---
_id: '54152'
author:
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Debora
  full_name: Di Caprio, Debora
  last_name: Di Caprio
- first_name: Francisco J.
  full_name: Santos Arteaga, Francisco J.
  last_name: Santos Arteaga
citation:
  ama: Tavana M, Di Caprio D, Santos Arteaga FJ. Modeling Sequential Information Acquisition
    Behavior in Rational Decision Making. <i>Decision Sciences</i>. 2016;47(4):720-761.
    doi:<a href="https://doi.org/10.1111/deci.12193">10.1111/deci.12193</a>
  apa: Tavana, M., Di Caprio, D., &#38; Santos Arteaga, F. J. (2016). Modeling Sequential
    Information Acquisition Behavior in Rational Decision Making. <i>Decision Sciences</i>,
    <i>47</i>(4), 720–761. <a href="https://doi.org/10.1111/deci.12193">https://doi.org/10.1111/deci.12193</a>
  bibtex: '@article{Tavana_Di Caprio_Santos Arteaga_2016, title={Modeling Sequential
    Information Acquisition Behavior in Rational Decision Making}, volume={47}, DOI={<a
    href="https://doi.org/10.1111/deci.12193">10.1111/deci.12193</a>}, number={4},
    journal={Decision Sciences}, publisher={Wiley}, author={Tavana, Madjid and Di
    Caprio, Debora and Santos Arteaga, Francisco J.}, year={2016}, pages={720–761}
    }'
  chicago: 'Tavana, Madjid, Debora Di Caprio, and Francisco J. Santos Arteaga. “Modeling
    Sequential Information Acquisition Behavior in Rational Decision Making.” <i>Decision
    Sciences</i> 47, no. 4 (2016): 720–61. <a href="https://doi.org/10.1111/deci.12193">https://doi.org/10.1111/deci.12193</a>.'
  ieee: 'M. Tavana, D. Di Caprio, and F. J. Santos Arteaga, “Modeling Sequential Information
    Acquisition Behavior in Rational Decision Making,” <i>Decision Sciences</i>, vol.
    47, no. 4, pp. 720–761, 2016, doi: <a href="https://doi.org/10.1111/deci.12193">10.1111/deci.12193</a>.'
  mla: Tavana, Madjid, et al. “Modeling Sequential Information Acquisition Behavior
    in Rational Decision Making.” <i>Decision Sciences</i>, vol. 47, no. 4, Wiley,
    2016, pp. 720–61, doi:<a href="https://doi.org/10.1111/deci.12193">10.1111/deci.12193</a>.
  short: M. Tavana, D. Di Caprio, F.J. Santos Arteaga, Decision Sciences 47 (2016)
    720–761.
date_created: 2024-05-11T11:13:34Z
date_updated: 2024-05-11T11:52:52Z
department:
- _id: '277'
doi: 10.1111/deci.12193
intvolume: '        47'
issue: '4'
language:
- iso: eng
page: 720-761
publication: Decision Sciences
publication_identifier:
  issn:
  - 0011-7315
  - 1540-5915
publication_status: published
publisher: Wiley
status: public
title: Modeling Sequential Information Acquisition Behavior in Rational Decision Making
type: journal_article
user_id: '51811'
volume: 47
year: '2016'
...
---
_id: '5678'
abstract:
- lang: eng
  text: Many academic disciplines - including information systems, computer science,
    and operations management - face scheduling problems as important decision making
    tasks. Since many scheduling problems are NP-hard in the strong sense, there is
    a need for developing solution heuristics. For scheduling problems with setup
    times on unrelated parallel machines, there is limited research on solution methods
    and to the best of our knowledge, parallel computer architectures have not yet
    been taken advantage of. We address this gap by proposing and implementing a new
    solution heuristic and by testing different parallelization strategies. In our
    computational experiments, we show that our heuristic calculates near-optimal
    solutions even for large instances and that computing time can be reduced substantially
    by our parallelization approach.
author:
- first_name: Gerhard
  full_name: Rauchecker, Gerhard
  last_name: Rauchecker
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Rauchecker G, Schryen G. High-Performance Computing for Scheduling Decision
    Support: A Parallel Depth-First Search Heuristic. In: <i>Australasian Conference
    on Information Systems</i>. ; 2015:1-13.'
  apa: 'Rauchecker, G., &#38; Schryen, G. (2015). High-Performance Computing for Scheduling
    Decision Support: A Parallel Depth-First Search Heuristic. In <i>Australasian
    Conference on Information Systems</i> (pp. 1–13).'
  bibtex: '@inproceedings{Rauchecker_Schryen_2015, title={High-Performance Computing
    for Scheduling Decision Support: A Parallel Depth-First Search Heuristic}, booktitle={Australasian
    Conference on Information Systems}, author={Rauchecker, Gerhard and Schryen, Guido},
    year={2015}, pages={1–13} }'
  chicago: 'Rauchecker, Gerhard, and Guido Schryen. “High-Performance Computing for
    Scheduling Decision Support: A Parallel Depth-First Search Heuristic.” In <i>Australasian
    Conference on Information Systems</i>, 1–13, 2015.'
  ieee: 'G. Rauchecker and G. Schryen, “High-Performance Computing for Scheduling
    Decision Support: A Parallel Depth-First Search Heuristic,” in <i>Australasian
    Conference on Information Systems</i>, 2015, pp. 1–13.'
  mla: 'Rauchecker, Gerhard, and Guido Schryen. “High-Performance Computing for Scheduling
    Decision Support: A Parallel Depth-First Search Heuristic.” <i>Australasian Conference
    on Information Systems</i>, 2015, pp. 1–13.'
  short: 'G. Rauchecker, G. Schryen, in: Australasian Conference on Information Systems,
    2015, pp. 1–13.'
date_created: 2018-11-14T15:39:50Z
date_updated: 2022-01-06T07:02:30Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:40:18Z
  date_updated: 2018-12-13T15:08:28Z
  file_id: '6031'
  file_name: ACIS_2015_paper_7.pdf
  file_size: 6771871
  relation: main_file
file_date_updated: 2018-12-13T15:08:28Z
has_accepted_license: '1'
keyword:
- scheduling
- decision support
- heuristic
- high performance computing
- parallel algorithms
language:
- iso: eng
oa: '1'
page: 1-13
publication: Australasian Conference on Information Systems
status: public
title: 'High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First
  Search Heuristic'
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '5679'
abstract:
- lang: eng
  text: Cloud computing promises the flexible delivery of computing services in a
    pay-as-you-go manner. It allows customers to easily scale their infrastructure
    and save on the overall cost of operation. However Cloud service offerings can
    only thrive if customers are satisfied with service performance. Allow-ing instantaneous
    access and flexible scaling while maintaining the service levels and offering
    competitive prices poses a significant challenge to Cloud Computing providers.
    Furthermore services will remain available in the long run only if this business
    generates a stable revenue stream. To address these challenges we introduce novel
    policy-based service admission control mod-els that aim at maximizing the revenue
    of Cloud providers while taking in-formational uncertainty regarding resource
    requirements into account. Our evaluation shows that policy-based approaches statistically
    significantly out-perform first come first serve approaches, which are still state
    of the art. Furthermore the results give insights in how and to what extent uncertainty
    has a negative impact on revenue.
author:
- first_name: Tim
  full_name: Püschel, Tim
  last_name: Püschel
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Diana
  full_name: Hristova, Diana
  last_name: Hristova
- first_name: Dirk
  full_name: Neumann, Dirk
  last_name: Neumann
citation:
  ama: 'Püschel T, Schryen G, Hristova D, Neumann D. Revenue Management for Cloud
    Computing Providers: Decision Models for Service Admission Control under Non-probabilistic
    Uncertainty. <i>European Journal of Operational Research</i>. 2015;244(2):637-647.'
  apa: 'Püschel, T., Schryen, G., Hristova, D., &#38; Neumann, D. (2015). Revenue
    Management for Cloud Computing Providers: Decision Models for Service Admission
    Control under Non-probabilistic Uncertainty. <i>European Journal of Operational
    Research</i>, <i>244</i>(2), 637–647.'
  bibtex: '@article{Püschel_Schryen_Hristova_Neumann_2015, title={Revenue Management
    for Cloud Computing Providers: Decision Models for Service Admission Control under
    Non-probabilistic Uncertainty}, volume={244}, number={2}, journal={European Journal
    of Operational Research}, publisher={Elsevier}, author={Püschel, Tim and Schryen,
    Guido and Hristova, Diana and Neumann, Dirk}, year={2015}, pages={637–647} }'
  chicago: 'Püschel, Tim, Guido Schryen, Diana Hristova, and Dirk Neumann. “Revenue
    Management for Cloud Computing Providers: Decision Models for Service Admission
    Control under Non-Probabilistic Uncertainty.” <i>European Journal of Operational
    Research</i> 244, no. 2 (2015): 637–47.'
  ieee: 'T. Püschel, G. Schryen, D. Hristova, and D. Neumann, “Revenue Management
    for Cloud Computing Providers: Decision Models for Service Admission Control under
    Non-probabilistic Uncertainty,” <i>European Journal of Operational Research</i>,
    vol. 244, no. 2, pp. 637–647, 2015.'
  mla: 'Püschel, Tim, et al. “Revenue Management for Cloud Computing Providers: Decision
    Models for Service Admission Control under Non-Probabilistic Uncertainty.” <i>European
    Journal of Operational Research</i>, vol. 244, no. 2, Elsevier, 2015, pp. 637–47.'
  short: T. Püschel, G. Schryen, D. Hristova, D. Neumann, European Journal of Operational
    Research 244 (2015) 637–647.
date_created: 2018-11-14T15:40:13Z
date_updated: 2022-01-06T07:02:30Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:44:10Z
  date_updated: 2018-12-13T15:09:12Z
  file_id: '6036'
  file_name: ELSEVIER_JOURNAL_VERSION.pdf
  file_size: 1270024
  relation: main_file
file_date_updated: 2018-12-13T15:09:12Z
has_accepted_license: '1'
intvolume: '       244'
issue: '2'
keyword:
- admission control
- informational uncertainty
- revenue management
- cloud computing
language:
- iso: eng
oa: '1'
page: 637-647
publication: European Journal of Operational Research
publisher: Elsevier
status: public
title: 'Revenue Management for Cloud Computing Providers: Decision Models for Service
  Admission Control under Non-probabilistic Uncertainty'
type: journal_article
user_id: '61579'
volume: 244
year: '2015'
...
---
_id: '5541'
author:
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Yasasin E, Schryen G. Requirements for IT Security Metrics - An Argumentation
    Theory Based Approach. In: <i>23rd European Conference on Information Systems
    (ECIS 2015)</i>. ; 2015.'
  apa: Yasasin, E., &#38; Schryen, G. (2015). Requirements for IT Security Metrics
    - An Argumentation Theory Based Approach. In <i>23rd European Conference on Information
    Systems (ECIS 2015)</i>.
  bibtex: '@inproceedings{Yasasin_Schryen_2015, title={Requirements for IT Security
    Metrics - An Argumentation Theory Based Approach}, booktitle={23rd European Conference
    on Information Systems (ECIS 2015)}, author={Yasasin, Emrah and Schryen, Guido},
    year={2015} }'
  chicago: Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics
    - An Argumentation Theory Based Approach.” In <i>23rd European Conference on Information
    Systems (ECIS 2015)</i>, 2015.
  ieee: E. Yasasin and G. Schryen, “Requirements for IT Security Metrics - An Argumentation
    Theory Based Approach,” in <i>23rd European Conference on Information Systems
    (ECIS 2015)</i>, 2015.
  mla: Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics -
    An Argumentation Theory Based Approach.” <i>23rd European Conference on Information
    Systems (ECIS 2015)</i>, 2015.
  short: 'E. Yasasin, G. Schryen, in: 23rd European Conference on Information Systems
    (ECIS 2015), 2015.'
date_created: 2018-11-13T14:45:25Z
date_updated: 2022-01-06T07:01:58Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:43:06Z
  date_updated: 2018-12-13T15:08:50Z
  file_id: '6034'
  file_name: ECIS - Proceedings version1.pdf
  file_size: 669105
  relation: main_file
file_date_updated: 2018-12-13T15:08:50Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: 23rd European Conference on Information Systems (ECIS 2015)
status: public
title: Requirements for IT Security Metrics - An Argumentation Theory Based Approach
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '5588'
abstract:
- lang: eng
  text: The protection of information technology (IT) has become and is predicted
    to remain a key economic challenge for organizations. While research on IT security
    investment is fast growing, it lacks a theoretical basis for structuring research,
    explaining economic-technological phenomena and guide future research. We address
    this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical
    perspective adopt-ing the Resource-Based View and the Organizational Learning
    Theory. The joint appli-cation of these theories allows to conceptualize in one
    theoretical model the organiza-tional learning effects that occur when the protection
    of organizational resources through IT security countermeasures develops over
    time. We use this model of IT security invest-ments to synthesize findings of
    a large body of literature and to derive research gaps. We also discuss managerial
    implications of (closing) these gaps by providing practical ex-amples.
author:
- first_name: Eva
  full_name: Weishäupl, Eva
  last_name: Weishäupl
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Weishäupl E, Yasasin E, Schryen G. A Multi-Theoretical Literature Review on
    Information Security Investments using the Resource-Based View and the Organizational
    Learning Theory. In: <i>International Conference on Information Systems</i>. ;
    2015.'
  apa: Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2015). A Multi-Theoretical Literature
    Review on Information Security Investments using the Resource-Based View and the
    Organizational Learning Theory. In <i>International Conference on Information
    Systems</i>.
  bibtex: '@inproceedings{Weishäupl_Yasasin_Schryen_2015, title={A Multi-Theoretical
    Literature Review on Information Security Investments using the Resource-Based
    View and the Organizational Learning Theory}, booktitle={International Conference
    on Information Systems}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen,
    Guido}, year={2015} }'
  chicago: Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “A Multi-Theoretical
    Literature Review on Information Security Investments Using the Resource-Based
    View and the Organizational Learning Theory.” In <i>International Conference on
    Information Systems</i>, 2015.
  ieee: E. Weishäupl, E. Yasasin, and G. Schryen, “A Multi-Theoretical Literature
    Review on Information Security Investments using the Resource-Based View and the
    Organizational Learning Theory,” in <i>International Conference on Information
    Systems</i>, 2015.
  mla: Weishäupl, Eva, et al. “A Multi-Theoretical Literature Review on Information
    Security Investments Using the Resource-Based View and the Organizational Learning
    Theory.” <i>International Conference on Information Systems</i>, 2015.
  short: 'E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information
    Systems, 2015.'
date_created: 2018-11-14T11:25:38Z
date_updated: 2022-01-06T07:02:03Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:45:31Z
  date_updated: 2018-12-13T15:09:32Z
  file_id: '6038'
  file_name: ICIS PROCEEDINGS PAPER - Security Investments.pdf
  file_size: 958019
  relation: main_file
file_date_updated: 2018-12-13T15:09:32Z
has_accepted_license: '1'
keyword:
- Information Security
- Investment
- Literature review
- Resource-based View
- Organi-zational Learning Theory
- Multi-theoretical Perspective
language:
- iso: eng
oa: '1'
publication: International Conference on Information Systems
status: public
title: A Multi-Theoretical Literature Review on Information Security Investments using
  the Resource-Based View and the Organizational Learning Theory
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '5589'
author:
- first_name: Eva
  full_name: Weishäupl, Eva
  last_name: Weishäupl
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Weishäupl E, Yasasin E, Schryen G. IT Security Investments Through the Lens
    of the Resource-Based View: A new Theoretical Model and Literature Review. In:
    <i>23rd European Conference on Information Systems (ECIS 2015)</i>. ; 2015.'
  apa: 'Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2015). IT Security Investments
    Through the Lens of the Resource-Based View: A new Theoretical Model and Literature
    Review. In <i>23rd European Conference on Information Systems (ECIS 2015)</i>.'
  bibtex: '@inproceedings{Weishäupl_Yasasin_Schryen_2015, title={IT Security Investments
    Through the Lens of the Resource-Based View: A new Theoretical Model and Literature
    Review}, booktitle={23rd European Conference on Information Systems (ECIS 2015)},
    author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2015} }'
  chicago: 'Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “IT Security Investments
    Through the Lens of the Resource-Based View: A New Theoretical Model and Literature
    Review.” In <i>23rd European Conference on Information Systems (ECIS 2015)</i>,
    2015.'
  ieee: 'E. Weishäupl, E. Yasasin, and G. Schryen, “IT Security Investments Through
    the Lens of the Resource-Based View: A new Theoretical Model and Literature Review,”
    in <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015.'
  mla: 'Weishäupl, Eva, et al. “IT Security Investments Through the Lens of the Resource-Based
    View: A New Theoretical Model and Literature Review.” <i>23rd European Conference
    on Information Systems (ECIS 2015)</i>, 2015.'
  short: 'E. Weishäupl, E. Yasasin, G. Schryen, in: 23rd European Conference on Information
    Systems (ECIS 2015), 2015.'
date_created: 2018-11-14T11:26:15Z
date_updated: 2022-01-06T07:02:03Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:43:38Z
  date_updated: 2018-12-13T15:09:01Z
  file_id: '6035'
  file_name: ECIS - Proceedings version2.pdf
  file_size: 334025
  relation: main_file
file_date_updated: 2018-12-13T15:09:01Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: 23rd European Conference on Information Systems (ECIS 2015)
status: public
title: 'IT Security Investments Through the Lens of the Resource-Based View: A new
  Theoretical Model and Literature Review'
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '5590'
abstract:
- lang: eng
  text: 'Nowadays, providing employees with failure-free access to various systems,
    applications and services is a crucial factor for organizations? success as disturbances
    potentially inhibit smooth workflows and thereby harm productivity. However, it
    is a challenging task to assign access rights to employees? accounts within a
    satisfying time frame. In addition, the management of multiple accounts and identities
    can be very onerous and time consuming for the responsible administrator and therefore
    expensive for the organization. In order to meet these challenges, firms decide
    to invest in introducing an Identity and Access Management System (IAMS) that
    supports the organization by using policies to assign permissions to accounts,
    groups, and roles. In practice, since various versions of IAMSs exist, it is a
    challenging task to decide upon introduction of an IAMS. The following study proposes
    a first attempt of a decision support model for practitioners which considers
    four alternatives: Introduction of an IAMS with Role-based Access Control RBAC)
    or without and no introduction of IAMS again with or without RBAC. To underpin
    the practical applicability of the proposed model, we parametrize and operationalize
    it based on a real world use case using input from an expert interview.'
author:
- first_name: Eva
  full_name: Weishäupl, Eva
  last_name: Weishäupl
- first_name: Michael
  full_name: Kunz, Michael
  last_name: Kunz
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Gerit
  full_name: Wagner, Gerit
  last_name: Wagner
- first_name: Julian
  full_name: Prester, Julian
  last_name: Prester
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Günther
  full_name: Pernul, Günther
  last_name: Pernul
citation:
  ama: 'Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity
    and Access Management Systems Using Decision Theory. In: <i>2nd International
    Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015.'
  apa: Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G.,
    &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management
    Systems Using Decision Theory. In <i>2nd International Workshop on Security in
    highly connected IT Systems (SHCIS?15)</i>.
  bibtex: '@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015,
    title={Towards an Economic Approach to Identity and Access Management Systems
    Using Decision Theory}, booktitle={2nd International Workshop on Security in highly
    connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and
    Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul,
    Günther}, year={2015} }'
  chicago: Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester,
    Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and
    Access Management Systems Using Decision Theory.” In <i>2nd International Workshop
    on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.
  ieee: E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and
    Access Management Systems Using Decision Theory,” in <i>2nd International Workshop
    on Security in highly connected IT Systems (SHCIS?15)</i>, 2015.
  mla: Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access
    Management Systems Using Decision Theory.” <i>2nd International Workshop on Security
    in Highly Connected IT Systems (SHCIS?15)</i>, 2015.
  short: 'E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G.
    Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems
    (SHCIS?15), 2015.'
date_created: 2018-11-14T11:27:20Z
date_updated: 2022-01-06T07:02:04Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:46:28Z
  date_updated: 2018-12-13T15:09:54Z
  file_id: '6040'
  file_name: Towards an Economic Approach to IAMS.PDF
  file_size: 166015
  relation: main_file
file_date_updated: 2018-12-13T15:09:54Z
has_accepted_license: '1'
keyword:
- Identity and Access Management
- Economic Decision Making
- Information Systems
- Information Security Investment
- Decision Theory
language:
- iso: eng
oa: '1'
publication: 2nd International Workshop on Security in highly connected IT Systems
  (SHCIS?15)
status: public
title: Towards an Economic Approach to Identity and Access Management Systems Using
  Decision Theory
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '5616'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Eva
  full_name: Weishäupl, Eva
  last_name: Weishäupl
citation:
  ama: 'Schryen G, Weishäupl E. IT-Sicherheit: Ökonomisch Planen und Bewerten. <i>Managementkompass</i>.
    2015;(2):17-18.'
  apa: 'Schryen, G., &#38; Weishäupl, E. (2015). IT-Sicherheit: Ökonomisch Planen
    und Bewerten. <i>Managementkompass</i>, (2), 17–18.'
  bibtex: '@article{Schryen_Weishäupl_2015, title={IT-Sicherheit: Ökonomisch Planen
    und Bewerten}, number={2}, journal={Managementkompass}, publisher={Frankfurt Business
    Media, Der F.A.Z.-Fachverlag}, author={Schryen, Guido and Weishäupl, Eva}, year={2015},
    pages={17–18} }'
  chicago: 'Schryen, Guido, and Eva Weishäupl. “IT-Sicherheit: Ökonomisch Planen Und
    Bewerten.” <i>Managementkompass</i>, no. 2 (2015): 17–18.'
  ieee: 'G. Schryen and E. Weishäupl, “IT-Sicherheit: Ökonomisch Planen und Bewerten,”
    <i>Managementkompass</i>, no. 2, pp. 17–18, 2015.'
  mla: 'Schryen, Guido, and Eva Weishäupl. “IT-Sicherheit: Ökonomisch Planen Und Bewerten.”
    <i>Managementkompass</i>, no. 2, Frankfurt Business Media, Der F.A.Z.-Fachverlag,
    2015, pp. 17–18.'
  short: G. Schryen, E. Weishäupl, Managementkompass (2015) 17–18.
date_created: 2018-11-14T13:59:53Z
date_updated: 2022-01-06T07:02:09Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:46:04Z
  date_updated: 2018-12-13T15:09:42Z
  file_id: '6039'
  file_name: MK-DigitalSecurity-2015_Schryen.pdf
  file_size: 101976
  relation: main_file
file_date_updated: 2018-12-13T15:09:42Z
has_accepted_license: '1'
issue: '2'
language:
- iso: eng
oa: '1'
page: 17-18
publication: Managementkompass
publisher: Frankfurt Business Media, Der F.A.Z.-Fachverlag
status: public
title: 'IT-Sicherheit: Ökonomisch Planen und Bewerten'
type: journal_article
user_id: '61579'
year: '2015'
...
---
_id: '5618'
abstract:
- lang: eng
  text: Literature reviews play an important role in the development of knowledge.
    Yet, we observe a lack of theoretical underpinning of and epistemological insights
    into how literature reviews can contribute to knowledge creation and have actually
    contributed in the IS discipline. To address these theoretical and empirical research
    gaps, we suggest a novel epistemological model of literature reviews. This model
    allows us to align different contributions of literature reviews with their underlying
    knowledge conversions - thereby building a bridge between the previously largely
    unconnected fields of literature reviews and epistemology. We evaluate the appropriateness
    of the model by conducting an empirical analysis of 173 IS literature reviews
    which were published in 39 pertinent IS journals between 2000 and 2014. Based
    on this analysis, we derive an epistemological taxonomy of IS literature reviews,
    which complements previously suggested typologies.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Gerit
  full_name: Wagner, Gerit
  last_name: Wagner
- first_name: Alexander
  full_name: Benlian, Alexander
  last_name: Benlian
citation:
  ama: 'Schryen G, Wagner G, Benlian A. Theory of Knowledge for Literature Reviews:
    An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In:
    <i>International Conference on Information Systems (ICIS)</i>. ; 2015.'
  apa: 'Schryen, G., Wagner, G., &#38; Benlian, A. (2015). Theory of Knowledge for
    Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis
    of IS Literature. In <i>International Conference on Information Systems (ICIS)</i>.'
  bibtex: '@inproceedings{Schryen_Wagner_Benlian_2015, title={Theory of Knowledge
    for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis
    of IS Literature}, booktitle={International Conference on Information Systems
    (ICIS)}, author={Schryen, Guido and Wagner, Gerit and Benlian, Alexander}, year={2015}
    }'
  chicago: 'Schryen, Guido, Gerit Wagner, and Alexander Benlian. “Theory of Knowledge
    for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis
    of IS Literature.” In <i>International Conference on Information Systems (ICIS)</i>,
    2015.'
  ieee: 'G. Schryen, G. Wagner, and A. Benlian, “Theory of Knowledge for Literature
    Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature,”
    in <i>International Conference on Information Systems (ICIS)</i>, 2015.'
  mla: 'Schryen, Guido, et al. “Theory of Knowledge for Literature Reviews: An Epistemological
    Model, Taxonomy and Empirical Analysis of IS Literature.” <i>International Conference
    on Information Systems (ICIS)</i>, 2015.'
  short: 'G. Schryen, G. Wagner, A. Benlian, in: International Conference on Information
    Systems (ICIS), 2015.'
date_created: 2018-11-14T14:01:13Z
date_updated: 2022-01-06T07:02:10Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:44:48Z
  date_updated: 2018-12-13T15:09:22Z
  file_id: '6037'
  file_name: ICIS PROCEEDINGS PAPER - Literature Reviews.pdf
  file_size: 487102
  relation: main_file
file_date_updated: 2018-12-13T15:09:22Z
has_accepted_license: '1'
keyword:
- Literature review
- Research methods/methodology
- Theory of knowledge
language:
- iso: eng
oa: '1'
publication: International Conference on Information Systems (ICIS)
status: public
title: 'Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy
  and Empirical Analysis of IS Literature'
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '5622'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Gerhard
  full_name: Rauchecker, Gerhard
  last_name: Rauchecker
- first_name: Martina
  full_name: Comes, Martina
  last_name: Comes
citation:
  ama: Schryen G, Rauchecker G, Comes M. Resource Planning in Disaster Response -
    Decision Support Models and Methodologies. <i>Business &#38; Information Systems
    Engineering (BISE)</i>. 2015;57(4):243-259.
  apa: Schryen, G., Rauchecker, G., &#38; Comes, M. (2015). Resource Planning in Disaster
    Response - Decision Support Models and Methodologies. <i>Business &#38; Information
    Systems Engineering (BISE)</i>, <i>57</i>(4), 243–259.
  bibtex: '@article{Schryen_Rauchecker_Comes_2015, title={Resource Planning in Disaster
    Response - Decision Support Models and Methodologies}, volume={57}, number={4},
    journal={Business &#38; Information Systems Engineering (BISE)}, publisher={Springer},
    author={Schryen, Guido and Rauchecker, Gerhard and Comes, Martina}, year={2015},
    pages={243–259} }'
  chicago: 'Schryen, Guido, Gerhard Rauchecker, and Martina Comes. “Resource Planning
    in Disaster Response - Decision Support Models and Methodologies.” <i>Business
    &#38; Information Systems Engineering (BISE)</i> 57, no. 4 (2015): 243–59.'
  ieee: G. Schryen, G. Rauchecker, and M. Comes, “Resource Planning in Disaster Response
    - Decision Support Models and Methodologies,” <i>Business &#38; Information Systems
    Engineering (BISE)</i>, vol. 57, no. 4, pp. 243–259, 2015.
  mla: Schryen, Guido, et al. “Resource Planning in Disaster Response - Decision Support
    Models and Methodologies.” <i>Business &#38; Information Systems Engineering (BISE)</i>,
    vol. 57, no. 4, Springer, 2015, pp. 243–59.
  short: G. Schryen, G. Rauchecker, M. Comes, Business &#38; Information Systems Engineering
    (BISE) 57 (2015) 243–259.
date_created: 2018-11-14T14:07:25Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:42:18Z
  date_updated: 2018-12-13T15:08:39Z
  file_id: '6032'
  file_name: BISE Springer Paper.pdf
  file_size: 733154
  relation: main_file
file_date_updated: 2018-12-13T15:08:39Z
has_accepted_license: '1'
intvolume: '        57'
issue: '4'
language:
- iso: eng
oa: '1'
page: 243-259
publication: Business & Information Systems Engineering (BISE)
publisher: Springer
status: public
title: Resource Planning in Disaster Response - Decision Support Models and Methodologies
type: journal_article
user_id: '61579'
volume: 57
year: '2015'
...
---
_id: '5634'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Writing qualitative IS literature reviews ? Guidelines for synthesis,
    interpretation and guidance of research. <i>Communications of the AIS</i>. 2015;37(Art
    12):286-325.
  apa: Schryen, G. (2015). Writing qualitative IS literature reviews ? Guidelines
    for synthesis, interpretation and guidance of research. <i>Communications of the
    AIS</i>, <i>37</i>(Art 12), 286–325.
  bibtex: '@article{Schryen_2015, title={Writing qualitative IS literature reviews ?
    Guidelines for synthesis, interpretation and guidance of research}, volume={37},
    number={Art 12}, journal={Communications of the AIS}, publisher={Association for
    Information Systems (AIS); Association for Computing Machinery (ACM)}, author={Schryen,
    Guido}, year={2015}, pages={286–325} }'
  chicago: 'Schryen, Guido. “Writing Qualitative IS Literature Reviews ? Guidelines
    for Synthesis, Interpretation and Guidance of Research.” <i>Communications of
    the AIS</i> 37, no. Art 12 (2015): 286–325.'
  ieee: G. Schryen, “Writing qualitative IS literature reviews ? Guidelines for synthesis,
    interpretation and guidance of research,” <i>Communications of the AIS</i>, vol.
    37, no. Art 12, pp. 286–325, 2015.
  mla: Schryen, Guido. “Writing Qualitative IS Literature Reviews ? Guidelines for
    Synthesis, Interpretation and Guidance of Research.” <i>Communications of the
    AIS</i>, vol. 37, no. Art 12, Association for Information Systems (AIS); Association
    for Computing Machinery (ACM), 2015, pp. 286–325.
  short: G. Schryen, Communications of the AIS 37 (2015) 286–325.
date_created: 2018-11-14T14:26:59Z
date_updated: 2022-01-06T07:02:15Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:46:54Z
  date_updated: 2018-12-13T15:10:32Z
  file_id: '6041'
  file_name: Writing Qualitative Is Literature Reviewsguidelines For Synthesis In.pdf
  file_size: 1048400
  relation: main_file
file_date_updated: 2018-12-13T15:10:32Z
has_accepted_license: '1'
intvolume: '        37'
issue: Art 12
language:
- iso: eng
oa: '1'
page: 286-325
publication: Communications of the AIS
publisher: Association for Information Systems (AIS); Association for Computing Machinery
  (ACM)
status: public
title: Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation
  and guidance of research
type: journal_article
user_id: '61579'
volume: 37
year: '2015'
...
---
_id: '5672'
author:
- first_name: Gerhard
  full_name: Rauchecker, Gerhard
  last_name: Rauchecker
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Rauchecker G, Yasasin E, Schryen G. A Decision Support System for IT Security
    Incident Management. In: <i>11th International Conference on Trust, Privacy, and
    Security in Digital Business (TRUSTBUS)</i>. ; 2014.'
  apa: Rauchecker, G., Yasasin, E., &#38; Schryen, G. (2014). A Decision Support System
    for IT Security Incident Management. In <i>11th International Conference on Trust,
    Privacy, and Security in Digital Business (TRUSTBUS)</i>.
  bibtex: '@inproceedings{Rauchecker_Yasasin_Schryen_2014, title={A Decision Support
    System for IT Security Incident Management}, booktitle={11th International Conference
    on Trust, Privacy, and Security in Digital Business (TRUSTBUS)}, author={Rauchecker,
    Gerhard and Yasasin, Emrah and Schryen, Guido}, year={2014} }'
  chicago: Rauchecker, Gerhard, Emrah Yasasin, and Guido Schryen. “A Decision Support
    System for IT Security Incident Management.” In <i>11th International Conference
    on Trust, Privacy, and Security in Digital Business (TRUSTBUS)</i>, 2014.
  ieee: G. Rauchecker, E. Yasasin, and G. Schryen, “A Decision Support System for
    IT Security Incident Management,” in <i>11th International Conference on Trust,
    Privacy, and Security in Digital Business (TRUSTBUS)</i>, 2014.
  mla: Rauchecker, Gerhard, et al. “A Decision Support System for IT Security Incident
    Management.” <i>11th International Conference on Trust, Privacy, and Security
    in Digital Business (TRUSTBUS)</i>, 2014.
  short: 'G. Rauchecker, E. Yasasin, G. Schryen, in: 11th International Conference
    on Trust, Privacy, and Security in Digital Business (TRUSTBUS), 2014.'
date_created: 2018-11-14T15:07:47Z
date_updated: 2022-01-06T07:02:27Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:51:37Z
  date_updated: 2018-12-13T15:11:29Z
  file_id: '6046'
  file_name: trustbus14_main.pdf
  file_size: 285288
  relation: main_file
file_date_updated: 2018-12-13T15:11:29Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: 11th International Conference on Trust, Privacy, and Security in Digital
  Business (TRUSTBUS)
status: public
title: A Decision Support System for IT Security Incident Management
type: conference
user_id: '61579'
year: '2014'
...
---
_id: '5686'
author:
- first_name: Andreas
  full_name: Fink, Andreas
  last_name: Fink
- first_name: Natalia
  full_name: Kliewer, Natalia
  last_name: Kliewer
- first_name: Dirk
  full_name: Mattfeld, Dirk
  last_name: Mattfeld
- first_name: Lars
  full_name: Mönch, Lars
  last_name: Mönch
- first_name: Franz
  full_name: Rothlauf, Franz
  last_name: Rothlauf
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Leena
  full_name: Suhl, Leena
  last_name: Suhl
- first_name: Stefan
  full_name: Voß, Stefan
  last_name: Voß
citation:
  ama: Fink A, Kliewer N, Mattfeld D, et al. Model-based Decision Support in Manufacturing
    and Service Networks. <i>Business &#38; Information Systems Engineering (BISE)</i>.
    2014;6(1):17-24.
  apa: Fink, A., Kliewer, N., Mattfeld, D., Mönch, L., Rothlauf, F., Schryen, G.,
    … Voß, S. (2014). Model-based Decision Support in Manufacturing and Service Networks.
    <i>Business &#38; Information Systems Engineering (BISE)</i>, <i>6</i>(1), 17–24.
  bibtex: '@article{Fink_Kliewer_Mattfeld_Mönch_Rothlauf_Schryen_Suhl_Voß_2014, title={Model-based
    Decision Support in Manufacturing and Service Networks}, volume={6}, number={1},
    journal={Business &#38; Information Systems Engineering (BISE)}, publisher={Gabler},
    author={Fink, Andreas and Kliewer, Natalia and Mattfeld, Dirk and Mönch, Lars
    and Rothlauf, Franz and Schryen, Guido and Suhl, Leena and Voß, Stefan}, year={2014},
    pages={17–24} }'
  chicago: 'Fink, Andreas, Natalia Kliewer, Dirk Mattfeld, Lars Mönch, Franz Rothlauf,
    Guido Schryen, Leena Suhl, and Stefan Voß. “Model-Based Decision Support in Manufacturing
    and Service Networks.” <i>Business &#38; Information Systems Engineering (BISE)</i>
    6, no. 1 (2014): 17–24.'
  ieee: A. Fink <i>et al.</i>, “Model-based Decision Support in Manufacturing and
    Service Networks,” <i>Business &#38; Information Systems Engineering (BISE)</i>,
    vol. 6, no. 1, pp. 17–24, 2014.
  mla: Fink, Andreas, et al. “Model-Based Decision Support in Manufacturing and Service
    Networks.” <i>Business &#38; Information Systems Engineering (BISE)</i>, vol.
    6, no. 1, Gabler, 2014, pp. 17–24.
  short: A. Fink, N. Kliewer, D. Mattfeld, L. Mönch, F. Rothlauf, G. Schryen, L. Suhl,
    S. Voß, Business &#38; Information Systems Engineering (BISE) 6 (2014) 17–24.
date_created: 2018-11-14T15:45:36Z
date_updated: 2022-01-06T07:02:33Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:49:47Z
  date_updated: 2018-12-13T15:10:52Z
  file_id: '6043'
  file_name: Fink2014_Article_Model-BasedDecisionSupportInMa.pdf
  file_size: 447715
  relation: main_file
file_date_updated: 2018-12-13T15:10:52Z
has_accepted_license: '1'
intvolume: '         6'
issue: '1'
language:
- iso: eng
oa: '1'
page: 17-24
publication: Business & Information Systems Engineering (BISE)
publisher: Gabler
status: public
title: Model-based Decision Support in Manufacturing and Service Networks
type: journal_article
user_id: '61579'
volume: 6
year: '2014'
...
---
_id: '5687'
author:
- first_name: Andreas
  full_name: Fink, Andreas
  last_name: Fink
- first_name: Natalia
  full_name: Kliewer, Natalia
  last_name: Kliewer
- first_name: Dirk
  full_name: Mattfeld, Dirk
  last_name: Mattfeld
- first_name: Lars
  full_name: Mönch, Lars
  last_name: Mönch
- first_name: Franz
  full_name: Rothlauf, Franz
  last_name: Rothlauf
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Lena
  full_name: Suhl, Lena
  last_name: Suhl
- first_name: Stefan
  full_name: Voß, Stefan
  last_name: Voß
citation:
  ama: Fink A, Kliewer N, Mattfeld D, et al. Modellbasierte Entscheidungsunterstützung
    in Produktions- und Service-Netzwerken. <i>Wirtschaftsinformatik</i>. 2014;56(1):21-29.
  apa: Fink, A., Kliewer, N., Mattfeld, D., Mönch, L., Rothlauf, F., Schryen, G.,
    … Voß, S. (2014). Modellbasierte Entscheidungsunterstützung in Produktions- und
    Service-Netzwerken. <i>Wirtschaftsinformatik</i>, <i>56</i>(1), 21–29.
  bibtex: '@article{Fink_Kliewer_Mattfeld_Mönch_Rothlauf_Schryen_Suhl_Voß_2014, title={Modellbasierte
    Entscheidungsunterstützung in Produktions- und Service-Netzwerken}, volume={56},
    number={1}, journal={Wirtschaftsinformatik}, publisher={Gabler}, author={Fink,
    Andreas and Kliewer, Natalia and Mattfeld, Dirk and Mönch, Lars and Rothlauf,
    Franz and Schryen, Guido and Suhl, Lena and Voß, Stefan}, year={2014}, pages={21–29}
    }'
  chicago: 'Fink, Andreas, Natalia Kliewer, Dirk Mattfeld, Lars Mönch, Franz Rothlauf,
    Guido Schryen, Lena Suhl, and Stefan Voß. “Modellbasierte Entscheidungsunterstützung
    in Produktions- Und Service-Netzwerken.” <i>Wirtschaftsinformatik</i> 56, no.
    1 (2014): 21–29.'
  ieee: A. Fink <i>et al.</i>, “Modellbasierte Entscheidungsunterstützung in Produktions-
    und Service-Netzwerken,” <i>Wirtschaftsinformatik</i>, vol. 56, no. 1, pp. 21–29,
    2014.
  mla: Fink, Andreas, et al. “Modellbasierte Entscheidungsunterstützung in Produktions-
    Und Service-Netzwerken.” <i>Wirtschaftsinformatik</i>, vol. 56, no. 1, Gabler,
    2014, pp. 21–29.
  short: A. Fink, N. Kliewer, D. Mattfeld, L. Mönch, F. Rothlauf, G. Schryen, L. Suhl,
    S. Voß, Wirtschaftsinformatik 56 (2014) 21–29.
date_created: 2018-11-14T15:46:29Z
date_updated: 2022-01-06T07:02:33Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-11T14:27:31Z
  date_updated: 2018-12-13T15:13:24Z
  file_id: '6170'
  file_name: Fink2014_Article_ModellbasierteEntscheidungsunt.pdf
  file_size: 460098
  relation: main_file
file_date_updated: 2018-12-13T15:13:24Z
has_accepted_license: '1'
intvolume: '        56'
issue: '1'
language:
- iso: eng
oa: '1'
page: 21-29
publication: Wirtschaftsinformatik
publisher: Gabler
status: public
title: Modellbasierte Entscheidungsunterstützung in Produktions- und Service-Netzwerken
type: journal_article
user_id: '61579'
volume: 56
year: '2014'
...
---
_id: '6197'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. <i>The Epistemological Impact of Literature Reviews in Information
    Systems Research</i>.; 2014.
  apa: Schryen, G. (2014). <i>The Epistemological Impact of Literature Reviews in
    Information Systems Research</i>.
  bibtex: '@book{Schryen_2014, title={The Epistemological Impact of Literature Reviews
    in Information Systems Research}, author={Schryen, Guido}, year={2014} }'
  chicago: Schryen, Guido. <i>The Epistemological Impact of Literature Reviews in
    Information Systems Research</i>, 2014.
  ieee: G. Schryen, <i>The Epistemological Impact of Literature Reviews in Information
    Systems Research</i>. 2014.
  mla: Schryen, Guido. <i>The Epistemological Impact of Literature Reviews in Information
    Systems Research</i>. 2014.
  short: G. Schryen, The Epistemological Impact of Literature Reviews in Information
    Systems Research, 2014.
date_created: 2018-12-13T14:15:36Z
date_updated: 2022-01-06T07:02:56Z
ddc:
- '000'
department:
- _id: '277'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-13T14:22:14Z
  date_updated: 2018-12-13T15:21:14Z
  file_id: '6198'
  file_name: Technical report UR - The Epistemological Impact of Literature Reviews
    in IS Research.pdf
  file_size: 413916
  relation: main_file
file_date_updated: 2018-12-13T15:21:14Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
status: public
title: The Epistemological Impact of Literature Reviews in Information Systems Research
type: report
user_id: '61579'
year: '2014'
...
---
_id: '5573'
author:
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Gerhard
  full_name: Rauchecker, Gerhard
  last_name: Rauchecker
- first_name: Julian
  full_name: Prester, Julian
  last_name: Prester
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Yasasin E, Rauchecker G, Prester J, Schryen G. A Fuzzy Security Investment
    Decision Support Model for Highly Distributed Systems. In: <i>1st Workshop on
    Security in Highly Connected IT Systems (SHCIS 14)</i>. ; 2014.'
  apa: Yasasin, E., Rauchecker, G., Prester, J., &#38; Schryen, G. (2014). A Fuzzy
    Security Investment Decision Support Model for Highly Distributed Systems. In
    <i>1st Workshop on Security in highly connected IT systems (SHCIS 14)</i>.
  bibtex: '@inproceedings{Yasasin_Rauchecker_Prester_Schryen_2014, title={A Fuzzy
    Security Investment Decision Support Model for Highly Distributed Systems}, booktitle={1st
    Workshop on Security in highly connected IT systems (SHCIS 14)}, author={Yasasin,
    Emrah and Rauchecker, Gerhard and Prester, Julian and Schryen, Guido}, year={2014}
    }'
  chicago: Yasasin, Emrah, Gerhard Rauchecker, Julian Prester, and Guido Schryen.
    “A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems.”
    In <i>1st Workshop on Security in Highly Connected IT Systems (SHCIS 14)</i>,
    2014.
  ieee: E. Yasasin, G. Rauchecker, J. Prester, and G. Schryen, “A Fuzzy Security Investment
    Decision Support Model for Highly Distributed Systems,” in <i>1st Workshop on
    Security in highly connected IT systems (SHCIS 14)</i>, 2014.
  mla: Yasasin, Emrah, et al. “A Fuzzy Security Investment Decision Support Model
    for Highly Distributed Systems.” <i>1st Workshop on Security in Highly Connected
    IT Systems (SHCIS 14)</i>, 2014.
  short: 'E. Yasasin, G. Rauchecker, J. Prester, G. Schryen, in: 1st Workshop on Security
    in Highly Connected IT Systems (SHCIS 14), 2014.'
date_created: 2018-11-14T11:12:40Z
date_updated: 2022-01-06T07:01:59Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-11T14:27:01Z
  date_updated: 2018-12-13T15:13:12Z
  file_id: '6169'
  file_name: bare_conf.pdf
  file_size: 314617
  relation: main_file
file_date_updated: 2018-12-13T15:13:12Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: 1st Workshop on Security in highly connected IT systems (SHCIS 14)
status: public
title: A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems
type: conference
user_id: '61579'
year: '2014'
...
---
_id: '5585'
author:
- first_name: Felix
  full_name: Wex, Felix
  last_name: Wex
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Stefan
  full_name: Feuerriegel, Stefan
  last_name: Feuerriegel
- first_name: Dirk
  full_name: Neumann, Dirk
  last_name: Neumann
citation:
  ama: 'Wex F, Schryen G, Feuerriegel S, Neumann D. Emergency Response in Natural
    Disaster Management: Allocation and Scheduling of Rescue Units. <i>European Journal
    of Operational Research</i>. 2014.'
  apa: 'Wex, F., Schryen, G., Feuerriegel, S., &#38; Neumann, D. (2014). Emergency
    Response in Natural Disaster Management: Allocation and Scheduling of Rescue Units.
    <i>European Journal of Operational Research</i>.'
  bibtex: '@article{Wex_Schryen_Feuerriegel_Neumann_2014, title={Emergency Response
    in Natural Disaster Management: Allocation and Scheduling of Rescue Units}, journal={European
    Journal of Operational Research}, publisher={Elsevier}, author={Wex, Felix and
    Schryen, Guido and Feuerriegel, Stefan and Neumann, Dirk}, year={2014} }'
  chicago: 'Wex, Felix, Guido Schryen, Stefan Feuerriegel, and Dirk Neumann. “Emergency
    Response in Natural Disaster Management: Allocation and Scheduling of Rescue Units.”
    <i>European Journal of Operational Research</i>, 2014.'
  ieee: 'F. Wex, G. Schryen, S. Feuerriegel, and D. Neumann, “Emergency Response in
    Natural Disaster Management: Allocation and Scheduling of Rescue Units,” <i>European
    Journal of Operational Research</i>, 2014.'
  mla: 'Wex, Felix, et al. “Emergency Response in Natural Disaster Management: Allocation
    and Scheduling of Rescue Units.” <i>European Journal of Operational Research</i>,
    Elsevier, 2014.'
  short: F. Wex, G. Schryen, S. Feuerriegel, D. Neumann, European Journal of Operational
    Research (2014).
date_created: 2018-11-14T11:23:26Z
date_updated: 2022-01-06T07:02:02Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:47:45Z
  date_updated: 2018-12-13T15:10:43Z
  file_id: '6042'
  file_name: 1-s2.0-S0377221713008527-main.pdf
  file_size: 1386151
  relation: main_file
file_date_updated: 2018-12-13T15:10:43Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: European Journal of Operational Research
publisher: Elsevier
status: public
title: 'Emergency Response in Natural Disaster Management: Allocation and Scheduling
  of Rescue Units'
type: journal_article
user_id: '61579'
year: '2014'
...
---
_id: '5614'
abstract:
- lang: eng
  text: Natural disasters, including earthquakes, Tsunamis, floods, hurricanes, and
    volcanic eruptions, have caused tremendous harm and continue to threaten millions
    of humans and various infrastructure capabilities each year. In their efforts
    to take countermeasures against the threats posed by future natural disasters,
    the United Nations formulated the ?Hyogo Framework for Action?, which aims at
    assessing and reducing risk. This framework and a global review of disaster reduction
    initiatives of the United Nations acknowledge the need for information systems
    research contributions in addressing major challenges of natural disaster management.
    In this paper, we provide a review of the literature with regard to how information
    systems research has addressed risk assessment and reduction in natural disaster
    management. Based on the review we identify research gaps that are centered around
    the need for acquiring general knowledge on how to design IS artifacts for risk
    assessment and reduction. In order to close these gaps in further research, we
    develop a research agenda that follows the IS design science paradigm.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Felix
  full_name: Wex, Felix
  last_name: Wex
citation:
  ama: 'Schryen G, Wex F. Risk Reduction in Natural Disaster Management Through Information
    Systems: A Literature review and an IS design science research agenda. <i>International
    Journal of Information Systems for Crisis Response and Management (IJISCRAM)</i>.
    2014;6(1).'
  apa: 'Schryen, G., &#38; Wex, F. (2014). Risk Reduction in Natural Disaster Management
    Through Information Systems: A Literature review and an IS design science research
    agenda. <i>International Journal of Information Systems for Crisis Response and
    Management (IJISCRAM)</i>, <i>6</i>(1).'
  bibtex: '@article{Schryen_Wex_2014, title={Risk Reduction in Natural Disaster Management
    Through Information Systems: A Literature review and an IS design science research
    agenda}, volume={6}, number={1}, journal={International Journal of Information
    Systems for Crisis Response and Management (IJISCRAM)}, author={Schryen, Guido
    and Wex, Felix}, year={2014} }'
  chicago: 'Schryen, Guido, and Felix Wex. “Risk Reduction in Natural Disaster Management
    Through Information Systems: A Literature Review and an IS Design Science Research
    Agenda.” <i>International Journal of Information Systems for Crisis Response and
    Management (IJISCRAM)</i> 6, no. 1 (2014).'
  ieee: 'G. Schryen and F. Wex, “Risk Reduction in Natural Disaster Management Through
    Information Systems: A Literature review and an IS design science research agenda,”
    <i>International Journal of Information Systems for Crisis Response and Management
    (IJISCRAM)</i>, vol. 6, no. 1, 2014.'
  mla: 'Schryen, Guido, and Felix Wex. “Risk Reduction in Natural Disaster Management
    Through Information Systems: A Literature Review and an IS Design Science Research
    Agenda.” <i>International Journal of Information Systems for Crisis Response and
    Management (IJISCRAM)</i>, vol. 6, no. 1, 2014.'
  short: G. Schryen, F. Wex, International Journal of Information Systems for Crisis
    Response and Management (IJISCRAM) 6 (2014).
date_created: 2018-11-14T13:58:50Z
date_updated: 2022-01-06T07:02:08Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:50:26Z
  date_updated: 2018-12-13T15:11:05Z
  file_id: '6044'
  file_name: Risk reduction in NDM - Revision 1.pdf
  file_size: 2708161
  relation: main_file
file_date_updated: 2018-12-13T15:11:05Z
has_accepted_license: '1'
intvolume: '         6'
issue: '1'
keyword:
- Natural Disaster Management
- Risk Reduction
- Hyogo Framework
- IS Design Science
- Literature review
language:
- iso: eng
oa: '1'
publication: International Journal of Information Systems for Crisis Response and
  Management (IJISCRAM)
status: public
title: 'Risk Reduction in Natural Disaster Management Through Information Systems:
  A Literature review and an IS design science research agenda'
type: journal_article
user_id: '61579'
volume: 6
year: '2014'
...
---
_id: '5627'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Diana
  full_name: Hristova, Diana
  last_name: Hristova
citation:
  ama: 'Schryen G, Hristova D. Duality in fuzzy linear programming: A survey. <i>OR
    -Spectrum</i>. 2014;37(1):1-48.'
  apa: 'Schryen, G., &#38; Hristova, D. (2014). Duality in fuzzy linear programming:
    A survey. <i>OR -Spectrum</i>, <i>37</i>(1), 1–48.'
  bibtex: '@article{Schryen_Hristova_2014, title={Duality in fuzzy linear programming:
    A survey}, volume={37}, number={1}, journal={OR -Spectrum}, publisher={Springer},
    author={Schryen, Guido and Hristova, Diana}, year={2014}, pages={1–48} }'
  chicago: 'Schryen, Guido, and Diana Hristova. “Duality in Fuzzy Linear Programming:
    A Survey.” <i>OR -Spectrum</i> 37, no. 1 (2014): 1–48.'
  ieee: 'G. Schryen and D. Hristova, “Duality in fuzzy linear programming: A survey,”
    <i>OR -Spectrum</i>, vol. 37, no. 1, pp. 1–48, 2014.'
  mla: 'Schryen, Guido, and Diana Hristova. “Duality in Fuzzy Linear Programming:
    A Survey.” <i>OR -Spectrum</i>, vol. 37, no. 1, Springer, 2014, pp. 1–48.'
  short: G. Schryen, D. Hristova, OR -Spectrum 37 (2014) 1–48.
date_created: 2018-11-14T14:18:28Z
date_updated: 2022-01-06T07:02:13Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:53:04Z
  date_updated: 2018-12-13T15:11:40Z
  file_id: '6047'
  file_name: art_10.1007_s00291-013-0355-2(1).pdf
  file_size: 569417
  relation: main_file
file_date_updated: 2018-12-13T15:11:40Z
has_accepted_license: '1'
intvolume: '        37'
issue: '1'
language:
- iso: eng
oa: '1'
page: 1-48
publication: OR -Spectrum
publisher: Springer
status: public
title: 'Duality in fuzzy linear programming: A survey'
type: journal_article
user_id: '61579'
volume: 37
year: '2014'
...
---
_id: '5636'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Writing qualitative IS literature reviews ? Guidelines for synthesis,
    interpretation and guidance of research. <i>Communications of the AIS</i>. 2014.
  apa: Schryen, G. (2014). Writing qualitative IS literature reviews ? Guidelines
    for synthesis, interpretation and guidance of research. <i>Communications of the
    AIS</i>.
  bibtex: '@article{Schryen_2014, title={Writing qualitative IS literature reviews ?
    Guidelines for synthesis, interpretation and guidance of research}, journal={Communications
    of the AIS}, author={Schryen, Guido}, year={2014} }'
  chicago: Schryen, Guido. “Writing Qualitative IS Literature Reviews ? Guidelines
    for Synthesis, Interpretation and Guidance of Research.” <i>Communications of
    the AIS</i>, 2014.
  ieee: G. Schryen, “Writing qualitative IS literature reviews ? Guidelines for synthesis,
    interpretation and guidance of research,” <i>Communications of the AIS</i>, 2014.
  mla: Schryen, Guido. “Writing Qualitative IS Literature Reviews ? Guidelines for
    Synthesis, Interpretation and Guidance of Research.” <i>Communications of the
    AIS</i>, 2014.
  short: G. Schryen, Communications of the AIS (2014).
date_created: 2018-11-14T14:31:02Z
date_updated: 2022-01-06T07:02:15Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:50:50Z
  date_updated: 2018-12-13T15:11:19Z
  file_id: '6045'
  file_name: Technical report UR - Writing IS literature reviews.pdf
  file_size: 1568470
  relation: main_file
file_date_updated: 2018-12-13T15:11:19Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: Communications of the AIS
status: public
title: Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation
  and guidance of research
type: journal_article
user_id: '61579'
year: '2014'
...
