Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

110 Publications


2010 | Conference Paper | LibreCat-ID: 5598
Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: Proceedings of the 23rd Bled EConference. ; 2010.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5645
Schryen G. Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik. 2010;52(4):225-237.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5690
Bodenstein C, Schryen G, Neumann D. From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In: 18th European Conference on Information Systems (ECIS 2010). ; 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642
Schryen G. A Fuzzy Model for IT Security Investments. In: C. Freiling F, ed. Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin. Vol 170. GI-Edition: lecture notes in informatics. Proceedings. Bonn: Gesellschaft für Informatik; 2010:289-304.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5685
Finkbeiner J, Bodenstein C, Schryen G, Neumann D. Applying heuristic methods for job scheduling in storage markets. In: 18th European Conference on Information Systems (ECIS 2010). ; 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631
Schryen G, Eliot R. Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In: 43rd Annual Hawaii International Conference on System Sciences. ; 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643
Schryen G. An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In: Proceedings of the First Scandinavian Conference on Information Systems (SCIS). ; 2010.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625
Schryen G, Kadura R. Open Source vs. Closed Source Software: Towards Measuring Security. In: 24th Annual ACM Symposium on Applied Computing. ; 2009.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621
Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security. 2009;4(4 Part):729-744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646
Schryen G. A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: 5th International Conference on IT Security Incident Management \& IT Forensics. ; 2009.
LibreCat | Files available
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed