Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
125 Publications
2011 | Conference Paper | LibreCat-ID: 5619 |

Schryen, G., Volkamer, M., & Ries, S. (2011). A formal approach towards measuring trust in distributed systems. In Proceedings of the 26th Annual ACM Symposium on Applied Computing.
LibreCat
| Files available
2011 | Journal Article | LibreCat-ID: 5640 |

Schryen, G. (2011). Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM), Vol. 54(No. 5), 130–139.
LibreCat
| Files available
2011 | Conference Paper | LibreCat-ID: 5641 |

Schryen, G. (2011). Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki.
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5685 |

Finkbeiner, J., Bodenstein, C., Schryen, G., & Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5690 |

Bodenstein, C., Schryen, G., & Neumann, D. (2010). From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5598 |

Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference.
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5631 |

Schryen, G., & Eliot, R. (2010). Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In 43rd Annual Hawaii International Conference on System Sciences.
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5632 |

Schryen, G., & Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In Proceedings of the 18th European Conference on Information Systems (ECIS 2010).
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5642 |

Schryen, G. (2010). A Fuzzy Model for IT Security Investments. In F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (Vol. 170, pp. 289–304). Bonn: Gesellschaft für Informatik.
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5643 |

Schryen, G. (2010). An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In Proceedings of the First Scandinavian Conference on Information Systems (SCIS).
LibreCat
| Files available
2010 | Journal Article | LibreCat-ID: 5644 |

Schryen, G. (2010). Preserving knowledge on IS business value: what literature reviews have done. Business \& Information Systems Engineering (BISE), 52(4), 225–237.
LibreCat
| Files available
2010 | Journal Article | LibreCat-ID: 5645 |

Schryen, G. (2010). Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik, 52(4), 225–237.
LibreCat
| Files available
2009 | Conference Paper | LibreCat-ID: 5597 |

Volkamer, M., Schryen, G., Langer, L., Schmidt, A., & Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung.
LibreCat
| Files available
2009 | Journal Article | LibreCat-ID: 5621 |

Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.
LibreCat
| Files available
2009 | Conference Paper | LibreCat-ID: 5625 |

Schryen, G., & Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In 24th Annual ACM Symposium on Applied Computing.
LibreCat
| Files available
2009 | Conference Paper | LibreCat-ID: 5646 |

Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In 5th International Conference on IT Security Incident Management \& IT Forensics.
LibreCat
| Files available
2009 | Conference Paper | LibreCat-ID: 5647 |

Schryen, G. (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities. In 15th Americas Conference on Information Systems.
LibreCat
| Files available
2008 | Journal Article | LibreCat-ID: 5648 |

Schryen, G. (2008). Effektivität und Effizienz von Anti-Spam-Maßnahmen. Linux Technical Review, (7).
LibreCat
| Files available
2008 | Conference Paper | LibreCat-ID: 5649 |

Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business).
LibreCat
| Files available
2007 | Report | LibreCat-ID: 6287 |

Schryen, G. (2007). Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework.
LibreCat
| Files available