Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (122) Arrow Down
Filter Results: (122) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (122)
    • News  (30)
    • Research  (68)
    • Multimedia  (2)
  • Faculty Publications  (63)

Show Results For

  • All HBS Web  (122)
    • News  (30)
    • Research  (68)
    • Multimedia  (2)
  • Faculty Publications  (63)
← Page 3 of 122 Results →
  • Web

2023 Reunion Presentations - Alumni

low-wage/high-turnover work and underemployment that drives economic insecurity. Slides (pdf) Cybersecurity: Emerging Trends for Business Leaders Hosted by the Class of 2008 Senior Lecturer Hise Gibson (DBA 2015) Anita Lynch (MBA 2008) + More Info – Less Info Join our... View Details
  • 07 Jul 2019
  • HBS Case

Walmart's Workforce of the Future

different universities; in June 2019, the program expanded to six universities and 14 areas of study, including cybersecurity and computer science. Widely hailed in the press for the opportunity it offers workers to graduate from college... View Details
Keywords: by Julia Hanna; Retail
  • Web

Technology & Innovation - Faculty & Research

and a dialogue with customers. The safety-by-design model can facilitate innovation rather than constrain it by providing a principled approach to product development. Keywords: Technological Innovation ; Cybersecurity ; Demand and... View Details
  • 09 Jan 2020
  • Book

Rethinking Business Strategy in the Age of AI

cybersecurity threats. During the past 10 years, Iansiti and Lakhani have researched AI’s impact on businesses and have helped several companies transform their strategies, including internet pioneers like Amazon, Microsoft, Mozilla, and... View Details
Keywords: by Dina Gerdeman
  • Web

Faculty & Researchers - Managing the Future of Work

work frequently explores the domains of crowdsourcing, free digital goods, cybersecurity, and artificial intelligence. He worked in the cybersecurity field for nearly a decade before returning to academia. Research Nexleaf Analytics:... View Details
  • 21 Sep 2020
  • Research & Ideas

Are You Sabotaging Your Own Company?

locks, clogging toilets, messing with machinery, and slashing tires. Today, 76 years after the manual was written, cybersecurity breaches likely represent the most dreaded act of outside obstruction many companies face, Thomke notes. But... View Details
Keywords: by Dina Gerdeman
  • Profile

Mollie Breen

and skill sets; each partner can be a complement to the other." After completing the two-year joint degree program, Mollie plans on launching "my own tech venture, applying my background in cybersecurity and AI." In the... View Details
Keywords: Tech; Nonprofit/Government/Education
  • April 2021
  • Case

Transforming BlackBerry: From Smartphones to Software

By: Ranjay Gulati and Nicole Tempest Keller
On the verge of failure, BlackBerry brought in John Chen as CEO in 2013 to orchestrate a bold turnaround of the company. Once an iconic leader in the smartphone market, BlackBerry was best known for its tactile QWERTY keyboard, strong security, and a focus on business... View Details
Keywords: Pivot; Managing Change; Turnaround; Smartphone; Change Management; Leading Change; Transformation; Organizational Change and Adaptation; Digital Platforms; Change; Information Infrastructure; Applications and Software; Competitive Strategy; Cybersecurity; Technology Industry; Transportation Industry; Canada
Citation
Educators
Purchase
Related
Gulati, Ranjay, and Nicole Tempest Keller. "Transforming BlackBerry: From Smartphones to Software." Harvard Business School Case 421-052, April 2021.
  • 06 Sep 2022
  • Blog Post

Student Spotlight: Summer Internships in Business & Environment

partnering with the best companies at the intersection of energy and technology to provide financial capital, industry expertise and commercialization support. Energize invests in software-based solutions spanning renewable energy, critical infrastructure, climate... View Details
  • 01 Dec 2019
  • News

Bridging the Gap

along on the cradle-to-career trajectory. Dubbed Project Blue Sky and scheduled to launch in 2021, it will condense a four-year bachelor’s degree in IT and cybersecurity into two years, combining coursework with an on-the-job... View Details
Keywords: Julia Hanna; illustration by Josh Cochran; photographed by Melissa Golden; cross sector collaboration; local government; nonprofits; education; leadership; Administration of Economic Programs; Government
  • February 2023
  • Case

Ransomware Attack at Springhill Medical Center

By: Suraj Srinivasan and Li-Kuan (Jason) Ni
In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama, fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to securely restore the network, medical... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; United States; Alabama
Citation
Educators
Purchase
Related
Srinivasan, Suraj, and Li-Kuan (Jason) Ni. "Ransomware Attack at Springhill Medical Center." Harvard Business School Case 123-065, February 2023.
  • December 2023
  • Case

TikTok: The Algorithm Will See You Now

By: Shikhar Ghosh and Shweta Bagai
In a world where attention is a scarce commodity, this case explores the meteoric rise of TikTok—an app that transformed from a niche platform for teens into the most visited domain by 2021—surpassing even Google. Its algorithm was a sophisticated mechanism for... View Details
Keywords: Social Media; Applications and Software; Disruptive Innovation; Business and Government Relations; International Relations; Cybersecurity; Culture; Technology Industry; China; United States; India
Citation
Educators
Purchase
Related
Ghosh, Shikhar, and Shweta Bagai. "TikTok: The Algorithm Will See You Now." Harvard Business School Case 824-125, December 2023.
  • May 2022
  • Case

TikTok and National Security: Investment in an Age of Data Sovereignty?

By: Jeremy Friedman, Sarah Bauerle Danzman and David Lane
This case covers TikTok’s purchase of Musical.ly and the reaction of the United States government, including the review of the purchase by the Committee on Foreign Investment in the United States (CFIUS) and the reaction of the presidential administration of Donald... View Details
Keywords: Data Security; Mergers and Acquisitions; Cybersecurity; Internet and the Web; International Relations; Laws and Statutes; Globalized Firms and Management
Citation
Educators
Purchase
Related
Friedman, Jeremy, Sarah Bauerle Danzman, and David Lane. "TikTok and National Security: Investment in an Age of Data Sovereignty?" Harvard Business School Case 722-020, May 2022.
  • 24 Feb 2020
  • Research & Ideas

The Hidden Vulnerabilities of Open Source Software

industry and application security companies, including developer-first security company Snyk and the Synopsys Cybersecurity Research Center (SCRC), the Linux Foundation and LISH were able to combine private usage data with publicly... View Details
Keywords: by Frank Nagle and Jenny Hoffman; Computer
  • 01 Jun 2016
  • News

How Do We Win the Cyberwar?

the threat, with analysts predicting it will grow to $170 billion by 2020. (In his proposed fiscal 2017 budget, President Obama requested a $5 billion increase in federal cybersecurity spending, up to $19 billion annually.) Money is one... View Details
Keywords: Dan Morrell; illustrations by Victo Ngai
  • Web

Fraudulent Mobile Payment Alerts on the Rise | Information Technology

by calling the phone number on their website to verify the suspicious account activity. Never share personal account information over text or phone calls — legitimate institutions will not ask for you to provide passwords or account numbers. Would you like to receive... View Details
  • Web

Online Security for You and your Family | Information Technology

Online Security for You and your Family Adopting good cybersecurity habits is crucial for protecting your personal information and digital life. In today's interconnected world, cyber threats like identity theft, hacking, and phishing are... View Details
  • Career Coach

Austin Boral

(Founder), McKinsey & Company (Public & Social Sector Practice), New York City Economic Development Corporation (Strategy Department), Andrew Goodman Foundation (Board Member); Cybersecurity and Infrastructure Security Agency... View Details
  • September 19, 2017
  • Article

After Equifax Breach, Companies Advised to Review Open-Source Software Code

By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
Citation
Register to Read
Related
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
  • 2014
  • Chapter

Better Timing of Cyber Conflict

By: Elisabeth Paulson and Christopher Griffin
In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
Keywords: Cyber-weapons; Cyberwarfare; Cybersecurity; National Security
Citation
Read Now
Related
Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
  • ←
  • 3
  • 4
  • 5
  • 6
  • 7
  • →
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.