Remove Business Model Remove Engineering Remove Ethics Remove Management
article thumbnail

The Ethics Conversation We’re Not Having About Data

Harvard Business Review

Over the summer, controversy engulfed Ashley Madison, the social network for married people seeking other partners, as hackers managed to extract a huge amount of private data from the company’s servers. Except in rare cases, the ethics of these decisions are never broached. The website still fails to fend off hackers.

Ethics 8
article thumbnail

Cast the Net Wide – Make the Most of Your Promotional Time and.

Women on Business

For example, as a designer/writer, my skills are not well applied to bookkeeping or financial management. For example, when my book publisher was hit by Hurricane Wilma, (thus my upcoming book was literally blown away), I turned to graphic design where I had received all my training and contacts—but with a much different business model.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Business For? Cast Your Vote!

Harvard Business Review

Along with our partners at HBR and McKinsey, we're delighted to announce those finalists today (in alphabetical order): Progress Out of Poverty: Business Intelligence for Those in the Business of Helping the Poor. Management Innovation According to Nature's Genius. Story Lindsey Alexander and Steve Wright. Hack by Chris Allen.

article thumbnail

Can HP Change its DNA?

Harvard Business Review

Software had turned into a stronger driver of revenue in the computer industry than hardware, and HP management had realized that it had to make the shift to sustain its growth. It's the company's deeply embedded belief system, its prevailing ethics, and the way people within the company interact with each other and with customers.

article thumbnail

Leading in a World Without Secrets

Harvard Business Review

Successful computer hacks now more often than not involve “social engineering,” the modern equivalent of an old-fashioned con. You can systematically examine your business model to find its points of vulnerability to information leakage. Someone gets talked into giving up info or doing something they should not.

article thumbnail

Two thought-provoking perspectives on the “crisis of capitalism”

First Friday Book Synopsis

Here are brief excerpts from two articles featured by McKinsey & Company. I suggest you read them in the order in which they appear here, then click where indicated to read each in its entirety. I presume to suggest, further, that you register to receive email updates on other resources that are also available at [.].

Crisis 80
article thumbnail

Does Your CEO Really Get Data Security?

Harvard Business Review

The Social-Engineer Toolkit , a cyber version of the Anarchist Cookbook , openly provides tools and techniques for launching attacks and engaging in other malevolent behavior (though it''s also a useful tool for the security community). The silence is part of the hacker business model. IT management'

CEO 8