[{"language":[{"iso":"eng"}],"user_id":"16205","department":[{"_id":"276"}],"_id":"2785","status":"public","type":"conference_abstract","publication":"International Federation of Classification Societies 2009 Conference","conference":{"name":"International Federation of Classification Societies 2009 Conference","location":"Dresden, Germany"},"title":"An Evaluation Framework for Tracker Certificates during the Financial Crisis and beyond","date_created":"2018-05-17T10:02:31Z","author":[{"first_name":"Dennis","last_name":"Kundisch","full_name":"Kundisch, Dennis","id":"21117"},{"full_name":"Klein, C.","last_name":"Klein","first_name":"C."}],"date_updated":"2022-01-06T06:57:47Z","citation":{"apa":"Kundisch, D., &#38; Klein, C. (2009). An Evaluation Framework for Tracker Certificates during the Financial Crisis and beyond. In <i>International Federation of Classification Societies 2009 Conference</i>. Dresden, Germany.","bibtex":"@inproceedings{Kundisch_Klein_2009, title={An Evaluation Framework for Tracker Certificates during the Financial Crisis and beyond}, booktitle={International Federation of Classification Societies 2009 Conference}, author={Kundisch, Dennis and Klein, C.}, year={2009} }","mla":"Kundisch, Dennis, and C. Klein. “An Evaluation Framework for Tracker Certificates during the Financial Crisis and Beyond.” <i>International Federation of Classification Societies 2009 Conference</i>, 2009.","short":"D. Kundisch, C. Klein, in: International Federation of Classification Societies 2009 Conference, 2009.","ama":"Kundisch D, Klein C. An Evaluation Framework for Tracker Certificates during the Financial Crisis and beyond. In: <i>International Federation of Classification Societies 2009 Conference</i>. ; 2009.","ieee":"D. Kundisch and C. Klein, “An Evaluation Framework for Tracker Certificates during the Financial Crisis and beyond,” in <i>International Federation of Classification Societies 2009 Conference</i>, Dresden, Germany, 2009.","chicago":"Kundisch, Dennis, and C. Klein. “An Evaluation Framework for Tracker Certificates during the Financial Crisis and Beyond.” In <i>International Federation of Classification Societies 2009 Conference</i>, 2009."},"year":"2009"},{"_id":"2787","user_id":"16205","department":[{"_id":"276"}],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Monetary Growth: Trends, Impacts and Policies","status":"public","publisher":"Nova Science Publishers","date_updated":"2022-01-06T06:57:47Z","author":[{"full_name":"Dorfleitner, G.","last_name":"Dorfleitner","first_name":"G."},{"first_name":"C.","full_name":"Klein, C.","last_name":"Klein"},{"first_name":"Dennis","last_name":"Kundisch","full_name":"Kundisch, Dennis","id":"21117"}],"date_created":"2018-05-17T13:05:26Z","title":"Technical Analysis as a Method of Risk Management","publication_status":"published","year":"2009","place":"New York","citation":{"ama":"Dorfleitner G, Klein C, Kundisch D. Technical Analysis as a Method of Risk Management. In: <i>Monetary Growth: Trends, Impacts and Policies</i>. New York: Nova Science Publishers; 2009.","ieee":"G. Dorfleitner, C. Klein, and D. Kundisch, “Technical Analysis as a Method of Risk Management,” in <i>Monetary Growth: Trends, Impacts and Policies</i>, New York: Nova Science Publishers, 2009.","chicago":"Dorfleitner, G., C. Klein, and Dennis Kundisch. “Technical Analysis as a Method of Risk Management.” In <i>Monetary Growth: Trends, Impacts and Policies</i>. New York: Nova Science Publishers, 2009.","apa":"Dorfleitner, G., Klein, C., &#38; Kundisch, D. (2009). Technical Analysis as a Method of Risk Management. In <i>Monetary Growth: Trends, Impacts and Policies</i>. New York: Nova Science Publishers.","bibtex":"@inbook{Dorfleitner_Klein_Kundisch_2009, place={New York}, title={Technical Analysis as a Method of Risk Management}, booktitle={Monetary Growth: Trends, Impacts and Policies}, publisher={Nova Science Publishers}, author={Dorfleitner, G. and Klein, C. and Kundisch, Dennis}, year={2009} }","short":"G. Dorfleitner, C. Klein, D. Kundisch, in: Monetary Growth: Trends, Impacts and Policies, Nova Science Publishers, New York, 2009.","mla":"Dorfleitner, G., et al. “Technical Analysis as a Method of Risk Management.” <i>Monetary Growth: Trends, Impacts and Policies</i>, Nova Science Publishers, 2009."}},{"_id":"2792","series_title":"Lecture Notes in Business Information Processing (LN BIP)","user_id":"16205","department":[{"_id":"276"}],"type":"book_editor","editor":[{"id":"21117","full_name":"Kundisch, Dennis","last_name":"Kundisch","first_name":"Dennis"},{"first_name":"D.","full_name":"Veit, D.","last_name":"Veit"},{"first_name":"T.","last_name":"Weitzel","full_name":"Weitzel, T."},{"first_name":"C.","full_name":"Weinhardt, C.","last_name":"Weinhardt"}],"status":"public","date_updated":"2022-01-06T06:57:48Z","publisher":"Springer","date_created":"2018-05-17T13:14:40Z","volume":23,"title":"Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry","publication_status":"published","place":"Heidelberg","year":"2009","citation":{"bibtex":"@book{Kundisch_Veit_Weitzel_Weinhardt_2009, place={Heidelberg}, series={Lecture Notes in Business Information Processing (LN BIP)}, title={Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry}, volume={23}, publisher={Springer}, year={2009}, collection={Lecture Notes in Business Information Processing (LN BIP)} }","short":"D. Kundisch, D. Veit, T. Weitzel, C. Weinhardt, eds., Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry, Springer, Heidelberg, 2009.","mla":"Kundisch, Dennis, et al., editors. <i>Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry</i>. Vol. 23, Springer, 2009.","apa":"Kundisch, D., Veit, D., Weitzel, T., &#38; Weinhardt, C. (Eds.). (2009). <i>Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry</i> (Vol. 23). Heidelberg: Springer.","ama":"Kundisch D, Veit D, Weitzel T, Weinhardt C, eds. <i>Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry</i>. Vol 23. Heidelberg: Springer; 2009.","chicago":"Kundisch, Dennis, D. Veit, T. Weitzel, and C. Weinhardt, eds. <i>Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry</i>. Vol. 23. Lecture Notes in Business Information Processing (LN BIP). Heidelberg: Springer, 2009.","ieee":"D. Kundisch, D. Veit, T. Weitzel, and C. Weinhardt, Eds., <i>Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry</i>, vol. 23. Heidelberg: Springer, 2009."},"intvolume":"        23"},{"year":"2009","citation":{"ama":"Institut für Normung e.V. D. <i>PAS 1094: Hybride Wertschöpfung --- Integration von Produktion Und Dienstleistung.</i>; 2009.","chicago":"Institut für Normung e.V., Deutsches. <i>PAS 1094: Hybride Wertschöpfung --- Integration von Produktion Und Dienstleistung.</i>, 2009.","ieee":"D. Institut für Normung e.V., <i>PAS 1094: Hybride Wertschöpfung --- Integration von Produktion und Dienstleistung.</i> 2009.","mla":"Institut für Normung e.V., Deutsches. <i>PAS 1094: Hybride Wertschöpfung --- Integration von Produktion Und Dienstleistung.</i> 2009.","bibtex":"@book{Institut für Normung e.V._2009, title={PAS 1094: Hybride Wertschöpfung --- Integration von Produktion und Dienstleistung.}, author={Institut für Normung e.V., Deutsches}, year={2009} }","short":"D. Institut für Normung e.V., PAS 1094: Hybride Wertschöpfung --- Integration von Produktion Und Dienstleistung., 2009.","apa":"Institut für Normung e.V., D. (2009). <i>PAS 1094: Hybride Wertschöpfung --- Integration von Produktion und Dienstleistung.</i>"},"date_updated":"2022-01-06T07:01:36Z","author":[{"first_name":"Deutsches","last_name":"Institut für Normung e.V.","full_name":"Institut für Normung e.V., Deutsches"}],"date_created":"2018-10-30T14:29:40Z","title":"PAS 1094: Hybride Wertschöpfung --- Integration von Produktion und Dienstleistung.","type":"report","status":"public","_id":"5072","department":[{"_id":"526"}],"user_id":"21671","extern":"1"},{"publication":"Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung","type":"conference","abstract":[{"lang":"eng","text":"Der Beitrag diskutiert die kontroversen Ans{\\\"a}tze ? Verifizierung versus Evaluation/Zertifizierung ? zur Sicherung elektronischer Wahlen mit Wahlger{\\\"a}ten. Dabei spielt das Urteils des Bundesverfassungsgerichts [BVG099] eine zentrale Rolle. Hierin wird entschieden, dass die Zertifizierung des Wahlger{\\\"a}tes nicht ausreicht und es werden Verifizierungsfunktionen gefordert, die den W{\\\"a}hlern die M{\\\"o}glichkeit geben sich von der Integrit{\\\"a}t des Wahlergebnisses zu {\\\"u}berzeugen. Der Beitrag zeigt auf, dass auch mit der Implementierung entsprechender Verifizierungsfunktionen nicht auf Zertifizierung verzichtet werden kann, da an ein Wahlger{\\\"a}t auch andere Anforderungen wie etwa hinsichtlich des Wahlgeheimnisses gestellt werden. Es wird au{\\ss}erdem die Frage diskutiert, warum der Zertifizierung hinsichtlich dieser zus{\\\"a}tzlichen Anforderungen vertraut werden kann, w{\\\"a}hrend dies nicht der Fall bei der Integrit{\\\"a}tsanforderung ist."}],"status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":60870,"access_level":"open_access","file_id":"6313","file_name":"Elektronische Wahlen - GI 2009.pdf","date_updated":"2018-12-18T13:15:26Z","date_created":"2018-12-18T13:15:26Z","creator":"hsiemes"}],"_id":"5597","department":[{"_id":"277"}],"user_id":"61579","ddc":["000"],"file_date_updated":"2018-12-18T13:15:26Z","extern":"1","language":[{"iso":"eng"}],"has_accepted_license":"1","year":"2009","citation":{"apa":"Volkamer, M., Schryen, G., Langer, L., Schmidt, A., &#38; Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In <i>Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>.","mla":"Volkamer, Melanie, et al. “Elektronische Wahlen: Verifizierung vs. Zertifizierung.” <i>Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>, 2009.","bibtex":"@inproceedings{Volkamer_Schryen_Langer_Schmidt_Buchmann_2009, title={Elektronische Wahlen: Verifizierung vs. Zertifizierung}, booktitle={Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung}, author={Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes}, year={2009} }","short":"M. Volkamer, G. Schryen, L. Langer, A. Schmidt, J. Buchmann, in: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.","ama":"Volkamer M, Schryen G, Langer L, Schmidt A, Buchmann J. Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: <i>Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>. ; 2009.","chicago":"Volkamer, Melanie, Guido Schryen, Lucie Langer, Axel Schmidt, and Johannes Buchmann. “Elektronische Wahlen: Verifizierung vs. Zertifizierung.” In <i>Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>, 2009.","ieee":"M. Volkamer, G. Schryen, L. Langer, A. Schmidt, and J. Buchmann, “Elektronische Wahlen: Verifizierung vs. Zertifizierung,” in <i>Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung</i>, 2009."},"oa":"1","date_updated":"2022-01-06T07:02:05Z","date_created":"2018-11-14T11:49:04Z","author":[{"last_name":"Volkamer","full_name":"Volkamer, Melanie","first_name":"Melanie"},{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"},{"last_name":"Langer","full_name":"Langer, Lucie","first_name":"Lucie"},{"first_name":"Axel","full_name":"Schmidt, Axel","last_name":"Schmidt"},{"full_name":"Buchmann, Johannes","last_name":"Buchmann","first_name":"Johannes"}],"title":"Elektronische Wahlen: Verifizierung vs. Zertifizierung"},{"status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-18T13:16:07Z","_id":"5621","department":[{"_id":"277"}],"user_id":"61579","intvolume":"         4","page":"729-744","citation":{"bibtex":"@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \\&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }","mla":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.","short":"G. Schryen, E. Rich, IEEE Transactions on Information Forensics \\&#38; Security 4 (2009) 729–744.","apa":"Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, <i>4</i>(4 Part), 729–744.","ama":"Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>. 2009;4(4 Part):729-744.","chicago":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i> 4, no. 4 Part (2009): 729–44.","ieee":"G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744, 2009."},"has_accepted_license":"1","oa":"1","date_updated":"2022-01-06T07:02:12Z","volume":4,"author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"},{"full_name":"Rich, Eliot","last_name":"Rich","first_name":"Eliot"}],"abstract":[{"lang":"eng","text":"Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence."}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"6316","file_name":"JOURNAL VERSION.pdf","file_size":1544790,"date_created":"2018-12-18T13:16:07Z","creator":"hsiemes","date_updated":"2018-12-18T13:16:07Z"}],"publication":"IEEE Transactions on Information Forensics \\& Security","keyword":["e-voting","Internet voting","Internet election","security","verifiability","RIES","Estonia","Neuch{\\^a}tel"],"ddc":["000"],"language":[{"iso":"eng"}],"year":"2009","issue":"4 Part","title":"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland","publisher":"IEEE","date_created":"2018-11-14T14:06:44Z"},{"year":"2009","citation":{"chicago":"Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software: Towards Measuring Security.” In <i>24th Annual ACM Symposium on Applied Computing</i>, 2009.","ieee":"G. Schryen and R. Kadura, “Open Source vs. Closed Source Software: Towards Measuring Security,” in <i>24th Annual ACM Symposium on Applied Computing</i>, 2009.","ama":"Schryen G, Kadura R. Open Source vs. Closed Source Software: Towards Measuring Security. In: <i>24th Annual ACM Symposium on Applied Computing</i>. ; 2009.","bibtex":"@inproceedings{Schryen_Kadura_2009, title={Open Source vs. Closed Source Software: Towards Measuring Security}, booktitle={24th Annual ACM Symposium on Applied Computing}, author={Schryen, Guido and Kadura, Rouven}, year={2009} }","mla":"Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software: Towards Measuring Security.” <i>24th Annual ACM Symposium on Applied Computing</i>, 2009.","short":"G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.","apa":"Schryen, G., &#38; Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In <i>24th Annual ACM Symposium on Applied Computing</i>."},"has_accepted_license":"1","title":"Open Source vs. Closed Source Software: Towards Measuring Security","date_updated":"2022-01-06T07:02:13Z","oa":"1","date_created":"2018-11-14T14:12:27Z","author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"},{"full_name":"Kadura, Rouven","last_name":"Kadura","first_name":"Rouven"}],"abstract":[{"lang":"eng","text":"The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who are interested in exploiting software vulnerabilities. This deployment has resulted in a debate ?full of religion? on the security of open source software compared to that of closed source software. However, beyond such arguments, only little quantitative analysis on this research issue has taken place. We discuss the state-of-the-art of the security debate and identify shortcomings. Based on these, we propose new metrics, which allows to answer the question to what extent the review process of open source and closed source development has helped to fix vulnerabilities. We illustrate the application of some of these metrics in a case study on OpenOffice (open source software) vs. Microsoft Office (closed source software)."}],"file":[{"date_created":"2018-12-18T13:14:09Z","creator":"hsiemes","date_updated":"2018-12-18T13:14:09Z","file_id":"6310","access_level":"open_access","file_name":"ACM VERSION.pdf","file_size":456497,"content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"conference","publication":"24th Annual ACM Symposium on Applied Computing","ddc":["000"],"keyword":["Open source software","Closed source software","Security","Metrics"],"file_date_updated":"2018-12-18T13:14:09Z","extern":"1","language":[{"iso":"eng"}],"_id":"5625","user_id":"61579","department":[{"_id":"277"}]},{"has_accepted_license":"1","citation":{"short":"G. Schryen, in: 5th International Conference on IT Security Incident Management \\&#38; IT Forensics, 2009.","bibtex":"@inproceedings{Schryen_2009, title={A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors}, booktitle={5th International Conference on IT Security Incident Management \\&#38; IT Forensics}, author={Schryen, Guido}, year={2009} }","mla":"Schryen, Guido. “A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.” <i>5th International Conference on IT Security Incident Management \\&#38; IT Forensics</i>, 2009.","apa":"Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In <i>5th International Conference on IT Security Incident Management \\&#38; IT Forensics</i>.","ama":"Schryen G. A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: <i>5th International Conference on IT Security Incident Management \\&#38; IT Forensics</i>. ; 2009.","chicago":"Schryen, Guido. “A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.” In <i>5th International Conference on IT Security Incident Management \\&#38; IT Forensics</i>, 2009.","ieee":"G. Schryen, “A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors,” in <i>5th International Conference on IT Security Incident Management \\&#38; IT Forensics</i>, 2009."},"year":"2009","date_created":"2018-11-14T14:40:04Z","author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"oa":"1","date_updated":"2022-01-06T07:02:19Z","title":"A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors","publication":"5th International Conference on IT Security Incident Management \\& IT Forensics","type":"conference","status":"public","file":[{"date_created":"2018-12-18T13:14:48Z","creator":"hsiemes","date_updated":"2018-12-18T13:14:48Z","file_name":"Conference Version.pdf","access_level":"open_access","file_id":"6311","file_size":594302,"content_type":"application/pdf","relation":"main_file"}],"abstract":[{"text":"While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments is still weak. Addressing this research gap, this paper presents a comprehensive empirical investigation of the patching behavior of software vendors/communities of widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. As the value of any empirical study relies on the quality of data available, this paper also discusses in detail data issues, explains to what extent the empirical analysis can be based on vulnerability data contained in the NIST National Vulnerability Database, and shows how data on vulnerability patches was collected by the author to support this study. The results of the analysis suggest that it is not the particular software development style that determines patching behavior, but rather the policy of the particular software vendor.","lang":"eng"}],"department":[{"_id":"277"}],"user_id":"61579","_id":"5646","extern":"1","file_date_updated":"2018-12-18T13:14:48Z","language":[{"iso":"eng"}],"ddc":["000"]},{"file":[{"date_updated":"2018-12-18T13:16:39Z","creator":"hsiemes","date_created":"2018-12-18T13:16:39Z","file_size":483690,"access_level":"open_access","file_name":"Security of Open Source and Closed Source Software An Empirical - AMCIS Version.pdf","file_id":"6317","content_type":"application/pdf","relation":"main_file"}],"status":"public","abstract":[{"lang":"eng","text":"Reviewing literature on open source and closed source security reveals that the discussion is often determined by biased attitudes toward one of these development styles. The discussion specifically lacks appropriate metrics, methodology and hard data. This paper contributes to solving this problem by analyzing and comparing published vulnerabilities of eight open source software and nine closed source software packages, all of which are widely deployed. Thereby, it provides an extensive empirical analysis of vulnerabilities in terms of mean time between vulnerability disclosures, the development of disclosure over time, and the severity of vulnerabilities, and allows for validating models provided in the literature. The investigation reveals that (a) the mean time between vulnerability disclosures was lower for open source software in half of the cases, while the other cases show no differences, (b) in contrast to literature assumption, 14 out of 17 software packages showed a significant linear or piecewise linear correlation between time and the number of published vulnerabilities, and (c) regarding the severity of vulnerabilities, no significant differences were found between open source and closed source."}],"type":"conference","publication":"15th Americas Conference on Information Systems","extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:16:39Z","ddc":["000"],"keyword":["Vulnerabilities","security","open source software","closed source software","empirical comparison"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5647","citation":{"apa":"Schryen, G. (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities. In <i>15th Americas Conference on Information Systems</i>.","bibtex":"@inproceedings{Schryen_2009, title={Security of open source and closed source software: An empirical comparison of published vulnerabilities}, booktitle={15th Americas Conference on Information Systems}, author={Schryen, Guido}, year={2009} }","mla":"Schryen, Guido. “Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.” <i>15th Americas Conference on Information Systems</i>, 2009.","short":"G. Schryen, in: 15th Americas Conference on Information Systems, 2009.","ama":"Schryen G. Security of open source and closed source software: An empirical comparison of published vulnerabilities. In: <i>15th Americas Conference on Information Systems</i>. ; 2009.","ieee":"G. Schryen, “Security of open source and closed source software: An empirical comparison of published vulnerabilities,” in <i>15th Americas Conference on Information Systems</i>, 2009.","chicago":"Schryen, Guido. “Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.” In <i>15th Americas Conference on Information Systems</i>, 2009."},"year":"2009","has_accepted_license":"1","title":"Security of open source and closed source software: An empirical comparison of published vulnerabilities","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T14:41:24Z","date_updated":"2022-01-06T07:02:19Z","oa":"1"},{"title":"Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study","doi":"10.1007/b137171_22","date_updated":"2022-01-06T06:53:05Z","publisher":"Springer","date_created":"2020-06-23T09:10:17Z","author":[{"first_name":"Jörg","full_name":"Becker, Jörg","last_name":"Becker"},{"full_name":"Matzner, Martin","last_name":"Matzner","first_name":"Martin"},{"last_name":"Müller","full_name":"Müller, Oliver","id":"72849","first_name":"Oliver"}],"year":"2009","page":"207-215","citation":{"apa":"Becker, J., Matzner, M., &#38; Müller, O. (2009). Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study. In <i>Information Systems Development</i> (pp. 207–215). Springer. <a href=\"https://doi.org/10.1007/b137171_22\">https://doi.org/10.1007/b137171_22</a>","short":"J. Becker, M. Matzner, O. Müller, in: Information Systems Development, Springer, 2009, pp. 207–215.","mla":"Becker, Jörg, et al. “Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study.” <i>Information Systems Development</i>, Springer, 2009, pp. 207–15, doi:<a href=\"https://doi.org/10.1007/b137171_22\">10.1007/b137171_22</a>.","bibtex":"@inbook{Becker_Matzner_Müller_2009, title={Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study}, DOI={<a href=\"https://doi.org/10.1007/b137171_22\">10.1007/b137171_22</a>}, booktitle={Information Systems Development}, publisher={Springer}, author={Becker, Jörg and Matzner, Martin and Müller, Oliver}, year={2009}, pages={207–215} }","ieee":"J. Becker, M. Matzner, and O. Müller, “Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study,” in <i>Information Systems Development</i>, Springer, 2009, pp. 207–215.","chicago":"Becker, Jörg, Martin Matzner, and Oliver Müller. “Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study.” In <i>Information Systems Development</i>, 207–15. Springer, 2009. <a href=\"https://doi.org/10.1007/b137171_22\">https://doi.org/10.1007/b137171_22</a>.","ama":"Becker J, Matzner M, Müller O. Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study. In: <i>Information Systems Development</i>. Springer; 2009:207-215. doi:<a href=\"https://doi.org/10.1007/b137171_22\">10.1007/b137171_22</a>"},"publication_identifier":{"isbn":["9780387848099"],"eisbn":["9780387848105"]},"publication_status":"published","extern":"1","language":[{"iso":"eng"}],"_id":"17131","department":[{"_id":"196"}],"user_id":"71922","status":"public","publication":"Information Systems Development","type":"book_chapter"},{"author":[{"last_name":"Becker","full_name":"Becker, Jörg","first_name":"Jörg"},{"first_name":"Katrin","last_name":"Bergener","full_name":"Bergener, Katrin"},{"last_name":"Müller","full_name":"Müller, Oliver","id":"72849","first_name":"Oliver"},{"full_name":"Müller-Wienbergen, Felix","last_name":"Müller-Wienbergen","first_name":"Felix"}],"date_created":"2020-06-23T09:13:32Z","date_updated":"2022-01-06T06:53:05Z","main_file_link":[{"url":"https://aisel.aisnet.org/amcis2009/93/"}],"title":"Documentation of flexible business processes-A healthcare case study","citation":{"ama":"Becker J, Bergener K, Müller O, Müller-Wienbergen F. Documentation of flexible business processes-A healthcare case study. In: <i>Americas Conference on Information Systems</i>. ; 2009:93.","chicago":"Becker, Jörg, Katrin Bergener, Oliver Müller, and Felix Müller-Wienbergen. “Documentation of Flexible Business Processes-A Healthcare Case Study.” In <i>Americas Conference on Information Systems</i>, 93, 2009.","ieee":"J. Becker, K. Bergener, O. Müller, and F. Müller-Wienbergen, “Documentation of flexible business processes-A healthcare case study,” in <i>Americas Conference on Information Systems</i>, 2009, p. 93.","bibtex":"@inproceedings{Becker_Bergener_Müller_Müller-Wienbergen_2009, title={Documentation of flexible business processes-A healthcare case study}, booktitle={Americas Conference on Information Systems}, author={Becker, Jörg and Bergener, Katrin and Müller, Oliver and Müller-Wienbergen, Felix}, year={2009}, pages={93} }","mla":"Becker, Jörg, et al. “Documentation of Flexible Business Processes-A Healthcare Case Study.” <i>Americas Conference on Information Systems</i>, 2009, p. 93.","short":"J. Becker, K. Bergener, O. Müller, F. Müller-Wienbergen, in: Americas Conference on Information Systems, 2009, p. 93.","apa":"Becker, J., Bergener, K., Müller, O., &#38; Müller-Wienbergen, F. (2009). Documentation of flexible business processes-A healthcare case study. In <i>Americas Conference on Information Systems</i> (p. 93)."},"page":"93","year":"2009","user_id":"72849","department":[{"_id":"196"}],"_id":"17132","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"Americas Conference on Information Systems","status":"public"},{"status":"public","publication":"European Conference on Information Systems","type":"conference","language":[{"iso":"eng"}],"extern":"1","_id":"17133","department":[{"_id":"196"}],"user_id":"72849","year":"2009","citation":{"apa":"Müller-Wienbergen, F., Seidel, S., Müller, O., Knackstedt, R., &#38; Becker, J. (2009). A design research study on enhancing creativity-The case of developing product-service bundles. In <i>European Conference on Information Systems</i>.","bibtex":"@inproceedings{Müller-Wienbergen_Seidel_Müller_Knackstedt_Becker_2009, title={A design research study on enhancing creativity-The case of developing product-service bundles}, booktitle={European Conference on Information Systems}, author={Müller-Wienbergen, Felix and Seidel, Stefan and Müller, Oliver and Knackstedt, Ralf and Becker, Joerg}, year={2009} }","short":"F. Müller-Wienbergen, S. Seidel, O. Müller, R. Knackstedt, J. Becker, in: European Conference on Information Systems, 2009.","mla":"Müller-Wienbergen, Felix, et al. “A Design Research Study on Enhancing Creativity-The Case of Developing Product-Service Bundles.” <i>European Conference on Information Systems</i>, 2009.","chicago":"Müller-Wienbergen, Felix, Stefan Seidel, Oliver Müller, Ralf Knackstedt, and Joerg Becker. “A Design Research Study on Enhancing Creativity-The Case of Developing Product-Service Bundles.” In <i>European Conference on Information Systems</i>, 2009.","ieee":"F. Müller-Wienbergen, S. Seidel, O. Müller, R. Knackstedt, and J. Becker, “A design research study on enhancing creativity-The case of developing product-service bundles,” in <i>European Conference on Information Systems</i>, 2009.","ama":"Müller-Wienbergen F, Seidel S, Müller O, Knackstedt R, Becker J. A design research study on enhancing creativity-The case of developing product-service bundles. In: <i>European Conference on Information Systems</i>. ; 2009."},"title":"A design research study on enhancing creativity-The case of developing product-service bundles","main_file_link":[{"url":"https://aisel.aisnet.org/ecis2009/19/"}],"date_updated":"2022-01-06T06:53:05Z","author":[{"full_name":"Müller-Wienbergen, Felix","last_name":"Müller-Wienbergen","first_name":"Felix"},{"last_name":"Seidel","full_name":"Seidel, Stefan","first_name":"Stefan"},{"first_name":"Oliver","id":"72849","full_name":"Müller, Oliver","last_name":"Müller"},{"first_name":"Ralf","last_name":"Knackstedt","full_name":"Knackstedt, Ralf"},{"first_name":"Joerg","last_name":"Becker","full_name":"Becker, Joerg"}],"date_created":"2020-06-23T09:17:25Z"},{"language":[{"iso":"eng"}],"_id":"13257","user_id":"62809","department":[{"_id":"198"}],"status":"public","type":"journal_article","publication":"IEEE Internet Computing","title":"Social Search: Exploring and Searching Social Architectures in Digital Networks","doi":"10.1109/mic.2009.44","date_updated":"2022-01-06T06:51:31Z","author":[{"first_name":"Matthias","id":"72744","full_name":"Trier, Matthias","last_name":"Trier"},{"full_name":"Bobrik, Annette","last_name":"Bobrik","first_name":"Annette"}],"date_created":"2019-09-17T14:31:51Z","year":"2009","citation":{"ama":"Trier M, Bobrik A. Social Search: Exploring and Searching Social Architectures in Digital Networks. <i>IEEE Internet Computing</i>. 2009:51-59. doi:<a href=\"https://doi.org/10.1109/mic.2009.44\">10.1109/mic.2009.44</a>","ieee":"M. Trier and A. Bobrik, “Social Search: Exploring and Searching Social Architectures in Digital Networks,” <i>IEEE Internet Computing</i>, pp. 51–59, 2009.","chicago":"Trier, Matthias, and Annette Bobrik. “Social Search: Exploring and Searching Social Architectures in Digital Networks.” <i>IEEE Internet Computing</i>, 2009, 51–59. <a href=\"https://doi.org/10.1109/mic.2009.44\">https://doi.org/10.1109/mic.2009.44</a>.","bibtex":"@article{Trier_Bobrik_2009, title={Social Search: Exploring and Searching Social Architectures in Digital Networks}, DOI={<a href=\"https://doi.org/10.1109/mic.2009.44\">10.1109/mic.2009.44</a>}, journal={IEEE Internet Computing}, author={Trier, Matthias and Bobrik, Annette}, year={2009}, pages={51–59} }","short":"M. Trier, A. Bobrik, IEEE Internet Computing (2009) 51–59.","mla":"Trier, Matthias, and Annette Bobrik. “Social Search: Exploring and Searching Social Architectures in Digital Networks.” <i>IEEE Internet Computing</i>, 2009, pp. 51–59, doi:<a href=\"https://doi.org/10.1109/mic.2009.44\">10.1109/mic.2009.44</a>.","apa":"Trier, M., &#38; Bobrik, A. (2009). Social Search: Exploring and Searching Social Architectures in Digital Networks. <i>IEEE Internet Computing</i>, 51–59. <a href=\"https://doi.org/10.1109/mic.2009.44\">https://doi.org/10.1109/mic.2009.44</a>"},"page":"51-59","publication_status":"published","publication_identifier":{"issn":["1089-7801"]}},{"year":"2009","place":"Bonn","citation":{"ieee":"M.-A. Sanmateu, M. Trier, A. Lienicke, and A. Rederer, “Enabling social media content quality assurance using social network analysis,” in <i>9th International Conference On Innovative Internet Community Systems I2CS 2010</i>, 2009, pp. 27–35.","chicago":"Sanmateu, Maria-Amparo, Matthias Trier, Andreas Lienicke, and Andreas Rederer. “Enabling Social Media Content Quality Assurance Using Social Network Analysis.” In <i>9th International Conference On Innovative Internet Community Systems I2CS 2010</i>, edited by Volkmar Erfurth, Christian AND Eichler, Gerald AND Schau, 27–35. Bonn: Gesellschaft für Informatik e.V., 2009.","ama":"Sanmateu M-A, Trier M, Lienicke A, Rederer A. Enabling social media content quality assurance using social network analysis. In: Erfurth, Christian AND Eichler, Gerald AND Schau V, ed. <i>9th International Conference On Innovative Internet Community Systems I2CS 2010</i>. Bonn: Gesellschaft für Informatik e.V.; 2009:27-35.","bibtex":"@inproceedings{Sanmateu_Trier_Lienicke_Rederer_2009, place={Bonn}, title={Enabling social media content quality assurance using social network analysis}, booktitle={9th International Conference On Innovative Internet Community Systems I2CS 2010}, publisher={Gesellschaft für Informatik e.V.}, author={Sanmateu, Maria-Amparo and Trier, Matthias and Lienicke, Andreas and Rederer, Andreas}, editor={Erfurth, Christian AND Eichler, Gerald AND Schau, VolkmarEditor}, year={2009}, pages={27–35} }","short":"M.-A. Sanmateu, M. Trier, A. Lienicke, A. Rederer, in: V. Erfurth, Christian AND Eichler, Gerald AND Schau (Ed.), 9th International Conference On Innovative Internet Community Systems I2CS 2010, Gesellschaft für Informatik e.V., Bonn, 2009, pp. 27–35.","mla":"Sanmateu, Maria-Amparo, et al. “Enabling Social Media Content Quality Assurance Using Social Network Analysis.” <i>9th International Conference On Innovative Internet Community Systems I2CS 2010</i>, edited by Volkmar Erfurth, Christian AND Eichler, Gerald AND Schau, Gesellschaft für Informatik e.V., 2009, pp. 27–35.","apa":"Sanmateu, M.-A., Trier, M., Lienicke, A., &#38; Rederer, A. (2009). Enabling social media content quality assurance using social network analysis. In V. Erfurth, Christian AND Eichler, Gerald AND Schau (Ed.), <i>9th International Conference On Innovative Internet Community Systems I2CS 2010</i> (pp. 27–35). Bonn: Gesellschaft für Informatik e.V."},"page":" 27-35 ","title":"Enabling social media content quality assurance using social network analysis","date_updated":"2022-01-06T06:51:33Z","publisher":"Gesellschaft für Informatik e.V.","author":[{"full_name":"Sanmateu, Maria-Amparo","last_name":"Sanmateu","first_name":"Maria-Amparo"},{"full_name":"Trier, Matthias","id":"72744","last_name":"Trier","first_name":"Matthias"},{"last_name":"Lienicke","full_name":"Lienicke, Andreas","first_name":"Andreas"},{"last_name":"Rederer","full_name":"Rederer, Andreas","first_name":"Andreas"}],"date_created":"2019-09-19T10:31:32Z","editor":[{"first_name":"Volkmar","full_name":"Erfurth, Christian AND Eichler, Gerald AND Schau, Volkmar","last_name":"Erfurth, Christian AND Eichler, Gerald AND Schau"}],"status":"public","type":"conference","publication":"9th International Conference On Innovative Internet Community Systems I2CS 2010","language":[{"iso":"eng"}],"_id":"13312","user_id":"62809","department":[{"_id":"198"}]},{"language":[{"iso":"eng"}],"_id":"13349","department":[{"_id":"198"}],"user_id":"62809","status":"public","publication":"Proceedings Wirtschaftsinformatik","type":"conference","title":"Content-based Community Detection in Social Corpora","date_updated":"2022-01-06T06:51:33Z","publisher":"Österreichische Computer Gesellschaft Verlag","volume":1,"author":[{"last_name":"Bobrik","full_name":"Bobrik, Annette","first_name":"Annette"},{"first_name":"Matthias","last_name":"Trier","full_name":"Trier, Matthias","id":"72744"}],"date_created":"2019-09-19T13:57:57Z","year":"2009","place":"Wien","page":"295-304","intvolume":"         1","citation":{"chicago":"Bobrik, Annette, and Matthias Trier. “Content-Based Community Detection in Social Corpora.” In <i>Proceedings Wirtschaftsinformatik</i>, 1:295–304. Wien: Österreichische Computer Gesellschaft Verlag, 2009.","ieee":"A. Bobrik and M. Trier, “Content-based Community Detection in Social Corpora,” in <i>Proceedings Wirtschaftsinformatik</i>, 2009, vol. 1, pp. 295–304.","ama":"Bobrik A, Trier M. Content-based Community Detection in Social Corpora. In: <i>Proceedings Wirtschaftsinformatik</i>. Vol 1. Wien: Österreichische Computer Gesellschaft Verlag; 2009:295-304.","bibtex":"@inproceedings{Bobrik_Trier_2009, place={Wien}, title={Content-based Community Detection in Social Corpora}, volume={1}, booktitle={Proceedings Wirtschaftsinformatik}, publisher={Österreichische Computer Gesellschaft Verlag}, author={Bobrik, Annette and Trier, Matthias}, year={2009}, pages={295–304} }","mla":"Bobrik, Annette, and Matthias Trier. “Content-Based Community Detection in Social Corpora.” <i>Proceedings Wirtschaftsinformatik</i>, vol. 1, Österreichische Computer Gesellschaft Verlag, 2009, pp. 295–304.","short":"A. Bobrik, M. Trier, in: Proceedings Wirtschaftsinformatik, Österreichische Computer Gesellschaft Verlag, Wien, 2009, pp. 295–304.","apa":"Bobrik, A., &#38; Trier, M. (2009). Content-based Community Detection in Social Corpora. In <i>Proceedings Wirtschaftsinformatik</i> (Vol. 1, pp. 295–304). Wien: Österreichische Computer Gesellschaft Verlag."}},{"status":"public","publication":"Proceedings Wirtschaftsinformatik","type":"conference","language":[{"iso":"ger"}],"_id":"13352","department":[{"_id":"198"}],"user_id":"62809","year":"2009","place":"Wien","page":"391-400","citation":{"ama":"Trier M, Herzog M, Möller D. Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte. In: <i>Proceedings Wirtschaftsinformatik</i>. Wien: Österreichische Computer Gesellschaft Verlag; 2009:391-400.","ieee":"M. Trier, M. Herzog, and D. Möller, “Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte,” in <i>Proceedings Wirtschaftsinformatik</i>, 2009, pp. 391–400.","chicago":"Trier, Matthias, Michael Herzog, and Daniel Möller. “Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte.” In <i>Proceedings Wirtschaftsinformatik</i>, 391–400. Wien: Österreichische Computer Gesellschaft Verlag, 2009.","apa":"Trier, M., Herzog, M., &#38; Möller, D. (2009). Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte. In <i>Proceedings Wirtschaftsinformatik</i> (pp. 391–400). Wien: Österreichische Computer Gesellschaft Verlag.","mla":"Trier, Matthias, et al. “Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte.” <i>Proceedings Wirtschaftsinformatik</i>, Österreichische Computer Gesellschaft Verlag, 2009, pp. 391–400.","bibtex":"@inproceedings{Trier_Herzog_Möller_2009, place={Wien}, title={Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte}, booktitle={Proceedings Wirtschaftsinformatik}, publisher={Österreichische Computer Gesellschaft Verlag}, author={Trier, Matthias and Herzog, Michael and Möller, Daniel}, year={2009}, pages={391–400} }","short":"M. Trier, M. Herzog, D. Möller, in: Proceedings Wirtschaftsinformatik, Österreichische Computer Gesellschaft Verlag, Wien, 2009, pp. 391–400."},"title":"Odp2cp – ein rapid E-Learning Ansatz zur einfachen Produktion Scorm-konformer Lerninhalte","publisher":"Österreichische Computer Gesellschaft Verlag","date_updated":"2022-01-06T06:51:33Z","author":[{"first_name":"Matthias","id":"72744","full_name":"Trier, Matthias","last_name":"Trier"},{"last_name":"Herzog","full_name":"Herzog, Michael","first_name":"Michael"},{"full_name":"Möller, Daniel","last_name":"Möller","first_name":"Daniel"}],"date_created":"2019-09-19T14:04:36Z"},{"_id":"3477","user_id":"21671","department":[{"_id":"526"}],"extern":"1","type":"conference","publication":"Proceedings of the 41th Hawai'i International Conference on System Sciences","status":"public","date_updated":"2022-01-06T06:59:18Z","author":[{"first_name":"Jörg","full_name":"Becker, Jörg","last_name":"Becker"},{"full_name":"Beverungen, Daniel","id":"59677","last_name":"Beverungen","first_name":"Daniel"},{"first_name":"Ralf","last_name":"Knackstedt","full_name":"Knackstedt, Ralf"}],"date_created":"2018-07-06T09:53:25Z","title":"Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research","conference":{"name":"41th Hawai'i International Conference on System Sciences","location":"Waikoloa, Hawaii"},"year":"2008","place":"Waikoloa, Hawaii","citation":{"apa":"Becker, J., Beverungen, D., &#38; Knackstedt, R. (2008). Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research. In <i>Proceedings of the 41th Hawai’i International Conference on System Sciences</i>. Waikoloa, Hawaii.","bibtex":"@inproceedings{Becker_Beverungen_Knackstedt_2008, place={Waikoloa, Hawaii}, title={Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research}, booktitle={Proceedings of the 41th Hawai’i International Conference on System Sciences}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf}, year={2008} }","short":"J. Becker, D. Beverungen, R. Knackstedt, in: Proceedings of the 41th Hawai’i International Conference on System Sciences, Waikoloa, Hawaii, 2008.","mla":"Becker, Jörg, et al. “Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research.” <i>Proceedings of the 41th Hawai’i International Conference on System Sciences</i>, 2008.","ama":"Becker J, Beverungen D, Knackstedt R. Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research. In: <i>Proceedings of the 41th Hawai’i International Conference on System Sciences</i>. Waikoloa, Hawaii; 2008.","ieee":"J. Becker, D. Beverungen, and R. Knackstedt, “Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research,” in <i>Proceedings of the 41th Hawai’i International Conference on System Sciences</i>, Waikoloa, Hawaii, 2008.","chicago":"Becker, Jörg, Daniel Beverungen, and Ralf Knackstedt. “Reference Models and Modeling Languages for Product-Service Systems --- Status-Quo and Perspectives for Further Research.” In <i>Proceedings of the 41th Hawai’i International Conference on System Sciences</i>. Waikoloa, Hawaii, 2008."}},{"title":"Modeling, Customer-Specific Configuration and Calculation of Value Bundles","main_file_link":[{"url":"https://aisel.aisnet.org/amcis2008/211/"}],"conference":{"name":"14th Americas Conference on Information Systems","location":"Toronto, Canada"},"date_updated":"2022-01-06T06:59:18Z","author":[{"full_name":"Becker, Jörg","last_name":"Becker","first_name":"Jörg"},{"last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677","first_name":"Daniel"},{"first_name":"Ralf","last_name":"Knackstedt","full_name":"Knackstedt, Ralf"},{"first_name":"Oliver","last_name":"Müller","full_name":"Müller, Oliver","id":"72849"}],"date_created":"2018-07-06T09:56:40Z","year":"2008","place":"Toronto, Canada","citation":{"ama":"Becker J, Beverungen D, Knackstedt R, Müller O. Modeling, Customer-Specific Configuration and Calculation of Value Bundles. In: <i>Americas Conference on Information Systems</i>. Toronto, Canada; 2008.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, and O. Müller, “Modeling, Customer-Specific Configuration and Calculation of Value Bundles,” in <i>Americas Conference on Information Systems</i>, Toronto, Canada, 2008.","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, and Oliver Müller. “Modeling, Customer-Specific Configuration and Calculation of Value Bundles.” In <i>Americas Conference on Information Systems</i>. Toronto, Canada, 2008.","apa":"Becker, J., Beverungen, D., Knackstedt, R., &#38; Müller, O. (2008). Modeling, Customer-Specific Configuration and Calculation of Value Bundles. In <i>Americas Conference on Information Systems</i>. Toronto, Canada.","mla":"Becker, Jörg, et al. “Modeling, Customer-Specific Configuration and Calculation of Value Bundles.” <i>Americas Conference on Information Systems</i>, 2008.","bibtex":"@inproceedings{Becker_Beverungen_Knackstedt_Müller_2008, place={Toronto, Canada}, title={Modeling, Customer-Specific Configuration and Calculation of Value Bundles}, booktitle={Americas Conference on Information Systems}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Müller, Oliver}, year={2008} }","short":"J. Becker, D. Beverungen, R. Knackstedt, O. Müller, in: Americas Conference on Information Systems, Toronto, Canada, 2008."},"extern":"1","language":[{"iso":"eng"}],"_id":"3478","user_id":"72849","department":[{"_id":"526"}],"status":"public","type":"conference","publication":"Americas Conference on Information Systems"},{"citation":{"chicago":"Beverungen, Daniel, Uwe Kaiser, Ralf Knackstedt, Robin Krings, and Armin Stein. “Konfigurative Prozessmodellierung Der Hybriden Leistungserstellung in Unternehmensnetzwerken Des Maschinen- Und Anlagenbaus.” In <i>Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)</i>, 735--747. München, 2008.","ieee":"D. Beverungen, U. Kaiser, R. Knackstedt, R. Krings, and A. Stein, “Konfigurative Prozessmodellierung der hybriden Leistungserstellung in Unternehmensnetzwerken des Maschinen- und Anlagenbaus,” in <i>Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)</i>, München, 2008, pp. 735--747.","ama":"Beverungen D, Kaiser U, Knackstedt R, Krings R, Stein A. Konfigurative Prozessmodellierung der hybriden Leistungserstellung in Unternehmensnetzwerken des Maschinen- und Anlagenbaus. In: <i>Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)</i>. München; 2008:735--747.","bibtex":"@inproceedings{Beverungen_Kaiser_Knackstedt_Krings_Stein_2008, place={München}, title={Konfigurative Prozessmodellierung der hybriden Leistungserstellung in Unternehmensnetzwerken des Maschinen- und Anlagenbaus}, booktitle={Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)}, author={Beverungen, Daniel and Kaiser, Uwe and Knackstedt, Ralf and Krings, Robin and Stein, Armin}, year={2008}, pages={735--747} }","short":"D. Beverungen, U. Kaiser, R. Knackstedt, R. Krings, A. Stein, in: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008), München, 2008, pp. 735--747.","mla":"Beverungen, Daniel, et al. “Konfigurative Prozessmodellierung Der Hybriden Leistungserstellung in Unternehmensnetzwerken Des Maschinen- Und Anlagenbaus.” <i>Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)</i>, 2008, pp. 735--747.","apa":"Beverungen, D., Kaiser, U., Knackstedt, R., Krings, R., &#38; Stein, A. (2008). Konfigurative Prozessmodellierung der hybriden Leistungserstellung in Unternehmensnetzwerken des Maschinen- und Anlagenbaus. In <i>Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)</i> (pp. 735--747). München."},"page":"735--747","year":"2008","place":"München","author":[{"id":"59677","full_name":"Beverungen, Daniel","last_name":"Beverungen","first_name":"Daniel"},{"full_name":"Kaiser, Uwe","last_name":"Kaiser","first_name":"Uwe"},{"first_name":"Ralf","full_name":"Knackstedt, Ralf","last_name":"Knackstedt"},{"full_name":"Krings, Robin","last_name":"Krings","first_name":"Robin"},{"first_name":"Armin","last_name":"Stein","full_name":"Stein, Armin"}],"date_created":"2018-07-06T09:58:15Z","date_updated":"2022-01-06T06:59:18Z","conference":{"name":"Multikonferenz Wirtschaftsinformatik (MKWI 2008)","location":"München"},"title":"Konfigurative Prozessmodellierung der hybriden Leistungserstellung in Unternehmensnetzwerken des Maschinen- und Anlagenbaus","type":"conference","publication":"Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 2008)","status":"public","user_id":"21671","department":[{"_id":"526"}],"_id":"3479","extern":"1"},{"extern":"1","_id":"3480","user_id":"21671","department":[{"_id":"526"}],"status":"public","type":"conference","publication":"Proceedings of the 16th European Conference on Information Systems","title":"Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail","conference":{"location":"Galway, Ireland","name":"16th European Conference on Information Systems"},"date_updated":"2022-01-06T06:59:18Z","date_created":"2018-07-06T09:59:18Z","author":[{"full_name":"Winkelmann, Axel","last_name":"Winkelmann","first_name":"Axel"},{"full_name":"Beverungen, Daniel","id":"59677","last_name":"Beverungen","first_name":"Daniel"},{"first_name":"Christian","full_name":"Janiesch, Christian","last_name":"Janiesch"},{"full_name":"Becker, Jörg","last_name":"Becker","first_name":"Jörg"}],"place":"Galway, Ireland","year":"2008","citation":{"apa":"Winkelmann, A., Beverungen, D., Janiesch, C., &#38; Becker, J. (2008). Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail. In <i>Proceedings of the 16th European Conference on Information Systems</i>. Galway, Ireland.","bibtex":"@inproceedings{Winkelmann_Beverungen_Janiesch_Becker_2008, place={Galway, Ireland}, title={Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail}, booktitle={Proceedings of the 16th European Conference on Information Systems}, author={Winkelmann, Axel and Beverungen, Daniel and Janiesch, Christian and Becker, Jörg}, year={2008} }","short":"A. Winkelmann, D. Beverungen, C. Janiesch, J. Becker, in: Proceedings of the 16th European Conference on Information Systems, Galway, Ireland, 2008.","mla":"Winkelmann, Axel, et al. “Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail.” <i>Proceedings of the 16th European Conference on Information Systems</i>, 2008.","chicago":"Winkelmann, Axel, Daniel Beverungen, Christian Janiesch, and Jörg Becker. “Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail.” In <i>Proceedings of the 16th European Conference on Information Systems</i>. Galway, Ireland, 2008.","ieee":"A. Winkelmann, D. Beverungen, C. Janiesch, and J. Becker, “Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail,” in <i>Proceedings of the 16th European Conference on Information Systems</i>, Galway, Ireland, 2008.","ama":"Winkelmann A, Beverungen D, Janiesch C, Becker J. Improving the Quality of Article Master Data --- Specification of an Integrated Master Data Platform for Promotions in Retail. In: <i>Proceedings of the 16th European Conference on Information Systems</i>. Galway, Ireland; 2008."}}]
