Skip to main content
đŸ”ïžŽ
Programs
Topics · Experience level
đŸŽšïžŽ
Programs
Programs
Topics
Topics
Experience level
Experience level
cancel

Publication database

Picture of various books and publications
Filter
Book Chapter

Die völkerrechtliche Dimension der IT-Sicherheit [The international legal dimension of IT security]

In IT-Sicherheitsrecht, edited by Gerrit Hornung, Martin Schallbruch, Baden-Baden: Nomos.
Henning Christian Lahmann (2020)
Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, united nations, use of force, intervention, sovereignty, internet governance, arms control, cyber operations
The chapter summarises the current state of the application of international law to cyberspace and reviews attempts to find consensus among the community of states. While virtually all states agree that international law applies to state conduct in cyberspace, the 'how' remains a hotly contested issue. The chapter focuses on the prohibition of the use of force, the prohibition of intervention, and the principle of sovereignty and assesses their legal status vis-Ă -vis cyber operations. It follows a brief treatment of further international efforts to increase transnational cybersecurity, such as internet governance and arms control treaties.
Secondary Title
IT-Sicherheitsrecht
ISBN
978-3-8487-5764-0
Book

IT-Sicherheitsrecht [IT security law]

Baden-Baden: Nomos
Gerrit Hornung, Martin Schallbruch (2020)
Subject(s)
Information technology and systems
Keyword(s)
IT security, international law, cybersecurity
ISBN
978-3-8487-5764-0
Book Chapter

Messung, PrĂŒfung und Nachweis von IT-Sicherheit [Measuring, testing and proving IT security]

In IT-Sicherheitsrecht, edited by Gerrit Hornung, Martin Schallbruch, Baden-Baden: Nomos.
Isabel Skierka (2020)
Subject(s)
Information technology and systems; Management sciences, decision sciences and quantitative methods
Keyword(s)
IT security, risk management, certification, audit, ISO 27000, Common Criteria
Dieses Kapitels im Praxishandbuch "IT-Sicherheitsrecht" analysiert Verfahren zur Messung, PrĂŒfung und dem Nachweis von IT-Sicherheit zur ErfĂŒllung von rechtlichen Anforderungen. ZunĂ€chst gibt das Kapitel einen Überblick ĂŒber PrĂŒf-, Bewertungs- und Nachweisverfahren, sowie rechtliche Grundlagen und ZustĂ€ndigkeiten im IT-Sicherheitsrecht. Anschließend unterscheidet es systematisch zwischen unterschiedlichen PrĂŒf- und Bewertungsebenen bzw. -gegenstĂ€nden im Sinne der Sicherheit von IT-Systemen in Institutionen und der IT-Sicherheit von Software und Hardware. Im zweiten Abschnitt erlĂ€utert es die Messung, PrĂŒfung und den Nachweis von IT-Sicherheit in Institutionen, fasst die einschlĂ€gigen Standards fĂŒr Systeme zum Management von Informationssicherheit zusammen, benennt Methoden zur Messung von IT-Sicherheit innerhalb von Risikoanalysen und erlĂ€utert Audits und Zertifizierungen und zeigt anschließend, in welchen Bereichen des IT-Sicherheitsrechts diese Methoden verlangt werden. Der dritte Teil widmet sich der Messung, PrĂŒfung und dem Nachweis von IT-Sicherheit von Software und Hardware, einschließlich IT-Produkten, -Diensten und -Prozessen. Er bietet eine Übersicht ĂŒber Kriterien zur Messung, Evaluation und PrĂŒfung von Software und Hardware und ĂŒber Zertifizierungsverfahren. Darauf aufbauend erlĂ€utert der Abschnitt, wie diese Verfahren bei der PrĂŒfung und Zertifizierung von IT-Produkten, -Diensten und -Prozessen im allgemeinen und fachspezifischen IT-Sicherheitsrecht zum Einsatz kommen. Ein kurzer abschließender Abschnitt zeigt die Grenzen der bestehenden AnsĂ€tze und zukĂŒnftige Herausforderungen auf.
Secondary Title
IT-Sicherheitsrecht
ISBN
978-3-8487-5764-0
Journal Article

Under cyberattack: Learning for leaders through play

The European Business Review September-October: 38–44
Nora Grasselli, Bethan Williams (2020)
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Leadership, global virtual teams, gamification
How are team dynamics affected by our evermore global and virtualized business context? An innovative game created at ESMT Berlin pits business leaders against fictional hackers to find out.
Journal Pages
38–44
Working Paper

The sequence effect on the selection of R&D projects in panel decision-making

Bocconi University Management & Technology Research Paper Series
Published in Organization Science.
Paola Criscuolo, Linus Dahlander, Thorsten Grohsjean, Ammon Salter (2020)
Subject(s)
Technology, R&D management
Keyword(s)
Sequence effect, law of small numbers, gambler’s fallacy, contrast effect, quota model, R&D project selection, innovation, decision-making, panel, professional service firm
We examine how groups fall prey to the sequence effect when they make choices based on informed assessments of complex situations; for example, when evaluating research and development (R&D) projects. The core argument is that the temporal sequence of selection matters because projects that appear in a sequence following a funded project are themselves less likely to receive funding. Building on the idea that selecting R&D projects is a demanding process that drains participants’ mental and emotional resources, we further theorize the moderating effect of the influence of the timing of the panel meeting on the sequence effect. We test these conjectures using a randomization in sequence order from several rounds of R&D project selection at a leading professional service firm. We find robust support for the existence of a sequence effect in R&D as well as for the moderating effect. We further explore different explanations for the sequence effect and how it passes from the individual to the panel. These findings have broader implications for the literatures on innovation and search in general and on group decision-making for R&D, specifically, as they suggest that a previously overlooked dimension affects selection outcomes.
Pages
44
Online article

Gaming the virus to win at virtual leadership

Forbes
Nora Grasselli, Bethan Williams (2020)
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Leadership, global virtual teams, gamification
We explore how gamification can be used to help leaders to lead global virtual teams.
ISSN (Print)
0015-6914
Journal Article

Not in the job description: The commercial activities of academic scientists and engineers

Management Science 66 (9): 4108–4117
Wesley Cohen, Henry Sauermann, Paula Stephan (2020)
Subject(s)
Entrepreneurship; Technology, R&D management
Keyword(s)
Academic entrepreneurship, patenting, incentive systems, science policy, social impact
Scholarly work seeking to understand academics’ commercial activities often draws on abstract notions of the academic reward system and of the representative scientist. Few scholars have examined whether and how scientists’ motives to engage in commercial activities differ across fields. Similarly, efforts to understand academics’ choices have focused on three self-interested motives – recognition, challenge, and money – ignoring the potential role of the desire to have an impact on others. Using panel data for a national sample of over 2,000 academics employed at U.S. institutions, we examine how the four motives are related to commercial activity, measured by patenting. We find that all four motives are correlated with patenting, but these relationships differ systematically between the life sciences, physical sciences, and engineering. These field differences are consistent with differences across fields in the rewards from commercial activities, as well as in the degree of overlap between traditional and commercializable research, which affects the opportunity costs of time spent away from “traditional” work. We discuss potential implications for policy makers, administrators, and managers as well as for future research on the scientific enterprise.
© 2020, INFORMS
Volume
66
Journal Pages
4108–4117
ISSN (Online)
1526-5501
ISSN (Print)
0025–1909
Book Chapter

Rethinking social networks in the era of computational social science

In The Oxford Handbook of Social Networks, edited by Ryan Light, James Moody, 71–97. Oxford: Oxford University Press.
James A. Kitts, Eric Quintane (2020)
Subject(s)
Management sciences, decision sciences and quantitative methods
Keyword(s)
Social networks, social interactions, relational events, computational social science, wearable sensors, digital trace data, big data, sentiments
Recent work argued that researchers conceptualize ‘social ties’ in four fundamentally different ways –as socially constructed role relations such as friendship or co-authorship; sentiments such as liking or hatred; interactions such as communication or sex; and access to resources or opportunities. We consider where ties (and non-ties) are likely to correspond across these four concepts, and thus assess where we may apply theories based on one network concept (e.g., sentiment ties of liking and disliking) to data representing another (e.g., interaction as logs of phone calls). Then we discuss empirical lenses emerging from computational social science, such as location-aware devices, electronic calendars, wearable sensors, records of electronic messages, phone calls, or online transactions. We ask how these time-stamped event series correspond to the conventional network concepts above and call for a new analytical approach: Directly theorizing and analyzing the structural-temporal interdependencies of interaction events redirects our attention from structural patterns to social processes.
Secondary Title
The Oxford Handbook of Social Networks
Pages
71–97
ISBN
978-0190251765
Journal Article

What does it take to successfully implement a hybrid offering strategy? A contingency perspective

SMR - Journal of Service Management Research 4 (2–3): 100–120
Judith Dannenbaum, Laura Marie Edinger-Schons, Mario Rese, Olaf Plötner, Jan Wieseke (2020)
Subject(s)
Entrepreneurship; Marketing; Strategy and general management
Volume
4
Journal Pages
100–120
ISSN (Online)
2511-8676
ISSN (Print)
2511-8676
Journal Article

‘Hacking back' by states and the uneasy place of necessity within the rule of law

Heidelberg Journal of International Law (HJIL) 80 (2): 433–452
Henning Christian Lahmann (2020)
Subject(s)
Information technology and systems
Keyword(s)
International law, cybersecurity, cyberattacks, attribution, necessity, rule of law, special emergency regime
The article deals with necessity as one of the circumstances precluding wrongfulness under customary international law and how it will likely gain relevance in view of the difficulty to quickly attribute malicious cyber operations that threaten important assets of a state. While the necessity doctrine seems fit for purpose, it lacks granularity and is problematic from an international rule-of-law point of view. Taking these pitfalls into account, the article proposes some general principles for a possible special emergency regime for cyberspace.
Volume
80
Journal Pages
433–452