Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

171 Publications


2010 | Conference Paper | LibreCat-ID: 5690 | OA
Bodenstein, C., Schryen, G., & Neumann, D. (2010). From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5598 | OA
Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631 | OA
Schryen, G., & Eliot, R. (2010). Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In 43rd Annual Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5632 | OA
Schryen, G., & Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In Proceedings of the 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642 | OA
Schryen, G. (2010). A Fuzzy Model for IT Security Investments. In F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (Vol. 170, pp. 289–304). Bonn: Gesellschaft für Informatik.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643 | OA
Schryen, G. (2010). An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In Proceedings of the First Scandinavian Conference on Information Systems (SCIS).
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5644 | OA
Schryen, G. (2010). Preserving knowledge on IS business value: what literature reviews have done. Business \& Information Systems Engineering (BISE), 52(4), 225–237.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5645 | OA
Schryen, G. (2010). Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik, 52(4), 225–237.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5597 | OA
Volkamer, M., Schryen, G., Langer, L., Schmidt, A., & Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621 | OA
Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625 | OA
Schryen, G., & Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In 24th Annual ACM Symposium on Applied Computing.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646 | OA
Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In 5th International Conference on IT Security Incident Management \& IT Forensics.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647 | OA
Schryen, G. (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities. In 15th Americas Conference on Information Systems.
LibreCat | Files available
 

2008 | Journal Article | LibreCat-ID: 5648 | OA
Schryen, G. (2008). Effektivität und Effizienz von Anti-Spam-Maßnahmen. Linux Technical Review, (7).
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649 | OA
Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business).
LibreCat | Files available
 

2007 | Report | LibreCat-ID: 6287 | OA
Schryen, G. (2007). Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework.
LibreCat | Files available
 

2007 | Book Chapter | LibreCat-ID: 5650
Schryen, G. (2007). A Scalable and Flexible Infrastructure Framework For Addressing Spam. In D. Satesh & R. Prabhakar (Eds.), Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research (pp. 55–64). Hyderabad, India: ICFAI University Press.
LibreCat
 

2007 | Book | LibreCat-ID: 5651
Schryen, G. (2007). Anti-Spam Measures: Analysis and Design. Berlin, Heidelberg, New York: Springer.
LibreCat
 

2007 | Journal Article | LibreCat-ID: 5652 | OA
Schryen, G. (2007). Anti-spam legislation: An analysis of laws and their effectiveness. Information and Communications Technology Law, 16(1), 17–32.
LibreCat | Files available
 

2007 | Book Chapter | LibreCat-ID: 5653
Schryen, G. (2007). Approaches Addressing Spam. In D. Satesh & R. Prabhakar (Eds.), Spam: An Introduction (pp. 41–57). Hyderabad, India: ICFAI University Press.
LibreCat
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed