Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Working Knowledge
Business Research for Business Leaders
  • Browse All Articles
  • Popular Articles
  • Cold Call Podcast
  • Managing the Future of Work Podcast
  • About Us
  • Book
  • Leadership
  • Marketing
  • Finance
  • Management
  • Entrepreneurship
  • All Topics...
  • Topics
    • COVID-19
    • Entrepreneurship
    • Finance
    • Gender
    • Globalization
    • Leadership
    • Management
    • Negotiation
    • Social Enterprise
    • Strategy
  • Sections
    • Book
    • Podcasts
    • HBS Case
    • In Practice
    • Lessons from the Classroom
    • Op-Ed
    • Research & Ideas
    • Research Event
    • Sharpening Your Skills
    • What Do You Think?
    • Working Paper Summaries
  • Browse All
    Filter Results: (8) Arrow Down
    Filter Results: (8) Arrow Down Arrow Up
    • Popular
    • Browse All Articles
    • About Us
    • Newsletter Sign-Up
    • RSS
    • Popular
    • Browse All Articles
    • About Us
    • Newsletter Sign-Up
    • RSS

    National SecurityRemove National Security →

    New research on national security from Harvard Business School faculty on issues including the evolution of data security, conflicts between governments and companies over security requirements, and government intrusion into private customer records.
    Page 1 of 8 Results
    • 23 Aug 2021
    • Research & Ideas

    Why White-Collar Crime Spiked in America After 9/11

    by Jay Fitzgerald

    The FBI shifted agents and other budget resources toward fighting terrorism in certain parts of the country, and financial fraud and insider trading ran rampant, according to research by Trung Nguyen. Open for comment; 0 Comments.

    • 24 Feb 2020
    • Research & Ideas

    The Hidden Vulnerabilities of Open Source Software

    by Frank Nagle and Jenny Hoffman

    The increasing use of open source software in most commercial apps has revolutionized software development—but also created hidden vulnerabilities, say Frank Nagle and Jenny Hoffman. Open for comment; 0 Comments.

    • 01 Nov 2018
    • Working Paper Summaries

    Forecasting Airport Transfer Passenger Flow Using Real-Time Data and Machine Learning

    by Xiaojia Guo, Yael Grushka-Cockayne, and Bert De Reyck

    Passengers arriving at international hubs often endure delays, especially at immigration and security. This study of London’s Heathrow Airport develops a system to provide real-time information about transfer passengers’ journeys through the airport to better serve passengers, airlines, and their employees. It shows how advanced machine learning could be accessible to managers.

    • 21 Dec 2016
    • Cold Call Podcast

    Target's Expensive Cybersecurity Mistake

    Re: Suraj Srinivasan

    Professor Suraj Srinivasan explores one of the largest cyber breaches in history, analyzing why failures happen, who should be held accountable, and how preventing them is both a technical problem and a matter of organizational design. Open for comment; 0 Comments.

    • 06 Apr 2016
    • What Do You Think?

    As Tim Cook, How Would You Tackle Apple's Next Challenge?

    by James Heskett

    SUMMING UP With Apple's technology now apparently less secure, CEO Tim Cook suddenly has some critical decisions to make. James Heskett guides us through the options and asks for suggestions. Open for comment; 0 Comments.

    • 04 Mar 2016
    • Research & Ideas

    Is E-commerce at Risk in Apple's Security Dispute with the FBI?

    Re: Sunil Gupta

    Apple invests heavily in making its products secure, but now is being commanded by the FBI to make more investments to undo that work. Sunil Gupta discusses the fallout when business and government collide. Open for comment; 0 Comments.

    • 02 Mar 2016
    • What Do You Think?

    Is Apple’s Real Privacy Challenge Technology Innovation Itself?

    by James Heskett

    SUMMING UP: Apple's battle with the FBI over the iPhone contents of one of the San Bernardino shooters raises a question for James Heskett. Given the relentless pace of technology, can any company guarantee the privacy and security of its users? What do YOU think? Closed for comment; 0 Comments.

    • 19 Feb 2016
    • Working Paper Summaries

    ‘Does 'What We Do' Make Us 'Who We Are'? Organizational Design and Identity Change at the Federal Bureau of Investigation

    by Ranjay Gulati, Ryan Raffaelli, and Jan Rivkin

    Both the design and identity of the FBI changed greatly in the wake of the September 11, 2001 terrorist attacks. This study tracing the co-evolution of the Bureau’s organizational design and identity before the 9/11 attacks and through three subsequent phases finds that successful changes to organizational identity are likely to be delayed after a radical external shock: Management is likely to be constrained, appropriate design is probably unclear, or both.

    • 1
    ǁ
    Campus Map
    Harvard Business School Working Knowledge
    Baker Library | Bloomberg Center
    Soldiers Field
    Boston, MA 02163
    Email: Editor-in-Chief
    →Map & Directions
    →More Contact Information
    • Make a Gift
    • Site Map
    • Jobs
    • Harvard University
    • Trademarks
    • Policies
    • Accessibility
    • Digital Accessibility
    Copyright © President & Fellows of Harvard College