Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (66) Arrow Down
Filter Results: (66) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (131)
    • People  (1)
    • News  (31)
    • Research  (66)
    • Events  (1)
  • Faculty Publications  (16)

Show Results For

  • All HBS Web  (131)
    • People  (1)
    • News  (31)
    • Research  (66)
    • Events  (1)
  • Faculty Publications  (16)
Page 1 of 66 Results →
Sort by

Are you looking for?

→Search All HBS Web
  • Other Article

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities

By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant and Lee Doolan
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings. We... View Details
Keywords: Security Vulnerabilities; Software Architecture; Metrics; Software; Complexity; Measurement and Metrics
Citation
Find at Harvard
Read Now
Related
Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, and Lee Doolan. "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities." Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 9th (2017): 53–69. (Part of Lecture Notes in Computer Science, ISSN 0302-9743.)
  • September 19, 2017
  • Article

After Equifax Breach, Companies Advised to Review Open-Source Software Code

By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
Citation
Register to Read
Related
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
  • 24 Feb 2020
  • Research & Ideas

The Hidden Vulnerabilities of Open Source Software

use. Census II identifies the most commonly used FOSS components in production applications and begins to examine them for potential vulnerabilities, which can inform actions to sustain the long-term security and health of open source.... View Details
Keywords: by Frank Nagle and Jenny Hoffman; Computer
  • 17 Jun 2016
  • Op-Ed

Companies Need to Start Marketing Security to Customers

Recent events in Orlando underscore an important marketing truth: consumer safety and security are mission critical. A popular nightclub, Pulse, known as a safe place for the LGBT community, is put out of business at least temporarily by... View Details
Keywords: by John A. Quelch; Entertainment & Recreation
  • March 2023
  • Article

Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits

By: Elisabeth Kempf and Oliver Spalt
This paper provides novel evidence suggesting that securities class action lawsuits, a central pillar of the U.S. litigation and corporate governance system, can constitute an obstacle to valuable corporate innovation. We first establish that valuable innovation output... View Details
Keywords: Class-action Litigation; Turnover; Lawsuits and Litigation; Innovation and Invention; Risk and Uncertainty
Citation
Find at Harvard
Register to Read
Related
Kempf, Elisabeth, and Oliver Spalt. "Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits." Management Science 69, no. 3 (March 2023): 1323–1934.
  • October 2013
  • Article

The Costs of Favoritism: Is Politically-Driven Aid Less Effective?

By: Axel Dreher, Stephan Klasen, James Vreeland and Eric Werker
As is now well documented, aid is given for both political as well as economic reasons. The conventional wisdom is that politically motivated aid is less effective in promoting developmental objectives. We examine the ex-post performance ratings of World Bank projects... View Details
Keywords: World Bank; Aid Effectiveness; Political Influence; United Nations Security Council; International Finance; Prejudice and Bias; Outcome or Result; Projects; Government and Politics; Power and Influence
Citation
Find at Harvard
Read Now
Related
Dreher, Axel, Stephan Klasen, James Vreeland, and Eric Werker. "The Costs of Favoritism: Is Politically-Driven Aid Less Effective?" Economic Development and Cultural Change 62, no. 1 (October 2013).
  • 2024
  • Working Paper

Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations

By: Raviv Murciano-Goroff, Ran Zhuo and Shane Greenstein
How prevalent are severe software vulnerabilities, how fast do software users respond to the availability of secure versions, and what determines the variance in the installation distribution? Using the largest dataset ever assembled on user updates, tracking server... View Details
Keywords: Cybersecurity; Applications and Software; Technology Adoption; Consumer Behavior
Citation
Find at Harvard
Purchase
Related
Murciano-Goroff, Raviv, Ran Zhuo, and Shane Greenstein. "Navigating Software Vulnerabilities: Eighteen Years of Evidence from Medium and Large U.S. Organizations." NBER Working Paper Series, No. 32696, July 2024.
  • 13 Aug 2024
  • Research & Ideas

Why Companies Shouldn't Delay Software Updates—Even After CrowdStrike's Flaw

targeting credit bureau Equifax and the UK’s National Health Service, which could possibly have been prevented if organizations had run available software updates sooner. Tracking software vulnerabilities For their study, Greenstein and... View Details
Keywords: by Jay Fitzgerald; Technology; Information Technology; Computer; Web Services
  • 2012
  • Working Paper

Mexico's Financial Crisis of 1994-1995

By: Aldo Musacchio
This paper explains the causes leading to the Mexican crisis of 1994-1995 (known as "The Tequila Crisis"), and its short- and long-term consequences. It argues that excessive enthusiasm on the part of foreign investors, not based on Mexico's fundamentals, and weak... View Details
Keywords: Financial Crisis; Foreign Direct Investment; Banks and Banking; Government and Politics; Currency Exchange Rate; Banking Industry; Mexico
Citation
Related
Musacchio, Aldo. "Mexico's Financial Crisis of 1994-1995." Harvard Business School Working Paper, No. 12-101, May 2012.
  • August 2021 (Revised February 2022)
  • Case

Northvolt: Making the World's Greenest Battery

By: Jurgen R. Weiss and Emilie Billaud
In 2021, the demand for lithium-ion batteries increased rapidly, particularly for electric vehicles. Anxious not to be reliant on Asian players, Europe was keen on developing its own home-grown capacity to control the value chain, maintain employment in Europe, and get... View Details
Keywords: Electric Vehicles; Lithium-ion Batteries; Business Ventures; Energy; Green Technology; Technological Innovation; Growth and Development Strategy; Competitive Advantage; Transportation; Supply Chain; Globalized Markets and Industries; Goals and Objectives; Factories, Labs, and Plants; Battery Industry; Energy Industry; Green Technology Industry; Transportation Industry; Europe; Sweden; Germany; Poland
Citation
Educators
Purchase
Related
Weiss, Jurgen R., and Emilie Billaud. "Northvolt: Making the World's Greenest Battery." Harvard Business School Case 722-004, August 2021. (Revised February 2022.)
  • August 2022
  • Article

The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices

By: Aaron R. Brough, David A. Norton, Shannon L. Sciarappa and Leslie K. John
Drawing from a content analysis of publicly traded companies’ privacy notices, a survey of managers, a field study, and five online experiments, this research investigates how consumers respond to privacy notices. A privacy notice, by placing legally enforceable limits... View Details
Keywords: Choice; Purchase Intent; Privacy; Privacy Notices; Warnings; Assurances; Information Disclosure; Trust; Consumer Behavior; Spending; Decisions; Information; Communication
Citation
Find at Harvard
Read Now
Purchase
Related
Brough, Aaron R., David A. Norton, Shannon L. Sciarappa, and Leslie K. John. "The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices." Journal of Marketing Research (JMR) 59, no. 4 (August 2022): 739–754.
  • Article

Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error

By: Celia Cintas, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan and Edward McFowland III
Reliably detecting attacks in a given set of inputs is of high practical relevance because of the vulnerability of neural networks to adversarial examples. These altered inputs create a security risk in applications with real-world consequences, such as self-driving... View Details
Keywords: Autoencoder Networks; Pattern Detection; Subset Scanning; Computer Vision; Statistical Methods And Machine Learning; Machine Learning; Deep Learning; Data Mining; Big Data; Large-scale Systems; Mathematical Methods; Analytics and Data Science
Citation
Read Now
Related
Cintas, Celia, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan, and Edward McFowland III. "Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error." Proceedings of the International Joint Conference on Artificial Intelligence 29th (2020).
  • September 2013
  • Case

United Rentals (A)

By: Jay W. Lorsch, Kathleen Durante and Emily McTague

In December 1997 United Rentals (URI) went public on the NYSE. Ten years later, during the peak of the economic meltdown, the company's performance was in decline. United Rentals had experienced its share of problems in the prior years and was still struggling to... View Details

Keywords: Board Of Directors; Board Dynamics; Accounting Fraud; Governance; Board Committees; Merger; Corporate Governance; Construction Industry; United States
Citation
Educators
Purchase
Related
Lorsch, Jay W., Kathleen Durante, and Emily McTague. "United Rentals (A)." Harvard Business School Case 414-043, September 2013.
  • May 28, 2019
  • Other Article

How Russia Found a Disinformation Haven in America

By: Rawi Abdelal and Galit Goldstein
The Mueller Report established that “the Russians” undertook information operations campaigns to meddle in the 2016 U.S. presidential election. Though this has been clear for a long time, Americans continue to discuss Russian information operations in the wrong way.... View Details
Keywords: Elections; Donald Trump; Political Elections; National Security; Information Technology; Governing Rules, Regulations, and Reforms; Social Media; Russia; United States
Citation
Read Now
Related
Abdelal, Rawi, and Galit Goldstein. "How Russia Found a Disinformation Haven in America." National Interest (May 28, 2019).
  • January 15, 2019
  • Article

Is Your Company's Strategy Aligned with Your Ownership Model?

By: Josh Baron
The legacy of Vanguard founder John Bogle has brought attention to the transformative influence of ownership structures within the business world. Bogle's revolutionary insight into the limitations of active fund management led to the widespread adoption of index... View Details
Keywords: Ownership Type; Business Strategy; Organizational Structure; Strength and Weakness; Competitive Advantage
Citation
Register to Read
Purchase
Related
Baron, Josh. "Is Your Company's Strategy Aligned with Your Ownership Model?" Harvard Business Review (website) (January 15, 2019).
  • 28 Nov 2023
  • Book

Economic Growth Draws Companies to Asia. Can They Handle Its Authoritarian Regimes?

and others do not, or for why some crony relationships facilitate growth and others create crisis or stagnation. What strategies do authoritarian political elites adopt to manage the business class? What kinds of strategies succeed, for example by View Details
Keywords: by Sean Silverthorne
  • 17 Jan 2024
  • Research & Ideas

Are Companies Getting Away with 'Cheap Talk' on Climate Goals?

Companies regularly set ambitious climate goals, but these plans often end up like many people’s New Year’s resolutions: unmet aspirations that quietly fizzle out. While companies often gain positive media attention by trumpeting plans for reducing greenhouse gas... View Details
Keywords: by Tim Gray
  • 22 Feb 2024
  • Research & Ideas

How to Make AI 'Forget' All the Private Data It Shouldn't Have

that the larger the model, the more memorization occurs, the more training data is sort of reverse engineerable.” Layne: What makes generative AI so vulnerable to attack? For example, you talk about privacy leakage in your research. Neel:... View Details
Keywords: by Rachel Layne; Technology; Information Technology
  • 16 Nov 2021
  • HBS Case

How a Company Made Employees So Miserable, They Killed Themselves

start, the company encouraged additional voluntary departures and offered to help people find new jobs, but got few takers. Many workers were civil servants who expected job security for life. And, at the time, unemployment was also high... View Details
Keywords: by Michael Blanding
  • 16 May 2023
  • In Practice

After Silicon Valley Bank's Flameout, What's Next for Entrepreneurs?

crisis. In addition to the operational learnings around banking and ensuring not all of their cash is in one vulnerable place, it was a big wake-up call for many founders in terms of how they do everything to keep their cool with... View Details
Keywords: by Avery Forman; Technology; Financial Services
  • 1
  • 2
  • 3
  • 4
  • →

Are you looking for?

→Search All HBS Web
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.