Monsanto adopted a multi-pronged strategy to target Carey Gillam, a Reuters journalist who investigated the company’s weedkiller and its links to cancer.
Among destroyers of creativity, or “creativity killers,” excessive constraint is probably number one. When people are supposed to be coming up with new ideas or solving complex problems in new ways, they need to be given a lot of autonomy. But it's very hard for some managers to change their command-and-control management style, even when it's creativity and innovation that they’re after.
Business owners are using artificial intelligence to scrutinise staff behaviour minute-to-minute by harvesting data on who emails whom and when, who accesses and edits files and who meets whom and when. Critics have warned that such systems risk increasing pressure on workers who fear the judgement of the algorithm, and that it could encourage people not to take breaks or to spend time in creative thought which won’t be logged.
As individuals, we can control our behaviors and our use of new technologies, even dropping out of sight of surveillance capitalists. But at what price?
When scholars discuss what makes a great business leader, they often turn to sports as the ultimate metaphor or analogy. A manager lagging in her work is "behind the eight ball" while another who is changing tactics is "calling an audible." If your staff can't do the basic "blocking and tackling" required on a project, better improve your "bench strength."
Understanding what motivates good performance is crucial for managers to master. Here is a collection of stories from our archive that highlight Harvard Business School research on motivation.
Publicizing firms' security levels not only leads to greater transparency, but it could also be used to strengthen their security over time. In addition, organizations with poor performance could face greater pressure from their customers and a loss of reputation.
When people engage in proactive help, they often don't have a clear understanding of recipients' problems and issues, thus they receive less gratitude for it. As for the person receiving the unrequested help, they begin to question their own competency and feel a threat to their workplace autonomy.
In the Chinese city of Hengyang, we find a fatigued, disposable workforce assembling gadgets for Amazon, owned by the world’s richest man.
While information technology may be an effective means of coordinating ongoing projects and collaborations, it may be less effective as a means of establishing new partnerships or collaborative relationships. In this way, rich offline communication might make online communications more valuable, suggesting complementarity between face-to-face and digital communications.
Far from being a drain on an economy, immigrants are actually an engine that helps drive innovation and growth—and could even become more vital to global competitiveness in the future.
It’s critical that security and risk management leaders supply board-relevant and business-aligned content that is not hampered by overly technical references.
If you feel you are being given a little more that you thought you would earn, then you tend to go above and beyond to restore this balance
Some startups have worked out it’s cheaper and easier to get humans to behave like robots than it is to get machines to behave like humans.
Consumers are unknowingly building a “terrifying” world of corporate surveillance.
Monitoring is built in to many of the jobs that form the ‘gig economy’ – but surveillance is increasing across the workplace.
More than 1.5 billion sensitive corporate and other files are visible on the public internet due to human error.
The majority of businesses know very little about the nature of the security breaches that are happening to them. Many even admit that a security breach could quite feasibly go unnoticed.
Several US gas pipelines have been hit after a cyber-attack targeted a third-party supplier. It doesn’t matter how well an organization protects its own perimeter if third parties with weak security controls create vulnerabilities that can be easily exploited.
Facebook employees are calling for a crackdown on suspected leakers and questioning whether “spies” have infiltrated the corporation, according to leaked internal posts that suggest the social media giant’s workforce is becoming defensive in the face of critical public scrutiny.