Articles

Export 73 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is cybersecurity  [Clear All Filters]
Journal Article
Swan, M. 2017. Anticipating the Economic Benefits of Blockchain. Technology Innovation Management Review, 7(10): 6-13. http://doi.org/10.22215/timreview/1109
PDF icon Download this article as a PDF (446.39 KB)
Craigen, D. 2014. Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
PDF icon Download this article (846.35 KB)
Maheux, B. 2014. Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
PDF icon Download this article (561.33 KB)
Adams, M. 2017. Big Data and Individual Privacy in the Age of the Internet of Things. Technology Innovation Management Review, 7(4): 12-24. http://doi.org/10.22215/timreview/1067
PDF icon Download this article as a PDF (649.28 KB)
Wolfond, G. 2017. A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors. Technology Innovation Management Review, 7(10): 35-40. http://doi.org/10.22215/timreview/1112
PDF icon Download this article as a PDF (354.9 KB)
Davis, A. 2015. Building Cyber-Resilience into Supply Chains. Technology Innovation Management Review, 5(4): 19-27. http://doi.org/10.22215/timreview/887
PDF icon Download this article (735.13 KB)
Call for Papers: Distributed Ledger Technologies for Smart Digital Economies. 2021. Technology Innovation Management Review, 11(2): 1-1. http://doi.org/10.22215/timreview/1422
Jensen, L. 2015. Challenges in Maritime Cyber-Resilience. Technology Innovation Management Review, 5(4): 35-39. http://doi.org/10.22215/timreview/889
PDF icon Download this article (292.56 KB)
Shah, A., Abualhaol, I., Gad, M., & Weiss, M. 2017. Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
PDF icon Download this article as a PDF (621.85 KB)
Weiss, M. 2016. Crowdsourcing Literature Reviews in New Domains. Technology Innovation Management Review, 6(2): 5-14. http://doi.org/10.22215/timreview/963
PDF icon Weiss_TIMReview_February2016.pdf (935.17 KB)
Kadivar, M. 2014. Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://doi.org/10.22215/timreview/846
PDF icon Download this article (618.21 KB)
Boyes, H. 2015. Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review, 5(4): 28-34. http://doi.org/10.22215/timreview/888
PDF icon Download this article (448.34 KB)
Dupont, B. 2013. Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
PDF icon Download this article (406.22 KB)
Alvarenga, A., & Tanev, G. 2017. A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technology Innovation Management Review, 7(4): 32-43. http://doi.org/10.22215/timreview/1069
PDF icon Download this article as a PDF (729.21 KB)
Adams, M., & Makramalla, M. 2015. Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
PDF icon Download this article (587.19 KB)
Bailetti, T., & Zijdemans, E. 2014. Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
PDF icon Download this article (856.67 KB)
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
PDF icon Download this article (925.14 KB)
Muegge, S., & Craigen, D. 2015. A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks. Technology Innovation Management Review, 5(6): 6-16. http://doi.org/10.22215/timreview/902
PDF icon Download this article (539.85 KB)
Bailetti, T., Craigen, D., Hudson, D., Levesque, R., McKeen, S., & Walsh, D. ’A. 2013. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
PDF icon Download this article (874.36 KB)
McPhee, C. 2015. Editorial: 100th Issue (November 2015). Technology Innovation Management Review, 5(11): 3-4. http://doi.org/10.22215/timreview/939
PDF icon Download this article (193.3 KB)
McPhee, C., Craigen, D., & Muegge, S. 2015. Editorial: Critical Infrastructures and Cybersecurity (June 2015). Technology Innovation Management Review, 5(6): 3-5. http://doi.org/10.22215/timreview/901
PDF icon Download this article (215.73 KB)
McPhee, C., & Khan, O. 2015. Editorial: Cyber-Resilience in Supply Chains (April 2015). Technology Innovation Management Review, 5(4): 3-5. http://doi.org/10.22215/timreview/884
PDF icon Download this article (219.96 KB)
McPhee, C., & Weiss, M. 2017. Editorial: Cybersecurity (April 2017). Technology Innovation Management Review, 7(4): 3-4. http://doi.org/10.22215/timreview/1065
PDF icon Download this article as a PDF (194.73 KB)
McPhee, C., & Bailetti, T. 2013. Editorial: Cybersecurity (August 2013). Technology Innovation Management Review, 3(8): 3-4. http://doi.org/10.22215/timreview/710
PDF icon Download this article (340.04 KB)
McPhee, C., & Craigen, D. 2016. Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962
PDF icon Editorial_TIMReview_February2016.pdf (202.08 KB)
Breadbasket