Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

104 Publications


2011 | Conference Paper | LibreCat-ID: 5684
Lang, F., Schryen, G., & Fink, A. (2011). Automated Negotiations Under Uncertain Preferences. In Proceedings of the 2011 International Conference on Information Systems (ICIS 2011).
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5689
Bodenstein, C., Schryen, G., & Neumann, D. (2011). Reducing Datacenter Energy Usage through Efficient Job Allocation. In Proceedings of the 19th European Conference on Information Systems (ECIS 2011).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5598
Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5632
Schryen, G., & Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In Proceedings of the 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5644
Schryen, G. (2010). Preserving knowledge on IS business value: what literature reviews have done. Business \& Information Systems Engineering (BISE), 52(4), 225–237.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5645
Schryen, G. (2010). Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik, 52(4), 225–237.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5690
Bodenstein, C., Schryen, G., & Neumann, D. (2010). From “Take-it-or-leave-it” offers to “Take-it-or-be-left-out” Ultimatum - A trade mechanism for Online Services. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642
Schryen, G. (2010). A Fuzzy Model for IT Security Investments. In F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin (Vol. 170, pp. 289–304). Bonn: Gesellschaft für Informatik.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5685
Finkbeiner, J., Bodenstein, C., Schryen, G., & Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631
Schryen, G., & Eliot, R. (2010). Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In 43rd Annual Hawaii International Conference on System Sciences.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643
Schryen, G. (2010). An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In Proceedings of the First Scandinavian Conference on Information Systems (SCIS).
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625
Schryen, G., & Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In 24th Annual ACM Symposium on Applied Computing.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621
Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646
Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In 5th International Conference on IT Security Incident Management \& IT Forensics.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647
Schryen, G. (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities. In 15th Americas Conference on Information Systems.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5597
Volkamer, M., Schryen, G., Langer, L., Schmidt, A., & Buchmann, J. (2009). Elektronische Wahlen: Verifizierung vs. Zertifizierung. In Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung.
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649
Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business).
LibreCat | Files available
 

2008 | Journal Article | LibreCat-ID: 5648
Schryen, G. (2008). Effektivität und Effizienz von Anti-Spam-Maßnahmen. Linux Technical Review, (7).
LibreCat | Files available
 

2007 | Book | LibreCat-ID: 5651
Schryen, G. (2007). Anti-Spam Measures: Analysis and Design. Berlin, Heidelberg, New York: Springer.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 5656
Schryen, G. (2007). Location Based Services. In H. Schulte (Ed.), Vom LAN zum Kommunikationsnetz - Systeme und Applikationen. Kissing: Interest-Verlag.
LibreCat
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed