October 2014 Download this article as a PDF

From the Editor-in-Chief

Welcome to the October 2014 issue of the Technology Innovation Management Review. This is the first of two issues covering the editorial theme of Cybersecurity, and I am pleased to introduce our guest editor, Tony Bailetti, Director of Carleton University's Technology Innovation Management program (TIM) and Executive Director (Acting) of the VENUS Cybersecurity Corporation.

This issue coincides with Cybersecurity Awareness Month in Canada. Previously, we covered the theme of Cybersecurity in July 2013 and August 2013. We hope you will read the articles in those issues as well.

In December, we will be publishing an unthemed issue, and I encourage you to get in touch if you would like to submit an article. We hope you enjoy this issue of the TIM Review and will share your comments online. Please contact us with article topics and submissions, suggestions for future themes, and any other feedback.

Chris McPhee

From the Guest Editor

Welcome to the October issue of the TIM Review. The October and November issues examine the theme of Cybersecurity. The contributions published in these two issues are the result of a very intensive industry, university, and government collaboration that started with the launch of the VENUS Cybersecurity Corporation in 2013.

We thank you for reading the journal and urge you to support initiatives to make cyberspace safe, productive, and creative for its users worldwide.

Thirteen authors contributed four articles, a Q&A, and a summary of a TIM Lecture to this issue of the TIM Review. Two of these authors work in industry, five in government, and four in universities. Two of the authors are completing their master program at Carleton University.

Tony Bailetti is at Carleton University; Renaud Levesque is Director General and D’Arcy Walsh is a Science Advisor at the Communications Security Establishment (CSE). Their article offers a view of a future state of the online world that places safety, productivity and creativity above all else.

Dan Craigen is a Science Advisor, Nadia Diakun-Thibault is Senior Science and Analytics Advisor, and Randy Purse is the Senior Learning Advisor at the Information Technology Security Learning Centre at the Communications Security Establishment (CSE). These authors propose a definition of cybersecurity that is concise, inclusive, meaningful, and unifying for the purpose of enabling enhanced and enriched interdisciplinary dialectics.

Mika Westerlund, Assistant Professor at Carleton University’s School of Business, and Risto Rajala, Assistant Professor in the Department of Industrial Engineering and Management at Aalto University in Helsinki, Finland, examine survey data from 109 value-added resellers of a multinational supplier. They show that resellers are more committed to stock and sell cybersecurity products and services if the supplier’s digital channel marketing provides tools that help them sell the solutions to end customers.

Walter Miron is a Director of Technology Strategy at TELUS Communications and Kevin Muita is a graduate student in the Technology Innovation Management program at Carleton University. Their article examines relevant cybersecurity capability maturity models to identify the standards and controls available to providers of critical infrastructure in an effort to improve their level of security preparedness.

Chen Han is an independent consultant that leads technical teams to develop information system solutions. She and Rituja Dongre are both graduate students in the Technology Innovation Management (TIM) program at Carleton University. Their Q&A answers the question: What motivates cyber-attackers?

George Cybenko is the Dorothy and Walter Gramm Professor of Engineering at Darmouth College. He delivered the 6th TIM Lecture of 2014. Cybenko provided an overview of possible security metrics together with their pros and cons in the context of current information technology security practices. He also presented a modelling and simulation approach that produces meaningful quantitative security metrics as the basis for a more rigorous science of cybersecurity.

We encourage the readers of the TIM Review, their colleagues, and their organizations to act decisively to improve the security of cyberspace.

Tony Bailetti
Guest Editor

Share this article:

Cite this article:

Rate This Content: 
5 votes have been cast, with an average score of 2.8 stars

Keywords: cyberattacks, cybersecurity, cyberthreats, information technology, network security, research