Publication records
Subject(s)
Marketing
Keyword(s)
Big data
Organizations crowdsource ideas from individuals. Individuals whose ideas are not selected for implementation often stop to interact with the organization and submit not further ideas. We hypothesize that organizations can motivate newcomers to submit further ideas by providing a so far understudied form of feedback: rejections. We draw on theories of interaction rituals and matching to develop theory how rejections foster a bond between individuals and organizations. To test our theory we examine the crowdsourcing of 70,196 organizations who receive ideas from 962,570 individuals. We make use of difference in how rejections are written to disentangle the mechanisms how rejections affect individuals willingness to continue to interact with the organization. We discuss the implications for research on idea crowdsourcing, social bonding, and creative processes.
Volume
Surrey
ISSN (Print)
2638-4892
Subject(s)
Economics, politics and business environment
Research has examined who gains authority in knowledge production communities, but has neglected the community members granting authority. We ask: when do community members engage in the authority granting process and why do they support or oppose a candidate? We theorize that community members willingness to engage in the authority granting process depends on their task similarity. We depart from earlier literature by arguing that task similarity is a two-edged sword as a source of support and opposition, which we explain is related to strategic considerations of the voter. Using a unique dataset of all Wikipedia elections from 2003 to 2014, we study when community members vote and whether they vote in favor or against candidates standing for election for administrator positions.
Volume
Surrey
ISSN (Print)
2638-4892
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
Subject(s)
Ethics and social responsibility; Finance, accounting and corporate governance
Keyword(s)
Corporate governance, human rights, modern slavery, supply chains
Volume
17 Spring 2018
Journal Pages
32–33
Subject(s)
Economics, politics and business environment; Management sciences, decision sciences and quantitative methods
Keyword(s)
Subsidies, efficiency, institutional framework, data envelopment analysis (DEA)
JEL Code(s)
C61, F21, F23, H25
Journal Pages
291–309
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity
The report gives an overview on the current situation on cybersecurity and the political handling of that topic. It also recaps the goals and failures of the last four years and recommends action areas.
Volume
2018
Subject(s)
Marketing; Strategy and general management
Keyword(s)
Competitive advantage, customer segments, product technology, business model, growth options, company’s value, portfolio management, merger & acquisitions, corporate synergies
The paper summarizes the key elements of business strategies as well as corporate strategies and puts them together as a synchronized framework.
Subject(s)
Economics, politics and business environment
Keyword(s)
Vertical restraints, selective distribution, price comparison websites, effect-based approach
Subject(s)
Technology, R&D management
Keyword(s)
Vulnerability, vulnerability equities processes
The report shows that a reporting of vulnerabilities used by the state for active measures is likely to have only a minor effect on the increase in overall technical IT security. On the other hand, the value of the work of the security authorities is in many cases considered high, due to the high tactical enablement against potential malicious actors. The demand of some, that state authorities should refrain from pro-actively exploiting vulnerabilities for active measures therefore does not seem to make much sense; the net effect in security would be negative. Nevertheless, processes can be introduced that allow a more precise assessment and an informed, accountable and cautious handling of offensively used vulnerabilities.
Volume
2017
Subject(s)
Health and environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity, e-health, IoT, safety, medical devices
The healthcare industry is undergoing great technological transformations. Hospitals are going digital and medical devices – whether implanted in patients’ bodies or stationed in hospitals – are equipped with increasing computing power and wireless connectivity. Connected healthcare can offer safer, more efficient, and timely medical service delivery. It also presents great economic opportunities – according to a Roland Berger consultancy firm study, the digital healthcare market is set to grow at average annual growth rates of 21 percent until 2020. Yet, the integration of computing and communication technologies in safety-critical medical systems will expose them to the same network and information security (cyber security) threats as other information technology (IT) systems. Research and real-world incidents have shown that IT security risks in healthcare are systemic. Cyber attacks’ impact on the privacy of patient data has already been established. More recently, their potential impact on patient health and safety has been raising concerns for healthcare organizations, regulators, and medical device manufacturers alike. The management and governance of related risks requires comprehensive standardization, regulation, and best practices to encompass both IT security and safety. DSI has analyzed the convergence of safety and security risks in healthcare and the Internet of Things through a review of the relevant literature, as well as expert interviews and a workshop with representatives from health organizations, medical device manufacturers, IT security experts, safety engineers, regulators, and certification bodies. On this basis, DSI has developed recommendations for policy and industry, which are presented by this paper after a short analysis of the current status of security in connected healthcare.
Volume
2017