Skip to main content

Publication records

Conference Proceeding

Bonding by rejecting: Organizations feedback to crowdsourced ideas

Academy of Management Global Proceedings Surrey (2018)
Henning Piezunka, Linus Dahlander (2018)
Subject(s)
Marketing
Keyword(s)
Big data
Organizations crowdsource ideas from individuals. Individuals whose ideas are not selected for implementation often stop to interact with the organization and submit not further ideas. We hypothesize that organizations can motivate newcomers to submit further ideas by providing a so far understudied form of feedback: rejections. We draw on theories of interaction rituals and matching to develop theory how rejections foster a bond between individuals and organizations. To test our theory we examine the crowdsourcing of 70,196 organizations who receive ideas from 962,570 individuals. We make use of difference in how rejections are written to disentangle the mechanisms how rejections affect individuals willingness to continue to interact with the organization. We discuss the implications for research on idea crowdsourcing, social bonding, and creative processes.
Volume
Surrey
ISSN (Print)
2638-4892
Conference Proceeding

You shall (not) pass: Who votes for whom in granting authority in online knowledge production communities?

Academy of Management Global Proceedings Surrey (2018)
Linus Dahlander, Helge Klapper, Henning Peizunka (2018)
Subject(s)
Economics, politics and business environment
Research has examined who gains authority in knowledge production communities, but has neglected the community members granting authority. We ask: when do community members engage in the authority granting process and why do they support or oppose a candidate? We theorize that community members willingness to engage in the authority granting process depends on their task similarity. We depart from earlier literature by arguing that task similarity is a two-edged sword as a source of support and opposition, which we explain is related to strategic considerations of the voter. Using a unique dataset of all Wikipedia elections from 2003 to 2014, we study when community members vote and whether they vote in favor or against candidates standing for election for administrator positions.
Volume
Surrey
ISSN (Print)
2638-4892
Conference Proceeding

The governance of safety and security risks in connected healthcare

IET Conference & Seminar Publications CP740
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
Magazine article

Better corporate governance can end slavery in supply chains

Corporate Knights 17 Spring 2018 (2): 32–33
Joanna Radeke, Tammi L. Coles (2018)
Subject(s)
Ethics and social responsibility; Finance, accounting and corporate governance
Keyword(s)
Corporate governance, human rights, modern slavery, supply chains
Volume
17 Spring 2018
Journal Pages
32–33
Conference Proceeding

Analiza efikasnosti institucionalnih okvira za sprovođenje politike subvencionisanja investitora primenom DEA modela [Efficiency analysis of the institutional frameworks for implementing the policy of subsidizing investors by using Data Envelopment Analysis]

Economic policy in Serbia - quality of institutions and economic growth: 291–309
Veljko Bojovic (2018)
Subject(s)
Economics, politics and business environment; Management sciences, decision sciences and quantitative methods
Keyword(s)
Subsidies, efficiency, institutional framework, data envelopment analysis (DEA)
JEL Code(s)
C61, F21, F23, H25
Journal Pages
291–309
DSI Industrial & Policy Recommendations Series (IPR)

Cybersecurity 2018-2020: Proposals for action for the CDU/CSU and SPD

DSI Industrial & Policy Recommendations Series (IPR) 2018 (1)
Martin Schallbruch, Sandro Gaycken, Isabel Skierka (2018)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity
The report gives an overview on the current situation on cybersecurity and the political handling of that topic. It also recaps the goals and failures of the last four years and recommends action areas.
Volume
2018
Teaching material

The essence of strategy

ESMT Publication
Olaf Plötner, Harald Hungenberg (2018)
Subject(s)
Marketing; Strategy and general management
Keyword(s)
Competitive advantage, customer segments, product technology, business model, growth options, company’s value, portfolio management, merger & acquisitions, corporate synergies
The paper summarizes the key elements of business strategies as well as corporate strategies and puts them together as a synchronized framework.
Online article

Price comparison websites and selective distribution systems: An effects-based approach

CompLaw Blog
Theon van Dijk, Hans W. Friederiszick, Ela Głowicka (2017)
Subject(s)
Economics, politics and business environment
Keyword(s)
Vertical restraints, selective distribution, price comparison websites, effect-based approach
DSI Industrial & Policy Recommendations Series (IPR)

Recommendations for the development of vulnerability equities processes

DSI Industrial & Policy Recommendations Series (IPR) 2017 (7)
Subject(s)
Technology, R&D management
Keyword(s)
Vulnerability, vulnerability equities processes
The report shows that a reporting of vulnerabilities used by the state for active measures is likely to have only a minor effect on the increase in overall technical IT security. On the other hand, the value of the work of the security authorities is in many cases considered high, due to the high tactical enablement against potential malicious actors. The demand of some, that state authorities should refrain from pro-actively exploiting vulnerabilities for active measures therefore does not seem to make much sense; the net effect in security would be negative. Nevertheless, processes can be introduced that allow a more precise assessment and an informed, accountable and cautious handling of offensively used vulnerabilities.
Volume
2017
DSI Industrial & Policy Recommendations Series (IPR)

Recommendations for safety and IT security in medical devices

DSI Industrial & Policy Recommendations Series (IPR) 2017 (6)
Subject(s)
Health and environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity, e-health, IoT, safety, medical devices
The healthcare industry is undergoing great technological transformations. Hospitals are going digital and medical devices – whether implanted in patients’ bodies or stationed in hospitals – are equipped with increasing computing power and wireless connectivity. Connected healthcare can offer safer, more efficient, and timely medical service delivery. It also presents great economic opportunities – according to a Roland Berger consultancy firm study, the digital healthcare market is set to grow at average annual growth rates of 21 percent until 2020. Yet, the integration of computing and communication technologies in safety-critical medical systems will expose them to the same network and information security (cyber security) threats as other information technology (IT) systems. Research and real-world incidents have shown that IT security risks in healthcare are systemic. Cyber attacks’ impact on the privacy of patient data has already been established. More recently, their potential impact on patient health and safety has been raising concerns for healthcare organizations, regulators, and medical device manufacturers alike. The management and governance of related risks requires comprehensive standardization, regulation, and best practices to encompass both IT security and safety. DSI has analyzed the convergence of safety and security risks in healthcare and the Internet of Things through a review of the relevant literature, as well as expert interviews and a workshop with representatives from health organizations, medical device manufacturers, IT security experts, safety engineers, regulators, and certification bodies. On this basis, DSI has developed recommendations for policy and industry, which are presented by this paper after a short analysis of the current status of security in connected healthcare.
Volume
2017