Filter Results
:
(55)
Show Results For
-
All HBS Web
(111)
- News (23)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
Show Results For
-
All HBS Web
(111)
- News (23)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
←
Page 3 of
55
Results
Sort by
- March 2022
- Article
How to Prioritize the Improvement of Open-Source Software Security
By: Frank Nagle
Nagle, Frank. "How to Prioritize the Improvement of Open-Source Software Security." Brookings TechStream (March 2022).
- October 2022 (Revised September 2023)
- Case
SolarWinds Confronts SUNBURST (A)
On December 12, 2020, SolarWinds learned that malware had been inserted in its software, potentially granting hackers access to thousands and thousands of its 300,000 customers. General Counsel Jason Bliss needed to orchestrate the company response without knowing how...
View Details
Keywords:
Cyberattacks;
Cybersecurity;
Corporate Disclosure;
Crisis Management;
Customer Focus and Relationships;
Legal Liability;
Information Technology Industry;
United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "SolarWinds Confronts SUNBURST (A)." Harvard Business School Case 723-357, October 2022. (Revised September 2023.)
- March 2022
- Article
From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?
By: Siobhan O'Mahony and Rebecca Karp
When platform leaders change the rules guiding who can access and control a platform, the strategies of those who create value from the platform can be upended. Little research examines how platform participants adapt their strategies when a platform leader changes the...
View Details
Keywords:
Platform Governance;
Access;
Crowdsourcing;
Applications and Software;
Employees;
Leadership Style;
Cybersecurity;
Risk Management
O'Mahony, Siobhan, and Rebecca Karp. "From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?" Strategic Management Journal 43, no. 3 (March 2022): 530–562.
- 2023
- Working Paper
Black-box Training Data Identification in GANs via Detector Networks
By: Lukman Olagoke, Salil Vadhan and Seth Neel
Since their inception Generative Adversarial Networks (GANs) have been popular generative models across images, audio, video, and tabular data. In this paper we study whether given access to a trained GAN, as well as fresh samples from the underlying distribution, if...
View Details
Olagoke, Lukman, Salil Vadhan, and Seth Neel. "Black-box Training Data Identification in GANs via Detector Networks." Working Paper, October 2023.
- 2021
- Article
Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services
By: Samantha Bates, John Bowers, Shane Greenstein, Jordi Weinstock, Jonathan Zittrain and Yunhan Xu
This paper analyzes the extent to which the Internet’s global domain name resolution (DNS) system has preserved its distributed resilience given the rise of cloud-based hosting and infrastructure. We explore trends in the concentration of the DNS space since at least...
View Details
Keywords:
Domain Name System;
Resilience;
Entropy;
Internet and the Web;
Infrastructure;
Performance Effectiveness;
Safety;
Cybersecurity
Bates, Samantha, John Bowers, Shane Greenstein, Jordi Weinstock, Jonathan Zittrain, and Yunhan Xu. "Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services." Journal of Quantitative Description: Digital Media 1 (2021).
- April 2019 (Revised June 2019)
- Case
Voatz
By: Mitchell Weiss and Maddy Halyard
Nimit Sawhney scrolled through the tweet stream on his phone, unsure of what to make of it on August 6, 2018 or how to respond. Voatz, the Boston-based startup he co-founded and led, provided a mobile-voting platform. In March of 2018, had successfully piloted the new...
View Details
- November 2023
- Article
Federated Electronic Health Records for the European Health Data Space
By: René Raab, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener and Bjoern Eskofier
The European Commission's draft for the European Health Data Space (EHDS) aims to empower citizens to access their personal health data and share it with physicians and other health-care providers. It further defines procedures for the secondary use of electronic...
View Details
Keywords:
Analytics and Data Science;
Cybersecurity;
Information Management;
Knowledge Sharing;
Knowledge Use and Leverage;
Health Industry
Raab, René, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener, and Bjoern Eskofier. "Federated Electronic Health Records for the European Health Data Space." Lancet Digital Health 5, no. 11 (November 2023): e840–e847.
- March 2023 (Revised June 2023)
- Teaching Note
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
Teaching Note for HBS Case No. 123-065. In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to...
View Details
Keywords:
Disruption;
Communication;
Communication Strategy;
Decision Making;
Decision Choices and Conditions;
Judgments;
Corporate Accountability;
Corporate Disclosure;
Corporate Governance;
Governance Controls;
Policy;
Employees;
News;
Cybersecurity;
Digital Strategy;
Information Infrastructure;
Information Management;
Internet and the Web;
Crisis Management;
Business or Company Management;
Resource Allocation;
Risk Management;
Negotiation Tactics;
Failure;
Business and Stakeholder Relations;
Attitudes;
Behavior;
Perception;
Reputation;
Trust;
Public Opinion;
Social Issues;
Health Industry;
Alabama;
United States
- September 2, 2021
- Article
The Digital Economy Runs on Open Source. Here's How to Protect It.
By: Hila Lifshitz-Assaf and Frank Nagle
Free and open source software (FOSS) is essential to much of the tech we use every day—from cars to phones to planes to the cloud. While traditionally, it was developed by an army of volunteer developers and given away for free, companies are increasingly taking a more...
View Details
Keywords:
Free And Open-source Software;
FOSS;
Open Source Distribution;
Applications and Software;
Collaborative Innovation and Invention;
Organizations;
Policy;
Cybersecurity
Lifshitz-Assaf, Hila, and Frank Nagle. "The Digital Economy Runs on Open Source. Here's How to Protect It." Harvard Business Review Digital Articles (September 2, 2021).
- December 2023
- Case
TikTok: The Algorithm Will See You Now
By: Shikhar Ghosh and Shweta Bagai
In a world where attention is a scarce commodity, this case explores the meteoric rise of TikTok—an app that transformed from a niche platform for teens into the most visited domain by 2021—surpassing even Google. Its algorithm was a sophisticated mechanism for...
View Details
Keywords:
Social Media;
Applications and Software;
Disruptive Innovation;
Business and Government Relations;
International Relations;
Cybersecurity;
Culture;
Technology Industry;
China;
United States;
India
Ghosh, Shikhar, and Shweta Bagai. "TikTok: The Algorithm Will See You Now." Harvard Business School Case 824-125, December 2023.
- 07 Sep 2016
- What Do You Think?
How Can the Threat of Networks Be Reduced?
to have had as much resonance among readers as it did among CEOs who made it a summer reading favorite. Perhaps others agreed with Mary L, who commented that, “Today’s tech enabled networks pose no greater threat than any other networks in days gone by.” What’s new?...
View Details
Keywords:
by James Heskett
- 04 May 2020
- Research & Ideas
Predictions, Prophets, and Restarting Your Business
awareness of cybersecurity issues. Combined with the ability to block ads, the growing costs of acquiring customers online, the experience of “Zoombombing,” and controls on consumer data by EU regulators and others, it’s unclear how much...
View Details
Keywords:
by Frank V. Cespedes
- 07 Nov 2017
- First Look
New Research and Ideas: November 7, 2017
(PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of over $1.6 billion, with sales exceeding...
View Details
Keywords:
Carmen Nobel
- 04 Apr 2019
- Cold Call Podcast
Can Mark Zuckerberg Rebuild Trust in Facebook?
cybersecurity and breach and also, people are making a lot of money on use of information. So it became a very hot topic and that's why I wrote the case. Kenny: Do you use Facebook? George: I do. I have about 30,000 followers on Facebook....
View Details
Keywords:
Re: Gerardine A. Doyle
- 06 Jun 2017
- First Look
First Look at New Research and Ideas: June 6, 2017
unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate client-focused cybersecurity company, and Metasploit was a white-hat hacker community with a reputation that ranged from esoteric to “notorious.” And...
View Details
Keywords:
Sean Silverthorne