Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (68) Arrow Down
Filter Results: (68) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (87)
    • News  (6)
    • Research  (68)
    • Events  (1)
    • Multimedia  (1)
  • Faculty Publications  (19)

Show Results For

  • All HBS Web  (87)
    • News  (6)
    • Research  (68)
    • Events  (1)
    • Multimedia  (1)
  • Faculty Publications  (19)
Page 1 of 68 Results →
Sort by

Are you looking for?

→Search All HBS Web
  • 2014
  • Other Article

Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers

By: Ryann Elizabeth Manning, Julie Battilana and Lakshmi Ramarajan
Social movements challenge institutions through two related communication processes: articulating collective action frames and constructing collective movement identity. We argue that frames not only express movement identity, but also provide openings through which... View Details
Keywords: Identity Threat; Institutional Change; Social Movements; Framing; Social Issues; Identity; Organizational Culture; Change
Citation
Find at Harvard
Related
Manning, Ryann Elizabeth, Julie Battilana, and Lakshmi Ramarajan. "Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers." Academy of Management Annual Meeting Proceedings (2014): 453–458.
  • October 2011
  • Article

Under Threat: Responses to and the Consequences of Threats to Individuals' Identities

I review and reconceptualize identity threat, defining it as an experience appraised as indicating potential harm to the value, meanings, or enactment of an identity. I also develop a theoretical model and propositions that generate insights into how individuals... View Details
Keywords: Identity; Value; Theory; Organizations; Research
Citation
Find at Harvard
Related
Petriglieri, Jennifer L. "Under Threat: Responses to and the Consequences of Threats to Individuals' Identities." Academy of Management Review 36, no. 4 (October 2011).
  • 2025
  • Working Paper

Threat and Assimilation: Evidence from Refugees in Germany

By: Philipp Jaschke, Sulin Sardoschau and Marco Tabellini
This paper studies the effects of local threat on the cultural assimilation and economic integration of refugees, exploiting plausibly exogenous variation in their allocation across German regions between 2013 and 2016. We use representative survey data and... View Details
Keywords: Assimilation; Threat Hypothesis; Migration; Cultural Change; Refugees; Culture; Identity; Germany
Citation
SSRN
Find at Harvard
Read Now
Related
Jaschke, Philipp, Sulin Sardoschau, and Marco Tabellini. "Threat and Assimilation: Evidence from Refugees in Germany." Harvard Business School Working Paper, No. 22-043, December 2021. (Revised January 2025. Revise and resubmit at the Economic Journal. Also available from NBER, and featured on Le Monde.)
  • January 2023
  • Article

Calculators for Women: When Identity-Based Appeals Backfire

By: Tami Kim, Kate Barasz, Michael I. Norton and Leslie K. John
From “Chick Beer” to “Dryer Sheets for Men,” identity-based labeling is frequently deployed by marketers to appeal to specific target markets. Yet such identity appeals can backfire, alienating the very consumers they aim to attract. We theorize and empirically... View Details
Keywords: Categorization Threat; Stereotypes; Identity; Labels; Gender; Perception; Consumer Behavior
Citation
Find at Harvard
Purchase
Related
Kim, Tami, Kate Barasz, Michael I. Norton, and Leslie K. John. "Calculators for Women: When Identity-Based Appeals Backfire." Special Issue on Racism and Discrimination in the Marketplace edited by Samantha N. N. Cross and Stephanie Dellande. Journal of the Association for Consumer Research 8, no. 1 (January 2023): 72–82.
  • 2017
  • Working Paper

Shopping for Confirmation: How Disconfirming Feedback Shapes Social Networks

By: Paul Green Jr., Francesca Gino and Bradley Staats
Many organizations employ interpersonal feedback processes as a structured means of informing and motivating employee improvement. Ample evidence suggests that these feedback processes are largely ineffective, and despite a wealth of prescriptive literature, these... View Details
Keywords: Developmental Feedback; Self-concept; Positive Illusions; Social Network; Threat; Identity; Social and Collaborative Networks; Behavior; Performance; Social Media
Citation
SSRN
Read Now
Related
Green, Paul, Jr., Francesca Gino, and Bradley Staats. "Shopping for Confirmation: How Disconfirming Feedback Shapes Social Networks." Harvard Business School Working Paper, No. 18-028, September 2017.
  • May 2014
  • Article

Group Membership Alters the Threshold for Mind Perception: The Role of Social Identity, Collective Identification, and Intergroup Threat

By: Leor M. Hackel, Christine E. Looser and Jay J. Van Bavel
Human faces are used as cues to the presence of social agents, and the ability to detect minds and mental states in others occupies a central role in social interaction. In the current research, we present evidence that the human propensity for mind perception is bound... View Details
Keywords: Groups and Teams; Identity; Personal Characteristics; Cognition and Thinking
Citation
Find at Harvard
Related
Hackel, Leor M., Christine E. Looser, and Jay J. Van Bavel. "Group Membership Alters the Threshold for Mind Perception: The Role of Social Identity, Collective Identification, and Intergroup Threat." Journal of Experimental Social Psychology 52 (May 2014): 15–23.
  • September 2013
  • Article

Status Boundary Enforcement and the Categorization of Black-White Biracials

By: Arnold K. Ho, Jim Sidanius, Amy J.C. Cuddy and Mahzarin R. Banaji
Individuals who qualify equally for membership in more than one racial group are not judged as belonging equally to both of their parent groups, but instead are seen as belonging more to their lower status parent group. Why? The present paper begins to establish the... View Details
Keywords: Hypodescent; Social Dominance Orientation; Intergroup Threat; Hierarchy Maintenance; Equality and Inequality; Race; Rank and Position; Attitudes; Identity
Citation
Find at Harvard
Related
Ho, Arnold K., Jim Sidanius, Amy J.C. Cuddy, and Mahzarin R. Banaji. "Status Boundary Enforcement and the Categorization of Black-White Biracials." Journal of Experimental Social Psychology 49, no. 5 (September 2013): 940–943.
  • 2009
  • Chapter

Collaboration Across Knowledge Boundaries within Diverse Teams: Reciprocal Expertise Affirmation as an Enabling Condition

By: Amy C. Edmondson, Kate Roloff and Lucy H. MacPhail
We review research on expertise diversity, psychological safety, team collaboration, and role identity to propose a model in which reciprocal affirmations of expertise identity among team members—a feature of the team environment that we conceptualize as a dimension of... View Details
Keywords: Interpersonal Communication; Experience and Expertise; Learning; Knowledge Use and Leverage; Groups and Teams; Familiarity; Identity; Cooperation
Citation
Related
Edmondson, Amy C., Kate Roloff, and Lucy H. MacPhail. "Collaboration Across Knowledge Boundaries within Diverse Teams: Reciprocal Expertise Affirmation as an Enabling Condition." In Exploring Positive Identities and Organizations: Building a Theoretical and Research Foundation, edited by Laura M. Roberts and Jane E. Dutton, 311–332. Psychology Press, 2009.
  • Article

Relational Reconciliation: Socializing Others Across Demographic Differences

By: Lakshmi Ramarajan and Erin M. Reid
In demographically diverse organizations, employees charged with socializing others— socialization agents—must navigate a deep tension between the organization’s needs to integrate individuals into a collective and individuals’ needs for recognition of their unique... View Details
Keywords: Diversity; Organizational Culture; Identity; Employees
Citation
Find at Harvard
Read Now
Purchase
Related
Ramarajan, Lakshmi, and Erin M. Reid. "Relational Reconciliation: Socializing Others Across Demographic Differences." Academy of Management Journal 63, no. 2 (April 2020): 356–385.
  • Article

Backlash Against Male Elementary Educators

By: Corinne A. Moss-Racusin and Elizabeth R. Johnson
We investigated the existence, nature, and processes underscoring backlash (social and economic penalties) against men who violate gender stereotypes by working in education, and whether backlash is exacerbated by internal (vs. external) behavioral attributions.... View Details
Keywords: Backlash Theory; Gender Stereotypes; Teaching; Early Childhood Education; Gender
Citation
Find at Harvard
Related
Moss-Racusin, Corinne A., and Elizabeth R. Johnson. "Backlash Against Male Elementary Educators." Journal of Applied Social Psychology 46, no. 7 (July 2016): 379–393.
  • December 2022 (Revised June 2023)
  • Case

Hacking the U.S. Election: Russia's Misinformation Campaign

By: Shikhar Ghosh
The case discusses the relatively low technology approach used by Russia to influence the U.S. Presidential Election in 2016. Although political parties manipulating the media was not a new phenomenon, the Russians ran a broad, well-financed, and sophisticated social... View Details
Keywords: Political Elections; International Relations; Social Media; Power and Influence; Information; Russia; United States
Citation
Educators
Purchase
Related
Ghosh, Shikhar. "Hacking the U.S. Election: Russia's Misinformation Campaign." Harvard Business School Case 823-043, December 2022. (Revised June 2023.)
  • October 2023 (Revised March 2024)
  • Case

Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game

By: Tsedal Neeley, Jeff Huizinga and Emily Grandjean
Ken Xie, cofounder of cybersecurity giant Fortinet, faced a critical decision that would validate his leadership. Fortinet became the industry’s second-largest pureplay cybersecurity firm by developing differentiated hardware and investing in R&D. However, after a... View Details
Keywords: Leadership Development; Leadership Style; Marketing Strategy; Communication Strategy; Cybersecurity; Competitive Advantage; Information Technology Industry; United States; Sunnyvale
Citation
Educators
Purchase
Related
Neeley, Tsedal, Jeff Huizinga, and Emily Grandjean. "Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game." Harvard Business School Case 424-016, October 2023. (Revised March 2024.)
  • May 2019
  • Article

A Counterfeit Competence: After Threat, Cheating Boosts One's Self-Image

By: S. Wiley Wakeman, Celia Moore and F. Gino
In six studies, we show that after experiencing a threat to their abilities, individuals who misrepresent their performance as better than it actually is boost their feelings of competence. We situate these findings in the literature on self-protection. We show that... View Details
Keywords: Cheating; Self-perception; Self-protection; Competency and Skills; Identity; Perception; Performance
Citation
Find at Harvard
Related
Wakeman, S. Wiley, Celia Moore, and F. Gino. "A Counterfeit Competence: After Threat, Cheating Boosts One's Self-Image." Journal of Experimental Social Psychology 82 (May 2019): 253–265.
  • September 2017 (Revised July 2018)
  • Case

CyberArk: Protecting the Keys to the IT Kingdom

By: Raffaella Sadun, David Yoffie and Margot Eiran
CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
Citation
Educators
Purchase
Related
Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
  • Research Summary

Professor Hiatt’s research is aimed at discovering how institutional factors can affect sector growth and technology development and adoption by mediating and moderating uncertainty. His work encompasses two related research questions:

1) How can... View Details

  • July 16, 2016
  • Article

A Game Theoretic Model for Resource Allocation Among Countermeasures with Multiple Attributes

By: Elisabeth C. Paulson, Igor Linkov and Jeffrey Keisler
We study a strategic, two-player, sequential game between an attacker and defender. The defender must allocate resources amongst possible countermeasures and across possible targets. The attacker then chooses a type of threat and a target to attack. This paper proposes... View Details
Keywords: Resource Allocation; Game Theory; Strategy
Citation
Find at Harvard
Read Now
Related
Paulson, Elisabeth C., Igor Linkov, and Jeffrey Keisler. "A Game Theoretic Model for Resource Allocation Among Countermeasures with Multiple Attributes." European Journal of Operational Research 252, no. 2 (July 16, 2016): 610–622.
  • 26 Mar 2019
  • First Look

New Research and Ideas, March 26, 2019

https://www.hbs.edu/faculty/Pages/item.aspx?num=53888 Trade Secrets Protection and Antitakeover Provisions By: Dey, Aiyesha, and Joshua White Abstract—We examine whether and why managers strengthen antitakeover provisions when facing an increased View Details
Keywords: Dina Gerdeman
  • 09 Sep 2008
  • First Look

First Look: September 9, 2008

agencies. While negative ratings may "shame" firms that are performing poorly, the threat of regulatory action and the presence of "low hanging fruit" are important drivers of how firms respond to information-based... View Details
Keywords: Sean Silverthorne
  • 13 Mar 2007
  • First Look

First Look: March 13, 2007

site for paper: http://www.bepress.com/cas/vol1/iss3/art3/ Identity Negotiation Processes Amidst Diversity: Understanding the Influence of Social Identity and Status Differences Authors:Jeffrey T. Polzer and... View Details
Keywords: Martha Lagace
  • 14 Jun 2011
  • First Look

First Look: June 14

management, innovation loses out. At best, leaders of core business units dismiss innovation initiatives as irrelevancies. At worst, they see the new businesses as threats to the firm's core identity and... View Details
Keywords: Sean Silverthorne
  • 1
  • 2
  • 3
  • 4
  • →

Are you looking for?

→Search All HBS Web
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.