Filter Results:
(53)
Show Results For
- All HBS Web
(130)
- Faculty Publications (53)
Show Results For
- All HBS Web
(130)
- Faculty Publications (53)
←
Page 3 of 53
Results
- October 2018
- Case
Fundraising at St. Camillus Hospital
By: Srikant M. Datar and Caitlin N. Bowler
St. Camillus is a fictional non-profit hospital in rural Maine facing a serious budget deficit. As Director of Marketing, Victoria Stern is building a team to modernize the hospital fundraising efforts. An interview with a promising candidate, who is also a digital... View Details
Keywords: Data Analysis; Data Privacy; Data Governance; Non-profit; Health Care; Fundraising; Data Security; Analytics and Data Science; Safety; Governance; Ethics; Health Care and Treatment; Cybersecurity
Datar, Srikant M., and Caitlin N. Bowler. "Fundraising at St. Camillus Hospital." Harvard Business School Case 119-027, October 2018.
- April 2018
- Case
Cisco Systems and OpenDNS: Strategic Integration
By: Andy Wu, George Gonzalez and David Wang
With more than 72,000 employees and revenues approaching the $50B mark, Cisco Systems is one of the largest information technology and networking firms globally. As the company grew and expanded into different lines of businesses, Cisco consistently looked outwards for... View Details
Keywords: Mergers and Acquisitions; Integration; Corporate Strategy; Change Management; Entrepreneurship; Organizational Culture; Information Technology Industry
Wu, Andy, George Gonzalez, and David Wang. "Cisco Systems and OpenDNS: Strategic Integration." Harvard Business School Case 718-489, April 2018.
- October 2017 (Revised April 2019)
- Case
Data Breach at Equifax
By: Suraj Srinivasan, Quinn Pitcher and Jonah S. Goldberg
The case discusses the events leading up to the massive data breach at Equifax, one of the three U.S. credit reporting companies, the organizational and governance issues that contributed to the breach, and the consequences of the breach. The case supplement provides... View Details
Srinivasan, Suraj, Quinn Pitcher, and Jonah S. Goldberg. "Data Breach at Equifax." Harvard Business School Case 118-031, October 2017. (Revised April 2019.)
- September 19, 2017
- Article
After Equifax Breach, Companies Advised to Review Open-Source Software Code
By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
- September 2017 (Revised July 2018)
- Case
CyberArk: Protecting the Keys to the IT Kingdom
By: Raffaella Sadun, David Yoffie and Margot Eiran
CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
- February 2017 (Revised May 2017)
- Case
Rapid7
By: Mitchell Weiss, Paul Gompers and Silpa Kovvali
That Corey Thomas, vice president at Boston-based Rapid7, Inc., was about to enter his investor’s boardroom to negotiate a potential acquisition of Metasploit, LLC, was already an unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate... View Details
- Article
Why Boards Aren't Dealing with Cyberthreats
By: J. Yo-Jud Cheng and Boris Groysberg
Cheng, J. Yo-Jud, and Boris Groysberg. "Why Boards Aren't Dealing with Cyberthreats." Harvard Business Review (website) (February 22, 2017). (Excerpt featured in the Harvard Business Review. May–June 2017 "Idea Watch" section.)
- September 2016
- Case
Hewlett Packard Enterprise: The Dandelion Program
By: Gary P. Pisano and Robert D. Austin
This case describes Hewlett Packard Enterprise’s “Dandelion Program," which has developed a new service offering for the company’s clients by drawing on the special talents of people with autism. The company has deployed “pods” organized around 8 or 9 employees with... View Details
Keywords: Organizational Behavior; Information Technology; Organizational Change and Adaptation; Leadership; Talent and Talent Management; Service Operations; Training; Diversity; Innovation and Invention; Technology Industry
Pisano, Gary P., and Robert D. Austin. "Hewlett Packard Enterprise: The Dandelion Program." Harvard Business School Case 617-016, September 2016.
- July 16, 2015
- Article
How Small Businesses Can Fend Off Hackers
By: Lou Shipley
If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
- 2014
- Chapter
Better Timing of Cyber Conflict
By: Elisabeth Paulson and Christopher Griffin
In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
- 2013
- Chapter
Privacy Breach Analysis in Social Networks
By: Frank Nagle
Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
- Forthcoming
- Book
Blockchain Forensics and Crypto-Related Cybercrimes
By: Lin William Cong, Kim Grauer, Daniel Rabetti and Henry Updegrave
This handbook provides an overview of various criminal activities related to cryptocurrencies, including investment scams, Ponzi schemes, rug pulls, ransomware attacks, money laundering, and darknet markets. We discuss the need for user protection and education,... View Details
Keywords: Cyberattacks; Blockchain; Network; Cryptocurrency; Crime and Corruption; Cybersecurity; Governing Rules, Regulations, and Reforms; Law Enforcement; Technology Adoption
Cong, Lin William, Kim Grauer, Daniel Rabetti, and Henry Updegrave. Blockchain Forensics and Crypto-Related Cybercrimes. World Scientific Publishing, forthcoming.
- Teaching Interest
Overview
By: Frank Nagle
Prof. Nagle has taught a wide variety of topics to various types of students including everything from computer programming and e-commerce for undergraduates to cyber security for the FBI and HBS Executive Education participants to innovation and technology management... View Details