@article {1252, title = {Business Model Architecture by Design}, journal = {Technology Innovation Management Review}, volume = {9}, year = {2019}, month = {07/2019}, pages = {16-27}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {In this article, we view business models as complex deal-making activity systems organized to create, deliver, and capture value. Unlike some other viewpoints, we emphasize both system components and their interconnection. Business activities are carried out by a network of actors drawing on a network of resources, and individual firms seek to configure these intersecting networks to enhance their competitive positioning. The business model literature refers to the significance of antecedent activities in providing context {\textendash} opportunities the firm decides to pursue, the strategy adopted, and requisite capabilities. Drawing on this literature, we propose an approach to framing business model context. Drawing on the information systems literature, we identify a toolkit facilitating activity system architecture design. We suggest how this both draws out the underlying complexity of a business model and shows how a multiplicity of views makes sense.}, keywords = {activity theory, architecture, business model, business networks, design, dynamic capabilities, ISO/IEC 42010, multiple viewpoints, relationship matrix, strategy, Zachman framework}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/1252}, url = {https://timreview.ca/article/1252}, author = {Ronald C. Beckett and John Dalrymple} } @article {1250, title = {Editorial: Insights (July 2019)}, journal = {Technology Innovation Management Review}, volume = {9}, year = {2019}, month = {07/2019}, pages = {3-4}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {accelerators, adoption, Africa, architecture, business ecosystems, business models, design, digital payments, entrepreneurship, incubators, Innovation management, ISPIM, knowledge management}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/1250}, url = {https://timreview.ca/article/1250}, author = {Chris McPhee} } @article {759, title = {TIM Lecture Series {\textendash} The Business of Open Source}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {01/2014}, pages = {28-31}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {architecture, business models, community, engagement, entrepreneurship, licensing, open source software, patterns}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/759}, url = {http://timreview.ca/article/759}, author = {Michael Weiss} } @article {706, title = {Q\&A. Should Startups Care about Application Security?}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {07/2013}, pages = {50-52}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {application security, architecture, checklists, code reviews, cybersecurity, design, detection, prevention, software security, startups, training}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/706}, url = {http://timreview.ca/article/706}, author = {Sherif Koussa} } @article {717, title = {On the Road to Holistic Decision Making in Adaptive Security}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {08/2013}, pages = {59-64}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Security is a critical concern in today{\textquoteright}s software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system{\textquoteright}s behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.}, keywords = {adaptive security, architecture, automation, cyberattacks, cybersecurity, game theory, holistic decision making, self-adaptive software, self-protecting software}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/717}, url = {http://timreview.ca/article/717}, author = {Mahsa Emami-Taba and Mehdi Amoui and Ladan Tahvildari} }