@article {864, title = {Identifying the Challenges in Commercializing High Technology: A Case Study of Quantum Key Distribution Technology}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {01/2015}, pages = {26-36}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {This article examines the challenges in commercializing high technologies successfully and sustainably using quantum key distribution (QKD) technology as a case study. Quantum communication is increasingly relevant to cybersecurity and nanotechnology, which will replace current technologies and change the way we live. To understand how such high technology could be successfully commercialized, we interviewed individuals from four metrology institutions and two international companies. The result revealed that scattered and small markets, supply chain development, technology validation/certification, a lack of available or adequate infrastructure, and after-sales services are the most serious challenges facing successful commercialization of quantum communication technology. To validate these challenges, we conducted a survey of 60 experts, 49 of whom agreed that above-mentioned factors could affect the commercialization success of QKD technology. Likewise, the survey revealed that technical development, customer orientation/awareness, and government regulations could also hinder the commercialization of QKD technology.}, keywords = {after-sales services, certification, challenges, commercialization, high technology, infrastructure, market size, quantum key distribution, standards, supply chains}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/864}, url = {http://timreview.ca/article/864}, author = {Anas Al Natsheh and Saheed A. Gbadegeshin and Antti Rimpil{\"a}inen and Irna Imamovic-Tokalic and Andrea Zambrano} } @article {953, title = {TIM Lecture Series {\textendash} When Are Software Systems Safe Enough?}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {12/2015}, pages = {56-58}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {risk, safety, safety-critical systems, security, software systems, standards, testing}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/953}, url = {http://timreview.ca/article/953}, author = {Chris Hobbs} } @article {837, title = {Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {10/2014}, pages = {33-39}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Critical infrastructure such as power generation and distribution systems, telecommunications networks, pipelines and pipeline control networks, transportation control networks, financial networks, and government information and communications technology (ICT) have increasingly become the target of cyber-attacks. The impact and cost of these threats, as well as regulatory pressure to mitigate them, have created an impetus to secure these critical infrastructures. Managers have many controls and models at their disposal to help them secure infrastructure technology, including cybersecurity capability maturity models to enable measurement and communication of cybersecurity readiness to top management teams, regulators, and customers, thereby facilitating regulatory compliance, corporate responsibility, and improved brand quality. However, information and awareness is lacking about which models are most appropriate for a given situation and how they should be deployed. This article examines relevant cybersecurity capability maturity models to identify the standards and controls available to providers of critical infrastructure in an effort to improve their level of security preparedness. These capability models are described and categorized by their relevance to different infrastructure domains, and then recommendations are provided on employing capability maturity models to measure and communicate readiness. This article will be relevant to regulators, critical infrastructure providers, and researchers. }, keywords = {adoption, bersecurity, capability maturity models, compliance, critical infrastructure, framework, municipalities, protection, regulation, standards}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/837}, url = {http://timreview.ca/article/837}, author = {Walter Miron and Kevin Muita} } @article {806, title = {Editorial: Insights (July 2014)}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {07/2014}, pages = {3-4}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {ambidexterity, business ecosystems, business models, entrepreneurship, improvisation, innovation, Internet of Things, knowledge-intensive business services, platforms, public good, publicly funded research, standards, strategy, value co-creation, value design}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/806}, url = {http://timreview.ca/article/806}, author = {Chris McPhee} } @article {808, title = {Innovation Opportunities: An Overview of Standards and Platforms in the Video Game Industry}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {07/2014}, pages = {15-21}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {The video game industry offers insights into the significance of standards and platforms. Furthermore, it shows examples of how new entrants can offer innovative services, while reducing their own risk, through bridging the boundaries between standards. Through an exploration of both past and present, this article aims to serve as a primer for understanding, firstly, the technological standards and platforms of the video game industry, and secondly, the recent innovations within the video game industry that have enabled products to be made available across platforms.}, keywords = {arcade games, computer games, console games, innovation, mobile games, platforms, standards, video game industry}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/808}, url = {http://timreview.ca/article/808}, author = {Mikael Laakso and Linus Nyman} } @article {682, title = {Evolution of Wireless Sensor Networks for Industrial Control}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {05/2013}, pages = {5-12}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Technologies evolve in a process of gradual scientific change, but the commercial application of technologies is discontinuous. Managers interested in technology evolution can integrate these contrasting ideas using a powerful theoretical framework, based on the concept of punctuated equilibrium from evolutionary biology. The framework, which enables the differentiation of the technical evolution of a technology from its market application, is used in this article to compare the two standards for wireless sensor networks (WSN) for industrial instrumentation and control: WirelessHART and ISA100.11a. The two WSN standards are the product of two different market contexts, which have selected different minimum viable technologies for evolution in their respective niches. Network security issues present some important selection criteria. Both WSN standards implement security countermeasures against localized wireless network attacks based on the application of the AES encryption standard, but some specific security threats {\textendash} some local, others remotely launched {\textendash} are only well-defended by the adoption of public-key cryptographic (PKC) protocols, which only ISA100.11a supports. This article concludes that the mainstream market potential of the Internet has influenced the evolution of ISA100.11a and will continue to demand that each WSN standard evolve in ways that are difficult to predict.}, keywords = {industrial control, ISA100.11a, punctuated equilibrium, standards, technology evolution, wireless sensor networks, WirelessHART}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/682}, url = {http://timreview.ca/article/682}, author = {Arthur Low} }