Academic articles
Practitioner articles
Working papers
Books
Book chapters
Case studies
Other publications
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Empowerment, intend-based leadership, leading teams, participative leadership, directive leadership, command and control leadership, motivation, leader-follower principle
The two-part case study describes two attempts to empower the crews of two nuclear submarines of the US Navy. The case highlights the challenges as well as the weaknesses and strengths of the empowering process. While not against the operational principle of command and control on board a submarine, empowerment is in contrast to the traditional leadership doctrine of the US Navy which relies on the leader-follower principle. The case is based on the personal account of co-author L. David Marquet, Captain, US Navy (Ret.) and former commander of the USS Santa Fe. He authored the bestselling book Turn the Ship Around! that provides a more detailed account of the events described in the A and B cases.
The case may be used in the leadership courses in MBA and executive education programs. Apart from the main objective of highlighting the principle of empowerment, instructors may also explore how to motivate individuals and groups in critical settings. The instructor may ask executives to reflect on their own leadership experiences. On the whole, the case may be used to address the following subjects: (1) empowerment, (2) inquiry, (3) leadership styles, (4) motivation, (5) followership, (6) team management, and (7) situational leadership.
buy now | buy now | buy now |
Subject(s)
Economics, politics and business environment; Finance, accounting and corporate governance
Keyword(s)
Crowd sourcing, open innovation, attention, suggestions, ideation, openness, user innovation, success bias, social media
JEL Code(s)
O00
Organizations strive to tap into the potential of crowdsourcing by asking people around the world to come up with ideas. But what makes crowdsourcing work? We conducted a large-scale research project to understand why some organizations succeed to attract crowds and others fail.
ISSN (Print)
0017-8012
Subject(s)
Information technology and systems
Volume
30
Journal Pages
6–13
Subject(s)
Information technology and systems
Keyword(s)
Reverse-engineering, hardware obfuscation, IP-protection, camouflage gates, obfuscation, control flow obfuscation
Secondary Title
Foundations of hardware IP protection
Pages
105–123
ISBN
978-3-319-50378-3
ISBN (Online)
978-3-319-50380-6
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
open innovation, review, research, theory, contingencies, knowledge, collaboration
JEL Code(s)
D83, O30
This paper provides an overview of the main perspectives and themes emerging in research on open innovation (OI). The paper is the result of a collaborative process among several OI scholars – having a common basis in the recurrent Professional Development Workshop on “Researching Open Innovatio” at the Annual Meeting of the Academy of Management. In this paper, we present opportunities for future research on OI, organised at different levels of analysis. We discuss some of the contingencies at these different levels, and argue that future research needs to study OI – originally an organisational-level phenomenon – across multiple levels of analysis. While our integrative framework allows comparing, contrasting and integrating various perspectives at different levels of analysis, further theorising will be needed to advance OI research. On this basis, we propose some new research categories as well as questions for future research – particularly those that span across research domains that have so far developed in isolation.
Volume
24
Journal Pages
8–40
Subject(s)
Technology, R&D management
Keyword(s)
IT security products, IT security, IT-sec industry, industrial recommendations, hacking
In October 2016, the Digital Society Institute hosted a workshop dedicated to the topic of vulnerabilities at large and in particular of vulnerabilities in security products. The workshop included talks from Thomas Dullien (former Google Project Zero), Matthias Luft (ERNW), Dr. Christoph Peylo (T-Labs) and a comment from Michael Kranawetter, (Head of Information Security Microsoft Germany).
Volume
2017
Subject(s)
Economics, politics and business environment; Finance, accounting and corporate governance
Keyword(s)
German banking sector, low interest period, profitability, hidden and open reserves
JEL Code(s)
G21, G28
Pages
27
Subject(s)
Product and operations management
Keyword(s)
Pricing, choice behavior, rational inattention, information acquisition, signaling game
View all ESMT Working Papers in the ESMT Working Paper Series here. ESMT Working Papers are also available via SSRN, RePEc, EconStor, and the German National Library (DNB).
Pages
41
ISSN (Print)
1866–3494
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Bitstream encryption vulnerability, FPGA security, bitstream fault injection, automated key recovery, AES
Volume
PP
Journal Pages
1–13
Subject(s)
Ethics and social responsibility
Keyword(s)
Business models, leading change, sustainability initiatives, sustainability strategy
Volume
58
Journal Pages
71–78