Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

104 Publications


2011 | Conference Paper | LibreCat-ID: 5684
Automated Negotiations Under Uncertain Preferences
F. Lang, G. Schryen, A. Fink, in: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5689
Reducing Datacenter Energy Usage through Efficient Job Allocation
C. Bodenstein, G. Schryen, D. Neumann, in: Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5598
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5632
A decision-theoretic foundation of IS business value research
G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5644
Preserving knowledge on IS business value: what literature reviews have done
G. Schryen, Business \& Information Systems Engineering (BISE) 52 (2010) 225–237.
LibreCat | Files available
 
 

2010 | Conference Paper | LibreCat-ID: 5690
From "Take-it-or-leave-it" offers to "Take-it-or-be-left-out" Ultimatum - A trade mechanism for Online Services
C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642
A Fuzzy Model for IT Security Investments
G. Schryen, in: F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, Gesellschaft für Informatik, Bonn, 2010, pp. 289–304.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5685
Applying heuristic methods for job scheduling in storage markets
J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631
Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question
G. Schryen, R. Eliot, in: 43rd Annual Hawaii International Conference on System Sciences, 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643
An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness
G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625
Open Source vs. Closed Source Software: Towards Measuring Security
G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621
Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland
G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646
A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors
G. Schryen, in: 5th International Conference on IT Security Incident Management \& IT Forensics, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647
Security of open source and closed source software: An empirical comparison of published vulnerabilities
G. Schryen, in: 15th Americas Conference on Information Systems, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5597
Elektronische Wahlen: Verifizierung vs. Zertifizierung
M. Volkamer, G. Schryen, L. Langer, A. Schmidt, J. Buchmann, in: Workshop Elektronische Wahlen, Elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649
Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia
G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
LibreCat | Files available
 

2008 | Journal Article | LibreCat-ID: 5648
Effektivität und Effizienz von Anti-Spam-Maßnahmen
G. Schryen, Linux Technical Review (2008).
LibreCat | Files available
 

2007 | Book | LibreCat-ID: 5651
Anti-Spam Measures: Analysis and Design
G. Schryen, Anti-Spam Measures: Analysis and Design, Springer, Berlin, Heidelberg, New York, 2007.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 5656
Location Based Services
G. Schryen, in: H. Schulte (Ed.), Vom LAN Zum Kommunikationsnetz - Systeme Und Applikationen, Interest-Verlag, Kissing, 2007.
LibreCat
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Export / Embed