Articles

Export 73 results:
Author Title Type [ Year(Desc)]
Filters: Keyword is cybersecurity  [Clear All Filters]
2013
Dupont, B. 2013. Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
PDF icon Download this article (406.22 KB)
Bailetti, T., Craigen, D., Hudson, D., Levesque, R., McKeen, S., & Walsh, D. ’A. 2013. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
PDF icon Download this article (874.36 KB)
McPhee, C., & Bailetti, T. 2013. Editorial: Cybersecurity (August 2013). Technology Innovation Management Review, 3(8): 3-4. http://doi.org/10.22215/timreview/710
PDF icon Download this article (340.04 KB)
McPhee, C., & Bailetti, T. 2013. Editorial: Cybersecurity (July 2013). Technology Innovation Management Review, 3(7): 3-5. http://doi.org/10.22215/timreview/699
PDF icon Download this article (212.7 KB)
Ritchot, B. 2013. An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
PDF icon Download this article (659.03 KB)
Low, A., & Muegge, S. 2013. Keystone Business Models for Network Security Processors. Technology Innovation Management Review, 3(7): 25-33. http://doi.org/10.22215/timreview/703
PDF icon Download this article (620.12 KB)
Craigen, D., Vandeth, D., & Walsh, D. ’A. 2013. Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
PDF icon Download this article (400.83 KB)
Archer, D. W., & Wick, A. 2013. Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
PDF icon Download this article (362.23 KB)
O’Neill, P. 2013. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
PDF icon Download this article (697.06 KB)
Koussa, S. 2013. Q&A. Should Startups Care about Application Security?. Technology Innovation Management Review, 3(7): 50-52. http://doi.org/10.22215/timreview/706
PDF icon Download this article (247.41 KB)
Goyette, R., Robichaud, Y., & Marinier, F. 2013. A Research Agenda for Security Engineering. Technology Innovation Management Review, 3(8): 41-50. http://doi.org/10.22215/timreview/715
PDF icon Download this article (781.18 KB)
Emami-Taba, M., Amoui, M., & Tahvildari, L. 2013. On the Road to Holistic Decision Making in Adaptive Security. Technology Innovation Management Review, 3(8): 59-64. http://doi.org/10.22215/timreview/717
PDF icon Download this article (676.46 KB)
Craigen, D., Walsh, D. ’A., & Whyte, D. 2013. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
PDF icon Download this article (385.67 KB)
Fan, X., & Gong, G. 2013. Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management Review, 3(7): 42-49. http://doi.org/10.22215/timreview/702
PDF icon Download this article (506.02 KB)
Card, P. 2013. TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
PDF icon Download this article (238.31 KB)
2014
Craigen, D. 2014. Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
PDF icon Download this article (846.35 KB)
Maheux, B. 2014. Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
PDF icon Download this article (561.33 KB)
Kadivar, M. 2014. Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://doi.org/10.22215/timreview/846
PDF icon Download this article (618.21 KB)
Bailetti, T., & Zijdemans, E. 2014. Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
PDF icon Download this article (856.67 KB)
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
PDF icon Download this article (925.14 KB)
McPhee, C., & Bailetti, T. 2014. Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843
PDF icon Download this article (258.11 KB)
McPhee, C., & Bailetti, T. 2014. Editorial: Cybersecurity (October 2014). Technology Innovation Management Review, 4(10): 3-4. http://doi.org/10.22215/timreview/833
PDF icon Download this article (259.87 KB)
Westerlund, M., & Rajala, R. 2014. Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
PDF icon Download this article (855.18 KB)
Bailetti, T., Levesque, R., & Walsh, D. ’A. 2014. The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
PDF icon Download this article (775.68 KB)
Han, C., & Dongre, R. 2014. Q&A. What Motivates Cyber-Attackers?. Technology Innovation Management Review, 4(10): 40-42. http://doi.org/10.22215/timreview/838
PDF icon Download this article (341.63 KB)
Breadbasket