Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

128 Publications


2013 | Conference Paper | LibreCat-ID: 5576 | OA
Wex, F., Schryen, G., & Neumann, D. (2013). Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In Proceedings of the 46th Hawaii International Conference on System Science.
LibreCat | Files available
 

2013 | Journal Article | LibreCat-ID: 5637 | OA
Schryen, G. (2013). Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS), 22(2), 139–169.
LibreCat | Files available
 

2012 | Conference Paper | LibreCat-ID: 5680 | OA
Püschel, T., Schryen, G., Hristova, D., & Neumann, D. (2012). Cloud Service Revenue Management. In European Conference on Information Systems.
LibreCat | Files available
 

2012 | Conference Paper | LibreCat-ID: 5683
Lang, F., Schryen, G., & Fink, A. (2012). Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study. In International Conference on Information Systems.
LibreCat
 

2012 | Journal Article | LibreCat-ID: 5688 | OA
Bodenstein, C., Schryen, G., & Neumann, D. (2012). Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers. European Journal of Operational Research : EJOR, 222(1), 157–167.
LibreCat | Files available
 

2012 | Journal Article | LibreCat-ID: 5578 | OA
Wex, F., Schryen, G., & Neumann, D. (2012). A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty. International Journal of Information Systems for Crisis Response and Management, 4(3), 23–41.
LibreCat | Files available
 

2012 | Conference Paper | LibreCat-ID: 5579 | OA
Wex, F., Schryen, G., & Neumann, D. (2012). Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012.
LibreCat | Files available
 

2012 | Conference Paper | LibreCat-ID: 5615 | OA
Schryen, G., & Wex, F. (2012). IS Design Thinking in Disaster Management Research. In 45th Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2012 | Journal Article | LibreCat-ID: 5638 | OA
Schryen, G. (2012). Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften - woran hakt es?, in: Die Zeit (12.04.2012). Die Zeit.
LibreCat | Files available
 

2012 | Journal Article | LibreCat-ID: 5639 | OA
Schryen, G. (2012). Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear. IM Information Management & Consulting.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5684 | OA
Lang, F., Schryen, G., & Fink, A. (2011). Automated Negotiations Under Uncertain Preferences. In Proceedings of the 2011 International Conference on Information Systems (ICIS 2011).
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5689 | OA
Bodenstein, C., Schryen, G., & Neumann, D. (2011). Reducing Datacenter Energy Usage through Efficient Job Allocation. In Proceedings of the 19th European Conference on Information Systems (ECIS 2011).
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5581 | OA
Wex, F., Schryen, G., & Neumann, D. (2011). Intelligent Decision Support for Centralized Coordination during Emergency Response. In Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011).
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5619 | OA
Schryen, G., Volkamer, M., & Ries, S. (2011). A formal approach towards measuring trust in distributed systems. In Proceedings of the 26th Annual ACM Symposium on Applied Computing.
LibreCat | Files available
 

2011 | Journal Article | LibreCat-ID: 5640 | OA
Schryen, G. (2011). Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM), Vol. 54(No. 5), 130–139.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5641 | OA
Schryen, G. (2011). Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5685 | OA
Finkbeiner, J., Bodenstein, C., Schryen, G., & Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5690 | OA
Bodenstein, C., Schryen, G., & Neumann, D. (2010). From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5598 | OA
Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631 | OA
Schryen, G., & Eliot, R. (2010). Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In 43rd Annual Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5632 | OA
Schryen, G., & Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In Proceedings of the 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642 | OA
Schryen, G. (2010). A Fuzzy Model for IT Security Investments. In F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (Vol. 170, pp. 289–304). Bonn: Gesellschaft für Informatik.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643 | OA
Schryen, G. (2010). An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In Proceedings of the First Scandinavian Conference on Information Systems (SCIS).
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5644 | OA
Schryen, G. (2010). Preserving knowledge on IS business value: what literature reviews have done. Business \& Information Systems Engineering (BISE), 52(4), 225–237.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5645 | OA
Schryen, G. (2010). Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik, 52(4), 225–237.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5597 | OA
Volkamer, M., Schryen, G., Langer, L., Schmidt, A., & Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621 | OA
Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625 | OA
Schryen, G., & Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In 24th Annual ACM Symposium on Applied Computing.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646 | OA
Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In 5th International Conference on IT Security Incident Management \& IT Forensics.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647 | OA
Schryen, G. (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities. In 15th Americas Conference on Information Systems.
LibreCat | Files available
 

2008 | Journal Article | LibreCat-ID: 5648 | OA
Schryen, G. (2008). Effektivität und Effizienz von Anti-Spam-Maßnahmen. Linux Technical Review, (7).
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649 | OA
Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business).
LibreCat | Files available
 

2007 | Report | LibreCat-ID: 6287 | OA
Schryen, G. (2007). Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework.
LibreCat | Files available
 

2007 | Book Chapter | LibreCat-ID: 5650
Schryen, G. (2007). A Scalable and Flexible Infrastructure Framework For Addressing Spam. In D. Satesh & R. Prabhakar (Eds.), Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research (pp. 55–64). Hyderabad, India: ICFAI University Press.
LibreCat
 

2007 | Book | LibreCat-ID: 5651
Schryen, G. (2007). Anti-Spam Measures: Analysis and Design. Berlin, Heidelberg, New York: Springer.
LibreCat
 

2007 | Journal Article | LibreCat-ID: 5652 | OA
Schryen, G. (2007). Anti-spam legislation: An analysis of laws and their effectiveness. Information and Communications Technology Law, 16(1), 17–32.
LibreCat | Files available
 

2007 | Book Chapter | LibreCat-ID: 5653
Schryen, G. (2007). Approaches Addressing Spam. In D. Satesh & R. Prabhakar (Eds.), Spam: An Introduction (pp. 41–57). Hyderabad, India: ICFAI University Press.
LibreCat
 

2007 | Conference Paper | LibreCat-ID: 5654 | OA
Schryen, G. (2007). Armed for the spam battle - a technological and organizational infrastructure framework. In 40th Annual Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2007 | Journal Article | LibreCat-ID: 5655 | OA
Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security), 3(2), 66–90.
LibreCat | Files available
 

2007 | Book Chapter | LibreCat-ID: 5656
Schryen, G. (2007). Location Based Services. In H. Schulte (Ed.), Vom LAN zum Kommunikationsnetz - Systeme und Applikationen. Kissing: Interest-Verlag.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 5657
Schryen, G. (2007). Spam-Emails. In H. Schulte (Ed.), Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Edition 02/2007 (Vol. 9/12). Kissing: Interest-Verlag.
LibreCat
 

2007 | Journal Article | LibreCat-ID: 5658 | OA
Schryen, G. (2007). The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis. Computers & Security, 2(5), 361–372.
LibreCat | Files available
 

2006 | Conference Paper | LibreCat-ID: 5659 | OA
Schryen, G. (2006). A formal approach towards assessing the effectiveness of anti-spam procedures. In 39th Annual Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2005 | Journal Article | LibreCat-ID: 5660 | OA
Schryen, G. (2005). A honeypot for the exploration of spammers’ behaviour. IATAC IAnewsletter, 8(3), 22–25.
LibreCat | Files available
 

2005 | Conference Paper | LibreCat-ID: 5661 | OA
Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In Proceedings of the 6th IEEE Information Assurance Workshop (pp. 37–41). Westpoint.
LibreCat | Files available
 

2004 | Conference Paper | LibreCat-ID: 5765 | OA
Schryen, G. (2004). Security Aspects of Internet Voting. In 37th Annual Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2004 | Journal Article | LibreCat-ID: 5662 | OA
Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam. Wirtschaftsinformatik, 46(4), 281–288.
LibreCat | Files available
 

2004 | Conference Paper | LibreCat-ID: 5663 | OA
Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In P. Isaias (Ed.), Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2 (pp. 937–940). Madrid: IADIS Press.
LibreCat | Files available
 

2004 | Conference Paper | LibreCat-ID: 5664 | OA
Schryen, G. (2004). How Security Problems Can Compromise Remote Internet Voting Systems. In Workshop of the ESF TED Programme (pp. 121–131).
LibreCat | Files available
 

2004 | Book Chapter | LibreCat-ID: 5666 | OA
Schryen, G. (2004). Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz? In G. Gehrke (Ed.), Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung (pp. 45–51). München: KOPAED-Verlag.
LibreCat | Files available
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed