Skip to main content

Publication records

Report

Cybersecurity international: Unterschiedliche Prioritäten [International cybersecurity: Different priorities]

In Digitalpolitik: Eine Einführung, edited by Lorena Jaume-Palasí, Julia Pohle, Matthias Spielkamp, 19–26. Berlin: Wikimedia.
Isabel Skierka (2017)
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, National Security, Human Rights, Conflicts
Secondary Title
Digitalpolitik: Eine Einführung
Pages
19–26
Report

The security of components: An evaluation of physical and logical attacks

NXP
This proprietary study was commissioned by NXP.
Sandro Gaycken, Georg T. Becker (2017)
Subject(s)
Technology, R&D management
Other

Die Sicherheit Deutschlands wird auch im Internet verteidigt

Internationale Politik und Gesellschaft 2017 (4)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Volume
2017
DSI Industrial & Policy Recommendations Series (IPR)

Crypto-debate: Strategies for responsible behavior of law enforcement and intelligence agencies on matters of cryptography, vulnerabilities and tools

DSI Industrial & Policy Recommendations Series (IPR) 2017 (3)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Cryptograpy, intelligence agencies, IT security law, IT security regulation, industrial recommendations
JEL Code(s)
O30, O33, O38
In January 2017, the Digital Society Institute hosted a workshop on the “Crypto-debate: Strategies for responsible dealings with security agencies on matters of cryptography, vulnerabilities and tools.” Dr. Stefan Grosse (Federal Ministry of the Interior), Ralf Koenzen (Lancom Systems), Linus Neumann (Chaos Computer Club) and Stefan Heumann (Stiftung Neue Verantwortung) contributed to the workshop.
This issue contains German text and English translation in one file.
Volume
2017
Other

7 'must do's' for successful luxury goods marketing

Forbes India April
Francine Espinoza Petersen (2017)
Subject(s)
Marketing
Keyword(s)
Chanel, Louis Vuiiton, luxury, marketing, brands
In luxury brand management, most industry players have realized that experiences are essential. However, most of what we know about designing customer experiences originates from work developed with and for mass brands. Luxury brands are an entirely different proposition – and require a very specific approach to brand management and marketing. After extensive research of the market in collaboration with Pernod Ricard, here are the seven things brands need to focus on in order to design and market a true luxury experience.
Other

The EU now regulates Internet services. But what does that mean, exactly?

European Business Review March
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Big data & analytics, business mobility, E-Commerce, Internet of Things
Online article

How to hide bad news

Forbes India March
Subject(s)
Strategy and general management
Keyword(s)
Organizations, crisis, BASF, Volkswagen
DSI Industrial & Policy Recommendations Series (IPR)

Requirements for data protection and IT security law regarding technology development

DSI Industrial & Policy Recommendations Series (IPR) 2017 (2)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
data protection, privacy, IT security law, IT security regulation, industrial recommendations, EU General Data Protection Regulation (GDPR), cyberthreats
JEL Code(s)
O30, O33, O38
In December 2016, the Digital Society Institute hosted a workshop on requirements to create a compatibility of data protection and IT security regulation. Contributions to the workshop were given by Marit Hansen (ULD Schleswig-Holstein), Tomasz Lawicki (TeleTrusT working group “State of the Art Technology”), Steve Ritter (BSI) and Johannes Schlattmann (LVM).
The issue contains German text and English translation in one file.
Volume
2017
DSI Industrial & Policy Recommendations Series (IPR)

Vulnerabilities in IT-security products

DSI Industrial & Policy Recommendations Series (IPR) 2017 (1)
Subject(s)
Technology, R&D management
Keyword(s)
IT security products, IT security, IT-sec industry, industrial recommendations, hacking
In October 2016, the Digital Society Institute hosted a workshop dedicated to the topic of vulnerabilities at large and in particular of vulnerabilities in security products. The workshop included talks from Thomas Dullien (former Google Project Zero), Matthias Luft (ERNW), Dr. Christoph Peylo (T-Labs) and a comment from Michael Kranawetter, (Head of Information Security Microsoft Germany).
Volume
2017
Conference Proceeding

Behavior of charismatic leaders and follower's attributional style, shared vision, and acceptance

Academy of Management Proceedings 2017 (1)
Lloyd Humphreys, Konstantin Korotov, Laura Guillén (2017)
Subject(s)
Human resources management/organizational behavior; Management sciences, decision sciences and quantitative methods; Strategy and general management
Keyword(s)
Attributional style, charismatic leadership, shared vision
As charismatic leaders are more inclined to have personality traits predisposing them to unconventional, extreme and sometimes self- destructive behavior, there is a question of how those behaviors affect the followers, namely their acceptance of the leader and their willingness to share the leader’s vision. This study explores the interface between potential followers’ attribution of causes of positive and negative behavior of charismatic leaders, and the connection between the leader and followers through shared vision. The study proposes a measure to explore how the followers make attributions of positive or negative events for charismatic and non-charismatic leaders, and the extent to which they are likely to share the vision of a charismatic or a non-charismatic leader using a sample of real business executives. The study finds that the respondents are significantly more likely to share the vision of the charismatic leader, particularly following negative events involving the latter, and are significantly more likely to view negative behavior as less important, more acceptable and more caused by personal reasons. Charismatic leaders may be better able to ‘weather the storm’ when negative events happen compared to the non-charismatic ones. The paper concludes with a suggestion for a new maintenance model of charismatic leadership.
Volume
2017
ISSN (Online)
2151-6561
ISSN (Print)
0065-0668