Filter Results:
(41)
Show Results For
- All HBS Web (41)
- Faculty Publications (8)
Show Results For
- All HBS Web (41)
- Faculty Publications (8)
- 07 Jan 2015
- What Do You Think?
SUMMING UP: What Are the Limits On Workplace Transparency?
the Internet? How many of us have then received offers for products that we didn't yet know we needed? Organizational transparency today most often is associated with good management practice There is a movement afoot to thwart personal transparency. The market for... View Details
Keywords: by James Heskett
- 27 Jul 2019
- Op-Ed
Does Facebook's Business Model Threaten Our Elections?
with its Messenger, Instagram and WhatsApp acquisitions. This would create an encrypted messaging platform that would emphasize small groups over public content. While that may seem like a step towards privacy it may have the opposite... View Details
Keywords: by George Riedel
- 28 May 2019
- News
Ask the Expert: In Security
implement security systems and services based on what they believe will work best for them and their customers, individual consumers should think carefully about several factors when considering a cloud-security provider: Does the service provider View Details
- 01 Dec 2000
- News
Everything Old Is New Again: The History of Technological Frontiers
noted that the United States has failed in its attempts to protect encryption techniques as a national military asset. Content remains the most difficult area to control and thus promises to be the enduring freedom of this new frontier.... View Details
- 01 Dec 2020
- News
A New Approach to Contact Tracing
Bluetooth in Android and Apple smartphones to determine proximity between people, and thus assess their potential exposure to the coronavirus. A random ID attached to a user’s phone number generates temporary, encrypted IDs. When users’... View Details
- Web
Tips for Working Remotely | Information Technology
device. Attackers are beginning to leverage vulnerabilities in social media apps (WhatsApp, Twitter) to access your entire phone. Secure devices with passcodes or passwords and enable encryption on all your devices. Make sure you've... View Details
- 01 Aug 2002
- News
For Alumni Only: Breakthrough Insights Program Debuts
on Network Associates' efforts to market its encryption software algorithms globally, despite national security concerns raised by the U.S. government. By Tuesday afternoon, participants seemed to have settled back into the classroom... View Details
Keywords: Laura Singleton
- Web
Protecting Data at HBS | Information Technology
to HBS Researchers. Contact HUIT at ithelp@harvard.edu for more information. HBS OneDrive HBS SharePoint HBS SharePoint / Teams HBS Qualtrics Up to Level 4 Harvard Accellion Filetransfer : Outlook Microsoft Purview Message Encryption... View Details
- 07 Jun 2016
- First Look
June 7, 2016
iPhone 6S with enhanced security measures that enflamed a debate on privacy and public safety around the world. The iPhone 6S, amid a heightened concern for privacy following the 2013 revelation of clandestine U.S. surveillance programs, employed a default View Details
Keywords: Sean Silverthorne
- 15 Oct 2001
- Op-Ed
Lessons from the Rubble
policies that reversed the government's historical control over encryption technologies, the complex formulas that allow Internet or cell phone users to scramble, or disguise, their communications. In the late 1990s, the Clinton... View Details
Keywords: by Debora L. Spar
- 13 Feb 2019
- News
We’re All Going to Get Hacked
perfect. Encryption is a common technology that we use for very important protection of information. It’s a very expensive computation. It takes a lot of computer power, a lot of electricity, and it creates a lot of heat, but computers... View Details
- 04 Mar 2016
- Research & Ideas
Is E-commerce at Risk in Apple's Security Dispute with the FBI?
customers and their business. One of their main claims to fame, and what they focused on with tokenization and Apple Pay, is their ability to keep things secure by heavily encrypting the data passing through their devices and systems. If... View Details
- 06 Apr 2016
- What Do You Think?
As Tim Cook, How Would You Tackle Apple's Next Challenge?
(NRF) or encrypted lightwaves. Time is a wasting. Lead or get out of the way.” Is product security a potential distraction for Apple’s leadership? What do you think? Original Column We’ve spent the last month discussing issues associated... View Details
- Web
HBSGrid Terms of Service - Research Computing Services
timeout (i.e. my screensaver will come on within 5 minutes of inactivity) Keep Antivirus and malware software up to date Keep security patches up to date Ensure my computer firewall is active Ensure my computer is encrypted before... View Details
- 01 Sep 2024
- News
Alumni Books
Edited by Margie Kelley Alumni Books 20+ Years of Urban Rebuilding: Lessons from the Revival of Lower Manhattan after 9/11 By Patrice Derrington (MBA 1991) and Rosemary Scanlon (PMD 42, 1981) Routledge Following the destruction of the World Trade Center and the... View Details
- 24 Apr 2020
- Op-Ed
Lessons from the NFL: Virtual Hiring, Leadership, Building Teams and COVID-19
Despite all this, the online draft will certainly not be the same. Apart from the lost entertainment value—NFL draft fashion has become a much-watched spectacle in recent years—there are concerns about potential technical challenges. The draft will be conducted via the... View Details
- 19 Aug 2024
- News
Quantum Leap
portfolios in the blink of an eye. They will crack even the strongest digital encryption codes in seconds rather than centuries. (The day quantum computing becomes a reality is the day conventional digital security ends.) They should even... View Details
- 10 Apr 2018
- First Look
First Look at New Research, April 10, 2018
Case 318-079 Apple: Privacy vs. Safety (B) This case supplements “Apple: Privacy vs. Safety (A),” covering select events in 2017, including a mass shooting in which U.S. law enforcement was not able to access the shooter’s encrypted... View Details
Keywords: Sean Silverthorne