HBSP (USA)
-
How to Capitalize on Generative AI
McAfee, Andrew; Rock, Daniel; Brynjolfsson, ErikArticle HBS-S23061-EInformation TechnologiesBusiness leaders are struggling to understand how seriously they should take generative AI. It has already displayed breathtaking powers to create new content and is used to do things such as write software, transcribe physicians' interactions with their patients, and let people converse with a CRM system. But it is far from perfect: It can produce distorted or entirely fabricated output and can be oblivious to privacy and copyright concerns. Is ...Starting at €8.20
-
None of Our Business? (HBR Case Study and Commentary)
Fusaro, Roberta A.; Allmendinger, Glen; Tien, Lee; Dew, Nick; Bhaskar, RArticle HBS-R0412A-EInformation TechnologiesTracking technologies--in products and services like TiVo and electronic toll collection--make people's lives a lot more convenient. But the public is understandably concerned about the privacy issues such technologies raise. No one is more aware of those issues than Dante Sorella, CEO of Raydar Electronics, which develops and sells radio frequency identification (RFID) tags and readers. So Dante is troubled when executives from one of his client...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1013-EInformation TechnologiesIn 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new, previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws in order to patch and fix insecure so...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1014-EInformation TechnologiesThis epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy, Teaching Note
Narayanamurti, Venkatesh; Ellis, RyanTeaching Note HBS-KS1120-EInformation TechnologiesTeaching note for KS1013.Starting at €0.00