Filter Results:
(108)
Show Results For
- All HBS Web
(529)
- Faculty Publications (108)
Show Results For
- All HBS Web
(529)
- Faculty Publications (108)
Privacy →
- Article
Mitigating Bias in Adaptive Data Gathering via Differential Privacy
By: Seth Neel and Aaron Leon Roth
Data that is gathered adaptively—via bandit algorithms, for example—exhibits bias. This is true both when gathering simple numeric valued data—the empirical means kept track of by stochastic bandit algorithms are biased downwards—and when gathering more complicated... View Details
Neel, Seth, and Aaron Leon Roth. "Mitigating Bias in Adaptive Data Gathering via Differential Privacy." Proceedings of the International Conference on Machine Learning (ICML) 35th (2018).
- November 7, 2017
- Article
Temporary Sharing Prompts Unrestrained Disclosures That Leave Lasting Negative Impressions
By: Reto Hofstetter, Roland Rüppell and Leslie John
With the advent of social media, the impressions people make on others are based increasingly on their digital disclosures. Yet digital disclosures can come back to haunt, making it challenging for people to manage the impressions they make. In field and online... View Details
Keywords: Disclosure; Privacy; Self-presentation; Impression Formation; Behavior; Perspective; Internet and the Web; Social Media
Hofstetter, Reto, Roland Rüppell, and Leslie John. "Temporary Sharing Prompts Unrestrained Disclosures That Leave Lasting Negative Impressions." Proceedings of the National Academy of Sciences 114, no. 45 (November 7, 2017).
- September 19, 2017
- Article
After Equifax Breach, Companies Advised to Review Open-Source Software Code
By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
- May 2017 (Revised July 2017)
- Supplement
Aadhaar: From Voluntary to Mandatory
By: Tarun Khanna, Anjali Raina and Rachna Chawla
Approximately 1.1 billion residents of India (99% of the population) had a unique biometric identity—Aadhaar—by 2017. In six years, the Unique Identification Authority of India (UIDAI) had achieved an unprecedented milestone in emerging and developed markets. The... View Details
Keywords: Entrepreneurship; Business and Government Relations; Emerging Markets; Information; Information Technology; Organizational Design; Infrastructure; Identity; Projects; Information Management; Government and Politics; Digital Platforms; Internet and the Web; Transformation; Society; Welfare; Social Issues; Private Sector; Public Sector; Information Technology Industry; Asia; India; New Delhi
Khanna, Tarun, Anjali Raina, and Rachna Chawla. "Aadhaar: From Voluntary to Mandatory." Harvard Business School Supplement 717-512, May 2017. (Revised July 2017.)
- January 2017 (Revised June 2017)
- Case
Chicago and the Array of Things: A Fitness Tracker for the City
By: Rajiv Lal and Scott Johnson
The city of Chicago has recently launched a project called the Array of Things. The program involves a series of sensor nodes placed around the city that capture a massive amount of data including pedestrian and vehicle flow, air quality, and cloud cover. The Array of... View Details
Keywords: Smart Connected Products; Smart Cities; Internet Of Things; Sensors; Govenment; Government Administration; Technological Innovation; Digital Platforms; Applications and Software; Information Infrastructure; Internet and the Web; Public Administration Industry; Technology Industry; Chicago; United States
- 2017
- Article
Making Transparency Transparent: The Evolution of Observation in Management Theory
By: Ethan Bernstein
Observation is key to management scholarship and practice. Yet a holistic view of its role in management has been elusive, in part due to shifting terminology. The current popularity of the term “transparency” provides the occasion for a thorough review, which finds... View Details
Keywords: Transparency; Privacy; Observation; Tracking; Monitoring; Surveillance; Learning; Control; Disclosure; Process Visibility; Organizations; Theory; Information Technology; Relationships; Measurement and Metrics; Management Practices and Processes; Leadership; Law; Knowledge; Human Resources; Communication
Bernstein, Ethan. "Making Transparency Transparent: The Evolution of Observation in Management Theory." Academy of Management Annals 11, no. 1 (2017): 217–266.
- October 2016 (Revised March 2018)
- Teaching Note
Apple: Privacy vs. Safety? (A) and (B)
By: Nien-hê Hsieh, Henry McGee and Sarah McAra
Teaching Note for HBS No. 316-069. View Details
- 2016
- Book
Innovation Policy and the Economy, Volume 17
By: Shane Greenstein, Josh Lerner and Scott Stern
The seventeenth volume of the National Bureau of Economic Research’s Innovation Policy and the Economy provides an accessible forum for bringing the work of leading academic researchers to an audience of policymakers and those interested in the interaction... View Details
Greenstein, Shane, Josh Lerner and Scott Stern, eds. Innovation Policy and the Economy, Volume 17. Chicago: University of Chicago Press, 2016.
- February 25, 2016
- Article
The Hodgepodge Principle in U.S. Privacy Policy
By: John A. Deighton
Data, says Professor Lawrence Summers, is the new oil, "a hugely valuable asset essential to economic life." Personal data, the kind of data that invites thoughts of privacy, is a big part of that. The European Union saw this economic fuel source coming long ago and... View Details
Keywords: Data; Privacy; Technology; Big Data; Personal Data; Marketing; Information Technology; Analytics and Data Science
Deighton, John A. "The Hodgepodge Principle in U.S. Privacy Policy." Harvard Law and Policy Review Blog (March 2, 2016). http://harvardlpr.com/2016/03/02/the-hodgepodge-principle-in-us-privacy-policy/.
- January 2016
- Case
Acxiom
By: John Deighton
Acxiom built the market for personal data, yet sales have been flat for a decade during which marketing's appetite for data has exploded. Will the acquisition of a digital data onboarder LiveRamp give marketers what they want from a data broker? View Details
- January 26, 2016
- Article
Hiding Personal Information Reveals the Worst
By: Leslie K. John, Kate Barasz and Michael I. Norton
Seven experiments explore people's decisions to share or withhold personal information and the wisdom of such decisions. When people choose not to reveal information—to be "hiders"—they are judged negatively by others (experiment 1). These negative judgments emerge... View Details
Keywords: Disclosure; Transparency; Policy-making; Privacy; Information; Corporate Disclosure; Decision Choices and Conditions; Trust
John, Leslie K., Kate Barasz, and Michael I. Norton. "Hiding Personal Information Reveals the Worst." Proceedings of the National Academy of Sciences 113, no. 4 (January 26, 2016): 954–959.
- October 2015 (Revised September 2016)
- Technical Note
Flight: Now without Humans Aboard
By: Mitchell Weiss, Karim Lakhani, HT Kung and Kerry Herman
This note provides an overview of the unmanned aerial vehicles (UAVs, or drones) industry in September 2015. UAVs offered many potential applications in industries as diverse as aerial imaging and photography, agriculture, construction, infrastructure inspection and... View Details
- September 2015
- Article
Design and Implementation of a Privacy Preserving Electronic Health Record Linkage Tool in Chicago
By: Abel Kho, John Cashy, Kathryn Jackson, Adam Pah, Satyender Goel, Jorn Boehnke, John Eric Humphries, Scott Duke Kominers and et al.
Objective
To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical... View Details
To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical... View Details
Keywords: Information; Customers; Safety; Rights; Ethics; Entrepreneurship; Health Care and Treatment; Health Industry; Chicago
Kho, Abel, John Cashy, Kathryn Jackson, Adam Pah, Satyender Goel, Jorn Boehnke, John Eric Humphries, Scott Duke Kominers, and et al. "Design and Implementation of a Privacy Preserving Electronic Health Record Linkage Tool in Chicago." Journal of the American Medical Informatics Association 22, no. 5 (September 2015): 1072–1080.
- Article
Big Other: Surveillance Capitalism and the Prospects of an Information Civilization
By: Shoshana Zuboff
This article describes an emergent logic of accumulation in the networked sphere, 'surveillance capitalism,' and considers its implications for 'information civilization.' The institutionalizing practices and operational assumptions of Google Inc. are the... View Details
Keywords: Surveillance Capitalism; Big Data; Google; Information Society; Privacy; Internet Of Everything; Rights; Economic Systems; Analytics and Data Science; Internet and the Web; Ethics
Zuboff, Shoshana. "Big Other: Surveillance Capitalism and the Prospects of an Information Civilization." Journal of Information Technology 30, no. 1 (March 2015): 75–89.
- January 2015
- Article
Competing with Privacy
By: Ramon Casadesus-Masanell and Andres Hervas-Drane
We analyze the implications of consumer privacy for competition in the marketplace. We consider a market where firms set prices and disclosure levels for consumer information, and consumers observe both before deciding which firm to patronize and how much information... View Details
Keywords: Information Acquisition; Information Disclosure; Online Privacy; Privacy Regulation; Information; Rights; Internet and the Web; Competition; Internet and the Web; Corporate Disclosure; Ethics; Knowledge Acquisition
Casadesus-Masanell, Ramon, and Andres Hervas-Drane. "Competing with Privacy." Management Science 61, no. 1 (January 2015): 229–246.
- August 2014
- Case
Netflix: Designing the Netflix Prize (A)
By: Karim R. Lakhani, Wesley M. Cohen, Kynon Ingram, Tushar Kothalkar, Maxim Kuzemchenko, Santosh Malik, Cynthia Meyn, Greta Friar and Stephanie Healy Pokrywa
In 2006, Reed Hastings, CEO of Netflix, was looking for a way to solve Netflix's customer churn problem. Netflix used Cinematch, its proprietary movie recommendation software, to promote individually determined best-fit movies to customers. Hastings determined that a... View Details
Keywords: Crowdsourcing; Prizes; Digitization; Algorithms; Recommendation Software; Disruption; Transformation; Collaborative Innovation and Invention; Technological Innovation; Knowledge Sharing; Applications and Software; Motion Pictures and Video Industry; Entertainment and Recreation Industry; Technology Industry; United States
Lakhani, Karim R., Wesley M. Cohen, Kynon Ingram, Tushar Kothalkar, Maxim Kuzemchenko, Santosh Malik, Cynthia Meyn, Greta Friar, and Stephanie Healy Pokrywa. "Netflix: Designing the Netflix Prize (A)." Harvard Business School Case 615-015, August 2014.
- March 2014 (Revised August 2015)
- Technical Note
Technology Innovations in K-12 Education
By: John J-H Kim, Roniesha Copeland and Christine S. An
This background note on technology innovations in education offers a market overview of the edtech sector and discusses trends, common challenges, and criticisms encountered in exploring edtech ventures. The note introduces the promise of educational technology as it... View Details
Kim, John J-H, Roniesha Copeland, and Christine S. An. "Technology Innovations in K-12 Education." Harvard Business School Technical Note 314-123, March 2014. (Revised August 2015.)
- June 2013
- Article
What Is Privacy Worth?
By: Alessandro Acquisti, Leslie K. John and George Loewenstein
Understanding the value that individuals assign to the protection of their personal data is of great importance for business, law, and public policy. We use a field experiment informed by behavioral economics and decision research to investigate individual privacy... View Details
Acquisti, Alessandro, Leslie K. John, and George Loewenstein. "What Is Privacy Worth?" Journal of Legal Studies 42, no. 2 (June 2013): 249–274.
- 2013
- Chapter
Privacy Breach Analysis in Social Networks
By: Frank Nagle
Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
- June 2012
- Article
The Transparency Paradox: A Role for Privacy in Organizational Learning and Operational Control
Using data from embedded participant-observers and a field experiment at the second largest mobile phone factory in the world, located in China, I theorize and test the implications of transparent organizational design on workers' productivity and organizational... View Details
Keywords: Transparency; Privacy; Organizational Learning; Operational Control; Organizational Performance; Chinese Manufacturing; Field Experiment; Rights; Interpersonal Communication; Management Practices and Processes; Ethics; Corporate Disclosure; Performance Productivity; Boundaries; Organizations; Social and Collaborative Networks; Labor and Management Relations; Power and Influence; Manufacturing Industry; China
Bernstein, Ethan S. "The Transparency Paradox: A Role for Privacy in Organizational Learning and Operational Control." Administrative Science Quarterly 57, no. 2 (June 2012): 181–216.