Navigation Menu
Harvard Business Review Home
Subscribe Cart Sign In
Account Menu
Search Menu
Close menu
CLEAR
  • SUGGESTED TOPICS
Explore HBR
  • Diversity
  • Latest
  • The Magazine
  • Ascend
  • Podcasts
  • Video
  • Store
  • Webinars
  • Newsletters
Popular Topics
  • Managing Yourself
  • Leadership
  • Strategy
  • Managing Teams
  • Gender
  • Innovation
  • Work-life Balance
  • All Topics
For Subscribers
  • The Big Idea
  • Data & Visuals
  • Reading Lists
  • Case Selections
  • HBR Learning
  • Subscribe
My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Log Out
  • Sign In
Subscribe Diversity Latest Podcasts Video The Magazine Ascend Store Webinars Newsletters All Topics The Big Idea Data & Visuals Reading Lists Case Selections HBR Learning My Library Account Settings Log Out Sign In

Your Cart

Your Shopping Cart is empty.
Visit Our Store
Guest User
Subscriber
My Library Topic Feeds Orders Account Settings Email Preferences Log Out
Reading List
Reading Lists

Cybersecurity and digital privacy

Follow this topic
Following
Related Topics:
  • Technology and analytics
  • AI and machine learning
  • Algorithms
  • Analytics and data science
  • Automation
See All Topics
Popular
Popular From the Store For You
  • How to Avoid the Ethical Nightmares of Emerging Technology

    AI and machine learning Big Idea
    • Reid Blackman
    A framework for navigating the worst of what AI, quantum computing, and other new technologies could create.
    • Save
    • Share
    • May 09, 2023
  • 8 Questions About Using AI Responsibly, Answered

    AI and machine learning Big Idea
    • Tsedal Neeley
    How to avoid pitfalls around data privacy, bias, misinformation, generative AI, and more.
    • Save
    • Share
    • May 09, 2023
  • Building an Effective Cybersecurity Training Program

    Cybersecurity and digital privacy Digital Article
    • Dustin Updyke
    It’s critical to schedule time for simulated exercises and “scrimmages.”
    • Save
    • Share
    • May 25, 2023
  • The New Risks ChatGPT Poses to Cybersecurity

    Technology & Operations Digital Article
    • Jim Chilton
    Now is the time for private- and public-sector leaders to step up.
    • Save
    • Share
    • Buy Copies
    • April 21, 2023
  • Where to Focus Your Company’s Limited Cybersecurity Budget

    Cybersecurity and digital privacy Digital Article
    • Adam Isles
    Three cybersecurity investments to target.
    • Save
    • Share
    • May 23, 2023
  • AI Regulation Is Coming

    Technology & Operations Magazine Article
    • François Candelon
    • Rodolphe Charme di Carlo
    • Midas De Bondt
    • Theodoros Evgeniou
    For years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence...
    • Save
    • Share
    • Buy Copies
    • From the September–October 2021 Issue
  • Where Is Tech Going in 2023?

    Technology & Operations Digital Article
    • Aamer Baig
    • Jan Shelly Brown
    • William Forrest
    • Vinayak HV
    • Klemens Hjartar
    • Lareina Yee
    Six trends that will define the next year, according to McKinsey experts.
    • Save
    • Share
    • Buy Copies
    • January 06, 2023
  • Customer Data: Designing for Transparency and Trust

    Analytics and data science Magazine Article
    • Timothy Morey
    • Theodore “Theo” Forbath
    • Allison Schoop
    Don’t sacrifice long-term goodwill for short-term benefits.
    • Save
    • Share
    • From the May 2015 Issue
  • The Devastating Business Impacts of a Cyber Breach

    Cybersecurity and digital privacy Digital Article
    • Keman Huang
    • Xiaoqing Wang
    • William Wei
    • Stuart Madnick
    No company can afford to underestimate the long-term financial costs.
    • Save
    • Share
    • May 04, 2023
  • Boards Are Having the Wrong Conversations About Cybersecurity

    IT management Digital Article
    • Lucia Milică
    • Dr. Keri Pearlson
    A survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness.
    • Save
    • Share
    • May 02, 2023
  • The Digital World Is Changing Rapidly. Your Cybersecurity Needs to Keep Up.

    Cybersecurity and digital privacy Digital Article
    • Andrew Burt
    Companies need to do more to understand when and how their software is failing.
    • Save
    • Share
    • May 16, 2023
  • Change Management in Government

    International business Magazine Article
    • Frank Ostroff
    Leaders of government agencies operate under handicaps largely unknown within the private sector. But the best of them have improved performance by adopting and adapting some goals and methods that have been proven in business.
    • Save
    • Share
    • From the May 2006 Issue
  • Say Goodbye to Cookies

    Technology and analytics Digital Article
    • Tim Glomb
    Zero-party data yields better insights — and offers consumers more control.
    • Save
    • Share
    • April 08, 2021
  • Research: Why Employees Violate Cybersecurity Policies

    Technology & Operations Digital Article
    • Clay Posey
    • Mindy Shoss
    Stress can reduce people's tolerance for rules that seem to get in the way of doing their jobs.
    • Save
    • Share
    • Buy Copies
    • January 20, 2022
  • How to Use Facebook's Settings to Have More-Productive Conversations

    Technology & Operations Digital Article
    • Alexandra Samuel
    A couple of relatively simple changes can improve your experience.
    • Save
    • Share
    • Buy Copies
    • October 02, 2018
  • Myth of Secure Computing (HBR OnPoint Enhanced Edition)

    Technology & Operations Magazine Article
    • Robert D. Austin
    • Christopher A.R. Darby
    Few senior executives pay much attention to computer security. They either hand off responsibility to their technical people or bring in consultants....
    • Save
    • Share
    • Buy Copies
    • June 01, 2003
  • Why Data Breaches Don’t Hurt Stock Prices

    Analytics and data science Digital Article
    • Elena Kvochko
    • Rajiv Pant
    Lessons from Home Depot, Sony, and more.
    • Save
    • Share
    • March 31, 2015
  • Research: A Strong Privacy Policy Can Save Your Company Millions

    Customer experience Digital Article
    • Kelly D. Martin
    • Abhishek Borah
    • Robert W. Palmatier
    Here are the Fortune 100 companies with the best and worst policies.
    • Save
    • Share
    • February 15, 2018
  • Plumbing Web Connections

    Technology & Operations Magazine Article
    • Bob Sutor
    • Gardiner Morse
    IBM director of web infrastructure software, Robert Sutor, is a key leader in the arcane world of web services. In this interview, he says it's just a...
    • Save
    • Share
    • Buy Copies
    • From the September 2003 Issue
  • Mapping the Cyberwar Battlefield

    Strategy & Execution Magazine Article
    • Matt Kodama
    • Bill Ladd
    Every day, hackers use the global network to steal information and compromise businesses. Organizations today have to rethink their defenses and move...
    • Save
    • Share
    • Buy Copies
    • From the September 2013 Issue
  • Leading Through Influence at Scale: Open Source Security at the Linux Foundation

    Management Case Study
    • Henry W. Chesbrough
    8.95
    View Details
    The Linux Foundation (LF) is a non-profit consortium of devoting to supporting the worldwide ecosystem of open source software (OSS) developers. While...
    • Save
    • Share
    • October 01, 2022
  • The Year in Tech, 2022: The Insights You Need from Harvard Business Review

    Technology & Operations Book
    • Harvard Business Review
    • Larry Downes
    • Jeanne C. Meister
    • David B. Yoffie
    • Maelle Gavet
    22.95
    View Details
    A year of HBR's essential thinking on tech--all in one place. From quantum computing and next-generation digital health tools to virtual reality training...
    • Save
    • Share
    • October 26, 2021
  • iPremier (B): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    5.00
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 29, 2009
  • Qihoo 360: A Subversive Tiger in the Internet Jungle

    Technology & Operations Case Study
    • Harikesh Nair
    • Sheila Melvin
    8.95
    View Details
    Qihoo 360 Technology Company was a leading Internet platform company in China, the number one provider of Internet and mobile security products as measured...
    • Save
    • Share
    • March 27, 2015
  • F-Secure Corporation: Software as a Service (SaaS) in the Security Solutions Market

    Innovation & Entrepreneurship Case Study
    • Lynda M. Applegate
    • Robert D. Austin
    • Kalle Lyytinen
    • Esko Penttinen
    • Timo Saarinen
    8.95
    View Details
    Describes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers...
    • Save
    • Share
    • January 08, 2009
  • A Leader's Guide to Cybersecurity: Why Boards Need to Lead--and How to Do It

    Technology & Operations Book
    • Thomas J. Parenty
    • Jack J. Domet
    35.00
    View Details
    Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount...
    • Save
    • Share
    • December 03, 2019
  • Amazon Shopper Panel: Paying Customers for Their Data

    Sales & Marketing Case Study
    • Eva Ascarza
    • Ayelet Israeli
    8.95
    View Details
    This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through...
    • Save
    • Share
    • January 07, 2021
  • Rapid7: The Price of Principle

    Finance & Accounting Case Study
    • Lauren H. Cohen
    • Spencer C. N. Hagist
    8.95
    View Details
    • Save
    • Share
    • August 25, 2020
  • IPremier Co. (B): Denial of Service Attack

    Technology & Operations Case Study
    • Robert D. Austin
    • Larry Leibrock
    • Alan Murray
    5.00
    View Details
    Supplements the (A) case.
    • Save
    • Share
    • February 13, 2001
  • PharmaCo: Inject 4-Large Breach and Phi Theft

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • Customer Data and Privacy: Tools for Preparing Your Team for the Future

    Technology & Operations Book
    • Harvard Business Review
    • Timothy Morey
    • Andrew Burt
    • Christine Moorman
    • Thomas C. Redman
    49.95
    View Details
    Business is changing. Will you adapt or be left behind? In "Customer Data and Privacy: Tools for Preparing Your Team for the Future," you'll apply the...
    • Save
    • Share
    • October 07, 2020
  • Data Privacy in Practice at LinkedIn

    Management Case Study
    • Iavor Bojinov
    • Marco Iansiti
    • Seth Neel
    8.95
    View Details
    • Save
    • Share
    • September 01, 2022
  • Alexa: A Pandora's Box of Risks

    Strategy & Execution Case Study
    • Russell Walker
    8.95
    View Details
    Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial...
    • Save
    • Share
    • May 14, 2019
  • Worten Portugal: Becoming a Digital Marketplace

    Technology & Operations Case Study
    • Antonio Moreno
    • Pedro Amorim
    • Tonia Labruyere
    8.95
    View Details
    In 2021, Amazon announced its market entry into Portugal with a dedicated offer. The dominant local electronics retailer, Worten, had been expecting and...
    • Save
    • Share
    • June 01, 2022
  • PharmaCo: Inject 1-Ransomware

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • Facebook-Can Ethics Scale in the Digital Age?

    Leadership & Managing People Case Study
    • George A. Riedel
    • Carin-Isabel Knoop
    8.95
    View Details
    Since its founding in 2004, Facebook has built a phenomenally successful business at global scale to become the fifth most valuable public company in...
    • Save
    • Share
    • August 10, 2018
  • The Year in Tech, 2023: The Insights You Need from Harvard Business Review

    Technology & Operations Book
    • Harvard Business Review
    • Beena Ammanath
    • Andrew Ng
    • Michael Luca
    • Bhaskar Ghosh
    22.95
    View Details
    A year of HBR's essential thinking on tech--all in one place. Easy-to-use AI tools, contactless commerce, crypto for business, the mature metaverse--new...
    • Save
    • Share
    • October 25, 2022
  • PharmaCo

    Strategy & Execution Case Study
    • Michael Parent
    • Greg Murray
    • Sundeep Sandhu
    8.95
    View Details
    PharmaCo was a large, multinational, integrated pharmaceutical company. Its board of directors was meeting to discuss a possible friendly merger with...
    • Save
    • Share
    • March 30, 2020
  • Cyberattack on Abank

    Finance & Accounting Case Study
    • Anton Korinek
    • Yiorgos Allayannis
    8.95
    View Details
    Cyberattacks on corporations are an increasingly common phenomenon that imposes significant costs on shareholders, customers, and management. It is instrumental...
    • Save
    • Share
    • March 08, 2022
  • Cheetah Mobile: Cross-Cultural Clashes Within a Technology Company Born Global

    Global Business Case Study
    • Jing Qian
    • Hao Chen
    • Ziqian Zhao
    • Yi Qu
    8.95
    View Details
    As a Chinese technology corporation founded in 2010, Cheetah Mobile (CM) formally launched its overseas strategy and entered international markets in...
    • Save
    • Share
    • August 27, 2019
  • How to Avoid the Ethical Nightmares of Emerging Technology

    AI and machine learning Big Idea
    • Reid Blackman
    A framework for navigating the worst of what AI, quantum computing, and other new technologies could create.
    • Save
    • Share
    • May 09, 2023
  • 8 Questions About Using AI Responsibly, Answered

    AI and machine learning Big Idea
    • Tsedal Neeley
    How to avoid pitfalls around data privacy, bias, misinformation, generative AI, and more.
    • Save
    • Share
    • May 09, 2023
  • Building an Effective Cybersecurity Training Program

    Cybersecurity and digital privacy Digital Article
    • Dustin Updyke
    It’s critical to schedule time for simulated exercises and “scrimmages.”
    • Save
    • Share
    • May 25, 2023
  • The New Risks ChatGPT Poses to Cybersecurity

    Technology & Operations Digital Article
    • Jim Chilton
    Now is the time for private- and public-sector leaders to step up.
    • Save
    • Share
    • Buy Copies
    • April 21, 2023
  • Where to Focus Your Company’s Limited Cybersecurity Budget

    Cybersecurity and digital privacy Digital Article
    • Adam Isles
    Three cybersecurity investments to target.
    • Save
    • Share
    • May 23, 2023
  • AI Regulation Is Coming

    Technology & Operations Magazine Article
    • François Candelon
    • Rodolphe Charme di Carlo
    • Midas De Bondt
    • Theodoros Evgeniou
    For years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence...
    • Save
    • Share
    • Buy Copies
    • From the September–October 2021 Issue
  • Where Is Tech Going in 2023?

    Technology & Operations Digital Article
    • Aamer Baig
    • Jan Shelly Brown
    • William Forrest
    • Vinayak HV
    • Klemens Hjartar
    • Lareina Yee
    Six trends that will define the next year, according to McKinsey experts.
    • Save
    • Share
    • Buy Copies
    • January 06, 2023
  • Customer Data: Designing for Transparency and Trust

    Analytics and data science Magazine Article
    • Timothy Morey
    • Theodore “Theo” Forbath
    • Allison Schoop
    Don’t sacrifice long-term goodwill for short-term benefits.
    • Save
    • Share
    • From the May 2015 Issue
  • The Devastating Business Impacts of a Cyber Breach

    Cybersecurity and digital privacy Digital Article
    • Keman Huang
    • Xiaoqing Wang
    • William Wei
    • Stuart Madnick
    No company can afford to underestimate the long-term financial costs.
    • Save
    • Share
    • May 04, 2023
  • Boards Are Having the Wrong Conversations About Cybersecurity

    IT management Digital Article
    • Lucia Milică
    • Dr. Keri Pearlson
    A survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness.
    • Save
    • Share
    • May 02, 2023

Popular Topics

Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
See all topics

Partner Center

Diversity Latest Magazine Ascend Topics Podcasts Video Store The Big Idea Data & Visuals Case Selections HBR Learning
Harvard Business Review Home
Subscribe
Explore HBR
  • The Latest
  • All Topics
  • Magazine Archive
  • The Big Idea
  • Reading Lists
  • Case Selections
  • Video
  • Podcasts
  • Webinars
  • Data & Visuals
  • My Library
  • Newsletters
  • HBR Press
  • HBR Ascend
HBR Store
  • Article Reprints
  • Books
  • Cases
  • Collections
  • Magazine Issues
  • HBR Guide Series
  • HBR 20-Minute Managers
  • HBR Emotional Intelligence Series
  • HBR Must Reads
  • Tools
About HBR
  • Contact Us
  • Advertise with Us
  • Information for Booksellers/Retailers
  • Masthead
  • Global Editions
  • Media Inquiries
  • Guidelines for Authors
  • HBR Analytic Services
  • Copyright Permissions
Manage My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Account FAQ
  • Help Center
  • Contact Customer Service
Follow HBR
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • Your Newsreader
Harvard Business Publishing
  • About Us
  • Careers
  • Privacy Policy
  • Cookie Policy
  • Copyright Information
  • Trademark Policy

Harvard Business Publishing:
  • Higher Education
  • Corporate Learning
  • Harvard Business Review
  • Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.