Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
2014. Download this article (925.14 KB)Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
2016. Bailetti_et_al_TIMReview_February2016.pdf (316.83 KB)The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
2014. Download this article (775.68 KB)Safety in the Online World of the Future. Technology Innovation Management Review, 4(11): 41-48. http://doi.org/10.22215/timreview/849
2014. Download this article (826.83 KB)Securing Cyberspace: Towards an Agenda for Research and Practice. Technology Innovation Management Review, 5(11): 26-34. http://doi.org/10.22215/timreview/943
2015. Download this article (437.91 KB)Servitization in a Security Business: Changing the Logic of Value Creation. Technology Innovation Management Review, 3(8): 65-72. http://doi.org/10.22215/timreview/718
2013. Download this article (751.3 KB)TIM Lecture Series – Energy Efficiency and Data Security in Modern Data Centres. Technology Innovation Management Review, 3(2): 41-44. http://doi.org/10.22215/timreview/659
2013. Download this article (248.55 KB)TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
2013. Download this article (238.31 KB)TIM Lecture Series – Web Infections and Protections: Theory and Practice. Technology Innovation Management Review, 4(3): 35-. http://doi.org/10.22215/timreview/774
2014. Download this article (240.66 KB)TIM Lecture Series – When Are Software Systems Safe Enough?. Technology Innovation Management Review, 5(12): 56-58. http://doi.org/10.22215/timreview/953
2015. Download this article (227.33 KB)