Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

109 Publications


2012 | Journal Article | LibreCat-ID: 5578
A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty
F. Wex, G. Schryen, D. Neumann, International Journal of Information Systems for Crisis Response and Management 4 (2012) 23–41.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5581
Intelligent Decision Support for Centralized Coordination during Emergency Response
F. Wex, G. Schryen, D. Neumann, in: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), 2011.
LibreCat | Files available
 

2011 | Journal Article | LibreCat-ID: 5640
Is open source security a myth? What do vulnerability and patch data say?
G. Schryen, Communications of the ACM (CACM) Vol. 54 (2011) 130–139.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5619
A formal approach towards measuring trust in distributed systems
G. Schryen, M. Volkamer, S. Ries, in: Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5641
Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation
G. Schryen, in: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 2011.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5684
Automated Negotiations Under Uncertain Preferences
F. Lang, G. Schryen, A. Fink, in: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011.
LibreCat | Files available
 

2011 | Conference Paper | LibreCat-ID: 5689
Reducing Datacenter Energy Usage through Efficient Job Allocation
C. Bodenstein, G. Schryen, D. Neumann, in: Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 2011.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5632
A decision-theoretic foundation of IS business value research
G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Journal Article | LibreCat-ID: 5644
Preserving knowledge on IS business value: what literature reviews have done
G. Schryen, Business \& Information Systems Engineering (BISE) 52 (2010) 225–237.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5598
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.
LibreCat | Files available
 
 

2010 | Conference Paper | LibreCat-ID: 5690
From "Take-it-or-leave-it" offers to "Take-it-or-be-left-out" Ultimatum - A trade mechanism for Online Services
C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5642
A Fuzzy Model for IT Security Investments
G. Schryen, in: F. C. Freiling (Ed.), Sicherheit 2010 : Sicherheit, Schutz Und Zuverl{\"a}ssigkeit ; Konferenzband Der 5. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft F{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, Gesellschaft für Informatik, Bonn, 2010, pp. 289–304.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5685
Applying heuristic methods for job scheduling in storage markets
J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5631
Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question
G. Schryen, R. Eliot, in: 43rd Annual Hawaii International Conference on System Sciences, 2010.
LibreCat | Files available
 

2010 | Conference Paper | LibreCat-ID: 5643
An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness
G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625
Open Source vs. Closed Source Software: Towards Measuring Security
G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621
Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland
G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5646
A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors
G. Schryen, in: 5th International Conference on IT Security Incident Management \& IT Forensics, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647
Security of open source and closed source software: An empirical comparison of published vulnerabilities
G. Schryen, in: 15th Americas Conference on Information Systems, 2009.
LibreCat | Files available
 

Filters and Search Terms

department=277

Search

Filter Publications

Display / Sort

Citation Style: Default

Export / Embed