Filter Results:
(117)
Show Results For
- All HBS Web (117)
- Faculty Publications (15)
Show Results For
- All HBS Web (117)
- Faculty Publications (15)
Page 1 of 117
Results →
- Other Article
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities
By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant and Lee Doolan
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings. We... View Details
Keywords: Security Vulnerabilities; Software Architecture; Metrics; Software; Complexity; Measurement and Metrics
Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, and Lee Doolan. "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities." Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 9th (2017): 53–69. (Part of Lecture Notes in Computer Science, ISSN 0302-9743.)
- September 19, 2017
- Article
After Equifax Breach, Companies Advised to Review Open-Source Software Code
By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
- 24 Feb 2020
- Research & Ideas
The Hidden Vulnerabilities of Open Source Software
use. Census II identifies the most commonly used FOSS components in production applications and begins to examine them for potential vulnerabilities, which can inform actions to sustain the long-term security and health of open source.... View Details
- 17 Jun 2016
- Op-Ed
Companies Need to Start Marketing Security to Customers
Recent events in Orlando underscore an important marketing truth: consumer safety and security are mission critical. A popular nightclub, Pulse, known as a safe place for the LGBT community, is put out of business at least temporarily by... View Details
- 28 May 2019
- News
Ask the Expert: In Security
Illustration by Taylor Callery Remember a decade ago, when the main cybersecurity worry was a retail breach of credit card information? “Obviously that still happens,” says Chris Young (MBA 2003), CEO of the security software company... View Details
- 22 Feb 2022
- News
Addressing The Financial Security Gap
well as leading thinkers and decision makers, to discuss ways to make the US savings system more secure and inclusive. Ackerley’s group, in partnership with insurers, also announced an innovative investment solution, called LifePath... View Details
Keywords: Jennifer Gillespie
- March 2023
- Article
Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits
By: Elisabeth Kempf and Oliver Spalt
This paper provides novel evidence suggesting that securities class action lawsuits, a central pillar of the U.S. litigation and corporate governance system, can constitute an obstacle to valuable corporate innovation. We first establish that valuable innovation output... View Details
Keywords: Class-action Litigation; Turnover; Lawsuits and Litigation; Innovation and Invention; Risk and Uncertainty
Kempf, Elisabeth, and Oliver Spalt. "Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits." Management Science 69, no. 3 (March 2023): 1323–1934.
- 29 Sep 2022
- News
Securing a Resilient Future for Senegal
industry. The plan’s design was guided by several key outcomes: saving jobs; protecting businesses with liquidity and fiscal incentives; building tech infrastructure to support work-from-home initiatives; providing basic food and information to the most View Details
Keywords: Maureen Harmon
- Web
Security & Privacy | Information Technology
benefit of the University and for the benefit of you and your loved ones. Apply Updates to Your Devices and Apps Cyberattacks exploit vulnerabilities in devices or apps to install malicious code and enable unauthorized access to systems... View Details
- 29 Sep 2020
- Blog Post
New Life for Old Tech: Startup Provides Network Security Solutions for Obsolete Devices
option, so how can hospitals eliminate the vulnerabilities that come from security-obsolete devices? Perigee is helping companies answer that question. The startup, founded by Mollie Breen, works with companies to build a 360-degree View Details
- October 2013
- Article
The Costs of Favoritism: Is Politically-Driven Aid Less Effective?
By: Axel Dreher, Stephan Klasen, James Vreeland and Eric Werker
As is now well documented, aid is given for both political as well as economic reasons. The conventional wisdom is that politically motivated aid is less effective in promoting developmental objectives. We examine the ex-post performance ratings of World Bank projects... View Details
Keywords: World Bank; Aid Effectiveness; Political Influence; United Nations Security Council; International Finance; Prejudice and Bias; Outcome or Result; Projects; Government and Politics; Power and Influence
Dreher, Axel, Stephan Klasen, James Vreeland, and Eric Werker. "The Costs of Favoritism: Is Politically-Driven Aid Less Effective?" Economic Development and Cultural Change 62, no. 1 (October 2013).
- 2024
- Working Paper
Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations
By: Raviv Murciano-Goroff, Ran Zhuo and Shane Greenstein
How prevalent are severe software vulnerabilities, how fast do software users respond to the availability of secure versions, and what determines the variance in the installation distribution? Using the largest dataset ever assembled on user updates, tracking server... View Details
Murciano-Goroff, Raviv, Ran Zhuo, and Shane Greenstein. "Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations." NBER Working Paper Series, No. 32696, July 2024.
- 01 Oct 2007
- News
Trigger-Happy Journalists
- 29 Sep 2014
- News
The Bash Bug Is a Wake-Up Call
- 13 Aug 2024
- Research & Ideas
Why Companies Shouldn't Delay Software Updates—Even After CrowdStrike's Flaw
targeting credit bureau Equifax and the UK’s National Health Service, which could possibly have been prevented if organizations had run available software updates sooner. Tracking software vulnerabilities For their study, Greenstein and... View Details
- 24 Feb 2016
- HBS Seminar
David Brumley of Carnegie Mellon University
- 2012
- Working Paper
Mexico's Financial Crisis of 1994-1995
By: Aldo Musacchio
This paper explains the causes leading to the Mexican crisis of 1994-1995 (known as "The Tequila Crisis"), and its short- and long-term consequences. It argues that excessive enthusiasm on the part of foreign investors, not based on Mexico's fundamentals, and weak... View Details
Keywords: Financial Crisis; Foreign Direct Investment; Banks and Banking; Government and Politics; Currency Exchange Rate; Banking Industry; Mexico
Musacchio, Aldo. "Mexico's Financial Crisis of 1994-1995." Harvard Business School Working Paper, No. 12-101, May 2012.
- August 2021 (Revised February 2022)
- Case
Northvolt: Making the World's Greenest Battery
By: Jurgen R. Weiss and Emilie Billaud
In 2021, the demand for lithium-ion batteries increased rapidly, particularly for electric vehicles. Anxious not to be reliant on Asian players, Europe was keen on developing its own home-grown capacity to control the value chain, maintain employment in Europe, and get... View Details
Keywords: Electric Vehicles; Lithium-ion Batteries; Business Ventures; Energy; Green Technology; Technological Innovation; Growth and Development Strategy; Competitive Advantage; Transportation; Supply Chain; Globalized Markets and Industries; Goals and Objectives; Factories, Labs, and Plants; Battery Industry; Energy Industry; Green Technology Industry; Transportation Industry; Europe; Sweden; Germany; Poland
Weiss, Jurgen R., and Emilie Billaud. "Northvolt: Making the World's Greenest Battery." Harvard Business School Case 722-004, August 2021. (Revised February 2022.)
- August 2022
- Article
The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices
By: Aaron R. Brough, David A. Norton, Shannon L. Sciarappa and Leslie K. John
Drawing from a content analysis of publicly traded companies’ privacy notices, a survey of managers, a field study, and five online experiments, this research investigates how consumers respond to privacy notices. A privacy notice, by placing legally enforceable limits... View Details
Keywords: Choice; Purchase Intent; Privacy; Privacy Notices; Warnings; Assurances; Information Disclosure; Trust; Consumer Behavior; Spending; Decisions; Information; Communication
Brough, Aaron R., David A. Norton, Shannon L. Sciarappa, and Leslie K. John. "The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices." Journal of Marketing Research (JMR) 59, no. 4 (August 2022): 739–754.