[{"type":"conference","citation":{"chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response.” In Proceedings of the 46th Hawaii International Conference on System Science, 2013.","ama":"Wex F, Schryen G, Neumann D. Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In: Proceedings of the 46th Hawaii International Conference on System Science. ; 2013.","apa":"Wex, F., Schryen, G., & Neumann, D. (2013). Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In Proceedings of the 46th Hawaii International Conference on System Science.","bibtex":"@inproceedings{Wex_Schryen_Neumann_2013, title={Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response}, booktitle={Proceedings of the 46th Hawaii International Conference on System Science}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2013} }","mla":"Wex, Felix, et al. “Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response.” Proceedings of the 46th Hawaii International Conference on System Science, 2013.","short":"F. Wex, G. Schryen, D. Neumann, in: Proceedings of the 46th Hawaii International Conference on System Science, 2013.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response,” in Proceedings of the 46th Hawaii International Conference on System Science, 2013."},"year":"2013","language":[{"iso":"eng"}],"_id":"5576","date_updated":"2022-01-06T07:02:00Z","oa":"1","publication":"Proceedings of the 46th Hawaii International Conference on System Science","file_date_updated":"2018-12-13T15:12:05Z","department":[{"_id":"277"}],"author":[{"first_name":"Felix","full_name":"Wex, Felix","last_name":"Wex"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"full_name":"Neumann, Dirk","first_name":"Dirk","last_name":"Neumann"}],"file":[{"access_level":"open_access","file_name":"ERS_HICSS2013_revised_v11-ACM [number].pdf","date_created":"2018-12-07T12:00:30Z","content_type":"application/pdf","date_updated":"2018-12-13T15:12:05Z","relation":"main_file","file_size":394101,"creator":"hsiemes","file_id":"6049"}],"date_created":"2018-11-14T11:14:56Z","status":"public","has_accepted_license":"1","extern":"1","title":"Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response","ddc":["000"],"user_id":"61579"},{"page":"139-169","citation":{"ieee":"G. Schryen, “Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there,” European Journal of Information Systems (EJIS), vol. 22, no. 2, pp. 139–169, 2013.","short":"G. Schryen, European Journal of Information Systems (EJIS) 22 (2013) 139–169.","bibtex":"@article{Schryen_2013, title={Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there}, volume={22}, number={2}, journal={European Journal of Information Systems (EJIS)}, author={Schryen, Guido}, year={2013}, pages={139–169} }","mla":"Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know, What We Still Need to Know, and How We Can Get There.” European Journal of Information Systems (EJIS), vol. 22, no. 2, 2013, pp. 139–69.","apa":"Schryen, G. (2013). Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS), 22(2), 139–169.","ama":"Schryen G. Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS). 2013;22(2):139-169.","chicago":"Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know, What We Still Need to Know, and How We Can Get There.” European Journal of Information Systems (EJIS) 22, no. 2 (2013): 139–69."},"year":"2013","type":"journal_article","intvolume":" 22","_id":"5637","issue":"2","file":[{"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:11:53Z","creator":"hsiemes","file_id":"6048","file_size":792102,"access_level":"open_access","date_created":"2018-12-07T11:59:54Z","file_name":"EJIS-PAPER.pdf"}],"publication":"European Journal of Information Systems (EJIS)","file_date_updated":"2018-12-13T15:11:53Z","author":[{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"}],"date_created":"2018-11-14T14:31:37Z","has_accepted_license":"1","status":"public","volume":22,"extern":"1","user_id":"61579","ddc":["000"],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:16Z","oa":"1","department":[{"_id":"277"}],"title":"Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there"},{"language":[{"iso":"eng"}],"citation":{"chicago":"Püschel, Tim, Guido Schryen, Diana Hristova, and Dirk Neumann. “Cloud Service Revenue Management.” In European Conference on Information Systems, 2012.","apa":"Püschel, T., Schryen, G., Hristova, D., & Neumann, D. (2012). Cloud Service Revenue Management. In European Conference on Information Systems.","ama":"Püschel T, Schryen G, Hristova D, Neumann D. Cloud Service Revenue Management. In: European Conference on Information Systems. ; 2012.","mla":"Püschel, Tim, et al. “Cloud Service Revenue Management.” European Conference on Information Systems, 2012.","bibtex":"@inproceedings{Püschel_Schryen_Hristova_Neumann_2012, title={Cloud Service Revenue Management}, booktitle={European Conference on Information Systems}, author={Püschel, Tim and Schryen, Guido and Hristova, Diana and Neumann, Dirk}, year={2012} }","short":"T. Püschel, G. Schryen, D. Hristova, D. Neumann, in: European Conference on Information Systems, 2012.","ieee":"T. Püschel, G. Schryen, D. Hristova, and D. Neumann, “Cloud Service Revenue Management,” in European Conference on Information Systems, 2012."},"year":"2012","type":"conference","oa":"1","date_updated":"2022-01-06T07:02:31Z","_id":"5680","date_created":"2018-11-14T15:40:59Z","status":"public","has_accepted_license":"1","file":[{"file_size":476955,"file_id":"6177","creator":"hsiemes","content_type":"application/pdf","date_updated":"2018-12-13T15:14:33Z","relation":"main_file","date_created":"2018-12-11T15:00:25Z","file_name":"Proceedings version.pdf","access_level":"open_access"}],"publication":"European Conference on Information Systems","department":[{"_id":"277"}],"file_date_updated":"2018-12-13T15:14:33Z","author":[{"first_name":"Tim","full_name":"Püschel, Tim","last_name":"Püschel"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"},{"first_name":"Diana","full_name":"Hristova, Diana","last_name":"Hristova"},{"first_name":"Dirk","full_name":"Neumann, Dirk","last_name":"Neumann"}],"user_id":"61579","ddc":["000"],"title":"Cloud Service Revenue Management","extern":"1"},{"_id":"5683","date_updated":"2022-01-06T07:02:32Z","type":"conference","year":"2012","citation":{"apa":"Lang, F., Schryen, G., & Fink, A. (2012). Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study. In International Conference on Information Systems.","ama":"Lang F, Schryen G, Fink A. Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study. In: International Conference on Information Systems. ; 2012.","chicago":"Lang, Fabian, Guido Schryen, and Andreas Fink. “Elicitating, Modeling, and Processing Uncertain Human Preferences for Software Agents in Electronic Negotiations: An Empirical Study.” In International Conference on Information Systems, 2012.","bibtex":"@inproceedings{Lang_Schryen_Fink_2012, title={Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study}, booktitle={International Conference on Information Systems}, author={Lang, Fabian and Schryen, Guido and Fink, Andreas}, year={2012} }","mla":"Lang, Fabian, et al. “Elicitating, Modeling, and Processing Uncertain Human Preferences for Software Agents in Electronic Negotiations: An Empirical Study.” International Conference on Information Systems, 2012.","short":"F. Lang, G. Schryen, A. Fink, in: International Conference on Information Systems, 2012.","ieee":"F. Lang, G. Schryen, and A. Fink, “Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study,” in International Conference on Information Systems, 2012."},"language":[{"iso":"eng"}],"title":"Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study","user_id":"61579","extern":"1","status":"public","date_created":"2018-11-14T15:44:07Z","author":[{"last_name":"Lang","first_name":"Fabian","full_name":"Lang, Fabian"},{"last_name":"Schryen","id":"72850","first_name":"Guido","full_name":"Schryen, Guido"},{"last_name":"Fink","full_name":"Fink, Andreas","first_name":"Andreas"}],"publication":"International Conference on Information Systems","department":[{"_id":"277"}]},{"department":[{"_id":"277"}],"title":"Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:33Z","oa":"1","publication":"European Journal of Operational Research : EJOR","file_date_updated":"2018-12-13T15:13:35Z","author":[{"full_name":"Bodenstein, Christian","first_name":"Christian","last_name":"Bodenstein"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"last_name":"Neumann","first_name":"Dirk","full_name":"Neumann, Dirk"}],"publisher":"Elsevier","file":[{"date_created":"2018-12-11T14:54:18Z","file_name":"1-s2.0-S0377221712002810-main.pdf","access_level":"open_access","file_size":520239,"creator":"hsiemes","file_id":"6172","content_type":"application/pdf","date_updated":"2018-12-13T15:13:35Z","relation":"main_file"}],"volume":222,"date_created":"2018-11-14T15:47:32Z","status":"public","has_accepted_license":"1","extern":"1","ddc":["000"],"user_id":"61579","page":"157-167","citation":{"short":"C. Bodenstein, G. Schryen, D. Neumann, European Journal of Operational Research : EJOR 222 (2012) 157–167.","ieee":"C. Bodenstein, G. Schryen, and D. Neumann, “Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers,” European Journal of Operational Research : EJOR, vol. 222, no. 1, pp. 157–167, 2012.","ama":"Bodenstein C, Schryen G, Neumann D. Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers. European Journal of Operational Research : EJOR. 2012;222(1):157-167.","apa":"Bodenstein, C., Schryen, G., & Neumann, D. (2012). Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers. European Journal of Operational Research : EJOR, 222(1), 157–167.","chicago":"Bodenstein, Christian, Guido Schryen, and Dirk Neumann. “Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers.” European Journal of Operational Research : EJOR 222, no. 1 (2012): 157–67.","bibtex":"@article{Bodenstein_Schryen_Neumann_2012, title={Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers}, volume={222}, number={1}, journal={European Journal of Operational Research : EJOR}, publisher={Elsevier}, author={Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2012}, pages={157–167} }","mla":"Bodenstein, Christian, et al. “Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers.” European Journal of Operational Research : EJOR, vol. 222, no. 1, Elsevier, 2012, pp. 157–67."},"type":"journal_article","year":"2012","_id":"5688","intvolume":" 222","issue":"1"},{"department":[{"_id":"277"}],"title":"A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty","language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T07:02:00Z","volume":4,"status":"public","has_accepted_license":"1","date_created":"2018-11-14T11:16:03Z","author":[{"full_name":"Wex, Felix","first_name":"Felix","last_name":"Wex"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"},{"last_name":"Neumann","full_name":"Neumann, Dirk","first_name":"Dirk"}],"publisher":"IGI Publ.","file_date_updated":"2018-12-13T15:14:45Z","publication":"International Journal of Information Systems for Crisis Response and Management","file":[{"file_id":"6178","creator":"hsiemes","file_size":377121,"relation":"main_file","date_updated":"2018-12-13T15:14:45Z","content_type":"application/pdf","date_created":"2018-12-11T15:01:01Z","file_name":"Revision - Wex et al.pdf","access_level":"open_access"}],"ddc":["000"],"user_id":"61579","extern":"1","citation":{"short":"F. Wex, G. Schryen, D. Neumann, International Journal of Information Systems for Crisis Response and Management 4 (2012) 23–41.","ieee":"F. Wex, G. Schryen, and D. Neumann, “A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty,” International Journal of Information Systems for Crisis Response and Management, vol. 4, no. 3, pp. 23–41, 2012.","ama":"Wex F, Schryen G, Neumann D. A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty. International Journal of Information Systems for Crisis Response and Management. 2012;4(3):23-41.","apa":"Wex, F., Schryen, G., & Neumann, D. (2012). A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty. International Journal of Information Systems for Crisis Response and Management, 4(3), 23–41.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty.” International Journal of Information Systems for Crisis Response and Management 4, no. 3 (2012): 23–41.","bibtex":"@article{Wex_Schryen_Neumann_2012, title={A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty}, volume={4}, number={3}, journal={International Journal of Information Systems for Crisis Response and Management}, publisher={IGI Publ.}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2012}, pages={23–41} }","mla":"Wex, Felix, et al. “A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty.” International Journal of Information Systems for Crisis Response and Management, vol. 4, no. 3, IGI Publ., 2012, pp. 23–41."},"year":"2012","type":"journal_article","page":"23-41","issue":"3","intvolume":" 4","_id":"5578"},{"language":[{"iso":"eng"}],"year":"2012","citation":{"short":"F. Wex, G. Schryen, D. Neumann, in: International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 2012.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units,” in International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 2012.","ama":"Wex F, Schryen G, Neumann D. Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In: International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012. ; 2012.","apa":"Wex, F., Schryen, G., & Neumann, D. (2012). Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units.” In International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 2012.","bibtex":"@inproceedings{Wex_Schryen_Neumann_2012, title={Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units}, booktitle={International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2012} }","mla":"Wex, Felix, et al. “Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units.” International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 2012."},"type":"conference","date_updated":"2022-01-06T07:02:01Z","_id":"5579","oa":"1","file":[{"file_name":"Proceedings version - 152.pdf","date_created":"2018-12-11T14:59:44Z","access_level":"open_access","creator":"hsiemes","file_id":"6176","file_size":614029,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:14:20Z"}],"department":[{"_id":"277"}],"file_date_updated":"2018-12-13T15:14:20Z","publication":"International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012","author":[{"first_name":"Felix","full_name":"Wex, Felix","last_name":"Wex"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"full_name":"Neumann, Dirk","first_name":"Dirk","last_name":"Neumann"}],"date_created":"2018-11-14T11:16:58Z","has_accepted_license":"1","status":"public","extern":"1","user_id":"61579","ddc":["000"],"title":"Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units"},{"language":[{"iso":"eng"}],"citation":{"mla":"Schryen, Guido, and Felix Wex. “IS Design Thinking in Disaster Management Research.” 45th Hawaii International Conference on System Sciences, 2012.","bibtex":"@inproceedings{Schryen_Wex_2012, title={IS Design Thinking in Disaster Management Research}, booktitle={45th Hawaii International Conference on System Sciences}, author={Schryen, Guido and Wex, Felix}, year={2012} }","ama":"Schryen G, Wex F. IS Design Thinking in Disaster Management Research. In: 45th Hawaii International Conference on System Sciences. ; 2012.","apa":"Schryen, G., & Wex, F. (2012). IS Design Thinking in Disaster Management Research. In 45th Hawaii International Conference on System Sciences.","chicago":"Schryen, Guido, and Felix Wex. “IS Design Thinking in Disaster Management Research.” In 45th Hawaii International Conference on System Sciences, 2012.","ieee":"G. Schryen and F. Wex, “IS Design Thinking in Disaster Management Research,” in 45th Hawaii International Conference on System Sciences, 2012.","short":"G. Schryen, F. Wex, in: 45th Hawaii International Conference on System Sciences, 2012."},"year":"2012","type":"conference","oa":"1","date_updated":"2022-01-06T07:02:08Z","_id":"5615","has_accepted_license":"1","status":"public","date_created":"2018-11-14T13:59:23Z","file":[{"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:14:09Z","creator":"hsiemes","file_id":"6175","file_size":207629,"access_level":"open_access","file_name":"PID2061325.pdf","date_created":"2018-12-11T14:58:56Z"}],"author":[{"last_name":"Schryen","id":"72850","first_name":"Guido","full_name":"Schryen, Guido"},{"last_name":"Wex","first_name":"Felix","full_name":"Wex, Felix"}],"department":[{"_id":"277"}],"publication":"45th Hawaii International Conference on System Sciences","file_date_updated":"2018-12-13T15:14:09Z","user_id":"61579","ddc":["000"],"title":"IS Design Thinking in Disaster Management Research","extern":"1"},{"extern":"1","user_id":"61579","ddc":["000"],"title":"Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012)","file":[{"creator":"hsiemes","file_id":"6179","file_size":260775,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:15:22Z","file_name":"Zeit_Artikel_16_4_2012.pdf","date_created":"2018-12-11T15:01:42Z","access_level":"open_access"}],"author":[{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"}],"department":[{"_id":"277"}],"file_date_updated":"2018-12-13T15:15:22Z","publication":"Die Zeit","status":"public","has_accepted_license":"1","date_created":"2018-11-14T14:32:11Z","date_updated":"2022-01-06T07:02:16Z","_id":"5638","oa":"1","language":[{"iso":"eng"}],"year":"2012","citation":{"ieee":"G. Schryen, “Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012),” Die Zeit, 2012.","short":"G. Schryen, Die Zeit (2012).","bibtex":"@article{Schryen_2012, title={Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012)}, journal={Die Zeit}, author={Schryen, Guido}, year={2012} }","mla":"Schryen, Guido. “Profis Im Netz: Soziale Netzwerke Könnten in Unternehmen Viel Mehr Nutzen Stiften - Woran Hakt Es?, In: Die Zeit (12.04.2012).” Die Zeit, 2012.","apa":"Schryen, G. (2012). Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012). Die Zeit.","ama":"Schryen G. Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012). Die Zeit. 2012.","chicago":"Schryen, Guido. “Profis Im Netz: Soziale Netzwerke Könnten in Unternehmen Viel Mehr Nutzen Stiften - Woran Hakt Es?, In: Die Zeit (12.04.2012).” Die Zeit, 2012."},"type":"journal_article"},{"has_accepted_license":"1","status":"public","date_created":"2018-11-14T14:33:39Z","publisher":"Information Multimedia Communication imc","author":[{"full_name":"Schryen, Guido","first_name":"Guido","id":"72850","last_name":"Schryen"}],"publication":"IM Information Management & Consulting","department":[{"_id":"277"}],"file_date_updated":"2018-12-13T15:13:58Z","file":[{"date_created":"2018-12-11T14:58:26Z","file_name":"IM-Artikel.pdf","access_level":"open_access","file_size":467370,"creator":"hsiemes","file_id":"6174","date_updated":"2018-12-13T15:13:58Z","content_type":"application/pdf","relation":"main_file"}],"ddc":["000"],"title":"Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear","user_id":"61579","extern":"1","type":"journal_article","year":"2012","citation":{"ieee":"G. Schryen, “Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear,” IM Information Management & Consulting, 2012.","short":"G. Schryen, IM Information Management & Consulting (2012).","mla":"Schryen, Guido. “Soziale Netzwerke in Unternehmenskontexten - Potentiale Und Anforderungen, in: Information Management & Consulting, to Appear.” IM Information Management & Consulting, Information Multimedia Communication imc, 2012.","bibtex":"@article{Schryen_2012, title={Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear}, journal={IM Information Management & Consulting}, publisher={Information Multimedia Communication imc}, author={Schryen, Guido}, year={2012} }","chicago":"Schryen, Guido. “Soziale Netzwerke in Unternehmenskontexten - Potentiale Und Anforderungen, in: Information Management & Consulting, to Appear.” IM Information Management & Consulting, 2012.","apa":"Schryen, G. (2012). Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear. IM Information Management & Consulting.","ama":"Schryen G. Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear. IM Information Management & Consulting. 2012."},"language":[{"iso":"eng"}],"oa":"1","_id":"5639","date_updated":"2022-01-06T07:02:17Z"},{"extern":"1","title":"Automated Negotiations Under Uncertain Preferences","ddc":["000"],"user_id":"61579","author":[{"last_name":"Lang","full_name":"Lang, Fabian","first_name":"Fabian"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"full_name":"Fink, Andreas","first_name":"Andreas","last_name":"Fink"}],"publication":"Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)","file_date_updated":"2018-12-13T15:13:46Z","department":[{"_id":"277"}],"file":[{"date_created":"2018-12-11T14:57:26Z","file_name":"ICIS PROCEEDINGS VERSION.pdf","access_level":"open_access","file_id":"6173","creator":"hsiemes","file_size":606840,"relation":"main_file","date_updated":"2018-12-13T15:13:46Z","content_type":"application/pdf"}],"status":"public","has_accepted_license":"1","date_created":"2018-11-14T15:44:41Z","_id":"5684","date_updated":"2022-01-06T07:02:32Z","oa":"1","year":"2011","type":"conference","citation":{"apa":"Lang, F., Schryen, G., & Fink, A. (2011). Automated Negotiations Under Uncertain Preferences. In Proceedings of the 2011 International Conference on Information Systems (ICIS 2011).","ama":"Lang F, Schryen G, Fink A. Automated Negotiations Under Uncertain Preferences. In: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011). ; 2011.","chicago":"Lang, Fabian, Guido Schryen, and Andreas Fink. “Automated Negotiations Under Uncertain Preferences.” In Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.","bibtex":"@inproceedings{Lang_Schryen_Fink_2011, title={Automated Negotiations Under Uncertain Preferences}, booktitle={Proceedings of the 2011 International Conference on Information Systems (ICIS 2011)}, author={Lang, Fabian and Schryen, Guido and Fink, Andreas}, year={2011} }","mla":"Lang, Fabian, et al. “Automated Negotiations Under Uncertain Preferences.” Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.","short":"F. Lang, G. Schryen, A. Fink, in: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.","ieee":"F. Lang, G. Schryen, and A. Fink, “Automated Negotiations Under Uncertain Preferences,” in Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011."},"language":[{"iso":"eng"}]},{"oa":"1","_id":"5689","date_updated":"2022-01-06T07:02:34Z","language":[{"iso":"eng"}],"citation":{"mla":"Bodenstein, Christian, et al. “Reducing Datacenter Energy Usage through Efficient Job Allocation.” Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.","bibtex":"@inproceedings{Bodenstein_Schryen_Neumann_2011, title={Reducing Datacenter Energy Usage through Efficient Job Allocation}, booktitle={Proceedings of the 19th European Conference on Information Systems (ECIS 2011)}, author={Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2011} }","chicago":"Bodenstein, Christian, Guido Schryen, and Dirk Neumann. “Reducing Datacenter Energy Usage through Efficient Job Allocation.” In Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.","ama":"Bodenstein C, Schryen G, Neumann D. Reducing Datacenter Energy Usage through Efficient Job Allocation. In: Proceedings of the 19th European Conference on Information Systems (ECIS 2011). ; 2011.","apa":"Bodenstein, C., Schryen, G., & Neumann, D. (2011). Reducing Datacenter Energy Usage through Efficient Job Allocation. In Proceedings of the 19th European Conference on Information Systems (ECIS 2011).","ieee":"C. Bodenstein, G. Schryen, and D. Neumann, “Reducing Datacenter Energy Usage through Efficient Job Allocation,” in Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.","short":"C. Bodenstein, G. Schryen, D. Neumann, in: Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011."},"type":"conference","year":"2011","user_id":"61579","title":"Reducing Datacenter Energy Usage through Efficient Job Allocation","ddc":["000"],"extern":"1","date_created":"2018-11-14T15:48:00Z","status":"public","has_accepted_license":"1","file":[{"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:15:52Z","creator":"hsiemes","file_id":"6182","file_size":210256,"access_level":"open_access","date_created":"2018-12-11T15:04:23Z","file_name":"ECIS_2011_-_REDUCING_DATACENTER_ENERGY_USAGE_THROUGH_EFFICIENT_JOB_ALLOCATION.pdf"}],"department":[{"_id":"277"}],"publication":"Proceedings of the 19th European Conference on Information Systems (ECIS 2011)","file_date_updated":"2018-12-13T15:15:52Z","author":[{"full_name":"Bodenstein, Christian","first_name":"Christian","last_name":"Bodenstein"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"},{"first_name":"Dirk","full_name":"Neumann, Dirk","last_name":"Neumann"}]},{"date_created":"2018-11-14T11:17:44Z","status":"public","has_accepted_license":"1","publication":"Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)","department":[{"_id":"277"}],"file_date_updated":"2018-12-13T15:15:31Z","author":[{"last_name":"Wex","first_name":"Felix","full_name":"Wex, Felix"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"},{"last_name":"Neumann","full_name":"Neumann, Dirk","first_name":"Dirk"}],"file":[{"access_level":"open_access","file_name":"131.pdf","date_created":"2018-12-11T15:03:15Z","relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:15:31Z","creator":"hsiemes","file_id":"6180","file_size":286447}],"title":"Intelligent Decision Support for Centralized Coordination during Emergency Response","ddc":["000"],"user_id":"61579","extern":"1","year":"2011","type":"conference","citation":{"short":"F. Wex, G. Schryen, D. Neumann, in: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), 2011.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Intelligent Decision Support for Centralized Coordination during Emergency Response,” in Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), 2011.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Intelligent Decision Support for Centralized Coordination during Emergency Response.” In Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), 2011.","apa":"Wex, F., Schryen, G., & Neumann, D. (2011). Intelligent Decision Support for Centralized Coordination during Emergency Response. In Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011).","ama":"Wex F, Schryen G, Neumann D. Intelligent Decision Support for Centralized Coordination during Emergency Response. In: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011). ; 2011.","mla":"Wex, Felix, et al. “Intelligent Decision Support for Centralized Coordination during Emergency Response.” Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), 2011.","bibtex":"@inproceedings{Wex_Schryen_Neumann_2011, title={Intelligent Decision Support for Centralized Coordination during Emergency Response}, booktitle={Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011)}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2011} }"},"language":[{"iso":"eng"}],"oa":"1","_id":"5581","date_updated":"2022-01-06T07:02:02Z"},{"author":[{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"last_name":"Volkamer","first_name":"Melanie","full_name":"Volkamer, Melanie"},{"last_name":"Ries","full_name":"Ries, Sebastian","first_name":"Sebastian"}],"file_date_updated":"2018-12-13T15:16:04Z","department":[{"_id":"277"}],"publication":"Proceedings of the 26th Annual ACM Symposium on Applied Computing","file":[{"access_level":"open_access","date_created":"2018-12-11T15:06:53Z","file_name":"p1739-schryen.pdf","date_updated":"2018-12-13T15:16:04Z","content_type":"application/pdf","relation":"main_file","file_size":453557,"creator":"hsiemes","file_id":"6183"}],"has_accepted_license":"1","status":"public","date_created":"2018-11-14T14:01:37Z","extern":"1","ddc":["000"],"title":"A formal approach towards measuring trust in distributed systems","user_id":"61579","year":"2011","citation":{"bibtex":"@inproceedings{Schryen_Volkamer_Ries_2011, title={A formal approach towards measuring trust in distributed systems}, booktitle={Proceedings of the 26th Annual ACM Symposium on Applied Computing}, author={Schryen, Guido and Volkamer, Melanie and Ries, Sebastian}, year={2011} }","mla":"Schryen, Guido, et al. “A Formal Approach towards Measuring Trust in Distributed Systems.” Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.","ama":"Schryen G, Volkamer M, Ries S. A formal approach towards measuring trust in distributed systems. In: Proceedings of the 26th Annual ACM Symposium on Applied Computing. ; 2011.","apa":"Schryen, G., Volkamer, M., & Ries, S. (2011). A formal approach towards measuring trust in distributed systems. In Proceedings of the 26th Annual ACM Symposium on Applied Computing.","chicago":"Schryen, Guido, Melanie Volkamer, and Sebastian Ries. “A Formal Approach towards Measuring Trust in Distributed Systems.” In Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.","ieee":"G. Schryen, M. Volkamer, and S. Ries, “A formal approach towards measuring trust in distributed systems,” in Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.","short":"G. Schryen, M. Volkamer, S. Ries, in: Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011."},"type":"conference","language":[{"iso":"eng"}],"_id":"5619","date_updated":"2022-01-06T07:02:10Z","oa":"1"},{"date_updated":"2022-01-06T07:02:17Z","oa":"1","language":[{"iso":"eng"}],"title":"Is open source security a myth? What do vulnerability and patch data say?","department":[{"_id":"277"}],"_id":"5640","issue":"No. 5","year":"2011","citation":{"ieee":"G. Schryen, “Is open source security a myth? What do vulnerability and patch data say?,” Communications of the ACM (CACM), vol. Vol. 54, no. No. 5, pp. 130–139, 2011.","short":"G. Schryen, Communications of the ACM (CACM) Vol. 54 (2011) 130–139.","mla":"Schryen, Guido. “Is Open Source Security a Myth? What Do Vulnerability and Patch Data Say?” Communications of the ACM (CACM), vol. Vol. 54, no. No. 5, Association for Computing Machinery, 2011, pp. 130–39.","bibtex":"@article{Schryen_2011, title={Is open source security a myth? What do vulnerability and patch data say?}, volume={Vol. 54}, number={No. 5}, journal={Communications of the ACM (CACM)}, publisher={Association for Computing Machinery}, author={Schryen, Guido}, year={2011}, pages={130–139} }","ama":"Schryen G. Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM). 2011;Vol. 54(No. 5):130-139.","apa":"Schryen, G. (2011). Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM), Vol. 54(No. 5), 130–139.","chicago":"Schryen, Guido. “Is Open Source Security a Myth? What Do Vulnerability and Patch Data Say?” Communications of the ACM (CACM) Vol. 54, no. No. 5 (2011): 130–39."},"type":"journal_article","page":"130-139","extern":"1","ddc":["000"],"user_id":"61579","author":[{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"}],"publisher":"Association for Computing Machinery","publication":"Communications of the ACM (CACM)","file_date_updated":"2018-12-13T15:15:42Z","file":[{"relation":"main_file","date_updated":"2018-12-13T15:15:42Z","content_type":"application/pdf","creator":"hsiemes","file_id":"6181","file_size":1020040,"access_level":"open_access","date_created":"2018-12-11T15:03:56Z","file_name":"CACM article.pdf"}],"volume":"Vol. 54","has_accepted_license":"1","status":"public","date_created":"2018-11-14T14:34:54Z"},{"user_id":"61579","ddc":["000"],"title":"Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation","extern":"1","date_created":"2018-11-14T14:35:30Z","has_accepted_license":"1","status":"public","file":[{"file_id":"6184","creator":"hsiemes","file_size":291468,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:16:26Z","date_created":"2018-12-11T15:07:46Z","file_name":"REVISION - Seeking the value in IS value research.pdf","access_level":"open_access"}],"file_date_updated":"2018-12-13T15:16:26Z","publication":"IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki","department":[{"_id":"277"}],"author":[{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"}],"oa":"1","_id":"5641","date_updated":"2022-01-06T07:02:18Z","language":[{"iso":"eng"}],"year":"2011","type":"conference","citation":{"mla":"Schryen, Guido. “Seeking the VALUE in IS Business Value Research - An Agenda for Investigating Synergies Between Socio-Organizational Change, IS Capabilities Change, and IS Innovation.” IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.","bibtex":"@inproceedings{Schryen_2011, title={Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation}, booktitle={IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki}, author={Schryen, Guido}, year={2011} }","chicago":"Schryen, Guido. “Seeking the VALUE in IS Business Value Research - An Agenda for Investigating Synergies Between Socio-Organizational Change, IS Capabilities Change, and IS Innovation.” In IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.","ama":"Schryen G. Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki. ; 2011.","apa":"Schryen, G. (2011). Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki.","ieee":"G. Schryen, “Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation,” in IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.","short":"G. Schryen, in: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011."}},{"type":"conference","citation":{"short":"J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.","ieee":"J. Finkbeiner, C. Bodenstein, G. Schryen, and D. Neumann, “Applying heuristic methods for job scheduling in storage markets,” in 18th European Conference on Information Systems (ECIS 2010), 2010.","ama":"Finkbeiner J, Bodenstein C, Schryen G, Neumann D. Applying heuristic methods for job scheduling in storage markets. In: 18th European Conference on Information Systems (ECIS 2010). ; 2010.","apa":"Finkbeiner, J., Bodenstein, C., Schryen, G., & Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In 18th European Conference on Information Systems (ECIS 2010).","chicago":"Finkbeiner, Josef, Christian Bodenstein, Guido Schryen, and Dirk Neumann. “Applying Heuristic Methods for Job Scheduling in Storage Markets.” In 18th European Conference on Information Systems (ECIS 2010), 2010.","mla":"Finkbeiner, Josef, et al. “Applying Heuristic Methods for Job Scheduling in Storage Markets.” 18th European Conference on Information Systems (ECIS 2010), 2010.","bibtex":"@inproceedings{Finkbeiner_Bodenstein_Schryen_Neumann_2010, title={Applying heuristic methods for job scheduling in storage markets}, booktitle={18th European Conference on Information Systems (ECIS 2010)}, author={Finkbeiner, Josef and Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2010} }"},"year":"2010","_id":"5685","file":[{"date_created":"2018-12-11T15:21:06Z","file_name":"s1-ln7055316-1881058806-1939656818Hwf-1884822883IdV-5442784107055316PDF_HI0001.pdf","access_level":"open_access","file_size":171336,"creator":"hsiemes","file_id":"6188","content_type":"application/pdf","date_updated":"2018-12-13T15:19:40Z","relation":"main_file"}],"author":[{"last_name":"Finkbeiner","full_name":"Finkbeiner, Josef","first_name":"Josef"},{"first_name":"Christian","full_name":"Bodenstein, Christian","last_name":"Bodenstein"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"},{"last_name":"Neumann","first_name":"Dirk","full_name":"Neumann, Dirk"}],"publication":"18th European Conference on Information Systems (ECIS 2010)","file_date_updated":"2018-12-13T15:19:40Z","keyword":["Decision Support System","Algorithms","Optimization","Market Engineering"],"has_accepted_license":"1","status":"public","date_created":"2018-11-14T15:45:11Z","abstract":[{"lang":"eng","text":"In double-sided markets for computing resources an optimal allocation schedule among job offers and requests subject to relevant capacity constraints can be determined. With increasing storage demands and emerging storage services the question how to schedule storage jobs becomes more and more interesting. Since such scheduling problems are often in the class NP-complete an exact computation is not feasible in practice. On the other hand an approximation to the optimal solution can easily be found by means of using heuristics. The problem with this attempt is that the suggested solution may not be exactly optimal and is thus less satisfying. Considering the two above mentioned solution approaches one can clearly find a trade-off between the optimality of the solution and the efficiency to get to a solution at all. This work proposes to apply and combine heuristics in optimization to gain from both of their benefits while reducing the problematic aspects. Following this method it is assumed to get closer to the optimal solution in a shorter time compared to a full optimization."}],"extern":"1","user_id":"61579","ddc":["000"],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:32Z","oa":"1","department":[{"_id":"277"}],"title":"Applying heuristic methods for job scheduling in storage markets"},{"date_updated":"2022-01-06T07:02:34Z","oa":"1","language":[{"iso":"eng"}],"title":"From \"Take-it-or-leave-it\" offers to \"Take-it-or-be-left-out\" Ultimatum - A trade mechanism for Online Services","department":[{"_id":"277"}],"_id":"5690","type":"conference","citation":{"ieee":"C. Bodenstein, G. Schryen, and D. Neumann, “From ‘Take-it-or-leave-it’ offers to ‘Take-it-or-be-left-out’ Ultimatum - A trade mechanism for Online Services,” in 18th European Conference on Information Systems (ECIS 2010), 2010.","short":"C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.","bibtex":"@inproceedings{Bodenstein_Schryen_Neumann_2010, title={From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services}, booktitle={18th European Conference on Information Systems (ECIS 2010)}, author={Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2010} }","mla":"Bodenstein, Christian, et al. “From ‘Take-It-or-Leave-It’ Offers to ‘Take-It-or-Be-Left-out’ Ultimatum - A Trade Mechanism for Online Services.” 18th European Conference on Information Systems (ECIS 2010), 2010.","ama":"Bodenstein C, Schryen G, Neumann D. From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In: 18th European Conference on Information Systems (ECIS 2010). ; 2010.","apa":"Bodenstein, C., Schryen, G., & Neumann, D. (2010). From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In 18th European Conference on Information Systems (ECIS 2010).","chicago":"Bodenstein, Christian, Guido Schryen, and Dirk Neumann. “From ‘Take-It-or-Leave-It’ Offers to ‘Take-It-or-Be-Left-out’ Ultimatum - A Trade Mechanism for Online Services.” In 18th European Conference on Information Systems (ECIS 2010), 2010."},"year":"2010","abstract":[{"lang":"eng","text":"In a world, where more and more businesses seem to trade in an online market, the supply of online services to supply the ever-growing demand could quickly reach its capacity limits. Online service providers may find themselves maxed out at peak operation levels during high-traffic timeslots but too little demand during low-traffic timeslots, although the latter is becoming less frequent. At this point not only deciding which user is allocated what level of service becomes essential, but also the magnitude of the service provided, can be controlled by pricing. Pricing is an important factor when efficient and acceptable allocation of resources between individuals must be reached. Without prices, transferring or sharing goods would be impossible. In sharing information, pricing a product however is not as simple as relatively pricing an apple or a pear. Often the costs, and hence the prices are simply unknown. Backed by this scenario, the online services market could be combined with the market design mechanism of diamonds. For this we propose an ultimatum pricing strategy which effectively allows for valuations to be accounted for, but no longer a necessity when pricing in grid, cloud or other online computing environments."}],"extern":"1","user_id":"61579","ddc":["000"],"file":[{"file_size":247621,"creator":"hsiemes","file_id":"6191","date_updated":"2018-12-13T15:20:13Z","content_type":"application/pdf","relation":"main_file","date_created":"2018-12-11T15:22:41Z","file_name":"Take it or leave it - ECIS - Proof.pdf","access_level":"open_access"}],"author":[{"last_name":"Bodenstein","first_name":"Christian","full_name":"Bodenstein, Christian"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"},{"last_name":"Neumann","full_name":"Neumann, Dirk","first_name":"Dirk"}],"publication":"18th European Conference on Information Systems (ECIS 2010)","file_date_updated":"2018-12-13T15:20:13Z","keyword":["Posted Price","Ultimatum Game","Energy Efficiency","Mechanism Design"],"status":"public","has_accepted_license":"1","date_created":"2018-11-14T15:48:39Z"},{"file":[{"date_created":"2018-12-11T15:14:05Z","file_name":"06_Schryen.pdf","access_level":"open_access","file_size":243413,"creator":"hsiemes","file_id":"6185","content_type":"application/pdf","date_updated":"2018-12-13T15:16:50Z","relation":"main_file"}],"file_date_updated":"2018-12-13T15:16:50Z","keyword":["distributed trust concepts","measuring etrust","Internet voting"],"publication":"Proceedings of the 23rd Bled eConference","author":[{"last_name":"Volkamer","first_name":"Melanie","full_name":"Volkamer, Melanie"},{"full_name":"Schryen, Guido","first_name":"Guido","id":"72850","last_name":"Schryen"}],"date_created":"2018-11-14T11:49:50Z","status":"public","has_accepted_license":"1","abstract":[{"text":"Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia.","lang":"eng"}],"extern":"1","user_id":"61579","ddc":["000"],"type":"conference","citation":{"mla":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” Proceedings of the 23rd Bled EConference, 2010.","bibtex":"@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}, booktitle={Proceedings of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido}, year={2010} }","chicago":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” In Proceedings of the 23rd Bled EConference, 2010.","apa":"Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference.","ama":"Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: Proceedings of the 23rd Bled EConference. ; 2010.","ieee":"M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General Concept and Application to Internet Voting,” in Proceedings of the 23rd Bled eConference, 2010.","short":"M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010."},"year":"2010","_id":"5598","department":[{"_id":"277"}],"title":"Measuring eTrust in distributed systems - General Concept and Application to Internet Voting","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:06Z","oa":"1"},{"user_id":"61579","title":"Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question","ddc":["000"],"abstract":[{"lang":"eng","text":"While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments and the development of models is still weak. Addressing this research gap, this paper presents the first comprehensive empirical investigation of published vulnerabilities and patches of 17 widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. The empirical analysis uses comprehensive vulnerability data contained in the NIST National Vulnerability Database and a newly compiled data set of vulnerability patches. The results suggest that it is not the particular software development style that determines the severity of vulnerabilities and vendors? patching behavior, but rather the specific application type and the policy of the particular development community, respectively."}],"extern":"1","has_accepted_license":"1","status":"public","date_created":"2018-11-14T14:23:45Z","file":[{"content_type":"application/pdf","date_updated":"2018-12-13T15:20:23Z","relation":"main_file","file_size":299380,"creator":"hsiemes","file_id":"6192","access_level":"open_access","date_created":"2018-12-11T15:23:33Z","file_name":"vendors behavior - UPDATED IEEE version.pdf"}],"author":[{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"full_name":"Eliot, Rich","first_name":"Rich","last_name":"Eliot"}],"publication":"43rd Annual Hawaii International Conference on System Sciences","file_date_updated":"2018-12-13T15:20:23Z","department":[{"_id":"277"}],"oa":"1","date_updated":"2022-01-06T07:02:14Z","_id":"5631","language":[{"iso":"eng"}],"year":"2010","type":"conference","citation":{"short":"G. Schryen, R. Eliot, in: 43rd Annual Hawaii International Conference on System Sciences, 2010.","ieee":"G. Schryen and R. Eliot, “Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question,” in 43rd Annual Hawaii International Conference on System Sciences, 2010.","apa":"Schryen, G., & Eliot, R. (2010). Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In 43rd Annual Hawaii International Conference on System Sciences.","ama":"Schryen G, Eliot R. Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In: 43rd Annual Hawaii International Conference on System Sciences. ; 2010.","chicago":"Schryen, Guido, and Rich Eliot. “Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest That We Have Asked the Wrong Question.” In 43rd Annual Hawaii International Conference on System Sciences, 2010.","bibtex":"@inproceedings{Schryen_Eliot_2010, title={Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question}, booktitle={43rd Annual Hawaii International Conference on System Sciences}, author={Schryen, Guido and Eliot, Rich}, year={2010} }","mla":"Schryen, Guido, and Rich Eliot. “Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest That We Have Asked the Wrong Question.” 43rd Annual Hawaii International Conference on System Sciences, 2010."}}]