Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (87) Arrow Down
Filter Results: (87) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (87)
    • News  (6)
    • Research  (68)
    • Events  (1)
    • Multimedia  (1)
  • Faculty Publications  (19)

Show Results For

  • All HBS Web  (87)
    • News  (6)
    • Research  (68)
    • Events  (1)
    • Multimedia  (1)
  • Faculty Publications  (19)
Page 1 of 87 Results →
  • 2018
  • Flash Talks

Minimizing Identity Threats While Increasing Safety: Attending to Diversity Ideologies

  • 2014
  • Other Article

Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers

By: Ryann Elizabeth Manning, Julie Battilana and Lakshmi Ramarajan
Social movements challenge institutions through two related communication processes: articulating collective action frames and constructing collective movement identity. We argue that frames not only express movement identity, but also provide openings through which... View Details
Keywords: Identity Threat; Institutional Change; Social Movements; Framing; Social Issues; Identity; Organizational Culture; Change
Citation
Find at Harvard
Related
Manning, Ryann Elizabeth, Julie Battilana, and Lakshmi Ramarajan. "Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers." Academy of Management Annual Meeting Proceedings (2014): 453–458.
  • October 2011
  • Article

Under Threat: Responses to and the Consequences of Threats to Individuals' Identities

I review and reconceptualize identity threat, defining it as an experience appraised as indicating potential harm to the value, meanings, or enactment of an identity. I also develop a theoretical model and propositions that generate insights into how individuals... View Details
Keywords: Identity; Value; Theory; Organizations; Research
Citation
Find at Harvard
Related
Petriglieri, Jennifer L. "Under Threat: Responses to and the Consequences of Threats to Individuals' Identities." Academy of Management Review 36, no. 4 (October 2011).
  • 2025
  • Working Paper

Threat and Assimilation: Evidence from Refugees in Germany

By: Philipp Jaschke, Sulin Sardoschau and Marco Tabellini
This paper studies the effects of local threat on the cultural assimilation and economic integration of refugees, exploiting plausibly exogenous variation in their allocation across German regions between 2013 and 2016. We use representative survey data and... View Details
Keywords: Assimilation; Threat Hypothesis; Migration; Cultural Change; Refugees; Culture; Identity; Germany
Citation
SSRN
Find at Harvard
Read Now
Related
Jaschke, Philipp, Sulin Sardoschau, and Marco Tabellini. "Threat and Assimilation: Evidence from Refugees in Germany." Harvard Business School Working Paper, No. 22-043, December 2021. (Revised January 2025. Revise and resubmit at the Economic Journal. Also available from NBER, and featured on Le Monde.)
  • 26 Apr 2018
  • Video

2018 G&WS: Aspen Robinson Presents "Minimizing Identity Threats While Increasing Safety: Attending to Diversity Ideologies"

  • January 2023
  • Article

Calculators for Women: When Identity-Based Appeals Backfire

By: Tami Kim, Kate Barasz, Michael I. Norton and Leslie K. John
From “Chick Beer” to “Dryer Sheets for Men,” identity-based labeling is frequently deployed by marketers to appeal to specific target markets. Yet such identity appeals can backfire, alienating the very consumers they aim to attract. We theorize and empirically... View Details
Keywords: Categorization Threat; Stereotypes; Identity; Labels; Gender; Perception; Consumer Behavior
Citation
Find at Harvard
Purchase
Related
Kim, Tami, Kate Barasz, Michael I. Norton, and Leslie K. John. "Calculators for Women: When Identity-Based Appeals Backfire." Special Issue on Racism and Discrimination in the Marketplace edited by Samantha N. N. Cross and Stephanie Dellande. Journal of the Association for Consumer Research 8, no. 1 (January 2023): 72–82.
  • May 2014
  • Article

Group Membership Alters the Threshold for Mind Perception: The Role of Social Identity, Collective Identification, and Intergroup Threat

By: Leor M. Hackel, Christine E. Looser and Jay J. Van Bavel
Human faces are used as cues to the presence of social agents, and the ability to detect minds and mental states in others occupies a central role in social interaction. In the current research, we present evidence that the human propensity for mind perception is bound... View Details
Keywords: Groups and Teams; Identity; Personal Characteristics; Cognition and Thinking
Citation
Find at Harvard
Related
Hackel, Leor M., Christine E. Looser, and Jay J. Van Bavel. "Group Membership Alters the Threshold for Mind Perception: The Role of Social Identity, Collective Identification, and Intergroup Threat." Journal of Experimental Social Psychology 52 (May 2014): 15–23.
  • 2017
  • Working Paper

Shopping for Confirmation: How Disconfirming Feedback Shapes Social Networks

By: Paul Green Jr., Francesca Gino and Bradley Staats
Many organizations employ interpersonal feedback processes as a structured means of informing and motivating employee improvement. Ample evidence suggests that these feedback processes are largely ineffective, and despite a wealth of prescriptive literature, these... View Details
Keywords: Developmental Feedback; Self-concept; Positive Illusions; Social Network; Threat; Identity; Social and Collaborative Networks; Behavior; Performance; Social Media
Citation
SSRN
Read Now
Related
Green, Paul, Jr., Francesca Gino, and Bradley Staats. "Shopping for Confirmation: How Disconfirming Feedback Shapes Social Networks." Harvard Business School Working Paper, No. 18-028, September 2017.
  • September 2013
  • Article

Status Boundary Enforcement and the Categorization of Black-White Biracials

By: Arnold K. Ho, Jim Sidanius, Amy J.C. Cuddy and Mahzarin R. Banaji
Individuals who qualify equally for membership in more than one racial group are not judged as belonging equally to both of their parent groups, but instead are seen as belonging more to their lower status parent group. Why? The present paper begins to establish the... View Details
Keywords: Hypodescent; Social Dominance Orientation; Intergroup Threat; Hierarchy Maintenance; Equality and Inequality; Race; Rank and Position; Attitudes; Identity
Citation
Find at Harvard
Related
Ho, Arnold K., Jim Sidanius, Amy J.C. Cuddy, and Mahzarin R. Banaji. "Status Boundary Enforcement and the Categorization of Black-White Biracials." Journal of Experimental Social Psychology 49, no. 5 (September 2013): 940–943.
  • 14 May 2019
  • HBS Seminar

Patti Williams, Wharton, University of Pennsylvania

    Laura V. Jakli

    Laura Jakli is an Assistant Professor in the Business, Government, and the International Economy Unit at Harvard Business School.

    Her primary expertise is in comparative politics and examines how information communication technologies shape political... View Details
    • 2009
    • Chapter

    Collaboration Across Knowledge Boundaries within Diverse Teams: Reciprocal Expertise Affirmation as an Enabling Condition

    By: Amy C. Edmondson, Kate Roloff and Lucy H. MacPhail
    We review research on expertise diversity, psychological safety, team collaboration, and role identity to propose a model in which reciprocal affirmations of expertise identity among team members—a feature of the team environment that we conceptualize as a dimension of... View Details
    Keywords: Interpersonal Communication; Experience and Expertise; Learning; Knowledge Use and Leverage; Groups and Teams; Familiarity; Identity; Cooperation
    Citation
    Related
    Edmondson, Amy C., Kate Roloff, and Lucy H. MacPhail. "Collaboration Across Knowledge Boundaries within Diverse Teams: Reciprocal Expertise Affirmation as an Enabling Condition." In Exploring Positive Identities and Organizations: Building a Theoretical and Research Foundation, edited by Laura M. Roberts and Jane E. Dutton, 311–332. Psychology Press, 2009.
    • Article

    Relational Reconciliation: Socializing Others Across Demographic Differences

    By: Lakshmi Ramarajan and Erin M. Reid
    In demographically diverse organizations, employees charged with socializing others— socialization agents—must navigate a deep tension between the organization’s needs to integrate individuals into a collective and individuals’ needs for recognition of their unique... View Details
    Keywords: Diversity; Organizational Culture; Identity; Employees
    Citation
    Find at Harvard
    Read Now
    Purchase
    Related
    Ramarajan, Lakshmi, and Erin M. Reid. "Relational Reconciliation: Socializing Others Across Demographic Differences." Academy of Management Journal 63, no. 2 (April 2020): 356–385.
    • Article

    Backlash Against Male Elementary Educators

    By: Corinne A. Moss-Racusin and Elizabeth R. Johnson
    We investigated the existence, nature, and processes underscoring backlash (social and economic penalties) against men who violate gender stereotypes by working in education, and whether backlash is exacerbated by internal (vs. external) behavioral attributions.... View Details
    Keywords: Backlash Theory; Gender Stereotypes; Teaching; Early Childhood Education; Gender
    Citation
    Find at Harvard
    Related
    Moss-Racusin, Corinne A., and Elizabeth R. Johnson. "Backlash Against Male Elementary Educators." Journal of Applied Social Psychology 46, no. 7 (July 2016): 379–393.
    • December 2022 (Revised June 2023)
    • Case

    Hacking the U.S. Election: Russia's Misinformation Campaign

    By: Shikhar Ghosh
    The case discusses the relatively low technology approach used by Russia to influence the U.S. Presidential Election in 2016. Although political parties manipulating the media was not a new phenomenon, the Russians ran a broad, well-financed, and sophisticated social... View Details
    Keywords: Political Elections; International Relations; Social Media; Power and Influence; Information; Russia; United States
    Citation
    Educators
    Purchase
    Related
    Ghosh, Shikhar. "Hacking the U.S. Election: Russia's Misinformation Campaign." Harvard Business School Case 823-043, December 2022. (Revised June 2023.)
    • October 2023 (Revised March 2024)
    • Case

    Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game

    By: Tsedal Neeley, Jeff Huizinga and Emily Grandjean
    Ken Xie, cofounder of cybersecurity giant Fortinet, faced a critical decision that would validate his leadership. Fortinet became the industry’s second-largest pureplay cybersecurity firm by developing differentiated hardware and investing in R&D. However, after a... View Details
    Keywords: Leadership Development; Leadership Style; Marketing Strategy; Communication Strategy; Cybersecurity; Competitive Advantage; Information Technology Industry; United States; Sunnyvale
    Citation
    Educators
    Purchase
    Related
    Neeley, Tsedal, Jeff Huizinga, and Emily Grandjean. "Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game." Harvard Business School Case 424-016, October 2023. (Revised March 2024.)
    • May 2019
    • Article

    A Counterfeit Competence: After Threat, Cheating Boosts One's Self-Image

    By: S. Wiley Wakeman, Celia Moore and F. Gino
    In six studies, we show that after experiencing a threat to their abilities, individuals who misrepresent their performance as better than it actually is boost their feelings of competence. We situate these findings in the literature on self-protection. We show that... View Details
    Keywords: Cheating; Self-perception; Self-protection; Competency and Skills; Identity; Perception; Performance
    Citation
    Find at Harvard
    Related
    Wakeman, S. Wiley, Celia Moore, and F. Gino. "A Counterfeit Competence: After Threat, Cheating Boosts One's Self-Image." Journal of Experimental Social Psychology 82 (May 2019): 253–265.
    • September 2017 (Revised July 2018)
    • Case

    CyberArk: Protecting the Keys to the IT Kingdom

    By: Raffaella Sadun, David Yoffie and Margot Eiran
    CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
    Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
    Citation
    Educators
    Purchase
    Related
    Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
    • Research Summary

    Professor Hiatt’s research is aimed at discovering how institutional factors can affect sector growth and technology development and adoption by mediating and moderating uncertainty. His work encompasses two related research questions:

    1) How can... View Details

    • July 16, 2016
    • Article

    A Game Theoretic Model for Resource Allocation Among Countermeasures with Multiple Attributes

    By: Elisabeth C. Paulson, Igor Linkov and Jeffrey Keisler
    We study a strategic, two-player, sequential game between an attacker and defender. The defender must allocate resources amongst possible countermeasures and across possible targets. The attacker then chooses a type of threat and a target to attack. This paper proposes... View Details
    Keywords: Resource Allocation; Game Theory; Strategy
    Citation
    Find at Harvard
    Read Now
    Related
    Paulson, Elisabeth C., Igor Linkov, and Jeffrey Keisler. "A Game Theoretic Model for Resource Allocation Among Countermeasures with Multiple Attributes." European Journal of Operational Research 252, no. 2 (July 16, 2016): 610–622.
    • 1
    • 2
    • 3
    • 4
    • 5
    • →
    ǁ
    Campus Map
    Harvard Business School
    Soldiers Field
    Boston, MA 02163
    →Map & Directions
    →More Contact Information
    • Make a Gift
    • Site Map
    • Jobs
    • Harvard University
    • Trademarks
    • Policies
    • Accessibility
    • Digital Accessibility
    Copyright © President & Fellows of Harvard College.