Guido Schryen

Learn More
Received: 24 September 2009 Revised: 22 March 2010 2nd Revision: 6 December 2010 3rd Revision: 29 July 2011 4th Revision: 5 February 2012 5th Revision: 24 April 2012 6th Revision: 10 June 2012 Accepted: 29 August 2012 Abstract The business value of investments in Information Systems (IS) has been, and is predicted to remain, one of the major research topics(More)
The concepts of both duality and fuzzy uncertainty in linear programming have been theoretically analyzed, comprehensively and practically applied in an abundance of cases. Consequently, their joint application is highly appealing for both scholars and practitioners. However, the literature contributions on duality in fuzzy linear programming (FLP) are(More)
Natural disasters, such as earthquakes, tsunamis and hurricanes, cause tremendous harm each year. In order to reduce casualties and economic losses during the response phase, rescue units must be allocated and scheduled efficiently. As this problem is one of the key issues in emergency response and has been addressed only rarely in literature, this paper(More)
Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers' behavior when collecting and harvesting addresses and spammers' capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet.(More)
Based on a comprehensive literature search, this meta review analyzes to what extent past literature reviews on IS business value have covered key research areas and preserved their key findings. The results show that while some areas have been explored extensively, some other crucial areas, such as accounting performance, the growth of intangible assets,(More)
  • Guido Schryen
  • 37th Annual Hawaii International Conference on…
  • 2004
Voting via the Internet has become a feasible option for political as well as non-political ballots. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. The article starts with a brief presentation of advantages and disadvantages of Internet ballots and(More)
anti spam measures analysis and design What to say and what to do when mostly your friends love reading? Are you the one that don't have such hobby? So, it's important for you to start having that hobby. You know, reading is not the force. We're sure that reading will lead you to join in better concept of life. Reading will be a positive activity to do(More)
Emerging digital environments and infrastructures, such as distributed security services and distributed computing services, have generated new options of communication, information sharing, and resource utilization in past years. However, when distributed services are used, the question arises of to what extent we can trust service providers to not violate(More)