Filter Results:
(66)
Show Results For
- All HBS Web
(124)
- News (30)
- Research (66)
- Multimedia (2)
- Faculty Publications (60)
Show Results For
- All HBS Web
(124)
- News (30)
- Research (66)
- Multimedia (2)
- Faculty Publications (60)
Sort by
- February 2017 (Revised May 2017)
- Case
Rapid7
By: Mitchell Weiss, Paul Gompers and Silpa Kovvali
That Corey Thomas, vice president at Boston-based Rapid7, Inc., was about to enter his investor’s boardroom to negotiate a potential acquisition of Metasploit, LLC, was already an unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate... View Details
- January 2025
- Technical Note
AI vs Human: Analyzing Acceptable Error Rates Using the Confusion Matrix
By: Tsedal Neeley and Tim Englehart
This technical note introduces the confusion matrix as a foundational tool in artificial intelligence (AI) and large language models (LLMs) for assessing the performance of classification models, focusing on their reliability for decision-making. A confusion matrix... View Details
- April 2018
- Case
Cisco Systems and OpenDNS: Strategic Integration
By: Andy Wu, George Gonzalez and David Wang
With more than 72,000 employees and revenues approaching the $50B mark, Cisco Systems is one of the largest information technology and networking firms globally. As the company grew and expanded into different lines of businesses, Cisco consistently looked outwards for... View Details
Keywords: Mergers and Acquisitions; Integration; Corporate Strategy; Change Management; Entrepreneurship; Organizational Culture; Information Technology Industry
Wu, Andy, George Gonzalez, and David Wang. "Cisco Systems and OpenDNS: Strategic Integration." Harvard Business School Case 718-489, April 2018.
- January 2022 (Revised November 2023)
- Supplement
Uber in China (C): The Cost of Success for Didi
By: William C. Kirby and Noah B. Truwit
On June 30, 2021, ride-hailing giant Didi Chuxing (Didi) raised $4.4 billion in its initial public offering (IPO) on the New York Stock Exchange (NYSE), the largest IPO of a Chinese company listed on an American exchange since Alibaba raised $25 billion in 2014.... View Details
Keywords: Uber; Didi Chuxing; Start-up Growth; Regulation; Ride-sharing; Transportation; Business Startups; Business and Government Relations; Cross-Cultural and Cross-Border Issues; Growth and Development; Policy; Competition; Laws and Statutes; Transportation Industry; Technology Industry; China
Kirby, William C., and Noah B. Truwit. "Uber in China (C): The Cost of Success for Didi." Harvard Business School Supplement 322-068, January 2022. (Revised November 2023.)
- 2024
- Working Paper
Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations
By: Raviv Murciano-Goroff, Ran Zhuo and Shane Greenstein
How prevalent are severe software vulnerabilities, how fast do software users respond to the availability of secure versions, and what determines the variance in the installation distribution? Using the largest dataset ever assembled on user updates, tracking server... View Details
Murciano-Goroff, Raviv, Ran Zhuo, and Shane Greenstein. "Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations." NBER Working Paper Series, No. 32696, July 2024.
- April 2021
- Case
Transforming BlackBerry: From Smartphones to Software
By: Ranjay Gulati and Nicole Tempest Keller
On the verge of failure, BlackBerry brought in John Chen as CEO in 2013 to orchestrate a bold turnaround of the company. Once an iconic leader in the smartphone market, BlackBerry was best known for its tactile QWERTY keyboard, strong security, and a focus on business... View Details
Keywords: Pivot; Managing Change; Turnaround; Smartphone; Change Management; Leading Change; Transformation; Organizational Change and Adaptation; Digital Platforms; Change; Information Infrastructure; Applications and Software; Competitive Strategy; Cybersecurity; Technology Industry; Transportation Industry; Canada
Gulati, Ranjay, and Nicole Tempest Keller. "Transforming BlackBerry: From Smartphones to Software." Harvard Business School Case 421-052, April 2021.
- 07 Jul 2019
- HBS Case
Walmart's Workforce of the Future
different universities; in June 2019, the program expanded to six universities and 14 areas of study, including cybersecurity and computer science. Widely hailed in the press for the opportunity it offers workers to graduate from college... View Details
- May 2022
- Case
TikTok and National Security: Investment in an Age of Data Sovereignty?
By: Jeremy Friedman, Sarah Bauerle Danzman and David Lane
This case covers TikTok’s purchase of Musical.ly and the reaction of the United States government, including the review of the purchase by the Committee on Foreign Investment in the United States (CFIUS) and the reaction of the presidential administration of Donald... View Details
Keywords: Data Security; Mergers and Acquisitions; Cybersecurity; Internet and the Web; International Relations; Laws and Statutes; Globalized Firms and Management
Friedman, Jeremy, Sarah Bauerle Danzman, and David Lane. "TikTok and National Security: Investment in an Age of Data Sovereignty?" Harvard Business School Case 722-020, May 2022.
- 09 Jan 2020
- Book
Rethinking Business Strategy in the Age of AI
cybersecurity threats. During the past 10 years, Iansiti and Lakhani have researched AI’s impact on businesses and have helped several companies transform their strategies, including internet pioneers like Amazon, Microsoft, Mozilla, and... View Details
Keywords: by Dina Gerdeman
- 21 Sep 2020
- Research & Ideas
Are You Sabotaging Your Own Company?
locks, clogging toilets, messing with machinery, and slashing tires. Today, 76 years after the manual was written, cybersecurity breaches likely represent the most dreaded act of outside obstruction many companies face, Thomke notes. But... View Details
Keywords: by Dina Gerdeman
- February 2023
- Case
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama, fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to securely restore the network, medical... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; United States; Alabama
Srinivasan, Suraj, and Li-Kuan (Jason) Ni. "Ransomware Attack at Springhill Medical Center." Harvard Business School Case 123-065, February 2023.
- December 2023
- Case
TikTok: The Algorithm Will See You Now
By: Shikhar Ghosh and Shweta Bagai
In a world where attention is a scarce commodity, this case explores the meteoric rise of TikTok—an app that transformed from a niche platform for teens into the most visited domain by 2021—surpassing even Google. Its algorithm was a sophisticated mechanism for... View Details
Keywords: Social Media; Applications and Software; Disruptive Innovation; Business and Government Relations; International Relations; Cybersecurity; Culture; Technology Industry; China; United States; India
Ghosh, Shikhar, and Shweta Bagai. "TikTok: The Algorithm Will See You Now." Harvard Business School Case 824-125, December 2023.
- 24 Feb 2020
- Research & Ideas
The Hidden Vulnerabilities of Open Source Software
industry and application security companies, including developer-first security company Snyk and the Synopsys Cybersecurity Research Center (SCRC), the Linux Foundation and LISH were able to combine private usage data with publicly... View Details
- 2014
- Chapter
Better Timing of Cyber Conflict
By: Elisabeth Paulson and Christopher Griffin
In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
- 2023
- Article
MoPe: Model Perturbation-based Privacy Attacks on Language Models
By: Marvin Li, Jason Wang, Jeffrey Wang and Seth Neel
Recent work has shown that Large Language Models (LLMs) can unintentionally leak sensitive information present in their training data. In this paper, we present Model Perturbations (MoPe), a new method to identify with high confidence if a given text is in the training... View Details
Li, Marvin, Jason Wang, Jeffrey Wang, and Seth Neel. "MoPe: Model Perturbation-based Privacy Attacks on Language Models." Proceedings of the Conference on Empirical Methods in Natural Language Processing (2023): 13647–13660.
- March 2024
- Teaching Note
SolarWinds Confronts SUNBURST
By: Frank Nagle and David Lane
Teaching Note for HBS Case Nos. 723-357 & 723-368. View Details
- July 16, 2015
- Article
How Small Businesses Can Fend Off Hackers
By: Lou Shipley
If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
- October 2018
- Case
Fundraising at St. Camillus Hospital
By: Srikant M. Datar and Caitlin N. Bowler
St. Camillus is a fictional non-profit hospital in rural Maine facing a serious budget deficit. As Director of Marketing, Victoria Stern is building a team to modernize the hospital fundraising efforts. An interview with a promising candidate, who is also a digital... View Details
Keywords: Data Analysis; Data Privacy; Data Governance; Non-profit; Health Care; Fundraising; Data Security; Analytics and Data Science; Safety; Governance; Ethics; Health Care and Treatment; Cybersecurity
Datar, Srikant M., and Caitlin N. Bowler. "Fundraising at St. Camillus Hospital." Harvard Business School Case 119-027, October 2018.
- April 29, 2020
- Article
The Case for AI Insurance
By: Ram Shankar Siva Kumar and Frank Nagle
When organizations place machine learning systems at the center of their businesses, they introduce the risk of failures that could lead to a data breach, brand damage, property damage, business interruption, and in some cases, bodily harm. Even when companies are... View Details
Keywords: Artificial Intelligence; Machine Learning; Internet and the Web; Safety; Insurance; AI and Machine Learning; Cybersecurity
Kumar, Ram Shankar Siva, and Frank Nagle. "The Case for AI Insurance." Harvard Business Review Digital Articles (April 29, 2020).
- 2013
- Chapter
Privacy Breach Analysis in Social Networks
By: Frank Nagle
Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.