This website uses technical, customisation and analytical cookies, both first-party and third-party, to anonymously facilitate browsing and analyse statistics on use of the website. Learn more
Catalog Advanced Search
20 items were found using the following search criteria
-
Next-Generation Online Cons (Spanish version)
Shirky, ClayArticle HBS-F0806DOnline business scams are rising because the Internet offers a perfect medium for con artists, who know that the money's in business. Companies can meet that threat with three defensive strategies.Starting at €8.20
-
Next-Generation Online Cons
Shirky, ClayArticle HBS-F0806D-EOnline business scams are rising because the Internet offers a perfect medium for con artists, who know that the money's in business. Companies can meet that threat with three defensive strategies.Starting at €8.20
-
F-Secure Corporation: Software as a Service (SaaS) in the Security Solutions Market
Applegate, Lynda M.; Austin, Robert D.; Lyytinen, Kalle; Penttinen, Esko; Saarinen, TimoCase HBS-809099-EInformation TechnologiesDescribes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers (ISPs). F-Secure disruptively entered a mature business with dominant players by executing an innovative new service model. The case describes the challenges involved in developing and executing the new service model, and offers students opportunities to discuss the evolving challenges the comp...Starting at €8.20
-
F-Secure Corporation: Software as a Service (SaaS) in the Security Solutions Market, Teaching Note
Austin, Robert D.; Applegate, Lynda M.; Lyytinen, Kalle; Penttinen, Esko; Saarinen, TimoTeaching Note HBS-809151-EMarketingTeaching Note for [809099].Starting at €0.00
-
When Hackers Turn to Blackmail (HBR Case Study)
Eisenmann, CarolineArticle HBS-R0910X-EInformation TechnologiesSunnylake Hospital is being held up by online extortionists who have blocked access to its electronic medical records and are demanding $100,000 to restore it. Paul Layman, Sunnylake's CEO, didn't take their first e-mail seriously, and now the hospital has ground to a halt. Paul's golden-boy IT director can't seem to outwit the hackers. Sunnylake's legal counsel tells Paul, "Literally every second is a liability." The chief of staff is in a mutin...Starting at €8.20
-
When Hackers Turn to Blackmail (Commentary for HBR Case Study)
Eisenmann, CarolineArticle HBS-R0910Z-EInformation TechnologiesSunnylake Hospital is being held up by online extortionists who have blocked access to its electronic medical records and are demanding $100,000 to restore it. Paul Layman, Sunnylake's CEO, didn't take their first e-mail seriously, and now the hospital has ground to a halt. Paul's golden-boy IT director can't seem to outwit the hackers. Sunnylake's legal counsel tells Paul, "Literally every second is a liability." The chief of staff is in a mutin...Starting at €8.20
-
Data.gov
Lakhani, Karim R.; Austin, Robert D.; Yi, YumiCase HBS-610075-EInformation TechnologiesTo maximize their effectiveness, color cases should be printed in color. This case presents the logic and execution underlying the launch of Data.gov, an instantiation of President Obama's initiative for transparency and open government. The process used by Vivek Kundra, the federal CIO, and his team to rapidly develop the website and to make available high-value data sets for reuse is highlighted. The case recounts Kundra's experience at the sta...Starting at €8.20
-
An Intern's Dilemma
Sucher, Sandra J.; Preble, MatthewCase HBS-611041-EBusiness Ethics and Corporate Social ResponsibilityAn HBS student is asked by his employer to misrepresent himself during the course of his summer internship in order to obtain data from industry competitors.Starting at €8.20
-
An Intern's Dilemma (Spanish version)
Sucher, Sandra J.; Preble, MatthewCase HBS-616S11Business Ethics and Corporate Social ResponsibilityAn HBS student is asked by his employer to misrepresent himself during the course of his summer internship in order to obtain data from industry competitors.Starting at €8.20
-
The Danger from Within
Upton, David M.; Creese, SadieArticle HBS-R1409G-EStrategyThe 2013 cyberattack on Target is just one recent example of a growing phenomenon: attacks involving connected companies or direct employees. According to various estimates, at least 80 million of these attacks occur in the United States each year--but the number may be much higher, because they often go unreported. Upton and Creese head an international research project whose goal is to aid organizations in detecting and neutralizing threats fro...Starting at €8.20