Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (125) Arrow Down
Filter Results: (125) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (125)
    • People  (1)
    • News  (31)
    • Research  (67)
    • Events  (1)
  • Faculty Publications  (16)

Show Results For

  • All HBS Web  (125)
    • People  (1)
    • News  (31)
    • Research  (67)
    • Events  (1)
  • Faculty Publications  (16)
Page 1 of 125 Results →
  • Other Article

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities

By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant and Lee Doolan
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings. We... View Details
Keywords: Security Vulnerabilities; Software Architecture; Metrics; Software; Complexity; Measurement and Metrics
Citation
Find at Harvard
Read Now
Related
Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, and Lee Doolan. "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities." Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 9th (2017): 53–69. (Part of Lecture Notes in Computer Science, ISSN 0302-9743.)
  • September 19, 2017
  • Article

After Equifax Breach, Companies Advised to Review Open-Source Software Code

By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
Citation
Register to Read
Related
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
  • 24 Feb 2020
  • Research & Ideas

The Hidden Vulnerabilities of Open Source Software

use. Census II identifies the most commonly used FOSS components in production applications and begins to examine them for potential vulnerabilities, which can inform actions to sustain the long-term security and health of open source.... View Details
Keywords: by Frank Nagle and Jenny Hoffman; Computer
  • 28 May 2019
  • News

Ask the Expert: In Security

Illustration by Taylor Callery Remember a decade ago, when the main cybersecurity worry was a retail breach of credit card information? “Obviously that still happens,” says Chris Young (MBA 2003), CEO of the security software company... View Details
Keywords: Jen McFarland Flint; cybersecurity
  • 17 Jun 2016
  • Op-Ed

Companies Need to Start Marketing Security to Customers

Recent events in Orlando underscore an important marketing truth: consumer safety and security are mission critical. A popular nightclub, Pulse, known as a safe place for the LGBT community, is put out of business at least temporarily by... View Details
Keywords: by John A. Quelch; Entertainment & Recreation
  • March 2023
  • Article

Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits

By: Elisabeth Kempf and Oliver Spalt
This paper provides novel evidence suggesting that securities class action lawsuits, a central pillar of the U.S. litigation and corporate governance system, can constitute an obstacle to valuable corporate innovation. We first establish that valuable innovation output... View Details
Keywords: Class-action Litigation; Turnover; Lawsuits and Litigation; Innovation and Invention; Risk and Uncertainty
Citation
Find at Harvard
Register to Read
Related
Kempf, Elisabeth, and Oliver Spalt. "Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits." Management Science 69, no. 3 (March 2023): 1323–1934.
  • 22 Feb 2022
  • News

Addressing The Financial Security Gap

well as leading thinkers and decision makers, to discuss ways to make the US savings system more secure and inclusive. Ackerley’s group, in partnership with insurers, also announced an innovative investment solution, called LifePath... View Details
Keywords: Jennifer Gillespie
  • 29 Sep 2022
  • News

Securing a Resilient Future for Senegal

industry. The plan’s design was guided by several key outcomes: saving jobs; protecting businesses with liquidity and fiscal incentives; building tech infrastructure to support work-from-home initiatives; providing basic food and information to the most View Details
Keywords: Maureen Harmon
  • Web

Security & Privacy | Information Technology

benefit of the University and for the benefit of you and your loved ones. Apply Updates to Your Devices and Apps Cyberattacks exploit vulnerabilities in devices or apps to install malicious code and enable unauthorized access to systems... View Details
  • 29 Sep 2020
  • Blog Post

New Life for Old Tech: Startup Provides Network Security Solutions for Obsolete Devices

option, so how can hospitals eliminate the vulnerabilities that come from security-obsolete devices? Perigee is helping companies answer that question. The startup, founded by Mollie Breen, works with companies to build a 360-degree View Details
  • October 2013
  • Article

The Costs of Favoritism: Is Politically-Driven Aid Less Effective?

By: Axel Dreher, Stephan Klasen, James Vreeland and Eric Werker
As is now well documented, aid is given for both political as well as economic reasons. The conventional wisdom is that politically motivated aid is less effective in promoting developmental objectives. We examine the ex-post performance ratings of World Bank projects... View Details
Keywords: World Bank; Aid Effectiveness; Political Influence; United Nations Security Council; International Finance; Prejudice and Bias; Outcome or Result; Projects; Government and Politics; Power and Influence
Citation
Find at Harvard
Read Now
Related
Dreher, Axel, Stephan Klasen, James Vreeland, and Eric Werker. "The Costs of Favoritism: Is Politically-Driven Aid Less Effective?" Economic Development and Cultural Change 62, no. 1 (October 2013).
  • 2024
  • Working Paper

Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations

By: Raviv Murciano-Goroff, Ran Zhuo and Shane Greenstein
How prevalent are severe software vulnerabilities, how fast do software users respond to the availability of secure versions, and what determines the variance in the installation distribution? Using the largest dataset ever assembled on user updates, tracking server... View Details
Keywords: Cybersecurity; Applications and Software; Technology Adoption; Consumer Behavior
Citation
Find at Harvard
Purchase
Related
Murciano-Goroff, Raviv, Ran Zhuo, and Shane Greenstein. "Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations." NBER Working Paper Series, No. 32696, July 2024.
  • 03 Aug 2022
  • News

Scamming the Boss: Some Employees Are Outsourcing Their Jobs to Other People. Here’s How Companies Are Spotting the Fraudsters.

  • 01 Oct 2007
  • News

Trigger-Happy Journalists

  • 29 Sep 2014
  • News

The Bash Bug Is a Wake-Up Call

  • 13 Aug 2024
  • Research & Ideas

Why Companies Shouldn't Delay Software Updates—Even After CrowdStrike's Flaw

targeting credit bureau Equifax and the UK’s National Health Service, which could possibly have been prevented if organizations had run available software updates sooner. Tracking software vulnerabilities For their study, Greenstein and... View Details
Keywords: by Jay Fitzgerald; Technology; Information Technology; Computer; Web Services
  • 24 Feb 2016
  • HBS Seminar

David Brumley of Carnegie Mellon University

  • 2012
  • Working Paper

Mexico's Financial Crisis of 1994-1995

By: Aldo Musacchio
This paper explains the causes leading to the Mexican crisis of 1994-1995 (known as "The Tequila Crisis"), and its short- and long-term consequences. It argues that excessive enthusiasm on the part of foreign investors, not based on Mexico's fundamentals, and weak... View Details
Keywords: Financial Crisis; Foreign Direct Investment; Banks and Banking; Government and Politics; Currency Exchange Rate; Banking Industry; Mexico
Citation
Related
Musacchio, Aldo. "Mexico's Financial Crisis of 1994-1995." Harvard Business School Working Paper, No. 12-101, May 2012.
  • August 2021 (Revised February 2022)
  • Case

Northvolt: Making the World's Greenest Battery

By: Jurgen R. Weiss and Emilie Billaud
In 2021, the demand for lithium-ion batteries increased rapidly, particularly for electric vehicles. Anxious not to be reliant on Asian players, Europe was keen on developing its own home-grown capacity to control the value chain, maintain employment in Europe, and get... View Details
Keywords: Electric Vehicles; Lithium-ion Batteries; Business Ventures; Energy; Green Technology; Technological Innovation; Growth and Development Strategy; Competitive Advantage; Transportation; Supply Chain; Globalized Markets and Industries; Goals and Objectives; Factories, Labs, and Plants; Battery Industry; Energy Industry; Green Technology Industry; Transportation Industry; Europe; Sweden; Germany; Poland
Citation
Educators
Purchase
Related
Weiss, Jurgen R., and Emilie Billaud. "Northvolt: Making the World's Greenest Battery." Harvard Business School Case 722-004, August 2021. (Revised February 2022.)
  • August 2022
  • Article

The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices

By: Aaron R. Brough, David A. Norton, Shannon L. Sciarappa and Leslie K. John
Drawing from a content analysis of publicly traded companies’ privacy notices, a survey of managers, a field study, and five online experiments, this research investigates how consumers respond to privacy notices. A privacy notice, by placing legally enforceable limits... View Details
Keywords: Choice; Purchase Intent; Privacy; Privacy Notices; Warnings; Assurances; Information Disclosure; Trust; Consumer Behavior; Spending; Decisions; Information; Communication
Citation
Find at Harvard
Read Now
Purchase
Related
Brough, Aaron R., David A. Norton, Shannon L. Sciarappa, and Leslie K. John. "The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices." Journal of Marketing Research (JMR) 59, no. 4 (August 2022): 739–754.
  • 1
  • 2
  • …
  • 6
  • 7
  • →
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.