Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Latest Magazine Topics Podcasts Store The Big Idea Data & Visuals Case Selections HBR Learning Ask AI
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Close menu
CLEAR
  • SUGGESTED TOPICS
Explore HBR
  • Latest
  • The Magazine
  • Podcasts
  • Store
  • Webinars
  • Newsletters
Popular Topics
  • Managing Yourself
  • Leadership
  • Strategy
  • Managing Teams
  • Gender
  • Innovation
  • Work-life Balance
  • All Topics
For Subscribers
  • The Big Idea
  • Data & Visuals
  • Case Selections
  • HBR Learning
  • Subscribe
My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Log Out
  • Sign In
Subscribe Latest Podcasts The Magazine Store Webinars Newsletters All Topics The Big Idea Data & Visuals Case Selections HBR Learning My Library Account Settings Log Out Sign In

Your Cart

Your Shopping Cart is empty.
Visit Our Store
Guest User
Subscriber
My Library Topic Feeds Orders Account Settings Email Preferences Log Out
Reading List
Reading Lists

Cybersecurity and digital privacy

Follow this topic
Following
Related Topics:
  • Technology and analytics
  • AI and machine learning
  • Algorithms
  • Analytics and data science
  • Automation
See All Topics
Popular
Popular From the Store For You
  • How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now

    Technology & Operations Digital Article
    • Brenda R Sharton
    Scams and attacks have become more frequent and sophisticated as the crisis unfolds.
    • Save
    • Share
    • Buy Copies
    • May 01, 2020
  • 6 Actions CEOs Must Take During a Cyberattack

    Technology & Operations Digital Article
    • Tim Maurer
    Lessons from the Colonial Pipeline ransomware attack.
    • Save
    • Share
    • Buy Copies
    • September 18, 2023
  • What Countries and Companies Can Do When Trade and Cybersecurity Overlap

    Business and society Digital Article
    • Stuart Madnick
    • Simon Johnson
    • Keman Huang
    Based on an analysis of 33 cases involving 19 countries.
    • Save
    • Share
    • January 04, 2019
  • Yes, Your Uber Driver Is Judging You

    Sales & Marketing Digital Article
    • Sarah Green Carmichael
    What happens when employees rate customers.
    • Save
    • Share
    • Buy Copies
    • February 20, 2015
  • Passwords Are Terrible, but Will Biometrics Be Any Better?

    Cybersecurity and digital privacy Digital Article
    • Anthony Rjeily
    • Charlie Jacco
    Yes, if you give customers options.
    • Save
    • Share
    • May 11, 2017
  • We Googled You

    Labor Magazine Article
    • Diane Coutu
    Hathaway Jones’s CEO has found a promising candidate to open the company’s flagship store in Shanghai. Should a revelation on the Internet disqualify her now?
    • Save
    • Share
    • From the June 2007 Issue
  • Is Third-Party Software Leaving You Vulnerable to Cyberattacks?

    Technology & Operations Digital Article
    • Keman Huang
    • Stuart Madnick
    • Keri Pearlson
    The SolarWinds hack highlights the importance of vetting your vendors.
    • Save
    • Share
    • Buy Copies
    • May 13, 2021
  • How One Major Healthcare Firm Became the Leader in Innovative AI Use

    Technology & Operations Digital Article
    • Paul Baier
    • David DeLallo
    • John J. Sviokla
    Interviews with the Blue Cross Blue Shield of Michigan management team identified seven principles that guided their actions.
    • Save
    • Share
    • Buy Copies
    • August 08, 2024
  • To Regain Consumers’ Trust, Marketers Need Transparent Data Practices

    Analytics and data science Digital Article
    • Kevin Cochrane
    A trusting relationship between customer and business is essential.
    • Save
    • Share
    • June 13, 2018
  • Saving the Internet

    Innovation Magazine Article
    • Jonathan Zittrain
    Cyberspace can be made safer from the chaos and crime that threaten to overwhelm it. But most recipes for security and order come at a very steep price: the loss of the Internet’s creative potency.
    • Save
    • Share
    • From the June 2007 Issue
  • Sellers Are Overwhelmed by New Technology

    Sales Digital Article
    • George Tobias
    • Craig Riley
    • Colleen Giblin
    • Betsy Gregory-Hosler
    According to research, salespeople who feel overwhelmed by technology are 43% less likely to meet quota.
    • Save
    • Share
    • August 22, 2023
  • Innovating in Uncertain Times: Lessons from 2022

    AI and machine learning Digital Article
    • Chris Howard
    Plus strategies for driving transformative growth in 2023.
    • Save
    • Share
    • December 20, 2022
  • Psychology Is the Key to Detecting Internal Cyberthreats

    Leadership & Managing People Digital Article
    • Edward Stroz
    • Scott Weber
    • Eric Shaw
    Flag risks before they become a problem.
    • Save
    • Share
    • Buy Copies
    • September 20, 2016
  • Equifax, the Credit Reporting Industry, and What Congress Should Do Next

    Cybersecurity and digital privacy Digital Article
    • Marc Rotenberg
    The private sector can’t handle this on its own.
    • Save
    • Share
    • September 20, 2017
  • Engineering Cybersecurity into U.S. Critical Infrastructure

    Technology & Operations Digital Article
    • Virginia Wright
    • Andrew Ohrt
    • Andy Bochman
    The Biden administration is calling on organizations to build defenses into system designs, rather than relying on IT protections alone.
    • Save
    • Share
    • Buy Copies
    • April 17, 2023
  • The Happy Tracked Employee

    Technology & Operations Big Idea
    • Ben Waber
    • Save
    • Share
    • Buy Copies
    • September 20, 2018
  • The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

    Cybersecurity and digital privacy Digital Article
    • Paul R. Kolbe
    • Maria Robson Morrow
    • Lauren Zabierek
    Now is the time to revisit your business continuity plans.
    • Save
    • Share
    • February 18, 2022
  • Cybersecurity’s Human Factor: Lessons from the Pentagon

    Cybersecurity and digital privacy Magazine Article
    • James A. (Sandy) Winnefeld Jr.
    • Christopher Kirchhoff
    • David M. Upton
    How companies can turn themselves into high-reliability organizations
    • Save
    • Share
    • From the September 2015 Issue
  • Boss, I Think Someone Stole Our Customer Data (Commentary for HBR Case Study)

    Strategy & Execution Magazine Article
    • Eric McNulty
    • James E. Lee
    • Bill Boni
    • John Philip Coghlan
    • Jay Foley
    Flayton Electronics is showing up as a common point of purchase for a large number of fraudulent credit card transactions. It's not clear how responsible...
    • Save
    • Share
    • Buy Copies
    • September 01, 2007
  • Gen AI Makes Legal Action Cheap - and Companies Need to Prepare

    Global Business Digital Article
    • Stephen Heitkamp
    • Sean West
    In this new era, companies need to be proactive about addressing their vulnerabilities.
    • Save
    • Share
    • Buy Copies
    • October 03, 2024
  • ChoicePoint (B)

    Strategy & Execution Case Study
    • Lynn Sharp Paine
    • Zack Phillips
    5.00
    View Details
    Supplements the (A) case.
    • Save
    • Share
    • February 21, 2006
  • The Internet of Things

    Management Case Study
    • Timothy M. Laseter
    • Anne Frazer
    • Benjamin Boatright
    8.95
    View Details
    The Internet of Things (IoT) can be generally explained as a network of objects that collect data regarding their surroundings and transfer it across...
    • Save
    • Share
    • July 13, 2023
  • The Year in Tech, 2024: The Insights You Need from Harvard Business Review

    Leadership & Managing People Book
    • Harvard Business Review
    • David De Cremer
    • Richard Florida
    • Ethan Mollick
    • Nita A. Farahany
    22.95
    View Details
    A year of HBR's essential thinking on tech--all in one place. Generative AI, Web3, neurotech, reusable rockets to power the space economy--new technologies...
    • Save
    • Share
    • October 24, 2023
  • Alexa: A Pandora's Box of Risks

    Strategy & Execution Case Study
    • Russell Walker
    11.95
    View Details
    Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial...
    • Save
    • Share
    • May 14, 2019
  • Amazon Shopper Panel: Paying Customers for Their Data

    Sales & Marketing Case Study
    • Eva Ascarza
    • Ayelet Israeli
    11.95
    View Details
    This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through...
    • Save
    • Share
    • January 07, 2021
  • Security Breach at TJX

    Technology & Operations Case Study
    • Nicole R.D. Haggerty
    • Chandra Sekhar Ramasastry
    11.95
    View Details
    The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer...
    • Save
    • Share
    • March 12, 2008
  • HBR Insights Future of Business Boxed Set (8 Books)

    Leadership & Managing People Book
    • Harvard Business Review
    165.00
    View Details
    Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future...
    • Save
    • Share
    • January 12, 2021
  • Ransomware Attack at Springhill Medical Center

    Management Case Study
    • Suraj Srinivasan
    • Li-Kuan Ni
    11.95
    View Details
    In July, 2019, Springhill Medical Center ("SMC") in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital's internal network...
    • Save
    • Share
    • February 17, 2023
  • IPremier Co. (B): Denial of Service Attack

    Technology & Operations Case Study
    • Robert D. Austin
    • Larry Leibrock
    • Alan Murray
    5.00
    View Details
    Supplements the (A) case.
    • Save
    • Share
    • February 13, 2001
  • Network Associates: Securing the Internet

    Global Business Case Study
    • Jennifer Burns
    • Debora L. Spar
    11.95
    View Details
    Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would...
    • Save
    • Share
    • March 15, 1999
  • PharmaCo: Inject 2-Email Theft

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • PharmaCo: Inject 3-Phi Theft

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • Apple: Privacy vs. Safety (A)

    Leadership & Managing People Case Study
    • Henry W. McGee
    • Nien-he Hsieh
    • Sarah McAra
    • Christian Godwin
    11.95
    View Details
    In 2015, Apple CEO Tim Cook debuted the iPhone 6S with enhanced security measures that enflamed a debate on privacy and public safety around the world....
    • Save
    • Share
    • February 22, 2021
  • Customer Data and Privacy: Tools for Preparing Your Team for the Future

    Technology & Operations Book
    • Harvard Business Review
    • Timothy Morey
    • Andrew Burt
    • Christine Moorman
    • Thomas C. Redman
    99.95
    View Details
    Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight...
    • Save
    • Share
    • October 07, 2020
  • PharmaCo: Inject 4-Large Breach and Phi Theft

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • 23andMe: Which Business Model(s)?

    Management Case Study
    • Paul W. Beamish
    • Vineet Gupta
    • Brigitte McIntyre
    11.95
    View Details
    In June 2021, 23andMe completed their IPO with the VG Acquisition Corp, a special-purpose acquisition company. Due to the COVID-19 pandemic, there was...
    • Save
    • Share
    • March 22, 2023
  • Building a "Backdoor" to the iPhone: An Ethical Dilemma

    Leadership & Managing People Case Study
    • Tulsi Jayakumar
    • Surya Tahora
    11.95
    View Details
    In February 2016, Tim Cook, Apple's chief executive officer, challenged a U.S. Federal Court order for Apple to assist the Federal Bureau of Investigation...
    • Save
    • Share
    • April 28, 2016
  • Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI

    Technology & Operations Book
    • Reid Blackman
    30.00
    View Details
    What will you do when your AI misbehaves? The promise of artificial intelligence is automated decision-making at scale, but that means AI also automates...
    • Save
    • Share
    • July 12, 2022
  • Cleveland Clinic Abu Dhabi (Abridged)

    Organizational Development Case Study
    • Linda A. Hill
    • Emily Tedards
    11.95
    View Details
    In 2006, the Cleveland Clinic and Mubadala Investment Company partnered with a bold ambition to deliver world class healthcare in the United Arab Emirates....
    • Save
    • Share
    • February 18, 2022
  • Grupo Martica

    Technology & Operations Case Study
    • Andrew McAfee
    11.95
    View Details
    Grupo Martica commissions a computer security expert to conduct an audit of its systems, network, and processes. This audit reveals that Martica is quite...
    • Save
    • Share
    • August 09, 2005
  • How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now

    Technology & Operations Digital Article
    • Brenda R Sharton
    Scams and attacks have become more frequent and sophisticated as the crisis unfolds.
    • Save
    • Share
    • Buy Copies
    • May 01, 2020
  • 6 Actions CEOs Must Take During a Cyberattack

    Technology & Operations Digital Article
    • Tim Maurer
    Lessons from the Colonial Pipeline ransomware attack.
    • Save
    • Share
    • Buy Copies
    • September 18, 2023
  • What Countries and Companies Can Do When Trade and Cybersecurity Overlap

    Business and society Digital Article
    • Stuart Madnick
    • Simon Johnson
    • Keman Huang
    Based on an analysis of 33 cases involving 19 countries.
    • Save
    • Share
    • January 04, 2019
  • Yes, Your Uber Driver Is Judging You

    Sales & Marketing Digital Article
    • Sarah Green Carmichael
    What happens when employees rate customers.
    • Save
    • Share
    • Buy Copies
    • February 20, 2015
  • ChoicePoint (B)

    Strategy & Execution Case Study
    • Lynn Sharp Paine
    • Zack Phillips
    5.00
    View Details
    Supplements the (A) case.
    • Save
    • Share
    • February 21, 2006
  • The Redecentralized Web

    Disruptive innovation Audio
    Can Web 3.0 give Internet users more control over their digital existence?
    • Save
    • Share
    • March 18, 2020
  • The Internet of Things

    Management Case Study
    • Timothy M. Laseter
    • Anne Frazer
    • Benjamin Boatright
    8.95
    View Details
    The Internet of Things (IoT) can be generally explained as a network of objects that collect data regarding their surroundings and transfer it across...
    • Save
    • Share
    • July 13, 2023
  • The Year in Tech, 2024: The Insights You Need from Harvard Business Review

    Leadership & Managing People Book
    • Harvard Business Review
    • David De Cremer
    • Richard Florida
    • Ethan Mollick
    • Nita A. Farahany
    22.95
    View Details
    A year of HBR's essential thinking on tech--all in one place. Generative AI, Web3, neurotech, reusable rockets to power the space economy--new technologies...
    • Save
    • Share
    • October 24, 2023
  • Passwords Are Terrible, but Will Biometrics Be Any Better?

    Cybersecurity and digital privacy Digital Article
    • Anthony Rjeily
    • Charlie Jacco
    Yes, if you give customers options.
    • Save
    • Share
    • May 11, 2017
  • We Googled You

    Labor Magazine Article
    • Diane Coutu
    Hathaway Jones’s CEO has found a promising candidate to open the company’s flagship store in Shanghai. Should a revelation on the Internet disqualify her now?
    • Save
    • Share
    • From the June 2007 Issue

Popular Topics

Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
See all topics

Partner Center

Subscribe
Explore HBR
  • The Latest
  • All Topics
  • Magazine Archive
  • The Big Idea
  • Case Selections
  • Podcasts
  • Webinars
  • Data & Visuals
  • My Library
  • Newsletters
  • HBR Press
HBR Store
  • Article Reprints
  • Books
  • Cases
  • Collections
  • Magazine Issues
  • HBR Guide Series
  • HBR 20-Minute Managers
  • HBR Emotional Intelligence Series
  • HBR Must Reads
  • Tools
About HBR
  • Contact Us
  • Advertise with Us
  • Information for Booksellers/Retailers
  • Masthead
  • Global Editions
  • Media Inquiries
  • Guidelines for Authors
  • HBR Analytic Services
  • Copyright Permissions
Manage My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Account FAQ
  • Help Center
  • Contact Customer Service
Follow HBR
  • Facebook
  • X Corp.
  • LinkedIn
  • Instagram
  • Your Newsreader
Copyright Policy Privacy Information Returns Policy
Harvard Business Publishing: Higher Education Corporate Learning Harvard Business Review Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.
Copyright Policy Privacy Information Returns Policy
Harvard Business Publishing: Higher Education Corporate Learning Harvard Business Review Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.