Skip to main content
🔍︎
Programs
Topics · Experience level
🎚︎
Programs
Programs
Topics
Topics
Experience level
Experience level
cancel

Publication database

Picture of various books and publications
Filter
Book Chapter

Leader inquiry as a method for open error communication in aviation and beyond

In Mistakes, errors and failures across cultures: Navigating potentials, edited by Elisabeth Vanderheiden, Claude-Hélène Mayer, 587–604. Berlin: Springer Nature Switzerland.
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Error management, inquiry, leadership, crew resource management
There have been multiple aircraft accidents in the aviation industry resulting from a lack of error communication. Even though cultural differences have been cited as contributing factors, many accidents have happened due to the hierarchical status of the first and second officers and the reluctance of the latter to speak up during critical situations.
This is why, three decades ago, Crew Resource Management (CRM) was developed in the aviation industry. Its goal was to reduce the hierarchy gradient on the flight deck and achieve open, factual error communication to ensure the safe operation of flights. This meant creating an environment in which lower-ranking crew members would feel comfortable speaking up when observing an error made by their superiors. Today, CRM is a mandatory element of flight crew training in civilian and military flight operations worldwide. Since its introduction, accident rates have declined tremendously.
However, even after three decades, the human factor continues to be the main cause of accidents. When talking to flight crews, we observe that lower-ranking crew members are still hesitant to speak up. We therefore suggest that – on top of training people to speak up more – we should start focusing on the leadership behavior involved. This requires leaders to include subordinates through active inquiry when making decisions in critical situations, thereby creating a flat hierarchy that allows them to speak freely.
Secondary Title
Mistakes, errors and failures across cultures: Navigating potentials
Pages
587–604
ISBN
978-3-030-35573-9
ISBN (Online)
978-3-030-35574-6
Book

Unilateral remedies to cyber operations. Self-defence, countermeasures, necessity, and the problem of attribution

Cambridge: Cambridge University Press
Henning Christian Lahmann (2020)
Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, evidence, attribution, self-defence, countermeasures, necessity, hybrid warfare, cyber operations, hack backs
ISBN
9781108479868
Journal Article

Win-win in distributive negotiations: The economic and relational benefits of strategic offer framing

Journal of Experimental Social Psychology 87: 103943
Michael Schaerer, Martin Schweinsberg, Nico Thornley, Roderick I. Swaab (2020)
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Negotiation, first offer, framing, satisfaction, power, reservation price
In distributive negotiations, people often feel that they have to choose between maximizing their economic outcomes (claiming more value) or improving their relational outcomes (having a satisfied opponent). The present research proposes a conversational strategy that can help negotiators achieve both. Specifically, we show that using an offer framing strategy that shifts offer recipients' attention to their reservation price (e.g., “How does my offer compare to your minimum price?”) leads to both (a) an assimilation effect whereby recipients make more favorable counteroffers (economic benefit) as well as (b) a contrast effect whereby recipients feel more satisfied with the negotiation (relational benefit). We find evidence for the effectiveness of this conversational strategy across four experiments (N = 1522) involving different negotiation contexts (real estate, restaurant sale) and participant samples (MBAs, sales agents, online participants), and also document negotiator power as an important boundary condition. Overall, our research suggests that economic and relational benefits do not have to be mutually exclusive in distributive negotiations, that the perceived extremity of an offer is subjective and can be strategically influenced, and that assimilation and contrast effects can operate simultaneously when they relate to separate outcomes.
With permission of Elsevier
Volume
87
Journal Pages
103943
Book

The creation of the extraordinary: Perspectives on luxury

Wiesbaden: Springer Gabler
Hannes Gurzki (2020)
Subject(s)
Marketing
Keyword(s)
Creation of the extraordinary, perspectives on luxury, luxury, branding, brand management, marketing, luxury brand management, luxury marketing, luxury brand strategy, marketing strategy, symbolic consumption, advertising, status consumption, creative industries
Luxury is as old as humankind and has sparked multiple debates throughout of history. In today’s consumer society, luxury brands have become aspirational symbols. Yet, to date, a comprehensive overview of the different perspectives that have shaped the discourses about luxury is missing. Hannes Gurzki provides a broad overview of luxury research, highlights and details important perspectives on luxury, and derives practical guidelines for managers based on research. Thereby the author combines insights from different disciplines, such as philosophy, sociology, psychology, anthropology, cultural studies, economics or management, to broaden and deepen our understanding of luxury and its creation principles.
Copyright Information: Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2020
ISBN
978-3-658-29537-0
ISBN (Online)
978-3-658-29538-7
Journal Article

A wake-up call for the corporate world

The European Business Review
Christoph Burger, Antony Froggatt, Catherine Mitchell, Jens Weinmann (2020)
Subject(s)
Ethics and social responsibility; Health and environment; Strategy and general management; Technology, R&D management
Keyword(s)
Sustainability and wellbeing, climate change, innovation, emerging ideas, social impact, strategy and management, strategic spotlight
New regulations and opportunities in the decentralized energy market can be good for the planet and business.
Journal Article

Sichere IT ohne Schwachstellen und Hintertüren [Secure IT without vulnerabilities and back doors]

TA TuP (Journal for Technology Assessment in Theory and Practice) 29 (1): 30–36
Arnd Weber, Gernot Heiser, Dirk Kuhlmann, Martin Schallbruch, Anupam Chattopadhyay, Sylvain Guilley, Michael Kasper et al. (2020)
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, sovereignty, open source, verification,
supply chain risks
Increasing dependence on information technology calls for strengthening the requirements on their safety and security. Vulnerabilities that result from flaws in hardware and software are a core problem which market mechanisms have failed to eliminate. A strategy for resolving this issue should consider the following options: (1) private- and public-sector
funding for open and secure production, (2) strengthening the sovereign control over the production of critical IT components within an
economic zone, and (3) improving and enforcing regulation. This paper
analyses the strengths and weaknesses of these options and proposes
a globally distributed, secure supply chain based on open and mathematically proved components. The approach supports the integration
of legacy and new proprietary components.
Volume
29
Journal Pages
30–36
ISSN (Online)
2199-9201
ISSN (Print)
1619-7623
Journal Article

Experience, consumers, and fit: Disentangling performance implications of preentry technological and market experience in 2G mobile telephony

Organization Science 31 (2): 245–265
J.P. Eggers, Michał Grajek, Tobias Kretschmer (2020)
Subject(s)
Economics, politics and business environment; Strategy and general management; Technology, R&D management
Keyword(s)
Market entry, pre-entry experience, demand-side perspective, information & communication technologies
JEL Code(s)
C51, L10, O33
We offer theory and evidence about how the fit between firm experience (supply side) and consumer preferences (demand side) affects postentry performance into a new technology. Specifically, we explore different types of preentry experience (technological and market experience) and use different aspects of postentry performance to draw inferences about consumer heterogeneity. Preentry technological experience (same product and different consumers) helps firms attract a larger share of intensive users (aligning with early adopters) but only if they enter the market early when these adopters make decisions. Preentry market experience (different product and same consumers) helps firms attract a larger share of lighter users, consistent with characterizations of mass market users. Exploiting different components of firm performance in the global second-generation mobile telecommunications industry (average usage intensity and market penetration) allows us to articulate and identify the paths and mechanisms that allow preentry experience to affect postentry performance. The theory as well as important theoretical boundary conditions have implications for research on preentry experience, demand-side heterogeneity, and industry evolution.
© 2019, INFORMS
Volume
31
Journal Pages
245–265
Journal Article

Illiquidity and the measurement of stock price synchronicity

Contemporary Accounting Research 37 (1): 419–456
Joachim Gassen, Hollis Ashbaugh Skaife, David Veenman (2020)
Subject(s)
Finance, accounting and corporate governance
Keyword(s)
Stock price synchronicity, price informativeness, illiquidity, zero returns, corporate transparency, sell-side analysts, control variables, fixed effects, nonlinearity
JEL Code(s)
G12, G14, G15, M40, N20
Volume
37
Journal Pages
419–456
ISSN (Online)
1911-3846
ISSN (Print)
0823-9150
Book Chapter

The history of multinational military operations and contemporary legal challenges

In The 'Legal Pluriverse' surrounding multinational military operations, edited by Robin Geiß, Heike Krieger, Oxford: Oxford University Press.
Henning Christian Lahmann, Heike Krieger, Robin Geiß (2020)
Subject(s)
Unspecified
Keyword(s)
multinational military operations, peace enforcement, peacekeeping, laws of armed conflict, United Nations, coalition warfare, international human rights, status-of-forces agreements, state responsibility
Secondary Title
The 'Legal Pluriverse' surrounding multinational military operations
ISBN
9780198842965
Conference Proceeding

Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance

Lecture Notes in Computer Science (LNCS) 11833: 40–54
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin (2020)
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40–54