Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (68) Arrow Down
Filter Results: (68) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (130)
    • News  (30)
    • Research  (68)
    • Multimedia  (2)
  • Faculty Publications  (64)

Show Results For

  • All HBS Web  (130)
    • News  (30)
    • Research  (68)
    • Multimedia  (2)
  • Faculty Publications  (64)
← Page 2 of 68 Results →
Sort by

Are you looking for?

→Search All HBS Web
  • April 2020
  • Supplement

Cisco Systems and OpenDNS: Strategic Integration (B)

By: Andy Wu and David Wang
With more than 72,000 employees and revenues approaching the $50B mark, Cisco Systems is one of the largest information technology and networking firms globally. As the company grew and expanded into different lines of businesses, Cisco consistently looked outwards for... View Details
Keywords: Mergers and Acquisitions; Integration; Corporate Strategy; Change Management; Entrepreneurship; Organizational Culture; Information Technology Industry
Citation
Purchase
Related
Wu, Andy, and David Wang. "Cisco Systems and OpenDNS: Strategic Integration (B)." Harvard Business School Supplement 720-466, April 2020.
  • January 2025
  • Technical Note

AI vs Human: Analyzing Acceptable Error Rates Using the Confusion Matrix

By: Tsedal Neeley and Tim Englehart
This technical note introduces the confusion matrix as a foundational tool in artificial intelligence (AI) and large language models (LLMs) for assessing the performance of classification models, focusing on their reliability for decision-making. A confusion matrix... View Details
Keywords: Reliability; Confusion Matrix; AI and Machine Learning; Decision Making; Measurement and Metrics; Performance
Citation
Educators
Purchase
Related
Neeley, Tsedal, and Tim Englehart. "AI vs Human: Analyzing Acceptable Error Rates Using the Confusion Matrix." Harvard Business School Technical Note 425-049, January 2025.
  • April 2018
  • Case

Cisco Systems and OpenDNS: Strategic Integration

By: Andy Wu, George Gonzalez and David Wang
With more than 72,000 employees and revenues approaching the $50B mark, Cisco Systems is one of the largest information technology and networking firms globally. As the company grew and expanded into different lines of businesses, Cisco consistently looked outwards for... View Details
Keywords: Mergers and Acquisitions; Integration; Corporate Strategy; Change Management; Entrepreneurship; Organizational Culture; Information Technology Industry
Citation
Educators
Purchase
Related
Wu, Andy, George Gonzalez, and David Wang. "Cisco Systems and OpenDNS: Strategic Integration." Harvard Business School Case 718-489, April 2018.
  • January 2022 (Revised November 2023)
  • Supplement

Uber in China (C): The Cost of Success for Didi

By: William C. Kirby and Noah B. Truwit
On June 30, 2021, ride-hailing giant Didi Chuxing (Didi) raised $4.4 billion in its initial public offering (IPO) on the New York Stock Exchange (NYSE), the largest IPO of a Chinese company listed on an American exchange since Alibaba raised $25 billion in 2014.... View Details
Keywords: Uber; Didi Chuxing; Start-up Growth; Regulation; Ride-sharing; Transportation; Business Startups; Business and Government Relations; Cross-Cultural and Cross-Border Issues; Growth and Development; Policy; Competition; Laws and Statutes; Transportation Industry; Technology Industry; China
Citation
Purchase
Related
Kirby, William C., and Noah B. Truwit. "Uber in China (C): The Cost of Success for Didi." Harvard Business School Supplement 322-068, January 2022. (Revised November 2023.)
  • 2024
  • Working Paper

Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations

By: Raviv Murciano-Goroff, Ran Zhuo and Shane Greenstein
How prevalent are severe software vulnerabilities, how fast do software users respond to the availability of secure versions, and what determines the variance in the installation distribution? Using the largest dataset ever assembled on user updates, tracking server... View Details
Keywords: Cybersecurity; Applications and Software; Technology Adoption; Consumer Behavior
Citation
Find at Harvard
Purchase
Related
Murciano-Goroff, Raviv, Ran Zhuo, and Shane Greenstein. "Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations." NBER Working Paper Series, No. 32696, July 2024.
  • 07 Jul 2019
  • HBS Case

Walmart's Workforce of the Future

different universities; in June 2019, the program expanded to six universities and 14 areas of study, including cybersecurity and computer science. Widely hailed in the press for the opportunity it offers workers to graduate from college... View Details
Keywords: by Julia Hanna; Retail
  • 09 Jan 2020
  • Book

Rethinking Business Strategy in the Age of AI

cybersecurity threats. During the past 10 years, Iansiti and Lakhani have researched AI’s impact on businesses and have helped several companies transform their strategies, including internet pioneers like Amazon, Microsoft, Mozilla, and... View Details
Keywords: by Dina Gerdeman
  • April 2021
  • Case

Transforming BlackBerry: From Smartphones to Software

By: Ranjay Gulati and Nicole Tempest Keller
On the verge of failure, BlackBerry brought in John Chen as CEO in 2013 to orchestrate a bold turnaround of the company. Once an iconic leader in the smartphone market, BlackBerry was best known for its tactile QWERTY keyboard, strong security, and a focus on business... View Details
Keywords: Pivot; Managing Change; Turnaround; Smartphone; Change Management; Leading Change; Transformation; Organizational Change and Adaptation; Digital Platforms; Change; Information Infrastructure; Applications and Software; Competitive Strategy; Cybersecurity; Technology Industry; Transportation Industry; Canada
Citation
Educators
Purchase
Related
Gulati, Ranjay, and Nicole Tempest Keller. "Transforming BlackBerry: From Smartphones to Software." Harvard Business School Case 421-052, April 2021.
  • 21 Sep 2020
  • Research & Ideas

Are You Sabotaging Your Own Company?

locks, clogging toilets, messing with machinery, and slashing tires. Today, 76 years after the manual was written, cybersecurity breaches likely represent the most dreaded act of outside obstruction many companies face, Thomke notes. But... View Details
Keywords: by Dina Gerdeman
  • February 2023
  • Case

Ransomware Attack at Springhill Medical Center

By: Suraj Srinivasan and Li-Kuan (Jason) Ni
In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama, fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to securely restore the network, medical... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; United States; Alabama
Citation
Educators
Purchase
Related
Srinivasan, Suraj, and Li-Kuan (Jason) Ni. "Ransomware Attack at Springhill Medical Center." Harvard Business School Case 123-065, February 2023.
  • December 2023
  • Case

TikTok: The Algorithm Will See You Now

By: Shikhar Ghosh and Shweta Bagai
In a world where attention is a scarce commodity, this case explores the meteoric rise of TikTok—an app that transformed from a niche platform for teens into the most visited domain by 2021—surpassing even Google. Its algorithm was a sophisticated mechanism for... View Details
Keywords: Social Media; Applications and Software; Disruptive Innovation; Business and Government Relations; International Relations; Cybersecurity; Culture; Technology Industry; China; United States; India
Citation
Educators
Purchase
Related
Ghosh, Shikhar, and Shweta Bagai. "TikTok: The Algorithm Will See You Now." Harvard Business School Case 824-125, December 2023.
  • May 2022
  • Case

TikTok and National Security: Investment in an Age of Data Sovereignty?

By: Jeremy Friedman, Sarah Bauerle Danzman and David Lane
This case covers TikTok’s purchase of Musical.ly and the reaction of the United States government, including the review of the purchase by the Committee on Foreign Investment in the United States (CFIUS) and the reaction of the presidential administration of Donald... View Details
Keywords: Data Security; Mergers and Acquisitions; Cybersecurity; Internet and the Web; International Relations; Laws and Statutes; Globalized Firms and Management
Citation
Educators
Purchase
Related
Friedman, Jeremy, Sarah Bauerle Danzman, and David Lane. "TikTok and National Security: Investment in an Age of Data Sovereignty?" Harvard Business School Case 722-020, May 2022.
  • 24 Feb 2020
  • Research & Ideas

The Hidden Vulnerabilities of Open Source Software

industry and application security companies, including developer-first security company Snyk and the Synopsys Cybersecurity Research Center (SCRC), the Linux Foundation and LISH were able to combine private usage data with publicly... View Details
Keywords: by Frank Nagle and Jenny Hoffman; Computer
  • 2014
  • Chapter

Better Timing of Cyber Conflict

By: Elisabeth Paulson and Christopher Griffin
In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
Keywords: Cyber-weapons; Cyberwarfare; Cybersecurity; National Security
Citation
Read Now
Related
Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
  • October 2022
  • Background Note

Note on Cyberattacks and Regulatory Regimes

By: Frank Nagle, George A. Riedel, William R. Kerr and David Lane
Describes common types of cyberattacks on enterprises and their costs, as well as the fragmentary regulatory regimes through which U.S. states and regulatory agencies at the start of 2021 attempted to encourage disclosure of cyberattacks and to pursue enforcement... View Details
Keywords: Regulations; Regulatory Agencies; Cyberattacks; Governance; Corporate Disclosure; Cybersecurity; Information Industry; Information Technology Industry; Health Industry; Financial Services Industry; United States
Citation
Educators
Purchase
Related
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "Note on Cyberattacks and Regulatory Regimes." Harvard Business School Background Note 723-392, October 2022.
  • September 19, 2017
  • Article

After Equifax Breach, Companies Advised to Review Open-Source Software Code

By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
Citation
Register to Read
Related
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
  • 2023
  • Article

MoPe: Model Perturbation-based Privacy Attacks on Language Models

By: Marvin Li, Jason Wang, Jeffrey Wang and Seth Neel
Recent work has shown that Large Language Models (LLMs) can unintentionally leak sensitive information present in their training data. In this paper, we present Model Perturbations (MoPe), a new method to identify with high confidence if a given text is in the training... View Details
Keywords: Large Language Model; AI and Machine Learning; Cybersecurity
Citation
Read Now
Related
Li, Marvin, Jason Wang, Jeffrey Wang, and Seth Neel. "MoPe: Model Perturbation-based Privacy Attacks on Language Models." Proceedings of the Conference on Empirical Methods in Natural Language Processing (2023): 13647–13660.
  • March 2024
  • Teaching Note

SolarWinds Confronts SUNBURST

By: Frank Nagle and David Lane
Teaching Note for HBS Case Nos. 723-357 & 723-368. View Details
Keywords: Cybersecurity; Corporate Disclosure; Crisis Management; Information Technology Industry; United States
Citation
Purchase
Related
Nagle, Frank, and David Lane. "SolarWinds Confronts SUNBURST." Harvard Business School Teaching Note 724-368, March 2024.
  • November 2024
  • Case

FedEx Cyberattack (A): Navigating the NotPetya Storm

By: Hise Gibson, Frank Nagle, Alicia Dadlani and Martha Hostetter
In 2017, FedEx’s European division — acquired the year before for $5 billion — was hit by a devastating cyberattack that destroyed thousands of computers and business systems across several countries. Corporate Chief Information Officer Rob Carter put the company’s... View Details
Keywords: Cybersecurity; Crisis Management; Disruption; Planning; Transportation Industry; United States; Europe
Citation
Educators
Purchase
Related
Gibson, Hise, Frank Nagle, Alicia Dadlani, and Martha Hostetter. "FedEx Cyberattack (A): Navigating the NotPetya Storm." Harvard Business School Case 625-049, November 2024.
  • May–June 2025
  • Article

Balancing Digital Safety and Innovation

By: Tomomichi Amano and Tomomi Tanaka
Designers of consumer-facing digital products have tended to focus on novelty and speed (“move fast and break things”). They’ve spent more effort on innovating than on anticipating how customers—and bad actors—might engage with products. But as digital products become... View Details
Keywords: Technological Innovation; Cybersecurity; Demand and Consumers; Safety
Citation
Find at Harvard
Register to Read
Purchase
Related
Amano, Tomomichi, and Tomomi Tanaka. "Balancing Digital Safety and Innovation." Harvard Business Review 103, no. 3 (May–June 2025): 120–127.
  • ←
  • 1
  • 2
  • 3
  • 4
  • →

Are you looking for?

→Search All HBS Web
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.