Zusammenfassung
Die Sicherheitslage der deutschen Wirtschaft hat sich in den vergangenen Jahren rasant geändert. Divergente Kräfte forcieren eine Fragmentierung der Sicherheitsstrategien der beteiligten Akteure, obwohl gerade jetzt Zusammenarbeit mehr denn je gefordert ist. Dieser veränderten Risikolage ist daher mit nachhaltigen Führungsmodellen, strategischer Personalentwicklung sowie einem systematischen Stakeholderansatz zu begegnen.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Literatur
Abolhassan, F. (2017). Security: The real challenge for digitalization. In: Cyber security. Simply. make it happen (S. 1–11). Springer.
Annosi, M. C., Martini, A., Brunetta, F., & Marchegiani, L. (2020). Learning in an agile setting: A multilevel research study on the evolution of organizational routines. Journal of Business Research, 110, 554–566.
Aranda, C., Arellano, J., & Davila, A. (2017). Organizational learning in target setting. Academy of Management Journal, 60(3), 1189–1211.
Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts. Prentice hall.
Berger, A., & Brandi, C. (2018). The G20 summit and the future of the world trade organization. Deutsches Institut für Entwicklungspolitik (DIE).
Bhatia, S., & Ryan, A. M. (2018). Hiring for the win: Game-based assessment in employee selection.
Bondarenko, V. M., Ilyin, I. V., & Korotayev, A. V. (2017). Transition to a new global paradigm of development and the role of the United Nations in this process. World Futures, 73(8), 511–538.
Bundeskriminalamt. Wirtschaftskriminalität. Bundeslagebild 2019. Wiesbaden.
Cabric, M. (2017). From corporate security to commercial force: A business leader’s guide to security economics. Butterworth-Heinemann.
Cameron, K. (2015). Organizational effectiveness. Organizational Behaviour, 11, 1–4.
Cavelty, M. D., & Balzacq, T. (2016). Routledge handbook of security studies. Routledge.
Christensen, C. M., McDonald, R., Altman, E. J., & Palmer, J. (2016). Disruptive innovation: Intellectual history and future paths. Harvard Business School Cambridge.
Cozzolino, A. (2019). Reconfiguring the state: Executive powers, emergency legislation, and neoliberalization in Italy. Globalizations, 16(3), 336–352.
Cruess, S. R., Cruess, R. L., & Steinert, Y. (2019). Supporting the development of a professional identity: General principles. Medical teacher, 41(6), 641–649.
Deitelhoff, N., & Wolf, K. D. (2010). Corporate security responsibility? Springer.
Doh, J. P., & Quigley, N. R. (2014). Responsible leadership and stakeholder management: Influence pathways and organizational outcomes. Academy of Management Perspectives, 28(3), 255–274.
Dolgui, A., Ivanov, D., & Sokolov, B. (2020). Reconfigurable supply chain: The X-network. International Journal of Production Research, 58(13), 4138–4163.
Dutton, J. E., Roberts, L. M., & Bednar, J. (2010). Pathways for positive identity construction at work: Four types of positive identity and the building of social resources. Academy of Management Review, 35(2), 265–293.
Edwards, C. (2019). Legislation new laws: Is technology running away from the law? Engineering & Technology, 14(2), 26–31.
Endreß, C., & Petersen, N. (2012). Die Dimensionen des Sicherheitsbegriffs. Bundeszentrale für politische Bildung.
Fedder, F. O. et al. (2013). Wirtschaftskriminalität. In: Globale Herausforderungen. Chancen und Risiken für unsere Zukunft. Security Explorer (S. 263–306).
Fleischer, D. (2019). Wirtschaftskriminelles Verhalten von Innentätern. In: Wirtschaftsschutz in der Praxis (S. 257–281). Springer.
Flint, C., & Zhu, C. (2019). The geopolitics of connectivity, cooperation, and hegemonic competition: The belt and road initiative. Geoforum, 99, 95–101.
Foroohar, R. (2019). Don’t be evil: The case against big tech. Penguin UK.
Freeman, R. E. (2010). Strategic management: A stakeholder approach. Cambridge university press.
Freiling, J. (2013). Resource-based View Und Ökonomische Theorie: Grundlagen Und Positionierung des Ressourcenansatzes. Springer.
Gibb, J., Sune, A., & Albers, S. (2017). Network learning: Episodes of interorganizational learning towards a collective performance goal. European Management Journal, 35(1), 15–25.
Gray, J., & Rumpe, B. (2015). Models for digitalization. Springer.
Gundel, S. (2020). Global Security. Sicherheit bei Auslands- und Reisetätigkeiten. Boorberg.
Halibozek, E., & Kovacich, G. L. (2017). The manager’s handbook for corporate security: Establishing and managing a successful assets protection program. Butterworth-Heinemann.
Hameiri, S., & Jones, L. (2018). China Challenges Global Governance? Chinese International Development Finance and the AIIB. International Affairs, 94(3), 573–593.
Harari, Y. N. (2018). 21 lessons for the 21st century. Random House.
Heath, J. (2009). The uses and abuses of agency theory. Business Ethics Quarterly, 19(4), 497–528.
Heldt, E. C. (2018). Lost in internal evaluation? Accountability and insulation at the world bank. Contemporary Politics, 24(5), 568–587.
Hertz, S. G., & Krettenauer, T. (2016). Does moral identity effectively predict moral behavior?: A meta-analysis. Review of General Psychology, 20(2), 129–140.
Hoch, J. E., Bommer, W. H., Dulebohn, J. H., Wu., & Dongyuan. (2018). Do ethical, authentic, and servant leadership explain variance above and beyond transformational leadership? A meta-analysis. Journal of Management, 44(2), 501–529.
Hogg, M. A., Knippenberg, D. V., & Rast, D. E. (2012). The social identity theory of leadership: theoretical origins, research findings, and conceptual developments. European Review of Social Psychology 23(1), 258–304.
Hogg, M. A., & Rinella, M. J. (2018). Social identities and shared realities. Current opinion in psychology, 23, 6–10.
Hogg, M. A., & Wagoner, J. A. (2017). Uncertainty–identity Theory. The International Encyclopedia of Intercultural Communication, 1–9.
Jang, J., McSparren, J., & Rashchupkina, Y. (2016). Global governance: Present and future. Palgrave Communications, 2(1), 1–5.
Kahnemann, D. (2017). Thinking. Macmillan.
Kashyap, R., & Piersson, A. D. (2018). Impact of big data on security. In Handbook of Research on Network Forensics and Analysis Techniques. IGI Global (S. 283–299).
Komenda, T., Reisinger, G., & Sihn, W. (2019). A practical approach of teaching digitalization and safety strategies in cyber-physical production systems. Procedia manufacturing, 31, 296–301.
KPMG. (2020). Wirtschaftskriminalität in Deutschland: Im Spannungsfeld. 2020
Kratochvíl, P., & Sychra, Z. (2019). The end of democracy in the EU? the Eurozone crisis and the EU’s democratic deficit. Journal of European Integration, 41(2), 169–185.
Li, Y. (2020). Non-monetary incentives in organizations. Ph.D. diss., Wellesley College.
Linville, P. W. (1987). Self-complexity as a cognitive buffer against stress-related illness and depression. Journal of personality and social psychology, 52(4), 663.
Lippert, B., & Perthes, V. (2020). Strategische Rivalität zwischen USA Und China: Worum Es Geht, was Es Für Europa (Und Andere) Bedeutet.
Maak, T., & Pless, N. M. (2006). Responsible leadership in a stakeholder society – A relational perspective. Journal of Business Ethics, 66(1), 99–115.
Münkler, H. et al. (Hrsg.) Sicherheit und Risiko. Über den Umgang mit Gefahr im 21. Jahrhundert (S. 11–34). Bielefeld.
Neue Zürcher Zeitung. (2019). Handelskriege, Protektionismus, Globalisierung: Wie es im Welthandel weitergeht. https://www.nzz.ch/wirtschaft/handelskriege-protektionismus-globalisierung-wie-es-im-welthandel-weitergeht-ld.1512630. Zugegriffen: 2. März 2021.
Ohlhausen, P. E., Mcgarvey, D., & Ohlhausen, P. E. (2018). The use of metrics to manage enterprise security risks: Understanding, evaluation and persuasion. Journal of business continuity & emergency planning, 12(1), 6–16.
Park, S. (2018). The role of government in science and technology legislation to prepare for the era of artificial intelligence. International Institute of Social and Economic Sciences.
Petersen, K. L. (2013). The corporate security professional: A hybrid agent between corporate and national security. Security Journal, 26(3), 222–235.
Petri, F., Sassenrath, C., Rieck, C., Jung L., Ulrich, L-M., Tüngler, P. (2020). Strategische Außenpolitik. Die Geopolitische Rolle Deutschlands in Zeiten Globaler Großmachtrivalitäten. Konrad Adenauer Stiftung
Pradetto, A. (2017). Die Ukraine, Russland Und Der Westen: Die Inszenierung Einer Krise Als Geopolitischer Konflikt. In: M. Staack (Hrsg.), Der Ukraine Konflikt, Russland und die europäische Sicherheitsordnung (S. 21). Opladen–Berlin–Toronto.
Schillemans, T., & Bjurstrøm, K. H. (2019). Trust and verification: Balancing agency and stewardship theory in the governance of agencies. International Public Management Journal, 23(5), 1–35.
Sharma, N., & Singh, R. K. (2019). AA unified model of organizational effectiveness. Journal of Organizational Effectiveness: People and Performance, 6(2), 114–128.
Smith, C., & Brooks, D. J. (2012). Security science: The theory and practice of security. Butterworth-Heinemann.
Sorokin, P. (2017). Social and cultural dynamics: A study of change in major systems of art, truth, ethics. Routledge.
Sperling, J., & Webber, M. (2020). North Atlantic Treaty Organization (NATO) and the European Union. In Oxford Research Encyclopedia of Politics.
Strejcek, G., & Theil, M. (2003). Technology push, legislation pull? E-government in the European Union. Decision Support Systems, 34(3), 305–313.
Taleb, N. N. (2012). Antifragile: Things that gain from disorder. Random House Incorporated.
Voegtlin, C., Patzer, M., & Scherer, A. G. (2012). Responsible leadership in global business: A new approach to leadership and its multi-level outcomes. Journal of Business Ethics, 105(1), 1–16.
Walby, K., & Lippert, R. K. (2015). Municipal corporate security in international perspective. In: Municipal Corporate Security in International Context (S. 125–142). Routledge.
Wagner, V. (2019). Sicherheit ist das Fundament für Vertrauen in die Digitalisierung von Wirtschaft und Gesellschaft. In: Wirtschaftsschutz in der Praxis – Positionen zur Unternehmenssicherheit und Kriminalprävention in der Wirtschaft (S. 41–63). Springer.
Whelan, C. (2017). Managing dynamic security networks: Towards the strategic managing of cooperation, coordination and collaboration. Security Journal, 30(1), 310–327.
Yoshino, F. (2020). Transformation of Asian business: From industrialization to digitalization. In: Management for sustainable and inclusive development in a transforming Asia (S. 1–23). Springer.
Zhu, W., Riggio, R. E., Avolio, B. J., & Sosik, J. J. (2011). The effect of leadership on follower moral identity: Does transformational/transactional style make a difference? Journal of Leadership & Organizational Studies, 18(2), 150–163.
Zürn, M. (2018). Contested global governance. Global Policy, 9(1), 138–145.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Der/die Autor(en), exklusiv lizenziert durch Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Endreß, C., Hennies, P. (2022). Die Anfälligkeit der deutschen Wirtschaft in einer digitalisierten Welt. In: Vogt, C., Hennies, P., Endreß, C., Peters, P. (eds) Wirtschaftsschutz in der Praxis. Sicherheit – interdisziplinäre Perspektiven. Springer, Wiesbaden. https://doi.org/10.1007/978-3-658-35123-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-658-35123-6_7
Published:
Publisher Name: Springer, Wiesbaden
Print ISBN: 978-3-658-35122-9
Online ISBN: 978-3-658-35123-6
eBook Packages: Social Science and Law (German Language)