Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (11) Arrow Down
Filter Results: (11) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (88)
    • Faculty Publications  (11)

    Show Results For

    • All HBS Web  (88)
      • Faculty Publications  (11)

      Identity ThreatRemove Identity Threat →

      Page 1 of 11 Results

      Are you looking for?

      →Search All HBS Web
      • October 2023 (Revised March 2024)
      • Case

      Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game

      By: Tsedal Neeley, Jeff Huizinga and Emily Grandjean
      Ken Xie, cofounder of cybersecurity giant Fortinet, faced a critical decision that would validate his leadership. Fortinet became the industry’s second-largest pureplay cybersecurity firm by developing differentiated hardware and investing in R&D. However, after a... View Details
      Keywords: Leadership Development; Leadership Style; Marketing Strategy; Communication Strategy; Cybersecurity; Competitive Advantage; Information Technology Industry; United States; Sunnyvale
      Citation
      Educators
      Purchase
      Related
      Neeley, Tsedal, Jeff Huizinga, and Emily Grandjean. "Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game." Harvard Business School Case 424-016, October 2023. (Revised March 2024.)
      • January 2023
      • Article

      Calculators for Women: When Identity-Based Appeals Backfire

      By: Tami Kim, Kate Barasz, Michael I. Norton and Leslie K. John
      From “Chick Beer” to “Dryer Sheets for Men,” identity-based labeling is frequently deployed by marketers to appeal to specific target markets. Yet such identity appeals can backfire, alienating the very consumers they aim to attract. We theorize and empirically... View Details
      Keywords: Categorization Threat; Stereotypes; Identity; Labels; Gender; Perception; Consumer Behavior
      Citation
      Find at Harvard
      Purchase
      Related
      Kim, Tami, Kate Barasz, Michael I. Norton, and Leslie K. John. "Calculators for Women: When Identity-Based Appeals Backfire." Special Issue on Racism and Discrimination in the Marketplace edited by Samantha N. N. Cross and Stephanie Dellande. Journal of the Association for Consumer Research 8, no. 1 (January 2023): 72–82.
      • December 2022 (Revised June 2023)
      • Case

      Hacking the U.S. Election: Russia's Misinformation Campaign

      By: Shikhar Ghosh
      The case discusses the relatively low technology approach used by Russia to influence the U.S. Presidential Election in 2016. Although political parties manipulating the media was not a new phenomenon, the Russians ran a broad, well-financed, and sophisticated social... View Details
      Keywords: Political Elections; International Relations; Social Media; Power and Influence; Information; Russia; United States
      Citation
      Educators
      Purchase
      Related
      Ghosh, Shikhar. "Hacking the U.S. Election: Russia's Misinformation Campaign." Harvard Business School Case 823-043, December 2022. (Revised June 2023.)
      • 2025
      • Working Paper

      Threat and Assimilation: Evidence from Refugees in Germany

      By: Philipp Jaschke, Sulin Sardoschau and Marco Tabellini
      This paper studies the effects of local threat on the cultural assimilation and economic integration of refugees, exploiting plausibly exogenous variation in their allocation across German regions between 2013 and 2016. We use representative survey data and... View Details
      Keywords: Assimilation; Threat Hypothesis; Migration; Cultural Change; Refugees; Culture; Identity; Germany
      Citation
      SSRN
      Find at Harvard
      Read Now
      Related
      Jaschke, Philipp, Sulin Sardoschau, and Marco Tabellini. "Threat and Assimilation: Evidence from Refugees in Germany." Harvard Business School Working Paper, No. 22-043, December 2021. (Revised January 2025. Revise and resubmit at the Economic Journal. Also available from NBER, and featured on Le Monde.)
      • Article

      Relational Reconciliation: Socializing Others Across Demographic Differences

      By: Lakshmi Ramarajan and Erin M. Reid
      In demographically diverse organizations, employees charged with socializing others— socialization agents—must navigate a deep tension between the organization’s needs to integrate individuals into a collective and individuals’ needs for recognition of their unique... View Details
      Keywords: Diversity; Organizational Culture; Identity; Employees
      Citation
      Find at Harvard
      Read Now
      Purchase
      Related
      Ramarajan, Lakshmi, and Erin M. Reid. "Relational Reconciliation: Socializing Others Across Demographic Differences." Academy of Management Journal 63, no. 2 (April 2020): 356–385.
      • May 2019
      • Article

      A Counterfeit Competence: After Threat, Cheating Boosts One's Self-Image

      By: S. Wiley Wakeman, Celia Moore and F. Gino
      In six studies, we show that after experiencing a threat to their abilities, individuals who misrepresent their performance as better than it actually is boost their feelings of competence. We situate these findings in the literature on self-protection. We show that... View Details
      Keywords: Cheating; Self-perception; Self-protection; Competency and Skills; Identity; Perception; Performance
      Citation
      Find at Harvard
      Related
      Wakeman, S. Wiley, Celia Moore, and F. Gino. "A Counterfeit Competence: After Threat, Cheating Boosts One's Self-Image." Journal of Experimental Social Psychology 82 (May 2019): 253–265.
      • 2017
      • Working Paper

      Shopping for Confirmation: How Disconfirming Feedback Shapes Social Networks

      By: Paul Green Jr., Francesca Gino and Bradley Staats
      Many organizations employ interpersonal feedback processes as a structured means of informing and motivating employee improvement. Ample evidence suggests that these feedback processes are largely ineffective, and despite a wealth of prescriptive literature, these... View Details
      Keywords: Developmental Feedback; Self-concept; Positive Illusions; Social Network; Threat; Identity; Social and Collaborative Networks; Behavior; Performance; Social Media
      Citation
      SSRN
      Read Now
      Related
      Green, Paul, Jr., Francesca Gino, and Bradley Staats. "Shopping for Confirmation: How Disconfirming Feedback Shapes Social Networks." Harvard Business School Working Paper, No. 18-028, September 2017.
      • September 2017 (Revised July 2018)
      • Case

      CyberArk: Protecting the Keys to the IT Kingdom

      By: Raffaella Sadun, David Yoffie and Margot Eiran
      CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
      Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
      Citation
      Educators
      Purchase
      Related
      Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
      • July 16, 2016
      • Article

      A Game Theoretic Model for Resource Allocation Among Countermeasures with Multiple Attributes

      By: Elisabeth C. Paulson, Igor Linkov and Jeffrey Keisler
      We study a strategic, two-player, sequential game between an attacker and defender. The defender must allocate resources amongst possible countermeasures and across possible targets. The attacker then chooses a type of threat and a target to attack. This paper proposes... View Details
      Keywords: Resource Allocation; Game Theory; Strategy
      Citation
      Find at Harvard
      Read Now
      Related
      Paulson, Elisabeth C., Igor Linkov, and Jeffrey Keisler. "A Game Theoretic Model for Resource Allocation Among Countermeasures with Multiple Attributes." European Journal of Operational Research 252, no. 2 (July 16, 2016): 610–622.
      • 2014
      • Other Article

      Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers

      By: Ryann Elizabeth Manning, Julie Battilana and Lakshmi Ramarajan
      Social movements challenge institutions through two related communication processes: articulating collective action frames and constructing collective movement identity. We argue that frames not only express movement identity, but also provide openings through which... View Details
      Keywords: Identity Threat; Institutional Change; Social Movements; Framing; Social Issues; Identity; Organizational Culture; Change
      Citation
      Find at Harvard
      Related
      Manning, Ryann Elizabeth, Julie Battilana, and Lakshmi Ramarajan. "Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers." Academy of Management Annual Meeting Proceedings (2014): 453–458.
      • 2009
      • Chapter

      Collaboration Across Knowledge Boundaries within Diverse Teams: Reciprocal Expertise Affirmation as an Enabling Condition

      By: Amy C. Edmondson, Kate Roloff and Lucy H. MacPhail
      We review research on expertise diversity, psychological safety, team collaboration, and role identity to propose a model in which reciprocal affirmations of expertise identity among team members—a feature of the team environment that we conceptualize as a dimension of... View Details
      Keywords: Interpersonal Communication; Experience and Expertise; Learning; Knowledge Use and Leverage; Groups and Teams; Familiarity; Identity; Cooperation
      Citation
      Related
      Edmondson, Amy C., Kate Roloff, and Lucy H. MacPhail. "Collaboration Across Knowledge Boundaries within Diverse Teams: Reciprocal Expertise Affirmation as an Enabling Condition." In Exploring Positive Identities and Organizations: Building a Theoretical and Research Foundation, edited by Laura M. Roberts and Jane E. Dutton, 311–332. Psychology Press, 2009.
      • 1

      Are you looking for?

      →Search All HBS Web
      ǁ
      Campus Map
      Harvard Business School
      Soldiers Field
      Boston, MA 02163
      →Map & Directions
      →More Contact Information
      • Make a Gift
      • Site Map
      • Jobs
      • Harvard University
      • Trademarks
      • Policies
      • Accessibility
      • Digital Accessibility
      Copyright © President & Fellows of Harvard College.