Filter Results
:
(111)
Show Results For
-
All HBS Web
(111)
- News (25)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
Show Results For
-
All HBS Web
(111)
- News (25)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
- March 2022
- Article
From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?
By: Siobhan O'Mahony and Rebecca Karp
When platform leaders change the rules guiding who can access and control a platform, the strategies of those who create value from the platform can be upended. Little research examines how platform participants adapt their strategies when a platform leader changes the...
View Details
Keywords:
Platform Governance;
Access;
Crowdsourcing;
Applications and Software;
Employees;
Leadership Style;
Cybersecurity;
Risk Management
O'Mahony, Siobhan, and Rebecca Karp. "From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?" Strategic Management Journal 43, no. 3 (March 2022): 530–562.
- March 2022
- Article
How to Prioritize the Improvement of Open-Source Software Security
By: Frank Nagle
Nagle, Frank. "How to Prioritize the Improvement of Open-Source Software Security." Brookings TechStream (March 2022).
- 03 Mar 2016
- News
3-Minute Briefing: Pamela Meyer (MBA 1986)
cybersecurity resulted in losses of $500 billion in 2014, but we’re only spending about $100 billion to address the problem. There’s a huge gap between the size of the threat and our ability to detect it. + ONLINE web-only content...
View Details
Keywords:
Julia Hanna
- Profile
Julio Cedeno
Julio met his wife, Sarah, at the university. After graduation, they moved to Houston where Julio began a six-year tenure with Chevron. Balancing act of work, marriage, and education Julio had interned with Chevron between his junior and senior years, contributing to...
View Details
Keywords:
Manufacturing/Energy
- 2023
- Working Paper
Black-box Training Data Identification in GANs via Detector Networks
By: Lukman Olagoke, Salil Vadhan and Seth Neel
Since their inception Generative Adversarial Networks (GANs) have been popular generative models across images, audio, video, and tabular data. In this paper we study whether given access to a trained GAN, as well as fresh samples from the underlying distribution, if...
View Details
Olagoke, Lukman, Salil Vadhan, and Seth Neel. "Black-box Training Data Identification in GANs via Detector Networks." Working Paper, October 2023.
- April 2019 (Revised June 2019)
- Case
Voatz
By: Mitchell Weiss and Maddy Halyard
Nimit Sawhney scrolled through the tweet stream on his phone, unsure of what to make of it on August 6, 2018 or how to respond. Voatz, the Boston-based startup he co-founded and led, provided a mobile-voting platform. In March of 2018, had successfully piloted the new...
View Details
- 2021
- Article
Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services
By: Samantha Bates, John Bowers, Shane Greenstein, Jordi Weinstock, Jonathan Zittrain and Yunhan Xu
This paper analyzes the extent to which the Internet’s global domain name resolution (DNS) system has preserved its distributed resilience given the rise of cloud-based hosting and infrastructure. We explore trends in the concentration of the DNS space since at least...
View Details
Keywords:
Domain Name System;
Resilience;
Entropy;
Internet and the Web;
Infrastructure;
Performance Effectiveness;
Safety;
Cybersecurity
Bates, Samantha, John Bowers, Shane Greenstein, Jordi Weinstock, Jonathan Zittrain, and Yunhan Xu. "Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services." Journal of Quantitative Description: Digital Media 1 (2021).
- November 2023
- Article
Federated Electronic Health Records for the European Health Data Space
By: René Raab, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener and Bjoern Eskofier
The European Commission's draft for the European Health Data Space (EHDS) aims to empower citizens to access their personal health data and share it with physicians and other health-care providers. It further defines procedures for the secondary use of electronic...
View Details
Keywords:
Analytics and Data Science;
Cybersecurity;
Information Management;
Knowledge Sharing;
Knowledge Use and Leverage;
Health Industry
Raab, René, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener, and Bjoern Eskofier. "Federated Electronic Health Records for the European Health Data Space." Lancet Digital Health 5, no. 11 (November 2023): e840–e847.
- 2014
- Chapter
Better Timing of Cyber Conflict
By: Elisabeth Paulson and Christopher Griffin
In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict....
View Details
Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
- 01 Dec 2018
- News
Preparing Our Students for a Changing World
participating in Israel: Startups and Venture Capital the experience of learning by doing in a country recognized globally as a tech hub. “I was fortunate to work with great teammates and an exciting partner —an automotive cybersecurity...
View Details
- 19 Apr 2017
- News
Chicago Becomes a Hub of Startup Action
space,” Emanuel said. An effort to make Chicago the capital of cybersecurity that involved a city-funded training program, for example, ultimately led to KPMG making Chicago its cybersecurity headquarters—a...
View Details
- September 2, 2021
- Article
The Digital Economy Runs on Open Source. Here's How to Protect It.
By: Hila Lifshitz-Assaf and Frank Nagle
Free and open source software (FOSS) is essential to much of the tech we use every day—from cars to phones to planes to the cloud. While traditionally, it was developed by an army of volunteer developers and given away for free, companies are increasingly taking a more...
View Details
Keywords:
Free And Open-source Software;
FOSS;
Open Source Distribution;
Applications and Software;
Collaborative Innovation and Invention;
Organizations;
Policy;
Cybersecurity
Lifshitz-Assaf, Hila, and Frank Nagle. "The Digital Economy Runs on Open Source. Here's How to Protect It." Harvard Business Review Digital Articles (September 2, 2021).
- 2023
- Article
MoPe: Model Perturbation-based Privacy Attacks on Language Models
By: Marvin Li, Jason Wang, Jeffrey Wang and Seth Neel
Recent work has shown that Large Language Models (LLMs) can unintentionally leak sensitive information present in their training data. In this paper, we present Model Perturbations (MoPe), a new method to identify with high confidence if a given text is in the training...
View Details
Li, Marvin, Jason Wang, Jeffrey Wang, and Seth Neel. "MoPe: Model Perturbation-based Privacy Attacks on Language Models." Proceedings of the Conference on Empirical Methods in Natural Language Processing (2023): 13647–13660.
- March 2024
- Teaching Note
SolarWinds Confronts SUNBURST
By: Frank Nagle and David Lane
Teaching Note for HBS Case Nos. 723-357 & 723-368.
View Details
- 14 Nov 2019
- Blog Post
Future Leaders Dive into the MS/MBA: Engineering Sciences Program
the program will help him expand on the cybersecurity work he did in the military. “For nine years, I concentrated on defense work, and I wanted to come here to get a broader experience and understand more of the business side—to see how...
View Details
- 01 Jun 2022
- News
Vision: Into the Breach
meanwhile, were seven times less likely to experience a ransomware attack than the industry average. The company’s advantage, claim cofounders Rotem Iram (MBA 2013) and Roman Itskovich (MBA 2012), is a combination of cybersecurity savvy...
View Details
Keywords:
Alexander Gelfand
- Web
Contacts & Resources | Information Technology
faculty, staff, and Doctoral students can login to the HBS IT Services and Support Portal to search IT services and documentation, check service status, or submit a help ticket. Let us know if there are other topics on cybersecurity best...
View Details
- 01 Jun 2024
- News
Case Study: Ready for an Upgrade
Illustration by Alvaro Dominguez The Los Angeles–based startup Stell was borne of a pain point almost as old as recorded history itself: paperwork. One of Stell’s cofounders, Malory McLemore (MBA 2022), had landed a job as an engineer at Airbus after earning a...
View Details
- 07 Sep 2016
- What Do You Think?
How Can the Threat of Networks Be Reduced?
to have had as much resonance among readers as it did among CEOs who made it a summer reading favorite. Perhaps others agreed with Mary L, who commented that, “Today’s tech enabled networks pose no greater threat than any other networks in days gone by.” What’s new?...
View Details
Keywords:
by James Heskett
- 15 Jun 2021
- News
Alumni Work to Reverse Bias Through Philanthropy
momentum for the NCF’s founding. Thomas, chairman and CEO of Rapid7, a cybersecurity and compliance solutions and services company, says that 19 founders launched the NCF, “but it could easily have been 100.” Among many Black and brown...
View Details
Keywords:
Deborah Blagg