirtschaft
publication_status: published
status: public
title: 'Vertikale Entflechtung netzgebundener Industrien: Kosten und Nutzen aus ökonomischer
  Sicht'
type: book_chapter
user_id: '21810'
year: '2007'
...
---
_id: '5370'
author:
- first_name: Udo
  full_name: Broll, Udo
  last_name: Broll
- first_name: Bernard Michael
  full_name: Gilroy, Bernard Michael
  id: '175'
  last_name: Gilroy
- first_name: Elmar
  full_name: Lukas, Elmar
  last_name: Lukas
citation:
  ama: Broll U, Gilroy BM, Lukas E. Managing Credit Risk with Credit Derivatives.
    <i>Annals of Financial Economics</i>. 2007;3(01).
  apa: Broll, U., Gilroy, B. M., &#38; Lukas, E. (2007). Managing Credit Risk with
    Credit Derivatives. <i>Annals of Financial Economics</i>, <i>3</i>(01).
  bibtex: '@article{Broll_Gilroy_Lukas_2007, title={Managing Credit Risk with Credit
    Derivatives}, volume={3}, number={01}, journal={Annals of Financial Economics},
    publisher={World Scientific}, author={Broll, Udo and Gilroy, Bernard Michael and
    Lukas, Elmar}, year={2007} }'
  chicago: Broll, Udo, Bernard Michael Gilroy, and Elmar Lukas. “Managing Credit Risk
    with Credit Derivatives.” <i>Annals of Financial Economics</i> 3, no. 01 (2007).
  ieee: U. Broll, B. M. Gilroy, and E. Lukas, “Managing Credit Risk with Credit Derivatives,”
    <i>Annals of Financial Economics</i>, vol. 3, no. 01, 2007.
  mla: Broll, Udo, et al. “Managing Credit Risk with Credit Derivatives.” <i>Annals
    of Financial Economics</i>, vol. 3, no. 01, World Scientific, 2007.
  short: U. Broll, B.M. Gilroy, E. Lukas, Annals of Financial Economics 3 (2007).
date_created: 2018-11-06T07:38:58Z
date_updated: 2022-01-06T07:01:50Z
department:
- _id: '203'
intvolume: '         3'
issue: '01'
language:
- iso: eng
publication: Annals of Financial Economics
publisher: World Scientific
status: public
title: Managing Credit Risk with Credit Derivatives
type: journal_article
user_id: '26589'
volume: 3
year: '2007'
...
---
_id: '5373'
author:
- first_name: Udo
  full_name: Broll, Udo
  last_name: Broll
- first_name: Bernard Michael
  full_name: Gilroy, Bernard Michael
  id: '175'
  last_name: Gilroy
- first_name: Elmar
  full_name: Lukas, Elmar
  last_name: Lukas
citation:
  ama: Broll U, Gilroy BM, Lukas E. Managing Credit Risk with Credit Derivatives.
    <i>Annals of Financial Economics</i>. 2007;3(01).
  apa: Broll, U., Gilroy, B. M., &#38; Lukas, E. (2007). Managing Credit Risk with
    Credit Derivatives. <i>Annals of Financial Economics</i>, <i>3</i>(01).
  bibtex: '@article{Broll_Gilroy_Lukas_2007, title={Managing Credit Risk with Credit
    Derivatives}, volume={3}, number={01}, journal={Annals of Financial Economics},
    publisher={World Scientific}, author={Broll, Udo and Gilroy, Bernard Michael and
    Lukas, Elmar}, year={2007} }'
  chicago: Broll, Udo, Bernard Michael Gilroy, and Elmar Lukas. “Managing Credit Risk
    with Credit Derivatives.” <i>Annals of Financial Economics</i> 3, no. 01 (2007).
  ieee: U. Broll, B. M. Gilroy, and E. Lukas, “Managing Credit Risk with Credit Derivatives,”
    <i>Annals of Financial Economics</i>, vol. 3, no. 01, 2007.
  mla: Broll, Udo, et al. “Managing Credit Risk with Credit Derivatives.” <i>Annals
    of Financial Economics</i>, vol. 3, no. 01, World Scientific, 2007.
  short: U. Broll, B.M. Gilroy, E. Lukas, Annals of Financial Economics 3 (2007).
date_created: 2018-11-06T08:00:26Z
date_updated: 2022-01-06T07:01:50Z
department:
- _id: '203'
intvolume: '         3'
issue: '01'
publication: Annals of Financial Economics
publisher: World Scientific
status: public
title: Managing Credit Risk with Credit Derivatives
type: journal_article
user_id: '26589'
volume: 3
year: '2007'
...
---
_id: '5572'
author:
- first_name: Rüdiger
  full_name: Kabst, Rüdiger
  id: '42362'
  last_name: Kabst
citation:
  ama: 'Kabst R. A Different View to Atypical Work: Interim Management. <i> Korean
    Journal of Economics</i>. 2007;25(4):25-41.'
  apa: 'Kabst, R. (2007). A Different View to Atypical Work: Interim Management. <i>
    Korean Journal of Economics.</i>, <i>25</i>(4), 25–41.'
  bibtex: '@article{Kabst_2007, title={A Different View to Atypical Work: Interim
    Management.}, volume={25}, number={4}, journal={ Korean Journal of Economics.},
    author={Kabst, Rüdiger}, year={2007}, pages={25–41} }'
  chicago: 'Kabst, Rüdiger. “A Different View to Atypical Work: Interim Management.”
    <i> Korean Journal of Economics.</i> 25, no. 4 (2007): 25–41.'
  ieee: 'R. Kabst, “A Different View to Atypical Work: Interim Management.,” <i> Korean
    Journal of Economics.</i>, vol. 25, no. 4, pp. 25–41, 2007.'
  mla: 'Kabst, Rüdiger. “A Different View to Atypical Work: Interim Management.” <i>
    Korean Journal of Economics.</i>, vol. 25, no. 4, 2007, pp. 25–41.'
  short: R. Kabst,  Korean Journal of Economics. 25 (2007) 25–41.
date_created: 2018-11-14T11:07:48Z
date_updated: 2022-01-06T07:01:59Z
department:
- _id: '274'
intvolume: '        25'
issue: '4'
language:
- iso: eng
page: 25-41
publication: ' Korean Journal of Economics.'
status: public
title: 'A Different View to Atypical Work: Interim Management.'
type: journal_article
user_id: '46632'
volume: 25
year: '2007'
...
---
_id: '5574'
author:
- first_name: I
  full_name: Weller, I
  last_name: Weller
- first_name: Rüdiger
  full_name: Kabst, Rüdiger
  id: '42362'
  last_name: Kabst
citation:
  ama: 'Weller I, Kabst R. Determinanten des Downsizings: Eine empirische Analyse
    mit den Daten des Cranfield Project on International HRM. <i>Die Betriebswirtschaft
    (DBW)</i>. 2007;67(3):299-318.'
  apa: 'Weller, I., &#38; Kabst, R. (2007). Determinanten des Downsizings: Eine empirische
    Analyse mit den Daten des Cranfield Project on International HRM. <i>Die Betriebswirtschaft
    (DBW).</i>, <i>67</i>(3), 299–318.'
  bibtex: '@article{Weller_Kabst_2007, title={Determinanten des Downsizings: Eine
    empirische Analyse mit den Daten des Cranfield Project on International HRM.},
    volume={67}, number={3}, journal={Die Betriebswirtschaft (DBW).}, author={Weller,
    I and Kabst, Rüdiger}, year={2007}, pages={299–318} }'
  chicago: 'Weller, I, and Rüdiger Kabst. “Determinanten Des Downsizings: Eine Empirische
    Analyse Mit Den Daten Des Cranfield Project on International HRM.” <i>Die Betriebswirtschaft
    (DBW).</i> 67, no. 3 (2007): 299–318.'
  ieee: 'I. Weller and R. Kabst, “Determinanten des Downsizings: Eine empirische Analyse
    mit den Daten des Cranfield Project on International HRM.,” <i>Die Betriebswirtschaft
    (DBW).</i>, vol. 67, no. 3, pp. 299–318, 2007.'
  mla: 'Weller, I., and Rüdiger Kabst. “Determinanten Des Downsizings: Eine Empirische
    Analyse Mit Den Daten Des Cranfield Project on International HRM.” <i>Die Betriebswirtschaft
    (DBW).</i>, vol. 67, no. 3, 2007, pp. 299–318.'
  short: I. Weller, R. Kabst, Die Betriebswirtschaft (DBW). 67 (2007) 299–318.
date_created: 2018-11-14T11:13:47Z
date_updated: 2022-01-06T07:01:59Z
department:
- _id: '274'
intvolume: '        67'
issue: '3'
language:
- iso: eng
page: 299-318
publication: Die Betriebswirtschaft (DBW).
status: public
title: 'Determinanten des Downsizings: Eine empirische Analyse mit den Daten des Cranfield
  Project on International HRM.'
type: journal_article
user_id: '46632'
volume: 67
year: '2007'
...
---
_id: '5577'
author:
- first_name: C
  full_name: Koenig, C
  last_name: Koenig
- first_name: Holger
  full_name: Steinmetz, Holger
  id: '43261'
  last_name: Steinmetz
- first_name: M
  full_name: Frese, M
  last_name: Frese
- first_name: A
  full_name: Rauch, A
  last_name: Rauch
- first_name: Z M
  full_name: Wang, Z M
  last_name: Wang
citation:
  ama: Koenig C, Steinmetz H, Frese M, Rauch A, Wang ZM. Scenario-based scales measuring
    cultural orientations of business owners. <i>Journal of Evolutionary Economics</i>.
    2007;17:211-239.
  apa: Koenig, C., Steinmetz, H., Frese, M., Rauch, A., &#38; Wang, Z. M. (2007).
    Scenario-based scales measuring cultural orientations of business owners. <i>Journal
    of Evolutionary Economics.</i>, <i>17</i>, 211–239.
  bibtex: '@article{Koenig_Steinmetz_Frese_Rauch_Wang_2007, title={Scenario-based
    scales measuring cultural orientations of business owners.}, volume={17}, journal={Journal
    of Evolutionary Economics.}, author={Koenig, C and Steinmetz, Holger and Frese,
    M and Rauch, A and Wang, Z M}, year={2007}, pages={211–239} }'
  chicago: 'Koenig, C, Holger Steinmetz, M Frese, A Rauch, and Z M Wang. “Scenario-Based
    Scales Measuring Cultural Orientations of Business Owners.” <i>Journal of Evolutionary
    Economics.</i> 17 (2007): 211–39.'
  ieee: C. Koenig, H. Steinmetz, M. Frese, A. Rauch, and Z. M. Wang, “Scenario-based
    scales measuring cultural orientations of business owners.,” <i>Journal of Evolutionary
    Economics.</i>, vol. 17, pp. 211–239, 2007.
  mla: Koenig, C., et al. “Scenario-Based Scales Measuring Cultural Orientations of
    Business Owners.” <i>Journal of Evolutionary Economics.</i>, vol. 17, 2007, pp.
    211–39.
  short: C. Koenig, H. Steinmetz, M. Frese, A. Rauch, Z.M. Wang, Journal of Evolutionary
    Economics. 17 (2007) 211–239.
date_created: 2018-11-14T11:16:11Z
date_updated: 2022-01-06T07:02:00Z
department:
- _id: '274'
intvolume: '        17'
language:
- iso: eng
page: 211-239
publication: Journal of Evolutionary Economics.
status: public
title: Scenario-based scales measuring cultural orientations of business owners.
type: journal_article
user_id: '46632'
volume: 17
year: '2007'
...
---
_id: '5650'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. A Scalable and Flexible Infrastructure Framework For Addressing
    Spam. In: Satesh D, Prabhakar R, eds. <i>Proceedings of IPSI International Conference
    on Advances in the Internet, Processing, Systems, and Interdisciplinary Research</i>.
    Hyderabad, India: ICFAI University Press; 2007:55-64.'
  apa: 'Schryen, G. (2007). A Scalable and Flexible Infrastructure Framework For Addressing
    Spam. In D. Satesh &#38; R. Prabhakar (Eds.), <i>Proceedings of IPSI International
    Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary
    Research</i> (pp. 55–64). Hyderabad, India: ICFAI University Press.'
  bibtex: '@inbook{Schryen_2007, place={Hyderabad, India}, title={A Scalable and Flexible
    Infrastructure Framework For Addressing Spam}, booktitle={Proceedings of IPSI
    International Conference on Advances in the Internet, Processing, Systems, and
    Interdisciplinary Research}, publisher={ICFAI University Press}, author={Schryen,
    Guido}, editor={Satesh, D. and Prabhakar, R.Editors}, year={2007}, pages={55–64}
    }'
  chicago: 'Schryen, Guido. “A Scalable and Flexible Infrastructure Framework For
    Addressing Spam.” In <i>Proceedings of IPSI International Conference on Advances
    in the Internet, Processing, Systems, and Interdisciplinary Research</i>, edited
    by D. Satesh and R. Prabhakar, 55–64. Hyderabad, India: ICFAI University Press,
    2007.'
  ieee: 'G. Schryen, “A Scalable and Flexible Infrastructure Framework For Addressing
    Spam,” in <i>Proceedings of IPSI International Conference on Advances in the Internet,
    Processing, Systems, and Interdisciplinary Research</i>, D. Satesh and R. Prabhakar,
    Eds. Hyderabad, India: ICFAI University Press, 2007, pp. 55–64.'
  mla: Schryen, Guido. “A Scalable and Flexible Infrastructure Framework For Addressing
    Spam.” <i>Proceedings of IPSI International Conference on Advances in the Internet,
    Processing, Systems, and Interdisciplinary Research</i>, edited by D. Satesh and
    R. Prabhakar, ICFAI University Press, 2007, pp. 55–64.
  short: 'G. Schryen, in: D. Satesh, R. Prabhakar (Eds.), Proceedings of IPSI International
    Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary
    Research, ICFAI University Press, Hyderabad, India, 2007, pp. 55–64.'
date_created: 2018-11-14T14:44:01Z
date_updated: 2022-01-06T07:02:20Z
department:
- _id: '277'
editor:
- first_name: D.
  full_name: Satesh, D.
  last_name: Satesh
- first_name: R.
  full_name: Prabhakar, R.
  last_name: Prabhakar
extern: '1'
language:
- iso: eng
page: 55-64
place: Hyderabad, India
publication: Proceedings of IPSI International Conference on Advances in the Internet,
  Processing, Systems, and Interdisciplinary Research
publisher: ICFAI University Press
status: public
title: A Scalable and Flexible Infrastructure Framework For Addressing Spam
type: book_chapter
user_id: '61579'
year: '2007'
...
---
_id: '5651'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. <i>Anti-Spam Measures: Analysis and Design</i>. Berlin, Heidelberg,
    New York: Springer; 2007.'
  apa: 'Schryen, G. (2007). <i>Anti-Spam Measures: Analysis and Design</i>. Berlin,
    Heidelberg, New York: Springer.'
  bibtex: '@book{Schryen_2007, place={Berlin, Heidelberg, New York}, title={Anti-Spam
    Measures: Analysis and Design}, publisher={Springer}, author={Schryen, Guido},
    year={2007} }'
  chicago: 'Schryen, Guido. <i>Anti-Spam Measures: Analysis and Design</i>. Berlin,
    Heidelberg, New York: Springer, 2007.'
  ieee: 'G. Schryen, <i>Anti-Spam Measures: Analysis and Design</i>. Berlin, Heidelberg,
    New York: Springer, 2007.'
  mla: 'Schryen, Guido. <i>Anti-Spam Measures: Analysis and Design</i>. Springer,
    2007.'
  short: 'G. Schryen, Anti-Spam Measures: Analysis and Design, Springer, Berlin, Heidelberg,
    New York, 2007.'
date_created: 2018-11-14T14:45:12Z
date_updated: 2022-01-06T07:02:20Z
department:
- _id: '277'
extern: '1'
language:
- iso: eng
place: Berlin, Heidelberg, New York
publisher: Springer
status: public
title: 'Anti-Spam Measures: Analysis and Design'
type: book
user_id: '61579'
year: '2007'
...
---
_id: '5652'
abstract:
- lang: eng
  text: More than half of world-wide e-mail traffic ? an estimated total of several
    billion e-mails per day ? consists of spam. This is becoming a considerable disturbance
    to telecommunications. Spam is also closely related to other kinds of cyber crime
    as it possibly contains malicious software or is pursuing some kind of fraudulent
    aim, such as phishing. Besides technical and organizational measures, many countries
    have introduced anti-spam legislation. However, today's world-wide legislative
    coverage of spam is heterogeneous, and its effectiveness is controversially discussed.
    This article describes important parameters by which anti-spam legislation can
    vary and gives an overview and analysis of world-wide anti-spam legislation, including
    the European Directive 2002/58/EC, the U.S. CANSPAM Act of 2003, and international
    cooperation, such as the London Action Plan. The article then proceeds to discuss
    the effectiveness of current laws, and it identifies problems resulting from the
    fact that an international phenomenon is being addressed by national legislation.
    Finally, the article presents suggestions for overcoming some of these problems.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Anti-spam legislation: An analysis of laws and their effectiveness.
    <i>Information and Communications Technology Law</i>. 2007;16(1):17-32.'
  apa: 'Schryen, G. (2007). Anti-spam legislation: An analysis of laws and their effectiveness.
    <i>Information and Communications Technology Law</i>, <i>16</i>(1), 17–32.'
  bibtex: '@article{Schryen_2007, title={Anti-spam legislation: An analysis of laws
    and their effectiveness}, volume={16}, number={1}, journal={Information and Communications
    Technology Law}, publisher={Taylor \&#38; Francis}, author={Schryen, Guido}, year={2007},
    pages={17–32} }'
  chicago: 'Schryen, Guido. “Anti-Spam Legislation: An Analysis of Laws and Their
    Effectiveness.” <i>Information and Communications Technology Law</i> 16, no. 1
    (2007): 17–32.'
  ieee: 'G. Schryen, “Anti-spam legislation: An analysis of laws and their effectiveness,”
    <i>Information and Communications Technology Law</i>, vol. 16, no. 1, pp. 17–32,
    2007.'
  mla: 'Schryen, Guido. “Anti-Spam Legislation: An Analysis of Laws and Their Effectiveness.”
    <i>Information and Communications Technology Law</i>, vol. 16, no. 1, Taylor \&#38;
    Francis, 2007, pp. 17–32.'
  short: G. Schryen, Information and Communications Technology Law 16 (2007) 17–32.
date_created: 2018-11-14T14:45:57Z
date_updated: 2022-01-06T07:02:21Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:25:48Z
  date_updated: 2018-12-18T13:25:48Z
  file_id: '6325'
  file_name: JOUNAL_VERSION.pdf
  file_size: 175248
  relation: main_file
file_date_updated: 2018-12-18T13:25:48Z
has_accepted_license: '1'
intvolume: '        16'
issue: '1'
language:
- iso: eng
oa: '1'
page: 17-32
publication: Information and Communications Technology Law
publisher: Taylor \& Francis
status: public
title: 'Anti-spam legislation: An analysis of laws and their effectiveness'
type: journal_article
user_id: '61579'
volume: 16
year: '2007'
...
---
_id: '5653'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Approaches Addressing Spam. In: Satesh D, Prabhakar R, eds. <i>Spam:
    An Introduction</i>. Hyderabad, India: ICFAI University Press; 2007:41-57.'
  apa: 'Schryen, G. (2007). Approaches Addressing Spam. In D. Satesh &#38; R. Prabhakar
    (Eds.), <i>Spam: An Introduction</i> (pp. 41–57). Hyderabad, India: ICFAI University
    Press.'
  bibtex: '@inbook{Schryen_2007, place={Hyderabad, India}, title={Approaches Addressing
    Spam}, booktitle={Spam: An Introduction}, publisher={ICFAI University Press},
    author={Schryen, Guido}, editor={Satesh, D. and Prabhakar, R.Editors}, year={2007},
    pages={41–57} }'
  chicago: 'Schryen, Guido. “Approaches Addressing Spam.” In <i>Spam: An Introduction</i>,
    edited by D. Satesh and R. Prabhakar, 41–57. Hyderabad, India: ICFAI University
    Press, 2007.'
  ieee: 'G. Schryen, “Approaches Addressing Spam,” in <i>Spam: An Introduction</i>,
    D. Satesh and R. Prabhakar, Eds. Hyderabad, India: ICFAI University Press, 2007,
    pp. 41–57.'
  mla: 'Schryen, Guido. “Approaches Addressing Spam.” <i>Spam: An Introduction</i>,
    edited by D. Satesh and R. Prabhakar, ICFAI University Press, 2007, pp. 41–57.'
  short: 'G. Schryen, in: D. Satesh, R. Prabhakar (Eds.), Spam: An Introduction, ICFAI
    University Press, Hyderabad, India, 2007, pp. 41–57.'
date_created: 2018-11-14T14:46:28Z
date_updated: 2022-01-06T07:02:21Z
department:
- _id: '277'
editor:
- first_name: D.
  full_name: Satesh, D.
  last_name: Satesh
- first_name: R.
  full_name: Prabhakar, R.
  last_name: Prabhakar
extern: '1'
language:
- iso: eng
page: 41-57
place: Hyderabad, India
publication: 'Spam: An Introduction'
publisher: ICFAI University Press
status: public
title: Approaches Addressing Spam
type: book_chapter
user_id: '61579'
year: '2007'
...
---
_id: '5654'
abstract:
- lang: eng
  text: Spamming remains a form of Internet abuse, which burdens the Internet infrastructure,
    is generally regarded as an annoyance, and is said to cause economic harm to the
    tune of about several billion US\$ per year. Many technological, organizational,
    and legislative anti-spam measures have already been proposed and implemented,
    but have not led to any substantial decrease in the number of spam e-mails. We
    propose here a new infrastructure framework that combines several anti-spam measures
    in a framework that features both a technological and an organizational facet.
    The key element of our infrastructure is a new organizational unit that reliably
    and transparently limits he number of e-mails that can be sent per day and per
    account. This paper first gives an overview of the framework, then it provides
    technological and organizational details of the infrastructure, the deployment
    of which depends to a large degree on its acceptance and propagation by the ICANN,
    the ISOC, and by large e-mail service providers. Finally, the paper discusses
    the limitations and drawbacks of the proposed framework.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Armed for the spam battle - a technological and organizational
    infrastructure framework. In: <i>40th Annual Hawaii International Conference on
    System Sciences</i>. ; 2007.'
  apa: Schryen, G. (2007). Armed for the spam battle - a technological and organizational
    infrastructure framework. In <i>40th Annual Hawaii International Conference on
    System Sciences</i>.
  bibtex: '@inproceedings{Schryen_2007, title={Armed for the spam battle - a technological
    and organizational infrastructure framework}, booktitle={40th Annual Hawaii International
    Conference on System Sciences}, author={Schryen, Guido}, year={2007} }'
  chicago: Schryen, Guido. “Armed for the Spam Battle - a Technological and Organizational
    Infrastructure Framework.” In <i>40th Annual Hawaii International Conference on
    System Sciences</i>, 2007.
  ieee: G. Schryen, “Armed for the spam battle - a technological and organizational
    infrastructure framework,” in <i>40th Annual Hawaii International Conference on
    System Sciences</i>, 2007.
  mla: Schryen, Guido. “Armed for the Spam Battle - a Technological and Organizational
    Infrastructure Framework.” <i>40th Annual Hawaii International Conference on System
    Sciences</i>, 2007.
  short: 'G. Schryen, in: 40th Annual Hawaii International Conference on System Sciences,
    2007.'
date_created: 2018-11-14T14:46:49Z
date_updated: 2022-01-06T07:02:21Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:24:34Z
  date_updated: 2018-12-18T13:24:34Z
  file_id: '6323'
  file_name: Armed for the spam battle - a technological and organizational infrastructure
    framework - proceeding version.pdf
  file_size: 338482
  relation: main_file
file_date_updated: 2018-12-18T13:24:34Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: 40th Annual Hawaii International Conference on System Sciences
status: public
title: Armed for the spam battle - a technological and organizational infrastructure
  framework
type: conference
user_id: '61579'
year: '2007'
...
---
_id: '5655'
abstract:
- lang: eng
  text: Spam e-mails have become a serious technological and economic problem. Up
    to now, by deploying complementary anti-spam measures, we have been reasonably
    able to withstand spam e-mails and use the Internet for regular communication.
    However, if we are to avert the danger of losing the Internet e-mail service in
    its capacity as a valuable, free and worldwide medium of open communication, anti-spam
    activities should be performed more systematically than is currently the case
    regarding the mainly heuristic, anti-spam measures in place. A formal framework,
    within which the existing delivery routes that a spam e-mail may take, and anti-spam
    measures and their effectiveness can be investigated, will perhaps encourage a
    shift in methodology and pave the way for new, holistic anti-spam measures. This
    paper presents a model of the Internet e-mail infrastructure as a directed graph
    and a deterministic finite automaton and draws on automata theory to formally
    derive the spam delivery routes. The most important anti-spam measures are then
    described. Methods controlling only specific delivery routes are evaluated in
    terms of how effectively they cover the modeled e-mail infrastructure; methods
    operating independently of any particular routes receive a more general assessment.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>. 2007;3(2):66-90.
  apa: Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.
  bibtex: '@article{Schryen_2007, title={Do anti-spam measures effectively cover the
    e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The
    Journal of Information Systems Security (AIS Special Interest Group in Security)},
    author={Schryen, Guido}, year={2007}, pages={66–90} }'
  chicago: 'Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.'
  ieee: G. Schryen, “Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach,” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.
  mla: Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.
  short: G. Schryen, The Journal of Information Systems Security (AIS Special Interest
    Group in Security) 3 (2007) 66–90.
date_created: 2018-11-14T14:51:41Z
date_updated: 2022-01-06T07:02:22Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:25:12Z
  date_updated: 2018-12-18T13:25:12Z
  file_id: '6324'
  file_name: Do anti-spam measures effectively cover the e-mail communication - Journal
    version.pdf
  file_size: 100448
  relation: main_file
file_date_updated: 2018-12-18T13:25:12Z
has_accepted_license: '1'
intvolume: '         3'
issue: '2'
keyword:
- e-mail
- spam
- e-mail infrastructure
- anti-spam measures
- spamming options
language:
- iso: eng
oa: '1'
page: 66-90
publication: The Journal of Information Systems Security (AIS Special Interest Group
  in Security)
status: public
title: Do anti-spam measures effectively cover the e-mail communication network? A
  formal approach
type: journal_article
user_id: '61579'
volume: 3
year: '2007'
...
---
_id: '5656'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Location Based Services. In: Schulte H, ed. <i>Vom LAN Zum Kommunikationsnetz
    - Systeme Und Applikationen</i>. Kissing: Interest-Verlag; 2007.'
  apa: 'Schryen, G. (2007). Location Based Services. In H. Schulte (Ed.), <i>Vom LAN
    zum Kommunikationsnetz - Systeme und Applikationen</i>. Kissing: Interest-Verlag.'
  bibtex: '@inbook{Schryen_2007, place={Kissing}, title={Location Based Services},
    booktitle={Vom LAN zum Kommunikationsnetz - Systeme und Applikationen}, publisher={Interest-Verlag},
    author={Schryen, Guido}, editor={Schulte, HeinzEditor}, year={2007} }'
  chicago: 'Schryen, Guido. “Location Based Services.” In <i>Vom LAN Zum Kommunikationsnetz
    - Systeme Und Applikationen</i>, edited by Heinz Schulte. Kissing: Interest-Verlag,
    2007.'
  ieee: 'G. Schryen, “Location Based Services,” in <i>Vom LAN zum Kommunikationsnetz
    - Systeme und Applikationen</i>, H. Schulte, Ed. Kissing: Interest-Verlag, 2007.'
  mla: Schryen, Guido. “Location Based Services.” <i>Vom LAN Zum Kommunikationsnetz
    - Systeme Und Applikationen</i>, edited by Heinz Schulte, Interest-Verlag, 2007.
  short: 'G. Schryen, in: H. Schulte (Ed.), Vom LAN Zum Kommunikationsnetz - Systeme
    Und Applikationen, Interest-Verlag, Kissing, 2007.'
date_created: 2018-11-14T14:52:09Z
date_updated: 2022-01-06T07:02:22Z
department:
- _id: '277'
editor:
- first_name: Heinz
  full_name: Schulte, Heinz
  last_name: Schulte
extern: '1'
language:
- iso: eng
place: Kissing
publication: Vom LAN zum Kommunikationsnetz - Systeme und Applikationen
publisher: Interest-Verlag
status: public
title: Location Based Services
type: book_chapter
user_id: '61579'
year: '2007'
...
---
_id: '5657'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Spam-Emails. In: Schulte H, ed. <i>Vom LAN Zum Kommunikationsnetz
    - Systeme Und Applikationen, Edition 02/2007</i>. Vol 9/12. Kissing: Interest-Verlag;
    2007.'
  apa: 'Schryen, G. (2007). Spam-Emails. In H. Schulte (Ed.), <i>Vom LAN zum Kommunikationsnetz
    - Systeme und Applikationen, Edition 02/2007</i> (Vol. 9/12). Kissing: Interest-Verlag.'
  bibtex: '@inbook{Schryen_2007, place={Kissing}, title={Spam-Emails}, volume={9/12},
    booktitle={Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Edition
    02/2007}, publisher={Interest-Verlag}, author={Schryen, Guido}, editor={Schulte,
    HeinzEditor}, year={2007} }'
  chicago: 'Schryen, Guido. “Spam-Emails.” In <i>Vom LAN Zum Kommunikationsnetz -
    Systeme Und Applikationen, Edition 02/2007</i>, edited by Heinz Schulte, Vol.
    9/12. Kissing: Interest-Verlag, 2007.'
  ieee: 'G. Schryen, “Spam-Emails,” in <i>Vom LAN zum Kommunikationsnetz - Systeme
    und Applikationen, Edition 02/2007</i>, vol. 9/12, H. Schulte, Ed. Kissing: Interest-Verlag,
    2007.'
  mla: Schryen, Guido. “Spam-Emails.” <i>Vom LAN Zum Kommunikationsnetz - Systeme
    Und Applikationen, Edition 02/2007</i>, edited by Heinz Schulte, vol. 9/12, Interest-Verlag,
    2007.
  short: 'G. Schryen, in: H. Schulte (Ed.), Vom LAN Zum Kommunikationsnetz - Systeme
    Und Applikationen, Edition 02/2007, Interest-Verlag, Kissing, 2007.'
date_created: 2018-11-14T14:52:32Z
date_updated: 2022-01-06T07:02:22Z
department:
- _id: '277'
editor:
- first_name: Heinz
  full_name: Schulte, Heinz
  last_name: Schulte
extern: '1'
language:
- iso: eng
place: Kissing
publication: Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Edition 02/2007
publisher: Interest-Verlag
status: public
title: Spam-Emails
type: book_chapter
user_id: '61579'
volume: 9/12
year: '2007'
...
---
_id: '5658'
abstract:
- lang: eng
  text: 'Email communication is encumbered with a mass of email messages which their
    recipients have neither requested nor require. Even worse, the impacts of these
    messages are far from being simply an annoyance, as they also involve economic
    damage. This manuscript examines the resource ?email addresses?, which is vital
    for any potential bulk mailer and spammer. Both a methodology and a honeypot conceptualization
    for implementing an empirical analysis of the usage of email addresses placed
    on the Internet are proposed here. Their objective is to assess, on a quantitative
    basis, the extent of the current harassment and its development over time. This
    ?framework? is intended to be extensible to measuring the effectiveness of address-obscuring
    techniques. The implementation of a pilot honeypot is described, which led to
    key findings, some of them being: (1) Web placements attract more than two-thirds
    (70\%) of all honeypot spam emails, followed by newsgroup placements (28.6\%)
    and newsletter subscriptions (1.4\%), (2) the proportions of spam relating to
    the email addresses? top-level domain can be statistically assumed to be uniformly
    distributed, (3) More than 43\% of addresses on the web have been abused, whereas
    about 27\% was the case for addresses on newsgroups and only about 4\% was the
    case for addresses used for a newsletter subscription, (4) Regarding the development
    of email addresses? attractiveness for spammers over time, the service ?web sites?
    features a negative linear relationship, whereas the service ?Usenet? hows a negative
    exponential relationship. (5) Only 1.54\% of the spam emails showed an interrelation
    between the topic of the spam email and that of the location where the recipient?s
    address was placed, so that spammers are assumed to send their emails in a ?context
    insensitive? manner. The results of the empirical analysis motivate the need for
    the protection of email addresses through obscuration. We analyze this need by
    formulating requirements for address obscuring techniques and we reveal to which
    extent today?s most relevant approaches fulfill these requirements.'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. The Impact that Placing Email Addresses on the Internet has on the
    Receipt of Spam ? An Empirical Analysis. <i>Computers &#38; Security</i>. 2007;2(5):361-372.
  apa: Schryen, G. (2007). The Impact that Placing Email Addresses on the Internet
    has on the Receipt of Spam ? An Empirical Analysis. <i>Computers &#38; Security</i>,
    <i>2</i>(5), 361–372.
  bibtex: '@article{Schryen_2007, title={The Impact that Placing Email Addresses on
    the Internet has on the Receipt of Spam ? An Empirical Analysis}, volume={2},
    number={5}, journal={Computers &#38; Security}, publisher={Elsevier}, author={Schryen,
    Guido}, year={2007}, pages={361–372} }'
  chicago: 'Schryen, Guido. “The Impact That Placing Email Addresses on the Internet
    Has on the Receipt of Spam ? An Empirical Analysis.” <i>Computers &#38; Security</i>
    2, no. 5 (2007): 361–72.'
  ieee: G. Schryen, “The Impact that Placing Email Addresses on the Internet has on
    the Receipt of Spam ? An Empirical Analysis,” <i>Computers &#38; Security</i>,
    vol. 2, no. 5, pp. 361–372, 2007.
  mla: Schryen, Guido. “The Impact That Placing Email Addresses on the Internet Has
    on the Receipt of Spam ? An Empirical Analysis.” <i>Computers &#38; Security</i>,
    vol. 2, no. 5, Elsevier, 2007, pp. 361–72.
  short: G. Schryen, Computers &#38; Security 2 (2007) 361–372.
date_created: 2018-11-14T14:53:12Z
date_updated: 2022-01-06T07:02:22Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:27:01Z
  date_updated: 2018-12-18T13:27:01Z
  file_id: '6326'
  file_name: The Impact that Placing Email Addresses on the Internet has on the Receipt
    of Spam - An Empirical Analysis - Journal version.pdf
  file_size: 3026200
  relation: main_file
file_date_updated: 2018-12-18T13:27:01Z
has_accepted_license: '1'
intvolume: '         2'
issue: '5'
keyword:
- Address-obfuscating techniques
- email
- empirical analysis
- honeypot
- security by design
- security by obscurity
- spam
language:
- iso: eng
oa: '1'
page: 361-372
publication: Computers & Security
publisher: Elsevier
status: public
title: The Impact that Placing Email Addresses on the Internet has on the Receipt
  of Spam ? An Empirical Analysis
type: journal_article
user_id: '61579'
volume: 2
year: '2007'
...
---
_id: '14941'
alternative_title:
- Gutachten im Auftrag der Bertelsmann Stiftung
author:
- first_name: Ralf
  full_name: Maiterth, Ralf
  last_name: Maiterth
- first_name: Caren
  full_name: Sureth-Sloane, Caren
  id: '530'
  last_name: Sureth-Sloane
citation:
  ama: Maiterth R, Sureth-Sloane C. <i>Aufkommenswirkungen des Erbschaftsteuerreformvorschlags
    der CDU/CSU-Mittelstandsvereinigung</i>. Paderborn; 2007.
  apa: Maiterth, R., &#38; Sureth-Sloane, C. (2007). <i>Aufkommenswirkungen des Erbschaftsteuerreformvorschlags
    der CDU/CSU-Mittelstandsvereinigung</i>. Paderborn.
  bibtex: '@book{Maiterth_Sureth-Sloane_2007, place={Paderborn}, title={Aufkommenswirkungen
    des Erbschaftsteuerreformvorschlags der CDU/CSU-Mittelstandsvereinigung}, author={Maiterth,
    Ralf and Sureth-Sloane, Caren}, year={2007} }'
  chicago: Maiterth, Ralf, and Caren Sureth-Sloane. <i>Aufkommenswirkungen des Erbschaftsteuerreformvorschlags
    der CDU/CSU-Mittelstandsvereinigung</i>. Paderborn, 2007.
  ieee: R. Maiterth and C. Sureth-Sloane, <i>Aufkommenswirkungen des Erbschaftsteuerreformvorschlags
    der CDU/CSU-Mittelstandsvereinigung</i>. Paderborn, 2007.
  mla: Maiterth, Ralf, and Caren Sureth-Sloane. <i>Aufkommenswirkungen des Erbschaftsteuerreformvorschlags
    der CDU/CSU-Mittelstandsvereinigung</i>. 2007.
  short: R. Maiterth, C. Sureth-Sloane, Aufkommenswirkungen des Erbschaftsteuerreformvorschlags
    der CDU/CSU-Mittelstandsvereinigung, Paderborn, 2007.
date_created: 2019-11-13T12:59:27Z
date_updated: 2022-01-06T06:52:11Z
department:
- _id: '187'
language:
- iso: ger
place: Paderborn
publication_status: published
status: public
title: Aufkommenswirkungen des Erbschaftsteuerreformvorschlags der CDU/CSU-Mittelstandsvereinigung
type: report
user_id: '21222'
year: '2007'
...
---
_id: '14942'
author:
- first_name: Jens
  full_name: Müller, Jens
  id: '1245'
  last_name: Müller
citation:
  ama: Müller J. Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften.
    <i>FinanzBetrieb</i>. 2007;9:415-426.
  apa: Müller, J. (2007). Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften.
    <i>FinanzBetrieb</i>, <i>9</i>, 415–426.
  bibtex: '@article{Müller_2007, title={Die steuerliche Ungleichbehandlung von Anteilen
    an Kapitalgesellschaften}, volume={9}, journal={FinanzBetrieb}, author={Müller,
    Jens}, year={2007}, pages={415–426} }'
  chicago: 'Müller, Jens. “Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften.”
    <i>FinanzBetrieb</i> 9 (2007): 415–26.'
  ieee: J. Müller, “Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften,”
    <i>FinanzBetrieb</i>, vol. 9, pp. 415–426, 2007.
  mla: Müller, Jens. “Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften.”
    <i>FinanzBetrieb</i>, vol. 9, 2007, pp. 415–26.
  short: J. Müller, FinanzBetrieb 9 (2007) 415–426.
date_created: 2019-11-13T13:01:06Z
date_updated: 2022-01-06T06:52:11Z
department:
- _id: '187'
intvolume: '         9'
language:
- iso: ger
page: 415-426
publication: FinanzBetrieb
publication_status: published
status: public
title: Die steuerliche Ungleichbehandlung von Anteilen an Kapitalgesellschaften
type: journal_article
user_id: '21222'
volume: 9
year: '2007'
...
---
_id: '14943'
author:
- first_name: Heiko
  full_name: Müller, Heiko
  last_name: Müller
- first_name: Caren
  full_name: Sureth-Sloane, Caren
  id: '530'
  last_name: Sureth-Sloane
citation:
  ama: Müller H, Sureth-Sloane C. <i>Group Simulation and Income Tax Statistics -
    How Big Is the Error?</i> Vol 24.; 2007.
  apa: Müller, H., &#38; Sureth-Sloane, C. (2007). <i>Group Simulation and Income
    Tax Statistics - How Big is the Error?</i> (Vol. 24).
  bibtex: '@book{Müller_Sureth-Sloane_2007, series={arqus - Quantitative Research
    in Taxation}, title={Group Simulation and Income Tax Statistics - How Big is the
    Error?}, volume={24}, author={Müller, Heiko and Sureth-Sloane, Caren}, year={2007},
    collection={arqus - Quantitative Research in Taxation} }'
  chicago: Müller, Heiko, and Caren Sureth-Sloane. <i>Group Simulation and Income
    Tax Statistics - How Big Is the Error?</i> Vol. 24. Arqus - Quantitative Research
    in Taxation, 2007.
  ieee: H. Müller and C. Sureth-Sloane, <i>Group Simulation and Income Tax Statistics
    - How Big is the Error?</i>, vol. 24. 2007.
  mla: Müller, Heiko, and Caren Sureth-Sloane. <i>Group Simulation and Income Tax
    Statistics - How Big Is the Error?</i> Vol. 24, 2007.
  short: H. Müller, C. Sureth-Sloane, Group Simulation and Income Tax Statistics -
    How Big Is the Error?, 2007.
date_created: 2019-11-13T13:10:22Z
date_updated: 2022-01-06T06:52:11Z
department:
- _id: '187'
intvolume: '        24'
language:
- iso: eng
publication_status: published
series_title: arqus - Quantitative Research in Taxation
status: public
title: Group Simulation and Income Tax Statistics - How Big is the Error?
type: working_paper
user_id: '21222'
volume: 24
year: '2007'
...
---
_id: '14944'
author:
- first_name: Jens
  full_name: Müller, Jens
  id: '1245'
  last_name: Müller
citation:
  ama: Müller J. <i>Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse
    der Werttreiber von Steuer- und Marktwerten</i>. Vol 25.; 2007.
  apa: Müller, J. (2007). <i>Die Fehlbewertung durch das Stuttgarter Verfahren - eine
    Sensitivitätsanalyse der Werttreiber von Steuer- und Marktwerten</i> (Vol. 25).
  bibtex: '@book{Müller_2007, series={arqus - Quantitative Research in Taxation},
    title={Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse
    der Werttreiber von Steuer- und Marktwerten}, volume={25}, author={Müller, Jens},
    year={2007}, collection={arqus - Quantitative Research in Taxation} }'
  chicago: Müller, Jens. <i>Die Fehlbewertung durch das Stuttgarter Verfahren - eine
    Sensitivitätsanalyse der Werttreiber von Steuer- und Marktwerten</i>. Vol. 25.
    arqus - Quantitative Research in Taxation, 2007.
  ieee: J. Müller, <i>Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse
    der Werttreiber von Steuer- und Marktwerten</i>, vol. 25. 2007.
  mla: Müller, Jens. <i>Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse
    der Werttreiber von Steuer- und Marktwerten</i>. Vol. 25, 2007.
  short: J. Müller, Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse
    der Werttreiber von Steuer- und Marktwerten, 2007.
date_created: 2019-11-13T13:13:00Z
date_updated: 2022-01-06T06:52:11Z
department:
- _id: '187'
intvolume: '        25'
language:
- iso: ger
publication_status: published
series_title: arqus - Quantitative Research in Taxation
status: public
title: Die Fehlbewertung durch das Stuttgarter Verfahren - eine Sensitivitätsanalyse
  der Werttreiber von Steuer- und Marktwerten
type: working_paper
user_id: '21222'
volume: 25
year: '2007'
...
