Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

111 Publications


2016 | Journal Article | LibreCat-ID: 5617
Schryen, G., Wagner, G., & Schlegel, A. (2016). Development of two novel face-recognition CAPTCHAs: a security and usability study. Computers & Security, 60(July), 95–116.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5618
Schryen, G., Wagner, G., & Benlian, A. (2015). Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In International Conference on Information Systems (ICIS).
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 5622
Schryen, G., Rauchecker, G., & Comes, M. (2015). Resource Planning in Disaster Response - Decision Support Models and Methodologies. Business & Information Systems Engineering (BISE), 57(4), 243–259.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 5634
Schryen, G. (2015). Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research. Communications of the AIS, 37(Art 12), 286–325.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5588
Weishäupl, E., Yasasin, E., & Schryen, G. (2015). A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In International Conference on Information Systems.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5590
Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., & Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15).
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5678
Rauchecker, G., & Schryen, G. (2015). High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic. In Australasian Conference on Information Systems (pp. 1–13).
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5541
Yasasin, E., & Schryen, G. (2015). Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In 23rd European Conference on Information Systems (ECIS 2015).
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5589
Weishäupl, E., Yasasin, E., & Schryen, G. (2015). IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review. In 23rd European Conference on Information Systems (ECIS 2015).
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 5616
Schryen, G., & Weishäupl, E. (2015). IT-Sicherheit: Ökonomisch Planen und Bewerten. Managementkompass, (2), 17–18.
LibreCat | Files available
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed