Export 73 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is cybersecurity  [Clear All Filters]
2015
Adams, M., & Makramalla, M. 2015. Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
PDF icon Download this article (587.19 KB)
Muegge, S., & Craigen, D. 2015. A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks. Technology Innovation Management Review, 5(6): 6-16. http://doi.org/10.22215/timreview/902
PDF icon Download this article (539.85 KB)
McPhee, C. 2015. Editorial: 100th Issue (November 2015). Technology Innovation Management Review, 5(11): 3-4. http://doi.org/10.22215/timreview/939
PDF icon Download this article (193.3 KB)
McPhee, C., Craigen, D., & Muegge, S. 2015. Editorial: Critical Infrastructures and Cybersecurity (June 2015). Technology Innovation Management Review, 5(6): 3-5. http://doi.org/10.22215/timreview/901
PDF icon Download this article (215.73 KB)
McPhee, C., & Khan, O. 2015. Editorial: Cyber-Resilience in Supply Chains (April 2015). Technology Innovation Management Review, 5(4): 3-5. http://doi.org/10.22215/timreview/884
PDF icon Download this article (219.96 KB)
McPhee, C., & Bailetti, T. 2015. Editorial: Cybersecurity (January 2015). Technology Innovation Management Review, 5(1): 3-4. http://doi.org/10.22215/timreview/860
PDF icon Download this article (199.33 KB)
McPhee, C. 2015. Editorial: Insights (May 2015). Technology Innovation Management Review, 5(5): 3-4. http://doi.org/10.22215/timreview/893
PDF icon Download this article (255.36 KB)
Wilding, R., & Wheatley, M. 2015. Q&A. How Can I Secure My Digital Supply Chain?. Technology Innovation Management Review, 5(4): 40-43. http://doi.org/10.22215/timreview/890
PDF icon Download this article (294.17 KB)
Miron, W. 2015. Q&A. Should the Internet Be Considered Critical Infrastructure?. Technology Innovation Management Review, 5(1): 37-40. http://doi.org/10.22215/timreview/865
PDF icon Download this article (301.82 KB)
Adegboyega, O. 2015. Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory. Technology Innovation Management Review, 5(6): 35-44. http://doi.org/10.22215/timreview/905
PDF icon Download this article (659.28 KB)
Payette, J., Anegbe, E., Caceres, E., & Muegge, S. 2015. Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects. Technology Innovation Management Review, 5(6): 26-34. http://doi.org/10.22215/timreview/904
PDF icon Download this article (538.96 KB)
Levesque, R., Walsh, D. ’A., & Whyte, D. 2015. Securing Cyberspace: Towards an Agenda for Research and Practice. Technology Innovation Management Review, 5(11): 26-34. http://doi.org/10.22215/timreview/943
PDF icon Download this article (437.91 KB)
Amin, M., & Tariq, Z. 2015. Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
PDF icon Download this article (506.06 KB)
Khan, O., & Estay, D. A. Sepúlv. 2015. Supply Chain Cyber-Resilience: Creating an Agenda for Future Research. Technology Innovation Management Review, 5(4): 6-12. http://doi.org/10.22215/timreview/885
PDF icon Download this article (412.1 KB)
McGuire, C. F. 2015. TIM Lecture Series – The Expanding Cybersecurity Threat. Technology Innovation Management Review, 5(3): 56-48. http://doi.org/10.22215/timreview/881
PDF icon Download this article (215 KB)
Greene, J. 2015. TIM Lecture Series – The Internet of Everything: Fridgebots, Smart Sneakers, and Connected Cars. Technology Innovation Management Review, 5(5): 47-49. http://doi.org/10.22215/timreview/898
PDF icon Download this article (277.86 KB)
Frincke, D., Craigen, D., Nadima, N., Low, A., & Thomas, M. 2015. TIM Lecture Series – Three Collaborations Enabling Cybersecurity. Technology Innovation Management Review, 5(6): 45-48. http://doi.org/10.22215/timreview/906
PDF icon Download this article (263.6 KB)
Tanev, G., Tzolov, P., & Apiafi, R. 2015. A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technology Innovation Management Review, 5(6): 17-25. http://doi.org/10.22215/timreview/903
PDF icon Download this article (574.88 KB)
2014
Craigen, D. 2014. Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
PDF icon Download this article (846.35 KB)
Maheux, B. 2014. Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
PDF icon Download this article (561.33 KB)
Kadivar, M. 2014. Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://doi.org/10.22215/timreview/846
PDF icon Download this article (618.21 KB)
Bailetti, T., & Zijdemans, E. 2014. Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
PDF icon Download this article (856.67 KB)
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
PDF icon Download this article (925.14 KB)
McPhee, C., & Bailetti, T. 2014. Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843
PDF icon Download this article (258.11 KB)
McPhee, C., & Bailetti, T. 2014. Editorial: Cybersecurity (October 2014). Technology Innovation Management Review, 4(10): 3-4. http://doi.org/10.22215/timreview/833
PDF icon Download this article (259.87 KB)