Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (366) Arrow Down
Filter Results: (366) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (675)
    • People  (2)
    • News  (154)
    • Research  (366)
    • Events  (3)
    • Multimedia  (5)
  • Faculty Publications  (165)

Show Results For

  • All HBS Web  (675)
    • People  (2)
    • News  (154)
    • Research  (366)
    • Events  (3)
    • Multimedia  (5)
  • Faculty Publications  (165)
Page 1 of 366 Results →
Sort by

Are you looking for?

→Search All HBS Web
  • 2022
  • Article

Climate Change Vulnerability and Currency Returns

By: Alex Cheema-Fox, George Serafeim and Hui (Stacie) Wang
Using measures of physical risk from climate change, we develop a methodology to allocate currency pairs according to a country’s vulnerability and construct portfolios with decreasing vulnerability to physical risk. We show that non-G10 currencies are more vulnerable... View Details
Keywords: Climate Finance; Vulnerabilities; Currencies; Foreign Exchange; Climate Change; Currency; Natural Disasters
Citation
Find at Harvard
Read Now
Related
Cheema-Fox, Alex, George Serafeim, and Hui (Stacie) Wang. "Climate Change Vulnerability and Currency Returns." Financial Analysts Journal 78, no. 4 (2022): 37–58.
  • Other Article

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities

By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant and Lee Doolan
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings. We... View Details
Keywords: Security Vulnerabilities; Software Architecture; Metrics; Software; Complexity; Measurement and Metrics
Citation
Find at Harvard
Read Now
Related
Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, and Lee Doolan. "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities." Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 9th (2017): 53–69. (Part of Lecture Notes in Computer Science, ISSN 0302-9743.)
  • March 2015
  • Article

Vulnerable Banks

By: Robin Greenwood, Augustin Landier and David Thesmar
We present a model in which fire sales propagate shocks across bank balance sheets. When a bank experiences a negative shock to its equity, a natural way to return to target leverage is to sell assets. If potential buyers are limited, then asset sales depress prices,... View Details
Keywords: Financial Liquidity; Financial Crisis; Banks and Banking; Banking Industry; Europe
Citation
Find at Harvard
Read Now
Related
Greenwood, Robin, Augustin Landier, and David Thesmar. "Vulnerable Banks." Journal of Financial Economics 115, no. 3 (March 2015): 471–485.
  • 10 Dec 2012
  • Working Paper Summaries

Vulnerable Banks

Keywords: by Robin Greenwood, Augustin Landier & David Thesmar; Banking; Financial Services
  • September 17, 2020
  • Article

Protecting Vulnerable Older Patients during the Pandemic

By: Umar Ikram, Susanna Gallani, Jose F. Figueroa and Thomas W. Feeley
Older people (70 years and older) with multiple chronic conditions have the highest risk of being hospitalized and dying from COVID-19. The recent COVID-19 pandemic has highlighted how a strong primary care system can play an important role in protecting this group of... View Details
Keywords: COVID-19; High-risk Patients; Primary Care; Health Pandemics; Health Care and Treatment; Innovation and Invention; Demographics; Age
Citation
Read Now
Related
Ikram, Umar, Susanna Gallani, Jose F. Figueroa, and Thomas W. Feeley. "Protecting Vulnerable Older Patients during the Pandemic." NEJM Catalyst (September 17, 2020).
  • July 28, 2020
  • Article

Economic Vulnerability of Households with Essential Workers

By: Grace McCormack, Christopher Avery, Ariella Kahn-Lang Spitzer and Amitabh Chandra
The label of “essential worker” reflects society’s needs but does not mean that society has compensated those workers for additional risks incurred on the job during the current pandemic. When an essential worker contracts severe acute respiratory syndrome coronavirus... View Details
Keywords: Essential Workers; Health Pandemics; Household; Financial Condition; United States
Citation
Find at Harvard
Read Now
Related
McCormack, Grace, Christopher Avery, Ariella Kahn-Lang Spitzer, and Amitabh Chandra. "Economic Vulnerability of Households with Essential Workers." JAMA, the Journal of the American Medical Association 324, no. 4 (July 28, 2020): 388–390.
  • 2010
  • Other Unpublished Work

Why Takeover Vulnerability Matters to Debtholders

By: Joan Farre-Mensa
Recent work documents that firms that are more vulnerable to takeover have higher borrowing costs. This paper investigates the reasons behind this stylized fact. My results show that firms with few antitakeover defenses face a higher cost of debt because lenders are... View Details
Keywords: Acquisition; Borrowing and Debt; Cost; Equity; Banks and Banking; Investment Portfolio; Risk Management; Agreements and Arrangements; Business and Shareholder Relations; Conflict and Resolution
Citation
SSRN
Related
Farre-Mensa, Joan. "Why Takeover Vulnerability Matters to Debtholders." 2010.
  • Forthcoming
  • Chapter

Economic Models for Software Vulnerability Research

By: Frank Nagle and Michael Sutton
Citation
Related
Nagle, Frank, and Michael Sutton. "Economic Models for Software Vulnerability Research." Chap. 1 in Cyber Fraud: Tactics, Techniques, and Procedures. 2nd ed. Auerbach Publications, in press.
  • 24 Feb 2020
  • Research & Ideas

The Hidden Vulnerabilities of Open Source Software

underscore the importance of understanding where open source is most used and could be vulnerable to attack. The report, ‘Vulnerabilities in the Core,’ a Preliminary Report and Census II of Open Source Software, was prepared by the... View Details
Keywords: by Frank Nagle and Jenny Hoffman; Computer
  • Article

The Hidden Vulnerabilities of Open Source Software

By: Frank Nagle and Jennifer L. Hoffman
Citation
Read Now
Related
Nagle, Frank, and Jennifer L. Hoffman. "The Hidden Vulnerabilities of Open Source Software." Harvard Business School Working Knowledge (February 24, 2020).
  • May 2024
  • Article

Refugees Are Hosted in Highly Vulnerable Communities

By: C. Austin Davis, Paula Lopez-Peña, A. Mushfiq Mobarak and Jaya Y. Wen
Low- and middle-income nations host 76 percent of the world's refugees. This study uses original data to explore within-country spatial variability in refugee-hosting responsibilities. We find that hosting responsibilities for the displaced Rohingya people in... View Details
Keywords: Refugees; Political Elections; Equality and Inequality; Immigration; Developing Countries and Economies; Income
Citation
Find at Harvard
Purchase
Related
Davis, C. Austin, Paula Lopez-Peña, A. Mushfiq Mobarak, and Jaya Y. Wen. "Refugees Are Hosted in Highly Vulnerable Communities." American Economic Review: Papers and Proceedings 114 (May 2024): 75–79.
  • 2006
  • Journal Article

Emerging Economic Models for Vulnerability Research

By: Frank Nagle and Michael Sutton
Citation
Related
Nagle, Frank, and Michael Sutton. "Emerging Economic Models for Vulnerability Research." Proceedings of the Workshop on the Economics of Information Security (2006).
  • Editorial

Assessment of Economic Vulnerability to Infectious Disease Crises

By: Peter A Sands, Anas El Turabi, Philip Saynisch and Victor J Dzau
Citation
Read Now
Related
Sands, Peter A., Anas El Turabi, Philip Saynisch, and Victor J Dzau. "Assessment of Economic Vulnerability to Infectious Disease Crises." Lancet 388, no. 10058 (November 12, 2016): 2443–2448.
  • February 2025
  • Article

Disclosure, Humanizing, and Contextual Vulnerability of Generative AI Chatbots

By: Julian De Freitas and I. Glenn Cohen
In the wake of recent advancements in generative AI, regulatory bodies are trying to keep pace. One key decision is whether to require app makers to disclose the use of generative AI-powered chatbots in their products. We suggest that some generative AI-based chatbots... View Details
Keywords: AI and Machine Learning; Governing Rules, Regulations, and Reforms; Applications and Software; Well-being
Citation
Read Now
Related
De Freitas, Julian, and I. Glenn Cohen. "Disclosure, Humanizing, and Contextual Vulnerability of Generative AI Chatbots." New England Journal of Medicine AI 2, no. 2 (February 2025).
  • 2012
  • Journal Article

EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks

By: Frank Nagle, Lisa Singh and Aris Gkoulalas-Divanis
Citation
Related
Nagle, Frank, Lisa Singh, and Aris Gkoulalas-Divanis. "EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks." Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) (2012): 359–370.
  • 2017
  • Working Paper

Exploring the Relationship between Architecture Coupling and Software Vulnerabilities: A Google Chrome Case

By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Dan Sturtevant and Lee Doolan
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and has proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings.... View Details
Keywords: Software; Architecture; Coupling; Vulnerabilities; Applications and Software; Complexity; Measurement and Metrics
Citation
Read Now
Related
Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Dan Sturtevant, and Lee Doolan. "Exploring the Relationship between Architecture Coupling and Software Vulnerabilities: A Google Chrome Case." Harvard Business School Working Paper, No. 17-078, February 2017.
  • 2014
  • Other Article

Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers

By: Ryann Elizabeth Manning, Julie Battilana and Lakshmi Ramarajan
Social movements challenge institutions through two related communication processes: articulating collective action frames and constructing collective movement identity. We argue that frames not only express movement identity, but also provide openings through which... View Details
Keywords: Identity Threat; Institutional Change; Social Movements; Framing; Social Issues; Identity; Organizational Culture; Change
Citation
Find at Harvard
Related
Manning, Ryann Elizabeth, Julie Battilana, and Lakshmi Ramarajan. "Communicating Change: When Identity Becomes a Source of Vulnerability for Institutional Challengers." Academy of Management Annual Meeting Proceedings (2014): 453–458.
  • June 2020
  • Article

In Generous Offers I Trust: The Effect of First-offer Value on Economically Vulnerable Behaviors

By: M. Jeong, J. Minson and F. Gino
Negotiation scholarship espouses the importance of opening a bargaining situation with an aggressive offer, given the power of first offers to shape concessionary behavior and outcomes. In our research, we identify a surprising consequence to this common prescription.... View Details
Keywords: Attribution; Interpersonal Interaction; Judgment; Social Interaction; Inference; Open Data; Open Materials; Preregistered; Negotiation Offer; Strategy; Behavior; Interpersonal Communication; Trust; Outcome or Result
Citation
Find at Harvard
Related
Jeong, M., J. Minson, and F. Gino. "In Generous Offers I Trust: The Effect of First-offer Value on Economically Vulnerable Behaviors." Psychological Science 31, no. 6 (June 2020): 644–653.
  • 1992
  • Other Unpublished Work

Vulnerability Assessment of Accelerated Sea Level Rise: Case Study: Majuro Atoll, Marshall islands

By: P. Holthus, M. Crawford, C. Makroro and S. Sullivan
Citation
Read Now
Related
Holthus, P., M. Crawford, C. Makroro, and S. Sullivan. "Vulnerability Assessment of Accelerated Sea Level Rise: Case Study: Majuro Atoll, Marshall islands." South Pacific Regional Environment Programme, Apia, Western Samoa, December 1992. (Funded by the United States National Oceanic and Atmospheric Administration (NOAA).)
  • June 2014
  • Article

Pitfalls and Fraud in Online Advertising Metrics: What Makes Advertisers Vulnerable to Cheaters, and How They Can Protect Themselves

By: Benjamin Edelman
How does online advertising become less effective than advertisers expect and less effective than measurements indicate? The current research explores problems that result, in part, from malfeasance by outside perpetrators who overstate their efforts to increase their... View Details
Keywords: Online Advertising; Measurement; Mismeasurement; Fraud; Invisible; Digital Marketing; Misleading and Fraudulent Advertising; Marketing Strategy
Citation
Find at Harvard
Read Now
Related
Edelman, Benjamin. "Pitfalls and Fraud in Online Advertising Metrics: What Makes Advertisers Vulnerable to Cheaters, and How They Can Protect Themselves." Journal of Advertising Research 54, no. 2 (June 2014): 127–132.
  • 1
  • 2
  • …
  • 18
  • 19
  • →

Are you looking for?

→Search All HBS Web
ǁ
Campus Map
Harvard Business School
Soldiers Field
Boston, MA 02163
→Map & Directions
→More Contact Information
  • Make a Gift
  • Site Map
  • Jobs
  • Harvard University
  • Trademarks
  • Policies
  • Accessibility
  • Digital Accessibility
Copyright © President & Fellows of Harvard College.