Match!
Marcus Matthias Keupp
ETH Zurich
73Publications
10H-index
1,229Citations
Publications 73
Newest
#1Dimitri Percia David (Military Academy)H-Index: 1
#2Dimitri Percia David (Military Academy)H-Index: 1
Last.Patrick Hofstetter (UZH: University of Zurich)H-Index: 1
view all 4 authors...
The Swiss Armed Forces are suffering from a structural deficit of militia officers despite good pay and a general supportive attitude in the population. Whereas, prior studies have focused on motivation to explain understaffing in armed forces, we offer an alternative approach based on opportunity cost. We model decision alternatives both within and outside a military organization, taking private sector employment as the reference point. We then monetize opportunity costs of leisure, fringe bene...
#1Marcus Matthias Keupp (ETH Zurich)H-Index: 10
Die heutigen militarischen Organisationen sind keine privaten Unternehmungen, sondern Teil der modernen Nationalstaaten und daher in deren burokratische Verwaltung integriert. In okonomischer Hinsicht werden sie daher nach planwirtschaftlichen Grundsatzen gefuhrt. Ignoriert die okonomische Analyse dieses fundamentale Problem, so erzeugt sie nicht nur falsche Schlussfolgerungen, sondern auch irrelevante Handlungsempfehlungen.
#1Marcus Matthias Keupp (ETH Zurich)H-Index: 10
Ob und inwiefern die erzeugten militarischen Fahigkeiten tatsachlich die doktrinaren Ziele durchsetzen konnen, ist in Friedenszeiten unbekannt. Erst der tatsachliche Konflikt schafft eine Umgebung, in der die Effektivitat militarischer Fahigkeiten unter Beweis gestellt werden muss. Wendet man die evolutionare Theorie (Hannan und Freeman 1984; Burgelman 1991) auf militarische Organisationen an, so bevolkern diese eine Selektionsumgebung, innerhalb derer sie miteinander in Wettbewerb stehen. In di...
#1Alain Mermoud (HEC Lausanne)H-Index: 1
#2Marcus Matthias Keupp (HSG: University of St. Gallen)H-Index: 10
Last.Dimitri Percia David (HEC Lausanne)H-Index: 1
view all 5 authors...
Security information sharing (SIS) is an activity whereby individuals exchange information that is relevant to analyze or prevent cybersecurity incidents. However, despite technological advances and increased regulatory pressure, individuals still seem reluctant to share security information. Few contributions have addressed this conundrum to date. Adopting an interdisciplinary approach, our study proposes a behavioral framework that theorizes how and why human behavior and SIS may be associated...
#1Marcus Matthias Keupp (ETH Zurich)H-Index: 10
Effektivitat ist eine notwendige, nicht aber eine hinreichende Bedingung fur die Beurteilung militarischer Leistung. Denn die okonomische Analyse der Leistungserstellung umfasst nicht nur die Frage der Effektivitat, d.h. ob und inwiefern die Leistungsziele erreicht wurden. Es kommt ebenso auf die Effizienz der Leistung an, d.h. auf das Verhaltnis von Leistungsergebnis und Ressourceneinsatz.
#1Marcus Matthias Keupp (ETH Zurich)H-Index: 10
Grundsatzlich kann jedes okonomische System auf zwei Arten reformiert werden: Durch Veranderungen innerhalb des Institutionenbestandes oder durch dessen Ablosung (Buchanan und Tullock 1962; Buchanan 1990). Eine militarische Organisation kann daher versuchen, Reformen innerhalb des planwirtschaftlichen Systems umzusetzen, oder dieses System zugunsten eines alternativen Systems aufgeben. Innerhalb des planwirtschaftlichen Systems sind Reformen jedoch nur begrenzt moglich.
#1Maximilian Palmié (HSG: University of St. Gallen)H-Index: 5
#2Peter Huerzeler (HSG: University of St. Gallen)
Last.Oliver Gassmann (HSG: University of St. Gallen)H-Index: 44
view all 5 authors...
Recent research suggests that effectuation principles such as flexibility, precommitments, and affordable loss may differ substantially from one another. Responding to the call to clarify the effectuation concept, our study introduces the distinction between promotion- and prevention-focused effectuation principles. It argues that promotion-focused (prevention-focused) principles are positively (negatively) associated with a firm's entrepreneurial orientation (EO). It further argues that causati...
#1Alain Mermoud (UNIL: University of Lausanne)H-Index: 1
#2Marcus Matthias Keupp (HSG: University of St. Gallen)H-Index: 10
Last.Dimitri Percia David (UNIL: University of Lausanne)H-Index: 1
view all 3 authors...
Empirical studies have analyzed the incentive mechanisms for sharing security information between human agents, a key activity for critical infrastructure protection. However, recent research shows that most Information Sharing and Analysis Centers do not perform optimally, even when properly regulated. Using a meso-level of analysis, we close an important research gap by presenting a theoretical framework that links institutional economics and security information sharing. We illustrate this fr...
#1Anh PhamH-Index: 3
#2Alain Mermoud (HEC Lausanne)H-Index: 1
Last.Jean-Pierre HubauxH-Index: 70
view all 6 authors...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between human agents working in institutions. We present an incentive-based SIS system model that is empirically tested with an exclusive dataset. The data was collected with an online questionnaire addressed to all participants of a deployed Information Sharing and Analysis Center (ISAC) that operates in the context of critical infrastructure protection (N=262). SIS is measured with a multidimensional ap...
Oct 10, 2016 in CRITIS (Critical Information Infrastructures Security)
#1Dimitri Percia David (UNIL: University of Lausanne)H-Index: 1
#2Marcus Matthias Keupp (UNIL: University of Lausanne)H-Index: 1
Last.Alain Mermoud (UNIL: University of Lausanne)H-Index: 1
view all 4 authors...
We propose an extension of the Gordon-Loeb model by considering multi-periods and relaxing the assumption of a continuous security breach probability function. Such adaptations allow capturing dynamic aspects of information security investment such as the advent of a disruptive technology and its consequences. In this paper, the case of big data analytics (BDA) and its disruptive effects on information security investment is theoretically investigated. Our analysis suggests a substantive decreas...
12345678