Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (635) Arrow Down
Filter Results: (635) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (635)
    • People  (2)
    • News  (151)
    • Research  (369)
    • Events  (3)
    • Multimedia  (5)
  • Faculty Publications  (164)

Show Results For

  • All HBS Web  (635)
    • People  (2)
    • News  (151)
    • Research  (369)
    • Events  (3)
    • Multimedia  (5)
  • Faculty Publications  (164)
← Page 2 of 635 Results →
  • 2012
  • Journal Article

EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks

By: Frank Nagle, Lisa Singh and Aris Gkoulalas-Divanis
Citation
Related
Nagle, Frank, Lisa Singh, and Aris Gkoulalas-Divanis. "EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks." Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) (2012): 359–370.
  • 2017
  • Working Paper

Exploring the Relationship between Architecture Coupling and Software Vulnerabilities: A Google Chrome Case

By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Dan Sturtevant and Lee Doolan
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and has proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings.... View Details
Keywords: Software; Architecture; Coupling; Vulnerabilities; Applications and Software; Complexity; Measurement and Metrics
Citation
Read Now
Related
Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Dan Sturtevant, and Lee Doolan. "Exploring the Relationship between Architecture Coupling and Software Vulnerabilities: A Google Chrome Case." Harvard Business School Working Paper, No. 17-078, February 2017.
  • 25 Aug 2013
  • News

El impacto del ahorro en los sectores más vulnerables

  • 2019
  • Flash Talks

Finsta: A Mental Health Resource for the Modern Age: What happens when authenticity and vulnerability meet performance?

  • 17 Jun 2016
  • News

Invisibilia: How Learning To Be Vulnerable Can Make Life Safer

  • 21 Jun 2021
  • News

The World Relies on One Chip Maker in Taiwan, Leaving Everyone Vulnerable

  • 13 Nov 2018
  • News

Is Democracy Today As Vulnerable As It Was During World War I?

  • June 2020
  • Article

In Generous Offers I Trust: The Effect of First-offer Value on Economically Vulnerable Behaviors

By: M. Jeong, J. Minson and F. Gino
Negotiation scholarship espouses the importance of opening a bargaining situation with an aggressive offer, given the power of first offers to shape concessionary behavior and outcomes. In our research, we identify a surprising consequence to this common prescription.... View Details
Keywords: Attribution; Interpersonal Interaction; Judgment; Social Interaction; Inference; Open Data; Open Materials; Preregistered; Negotiation Offer; Strategy; Behavior; Interpersonal Communication; Trust; Outcome or Result
Citation
Find at Harvard
Related
Jeong, M., J. Minson, and F. Gino. "In Generous Offers I Trust: The Effect of First-offer Value on Economically Vulnerable Behaviors." Psychological Science 31, no. 6 (June 2020): 644–653.
  • 2014
  • Other Article

Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers

By: Ryann Elizabeth Manning, Julie Battilana and Lakshmi Ramarajan
Social movements challenge institutions through two related communication processes: articulating collective action frames and constructing collective movement identity. We argue that frames not only express movement identity, but also provide openings through which... View Details
Keywords: Identity Threat; Institutional Change; Social Movements; Framing; Social Issues; Identity; Organizational Culture; Change
Citation
Find at Harvard
Related
Manning, Ryann Elizabeth, Julie Battilana, and Lakshmi Ramarajan. "Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers." Academy of Management Annual Meeting Proceedings (2014): 453–458.
  • June 2014
  • Article

Pitfalls and Fraud in Online Advertising Metrics: What Makes Advertisers Vulnerable to Cheaters, and How They Can Protect Themselves

By: Benjamin Edelman
How does online advertising become less effective than advertisers expect and less effective than measurements indicate? The current research explores problems that result, in part, from malfeasance by outside perpetrators who overstate their efforts to increase their... View Details
Keywords: Online Advertising; Measurement; Mismeasurement; Fraud; Invisible; Digital Marketing; Misleading and Fraudulent Advertising; Marketing Strategy
Citation
Find at Harvard
Read Now
Related
Edelman, Benjamin. "Pitfalls and Fraud in Online Advertising Metrics: What Makes Advertisers Vulnerable to Cheaters, and How They Can Protect Themselves." Journal of Advertising Research 54, no. 2 (June 2014): 127–132.
  • 1992
  • Other Unpublished Work

Vulnerability Assessment of Accelerated Sea Level Rise: Case Study: Majuro Atoll, Marshall islands

By: P. Holthus, M. Crawford, C. Makroro and S. Sullivan
Citation
Read Now
Related
Holthus, P., M. Crawford, C. Makroro, and S. Sullivan. "Vulnerability Assessment of Accelerated Sea Level Rise: Case Study: Majuro Atoll, Marshall islands." South Pacific Regional Environment Programme, Apia, Western Samoa, December 1992. (Funded by the United States National Oceanic and Atmospheric Administration (NOAA).)
  • September 19, 2017
  • Article

After Equifax Breach, Companies Advised to Review Open-Source Software Code

By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
Citation
Register to Read
Related
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
  • 2020
  • White Paper

Vulnerabilities in the Core: Preliminary Report and Census II of Open Source Software

By: Frank Nagle, Jessica Wilkerson, James Dana and Jennifer L. Hoffman
Citation
Read Now
Related
Nagle, Frank, Jessica Wilkerson, James Dana, and Jennifer L. Hoffman. "Vulnerabilities in the Core: Preliminary Report and Census II of Open Source Software." Linux Foundation Core Infrastructure Initiative, Linux Foundation, February 2020.
  • 1998
  • Chapter

Economic Performance, Strategic Position, and Vulnerability to Ecological Pressures among U.S. Interstate Motor Carriers

By: Jack A. Nickerson and Brian S. Silverman
Keywords: Truck Transportation; Environmental Management; Competitive Strategy; Performance; Shipping Industry; United States
Citation
Find at Harvard
Purchase
Related
Nickerson, Jack A., and Brian S. Silverman. "Economic Performance, Strategic Position, and Vulnerability to Ecological Pressures among U.S. Interstate Motor Carriers." In Disciplinary Roots of Strategic Management Research. Vol. 15, edited by Joel A. C. Baum, 37–61. Advances in Strategic Management. Greenwich, CT: JAI Press, 1998.
  • Video

2019 G&WS: Francesca Ely-Spence (Stripe) Presents Flash Talk: “Finsta: A Mental Health Resource for the Modern Age: What happens when authenticity and vulnerability meet performance?”

  • 06 Apr 2020
  • News

How to “Boost” Productivity and Engagement in a Remote Work Environment, According To A Successful Remote-First Company

  • 21 Mar 2024
  • Blog Post

SVMP Gave Me the Courage to Fail

Clicking the submit button on my Summer Venture in Management Program (SVMP) application felt like an act of courage, one that left me feeling vulnerable and open to rejection, a sentiment likely shared by many of my peers. As we each... View Details
  • 29 Jan 2024
  • Research & Ideas

Do Disasters Rally Support for Climate Action? It's Complicated.

Environmental disasters like wildfires can ignite awareness of climate change and boost eco-friendly politicians’ careers. But do voters perceive a tradeoff between environmental policies and local economic growth? In Brazil, home to a majority of the Amazon tropical... View Details
Keywords: by Rachel Layne
  • 20 Apr 2020
  • Blog Post

Introducing LivelyHood, A Volunteer Nonprofit Founded in Response to COVID-19

center was ending its daily food service for the elderly. She wondered how these vulnerable people would get food. And another classmate, Merrill, posted to Facebook to see if anybody in his hometown could help pick up groceries for his... View Details
  • 23 Mar 2022
  • News

Why Global Supply Chains May Never Be the Same - A WSJ Documentary

  • ←
  • 2
  • 3
  • …
  • 31
  • 32
  • →
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.