Filter Results
:
(55)
Show Results For
-
All HBS Web
(114)
- News (25)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
Show Results For
-
All HBS Web
(114)
- News (25)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
←
Page 3 of
55
Results
Sort by
- July 16, 2015
- Article
How Small Businesses Can Fend Off Hackers
By: Lou Shipley
If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at...
View Details
Keywords:
Hack;
Data Security;
Small Business;
Analytics and Data Science;
Safety;
Information Technology;
Cybersecurity
Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
- 2023
- Working Paper
Black-box Training Data Identification in GANs via Detector Networks
By: Lukman Olagoke, Salil Vadhan and Seth Neel
Since their inception Generative Adversarial Networks (GANs) have been popular generative models across images, audio, video, and tabular data. In this paper we study whether given access to a trained GAN, as well as fresh samples from the underlying distribution, if...
View Details
Olagoke, Lukman, Salil Vadhan, and Seth Neel. "Black-box Training Data Identification in GANs via Detector Networks." Working Paper, October 2023.
- October 2018
- Case
Fundraising at St. Camillus Hospital
By: Srikant M. Datar and Caitlin N. Bowler
St. Camillus is a fictional non-profit hospital in rural Maine facing a serious budget deficit. As Director of Marketing, Victoria Stern is building a team to modernize the hospital fundraising efforts. An interview with a promising candidate, who is also a digital...
View Details
Keywords:
Data Analysis;
Data Privacy;
Data Governance;
Non-profit;
Health Care;
Fundraising;
Data Security;
Analytics and Data Science;
Safety;
Governance;
Ethics;
Health Care and Treatment;
Cybersecurity
Datar, Srikant M., and Caitlin N. Bowler. "Fundraising at St. Camillus Hospital." Harvard Business School Case 119-027, October 2018.
- April 29, 2020
- Article
The Case for AI Insurance
By: Ram Shankar Siva Kumar and Frank Nagle
When organizations place machine learning systems at the center of their businesses, they introduce the risk of failures that could lead to a data breach, brand damage, property damage, business interruption, and in some cases, bodily harm. Even when companies are...
View Details
Keywords:
Artificial Intelligence;
Machine Learning;
Internet and the Web;
Safety;
Insurance;
AI and Machine Learning;
Cybersecurity
Kumar, Ram Shankar Siva, and Frank Nagle. "The Case for AI Insurance." Harvard Business Review Digital Articles (April 29, 2020).
- November 2023
- Article
Federated Electronic Health Records for the European Health Data Space
By: René Raab, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener and Bjoern Eskofier
The European Commission's draft for the European Health Data Space (EHDS) aims to empower citizens to access their personal health data and share it with physicians and other health-care providers. It further defines procedures for the secondary use of electronic...
View Details
Keywords:
Analytics and Data Science;
Cybersecurity;
Information Management;
Knowledge Sharing;
Knowledge Use and Leverage;
Health Industry
Raab, René, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener, and Bjoern Eskofier. "Federated Electronic Health Records for the European Health Data Space." Lancet Digital Health 5, no. 11 (November 2023): e840–e847.
- 2013
- Chapter
Privacy Breach Analysis in Social Networks
By: Frank Nagle
Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the...
View Details
Keywords:
Crime and Corruption;
Social and Collaborative Networks;
Social Media;
Cybersecurity;
Analytics and Data Science
Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
- September 2, 2021
- Article
The Digital Economy Runs on Open Source. Here's How to Protect It.
By: Hila Lifshitz-Assaf and Frank Nagle
Free and open source software (FOSS) is essential to much of the tech we use every day—from cars to phones to planes to the cloud. While traditionally, it was developed by an army of volunteer developers and given away for free, companies are increasingly taking a more...
View Details
Keywords:
Free And Open-source Software;
FOSS;
Open Source Distribution;
Applications and Software;
Collaborative Innovation and Invention;
Organizations;
Policy;
Cybersecurity
Lifshitz-Assaf, Hila, and Frank Nagle. "The Digital Economy Runs on Open Source. Here's How to Protect It." Harvard Business Review Digital Articles (September 2, 2021).
- February 2024 (Revised May 2024)
- Case
Johnson Security Bureau: Building Multigenerational Success
By: Henry McGee, Annelena Lobb and David Muoser
Jessica Johnson-Cope, CEO of Johnson Security Bureau (JSB), pondered options for scaling the firm. JSB was the oldest Black-owned security firm in New York, and among the oldest Black-owned security firms in the United States. It provided mostly unarmed security guards...
View Details
Keywords:
Business Growth and Maturation;
Gender;
Race;
Cybersecurity;
Growth and Development Strategy;
Competitive Strategy;
Expansion;
New York (state, US)
McGee, Henry, Annelena Lobb, and David Muoser. "Johnson Security Bureau: Building Multigenerational Success." Harvard Business School Case 824-040, February 2024. (Revised May 2024.)
- 04 May 2020
- Research & Ideas
Predictions, Prophets, and Restarting Your Business
awareness of cybersecurity issues. Combined with the ability to block ads, the growing costs of acquiring customers online, the experience of “Zoombombing,” and controls on consumer data by EU regulators and others, it’s unclear how much...
View Details
Keywords:
by Frank V. Cespedes
- 07 Sep 2016
- What Do You Think?
How Can the Threat of Networks Be Reduced?
to have had as much resonance among readers as it did among CEOs who made it a summer reading favorite. Perhaps others agreed with Mary L, who commented that, “Today’s tech enabled networks pose no greater threat than any other networks in days gone by.” What’s new?...
View Details
Keywords:
by James Heskett
- 04 Apr 2019
- Cold Call Podcast
Can Mark Zuckerberg Rebuild Trust in Facebook?
cybersecurity and breach and also, people are making a lot of money on use of information. So it became a very hot topic and that's why I wrote the case. Kenny: Do you use Facebook? George: I do. I have about 30,000 followers on Facebook....
View Details
Keywords:
Re: Gerardine A. Doyle
- 04 Oct 2016
- First Look
October 4, 2016
teams (in some areas). The case centers on questions of how to adapt this successful model to new demands in a different service domain, specifically, cybersecurity and defense-related areas. The case also explores how the company is...
View Details
- 06 Jun 2017
- First Look
First Look at New Research and Ideas: June 6, 2017
unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate client-focused cybersecurity company, and Metasploit was a white-hat hacker community with a reputation that ranged from esoteric to “notorious.” And...
View Details
Keywords:
Sean Silverthorne
- 07 Nov 2017
- First Look
New Research and Ideas: November 7, 2017
(PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of over $1.6 billion, with sales exceeding...
View Details
Keywords:
Carmen Nobel
- March 2023 (Revised June 2023)
- Teaching Note
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
Teaching Note for HBS Case No. 123-065. In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to...
View Details
Keywords:
Disruption;
Communication;
Communication Strategy;
Decision Making;
Decision Choices and Conditions;
Judgments;
Corporate Accountability;
Corporate Disclosure;
Corporate Governance;
Governance Controls;
Policy;
Employees;
News;
Cybersecurity;
Digital Strategy;
Information Infrastructure;
Information Management;
Internet and the Web;
Crisis Management;
Business or Company Management;
Resource Allocation;
Risk Management;
Negotiation Tactics;
Failure;
Business and Stakeholder Relations;
Attitudes;
Behavior;
Perception;
Reputation;
Trust;
Public Opinion;
Social Issues;
Health Industry;
Alabama;
United States