Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (512) Arrow Down
Filter Results: (512) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (512)
    • News  (113)
    • Research  (235)
    • Events  (3)
    • Multimedia  (12)
  • Faculty Publications  (148)

Show Results For

  • All HBS Web  (512)
    • News  (113)
    • Research  (235)
    • Events  (3)
    • Multimedia  (12)
  • Faculty Publications  (148)
← Page 2 of 512 Results →
  • Research Summary

Marketing and Privacy Concerns

When finer consumer information becomes available, competing firms sometimes target consumers too finely, disrupting scale economies prematurely. This leads to excessive product variety or to the wasteful exclusion of certain consumer types. This paper suggests that... View Details
  • June 2013
  • Article

What Is Privacy Worth?

By: Alessandro Acquisti, Leslie K. John and George Loewenstein
Understanding the value that individuals assign to the protection of their personal data is of great importance for business, law, and public policy. We use a field experiment informed by behavioral economics and decision research to investigate individual privacy... View Details
Keywords: Safety; Rights; Valuation; Ethics; Identity
Citation
Find at Harvard
Read Now
Related
Acquisti, Alessandro, Leslie K. John, and George Loewenstein. "What Is Privacy Worth?" Journal of Legal Studies 42, no. 2 (June 2013): 249–274.
  • 2013
  • Chapter

Privacy Breach Analysis in Social Networks

By: Frank Nagle
Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
Citation
Find at Harvard
Purchase
Related
Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
  • 01 Jan 2014
  • News

Competing with Privacy

  • 01 Dec 2003
  • News

Selling Digital Privacy

If regulation won’t stop privacy invasion, what will? HBS professor John Deighton has an answer that involves convincing companies to pay us consumers to use our private information. Instead of relying on regulators to protect our View Details
Keywords: Colleges, Universities, and Professional Schools; Educational Services
  • 19 May 2020
  • News

Why Privacy Notices Turn Off Shoppers

    The Privacy Paradox

    Ever sent an indiscreet selfie? Disclosed private data online? Agreed to terms and conditions without reading them through? If you have, Leslie John knows the reason why. View Details
    • 23 Nov 2019
    • News

    Big Tech and Data Privacy

    • Web

    Privacy Notice | About

    Privacy Notice This Privacy Notice applies to www.hbs.edu and other Harvard Business School websites that link to this Privacy Notice (the “Sites”). Harvard Business School... View Details
    • 18 May 2007
    • Working Paper Summaries

    An Empirical Approach to Understanding Privacy Valuation

    Keywords: by Luc Wathieu & Allan Friedman
    • Research Summary

    An Empirical Approach to Understanding Privacy Valuation

    The purpose of this research is to detect the presence of sophisticated economic motives behind individual concerns for privacy. Recent theories of privacy demands in commercial contexts have assumed an economically aware and sophisticated consumer, capable of... View Details
    • 22 Apr 2013
    • Working Paper Summaries

    Competing with Privacy

    Keywords: by Ramon Casadesus-Masanell & Andres Hervas-Drane; Publishing
    • 13 Feb 2024
    • Cold Call Podcast

    Apple’s Dilemma: Balancing Privacy and Safety Responsibilities

    Keywords: Re: Nien-he Hsieh & Henry W. McGee
    • Article

    How to Use Heuristics for Differential Privacy

    By: Seth Neel, Aaron Leon Roth and Zhiwei Steven Wu
    We develop theory for using heuristics to solve computationally hard problems in differential privacy. Heuristic approaches have enjoyed tremendous success in machine learning, for which performance can be empirically evaluated. However, privacy guarantees cannot be... View Details
    Citation
    Read Now
    Related
    Neel, Seth, Aaron Leon Roth, and Zhiwei Steven Wu. "How to Use Heuristics for Differential Privacy." Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS) 60th (2019).
    • 13 Apr 2020
    • Working Paper Summaries

    The Bulletproof Glass Effect: When Privacy Notices Backfire

    Keywords: by Aaron R. Brough, David A. Norton, and Leslie John
    • 02 Mar 2016
    • What Do You Think?

    Is Apple’s Real Privacy Challenge Technology Innovation Itself?

    Is the Discussion of Infotech Security versus Privacy a Waste of Time? Summing Up Discussion of this month’s question devolved into a debate about the usual issues: privacy versus security, Apple versus the... View Details
    Keywords: by James Heskett; Technology
    • 21 Oct 2010
    • News

    Harvard Business School Faculty on Facebook and Privacy

    • Web

    Privacy Statement (English) - Global

    PRIVACY POLICY OF HBS ERC 1. INTRODUCTION This is the privacy policy of Centre de Recherche Européen de la Harvard Business School (HBS Europe Research Center), located at 62 rue François 1er, 75008 Paris,... View Details
    • Article

    The Role of Interactivity in Local Differential Privacy

    By: Matthew Joseph, Jieming Mao, Seth Neel and Aaron Leon Roth
    We study the power of interactivity in local differential privacy. First, we focus on the difference between fully interactive and sequentially interactive protocols. Sequentially interactive protocols may query users adaptively in sequence, but they cannot return to... View Details
    Citation
    Read Now
    Related
    Joseph, Matthew, Jieming Mao, Seth Neel, and Aaron Leon Roth. "The Role of Interactivity in Local Differential Privacy." Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS) 60th (2019).
    • 21 May 2010
    • News

    Facebook, MySpace Confront Privacy Loophole

    • ←
    • 2
    • 3
    • …
    • 25
    • 26
    • →
    ǁ
    Campus Map
    Harvard Business School
    Soldiers Field
    Boston, MA 02163
    →Map & Directions
    →More Contact Information
    • Make a Gift
    • Site Map
    • Jobs
    • Harvard University
    • Trademarks
    • Policies
    • Accessibility
    • Digital Accessibility
    Copyright © President & Fellows of Harvard College.