Articles
Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
2015. 
Big Data and Individual Privacy in the Age of the Internet of Things. Technology Innovation Management Review, 7(4): 12-24. http://doi.org/10.22215/timreview/1067
2017. 
Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory. Technology Innovation Management Review, 5(6): 35-44. http://doi.org/10.22215/timreview/905
2015. 
A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technology Innovation Management Review, 7(4): 32-43. http://doi.org/10.22215/timreview/1069
2017. 
Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
2015. 
Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
2013. 
Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
2013. 
The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
2014. 
Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965
2016. 
Examining the Relationship Between Cybersecurity and Scaling Value for New Companies. Technology Innovation Management Review, 10(2): 62-70. http://doi.org/10.22215/timreview/1329
2020. 
Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
2014. 
Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
2016. 
Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review, 5(4): 28-34. http://doi.org/10.22215/timreview/888
2015. 
TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
2013. 
Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
2014. 
Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
2014. 
Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
2013. 
Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
2013. 
TIM Lecture Series – Cybersecurity Metrics and Simulation. Technology Innovation Management Review, 4(10): 43-45. http://doi.org/10.22215/timreview/839
2014. 
Building Cyber-Resilience into Supply Chains. Technology Innovation Management Review, 5(4): 19-27. http://doi.org/10.22215/timreview/887
2015. 
Safety in the Online World of the Future. Technology Innovation Management Review, 4(11): 41-48. http://doi.org/10.22215/timreview/849
2014. 
Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
2013. 
On the Road to Holistic Decision Making in Adaptive Security. Technology Innovation Management Review, 3(8): 59-64. http://doi.org/10.22215/timreview/717
2013. 
Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management Review, 3(7): 42-49. http://doi.org/10.22215/timreview/702
2013. 
TIM Lecture Series – Three Collaborations Enabling Cybersecurity. Technology Innovation Management Review, 5(6): 45-48. http://doi.org/10.22215/timreview/906
2015. 