Filter Results:
(41)
Show Results For
- All HBS Web (41)
- Faculty Publications (8)
Show Results For
- All HBS Web (41)
- Faculty Publications (8)
Page 1 of 41
Results →
- Web
Encrypting Emails | Information Technology
Encrypting Emails Microsoft Purview Message Encryption When sending sensitive information to other people, you need to be extremely careful regarding what tools you use. Which is why we’re pleased that... View Details
- February 2021
- Case
Apple: Privacy vs. Safety (A)
By: Henry McGee, Nien-hê Hsieh, Sarah McAra and Christian Godwin
In 2015, Apple CEO Tim Cook debuted the iPhone 6S with enhanced security measures that enflamed a debate on privacy and public safety around the world. The iPhone 6S, amid a heightened concern for privacy following the 2013 revelation of clandestine U.S. surveillance... View Details
Keywords: Iphone; Encryption; Data Privacy; Customers; Customer Focus and Relationships; Decision Making; Ethics; Values and Beliefs; Globalized Firms and Management; Government and Politics; National Security; Law; Law Enforcement; Leadership; Markets; Safety; Social Issues; Corporate Social Responsibility and Impact; Civil Society or Community; Mobile and Wireless Technology; Technology Industry; Consumer Products Industry; Telecommunications Industry; Electronics Industry; United States; China; Hong Kong
McGee, Henry, Nien-hê Hsieh, Sarah McAra, and Christian Godwin. "Apple: Privacy vs. Safety (A)." Harvard Business School Case 321-004, February 2021.
- February 1999
- Exercise
Great Encryption Debate, The: General and Confidential Instructions for Director of Federal Investigative Service (FIS)
Watkins, Michael D., and Usha Thakrar. "Great Encryption Debate, The: General and Confidential Instructions for Director of Federal Investigative Service (FIS)." Harvard Business School Exercise 899-185, February 1999.
- January 2023
- Supplement
Apple: Privacy vs. Safety (B)
By: Henry McGee, Nien-hê Hsieh and Christian Godwin
In 2020, as the COVID-19 pandemic swept across the globe, Apple and Google partnered to develop a contact tracing application that would collect information about users infected with the disease and notify those who they had been in contact with. While Apple/Google’s... View Details
Keywords: Iphone; Encryption; Data Privacy; Customers; Customer Focus and Relationships; Decision Making; Ethics; Values and Beliefs; Globalized Firms and Management; Government and Politics; Health; Health Pandemics; Leadership; Markets; Safety; Social Issues; Information Technology; Telecommunications Industry; Technology Industry; Consumer Products Industry; Electronics Industry; Health Industry; United States; Europe
McGee, Henry, Nien-hê Hsieh, and Christian Godwin. "Apple: Privacy vs. Safety (B)." Harvard Business School Supplement 323-066, January 2023.
- March 1999 (Revised May 1999)
- Case
Network Associates: Securing the Internet
By: Debora L. Spar
Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would begin selling powerful encryption software from its Dutch subsidiary. Such a move looked to the U.S. government like... View Details
Keywords: Internet and the Web; Information Technology Industry; Public Administration Industry; Telecommunications Industry; United States
Spar, Debora L., and Jennifer Burns. "Network Associates: Securing the Internet." Harvard Business School Case 799-087, March 1999. (Revised May 1999.)
- 04 Oct 2016
- News
Why the Market Yawned When Yahoo Was Hacked
- October 2019 (Revised January 2020)
- Case
Fixing Facebook: Fake News, Privacy, and Platform Governance
By: David Yoffie and Daniel Fisher
Mark Zuckerberg founded Facebook based on the idea that connecting people was a fundamentally good thing—and a way to turn a handsome profit. But from the beginning, Facebook received criticism both for how it handled user privacy and how it curated user-generated... View Details
Keywords: Platform; Governance; Privacy; Internet and the Web; Corporate Governance; Ethics; Business and Government Relations; Strategy; Digital Platforms; Web Services Industry
Yoffie, David, and Daniel Fisher. "Fixing Facebook: Fake News, Privacy, and Platform Governance." Harvard Business School Case 720-400, October 2019. (Revised January 2020.)
- August 2023
- Supplement
Apple: Privacy vs. Safety (C)
By: Henry McGee, Nien-hê Hsieh and Kerry Herman
In September 2021, Apple decided to delay updates to iOS and iPadOS that included features to fight child sexual abuse. While many—including prominent privacy and security experts—praised Apple, others were opposed. They saw Apple introducing features that risked... View Details
Keywords: Corporate Social Responsibility and Impact; Values and Beliefs; Public Opinion; Applications and Software; Leadership
McGee, Henry, Nien-hê Hsieh, and Kerry Herman. "Apple: Privacy vs. Safety (C)." Harvard Business School Supplement 324-033, August 2023.
- 13 Feb 2024
- Cold Call Podcast
Apple’s Dilemma: Balancing Privacy and Safety Responsibilities
Keywords: Re: Nien-he Hsieh & Henry W. McGee
- May 2004 (Revised March 2005)
- Case
Music Downloads
By: David B. Yoffie and Deborah Freier
Examines the competition between competing music formats. In the '90s, the MP3 format challenged the traditional means of music distribution by allowing for storage of near CD-quality recordings at 1/10th of their previous size. The threat to traditional distribution... View Details
Keywords: Disruption; Music Entertainment; Legal Liability; Distribution; Competition; Internet and the Web; Technology Adoption; Information Infrastructure; Entertainment and Recreation Industry; Music Industry
Yoffie, David B., and Deborah Freier. "Music Downloads." Harvard Business School Case 704-503, May 2004. (Revised March 2005.)
- March 2009
- Article
Risk Management and Calculative Cultures
By: Anette Mikes
Enterprise risk management (ERM) has recently emerged as a widespread practice in financial institutions. It has been increasingly codified and encrypted into regulatory, corporate governance and organisational management blueprints. A burgeoning literature of... View Details
Keywords: Risk Management; Practice; Banks and Banking; Corporate Governance; Value; Business and Shareholder Relations; Managerial Roles; Culture; Governing Rules, Regulations, and Reforms; Business or Company Management; Financial Services Industry
Mikes, Anette. "Risk Management and Calculative Cultures." Management Accounting Research 20, no. 1 (March 2009): 18–40. (
Winner of David Solomons Prize For the best paper in each annual volume of Management Accounting Research presented by Chartered Institute of Management Accountants
.)- 26 May 2022
- HBS Case
Apple vs. Feds: Is iPhone Privacy a Basic Human Right?
responded to these brewing forces with an improved encryption system that put privacy in the hands of the consumer. The company no longer possessed a master key to devices that government officials could request. Instead, when a user... View Details
Keywords: by Avery Forman
- 01 Jun 2024
- News
Quantum Leap
today’s fastest digital supercomputers years to complete. Quantum computers will be able to carry out complex financial chores like pricing derivatives and optimizing portfolios in the blink of an eye. They will crack even the strongest digital View Details
- Web
Transferring Data - Research Computing Services
Potentially up to Level 4 Individuals may elect to mail ("snail mail") or hand deliver (i.e., “Sneaker Net”) electronic data on a external portable storage device. This can included devices like flash drives. Note that if the data are Level 3 or higher, the external... View Details
- 02 Oct 2017
- What Do You Think?
Do Bitcoin and Digital Currency Have a Future?
ever about innovative financial endeavors. So that brings me to the subject of digital money or “cryptocurrency,” a form of encrypted digital money. How should we think about the future of a currency that is manufactured (“mined”) and... View Details
- Web
IT Policies & Governance | Information Technology
IT Policies & Governance Policies and guidelines are in place at Harvard Business School and across Harvard to help the community ensure compliance and understanding of how to use to technology and devices effectively and securely. Personal Devices Security... View Details
- Web
Using Personal Devices for HBS Business | Information Technology
requirements beyond what is listed here , including tools which are approved or required. Please consult with your manager. Suggested Resources for Encryption Leveraging tools built into your operating system may be the simplest path... View Details
- Web
Security & Privacy | Information Technology
to individual identity theft, including filing fraudulent tax returns. Thank you for your commitment to keeping Harvard’s data safe and secure. Best Practices Review various best practices to help keep information and devices more secure. View Details
- 24 Sep 2001
- Research & Ideas
Five Questions for Debora L. Spar
companies pushed the U.S. government in the late 1990s into relaxing its rules on encryption exports—a great case of how the Internet would seem to take power away from the state and put it, as Lewis might predict, back into the hands of... View Details
Keywords: by Sean Silverthorne
- 07 Jan 2015
- What Do You Think?
SUMMING UP: What Are the Limits On Workplace Transparency?
the Internet? How many of us have then received offers for products that we didn't yet know we needed? Organizational transparency today most often is associated with good management practice There is a movement afoot to thwart personal transparency. The market for... View Details
Keywords: by James Heskett