Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
325 Publications
2011 | Conference Paper | LibreCat-ID: 5619 |

A formal approach towards measuring trust in distributed systems
G. Schryen, M. Volkamer, S. Ries, in: Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.
LibreCat
| Files available
G. Schryen, M. Volkamer, S. Ries, in: Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.
2011 | Journal Article | LibreCat-ID: 5640 |

Is open source security a myth? What do vulnerability and patch data say?
G. Schryen, Communications of the ACM (CACM) Vol. 54 (2011) 130–139.
LibreCat
| Files available
G. Schryen, Communications of the ACM (CACM) Vol. 54 (2011) 130–139.
2011 | Conference Paper | LibreCat-ID: 5641 |

Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation
G. Schryen, in: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.
LibreCat
| Files available
G. Schryen, in: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.
2010 | Conference Paper | LibreCat-ID: 5685 |

Applying heuristic methods for job scheduling in storage markets
J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat
| Files available
J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
2010 | Conference Paper | LibreCat-ID: 5690 |

From "Take-it-or-leave-it" offers to "Take-it-or-be-left-out" Ultimatum - A trade mechanism for Online Services
C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat
| Files available
C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
2010 | Conference Paper | LibreCat-ID: 5598 |

Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.
LibreCat
| Files available
M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.
2010 | Conference Paper | LibreCat-ID: 5631 |

Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question
G. Schryen, R. Eliot, in: 43rd Annual Hawaii International Conference on System Sciences, 2010.
LibreCat
| Files available
G. Schryen, R. Eliot, in: 43rd Annual Hawaii International Conference on System Sciences, 2010.
2010 | Conference Paper | LibreCat-ID: 5632 |

A decision-theoretic foundation of IS business value research
G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat
| Files available
G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.
2010 | Conference Paper | LibreCat-ID: 5642 |

A Fuzzy Model for IT Security Investments
G. Schryen, in: F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, Gesellschaft für Informatik, Bonn, 2010, pp. 289–304.
LibreCat
| Files available
G. Schryen, in: F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, Gesellschaft für Informatik, Bonn, 2010, pp. 289–304.
2010 | Conference Paper | LibreCat-ID: 5643 |

An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness
G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.
LibreCat
| Files available
G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.
2010 | Journal Article | LibreCat-ID: 5644 |

Preserving knowledge on IS business value: what literature reviews have done
G. Schryen, Business \& Information Systems Engineering (BISE) 52 (2010) 225–237.
LibreCat
| Files available
G. Schryen, Business \& Information Systems Engineering (BISE) 52 (2010) 225–237.
2010 | Journal Article | LibreCat-ID: 5645 |

Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done)
G. Schryen, Wirtschaftsinformatik 52 (2010) 225–237.
LibreCat
| Files available
G. Schryen, Wirtschaftsinformatik 52 (2010) 225–237.
2009 | Conference Paper | LibreCat-ID: 5597 |

Elektronische Wahlen: Verifizierung vs. Zertifizierung
M. Volkamer, G. Schryen, L. Langer, A. Schmidt, J. Buchmann, in: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.
LibreCat
| Files available
M. Volkamer, G. Schryen, L. Langer, A. Schmidt, J. Buchmann, in: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.
2009 | Journal Article | LibreCat-ID: 5621 |

Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland
G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744.
LibreCat
| Files available
G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744.
2009 | Conference Paper | LibreCat-ID: 5625 |

Open Source vs. Closed Source Software: Towards Measuring Security
G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat
| Files available
G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.
2009 | Conference Paper | LibreCat-ID: 5646 |

A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors
G. Schryen, in: 5th International Conference on IT Security Incident Management \& IT Forensics, 2009.
LibreCat
| Files available
G. Schryen, in: 5th International Conference on IT Security Incident Management \& IT Forensics, 2009.
2009 | Conference Paper | LibreCat-ID: 5647 |

Security of open source and closed source software: An empirical comparison of published vulnerabilities
G. Schryen, in: 15th Americas Conference on Information Systems, 2009.
LibreCat
| Files available
G. Schryen, in: 15th Americas Conference on Information Systems, 2009.
2008 | Journal Article | LibreCat-ID: 5648 |

Effektivität und Effizienz von Anti-Spam-Maßnahmen
G. Schryen, Linux Technical Review (2008).
LibreCat
| Files available
G. Schryen, Linux Technical Review (2008).
2008 | Conference Paper | LibreCat-ID: 5649 |

Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia
G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
LibreCat
| Files available
G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
2007 | Report | LibreCat-ID: 6287 |

Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework
G. Schryen, Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework, 2007.
LibreCat
| Files available
G. Schryen, Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework, 2007.