-
How to Avoid the Ethical Nightmares of Emerging Technology
AI and machine learning Big IdeaA framework for navigating the worst of what AI, quantum computing, and other new technologies could create. -
8 Questions About Using AI Responsibly, Answered
AI and machine learning Big IdeaHow to avoid pitfalls around data privacy, bias, misinformation, generative AI, and more. -
Building an Effective Cybersecurity Training Program
Cybersecurity and digital privacy Digital ArticleIt’s critical to schedule time for simulated exercises and “scrimmages.” -
The New Risks ChatGPT Poses to Cybersecurity
Technology & Operations Digital ArticleNow is the time for private- and public-sector leaders to step up. -
Where to Focus Your Company’s Limited Cybersecurity Budget
Cybersecurity and digital privacy Digital ArticleThree cybersecurity investments to target. -
AI Regulation Is Coming
Technology & Operations Magazine ArticleFor years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence... -
Where Is Tech Going in 2023?
Technology & Operations Digital ArticleSix trends that will define the next year, according to McKinsey experts. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
The Devastating Business Impacts of a Cyber Breach
Cybersecurity and digital privacy Digital ArticleNo company can afford to underestimate the long-term financial costs. -
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
The Digital World Is Changing Rapidly. Your Cybersecurity Needs to Keep Up.
Cybersecurity and digital privacy Digital ArticleCompanies need to do more to understand when and how their software is failing. -
Change Management in Government
International business Magazine ArticleLeaders of government agencies operate under handicaps largely unknown within the private sector. But the best of them have improved performance by adopting and adapting some goals and methods that have been proven in business. -
Say Goodbye to Cookies
Technology and analytics Digital ArticleZero-party data yields better insights — and offers consumers more control. -
Research: Why Employees Violate Cybersecurity Policies
Technology & Operations Digital ArticleStress can reduce people's tolerance for rules that seem to get in the way of doing their jobs. -
How to Use Facebook's Settings to Have More-Productive Conversations
Technology & Operations Digital ArticleA couple of relatively simple changes can improve your experience. -
Myth of Secure Computing (HBR OnPoint Enhanced Edition)
Technology & Operations Magazine ArticleFew senior executives pay much attention to computer security. They either hand off responsibility to their technical people or bring in consultants.... -
Why Data Breaches Don’t Hurt Stock Prices
Analytics and data science Digital ArticleLessons from Home Depot, Sony, and more. -
Research: A Strong Privacy Policy Can Save Your Company Millions
Customer experience Digital ArticleHere are the Fortune 100 companies with the best and worst policies. -
Plumbing Web Connections
Technology & Operations Magazine ArticleIBM director of web infrastructure software, Robert Sutor, is a key leader in the arcane world of web services. In this interview, he says it's just a... -
Mapping the Cyberwar Battlefield
Strategy & Execution Magazine ArticleEvery day, hackers use the global network to steal information and compromise businesses. Organizations today have to rethink their defenses and move...
-
Leading Through Influence at Scale: Open Source Security at the Linux Foundation
Management Case Study8.95View Details The Linux Foundation (LF) is a non-profit consortium of devoting to supporting the worldwide ecosystem of open source software (OSS) developers. While... -
The Year in Tech, 2022: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. From quantum computing and next-generation digital health tools to virtual reality training... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Qihoo 360: A Subversive Tiger in the Internet Jungle
Technology & Operations Case Study8.95View Details Qihoo 360 Technology Company was a leading Internet platform company in China, the number one provider of Internet and mobile security products as measured... -
F-Secure Corporation: Software as a Service (SaaS) in the Security Solutions Market
Innovation & Entrepreneurship Case Study8.95View Details Describes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers... -
A Leader's Guide to Cybersecurity: Why Boards Need to Lead--and How to Do It
35.00View Details Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount... -
Amazon Shopper Panel: Paying Customers for Their Data
Sales & Marketing Case Study8.95View Details This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through... -
Rapid7: The Price of Principle
Finance & Accounting Case Study8.95View Details -
IPremier Co. (B): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
PharmaCo: Inject 4-Large Breach and Phi Theft
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
Customer Data and Privacy: Tools for Preparing Your Team for the Future
49.95View Details Business is changing. Will you adapt or be left behind? In "Customer Data and Privacy: Tools for Preparing Your Team for the Future," you'll apply the... -
Data Privacy in Practice at LinkedIn
Management Case Study8.95View Details -
Alexa: A Pandora's Box of Risks
Strategy & Execution Case Study8.95View Details Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial... -
Worten Portugal: Becoming a Digital Marketplace
Technology & Operations Case Study8.95View Details In 2021, Amazon announced its market entry into Portugal with a dedicated offer. The dominant local electronics retailer, Worten, had been expecting and... -
PharmaCo: Inject 1-Ransomware
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
Facebook-Can Ethics Scale in the Digital Age?
Leadership & Managing People Case Study8.95View Details Since its founding in 2004, Facebook has built a phenomenally successful business at global scale to become the fifth most valuable public company in... -
The Year in Tech, 2023: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. Easy-to-use AI tools, contactless commerce, crypto for business, the mature metaverse--new... -
PharmaCo
Strategy & Execution Case Study8.95View Details PharmaCo was a large, multinational, integrated pharmaceutical company. Its board of directors was meeting to discuss a possible friendly merger with... -
Cyberattack on Abank
Finance & Accounting Case Study8.95View Details Cyberattacks on corporations are an increasingly common phenomenon that imposes significant costs on shareholders, customers, and management. It is instrumental... -
Cheetah Mobile: Cross-Cultural Clashes Within a Technology Company Born Global
Global Business Case Study8.95View Details As a Chinese technology corporation founded in 2010, Cheetah Mobile (CM) formally launched its overseas strategy and entered international markets in...
-
How to Avoid the Ethical Nightmares of Emerging Technology
AI and machine learning Big IdeaA framework for navigating the worst of what AI, quantum computing, and other new technologies could create. -
8 Questions About Using AI Responsibly, Answered
AI and machine learning Big IdeaHow to avoid pitfalls around data privacy, bias, misinformation, generative AI, and more. -
Building an Effective Cybersecurity Training Program
Cybersecurity and digital privacy Digital ArticleIt’s critical to schedule time for simulated exercises and “scrimmages.” -
The New Risks ChatGPT Poses to Cybersecurity
Technology & Operations Digital ArticleNow is the time for private- and public-sector leaders to step up. -
Where to Focus Your Company’s Limited Cybersecurity Budget
Cybersecurity and digital privacy Digital ArticleThree cybersecurity investments to target. -
AI Regulation Is Coming
Technology & Operations Magazine ArticleFor years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence... -
Where Is Tech Going in 2023?
Technology & Operations Digital ArticleSix trends that will define the next year, according to McKinsey experts. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
The Devastating Business Impacts of a Cyber Breach
Cybersecurity and digital privacy Digital ArticleNo company can afford to underestimate the long-term financial costs. -
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness.