Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
2014. Download this article (561.33 KB)Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843
2014. Download this article (258.11 KB)TIM Lecture Series – The Expanding Cybersecurity Threat. Technology Innovation Management Review, 5(3): 56-48. http://doi.org/10.22215/timreview/881
2015. Download this article (215 KB)Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962
2016. Editorial_TIMReview_February2016.pdf (202.08 KB)Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965
2016. BailettiGad_TIMReview_February2016.pdf (501.18 KB)