Filter Results:
(116)
Show Results For
- All HBS Web (116)
- Faculty Publications (15)
Show Results For
- All HBS Web (116)
- Faculty Publications (15)
- 09 Nov 2022
- In Practice
COP27: What Can Business Leaders Do to Fight Climate Change Now?
The US government’s newly passed Inflation Reduction Act will direct $370 billion toward advancing renewal energy and reducing greenhouse gas emissions—the country's largest investment in fighting climate change so far. As business and government leaders around the... View Details
Keywords: by Lynn Schenk and Danielle Kost
- Web
Research - Behavioral Finance & Financial Stability
Reinhart, Reinhart, and Trebesch explore the rich history of booms and busts in capital flow by uncovering data from sources going back to 1815. The pattern uncovered by the authors have strong implications on the vulnerabilities of many... View Details
- 10 Oct 2023
- Blog Post
Policy Drivers for Environmental Justice: What Businesses Need to Know
communities, combatting climate change and preparing for its effects “across rural, urban, and Tribal areas.”[8] Constellation Energy discusses their EJ policy in the same way, with strong focus on improving equity, reducing impacts on View Details
- 12 Nov 2021
- News
Alumni Business Leaders on Confronting the Climate Change Challenge
storage, or scaling global water recycling. The great thing about opportunities in the climate arena is that they all matter. In water, my sphere of action, I and the founders who are generous enough to let Burnt Island Ventures be a part of their journey are working... View Details
- Web
2024 Reunion Presentations - Alumni
consequences of this move. The rise of a more authoritarian regime in China and a competition narrative began a rethinking of this model. This was accelerated by the COVID-19 pandemic, which shined a spotlight on the vulnerabilities of... View Details
- 01 Jun 2003
- News
Up Against The Firewall
Center, which investigates suspected vulnerabilities and problems with the company’s software and orchestrates immediate action (such as posting security patches) to deal with them. He is also involved in... View Details
- Web
IT Strategy: Protecting HBS Information and Data Assets | Information Technology
Identifiable Information (PII) by providing advanced alerting of data leaks outside of areas approved for sensitive HBS or Harvard information. Security remediation efforts have also made significant progress reducing the number of View Details
- 02 Apr 2014
- News
Disrupting the Criminal Supply Chain
science and engineering. But those paths never felt like quite the right fit. "Since high school, I had done volunteer work with homeless kids and vulnerable children and domestic violence victims," she says. "Somehow, that really spoke... View Details
- 05 Feb 2019
- News
Protecting the Power Grid
says, usually less than 24 hours, while longer outages have been more localized and the areas affected have been able to rely on outside help. The recent collapse of Puerto Rico’s power grid after Hurricane Maria, however, is a frightening example of what could happen... View Details
- 25 Apr 2014
- News
Disrupting criminal enterprises that prey on children
thinking into those endeavors, in the realm of child protection," says Brochu. She explains that criminal networks operate much like legitimate enterprises. As a result, her business degree has made a difference in her work, as has her experience in the digital View Details
- Web
Tips for Working Remotely | Information Technology
device. Attackers are beginning to leverage vulnerabilities in social media apps (WhatsApp, Twitter) to access your entire phone. Secure devices with passcodes or passwords and enable encryption on all your... View Details
- Portrait Project
Samantha Gray
expose in writing my vulnerable and invincible selves at war with each other. I aspire to catalyze change at the intersection of science and life. I resolve to indulge the eonophile and the cheese fiend who have taken residence in my... View Details
- 01 Jun 2022
- News
Vision: Into the Breach
for vulnerabilities in much the same way an attacker would. If those tests reveal chinks in an enterprise’s digital armor—obsolete servers, outdated software, lax protocols—then At-Bay’s security experts... View Details
Keywords: Alexander Gelfand
- Web
Hakeem Belo-Osagie | Baker Library | Bloomberg Center | Harvard Business School
Transcript (PDF) Hakeem Belo-Osagie, HBS 1980, grew up in Nigeria, England, and the United States. After graduating from HBS, he returned to Nigeria to work in financial services. He started at a securities trading outfit and soon... View Details
- Web
Video Management Policy | About
Video Management Policy General Principles At Harvard Business School, the video management systems infrastructure is implemented to enhance the safety and security of the community, reduce institutional risk, strengthen customer service... View Details
- 26 Sep 2013
- Research & Ideas
Behind India’s Economic and Political Woes
case in China, adequate investment had been put into roads, bridges, and power plants, I suspect that a much larger fraction of the money coming into India would have been productively deployed into longer-term fixed assets, securing it... View Details
Keywords: by Zeenat Potia
- Web
Buy Now, Pay Later: Credit, Information, and the Courts
the Courts Credit and Information Technology Credit in a Consumer Society Research Links Credits As pioneers of the nascent information industry, the nineteenth-century credit ratings firms survived near-fatal attacks on several fronts. The Mercantile Agency was View Details
- 29 May 2020
- Op-Ed
How Leaders Are Fighting Food Insecurity on Three Continents
COVID-19 is creating unprecedented strains on food security worldwide. The United Nations' World Food Programme warns that the pandemic could almost double the number of people facing food crises in low- and middle-income populations to 265 million by the end of 2020.... View Details
- 01 Jun 2011
- News
Faculty Books
human connection); the destructive behaviors they adopt to relieve their anxiety (busyness, comparing themselves to others, and blaming others for their frustrations); and the behaviors they must adopt to gain strength from vulnerability... View Details
- 25 Oct 2004
- Research & Ideas
Planning for Surprises
so common? A: Our research shows that there are psychological, organizational, and political factors that conspire to keep us from dealing with problems that are worthy of our attention. Psychological vulnerabilities have to do with... View Details
Keywords: by Martha Lagace