HBSP (USA)
-
You May Not Need Big Data After All
Ross, Jeanne W.; Beath, Cynthia M.; Quaadgras, AnneArticle HBS-R1312F-EInformation TechnologiesWhy do companies have so little to show for their investments in big data? The biggest reason is that they aren't doing a good job using the data they already have. They don't know how to manage the information embedded in their operating systems, analyze it in ways that enhance their understanding, and then make changes in response to new evidence and insights. The few companies that have adopted evidence-based decision making ensure that all de...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1013-EInformation TechnologiesIn 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new, previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws in order to patch and fix insecure so...Starting at €8.20
-
Singapore TradeNet: A Tale of One City (Spanish version)
Konsynski, Benn; King, JohnCase HBS-120S23Information TechnologiesDescribes the development of a new information technology-based trade document administration environment for the city-state of Singapore. A considerable effort, involving many governmental and private sector organizations, results in a new set of practices and procedures that positions Singapore for leadership as the port of preference in the Pacific Rim.Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1014-EInformation TechnologiesThis epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws...Starting at €8.20
-
Information Technology System That Couldn't Deliver (HBR Case Study and Commentary)
Reimus, Byron; Sims, James K.; May, Thornton; Nolan, Richard L.; Distefano, Robert A.; King, JohnArticle HBS-97308-EInformation TechnologiesDiana Sullivan, CEO of Lenox Insurance, thought she had done her job when, after three years of hard work, she had delivered Lifexpress on time and on budget. A sophisticated computer-aided system, it enabled Lenox's 10,000-plus agents to do everything from establish a prospect's financial profile, to select the most appropriate products from the company's myriad policies, to generate all the paperwork needed to close a sale. But now Sullivan's b...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy, Teaching Note
Narayanamurti, Venkatesh; Ellis, RyanTeaching Note HBS-KS1120-EInformation TechnologiesTeaching note for KS1013.Starting at €0.00