Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

12 Publications


2020 | Journal Article | LibreCat-ID: 16249
Szubartowicz, Eva, and Guido Schryen. “Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements.” Journal of Information System Security, 2020.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 17667
Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso. “Approaches for Collaborative Security Defences in Multi Network Environments.” In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 113–23. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019. https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9.
LibreCat | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 5586
Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” Computers & Security, 2018.
LibreCat | Files available
 

2018 | Journal Article | LibreCat-ID: 17666
Koning, R., B. de Graaff, Gleb Polevoy, R. Meijer, C. de Laat, and P. Grosso. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” Future Generation Computer Systems, 2018. https://doi.org/10.1016/j.future.2018.08.011.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 5588
Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” In International Conference on Information Systems, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5590
Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625
Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software: Towards Measuring Security.” In 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621
Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” IEEE Transactions on Information Forensics \& Security 4, no. 4 Part (2009): 729–44.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647
Schryen, Guido. “Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.” In 15th Americas Conference on Information Systems, 2009.
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649
Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.” In 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
LibreCat | Files available
 

2007 | Journal Article | LibreCat-ID: 5658
Schryen, Guido. “The Impact That Placing Email Addresses on the Internet Has on the Receipt of Spam ? An Empirical Analysis.” Computers & Security 2, no. 5 (2007): 361–72.
LibreCat | Files available
 

2003 | Book Chapter | LibreCat-ID: 5667
Schryen, Guido. “E-Democracy: Internet Voting.” In Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, 1017–21. Algarve: IADIS Press, 2003.
LibreCat
 

Filters and Search Terms

keyword="security"

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed