Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (2,950) Arrow Down
Filter Results: (2,950) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (2,950)
    • People  (8)
    • News  (754)
    • Research  (1,598)
    • Events  (5)
    • Multimedia  (18)
  • Faculty Publications  (1,009)

Show Results For

  • All HBS Web  (2,950)
    • People  (8)
    • News  (754)
    • Research  (1,598)
    • Events  (5)
    • Multimedia  (18)
  • Faculty Publications  (1,009)
← Page 10 of 2,950 Results →
  • 14 Dec 2022
  • News

4 Strategies to Secure a Corporate Board Seat

  • Spring–Summer 1993
  • Article

Securities Underwriting and Investment Banking Competition in the US

By: Samuel Hayes and Andrew D. Regan
Citation
Related
Hayes, Samuel, and Andrew D. Regan. "Securities Underwriting and Investment Banking Competition in the US." Journal of International Securities Markets 7 (Spring–Summer 1993): 91–104.
  • 07 Oct 2008
  • Working Paper Summaries

Securing Online Advertising: Rustlers and Sheriffs in the New Wild West

Keywords: by Benjamin G. Edelman; Advertising
  • 15 Apr 2009
  • News

Harvard University Secures New Source of Funding for International Graduate and Professional Students

    How Much Is a Seat on the UN Security Council Worth?

    Ten of the fifteen seats on the U.N. Security Council are held by rotating members serving two-year terms. We find that a country's U.S. aid increases by 59 percent and its U.N. aid by 8 percent when it rotates onto the council. This effect increases during years in... View Details

    • March 2022
    • Article

    How to Prioritize the Improvement of Open-Source Software Security

    By: Frank Nagle
    Keywords: Open Source Distribution; Cybersecurity; Applications and Software
    Citation
    Read Now
    Related
    Nagle, Frank. "How to Prioritize the Improvement of Open-Source Software Security." Brookings TechStream (March 2022).
    • 01 Apr 2020
    • News

    White-Collar Job Security Exposes Huge Gap With Service Industry

    • March 2022 (Revised June 2022)
    • Case

    The United States National Security Apparatus, Multipolarity, and the Rise of Commercial Space

    By: Matthew C. Weinzierl and Brendan L. Rosseau
    In 2019, the U.S. national security community crossed a Rubicon by declaring that space was “a war-fighting domain” and undergoing a major reorganization, including the creation of the U.S. Space Force, the first new military branch in over 70 years. Military and... View Details
    Keywords: War; National Security; International Relations; Power and Influence
    Citation
    Educators
    Purchase
    Related
    Weinzierl, Matthew C., and Brendan L. Rosseau. "The United States National Security Apparatus, Multipolarity, and the Rise of Commercial Space ." Harvard Business School Case 722-063, March 2022. (Revised June 2022.)
    • 20 Mar 2021
    • News

    US security focus on Chinese state ownership is not productive, advisory panel is told

    • 12 Oct 2016
    • News

    The real reason companies don't take security seriously: Their money isn't on the line

    • October 2024
    • Article

    On Why Women-owned Businesses Take More Time to Secure Microloans

    By: Goran Calic, Moren Lévesque and Anton Shevchenko
    Examining gender differences in business financing reveals important dimensions on which women- and men-owned businesses differ. Although considerable progress has been made in understanding gender differences in mobilizing resources, the role of time in business... View Details
    Keywords: Microfinance; Gender; Financing and Loans; Equality and Inequality; Risk and Uncertainty; Decision Choices and Conditions; Entrepreneurship
    Citation
    Find at Harvard
    Register to Read
    Related
    Calic, Goran, Moren Lévesque, and Anton Shevchenko. "On Why Women-owned Businesses Take More Time to Secure Microloans." Small Business Economics 63, no. 3 (October 2024): 917–938.
    • April 2009
    • Teaching Note

    UBS and Auction Rate Securities (TN) (A), (B), and (C)

    By: Shawn A. Cole, Daniel Baird Bergstresser and Siddharth Bhaskar Shenai
    Teaching Note for [209119], [209131], and [209135]. View Details
    Keywords: Financial Services Industry
    Citation
    Purchase
    Related
    Cole, Shawn A., Daniel Baird Bergstresser, and Siddharth Bhaskar Shenai. "UBS and Auction Rate Securities (TN) (A), (B), and (C)." Harvard Business School Teaching Note 209-122, April 2009.
    • 2002
    • Other Unpublished Work

    Investment Banking and Security Market Development: Does Finance Follow Industry?

    By: Bharat Anand and Alexander Galetovic
    Citation
    Read Now
    Related
    Anand, Bharat, and Alexander Galetovic. "Investment Banking and Security Market Development: Does Finance Follow Industry?" 2002.
    • 29 Sep 2020
    • Blog Post

    New Life for Old Tech: Startup Provides Network Security Solutions for Obsolete Devices

    MRI machines play a critical role in hospital operations. Yet, like other legacy devices that typically have decades-long life cycles, MRI machines are likely to have been purchased long before network or device security were top of mind.... View Details
    • 10 Jun 2017
    • News

    How big data helped secure Emmanuel Macron’s astounding victory

    • May 2022
    • Case

    TikTok and National Security: Investment in an Age of Data Sovereignty?

    By: Jeremy Friedman, Sarah Bauerle Danzman and David Lane
    This case covers TikTok’s purchase of Musical.ly and the reaction of the United States government, including the review of the purchase by the Committee on Foreign Investment in the United States (CFIUS) and the reaction of the presidential administration of Donald... View Details
    Keywords: Data Security; Mergers and Acquisitions; Cybersecurity; Internet and the Web; International Relations; Laws and Statutes; Globalized Firms and Management
    Citation
    Educators
    Purchase
    Related
    Friedman, Jeremy, Sarah Bauerle Danzman, and David Lane. "TikTok and National Security: Investment in an Age of Data Sovereignty?" Harvard Business School Case 722-020, May 2022.
    • 04 Mar 2016
    • Research & Ideas

    Is E-commerce at Risk in Apple's Security Dispute with the FBI?

    on who should bear the costs of cracking an iPhone. Is it Apple’s moral and fiscal responsibility to cooperate with national security at stake? Is the FBI’s request an overreach? And what implications does the case have for e-commerce, an... View Details
    Keywords: Re: Sunil Gupta; Technology
    • Research Summary

    What Makes the Bonding Stick? A Natural Experiment Testing the Legal Bonding Hypothesis

    On March 29, 2010, the U.S. Supreme Court signaled its intention to geographically limit the reach of the U.S. securities antifraud regime and thus differentially exclude U.S.-listed foreign firms from the ambit of formal U.S. antifraud enforcement. We use this legal... View Details
    Keywords: Securities Litigation; Corporate Governance
    • 01 Jun 2017
    • News

    Ink: Home Cooking, Secure Retirements, and Restoring Humanity to Finance

    The Bookshelf Travel maven Zhang Mei (MBA 1996), founder of WildChina, on her new travelogue (and recipe collection) and two other literary escapes for the armchair adventurer NEW Travels Through Dali with a Leg of Ham by Zhang Mei “People always want to know how I get... View Details
    • July 16, 2015
    • Article

    How Small Businesses Can Fend Off Hackers

    By: Lou Shipley
    If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
    Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
    Citation
    Register to Read
    Related
    Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
    • ←
    • 10
    • 11
    • …
    • 147
    • 148
    • →
    ǁ
    Campus Map
    Harvard Business School
    Soldiers Field
    Boston, MA 02163
    →Map & Directions
    →More Contact Information
    • Make a Gift
    • Site Map
    • Jobs
    • Harvard University
    • Trademarks
    • Policies
    • Accessibility
    • Digital Accessibility
    Copyright © President & Fellows of Harvard College.