Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, united nations, use of force, intervention, sovereignty, internet governance, arms control, cyber operations
The chapter summarises the current state of the application of international law to cyberspace and reviews attempts to find consensus among the community of states. While virtually all states agree that international law applies to state conduct in cyberspace, the 'how' remains a hotly contested issue. The chapter focuses on the prohibition of the use of force, the prohibition of intervention, and the principle of sovereignty and assesses their legal status vis-Ă -vis cyber operations. It follows a brief treatment of further international efforts to increase transnational cybersecurity, such as internet governance and arms control treaties.
Secondary Title
IT-Sicherheitsrecht
ISBN
978-3-8487-5764-0
Subject(s)
Information technology and systems
Keyword(s)
IT security, international law, cybersecurity
ISBN
978-3-8487-5764-0
Subject(s)
Information technology and systems; Management sciences, decision sciences and quantitative methods
Keyword(s)
IT security, risk management, certification, audit, ISO 27000, Common Criteria
Dieses Kapitels im Praxishandbuch "IT-Sicherheitsrecht" analysiert Verfahren zur Messung, PrĂŒfung und dem Nachweis von IT-Sicherheit zur ErfĂŒllung von rechtlichen Anforderungen. ZunĂ€chst gibt das Kapitel einen Ăberblick ĂŒber PrĂŒf-, Bewertungs- und Nachweisverfahren, sowie rechtliche Grundlagen und ZustĂ€ndigkeiten im IT-Sicherheitsrecht. AnschlieĂend unterscheidet es systematisch zwischen unterschiedlichen PrĂŒf- und Bewertungsebenen bzw. -gegenstĂ€nden im Sinne der Sicherheit von IT-Systemen in Institutionen und der IT-Sicherheit von Software und Hardware. Im zweiten Abschnitt erlĂ€utert es die Messung, PrĂŒfung und den Nachweis von IT-Sicherheit in Institutionen, fasst die einschlĂ€gigen Standards fĂŒr Systeme zum Management von Informationssicherheit zusammen, benennt Methoden zur Messung von IT-Sicherheit innerhalb von Risikoanalysen und erlĂ€utert Audits und Zertifizierungen und zeigt anschlieĂend, in welchen Bereichen des IT-Sicherheitsrechts diese Methoden verlangt werden. Der dritte Teil widmet sich der Messung, PrĂŒfung und dem Nachweis von IT-Sicherheit von Software und Hardware, einschlieĂlich IT-Produkten, -Diensten und -Prozessen. Er bietet eine Ăbersicht ĂŒber Kriterien zur Messung, Evaluation und PrĂŒfung von Software und Hardware und ĂŒber Zertifizierungsverfahren. Darauf aufbauend erlĂ€utert der Abschnitt, wie diese Verfahren bei der PrĂŒfung und Zertifizierung von IT-Produkten, -Diensten und -Prozessen im allgemeinen und fachspezifischen IT-Sicherheitsrecht zum Einsatz kommen. Ein kurzer abschlieĂender Abschnitt zeigt die Grenzen der bestehenden AnsĂ€tze und zukĂŒnftige Herausforderungen auf.
Secondary Title
IT-Sicherheitsrecht
ISBN
978-3-8487-5764-0
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Leadership, global virtual teams, gamification
How are team dynamics affected by our evermore global and virtualized business context? An innovative game created at ESMT Berlin pits business leaders against fictional hackers to find out.
Journal Pages
38â44
Subject(s)
Technology, R&D management
Keyword(s)
Sequence effect, law of small numbers, gamblerâs fallacy, contrast effect, quota model, R&D project selection, innovation, decision-making, panel, professional service firm
We examine how groups fall prey to the sequence effect when they make choices based on informed assessments of complex situations; for example, when evaluating research and development (R&D) projects. The core argument is that the temporal sequence of selection matters because projects that appear in a sequence following a funded project are themselves less likely to receive funding. Building on the idea that selecting R&D projects is a demanding process that drains participantsâ mental and emotional resources, we further theorize the moderating effect of the influence of the timing of the panel meeting on the sequence effect. We test these conjectures using a randomization in sequence order from several rounds of R&D project selection at a leading professional service firm. We find robust support for the existence of a sequence effect in R&D as well as for the moderating effect. We further explore different explanations for the sequence effect and how it passes from the individual to the panel. These findings have broader implications for the literatures on innovation and search in general and on group decision-making for R&D, specifically, as they suggest that a previously overlooked dimension affects selection outcomes.
Pages
44
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Leadership, global virtual teams, gamification
We explore how gamification can be used to help leaders to lead global virtual teams.
ISSN (Print)
0015-6914
Subject(s)
Entrepreneurship; Technology, R&D management
Keyword(s)
Academic entrepreneurship, patenting, incentive systems, science policy, social impact
Scholarly work seeking to understand academicsâ commercial activities often draws on abstract notions of the academic reward system and of the representative scientist. Few scholars have examined whether and how scientistsâ motives to engage in commercial activities differ across fields. Similarly, efforts to understand academicsâ choices have focused on three self-interested motives â recognition, challenge, and money â ignoring the potential role of the desire to have an impact on others. Using panel data for a national sample of over 2,000 academics employed at U.S. institutions, we examine how the four motives are related to commercial activity, measured by patenting. We find that all four motives are correlated with patenting, but these relationships differ systematically between the life sciences, physical sciences, and engineering. These field differences are consistent with differences across fields in the rewards from commercial activities, as well as in the degree of overlap between traditional and commercializable research, which affects the opportunity costs of time spent away from âtraditionalâ work. We discuss potential implications for policy makers, administrators, and managers as well as for future research on the scientific enterprise.
© 2020, INFORMS
Volume
66
Journal Pages
4108â4117
ISSN (Online)
1526-5501
ISSN (Print)
0025â1909
Subject(s)
Management sciences, decision sciences and quantitative methods
Keyword(s)
Social networks, social interactions, relational events, computational social science, wearable sensors, digital trace data, big data, sentiments
Recent work argued that researchers conceptualize âsocial tiesâ in four fundamentally different ways âas socially constructed role relations such as friendship or co-authorship; sentiments such as liking or hatred; interactions such as communication or sex; and access to resources or opportunities. We consider where ties (and non-ties) are likely to correspond across these four concepts, and thus assess where we may apply theories based on one network concept (e.g., sentiment ties of liking and disliking) to data representing another (e.g., interaction as logs of phone calls). Then we discuss empirical lenses emerging from computational social science, such as location-aware devices, electronic calendars, wearable sensors, records of electronic messages, phone calls, or online transactions. We ask how these time-stamped event series correspond to the conventional network concepts above and call for a new analytical approach: Directly theorizing and analyzing the structural-temporal interdependencies of interaction events redirects our attention from structural patterns to social processes.
Secondary Title
The Oxford Handbook of Social Networks
Pages
71â97
ISBN
978-0190251765
Subject(s)
Entrepreneurship; Marketing; Strategy and general management
Volume
4
Journal Pages
100â120
ISSN (Online)
2511-8676
ISSN (Print)
2511-8676
Subject(s)
Information technology and systems
Keyword(s)
International law, cybersecurity, cyberattacks, attribution, necessity, rule of law, special emergency regime
The article deals with necessity as one of the circumstances precluding wrongfulness under customary international law and how it will likely gain relevance in view of the difficulty to quickly attribute malicious cyber operations that threaten important assets of a state. While the necessity doctrine seems fit for purpose, it lacks granularity and is problematic from an international rule-of-law point of view. Taking these pitfalls into account, the article proposes some general principles for a possible special emergency regime for cyberspace.
Volume
80
Journal Pages
433â452