Guido Schryen

Orcid: 0000-0003-3794-1413

According to our database1, Guido Schryen authored at least 95 papers between 2001 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Parallel branch-and-price algorithms for the single machine total weighted tardiness scheduling problem with sequence-dependent setup times.
Comput. Oper. Res., 2025

2024
Speedup and efficiency of computational parallelization: A unifying approach and asymptotic analysis.
J. Parallel Distributed Comput., May, 2024

Adopting Generative AI for Literature Reviews: An Epistemological Perspective.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

A Design Theory for Spontaneous Volunteer Coordination Systems in Disaster Response.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Integrating driver behavior into last-mile delivery routing: Combining machine learning and optimization in a hybrid decision support framework.
Eur. J. Oper. Res., November, 2023

Literature reviews in operations research: A new taxonomy and a meta review.
Comput. Oper. Res., September, 2023

Digital Responsibility.
Bus. Inf. Syst. Eng., August, 2023

2022
Decision support for disaster relief: Coordinating spontaneous volunteers.
Eur. J. Oper. Res., 2022

2021
Which factors affect the scientific impact of review papers in IS research? A scientometric study.
Inf. Manag., 2021

Study on sensitivity of electric bus systems under simultaneous optimization of charging infrastructure and vehicle schedules.
EURO J. Transp. Logist., 2021

Classifying the ideational impact of Information Systems review articles: A content-enriched deep learning approach.
Decis. Support Syst., 2021

Exploring the Scientific Impact of Information Systems Design Science Research.
Commun. Assoc. Inf. Syst., 2021

2020
Parallel computational optimization in operations research: A new integrative framework, literature review and research directions.
Eur. J. Oper. Res., 2020

Forecasting IT security vulnerabilities - An empirical analysis.
Comput. Secur., 2020

A Knowledge Development Perspective on Literature Reviews: Validation of a new Typology in the IS Field.
Commun. Assoc. Inf. Syst., 2020

Integrating management science into the HPC research ecosystem.
Commun. ACM, 2020

Interview with Utz-Uwe Haus on "High Performance Computing in Economic Environments: Opportunities and Challenges".
Bus. Inf. Syst. Eng., 2020

High Performance Business Computing.
Bus. Inf. Syst. Eng., 2020

Designing a Novel Strategy for Exploring Literature Corpora.
Proceedings of the 28th European Conference on Information Systems, 2020

2019
An exact branch-and-price algorithm for scheduling rescue units during disaster response.
Eur. J. Oper. Res., 2019

Using high performance computing for unrelated parallel machine scheduling with sequence-dependent setup times: Development and computational evaluation of a parallel branch-and-price algorithm.
Comput. Oper. Res., 2019

Walking the Middle Path: How Medium Trade-Off Exposure Leads to Higher Consumer Satisfaction in Recommender Agents.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

2018
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning.
Comput. Secur., 2018

Call for Papers Issue 1/2020 - High Performance Business Computing.
Bus. Inf. Syst. Eng., 2018

Decision Support for the Optimal Coordination of Spontaneous Volunteers in Disaster Relief.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study.
Proceedings of the International Conference on Information Systems, 2018

Classifying the Ideational Impact of IS Review Articles: A Natural Language Processing Based Approach.
Proceedings of the International Conference on Information Systems, 2018

2017
A configuration-based recommender system for supporting e-commerce decisions.
Eur. J. Oper. Res., 2017

Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?
Commun. Assoc. Inf. Syst., 2017

Exploring the Scientific Impact of Information Systems Design Science Research: A Scientometric Study.
Proceedings of the International Conference on Information Systems, 2017

Algorithms for Max-Min Share Fair Allocation of Indivisible Chores.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Approximation Algorithms for Max-Min Share Allocations of Indivisible Chores and Goods.
CoRR, 2016

Development of two novel face-recognition CAPTCHAs: A security and usability study.
Comput. Secur., 2016

Factors Affecting the Scientific Impact of Literature Reviews: A Scientometric Study.
Proceedings of the International Conference on Information Systems, 2016

Standalone Literature Reviews in IS Research: What Can Be Learnt From the Past and Other Fields?
Proceedings of the International Conference on Information Systems, 2016

2015
Duality in fuzzy linear programming: a survey.
OR Spectr., 2015

Revenue management for Cloud computing providers: Decision models for service admission control under non-probabilistic uncertainty.
Eur. J. Oper. Res., 2015

Writing Qualitative IS Literature Reviews - Guidelines for Synthesis, Interpretation, and Guidance of Research.
Commun. Assoc. Inf. Syst., 2015

Resource Planning in Disaster Response - Decision Support Models and Methodologies.
Bus. Inf. Syst. Eng., 2015

A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory.
Proceedings of the International Conference on Information Systems, 2015

Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature.
Proceedings of the International Conference on Information Systems, 2015

Requirements for IT Security Metrics - an Argumentation Theory Based Approach.
Proceedings of the 23rd European Conference on Information Systems, 2015

IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review.
Proceedings of the 23rd European Conference on Information Systems, 2015

High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
Modellbasierte Entscheidungsunterstützung in Produktions- und Dienstleistungsnetzwerken.
Wirtschaftsinf., 2014

Risk Reduction in Natural Disaster Management Through Information Systems: A Literature Review and an IS Design Science Research Agenda.
Int. J. Inf. Syst. Crisis Response Manag., 2014

Emergency response in natural disaster management: Allocation and scheduling of rescue units.
Eur. J. Oper. Res., 2014

Model-Based Decision Support in Manufacturing and Service Networks.
Bus. Inf. Syst. Eng., 2014

A Decision Support System for IT Security Incident Management.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Sicherheitsherausforderungen in hochverteilten Systemen.
Prax. Inf.verarb. Kommun., 2013

Assignments of Collaborative Rescue Units during Emergency Response.
Int. J. Inf. Syst. Crisis Response Manag., 2013

Revisiting IS business value research: what we already know, what we still need to know, and how we can get there.
Eur. J. Inf. Syst., 2013

Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Introduction to Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty.
Int. J. Inf. Syst. Crisis Response Manag., 2012

Energy-aware workload management models for operation cost reduction in data centers.
Eur. J. Oper. Res., 2012

Operational emergency response under informational uncertainty: A fuzzy optimization model for scheduling and allocating rescue units.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study.
Proceedings of the International Conference on Information Systems, 2012

IS Design Thinking in Disaster Management Research.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Cloud Service Revenue Management.
Proceedings of the 20th European Conference on Information Systems, 2012

2011
Is open source security a myth?
Commun. ACM, 2011

A formal approach towards measuring trust in distributed systems.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Intelligent decision support for centralized coordination during Emergency Response.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

Automated Negotiations Under Uncertain Preferences.
Proceedings of the International Conference on Information Systems, 2011

Seeking the "value" in IS business value research - an agenda for investigating synergies between socio-organizational change, IS capabilities change, and IS innovation.
Proceedings of the 19th European Conference on Information Systems, 2011

Reducing datacenter energy usage through efficient job allocation.
Proceedings of the 19th European Conference on Information Systems, 2011

2010
Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt.
Wirtschaftsinf., 2010

Preserving Knowledge on IS Business Value - What Literature Reviews Have Done.
Bus. Inf. Syst. Eng., 2010

A Fuzzy Model for IT Security Investments.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness.
Proceedings of the Scandinavian Information Systems Research, 2010

Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Question.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

A Decision-Theoretic Foundation of IS Business Value Research.
Proceedings of the 18th European Conference on Information Systems, 2010

Applying Heuristic Methods for Job Scheduling in Storage Markets.
Proceedings of the 18th European Conference on Information Systems, 2010

From "Take-It-or-Leave-It" Offers to "Take-It-or-Be-Left-Out" Ultimatum: A Trade Mechanism for Online Services.
Proceedings of the 18th European Conference on Information Systems, 2010

Measuring eTrust in Distributed Systems: General Concept and Application to Internet Voting.
Proceedings of the 23rd Bled eConference: eTrust: Implications for the Individual, 2010

2009
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland.
IEEE Trans. Inf. Forensics Secur., 2009

Open source vs. closed source software: towards measuring security.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.
Proceedings of the IMF 2009, 2009

Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.
Proceedings of the Designing E-Business Systems. Markets, Services, and Networks, 2008

2007
The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis.
Comput. Secur., 2007

Armed for the Spam Battle: A Technological and Organizational Infrastructure Framework.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Anti-spam measures - analysis and design.
Springer, ISBN: 978-3-540-71748-5, 2007

2006
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2004
Effektivität von Lösungsansätzen zur Bekämpfung von Spam.
Wirtschaftsinf., 2004

Fighting spam: motivating an account-based approach.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

Security Aspects of Internet Voting.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

How Security Problems can Compromise Remote Internet Voting Systems.
Proceedings of the Electronic Voting in Europe, 2004

2003
Internet-Wahlen.
Proceedings of the Wirtschaftsinformatik 2003, Medien - Märkte - Mobilität, Band I, 2003

E-Democracy: Internet Voting.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
Elektronisches Papier - Displaytechnologie mit weitem Anwendungsspektrum.
Wirtschaftsinf., 2002

Elektronische Zeitung - das Erbe Gutenbergs?
i-com, 2002

2001
Komponentenorientierte Softwareentwicklung in Softwareunternehmen: Konzeption eines Vorgehensmodells zur Einführung und Etablierung.
PhD thesis, 2001


  Loading...