---
_id: '5590'
abstract:
- lang: eng
  text: 'Nowadays, providing employees with failure-free access to various systems,
    applications and services is a crucial factor for organizations? success as disturbances
    potentially inhibit smooth workflows and thereby harm productivity. However, it
    is a challenging task to assign access rights to employees? accounts within a
    satisfying time frame. In addition, the management of multiple accounts and identities
    can be very onerous and time consuming for the responsible administrator and therefore
    expensive for the organization. In order to meet these challenges, firms decide
    to invest in introducing an Identity and Access Management System (IAMS) that
    supports the organization by using policies to assign permissions to accounts,
    groups, and roles. In practice, since various versions of IAMSs exist, it is a
    challenging task to decide upon introduction of an IAMS. The following study proposes
    a first attempt of a decision support model for practitioners which considers
    four alternatives: Introduction of an IAMS with Role-based Access Control RBAC)
    or without and no introduction of IAMS again with or without RBAC. To underpin
    the practical applicability of the proposed model, we parametrize and operationalize
    it based on a real world use case using input from an expert interview.'
author:
- first_name: Eva
  full_name: Weishäupl, Eva
  last_name: Weishäupl
- first_name: Michael
  full_name: Kunz, Michael
  last_name: Kunz
- first_name: Emrah
  full_name: Yasasin, Emrah
  last_name: Yasasin
- first_name: Gerit
  full_name: Wagner, Gerit
  last_name: Wagner
- first_name: Julian
  full_name: Prester, Julian
  last_name: Prester
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Günther
  full_name: Pernul, Günther
  last_name: Pernul
citation:
  ama: 'Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity
    and Access Management Systems Using Decision Theory. In: <i>2nd International
    Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015.'
  apa: Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G.,
    &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management
    Systems Using Decision Theory. In <i>2nd International Workshop on Security in
    highly connected IT Systems (SHCIS?15)</i>.
  bibtex: '@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015,
    title={Towards an Economic Approach to Identity and Access Management Systems
    Using Decision Theory}, booktitle={2nd International Workshop on Security in highly
    connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and
    Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul,
    Günther}, year={2015} }'
  chicago: Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester,
    Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and
    Access Management Systems Using Decision Theory.” In <i>2nd International Workshop
    on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.
  ieee: E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and
    Access Management Systems Using Decision Theory,” in <i>2nd International Workshop
    on Security in highly connected IT Systems (SHCIS?15)</i>, 2015.
  mla: Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access
    Management Systems Using Decision Theory.” <i>2nd International Workshop on Security
    in Highly Connected IT Systems (SHCIS?15)</i>, 2015.
  short: 'E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G.
    Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems
    (SHCIS?15), 2015.'
date_created: 2018-11-14T11:27:20Z
date_updated: 2022-01-06T07:02:04Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:46:28Z
  date_updated: 2018-12-13T15:09:54Z
  file_id: '6040'
  file_name: Towards an Economic Approach to IAMS.PDF
  file_size: 166015
  relation: main_file
file_date_updated: 2018-12-13T15:09:54Z
has_accepted_license: '1'
keyword:
- Identity and Access Management
- Economic Decision Making
- Information Systems
- Information Security Investment
- Decision Theory
language:
- iso: eng
oa: '1'
publication: 2nd International Workshop on Security in highly connected IT Systems
  (SHCIS?15)
status: public
title: Towards an Economic Approach to Identity and Access Management Systems Using
  Decision Theory
type: conference
user_id: '61579'
year: '2015'
...
---
_id: '9808'
abstract:
- lang: eng
  text: This study presents the methods employed by a team from the department of
    Mechatronics and Dynamics at the University of Paderborn, Germany for the 2013
    PHM data challenge. The focus of the challenge was on maintenance action recommendation
    for an industrial machinery based on remote monitoring and diagnosis. Since an
    ensemble of data driven methods has been considered as the state of the art approach
    in diagnosis and prognosis, the first approach was to evaluate the performance
    of an ensemble of data driven methods using the parametric data as input and problems
    (recommended maintenance action) as the output. Due to close correlation of parametric
    data of different problems, this approach produced high misclassification rate.
    Event-based decision trees were then constructed to identify problems associated
    with particular events. To distinguish between problems associated with events
    that appeared in multiple problems, support vector machine (SVM) with parameters
    optimally tuned using particle swarm optimization (PSO) was employed. Parametric
    data was used as the input to the SVM algorithm and majority voting was employed
    to determine the final decision for cases with multiple events. A total of 165
    SVM models were constructed. This approach improved the overall score from 21
    to 48. The method was further enhanced by employing an ensemble of three data
    driven methods, that is, SVM, random forests (RF) and bagged trees (BT), to build
    the event based models. With this approach, a score of 51 was obtained . The results
    demonstrate that the proposed event based method can be effective in maintenance
    action recommendation based on events codes and parametric data acquired remotely
    from an industrial equipment.
author:
- first_name: James Kuria
  full_name: Kimotho, James Kuria
  last_name: Kimotho
- first_name: Chritoph
  full_name: Sondermann-Wölke, Chritoph
  last_name: Sondermann-Wölke
- first_name: Tobias
  full_name: Meyer, Tobias
  last_name: Meyer
- first_name: Walter
  full_name: Sextro, Walter
  id: '21220'
  last_name: Sextro
citation:
  ama: Kimotho JK, Sondermann-Wölke C, Meyer T, Sextro W. Application of Event Based
    Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation.
    <i>International Journal of Prognostics and Health Management</i>. 2013;4(2).
  apa: Kimotho, J. K., Sondermann-Wölke, C., Meyer, T., &#38; Sextro, W. (2013). Application
    of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance
    Action Recommendation. <i>International Journal of Prognostics and Health Management</i>,
    <i>4</i>(2).
  bibtex: '@article{Kimotho_Sondermann-Wölke_Meyer_Sextro_2013, title={Application
    of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance
    Action Recommendation}, volume={4}, number={2}, journal={International Journal
    of Prognostics and Health Management}, author={Kimotho, James Kuria and Sondermann-Wölke,
    Chritoph and Meyer, Tobias and Sextro, Walter}, year={2013} }'
  chicago: Kimotho, James Kuria, Chritoph Sondermann-Wölke, Tobias Meyer, and Walter
    Sextro. “Application of Event Based Decision Tree and Ensemble of Data Driven
    Methods for Maintenance Action Recommendation.” <i>International Journal of Prognostics
    and Health Management</i> 4, no. 2 (2013).
  ieee: J. K. Kimotho, C. Sondermann-Wölke, T. Meyer, and W. Sextro, “Application
    of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance
    Action Recommendation,” <i>International Journal of Prognostics and Health Management</i>,
    vol. 4, no. 2, 2013.
  mla: Kimotho, James Kuria, et al. “Application of Event Based Decision Tree and
    Ensemble of Data Driven Methods for Maintenance Action Recommendation.” <i>International
    Journal of Prognostics and Health Management</i>, vol. 4, no. 2, 2013.
  short: J.K. Kimotho, C. Sondermann-Wölke, T. Meyer, W. Sextro, International Journal
    of Prognostics and Health Management 4 (2013).
date_created: 2019-05-13T14:15:36Z
date_updated: 2022-01-06T07:04:21Z
department:
- _id: '151'
intvolume: '         4'
issue: '2'
keyword:
- maintenance decision
- Bagged trees
- Decision trees
- PSO-SVM
- Random forests
language:
- iso: eng
publication: International Journal of Prognostics and Health Management
quality_controlled: '1'
status: public
title: Application of Event Based Decision Tree and Ensemble of Data Driven Methods
  for Maintenance Action Recommendation
type: journal_article
user_id: '55222'
volume: 4
year: '2013'
...
---
_id: '11716'
abstract:
- lang: eng
  text: The accuracy of automatic speech recognition systems in noisy and reverberant
    environments can be improved notably by exploiting the uncertainty of the estimated
    speech features using so-called uncertainty-of-observation techniques. In this
    paper, we introduce a new Bayesian decision rule that can serve as a mathematical
    framework from which both known and new uncertainty-of-observation techniques
    can be either derived or approximated. The new decision rule in its direct form
    leads to the new significance decoding approach for Gaussian mixture models, which
    results in better performance compared to standard uncertainty-of-observation
    techniques in different additive and convolutive noise scenarios.
author:
- first_name: Ahmed H.
  full_name: Abdelaziz, Ahmed H.
  last_name: Abdelaziz
- first_name: Steffen
  full_name: Zeiler, Steffen
  last_name: Zeiler
- first_name: Dorothea
  full_name: Kolossa, Dorothea
  last_name: Kolossa
- first_name: Volker
  full_name: Leutnant, Volker
  last_name: Leutnant
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Abdelaziz AH, Zeiler S, Kolossa D, Leutnant V, Haeb-Umbach R. GMM-based significance
    decoding. In: <i>Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International
    Conference On</i>. ; 2013:6827-6831. doi:<a href="https://doi.org/10.1109/ICASSP.2013.6638984">10.1109/ICASSP.2013.6638984</a>'
  apa: Abdelaziz, A. H., Zeiler, S., Kolossa, D., Leutnant, V., &#38; Haeb-Umbach,
    R. (2013). GMM-based significance decoding. In <i>Acoustics, Speech and Signal
    Processing (ICASSP), 2013 IEEE International Conference on</i> (pp. 6827–6831).
    <a href="https://doi.org/10.1109/ICASSP.2013.6638984">https://doi.org/10.1109/ICASSP.2013.6638984</a>
  bibtex: '@inproceedings{Abdelaziz_Zeiler_Kolossa_Leutnant_Haeb-Umbach_2013, title={GMM-based
    significance decoding}, DOI={<a href="https://doi.org/10.1109/ICASSP.2013.6638984">10.1109/ICASSP.2013.6638984</a>},
    booktitle={Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International
    Conference on}, author={Abdelaziz, Ahmed H. and Zeiler, Steffen and Kolossa, Dorothea
    and Leutnant, Volker and Haeb-Umbach, Reinhold}, year={2013}, pages={6827–6831}
    }'
  chicago: Abdelaziz, Ahmed H., Steffen Zeiler, Dorothea Kolossa, Volker Leutnant,
    and Reinhold Haeb-Umbach. “GMM-Based Significance Decoding.” In <i>Acoustics,
    Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On</i>,
    6827–31, 2013. <a href="https://doi.org/10.1109/ICASSP.2013.6638984">https://doi.org/10.1109/ICASSP.2013.6638984</a>.
  ieee: A. H. Abdelaziz, S. Zeiler, D. Kolossa, V. Leutnant, and R. Haeb-Umbach, “GMM-based
    significance decoding,” in <i>Acoustics, Speech and Signal Processing (ICASSP),
    2013 IEEE International Conference on</i>, 2013, pp. 6827–6831.
  mla: Abdelaziz, Ahmed H., et al. “GMM-Based Significance Decoding.” <i>Acoustics,
    Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On</i>,
    2013, pp. 6827–31, doi:<a href="https://doi.org/10.1109/ICASSP.2013.6638984">10.1109/ICASSP.2013.6638984</a>.
  short: 'A.H. Abdelaziz, S. Zeiler, D. Kolossa, V. Leutnant, R. Haeb-Umbach, in:
    Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference
    On, 2013, pp. 6827–6831.'
date_created: 2019-07-12T05:26:53Z
date_updated: 2022-01-06T06:51:07Z
department:
- _id: '54'
doi: 10.1109/ICASSP.2013.6638984
keyword:
- Bayes methods
- Gaussian processes
- convolution
- decision theory
- decoding
- noise
- reverberation
- speech coding
- speech recognition
- Bayesian decision rule
- GMM
- Gaussian mixture models
- additive noise scenarios
- automatic speech recognition systems
- convolutive noise scenarios
- decoding approach
- mathematical framework
- reverberant environments
- significance decoding
- speech feature estimation
- uncertainty-of-observation techniques
- Hidden Markov models
- Maximum likelihood decoding
- Noise
- Speech
- Speech recognition
- Uncertainty
- Uncertainty-of-observation
- modified imputation
- noise robust speech recognition
- significance decoding
- uncertainty decoding
language:
- iso: eng
page: 6827-6831
publication: Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International
  Conference on
publication_identifier:
  issn:
  - 1520-6149
status: public
title: GMM-based significance decoding
type: conference
user_id: '44006'
year: '2013'
...
---
_id: '6064'
abstract:
- lang: eng
  text: If one of two events is attended to, it will be perceived earlier than a simultaneously
    occurring unattended event. Since 150 years, this effect has been ascribed to
    the facilitating influence of attention, also known as prior entry. Yet, the attentional
    origin of prior-entry effects¹ has been repeatedly doubted. One criticism is that
    prior-entry effects might be due to biased decision processes that would mimic
    a temporal advantage for attended stimuli. Although most obvious biases have already
    been excluded experimentally (e.g. judgment criteria, response compatibility)
    and prior-entry effects have shown to persist (Shore, Spence, & Klein, 2001),
    many other biases are conceivable, which makes it difficult to put the debate
    to an end. Thus, we approach this problem the other way around by asking whether
    prior-entry effects can be biased voluntarily. Observers were informed about prior
    entry and instructed to reduce it as far as possible. For this aim they received
    continuous feedback
author:
- first_name: Katharina
  full_name: Weiß, Katharina
  last_name: Weiß
- first_name: Ingrid
  full_name: Scharlau, Ingrid
  id: '451'
  last_name: Scharlau
  orcid: 0000-0003-2364-9489
citation:
  ama: 'Weiß K, Scharlau I. At the mercy of prior entry: Prior entry induced by invisible
    primes is not susceptible to current intentions. <i>Acta Psychologica</i>. 2012;139(1):54-64.'
  apa: 'Weiß, K., &#38; Scharlau, I. (2012). At the mercy of prior entry: Prior entry
    induced by invisible primes is not susceptible to current intentions. <i>Acta
    Psychologica</i>, <i>139</i>(1), 54–64.'
  bibtex: '@article{Weiß_Scharlau_2012, title={At the mercy of prior entry: Prior
    entry induced by invisible primes is not susceptible to current intentions.},
    volume={139}, number={1}, journal={Acta Psychologica}, author={Weiß, Katharina
    and Scharlau, Ingrid}, year={2012}, pages={54–64} }'
  chicago: 'Weiß, Katharina, and Ingrid Scharlau. “At the Mercy of Prior Entry: Prior
    Entry Induced by Invisible Primes Is Not Susceptible to Current Intentions.” <i>Acta
    Psychologica</i> 139, no. 1 (2012): 54–64.'
  ieee: 'K. Weiß and I. Scharlau, “At the mercy of prior entry: Prior entry induced
    by invisible primes is not susceptible to current intentions.,” <i>Acta Psychologica</i>,
    vol. 139, no. 1, pp. 54–64, 2012.'
  mla: 'Weiß, Katharina, and Ingrid Scharlau. “At the Mercy of Prior Entry: Prior
    Entry Induced by Invisible Primes Is Not Susceptible to Current Intentions.” <i>Acta
    Psychologica</i>, vol. 139, no. 1, 2012, pp. 54–64.'
  short: K. Weiß, I. Scharlau, Acta Psychologica 139 (2012) 54–64.
date_created: 2018-12-10T07:01:19Z
date_updated: 2022-06-06T16:41:22Z
department:
- _id: '424'
funded_apc: '1'
intvolume: '       139'
issue: '1'
keyword:
- intentions
- events
- attention
- decision processes
- Adult
- Attention
- Choice Behavior
- Cues
- Female
- Humans
- Intention
- Judgment
- Male
- Middle Aged
- Reaction Time
- Time Perception
- Visual Perception
- Attention
- Decision Making
- Experiences (Events)
- Intention
language:
- iso: eng
page: 54 - 64
publication: Acta Psychologica
publication_identifier:
  issn:
  - 0001-6918
publication_status: published
status: public
title: 'At the mercy of prior entry: Prior entry induced by invisible primes is not
  susceptible to current intentions.'
type: journal_article
user_id: '42165'
volume: 139
year: '2012'
...
---
_id: '5685'
abstract:
- lang: eng
  text: In double-sided markets for computing resources an optimal allocation schedule
    among job offers and requests subject to relevant capacity constraints can be
    determined. With increasing storage demands and emerging storage services the
    question how to schedule storage jobs becomes more and more interesting. Since
    such scheduling problems are often in the class NP-complete an exact computation
    is not feasible in practice. On the other hand an approximation to the optimal
    solution can easily be found by means of using heuristics. The problem with this
    attempt is that the suggested solution may not be exactly optimal and is thus
    less satisfying. Considering the two above mentioned solution approaches one can
    clearly find a trade-off between the optimality of the solution and the efficiency
    to get to a solution at all. This work proposes to apply and combine heuristics
    in optimization to gain from both of their benefits while reducing the problematic
    aspects. Following this method it is assumed to get closer to the optimal solution
    in a shorter time compared to a full optimization.
author:
- first_name: Josef
  full_name: Finkbeiner, Josef
  last_name: Finkbeiner
- first_name: Christian
  full_name: Bodenstein, Christian
  last_name: Bodenstein
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Dirk
  full_name: Neumann, Dirk
  last_name: Neumann
citation:
  ama: 'Finkbeiner J, Bodenstein C, Schryen G, Neumann D. Applying heuristic methods
    for job scheduling in storage markets. In: <i>18th European Conference on Information
    Systems (ECIS 2010)</i>. ; 2010.'
  apa: Finkbeiner, J., Bodenstein, C., Schryen, G., &#38; Neumann, D. (2010). Applying
    heuristic methods for job scheduling in storage markets. In <i>18th European Conference
    on Information Systems (ECIS 2010)</i>.
  bibtex: '@inproceedings{Finkbeiner_Bodenstein_Schryen_Neumann_2010, title={Applying
    heuristic methods for job scheduling in storage markets}, booktitle={18th European
    Conference on Information Systems (ECIS 2010)}, author={Finkbeiner, Josef and
    Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2010} }'
  chicago: Finkbeiner, Josef, Christian Bodenstein, Guido Schryen, and Dirk Neumann.
    “Applying Heuristic Methods for Job Scheduling in Storage Markets.” In <i>18th
    European Conference on Information Systems (ECIS 2010)</i>, 2010.
  ieee: J. Finkbeiner, C. Bodenstein, G. Schryen, and D. Neumann, “Applying heuristic
    methods for job scheduling in storage markets,” in <i>18th European Conference
    on Information Systems (ECIS 2010)</i>, 2010.
  mla: Finkbeiner, Josef, et al. “Applying Heuristic Methods for Job Scheduling in
    Storage Markets.” <i>18th European Conference on Information Systems (ECIS 2010)</i>,
    2010.
  short: 'J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European
    Conference on Information Systems (ECIS 2010), 2010.'
date_created: 2018-11-14T15:45:11Z
date_updated: 2022-01-06T07:02:32Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-11T15:21:06Z
  date_updated: 2018-12-13T15:19:40Z
  file_id: '6188'
  file_name: s1-ln7055316-1881058806-1939656818Hwf-1884822883IdV-5442784107055316PDF_HI0001.pdf
  file_size: 171336
  relation: main_file
file_date_updated: 2018-12-13T15:19:40Z
has_accepted_license: '1'
keyword:
- Decision Support System
- Algorithms
- Optimization
- Market Engineering
language:
- iso: eng
oa: '1'
publication: 18th European Conference on Information Systems (ECIS 2010)
status: public
title: Applying heuristic methods for job scheduling in storage markets
type: conference
user_id: '61579'
year: '2010'
...
---
_id: '5632'
abstract:
- lang: eng
  text: 'Enduring doubts about the value of IS investments reveal that IS researchers
    have not fully managed to identify and to explain the economic benefits of IS.
    Three research tasks are essential requisites on the path towards addressing this
    criticism: the synthesis of knowledge, the identification of lack of knowledge,
    and the proposition of paths for closing knowledge gaps. This paper considers
    each of these tasks by a) synthesizing key research findings based on a comprehensive
    literature review, b) identifying and unfolding key limitations of current research,
    and c) applying a decision-theoretic perspective, which opens new horizons to
    IS business value research and shows paths for overcoming the limitations. The
    adoption of this perspective results in a decision-theoretic foundation of IS
    business value research and includes the proposition of a consistent terminology
    and a research model that frames further research.'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Christian
  full_name: Bodenstein, Christian
  last_name: Bodenstein
citation:
  ama: 'Schryen G, Bodenstein C. A decision-theoretic foundation of IS business value
    research. In: <i>Proceedings of the 18th European Conference on Information Systems
    (ECIS 2010)</i>. ; 2010.'
  apa: Schryen, G., &#38; Bodenstein, C. (2010). A decision-theoretic foundation of
    IS business value research. In <i>Proceedings of the 18th European Conference
    on Information Systems (ECIS 2010)</i>.
  bibtex: '@inproceedings{Schryen_Bodenstein_2010, title={A decision-theoretic foundation
    of IS business value research}, booktitle={Proceedings of the 18th European Conference
    on Information Systems (ECIS 2010)}, author={Schryen, Guido and Bodenstein, Christian},
    year={2010} }'
  chicago: Schryen, Guido, and Christian Bodenstein. “A Decision-Theoretic Foundation
    of IS Business Value Research.” In <i>Proceedings of the 18th European Conference
    on Information Systems (ECIS 2010)</i>, 2010.
  ieee: G. Schryen and C. Bodenstein, “A decision-theoretic foundation of IS business
    value research,” in <i>Proceedings of the 18th European Conference on Information
    Systems (ECIS 2010)</i>, 2010.
  mla: Schryen, Guido, and Christian Bodenstein. “A Decision-Theoretic Foundation
    of IS Business Value Research.” <i>Proceedings of the 18th European Conference
    on Information Systems (ECIS 2010)</i>, 2010.
  short: 'G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference
    on Information Systems (ECIS 2010), 2010.'
date_created: 2018-11-14T14:24:25Z
date_updated: 2022-01-06T07:02:14Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-11T15:24:22Z
  date_updated: 2018-12-13T15:20:37Z
  file_id: '6193'
  file_name: IS business value - ECIS - Final Version.pdf
  file_size: 174368
  relation: main_file
file_date_updated: 2018-12-13T15:20:37Z
has_accepted_license: '1'
keyword:
- Decision theory
- IT value
- IS assessment
- IS evaluation
language:
- iso: eng
oa: '1'
publication: Proceedings of the 18th European Conference on Information Systems (ECIS
  2010)
status: public
title: A decision-theoretic foundation of IS business value research
type: conference
user_id: '61579'
year: '2010'
...
