Follow
Guido Schryen
Guido Schryen
Professor of Management Information Systems and Operations Research, Paderborn University
Verified email at upb.de - Homepage
Title
Cited by
Cited by
Year
Revisiting IS business value research: what we already know, what we still need to know, and how we can get there
G Schryen
European Journal of Information Systems 22, 139-169, 2013
5862013
Emergency response in natural disaster management: Allocation and scheduling of rescue units
F Wex, G Schryen, S Feuerriegel, D Neumann
European Journal of Operational Research 235 (3), 697-708, 2014
3252014
Writing qualitative is literature reviews—guidelines for synthesis, interpretation, and guidance of research
G Schryen
Communications of the Association for Information Systems 37 (1), 12, 2015
1892015
Is open source security a myth?
G Schryen
Communications of the ACM 54 (5), 130-140, 2011
1282011
Theory of knowledge for literature reviews: an epistemological model, taxonomy and empirical analysis of IS literature
G Schryen, G Wagner, A Benlian
1182015
Algorithms for max-min share fair allocation of indivisible chores
H Aziz, G Rauchecker, G Schryen, T Walsh
Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017
1072017
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning
E Weishäupl, E Yasasin, G Schryen
Computers & Security 77, 807-823, 2018
892018
A configuration-based recommender system for supporting e-commerce decisions
M Scholz, V Dorner, G Schryen, A Benlian
European Journal of Operational Research 259 (1), 205-215, 2017
832017
A knowledge development perspective on literature reviews: Validation of a new typology in the IS field
G Schryen, G Wagner, A Benlian, G Paré
Communications of the AIS 46, 2020
792020
Anti-spam measures
G Schryen
Anti-Spam Measures: Analysis and Design, 43-93, 2007
742007
Preserving knowledge on IS business value: what literature reviews have done
G Schryen
Business & Information Systems Engineering 2 (4), 233-244, 2010
712010
Open source vs. closed source software: towards measuring security
G Schryen, R Kadura
Proceedings of the 2009 ACM symposium on Applied Computing, 2016-2023, 2009
712009
Literature reviews in IS research: what can be learnt from the past and other fields?
G Schryen, A Benlian, F Rowe, G Shirley, K Larsen, S Petter, G Wagner, ...
Communications of the AIS 40, 2017
642017
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland
G Schryen, E Rich
IEEE Transactions on Information Forensics and Security 4 (4), 729-744, 2009
632009
A formal approach towards measuring trust in distributed systems
G Schryen, M Volkamer, S Ries, SM Habib
Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011
542011
An exact branch-and-price algorithm for scheduling rescue units during disaster response
G Rauchecker, G Schryen
European Journal of Operational Research 272 (1), 352-363, 2019
502019
Security of open source and closed source software: An empirical comparison of published vulnerabilities
G Schryen
AMCIS 2009 Proceedings, 387, 2009
502009
Security aspects of internet voting
G Schryen
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
462004
Forecasting IT security vulnerabilities–An empirical analysis
E Yasasin, J Prester, G Wagner, G Schryen
Computers & Security 88, 101610, 2020
412020
A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors
G Schryen
2009 Fifth International Conference on IT Security Incident Management and …, 2009
412009
The system can't perform the operation now. Try again later.
Articles 1–20