Filter Results:
(2,950)
Show Results For
- All HBS Web
(2,950)
- People (8)
- News (754)
- Research (1,598)
- Events (5)
- Multimedia (18)
- Faculty Publications (1,009)
Show Results For
- All HBS Web
(2,950)
- People (8)
- News (754)
- Research (1,598)
- Events (5)
- Multimedia (18)
- Faculty Publications (1,009)
- 14 Dec 2022
- News
4 Strategies to Secure a Corporate Board Seat
- Spring–Summer 1993
- Article
Securities Underwriting and Investment Banking Competition in the US
By: Samuel Hayes and Andrew D. Regan
- 07 Oct 2008
- Working Paper Summaries
Securing Online Advertising: Rustlers and Sheriffs in the New Wild West
How Much Is a Seat on the UN Security Council Worth?
Ten of the fifteen seats on the U.N. Security Council are held by rotating members serving two-year terms. We find that a country's U.S. aid increases by 59 percent and its U.N. aid by 8 percent when it rotates onto the council. This effect increases during years in... View Details
- March 2022
- Article
How to Prioritize the Improvement of Open-Source Software Security
By: Frank Nagle
Nagle, Frank. "How to Prioritize the Improvement of Open-Source Software Security." Brookings TechStream (March 2022).
- 01 Apr 2020
- News
White-Collar Job Security Exposes Huge Gap With Service Industry
- March 2022 (Revised June 2022)
- Case
The United States National Security Apparatus, Multipolarity, and the Rise of Commercial Space
By: Matthew C. Weinzierl and Brendan L. Rosseau
In 2019, the U.S. national security community crossed a Rubicon by declaring that space was “a war-fighting domain” and undergoing a major reorganization, including the creation of the U.S. Space Force, the first new military branch in over 70 years. Military and... View Details
Weinzierl, Matthew C., and Brendan L. Rosseau. "The United States National Security Apparatus, Multipolarity, and the Rise of Commercial Space ." Harvard Business School Case 722-063, March 2022. (Revised June 2022.)
- October 2024
- Article
On Why Women-owned Businesses Take More Time to Secure Microloans
By: Goran Calic, Moren Lévesque and Anton Shevchenko
Examining gender differences in business financing reveals important dimensions on which women- and men-owned businesses differ. Although considerable progress has been made in understanding gender differences in mobilizing resources, the role of time in business... View Details
Keywords: Microfinance; Gender; Financing and Loans; Equality and Inequality; Risk and Uncertainty; Decision Choices and Conditions; Entrepreneurship
Calic, Goran, Moren Lévesque, and Anton Shevchenko. "On Why Women-owned Businesses Take More Time to Secure Microloans." Small Business Economics 63, no. 3 (October 2024): 917–938.
- April 2009
- Teaching Note
UBS and Auction Rate Securities (TN) (A), (B), and (C)
By: Shawn A. Cole, Daniel Baird Bergstresser and Siddharth Bhaskar Shenai
Teaching Note for [209119], [209131], and [209135]. View Details
Keywords: Financial Services Industry
- 2002
- Other Unpublished Work
Investment Banking and Security Market Development: Does Finance Follow Industry?
By: Bharat Anand and Alexander Galetovic
Anand, Bharat, and Alexander Galetovic. "Investment Banking and Security Market Development: Does Finance Follow Industry?" 2002.
- 29 Sep 2020
- Blog Post
New Life for Old Tech: Startup Provides Network Security Solutions for Obsolete Devices
MRI machines play a critical role in hospital operations. Yet, like other legacy devices that typically have decades-long life cycles, MRI machines are likely to have been purchased long before network or device security were top of mind.... View Details
- 10 Jun 2017
- News
How big data helped secure Emmanuel Macron’s astounding victory
- May 2022
- Case
TikTok and National Security: Investment in an Age of Data Sovereignty?
By: Jeremy Friedman, Sarah Bauerle Danzman and David Lane
This case covers TikTok’s purchase of Musical.ly and the reaction of the United States government, including the review of the purchase by the Committee on Foreign Investment in the United States (CFIUS) and the reaction of the presidential administration of Donald... View Details
Keywords: Data Security; Mergers and Acquisitions; Cybersecurity; Internet and the Web; International Relations; Laws and Statutes; Globalized Firms and Management
Friedman, Jeremy, Sarah Bauerle Danzman, and David Lane. "TikTok and National Security: Investment in an Age of Data Sovereignty?" Harvard Business School Case 722-020, May 2022.
- 04 Mar 2016
- Research & Ideas
Is E-commerce at Risk in Apple's Security Dispute with the FBI?
on who should bear the costs of cracking an iPhone. Is it Apple’s moral and fiscal responsibility to cooperate with national security at stake? Is the FBI’s request an overreach? And what implications does the case have for e-commerce, an... View Details
- Research Summary
What Makes the Bonding Stick? A Natural Experiment Testing the Legal Bonding Hypothesis
On March 29, 2010, the U.S. Supreme Court signaled its intention to geographically limit the reach of the U.S. securities antifraud regime and thus differentially exclude U.S.-listed foreign firms from the ambit of formal U.S. antifraud enforcement. We use this legal... View Details
- 01 Jun 2017
- News
Ink: Home Cooking, Secure Retirements, and Restoring Humanity to Finance
The Bookshelf Travel maven Zhang Mei (MBA 1996), founder of WildChina, on her new travelogue (and recipe collection) and two other literary escapes for the armchair adventurer NEW Travels Through Dali with a Leg of Ham by Zhang Mei “People always want to know how I get... View Details
- July 16, 2015
- Article
How Small Businesses Can Fend Off Hackers
By: Lou Shipley
If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).