Skip to main content
Publication records
Book Chapter
In Handbuch Digitalisierung in Staat und Verwaltung, 2nd ed., edited by Tanja Klenk, Frank Nullmeier, Göttrik Wewer, Wiesbaden: Springer VS.
Subject(s)
Technology, R&D management
Keyword(s)
Digital identity, digitization, public administration, European Union

The book chapter "Digital Identity" in the Handbook "Digitization of the State and Public Administration" analyzes digital identification and authentification technologies and their impact in public administration and society. First, it introduces and defines the concept of digital identity. Second, it gives an overview of the technologies' applications in public administration and beyond. Third, it analyzes their governance and implementation in Europe and Germany. Fourth, it presents perspectives for the future development of digital identity in increasingly networked societies.
Secondary Title
Handbuch Digitalisierung in Staat und Verwaltung
Edition
2nd ed.,
Subject(s)
Economics, politics and business environment
Keyword(s)
Cybersecurity, governance, Brexit, EU-UK relations, European Union, United Kingdom


The book chapter analyzes the EU-UK Trade and Cooperation Agreement's (TCA) Chapter on future thematic cooperation on cybersecurity. It explains the broader political, technological and regulatory context of cybersecurity cooperation at the international and the EU levels. It then analyzes the TCA's passages individually and within this broader context. Finally, it provides an evaluation and outlook on future EU-UK cooperation on cybersecurity.
Secondary Title
Handels- und Kooperationsvertrag EU/GB
ISBN
978-3-8487-7188-2
Book Chapter
In The Oxford Handbook of Cyber Security, edited by Paul Cornish, Oxford: Oxford University Press.
Secondary Title
The Oxford Handbook of Cyber Security
ISBN
9780198800682
Book Chapter
In High Impact Investing: Erfolgsfaktoren für die Finanzierung von Social-Entrepreneurship-Projekten, edited by Bernd Fischl, 69–77. Gräfelfing Munich: Realis Verlag.
Subject(s)
Entrepreneurship; Ethics and social responsibility; Finance, accounting and corporate governance; Strategy and general management
Keyword(s)
Social return on investment, sustainability, high impact investing, social responsibility
Secondary Title
High Impact Investing: Erfolgsfaktoren für die Finanzierung von Social-Entrepreneurship-Projekten
Pages
69–77
ISBN
978-3930048847
Book Chapter
In IT-Sicherheitsrecht, edited by Gerrit Hornung, Martin Schallbruch, Baden-Baden: Nomos.
Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, united nations, use of force, intervention, sovereignty, internet governance, arms control, cyber operations
The chapter summarises the current state of the application of international law to cyberspace and reviews attempts to find consensus among the community of states. While virtually all states agree that international law applies to state conduct in cyberspace, the 'how' remains a hotly contested issue. The chapter focuses on the prohibition of the use of force, the prohibition of intervention, and the principle of sovereignty and assesses their legal status vis-à-vis cyber operations. It follows a brief treatment of further international efforts to increase transnational cybersecurity, such as internet governance and arms control treaties.
Secondary Title
IT-Sicherheitsrecht
ISBN
978-3-8487-5764-0
Book Chapter
In IT-Sicherheitsrecht, edited by Gerrit Hornung, Martin Schallbruch, Baden-Baden: Nomos.
Subject(s)
Information technology and systems; Management sciences, decision sciences and quantitative methods
Keyword(s)
IT security, risk management, certification, audit, ISO 27000, Common Criteria
Dieses Kapitels im Praxishandbuch "IT-Sicherheitsrecht" analysiert Verfahren zur Messung, Prüfung und dem Nachweis von IT-Sicherheit zur Erfüllung von rechtlichen Anforderungen. Zunächst gibt das Kapitel einen Überblick über Prüf-, Bewertungs- und Nachweisverfahren, sowie rechtliche Grundlagen und Zuständigkeiten im IT-Sicherheitsrecht. Anschließend unterscheidet es systematisch zwischen unterschiedlichen Prüf- und Bewertungsebenen bzw. -gegenständen im Sinne der Sicherheit von IT-Systemen in Institutionen und der IT-Sicherheit von Software und Hardware. Im zweiten Abschnitt erläutert es die Messung, Prüfung und den Nachweis von IT-Sicherheit in Institutionen, fasst die einschlägigen Standards für Systeme zum Management von Informationssicherheit zusammen, benennt Methoden zur Messung von IT-Sicherheit innerhalb von Risikoanalysen und erläutert Audits und Zertifizierungen und zeigt anschließend, in welchen Bereichen des IT-Sicherheitsrechts diese Methoden verlangt werden. Der dritte Teil widmet sich der Messung, Prüfung und dem Nachweis von IT-Sicherheit von Software und Hardware, einschließlich IT-Produkten, -Diensten und -Prozessen. Er bietet eine Übersicht über Kriterien zur Messung, Evaluation und Prüfung von Software und Hardware und über Zertifizierungsverfahren. Darauf aufbauend erläutert der Abschnitt, wie diese Verfahren bei der Prüfung und Zertifizierung von IT-Produkten, -Diensten und -Prozessen im allgemeinen und fachspezifischen IT-Sicherheitsrecht zum Einsatz kommen. Ein kurzer abschließender Abschnitt zeigt die Grenzen der bestehenden Ansätze und zukünftige Herausforderungen auf.
Secondary Title
IT-Sicherheitsrecht
ISBN
978-3-8487-5764-0
Book Chapter
In The Oxford Handbook of Social Networks, edited by Ryan Light, James Moody, 71–97. Oxford: Oxford University Press.
James A. Kitts, Eric Quintane (2020)
Subject(s)
Management sciences, decision sciences and quantitative methods
Keyword(s)
Social networks, social interactions, relational events, computational social science, wearable sensors, digital trace data, big data, sentiments
Recent work argued that researchers conceptualize ‘social ties’ in four fundamentally different ways –as socially constructed role relations such as friendship or co-authorship; sentiments such as liking or hatred; interactions such as communication or sex; and access to resources or opportunities. We consider where ties (and non-ties) are likely to correspond across these four concepts, and thus assess where we may apply theories based on one network concept (e.g., sentiment ties of liking and disliking) to data representing another (e.g., interaction as logs of phone calls). Then we discuss empirical lenses emerging from computational social science, such as location-aware devices, electronic calendars, wearable sensors, records of electronic messages, phone calls, or online transactions. We ask how these time-stamped event series correspond to the conventional network concepts above and call for a new analytical approach: Directly theorizing and analyzing the structural-temporal interdependencies of interaction events redirects our attention from structural patterns to social processes.
Secondary Title
The Oxford Handbook of Social Networks
Pages
71–97
ISBN
978-0190251765
Book Chapter
In Advances in Strategic Management, 41 vols. edited by Daniel Tzabbar, Bruno Cirillo, 245–265. Bingley: Emerald Publishing.
Martin C. Goossen, Gianluca Carnabuci (2020)
Subject(s)
Strategy and general management; Technology, R&D management
Prior research suggests that patents by mobile inventors are at higher risk of generating spillovers between departed and hiring firms. Despite extensive research on how inter-firm inventor mobility affects firms' learning and innovation, little is known about how firms protect their existing intellectual property in the face of inter-firm inventor mobility. We argue that one main way in which firms try to prevent others from appropriating the value of these inventions is by extending the validity of mobile inventors' patents. We derive a set of hypotheses consistent with this argument and test them using longitudinal data on four major American semiconductor firms. Our analyses show that, as hypothesized, both departed and hiring firms are more likely to extend the validity of mobile inventors' patents than is the case for the patents of other, non-mobile inventors. Furthermore, in line with the view that firms use patent renewal to deter other firms from appropriating mobile inventors' knowledge, we find this effect to be stronger where the risks of spillovers are most intense. Our findings extend prior literature by explicating the role of patent renewal as a strategic deterrent against intellectual property appropriation in the face of inter-firm inventor mobility.
With permission of Emerald
Secondary Title
Advances in Strategic Management
Pages
245–265
ISBN
978-1-78973-550-5
ISBN (Online)
978-1-78973-549-9
Book Chapter
In Ecosystems Inc.: Understanding, harnessing and developing organizational ecosystems, edited by Stuart Crainer, 25–29. Wargrave: Thinkers50.
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Digital ecosystems, business
Organizations were once linear and one dimensional. No more. The modern organization exists in a multi-dimensional ecosystem sustained by a potent combination of trust, technology and management. Think of Amazon, Alibaba, WeWork, Tencent and Uber. In Ecosystems Inc. some of the world’s leading management thinkers make sense of what it takes to understand, harness and develop organizational ecosystems.
Secondary Title
Ecosystems Inc.: Understanding, harnessing and developing organizational ecosystems
Pages
25–29
ISBN
9781999315764
ISBN (Online)
9781999315771
Book Chapter
In Handbuch Digitalisierung in Staat und Verwaltung, edited by Tanja Klenk, Frank Nullmeier, Göttrik Wewer, 1–12. Wiesbaden: Springer.
Subject(s)
Economics, politics and business environment; Ethics and social responsibility; Information technology and systems; Technology, R&D management
Keyword(s)
Government hacking, police, national security, cybersecurity, information security, vulnerabilities, Verschlüsselung, Computer-Grundrecht, Online-Durchsuchung, staatliches Hacking, Hack-Back Schwachstellen
Governmental hacking has come into the toolbox of the German security authorities - with legal powers for police forces and some intelligence services, with the development of corresponding technologies ("Government Trojan horses") and first deployment experiences. At the same time, government hacking is associated with considerable risks for the individuals concerned and for society at large. Governmental hacking is increasing and will persist. In the long term, it will constitute a major area of conflict between the promotion of information security on the one hand and the disruption of information security on the other.

[Staatliches Hacking ist im Instrumentarium der deutschen Sicherheitsbehörden angekommen – mit gesetzlichen Befugnissen für Polizeien und einige Nachrichtendienste, mit der Entwicklung entsprechender Technologien („Bundestrojaner“) und ersten Einsatzerfahrungen. Gleichzeitig ist staatliches Hacking mit erheblichen Risiken für die Betroffenen und die Gesellschaft insgesamt verbunden. Staatliches Hacking wird zunehmen und sich verstetigen. Es wird dauerhaft ein zentrales Spannungsfeld zwischen der Förderung von IT-Sicherheit auf der einen und der Durchbrechung von IT-Sicherheit auf der anderen Seite darstellen.]
Secondary Title
Handbuch Digitalisierung in Staat und Verwaltung
Pages
1–12
ISBN
978-3-658-23667-0
ISBN (Online)
978-3-658-23668-7