-
4 Areas of Cyber Risk That Boards Need to Address
Technology & Operations Digital ArticleHow companies can build a long-term strategy that will keep them secure. -
8 Questions About Using AI Responsibly, Answered
Technology & Operations Big IdeaGenerative AI tools are poised to change the way every business operates. As your own organization begins strategizing which to use, and how, operational... -
The New Risks ChatGPT Poses to Cybersecurity
Technology & Operations Digital ArticleNow is the time for private- and public-sector leaders to step up. -
AI Regulation Is Coming
Technology & Operations Magazine ArticleFor years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence... -
How to Avoid the Ethical Nightmares of Emerging Technology
Technology & Operations Big IdeaNext-generation technologies are poised to cause society-shaking shifts at unprecedented speed and scale. Generative AI, quantum computing, blockchain,... -
The Devastating Business Impacts of a Cyber Breach
Technology & Operations Digital ArticleNo company can afford to underestimate the long-term financial costs. -
Where Is Tech Going in 2023?
AI and machine learning Digital ArticleSix trends that will define the next year, according to McKinsey experts. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
Boards Are Having the Wrong Conversations About Cybersecurity
Technology & Operations Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Technology & Operations Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM's Cost of a Data Breach Report in 2022. -
A New Gold Standard for Digital Ad Measurement?
Technology & Operations Digital ArticleAs the digital ad measurement landscape changes, companies should consider marketing mix models calibrated with ad experiments. -
What? Me, Worry?
Intellectual property Magazine ArticleMost executives think they’re security conscious—they change their passwords and shred important documents and so forth. But what rarely crosses their minds, says espionage expert H. Keith Melton, is that cloak-and-dagger types really are after their valuables. Just because you’re not paranoid, he observes, doesn’t mean they’re not following you. Melton, the author of Ultimate […] -
The Most Common Ways You Could Get Tricked into Compromising Company Data
Cybersecurity and digital privacy Digital ArticleAnd how to combat them. -
The Real Story of the Fake Story of One of Europe’s Most Charismatic CEOs
Web-based technologies Big IdeaHow two professors built a myth that persisted for a decade -
What Do We Know About False News?
Web-based technologies Big IdeaA roundup of the latest thinking -
What Business Needs to Know About the New U.S. Cybersecurity Strategy
Cybersecurity and digital privacy Digital ArticleIt promises to shift liability onto private firms and create incentives to defend against critical vulnerabilities. -
The Digital World Is Changing Rapidly. Your Cybersecurity Needs to Keep Up.
Technology & Operations Digital ArticleCompanies need to do more to understand when and how their software is failing. -
Psychology Is the Key to Detecting Internal Cyberthreats
Psychology Digital ArticleFlag risks before they become a problem. -
Who Should Take the Fall? (HBR Case Study)
Strategy & Execution Magazine ArticleWhen a mobile-payment company is hacked, business slips. The board believes that having someone publicly take the fall will stabilize the situation, but... -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Technology & Operations Digital ArticleThe first time you test your plan shouldn't be during a crisis.
-
ChoicePoint (A)
Strategy & Execution Case Study8.95View Details The CEO of ChoicePoint, a leading company in the rapidly growing U.S. personal data industry, must reexamine the company's business model after a serious... -
IPremier Co. (B): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
Chinese Online 2018-2020: Turnaround
Organizational Development Case Study8.95View Details Chinese Online (COL) was one of China's largest Chinese-language digital content distributor. Its offerings ranged from literature, audio, TV, film, and... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study8.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Amazon Shopper Panel: Paying Customers for Their Data
Sales & Marketing Case Study8.95View Details This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through... -
Atlanta Ransomware Attack (B)
Management Case Study5.00View Details This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha... -
Grupo Martica
Technology & Operations Case Study8.95View Details Grupo Martica commissions a computer security expert to conduct an audit of its systems, network, and processes. This audit reveals that Martica is quite... -
Apple: Privacy vs. Safety (B)
Leadership & Managing People Case Study5.00View Details In 2020, as the COVID-19 pandemic swept across the globe, Apple and Google partnered to develop a contact tracing application that would collect information... -
Maple Tree Cancer Alliance: Growing Pains
Management Case Study8.95View Details Karen Wonders founded Maple Tree Cancer Alliance (MTCA) in 2011 as a non-profit organization in Dayton, Ohio, to improve cancer patients' quality of life... -
PharmaCo: Inject 3-Phi Theft
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
IPremier Co. (C): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
HBR's Year in Business and Technology: 2021 (2 Books)
Strategy & Execution Book45.00View Details The biggest technology and management ideas of the year, all in one place. This collection of the top ideas, insights, and best practices from the past... -
Customer Data and Privacy: The Insights You Need from Harvard Business Review
22.95View Details Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight... -
PopVote: Assessing the Risk of DDoS (B)
Technology & Operations Case Study5.00View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
PharmaCo
Strategy & Execution Case Study8.95View Details PharmaCo was a large, multinational, integrated pharmaceutical company. Its board of directors was meeting to discuss a possible friendly merger with... -
IPremier Co. (A): Denial of Service Attack
Technology & Operations Case Study8.95View Details Describes a new CIO trying to manage a denial of service (DOS) attack against his e-retailing business. The attack and its aftermath provide students... -
Data Privacy in Practice at LinkedIn
Management Case Study8.95View Details -
Cleveland Clinic Abu Dhabi (Abridged)
Organizational Development Case Study8.95View Details In 2006, the Cleveland Clinic and Mubadala Investment Company partnered with a bold ambition to deliver world class healthcare in the United Arab Emirates.... -
Cybersecurity: The Insights You Need from Harvard Business Review
46.00View Details No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you...
-
4 Areas of Cyber Risk That Boards Need to Address
Technology & Operations Digital ArticleHow companies can build a long-term strategy that will keep them secure. -
8 Questions About Using AI Responsibly, Answered
Technology & Operations Big IdeaGenerative AI tools are poised to change the way every business operates. As your own organization begins strategizing which to use, and how, operational... -
The New Risks ChatGPT Poses to Cybersecurity
Technology & Operations Digital ArticleNow is the time for private- and public-sector leaders to step up. -
AI Regulation Is Coming
Technology & Operations Magazine ArticleFor years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence... -
How to Avoid the Ethical Nightmares of Emerging Technology
Technology & Operations Big IdeaNext-generation technologies are poised to cause society-shaking shifts at unprecedented speed and scale. Generative AI, quantum computing, blockchain,... -
The Devastating Business Impacts of a Cyber Breach
Technology & Operations Digital ArticleNo company can afford to underestimate the long-term financial costs. -
Where Is Tech Going in 2023?
AI and machine learning Digital ArticleSix trends that will define the next year, according to McKinsey experts. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
Boards Are Having the Wrong Conversations About Cybersecurity
Technology & Operations Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Technology & Operations Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM's Cost of a Data Breach Report in 2022.