Skip to main content

Die Anfälligkeit der deutschen Wirtschaft in einer digitalisierten Welt

  • Chapter
  • First Online:
Wirtschaftsschutz in der Praxis

Part of the book series: Sicherheit – interdisziplinäre Perspektiven ((SIIP))

  • 2916 Accesses

Zusammenfassung

Die Sicherheitslage der deutschen Wirtschaft hat sich in den vergangenen Jahren rasant geändert. Divergente Kräfte forcieren eine Fragmentierung der Sicherheitsstrategien der beteiligten Akteure, obwohl gerade jetzt Zusammenarbeit mehr denn je gefordert ist. Dieser veränderten Risikolage ist daher mit nachhaltigen Führungsmodellen, strategischer Personalentwicklung sowie einem systematischen Stakeholderansatz zu begegnen.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Literatur

  • Abolhassan, F. (2017). Security: The real challenge for digitalization. In: Cyber security. Simply. make it happen (S. 1–11). Springer.

    Google Scholar 

  • Annosi, M. C., Martini, A., Brunetta, F., & Marchegiani, L. (2020). Learning in an agile setting: A multilevel research study on the evolution of organizational routines. Journal of Business Research, 110, 554–566.

    Google Scholar 

  • Aranda, C., Arellano, J., & Davila, A. (2017). Organizational learning in target setting. Academy of Management Journal, 60(3), 1189–1211.

    Article  Google Scholar 

  • Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts. Prentice hall.

    Google Scholar 

  • Berger, A., & Brandi, C.  (2018). The G20 summit and the future of the world trade organization. Deutsches Institut für Entwicklungspolitik (DIE).

    Google Scholar 

  • Bhatia, S., & Ryan, A. M. (2018). Hiring for the win: Game-based assessment in employee selection.

    Google Scholar 

  • Bondarenko, V. M., Ilyin, I. V., & Korotayev, A. V. (2017). Transition to a new global paradigm of development and the role of the United Nations in this process. World Futures, 73(8), 511–538.

    Article  Google Scholar 

  • Bundeskriminalamt. Wirtschaftskriminalität. Bundeslagebild 2019. Wiesbaden.

    Google Scholar 

  • Cabric, M. (2017). From corporate security to commercial force: A business leader’s guide to security economics. Butterworth-Heinemann.

    Google Scholar 

  • Cameron, K. (2015). Organizational effectiveness. Organizational Behaviour, 11, 1–4.

    Google Scholar 

  • Cavelty, M. D., & Balzacq, T. (2016). Routledge handbook of security studies. Routledge.

    Google Scholar 

  • Christensen, C. M., McDonald, R., Altman, E. J., & Palmer, J. (2016). Disruptive innovation: Intellectual history and future paths. Harvard Business School Cambridge.

    Google Scholar 

  • Cozzolino, A. (2019). Reconfiguring the state: Executive powers, emergency legislation, and neoliberalization in Italy. Globalizations, 16(3), 336–352.

    Article  Google Scholar 

  • Cruess, S. R., Cruess, R. L., & Steinert, Y. (2019). Supporting the development of a professional identity: General principles. Medical teacher, 41(6), 641–649.

    Article  Google Scholar 

  • Deitelhoff, N., & Wolf, K. D. (2010). Corporate security responsibility? Springer.

    Google Scholar 

  • Doh, J. P., & Quigley, N. R. (2014). Responsible leadership and stakeholder management: Influence pathways and organizational outcomes. Academy of Management Perspectives, 28(3), 255–274.

    Article  Google Scholar 

  • Dolgui, A., Ivanov, D., & Sokolov, B. (2020). Reconfigurable supply chain: The X-network. International Journal of Production Research, 58(13), 4138–4163.

    Article  Google Scholar 

  • Dutton, J. E., Roberts, L. M., & Bednar, J. (2010). Pathways for positive identity construction at work: Four types of positive identity and the building of social resources. Academy of Management Review, 35(2), 265–293.

    Google Scholar 

  • Edwards, C. (2019). Legislation new laws: Is technology running away from the law? Engineering & Technology, 14(2), 26–31.

    Article  Google Scholar 

  • Endreß, C., & Petersen, N. (2012). Die Dimensionen des Sicherheitsbegriffs. Bundeszentrale für politische Bildung.

    Google Scholar 

  • Fedder, F. O. et al. (2013). Wirtschaftskriminalität. In: Globale Herausforderungen. Chancen und Risiken für unsere Zukunft. Security Explorer (S. 263–306).

    Google Scholar 

  • Fleischer, D. (2019). Wirtschaftskriminelles Verhalten von Innentätern. In: Wirtschaftsschutz in der Praxis (S. 257–281). Springer.

    Google Scholar 

  • Flint, C., & Zhu, C. (2019). The geopolitics of connectivity, cooperation, and hegemonic competition: The belt and road initiative. Geoforum, 99, 95–101.

    Article  Google Scholar 

  • Foroohar, R. (2019). Don’t be evil: The case against big tech. Penguin UK.

    Google Scholar 

  • Freeman, R. E. (2010). Strategic management: A stakeholder approach. Cambridge university press.

    Google Scholar 

  • Freiling, J. (2013). Resource-based View Und Ökonomische Theorie: Grundlagen Und Positionierung des Ressourcenansatzes. Springer.

    Google Scholar 

  • Gibb, J., Sune, A., & Albers, S. (2017). Network learning: Episodes of interorganizational learning towards a collective performance goal. European Management Journal, 35(1), 15–25.

    Article  Google Scholar 

  • Gray, J., & Rumpe, B. (2015). Models for digitalization. Springer.

    Google Scholar 

  • Gundel, S. (2020). Global Security. Sicherheit bei Auslands- und Reisetätigkeiten. Boorberg.

    Google Scholar 

  • Halibozek, E., & Kovacich, G. L. (2017). The manager’s handbook for corporate security: Establishing and managing a successful assets protection program. Butterworth-Heinemann.

    Google Scholar 

  • Hameiri, S., & Jones, L. (2018). China Challenges Global Governance? Chinese International Development Finance and the AIIB. International Affairs, 94(3), 573–593.

    Article  Google Scholar 

  • Harari, Y. N. (2018). 21 lessons for the 21st century. Random House.

    Google Scholar 

  • Heath, J. (2009). The uses and abuses of agency theory. Business Ethics Quarterly, 19(4), 497–528.

    Article  Google Scholar 

  • Heldt, E. C. (2018). Lost in internal evaluation? Accountability and insulation at the world bank. Contemporary Politics, 24(5), 568–587.

    Article  Google Scholar 

  • Hertz, S. G., & Krettenauer, T. (2016). Does moral identity effectively predict moral behavior?: A meta-analysis. Review of General Psychology, 20(2), 129–140.

    Article  Google Scholar 

  • Hoch, J. E., Bommer, W. H., Dulebohn, J. H., Wu., & Dongyuan. (2018). Do ethical, authentic, and servant leadership explain variance above and beyond transformational leadership? A meta-analysis. Journal of Management, 44(2), 501–529.

    Google Scholar 

  • Hogg, M. A., Knippenberg, D. V., & Rast, D. E. (2012). The social identity theory of leadership: theoretical origins, research findings, and conceptual developments. European Review of Social Psychology 23(1), 258–304.

    Google Scholar 

  • Hogg, M. A., & Rinella, M. J. (2018). Social identities and shared realities. Current opinion in psychology, 23, 6–10.

    Article  Google Scholar 

  • Hogg, M. A., & Wagoner, J. A. (2017). Uncertainty–identity Theory. The International Encyclopedia of Intercultural Communication, 1–9.

    Google Scholar 

  • Jang, J., McSparren, J., & Rashchupkina, Y. (2016). Global governance: Present and future. Palgrave Communications, 2(1), 1–5.

    Article  Google Scholar 

  • Kahnemann, D. (2017). Thinking. Macmillan.

    Google Scholar 

  • Kashyap, R., & Piersson, A. D. (2018). Impact of big data on security. In Handbook of Research on Network Forensics and Analysis Techniques. IGI Global (S. 283–299).

    Google Scholar 

  • Komenda, T., Reisinger, G., & Sihn, W. (2019). A practical approach of teaching digitalization and safety strategies in cyber-physical production systems. Procedia manufacturing, 31, 296–301.

    Article  Google Scholar 

  • KPMG. (2020). Wirtschaftskriminalität in Deutschland: Im Spannungsfeld. 2020

    Google Scholar 

  • Kratochvíl, P., & Sychra, Z. (2019). The end of democracy in the EU? the Eurozone crisis and the EU’s democratic deficit. Journal of European Integration, 41(2), 169–185.

    Article  Google Scholar 

  • Li, Y. (2020). Non-monetary incentives in organizations. Ph.D. diss., Wellesley College.

    Google Scholar 

  • Linville, P. W. (1987). Self-complexity as a cognitive buffer against stress-related illness and depression. Journal of personality and social psychology, 52(4), 663.

    Google Scholar 

  • Lippert, B., & Perthes, V. (2020). Strategische Rivalität zwischen USA Und China: Worum Es Geht, was Es Für Europa (Und Andere) Bedeutet.

    Google Scholar 

  • Maak, T., & Pless, N. M. (2006). Responsible leadership in a stakeholder society – A relational perspective. Journal of Business Ethics, 66(1), 99–115.

    Article  Google Scholar 

  • Münkler, H. et al. (Hrsg.) Sicherheit und Risiko. Über den Umgang mit Gefahr im 21. Jahrhundert (S. 11–34). Bielefeld.

    Google Scholar 

  • Neue Zürcher Zeitung. (2019). Handelskriege, Protektionismus, Globalisierung: Wie es im Welthandel weitergeht. https://www.nzz.ch/wirtschaft/handelskriege-protektionismus-globalisierung-wie-es-im-welthandel-weitergeht-ld.1512630. Zugegriffen: 2. März 2021.

  • Ohlhausen, P. E., Mcgarvey, D., & Ohlhausen, P. E. (2018). The use of metrics to manage enterprise security risks: Understanding, evaluation and persuasion. Journal of business continuity & emergency planning, 12(1), 6–16.

    Google Scholar 

  • Park, S. (2018). The role of government in science and technology legislation to prepare for the era of artificial intelligence. International Institute of Social and Economic Sciences.

    Google Scholar 

  • Petersen, K. L. (2013). The corporate security professional: A hybrid agent between corporate and national security. Security Journal, 26(3), 222–235.

    Article  Google Scholar 

  • Petri, F., Sassenrath, C., Rieck, C., Jung L., Ulrich, L-M., Tüngler, P. (2020). Strategische Außenpolitik. Die Geopolitische Rolle Deutschlands in Zeiten Globaler Großmachtrivalitäten. Konrad Adenauer Stiftung

    Google Scholar 

  • Pradetto, A. (2017). Die Ukraine, Russland Und Der Westen: Die Inszenierung Einer Krise Als Geopolitischer Konflikt. In: M. Staack (Hrsg.), Der Ukraine Konflikt, Russland und die europäische Sicherheitsordnung (S. 21). Opladen–Berlin–Toronto.

    Google Scholar 

  • Schillemans, T., & Bjurstrøm, K. H. (2019). Trust and verification: Balancing agency and stewardship theory in the governance of agencies. International Public Management Journal, 23(5), 1–35.

    Google Scholar 

  • Sharma, N., & Singh, R. K. (2019). AA unified model of organizational effectiveness. Journal of Organizational Effectiveness: People and Performance, 6(2), 114–128.

    Article  Google Scholar 

  • Smith, C., & Brooks, D. J. (2012). Security science: The theory and practice of security. Butterworth-Heinemann.

    Google Scholar 

  • Sorokin, P. (2017). Social and cultural dynamics: A study of change in major systems of art, truth, ethics. Routledge.

    Book  Google Scholar 

  • Sperling, J., & Webber, M. (2020). North Atlantic Treaty Organization (NATO) and the European Union. In Oxford Research Encyclopedia of Politics.

    Google Scholar 

  • Strejcek, G., & Theil, M. (2003). Technology push, legislation pull? E-government in the European Union. Decision Support Systems, 34(3), 305–313.

    Article  Google Scholar 

  • Taleb, N. N. (2012). Antifragile: Things that gain from disorder. Random House Incorporated.

    Google Scholar 

  • Voegtlin, C., Patzer, M., & Scherer, A. G. (2012). Responsible leadership in global business: A new approach to leadership and its multi-level outcomes. Journal of Business Ethics, 105(1), 1–16.

    Google Scholar 

  • Walby, K., & Lippert, R. K. (2015). Municipal corporate security in international perspective. In: Municipal Corporate Security in International Context (S. 125–142). Routledge.

    Google Scholar 

  • Wagner, V. (2019). Sicherheit ist das Fundament für Vertrauen in die Digitalisierung von Wirtschaft und Gesellschaft. In: Wirtschaftsschutz in der Praxis – Positionen zur Unternehmenssicherheit und Kriminalprävention in der Wirtschaft (S. 41–63). Springer.

    Google Scholar 

  • Whelan, C. (2017). Managing dynamic security networks: Towards the strategic managing of cooperation, coordination and collaboration. Security Journal, 30(1), 310–327.

    Article  Google Scholar 

  • Yoshino, F. (2020). Transformation of Asian business: From industrialization to digitalization. In: Management for sustainable and inclusive development in a transforming Asia (S. 1–23). Springer.

    Google Scholar 

  • Zhu, W., Riggio, R. E., Avolio, B. J., & Sosik, J. J. (2011). The effect of leadership on follower moral identity: Does transformational/transactional style make a difference? Journal of Leadership & Organizational Studies, 18(2), 150–163.

    Article  Google Scholar 

  • Zürn, M. (2018). Contested global governance. Global Policy, 9(1), 138–145.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Endreß .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Der/die Autor(en), exklusiv lizenziert durch Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Endreß, C., Hennies, P. (2022). Die Anfälligkeit der deutschen Wirtschaft in einer digitalisierten Welt. In: Vogt, C., Hennies, P., Endreß, C., Peters, P. (eds) Wirtschaftsschutz in der Praxis. Sicherheit – interdisziplinäre Perspektiven. Springer, Wiesbaden. https://doi.org/10.1007/978-3-658-35123-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-35123-6_7

  • Published:

  • Publisher Name: Springer, Wiesbaden

  • Print ISBN: 978-3-658-35122-9

  • Online ISBN: 978-3-658-35123-6

  • eBook Packages: Social Science and Law (German Language)

Publish with us

Policies and ethics