@article{61463,
  abstract     = {{Vernetztes Wissen ist ein zentrales Lernziel des Hochschulstudiums, insbesondere im interdisziplinär angelegten Studienfach Komparatistik. Um den Aufbau vernetzten Wissens bei Bachelorstudierenden der Komparatistik zu unterstützen, ist in diesem Projekt Portfolioarbeit eingesetzt worden, die als Methode selbsttätigen und selbstreflexiven Lernens geeignet erscheint, zur Auseinandersetzung mit Lerninhalten zu motivieren und zur Kompetenzentwicklung der Studierenden beizutragen. Mittels unstrukturierter Beobachtungen der Portfolioarbeit im Seminar sind inhaltliche Effekte und methodische Entwicklungen erfasst worden. Anhand anteilig quantitativer, überwiegend qualitativer Inhaltsanalysen der Portfolios sind konkrete Vernetzungen zwischen Lerninhalten ermittelt worden. Die Explorationsstudie zeigt veränderte Perspektiven und geweckte Interessen bei den Studierenden durch die Portfolioarbeit sowie vielfältige Kontextualisierungen, Vergleiche und Verknüpfungen in den Portfolios auf und bietet hierdurch einen möglichen Ansatzpunkt für strukturelle Empfehlungen für das Studienfach Komparatistik.}},
  author       = {{Hannebohm, Ronja}},
  issn         = {{2199–8825}},
  journal      = {{die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre}},
  keywords     = {{Portfolioarbeit, portfolio work, vernetztes Wissen, knowledge networks, Beobachtung, naturalistic observation, Inhaltsanalyse, content analysis}},
  pages        = {{65--80}},
  publisher    = {{wbv}},
  title        = {{{Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft}}},
  doi          = {{10.3278/HSL2606W}},
  volume       = {{12}},
  year         = {{2026}},
}

@inbook{58822,
  abstract     = {{In 1921, John Wisdom (1904–1993) became a member of Fitzwilliam House, Cambridge, where he read philosophy and attended lectures by G. E. Moore, C. D. Broad, and J. E. McTaggart. He received his BA in 1924, after which he worked for five years at the National Institute of Industrial Psychology. From 1929 to 1934, Wisdom was a Lecturer in the department of logic and metaphysics at the University of St Andrews and a colleague of G. F. Stout. After the publication of his book Interpretation and Analysis (1931) and five articles on “Logical Constructions” in Mind (1931–3), Wisdom became a Lecturer in Moral Sciences in Cambridge and a Fellow of Trinity College. This gave him the opportunity to gain first-hand knowledge of Wittgenstein’s philosophy. Since nothing by Wittgenstein but Tractatus appeared in print for decades, Wisdom’s publications of these years were—mistakenly—read as portents of the new ideas of Wittgenstein himself. The publication of Wittgenstein’s Philosophical Investigations in 1953 brought with it, among other things, the fall of Wisdom’s popularity. }},
  author       = {{Milkov, Nikolay}},
  booktitle    = {{Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II}},
  editor       = {{Khani , Ali Hossein  and Kemp , Gary }},
  keywords     = {{elucidation, facts, Frege, language, metaphysics, G. E. Moore, Russell, Stebbing, John Wisdom, Wittgenstein}},
  publisher    = {{Routledge}},
  title        = {{{Wisdom's Wittgenstein}}},
  year         = {{2025}},
}

@inbook{58821,
  abstract     = {{Susan Stebbing wrote only once on Wittgenstein, in her paper ‘Logical Positivism and Analysis’ (1933). The paper was unusually critical of Wittgenstein. It put the Cambridge analytic philosophy of Moore and Russell in a sharp opposition to the positivist philosophy of the Vienna Circle, in which Stebbing included Wittgenstein. Whereas the positivists were interested in analysing language, the Cambridge realists were analysing facts. To be more explicit, the analytic philosophers were engaged in directional analysis, which seeks to illuminate (to elucidate) the multiplicity of the analysed facts. In contrast, positivists aimed at a final analysis that proves that there are simples. Stebbing’s sympathies were clearly on the side of the Cambridge realists. The important implication of Stebbing’s paper was that it urged Wittgenstein to change the style of his philosophy, abandoning those points which allegedly connected him with the Vienna Circle.}},
  author       = {{Milkov, Nikolay}},
  booktitle    = {{Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II}},
  editor       = {{Khani , Ali Hossein  and Kemp , Gary }},
  keywords     = {{directional analysis, elucidation, facts, metaphysics, G. E. Moore, Russell, Stebbing, John Wisdom, Wittgenstein}},
  publisher    = {{Routledge}},
  title        = {{{Stebbing's Wittgenstein}}},
  year         = {{2025}},
}

@article{33299,
  abstract     = {{The aim of this study was to find out whether teaching how to search for literature
would be more beneficial to students and teachers if done online through short videos
rather than in person during course time. To find out whether online videos are more
beneficial, two courses were asked to fill in questionnaires, one at the beginning and
one at the end of the semester. One of the courses received the input online via videos
and were given an exercise to put the newly learned skills to use, the other course
served as a control group and learned how to search for literature during the course.
The results show that while the difference between the two groups is not significant,
the videos can still be regarded as being more beneficial than teaching the necessary
skills during course time.}},
  author       = {{Hahn, Charlotte Anna}},
  issn         = {{ISSN 2199-8825}},
  journal      = {{die hochschullehre}},
  keywords     = {{E-Learning, information competence, literature, library, research}},
  number       = {{6}},
  title        = {{{Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen}}},
  year         = {{2020}},
}

@article{4562,
  abstract     = {{Employing main and sector-specific investment-grade CDS indices from the North American and European CDS market and performing mean-variance out-of-sample analyses for conservative and aggressive investors over the period from 2006 to 2014, this paper analyzes portfolio benefits of adding corporate CDS indices to a traditional financial portfolio consisting of stock and sovereign bond indices. As a baseline result, we initially find an increase in portfolio (downside) risk-diversification when adding CDS indices, which is observed irrespective of both CDS markets, investor-types and different sub-periods, including the global financial crisis and European sovereign debt crisis. In addition, the analysis reveals higher portfolio excess returns and performance in CDS index portfolios, however, these effects clearly differ between markets, investor-types and sub-periods. Overall, portfolio benefits of adding CDS indices mainly result from the fact that institutional investors replace sovereign bond indices rather than stock indices by CDS indices due to better risk-return characteristics. Our baseline findings remain robust under a variety of robustness checks. Results from sensitivity analyses provide further important implications for institutional investors with a strategic focus on a long-term conservative portfolio management.}},
  author       = {{Hippert, Benjamin and Uhde, André and Wengerek, Sascha Tobias}},
  journal      = {{Review of Derivatives Research }},
  keywords     = {{Corporate credit default swap indices, Mean-variance asset allocation, Out-of-sample portfolio optimization, Portfolio risk-diversification, Portfolio performance evaluation}},
  number       = {{2}},
  pages        = {{203--259}},
  title        = {{{Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe}}},
  doi          = {{https://doi.org/10.1007/s11147-018-9148-8}},
  volume       = {{22}},
  year         = {{2019}},
}

@article{5671,
  abstract     = {{Multi-attribute value theory (MAVT)-based recommender systems have been proposed for dealing with issues of existing recommender systems, such as the cold-start problem and changing preferences. However, as we argue in this paper, existing MAVT-based methods for measuring attribute importance weights do not fit the shopping tasks for which recommender systems are typically used. These methods assume well-trained decision makers who are willing to invest time and cognitive effort, and who are familiar with the attributes describing the available alternatives and the ranges of these attribute levels. Yet, recommender systems are most often used by consumers who are usually not familiar with the available attributes and ranges and who wish to save time and effort. Against this background, we develop a new method, based on a product configuration process, which is tailored to the characteristics of these particular decision makers. We empirically compare our method to SWING, ranking-based conjoint analysis and TRADEOFF in a between-subjects laboratory experiment with 153 participants. Results indicate that our proposed method performs better than TRADEOFF and CONJOINT and at least as well as SWING in terms of recommendation accuracy, better than SWING and TRADEOFF and at least as well as CONJOINT in terms of cognitive load, and that participants were faster with our method than with any other method. We conclude that our method is a promising option to help support consumers' decision processes in e-commerce shopping tasks.}},
  author       = {{Scholz, Michael and Dorner, Verena and Schryen, Guido and Benlian, Alexander}},
  journal      = {{European Journal of Operational Research}},
  keywords     = {{E-Commerce, Recommender System, Attribute Weights, Configuration System, Decision Support}},
  number       = {{1}},
  pages        = {{205 -- 215}},
  publisher    = {{Elsevier}},
  title        = {{{A configuration-based recommender system for supporting e-commerce decisions}}},
  volume       = {{259}},
  year         = {{2017}},
}

@article{48462,
  abstract     = {{Über das Lehramtsstudium sollen Studierende unter anderem dazu befähigt werden, die Leistung ihrer Schüler/innenzu bewerten. Dazu müssen sie Einflussfaktoren auf Schulleistung kennen und diese richtig diagnostizieren und fördern können. Mit diesem Beitrag wird eine game-und E-Learning-gestützte Lernumgebung vorgestellt, in der Studierende –anders als in vielen inputorientierten Seminarkonzepten –in einem virtuellen Klassenzimmer an realitätsnahen Fällen lernen,problembasiert zu diagnostizieren und zu fördern. Über denEinsatz der Lernumgebung in der Lehre wird berichtet, erste Rückmeldungen von Lehrenden und Studierenden werden erläutert und weitere Planungsschritte dargestellt. }},
  author       = {{Praetorius, Saskia and Al-Kabbani, Daniel and Bohndick, Carla and Hilkenmeier, Johanna and König, Sebastian T. and Müsche, Hannah S. and Sommer, Sabrina and Klingsieck, Katrin B.}},
  journal      = {{Zeitschrift für Hochschulentwicklung}},
  keywords     = {{E-Learning, digitale Medien, problembasiertes Lernen, Lehrerbildung, Diagnostik}},
  number       = {{3}},
  pages        = {{213--245}},
  title        = {{{Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. }}},
  volume       = {{11}},
  year         = {{2016}},
}

@article{5704,
  abstract     = {{Advancements in information technology have changed the way customers experience a service encounter and their relationship with service providers. Especially technology-based self-service channels have found their way into the 21st century service economy. While research embraces these channels for their cost-efficiency, it has not examined whether a shift from personal to self-service affects customer–firm relationships. Drawing from the service-dominant logic and its central concept of value-in-context, we discuss customers’ value creation in self-service and personal service channels and examine the long-term impact of these channels on customer retention. Using longitudinal customer data, we investigate how the ratio of self-service versus personal service use influences customer defection over time. Our findings suggest that the ratio of self-service to personal service used affects customer defection in a U-shaped manner, with intermediate levels of both self-service and personal service use being associated with the lowest likelihood of defection. We also find that this effect mitigates over time. We conclude that firms should not shift customers toward self-service channels completely, especially not at the beginning of a relationship. Our study underlines the importance of understanding when and how self-service technologies create valuable customer experiences and stresses the notion of actively managing customers’ cocreation of value. }},
  author       = {{Scherer, Anne and Wünderlich, Nancy and Von Wangenheim, Florian}},
  issn         = {{0276-7783.}},
  journal      = {{MIS Quarterly}},
  keywords     = {{customer defection, customer retention, e-service, longitudinal, Self-service, value-in-context}},
  number       = {{1}},
  pages        = {{177--200}},
  publisher    = {{MIS RC}},
  title        = {{{The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.}}},
  volume       = {{39}},
  year         = {{2015}},
}

@article{4428,
  abstract     = {{Die Auseinandersetzung mit Bildungstechnologien erfolgt häufig ausgehend von einem technologischen Trend bzw. einer Klasse innovativer Werkzeuge (bspw. mobile Technologien). Es geht dann darum, die Potenziale dieser Tools für das Lernen zu ergründen, also letztlich eine Passung zwischen den technologischen Möglichkeiten und pädagogisch-didaktischen Erfordernissen zu konstruieren. In diesem Beitrag kehren wir diese Perspektive um: Ausgehend von einer bestimmten pädagogischen Problemstellung - der Bearbeitung heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung - entwickeln wir unterschiedliche didaktische Handlungsoptionen. Am Ende entsteht ein Werkzeug, das sich in Design und Funktionsumfang auf den Kern der pädagogischen Zielsetzung beschränkt.}},
  author       = {{Jenert, Tobias and Brahm, Taiga}},
  issn         = {{1681-7028}},
  journal      = {{Journal für LehrerInnenbildung}},
  keywords     = {{Portfolio, Lehrerbildung, Wirtschaftspädagogik}},
  number       = {{4}},
  pages        = {{29--33}},
  publisher    = {{Studien-Verlag}},
  title        = {{{Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung}}},
  volume       = {{13}},
  year         = {{2013}},
}

@phdthesis{24036,
  author       = {{Pottebaum, Jens}},
  isbn         = {{3-86991-525-0}},
  keywords     = {{Arbeitsorganisation, E-Learning, Lernorganisation, Lerntechnik, Wissensmanagement}},
  publisher    = {{Monsenstein und Vannerdat}},
  title        = {{{Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation}}},
  year         = {{2012}},
}

@article{4430,
  abstract     = {{Eine zentrale Herausforderung in der Ausbildung angehender Wirtschaftslehrpersonen stellt die sinnvolle Verknüpfung von Theorie- und Praxiserfahrungen dar. Im Rahmen der Ausbildung angehender Wirtschaftslehrpersonen an der Universität St. Gallen wird eine Lernumgebung gestaltet, die eine Verschränkung von Theorie- und Praxiserfahrungen ermöglichen soll. Die Lernprozesse der Studierenden werden dabei durch didaktisch angeleitete Weblogarbeit unterstützt. Trotz der Lernchancen, die sich aus einer Verknüpfung von theoretischen und praktischen Lernphasen ergeben, schätzen die Studierenden den Nutzen der Weblogarbeit als äusserst gering ein. Die Studierenden bei der reflexiven Integration praxisnaher und theoretischer Lernerfahrungen zu unterstützen, ist eine Herausforderung, die dezidierter Anleitung und Förderung durch die Lehrpersonen bedarf}},
  author       = {{Jenert, Tobias and Gebhardt, Anja and Käser, Reto}},
  issn         = {{1992-9579}},
  journal      = {{Zeitschrift für E-Learning}},
  keywords     = {{Weblog, Blog, e-learning, TEL, higher education, business education}},
  number       = {{2}},
  pages        = {{17--29}},
  publisher    = {{Studien-Verlag}},
  title        = {{{Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung}}},
  volume       = {{6}},
  year         = {{2011}},
}

@article{5621,
  abstract     = {{Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence.}},
  author       = {{Schryen, Guido and Rich, Eliot}},
  journal      = {{IEEE Transactions on Information Forensics \& Security}},
  keywords     = {{e-voting, Internet voting, Internet election, security, verifiability, RIES, Estonia, Neuch{\^a}tel}},
  number       = {{4 Part}},
  pages        = {{729--744}},
  publisher    = {{IEEE}},
  title        = {{{Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}}},
  volume       = {{4}},
  year         = {{2009}},
}

@inproceedings{4494,
  author       = {{Sporer, Thomas and Jenert, Tobias and Strehl, Bernhard and Noack, Patrick Ole}},
  booktitle    = {{DeLFI Workshops}},
  keywords     = {{E-Portfolios, Lerngemeinschaften, Praxisgemeinschaften, Projektgruppen, Hochschulstudium, informelles Lernen}},
  location     = {{Siegen}},
  pages        = {{19----26}},
  publisher    = {{Logos Verlag}},
  title        = {{{Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}}},
  year         = {{2007}},
}

@inproceedings{4497,
  author       = {{Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi}},
  keywords     = {{Problem Solving Competencies, E-Portfolio}},
  location     = {{Kreta }},
  title        = {{{Student Learning Communities in the Project-Centered Study Program" Problem-Solving Competencies"}}},
  year         = {{2007}},
}

@article{5655,
  abstract     = {{Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.}},
  author       = {{Schryen, Guido}},
  journal      = {{The Journal of Information Systems Security (AIS Special Interest Group in Security)}},
  keywords     = {{e-mail, spam, e-mail infrastructure, anti-spam measures, spamming options}},
  number       = {{2}},
  pages        = {{66--90}},
  title        = {{{Do anti-spam measures effectively cover the e-mail communication network? A formal approach}}},
  volume       = {{3}},
  year         = {{2007}},
}

@inproceedings{5661,
  abstract     = {{Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the 6th IEEE Information Assurance Workshop}},
  keywords     = {{Spam, ham, e-mail, honeypot, address obscuring technique, address taxonomy}},
  pages        = {{37--41}},
  publisher    = {{Westpoint}},
  title        = {{{An e-mail honeypot addressing spammers' behavior in collecting and applying addresses}}},
  year         = {{2005}},
}

@article{5662,
  abstract     = {{Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam.}},
  author       = {{Schryen, Guido}},
  journal      = {{Wirtschaftsinformatik}},
  keywords     = {{Spam, E-Mail, Spoofing, Blockieren, Filtern, Lightweight Mail Transfer Agent Authentication Protocol (LMAP)}},
  number       = {{4}},
  pages        = {{281--288}},
  publisher    = {{Springer}},
  title        = {{{Effektivität von Lösungsansätzen zur Bekämpfung von Spam}}},
  volume       = {{46}},
  year         = {{2004}},
}

@inproceedings{5663,
  abstract     = {{Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}},
  editor       = {{Isaias, Pedro}},
  keywords     = {{e-mail, spam, filtering, blocking, LMAP, SMTP account}},
  pages        = {{937--940}},
  publisher    = {{IADIS Press}},
  title        = {{{Fighting Spam: Motivating an Account-based Approach}}},
  year         = {{2004}},
}

@inbook{5667,
  abstract     = {{Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}},
  keywords     = {{Internet Voting, Online polls, E-Democracy, Security}},
  pages        = {{1017--1021}},
  publisher    = {{IADIS Press}},
  title        = {{{E-Democracy: Internet Voting}}},
  year         = {{2003}},
}

@inproceedings{5668,
  abstract     = {{Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{6. Internationale Tagung Wirtschaftsinformatik}},
  keywords     = {{Internet-Wahlen, E-Democracy, Sicherheit, Kryptographie}},
  pages        = {{937--956}},
  title        = {{{Internet-Wahlen}}},
  year         = {{2003}},
}

