Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (53) Arrow Down
Filter Results: (53) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (130)
    • Faculty Publications  (53)

    Show Results For

    • All HBS Web  (130)
      • Faculty Publications  (53)

      cybersecurityRemove cybersecurity →

      ← Page 3 of 53 Results

      Are you looking for?

      →Search All HBS Web
      • October 2018
      • Case

      Fundraising at St. Camillus Hospital

      By: Srikant M. Datar and Caitlin N. Bowler
      St. Camillus is a fictional non-profit hospital in rural Maine facing a serious budget deficit. As Director of Marketing, Victoria Stern is building a team to modernize the hospital fundraising efforts. An interview with a promising candidate, who is also a digital... View Details
      Keywords: Data Analysis; Data Privacy; Data Governance; Non-profit; Health Care; Fundraising; Data Security; Analytics and Data Science; Safety; Governance; Ethics; Health Care and Treatment; Cybersecurity
      Citation
      Educators
      Purchase
      Related
      Datar, Srikant M., and Caitlin N. Bowler. "Fundraising at St. Camillus Hospital." Harvard Business School Case 119-027, October 2018.
      • April 2018
      • Case

      Cisco Systems and OpenDNS: Strategic Integration

      By: Andy Wu, George Gonzalez and David Wang
      With more than 72,000 employees and revenues approaching the $50B mark, Cisco Systems is one of the largest information technology and networking firms globally. As the company grew and expanded into different lines of businesses, Cisco consistently looked outwards for... View Details
      Keywords: Mergers and Acquisitions; Integration; Corporate Strategy; Change Management; Entrepreneurship; Organizational Culture; Information Technology Industry
      Citation
      Educators
      Purchase
      Related
      Wu, Andy, George Gonzalez, and David Wang. "Cisco Systems and OpenDNS: Strategic Integration." Harvard Business School Case 718-489, April 2018.
      • October 2017 (Revised April 2019)
      • Case

      Data Breach at Equifax

      By: Suraj Srinivasan, Quinn Pitcher and Jonah S. Goldberg
      The case discusses the events leading up to the massive data breach at Equifax, one of the three U.S. credit reporting companies, the organizational and governance issues that contributed to the breach, and the consequences of the breach. The case supplement provides... View Details
      Keywords: Safety; Information Management; Cybersecurity; Technology Industry; United States
      Citation
      Educators
      Purchase
      Related
      Srinivasan, Suraj, Quinn Pitcher, and Jonah S. Goldberg. "Data Breach at Equifax." Harvard Business School Case 118-031, October 2017. (Revised April 2019.)
      • September 19, 2017
      • Article

      After Equifax Breach, Companies Advised to Review Open-Source Software Code

      By: Ben DiPietro and Lou Shipley
      It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
      Lou... View Details
      Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
      Citation
      Register to Read
      Related
      DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
      • September 2017 (Revised July 2018)
      • Case

      CyberArk: Protecting the Keys to the IT Kingdom

      By: Raffaella Sadun, David Yoffie and Margot Eiran
      CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
      Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
      Citation
      Educators
      Purchase
      Related
      Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
      • February 2017 (Revised May 2017)
      • Case

      Rapid7

      By: Mitchell Weiss, Paul Gompers and Silpa Kovvali
      That Corey Thomas, vice president at Boston-based Rapid7, Inc., was about to enter his investor’s boardroom to negotiate a potential acquisition of Metasploit, LLC, was already an unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate... View Details
      Keywords: Acquisition; Computer Hacking; Open-source; Corey Thomas; Rapid7; Exploit Testing; Mergers and Acquisitions; Cybersecurity; Computer Industry; North and Central America; Boston
      Citation
      Educators
      Purchase
      Related
      Weiss, Mitchell, Paul Gompers, and Silpa Kovvali. "Rapid7." Harvard Business School Case 817-077, February 2017. (Revised May 2017.)
      • Article

      Why Boards Aren't Dealing with Cyberthreats

      By: J. Yo-Jud Cheng and Boris Groysberg
      Keywords: Board Of Directors; Cybersecurity; Corporate Governance; AI and Machine Learning
      Citation
      Register to Read
      Related
      Cheng, J. Yo-Jud, and Boris Groysberg. "Why Boards Aren't Dealing with Cyberthreats." Harvard Business Review (website) (February 22, 2017). (Excerpt featured in the Harvard Business Review. May–June 2017 "Idea Watch" section.)
      • September 2016
      • Case

      Hewlett Packard Enterprise: The Dandelion Program

      By: Gary P. Pisano and Robert D. Austin
      This case describes Hewlett Packard Enterprise’s “Dandelion Program," which has developed a new service offering for the company’s clients by drawing on the special talents of people with autism. The company has deployed “pods” organized around 8 or 9 employees with... View Details
      Keywords: Organizational Behavior; Information Technology; Organizational Change and Adaptation; Leadership; Talent and Talent Management; Service Operations; Training; Diversity; Innovation and Invention; Technology Industry
      Citation
      Educators
      Purchase
      Related
      Pisano, Gary P., and Robert D. Austin. "Hewlett Packard Enterprise: The Dandelion Program." Harvard Business School Case 617-016, September 2016.
      • July 16, 2015
      • Article

      How Small Businesses Can Fend Off Hackers

      By: Lou Shipley
      If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
      Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
      Citation
      Register to Read
      Related
      Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
      • 2014
      • Chapter

      Better Timing of Cyber Conflict

      By: Elisabeth Paulson and Christopher Griffin
      In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
      Keywords: Cyber-weapons; Cyberwarfare; Cybersecurity; National Security
      Citation
      Read Now
      Related
      Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
      • 2013
      • Chapter

      Privacy Breach Analysis in Social Networks

      By: Frank Nagle
      Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
      Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
      Citation
      Find at Harvard
      Purchase
      Related
      Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
      • Forthcoming
      • Book

      Blockchain Forensics and Crypto-Related Cybercrimes

      By: Lin William Cong, Kim Grauer, Daniel Rabetti and Henry Updegrave
      This handbook provides an overview of various criminal activities related to cryptocurrencies, including investment scams, Ponzi schemes, rug pulls, ransomware attacks, money laundering, and darknet markets. We discuss the need for user protection and education,... View Details
      Keywords: Cyberattacks; Blockchain; Network; Cryptocurrency; Crime and Corruption; Cybersecurity; Governing Rules, Regulations, and Reforms; Law Enforcement; Technology Adoption
      Citation
      SSRN
      Related
      Cong, Lin William, Kim Grauer, Daniel Rabetti, and Henry Updegrave. Blockchain Forensics and Crypto-Related Cybercrimes. World Scientific Publishing, forthcoming.
      • Teaching Interest

      Overview

      By: Frank Nagle
      Prof. Nagle has taught a wide variety of topics to various types of students including everything from computer programming and e-commerce for undergraduates to cyber security for the FBI and HBS Executive Education participants to innovation and technology management... View Details
      • ←
      • 1
      • 2
      • 3

      Are you looking for?

      →Search All HBS Web
      ǁ
      Campus Map
      Harvard Business School
      Soldiers Field
      Boston, MA 02163
      →Map & Directions
      →More Contact Information
      • Make a Gift
      • Site Map
      • Jobs
      • Harvard University
      • Trademarks
      • Policies
      • Accessibility
      • Digital Accessibility
      Copyright © President & Fellows of Harvard College.