Revisiting IS business value research: what we already know, what we still need to know, and how we can get there G Schryen European Journal of Information Systems 22 (2), 139-169, 2013 | 637 | 2013 |
Emergency response in natural disaster management: Allocation and scheduling of rescue units F Wex, G Schryen, S Feuerriegel, D Neumann European Journal of Operational Research 235 (3), 697-708, 2014 | 357 | 2014 |
Writing qualitative is literature reviews—guidelines for synthesis, interpretation, and guidance of research G Schryen Communications of the Association for Information Systems 37 (1), 12, 2015 | 214 | 2015 |
Is open source security a myth? G Schryen Communications of the ACM 54 (5), 130-140, 2011 | 133 | 2011 |
Theory of knowledge for literature reviews: an epistemological model, taxonomy and empirical analysis of IS literature G Schryen, G Wagner, A Benlian | 126 | 2015 |
Algorithms for max-min share fair allocation of indivisible chores H Aziz, G Rauchecker, G Schryen, T Walsh Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017 | 119 | 2017 |
A knowledge development perspective on literature reviews: Validation of a new typology in the IS field G Schryen, G Wagner, A Benlian, G Paré Communications of the AIS 46, 2020 | 111 | 2020 |
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning E Weishäupl, E Yasasin, G Schryen Computers & Security 77, 807-823, 2018 | 104 | 2018 |
A configuration-based recommender system for supporting e-commerce decisions M Scholz, V Dorner, G Schryen, A Benlian European Journal of Operational Research 259 (1), 205-215, 2017 | 95 | 2017 |
Open source vs. closed source software: towards measuring security G Schryen, R Kadura Proceedings of the 2009 ACM symposium on Applied Computing, 2016-2023, 2009 | 79 | 2009 |
Anti-spam measures G Schryen Anti-Spam Measures: Analysis and Design, 43-93, 2007 | 77 | 2007 |
Preserving knowledge on IS business value: what literature reviews have done G Schryen Business & Information Systems Engineering 2 (4), 233-244, 2010 | 72 | 2010 |
Literature reviews in IS research: What can be learnt from the past and other fields? G Schryen, A Benlian, F Rowe, G Shirley, K Larsen, S Petter, G Wagner, ... Communications of the AIS 40, 2017 | 70 | 2017 |
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland G Schryen, E Rich IEEE Transactions on Information Forensics and Security 4 (4), 729-744, 2009 | 65 | 2009 |
An exact branch-and-price algorithm for scheduling rescue units during disaster response G Rauchecker, G Schryen European Journal of Operational Research 272 (1), 352-363, 2019 | 59 | 2019 |
A formal approach towards measuring trust in distributed systems G Schryen, M Volkamer, S Ries, SM Habib Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011 | 55 | 2011 |
Security of open source and closed source software: An empirical comparison of published vulnerabilities G Schryen AMCIS 2009 Proceedings, 387, 2009 | 55 | 2009 |
Forecasting IT security vulnerabilities–An empirical analysis E Yasasin, J Prester, G Wagner, G Schryen Computers & Security 88, 101610, 2020 | 54 | 2020 |
Security aspects of internet voting G Schryen 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 50 | 2004 |
Parallel computational optimization in operations research: A new integrative framework, literature review and research directions G Schryen European Journal of Operational Research 287 (1), 1-18, 2020 | 45 | 2020 |