Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (109) Arrow Down
Filter Results: (109) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (526)
    • Faculty Publications  (109)

    Show Results For

    • All HBS Web  (526)
      • Faculty Publications  (109)

      privacyRemove privacy →

      ← Page 4 of 109 Results →

      Are you looking for?

      →Search All HBS Web
      • January–February 2018
      • Article

      Ads That Don't Overstep: How to Make Sure You Don't Take Personalization Too Far

      By: Leslie John, Tami Kim and Kate Barasz
      Data gathered on the web has vastly enhanced the capabilities of marketers. With people regularly sharing personal details online and internet cookies tracking every click, companies can now gain unprecedented insight into individual consumers and target them with... View Details
      Keywords: Digital Marketing; Customization and Personalization; Information; Customers; Attitudes
      Citation
      Find at Harvard
      Register to Read
      Related
      John, Leslie, Tami Kim, and Kate Barasz. "Ads That Don't Overstep: How to Make Sure You Don't Take Personalization Too Far." Harvard Business Review 96, no. 1 (January–February 2018): 62–69.
      • Article

      Mitigating Bias in Adaptive Data Gathering via Differential Privacy

      By: Seth Neel and Aaron Leon Roth
      Data that is gathered adaptively—via bandit algorithms, for example—exhibits bias. This is true both when gathering simple numeric valued data—the empirical means kept track of by stochastic bandit algorithms are biased downwards—and when gathering more complicated... View Details
      Keywords: Bandit Algorithms; Bias; Analytics and Data Science; Mathematical Methods; Theory
      Citation
      Read Now
      Related
      Neel, Seth, and Aaron Leon Roth. "Mitigating Bias in Adaptive Data Gathering via Differential Privacy." Proceedings of the International Conference on Machine Learning (ICML) 35th (2018).
      • November 7, 2017
      • Article

      Temporary Sharing Prompts Unrestrained Disclosures That Leave Lasting Negative Impressions

      By: Reto Hofstetter, Roland Rüppell and Leslie John
      With the advent of social media, the impressions people make on others are based increasingly on their digital disclosures. Yet digital disclosures can come back to haunt, making it challenging for people to manage the impressions they make. In field and online... View Details
      Keywords: Disclosure; Privacy; Self-presentation; Impression Formation; Behavior; Perspective; Internet and the Web; Social Media
      Citation
      Find at Harvard
      Read Now
      Related
      Hofstetter, Reto, Roland Rüppell, and Leslie John. "Temporary Sharing Prompts Unrestrained Disclosures That Leave Lasting Negative Impressions." Proceedings of the National Academy of Sciences 114, no. 45 (November 7, 2017).
      • September 19, 2017
      • Article

      After Equifax Breach, Companies Advised to Review Open-Source Software Code

      By: Ben DiPietro and Lou Shipley
      It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
      Lou... View Details
      Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
      Citation
      Register to Read
      Related
      DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
      • May 2017 (Revised July 2017)
      • Supplement

      Aadhaar: From Voluntary to Mandatory

      By: Tarun Khanna, Anjali Raina and Rachna Chawla
      Approximately 1.1 billion residents of India (99% of the population) had a unique biometric identity—Aadhaar—by 2017. In six years, the Unique Identification Authority of India (UIDAI) had achieved an unprecedented milestone in emerging and developed markets. The... View Details
      Keywords: Entrepreneurship; Business and Government Relations; Emerging Markets; Information; Information Technology; Organizational Design; Infrastructure; Identity; Projects; Information Management; Government and Politics; Digital Platforms; Internet and the Web; Transformation; Society; Welfare; Social Issues; Private Sector; Public Sector; Information Technology Industry; Asia; India; New Delhi
      Citation
      Purchase
      Related
      Khanna, Tarun, Anjali Raina, and Rachna Chawla. "Aadhaar: From Voluntary to Mandatory." Harvard Business School Supplement 717-512, May 2017. (Revised July 2017.)
      • January 2017 (Revised June 2017)
      • Case

      Chicago and the Array of Things: A Fitness Tracker for the City

      By: Rajiv Lal and Scott Johnson
      The city of Chicago has recently launched a project called the Array of Things. The program involves a series of sensor nodes placed around the city that capture a massive amount of data including pedestrian and vehicle flow, air quality, and cloud cover. The Array of... View Details
      Keywords: Smart Connected Products; Smart Cities; Internet Of Things; Sensors; Govenment; Government Administration; Technological Innovation; Digital Platforms; Applications and Software; Information Infrastructure; Internet and the Web; Public Administration Industry; Technology Industry; Chicago; United States
      Citation
      Educators
      Related
      Lal, Rajiv, and Scott Johnson. "Chicago and the Array of Things: A Fitness Tracker for the City." Harvard Business School Case 517-044, January 2017. (Revised June 2017.)
      • 2017
      • Article

      Making Transparency Transparent: The Evolution of Observation in Management Theory

      By: Ethan Bernstein
      Observation is key to management scholarship and practice. Yet a holistic view of its role in management has been elusive, in part due to shifting terminology. The current popularity of the term “transparency” provides the occasion for a thorough review, which finds... View Details
      Keywords: Transparency; Privacy; Observation; Tracking; Monitoring; Surveillance; Learning; Control; Disclosure; Process Visibility; Organizations; Theory; Information Technology; Relationships; Measurement and Metrics; Management Practices and Processes; Leadership; Law; Knowledge; Human Resources; Communication
      Citation
      Read Now
      Related
      Bernstein, Ethan. "Making Transparency Transparent: The Evolution of Observation in Management Theory." Academy of Management Annals 11, no. 1 (2017): 217–266.
      • October 2016 (Revised March 2018)
      • Teaching Note

      Apple: Privacy vs. Safety? (A) and (B)

      By: Nien-hê Hsieh, Henry McGee and Sarah McAra
      Teaching Note for HBS No. 316-069. View Details
      Citation
      Purchase
      Related
      Hsieh, Nien-hê, Henry McGee, and Sarah McAra. "Apple: Privacy vs. Safety? (A) and (B)." Harvard Business School Teaching Note 317-021, October 2016. (Revised March 2018.)
      • 2016
      • Book

      Innovation Policy and the Economy, Volume 17

      By: Shane Greenstein, Josh Lerner and Scott Stern
      The seventeenth volume of the National Bureau of Economic Research’s Innovation Policy and the Economy provides an accessible forum for bringing the work of leading academic researchers to an audience of policymakers and those interested in the interaction... View Details
      Keywords: Innovation and Invention; Technological Innovation; Governance; Policy; Economy
      Citation
      Purchase
      Related
      Greenstein, Shane, Josh Lerner and Scott Stern, eds. Innovation Policy and the Economy, Volume 17. Chicago: University of Chicago Press, 2016.
      • February 25, 2016
      • Article

      The Hodgepodge Principle in U.S. Privacy Policy

      By: John A. Deighton
      Data, says Professor Lawrence Summers, is the new oil, "a hugely valuable asset essential to economic life." Personal data, the kind of data that invites thoughts of privacy, is a big part of that. The European Union saw this economic fuel source coming long ago and... View Details
      Keywords: Data; Privacy; Technology; Big Data; Personal Data; Marketing; Information Technology; Analytics and Data Science
      Citation
      Read Now
      Deighton, John A. "The Hodgepodge Principle in U.S. Privacy Policy." Harvard Law and Policy Review Blog (March 2, 2016). http://harvardlpr.com/2016/03/02/the-hodgepodge-principle-in-us-privacy-policy/.
      • January 2016
      • Case

      Acxiom

      By: John Deighton
      Acxiom built the market for personal data, yet sales have been flat for a decade during which marketing's appetite for data has exploded. Will the acquisition of a digital data onboarder LiveRamp give marketers what they want from a data broker? View Details
      Keywords: Big Data; Direct Marketing; Personal Data; Privacy; Digital Marketing; Retargeting; Rights; Analytics and Data Science; Ethics; Marketing; United States
      Citation
      Educators
      Purchase
      Related
      Deighton, John. "Acxiom." Harvard Business School Case 516-037, January 2016.
      • January 26, 2016
      • Article

      Hiding Personal Information Reveals the Worst

      By: Leslie K. John, Kate Barasz and Michael I. Norton
      Seven experiments explore people's decisions to share or withhold personal information and the wisdom of such decisions. When people choose not to reveal information—to be "hiders"—they are judged negatively by others (experiment 1). These negative judgments emerge... View Details
      Keywords: Disclosure; Transparency; Policy-making; Privacy; Information; Corporate Disclosure; Decision Choices and Conditions; Trust
      Citation
      Find at Harvard
      Read Now
      Related
      John, Leslie K., Kate Barasz, and Michael I. Norton. "Hiding Personal Information Reveals the Worst." Proceedings of the National Academy of Sciences 113, no. 4 (January 26, 2016): 954–959.
      • October 2015 (Revised September 2016)
      • Technical Note

      Flight: Now without Humans Aboard

      By: Mitchell Weiss, Karim Lakhani, HT Kung and Kerry Herman
      This note provides an overview of the unmanned aerial vehicles (UAVs, or drones) industry in September 2015. UAVs offered many potential applications in industries as diverse as aerial imaging and photography, agriculture, construction, infrastructure inspection and... View Details
      Keywords: Public Entrepreneurship; Drones; Entrepreneurship; Business Startups; Product Design; Research and Development; Technological Innovation; Rights; Ethics; Strategy; Transportation Networks; Market Entry and Exit; Innovation and Management; European Union; Asia; United States
      Citation
      Educators
      Related
      Weiss, Mitchell, Karim Lakhani, HT Kung, and Kerry Herman. "Flight: Now without Humans Aboard." Harvard Business School Technical Note 816-045, October 2015. (Revised September 2016.)
      • September 2015
      • Article

      Design and Implementation of a Privacy Preserving Electronic Health Record Linkage Tool in Chicago

      By: Abel Kho, John Cashy, Kathryn Jackson, Adam Pah, Satyender Goel, Jorn Boehnke, John Eric Humphries, Scott Duke Kominers and et al.
      Objective
      To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical... View Details
      Keywords: Information; Customers; Safety; Rights; Ethics; Entrepreneurship; Health Care and Treatment; Health Industry; Chicago
      Citation
      Read Now
      Related
      Kho, Abel, John Cashy, Kathryn Jackson, Adam Pah, Satyender Goel, Jorn Boehnke, John Eric Humphries, Scott Duke Kominers, and et al. "Design and Implementation of a Privacy Preserving Electronic Health Record Linkage Tool in Chicago." Journal of the American Medical Informatics Association 22, no. 5 (September 2015): 1072–1080.
      • Article

      Big Other: Surveillance Capitalism and the Prospects of an Information Civilization

      By: Shoshana Zuboff
      This article describes an emergent logic of accumulation in the networked sphere, 'surveillance capitalism,' and considers its implications for 'information civilization.' The institutionalizing practices and operational assumptions of Google Inc. are the... View Details
      Keywords: Surveillance Capitalism; Big Data; Google; Information Society; Privacy; Internet Of Everything; Rights; Economic Systems; Analytics and Data Science; Internet and the Web; Ethics
      Citation
      SSRN
      Find at Harvard
      Related
      Zuboff, Shoshana. "Big Other: Surveillance Capitalism and the Prospects of an Information Civilization." Journal of Information Technology 30, no. 1 (March 2015): 75–89.
      • January 2015
      • Article

      Competing with Privacy

      By: Ramon Casadesus-Masanell and Andres Hervas-Drane
      We analyze the implications of consumer privacy for competition in the marketplace. We consider a market where firms set prices and disclosure levels for consumer information, and consumers observe both before deciding which firm to patronize and how much information... View Details
      Keywords: Information Acquisition; Information Disclosure; Online Privacy; Privacy Regulation; Information; Rights; Internet and the Web; Competition; Internet and the Web; Corporate Disclosure; Ethics; Knowledge Acquisition
      Citation
      Find at Harvard
      Read Now
      Related
      Casadesus-Masanell, Ramon, and Andres Hervas-Drane. "Competing with Privacy." Management Science 61, no. 1 (January 2015): 229–246.
      • August 2014
      • Case

      Netflix: Designing the Netflix Prize (A)

      By: Karim R. Lakhani, Wesley M. Cohen, Kynon Ingram, Tushar Kothalkar, Maxim Kuzemchenko, Santosh Malik, Cynthia Meyn, Greta Friar and Stephanie Healy Pokrywa
      In 2006, Reed Hastings, CEO of Netflix, was looking for a way to solve Netflix's customer churn problem. Netflix used Cinematch, its proprietary movie recommendation software, to promote individually determined best-fit movies to customers. Hastings determined that a... View Details
      Keywords: Crowdsourcing; Prizes; Digitization; Algorithms; Recommendation Software; Disruption; Transformation; Collaborative Innovation and Invention; Technological Innovation; Knowledge Sharing; Applications and Software; Motion Pictures and Video Industry; Entertainment and Recreation Industry; Technology Industry; United States
      Citation
      Educators
      Purchase
      Related
      Lakhani, Karim R., Wesley M. Cohen, Kynon Ingram, Tushar Kothalkar, Maxim Kuzemchenko, Santosh Malik, Cynthia Meyn, Greta Friar, and Stephanie Healy Pokrywa. "Netflix: Designing the Netflix Prize (A)." Harvard Business School Case 615-015, August 2014.
      • March 2014 (Revised August 2015)
      • Technical Note

      Technology Innovations in K-12 Education

      By: John J-H Kim, Roniesha Copeland and Christine S. An
      This background note on technology innovations in education offers a market overview of the edtech sector and discusses trends, common challenges, and criticisms encountered in exploring edtech ventures. The note introduces the promise of educational technology as it... View Details
      Citation
      Educators
      Purchase
      Related
      Kim, John J-H, Roniesha Copeland, and Christine S. An. "Technology Innovations in K-12 Education." Harvard Business School Technical Note 314-123, March 2014. (Revised August 2015.)
      • June 2013
      • Article

      What Is Privacy Worth?

      By: Alessandro Acquisti, Leslie K. John and George Loewenstein
      Understanding the value that individuals assign to the protection of their personal data is of great importance for business, law, and public policy. We use a field experiment informed by behavioral economics and decision research to investigate individual privacy... View Details
      Keywords: Safety; Rights; Valuation; Ethics; Identity
      Citation
      Find at Harvard
      Read Now
      Related
      Acquisti, Alessandro, Leslie K. John, and George Loewenstein. "What Is Privacy Worth?" Journal of Legal Studies 42, no. 2 (June 2013): 249–274.
      • 2013
      • Chapter

      Privacy Breach Analysis in Social Networks

      By: Frank Nagle
      Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
      Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
      Citation
      Find at Harvard
      Purchase
      Related
      Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
      • ←
      • 4
      • 5
      • 6
      • →

      Are you looking for?

      →Search All HBS Web
      ǁ
      Campus Map
      Harvard Business School
      Soldiers Field
      Boston, MA 02163
      →Map & Directions
      →More Contact Information
      • Make a Gift
      • Site Map
      • Jobs
      • Harvard University
      • Trademarks
      • Policies
      • Accessibility
      • Digital Accessibility
      Copyright © President & Fellows of Harvard College.