Skip to main content
🔍︎
Program
Topic · Experience level
🎚︎
Program
Programs
Topic
Topics
Experience
Experience level
cancel
Meine Favoriten
Menu

Publication database

Picture of various books and publications
Filter
ESMT Case Study

Turn the ship around! (B)

ESMT Case Study No. ESMT-317-0176-1
Jan U. Hagen, L. David Marquet (2017)
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Empowerment, intend-based leadership, leading teams, participative leadership, directive leadership, command and control leadership, motivation, leader-follower principle
The two-part case study describes two attempts to empower the crews of two nuclear submarines of the US Navy. The case highlights the challenges as well as the weaknesses and strengths of the empowering process. While not against the operational principle of command and control on board a submarine, empowerment is in contrast to the traditional leadership doctrine of the US Navy which relies on the leader-follower principle. The case is based on the personal account of co-author L. David Marquet, Captain, US Navy (Ret.) and former commander of the USS Santa Fe. He authored the bestselling book Turn the Ship Around! that provides a more detailed account of the events described in the A and B cases.
The case may be used in the leadership courses in MBA and executive education programs. Apart from the main objective of highlighting the principle of empowerment, instructors may also explore how to motivate individuals and groups in critical settings. The instructor may ask executives to reflect on their own leadership experiences. On the whole, the case may be used to address the following subjects: (1) empowerment, (2) inquiry, (3) leadership styles, (4) motivation, (5) followership, (6) team management, and (7) situational leadership.
buy nowbuy nowbuy now
Journal Article

Why some crowdsourcing efforts work and others don't

Harvard Business Review
Linus Dahlander, Henning Piezunka (2017)
Subject(s)
Economics, politics and business environment; Finance, accounting and corporate governance
Keyword(s)
Crowd sourcing, open innovation, attention, suggestions, ideation, openness, user innovation, success bias, social media
JEL Code(s)
O00
Organizations strive to tap into the potential of crowdsourcing by asking people around the world to come up with ideas. But what makes crowdsourcing work? We conducted a large-scale research project to understand why some organizations succeed to attract crowds and others fail.
ISSN (Print)
0017-8012
Journal Article

What every business leader should know and do about digital

Cutter Business Technology Journal 30 (1): 6–13
Joe Peppard, John Thorp (2017)
Subject(s)
Information technology and systems
Volume
30
Journal Pages
6–13
Book Chapter

Hardware obfuscation: Techniques and open challenges

In Foundations of hardware IP protection, edited by Lilian Bossuet, Lionel Torres, 105–123. New York, NY: Springer International Publishing.
Georg T. Becker, Marc Fyrbiak, Christian Kison (2017)
Subject(s)
Information technology and systems
Keyword(s)
Reverse-engineering, hardware obfuscation, IP-protection, camouflage gates, obfuscation, control flow obfuscation
Secondary Title
Foundations of hardware IP protection
Pages
105–123
ISBN
978-3-319-50378-3
ISBN (Online)
978-3-319-50380-6
Journal Article

The open innovation research landscape: Established perspectives and emerging themes across different levels of analysis

Industry and Innovation 24 (1): 8–40
Marcel Bogers, Ann-Kristin Zobel, Allan Afuah, Esteve Almirall, Sabine Brunswicker, Linus Dahlander, Lars Frederiksen et al. (2017)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
open innovation, review, research, theory, contingencies, knowledge, collaboration
JEL Code(s)
D83, O30
This paper provides an overview of the main perspectives and themes emerging in research on open innovation (OI). The paper is the result of a collaborative process among several OI scholars – having a common basis in the recurrent Professional Development Workshop on “Researching Open Innovatio” at the Annual Meeting of the Academy of Management. In this paper, we present opportunities for future research on OI, organised at different levels of analysis. We discuss some of the contingencies at these different levels, and argue that future research needs to study OI – originally an organisational-level phenomenon – across multiple levels of analysis. While our integrative framework allows comparing, contrasting and integrating various perspectives at different levels of analysis, further theorising will be needed to advance OI research. On this basis, we propose some new research categories as well as questions for future research – particularly those that span across research domains that have so far developed in isolation.
Volume
24
Journal Pages
8–40
DSI Industrial & Policy Recommendations Series (IPR)

Vulnerabilities in IT-security products

DSI Industrial & Policy Recommendations Series (IPR) 2017 (1)
Sandro Gaycken (2017)
Subject(s)
Technology, R&D management
Keyword(s)
IT security products, IT security, IT-sec industry, industrial recommendations, hacking
In October 2016, the Digital Society Institute hosted a workshop dedicated to the topic of vulnerabilities at large and in particular of vulnerabilities in security products. The workshop included talks from Thomas Dullien (former Google Project Zero), Matthias Luft (ERNW), Dr. Christoph Peylo (T-Labs) and a comment from Michael Kranawetter, (Head of Information Security Microsoft Germany).
Volume
2017
Working Paper

Will German banks earn their cost of capital?

Deutsche Bundesbank Discussion Paper No. 01/2017
Andreas Dombret, Yalin Gündüz, Jörg Rocholl (2017)
Subject(s)
Economics, politics and business environment; Finance, accounting and corporate governance
Keyword(s)
German banking sector, low interest period, profitability, hidden and open reserves
JEL Code(s)
G21, G28
Pages
27
ESMT Working Paper

Pricing when customers have limited attention

ESMT Working Paper No. 16-01 (R2)
Tamer Boyaci, Yalçın Akçay (2017)
Subject(s)
Product and operations management
Keyword(s)
Pricing, choice behavior, rational inattention, information acquisition, signaling game

 

View all ESMT Working Papers in the ESMT Working Paper Series here. ESMT Working Papers are also available via SSRN, RePEc, EconStor, and the German National Library (DNB).

Pages
41
ISSN (Print)
1866–3494
Journal Article

Bitstream Fault Injections (BiFI) – Automated fault attacks against SRAM-based FPGAs

IEEE Transactions on Computers PP (99): 1–13
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar (2017)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Bitstream encryption vulnerability, FPGA security, bitstream fault injection, automated key recovery, AES
Volume
PP
Journal Pages
1–13
Journal Article

Sustainability lessons from the front lines

MIT Sloan Management Review 58 (2): 71–78
CB Bhattacharya, Paul Polman (2017)
Subject(s)
Ethics and social responsibility
Keyword(s)
Business models, leading change, sustainability initiatives, sustainability strategy
Volume
58
Journal Pages
71–78
Chatbox