Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results : (7) Arrow Down
Filter Results : (7) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (116)
    • Faculty Publications  (7)

    Show Results For

    • All HBS Web  (116)
      • Faculty Publications  (7)

      Security Vulnerabilities Remove Security Vulnerabilities →

      Page 1 of 7 Results

      Are you looking for?

      → Search All HBS Web
      • March 2023
      • Article

      Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits

      By: Elisabeth Kempf and Oliver Spalt
      This paper provides novel evidence suggesting that securities class action lawsuits, a central pillar of the U.S. litigation and corporate governance system, can constitute an obstacle to valuable corporate innovation. We first establish that valuable innovation output...  View Details
      Keywords: Class-action Litigation; Turnover; Lawsuits and Litigation; Innovation and Invention; Risk and Uncertainty
      Citation
      Find at Harvard
      Register to Read
      Related
      Kempf, Elisabeth, and Oliver Spalt. "Attracting the Sharks: Corporate Innovation and Securities Class Action Lawsuits." Management Science 69, no. 3 (March 2023): 1323–1934.
      • August 2022
      • Article

      The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices

      By: Aaron R. Brough, David A. Norton, Shannon L. Sciarappa and Leslie K. John
      Drawing from a content analysis of publicly traded companies’ privacy notices, a survey of managers, a field study, and five online experiments, this research investigates how consumers respond to privacy notices. A privacy notice, by placing legally enforceable limits...  View Details
      Keywords: Choice; Purchase Intent; Privacy; Privacy Notices; Warnings; Assurances; Information Disclosure; Trust; Consumer Behavior; Spending; Decisions; Information; Communication
      Citation
      Find at Harvard
      Read Now
      Related
      Brough, Aaron R., David A. Norton, Shannon L. Sciarappa, and Leslie K. John. "The Bulletproof Glass Effect: Unintended Consequences of Privacy Notices." Journal of Marketing Research (JMR) 59, no. 4 (August 2022): 739–754.
      • Article

      Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error

      By: Celia Cintas, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan and Edward McFowland III
      Reliably detecting attacks in a given set of inputs is of high practical relevance because of the vulnerability of neural networks to adversarial examples. These altered inputs create a security risk in applications with real-world consequences, such as self-driving...  View Details
      Keywords: Autoencoder Networks; Pattern Detection; Subset Scanning; Computer Vision; Statistical Methods And Machine Learning; Machine Learning; Deep Learning; Data Mining; Big Data; Large-scale Systems; Mathematical Methods; Analytics and Data Science
      Citation
      Read Now
      Related
      Cintas, Celia, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan, and Edward McFowland III. "Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error." Proceedings of the International Joint Conference on Artificial Intelligence 29th (2020).
      • May 28, 2019
      • Other Article

      How Russia Found a Disinformation Haven in America

      By: Rawi Abdelal and Galit Goldstein
      The Mueller Report established that “the Russians” undertook information operations campaigns to meddle in the 2016 U.S. presidential election. Though this has been clear for a long time, Americans continue to discuss Russian information operations in the wrong way....  View Details
      Keywords: Elections; Donald Trump; Political Elections; National Security; Information Technology; Governing Rules, Regulations, and Reforms; Social Media; Russia; United States
      Citation
      Read Now
      Related
      Abdelal, Rawi, and Galit Goldstein. "How Russia Found a Disinformation Haven in America." National Interest (May 28, 2019).
      • September 19, 2017
      • Article

      After Equifax Breach, Companies Advised to Review Open-Source Software Code

      By: Ben DiPietro and Lou Shipley
      It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
      Lou...  View Details
      Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
      Citation
      Register to Read
      Related
      DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
      • Other Article

      Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities

      By: Robert Lagerstrom, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant and Lee Doolan
      Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings. We...  View Details
      Keywords: Security Vulnerabilities; Software Architecture; Metrics; Software; Complexity; Measurement and Metrics
      Citation
      Find at Harvard
      Read Now
      Related
      Lagerstrom, Robert, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, and Lee Doolan. "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities." Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 9th (2017): 53–69. (Part of Lecture Notes in Computer Science, ISSN 0302-9743.)
      • September 2013
      • Case

      United Rentals (A)

      By: Jay W. Lorsch, Kathleen Durante and Emily McTague

      In December 1997 United Rentals (URI) went public on the NYSE. Ten years later, during the peak of the economic meltdown, the company's performance was in decline. United Rentals had experienced its share of problems in the prior years and was still struggling to...  View Details

      Keywords: Board Of Directors; Board Dynamics; Accounting Fraud; Governance; Board Committees; Merger; Corporate Governance; Construction Industry; United States
      Citation
      Educators
      Purchase
      Related
      Lorsch, Jay W., Kathleen Durante, and Emily McTague. "United Rentals (A)." Harvard Business School Case 414-043, September 2013.
      • 1

      Are you looking for?

      → Search All HBS Web
      ǁ
      Campus Map
      Harvard Business School
      Soldiers Field
      Boston, MA 02163
      →Map & Directions
      →More Contact Information
      • Make a Gift
      • Site Map
      • Jobs
      • Harvard University
      • Trademarks
      • Policies
      • Accessibility
      • Digital Accessibility
      Copyright © President & Fellows of Harvard College