Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

104 Publications


2011 | Conference Paper | LibreCat-ID: 5684
F. Lang, G. Schryen, and A. Fink, “Automated Negotiations Under Uncertain Preferences,” in Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5689
C. Bodenstein, G. Schryen, and D. Neumann, “Reducing Datacenter Energy Usage through Efficient Job Allocation,” in Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5598
M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General Concept and Application to Internet Voting,” in Proceedings of the 23rd Bled eConference, 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5632
G. Schryen and C. Bodenstein, “A decision-theoretic foundation of IS business value research,” in Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5644
G. Schryen, “Preserving knowledge on IS business value: what literature reviews have done,” Business \& Information Systems Engineering (BISE), vol. 52, no. 4, pp. 225–237, 2010.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5645
G. Schryen, “Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done),” Wirtschaftsinformatik, vol. 52, no. 4, pp. 225–237, 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5690
C. Bodenstein, G. Schryen, and D. Neumann, “From ‘Take-it-or-leave-it’ offers to ‘Take-it-or-be-left-out’ Ultimatum - A trade mechanism for Online Services,” in 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642
G. Schryen, “A Fuzzy Model for IT Security Investments,” in Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, 2010, vol. 170, pp. 289–304.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5685
J. Finkbeiner, C. Bodenstein, G. Schryen, and D. Neumann, “Applying heuristic methods for job scheduling in storage markets,” in 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631
G. Schryen and R. Eliot, “Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question,” in 43rd Annual Hawaii International Conference on System Sciences, 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643
G. Schryen, “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness,” in Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625
G. Schryen and R. Kadura, “Open Source vs. Closed Source Software: Towards Measuring Security,” in 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621
G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” IEEE Transactions on Information Forensics \& Security, vol. 4, no. 4 Part, pp. 729–744, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646
G. Schryen, “A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors,” in 5th International Conference on IT Security Incident Management \& IT Forensics, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647
G. Schryen, “Security of open source and closed source software: An empirical comparison of published vulnerabilities,” in 15th Americas Conference on Information Systems, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5597
M. Volkamer, G. Schryen, L. Langer, A. Schmidt, and J. Buchmann, “Elektronische Wahlen: Verifizierung vs. Zertifizierung,” in Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649
G. Schryen, “Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia,” in 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
LibreCat | Files available
 

2008 | Journal Article | LibreCat-ID: 5648
G. Schryen, “Effektivität und Effizienz von Anti-Spam-Maßnahmen,” Linux Technical Review, no. 7, 2008.
LibreCat | Files available
 

2007 | Book | LibreCat-ID: 5651
G. Schryen, Anti-Spam Measures: Analysis and Design. Berlin, Heidelberg, New York: Springer, 2007.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 5656
G. Schryen, “Location Based Services,” in Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, H. Schulte, Ed. Kissing: Interest-Verlag, 2007.
LibreCat
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed