Export 10 results:
Author [ Title(Desc)] Type Year
Filters: Keyword is security  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
PDF icon Download this article (925.14 KB)
I
Bailetti, T., Gad, M., & Shah, A. 2016. Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
PDF icon Bailetti_et_al_TIMReview_February2016.pdf (316.83 KB)
O
Bailetti, T., Levesque, R., & Walsh, D. ’A. 2014. The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
PDF icon Download this article (775.68 KB)
S
Douba, N., Rütten, B., Scheidl, D., Soble, P., & Walsh, D. ’A. 2014. Safety in the Online World of the Future. Technology Innovation Management Review, 4(11): 41-48. http://doi.org/10.22215/timreview/849
PDF icon Download this article (826.83 KB)
Levesque, R., Walsh, D. ’A., & Whyte, D. 2015. Securing Cyberspace: Towards an Agenda for Research and Practice. Technology Innovation Management Review, 5(11): 26-34. http://doi.org/10.22215/timreview/943
PDF icon Download this article (437.91 KB)
Rajala, A., Westerlund, M., Murtonen, M., & Starck, K. 2013. Servitization in a Security Business: Changing the Logic of Value Creation. Technology Innovation Management Review, 3(8): 65-72. http://doi.org/10.22215/timreview/718
PDF icon Download this article (751.3 KB)
T
Glowka, J. 2013. TIM Lecture Series – Energy Efficiency and Data Security in Modern Data Centres. Technology Innovation Management Review, 3(2): 41-44. http://doi.org/10.22215/timreview/659
PDF icon Download this article (248.55 KB)
Card, P. 2013. TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
PDF icon Download this article (238.31 KB)
Kwong, A. 2014. TIM Lecture Series – Web Infections and Protections: Theory and Practice. Technology Innovation Management Review, 4(3): 35-. http://doi.org/10.22215/timreview/774
PDF icon Download this article (240.66 KB)
Hobbs, C. 2015. TIM Lecture Series – When Are Software Systems Safe Enough?. Technology Innovation Management Review, 5(12): 56-58. http://doi.org/10.22215/timreview/953
PDF icon Download this article (227.33 KB)
Breadbasket