Export 73 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is cybersecurity  [Clear All Filters]
2014
Westerlund, M., & Rajala, R. 2014. Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
PDF icon Download this article (855.18 KB)
Bailetti, T., Levesque, R., & Walsh, D. ’A. 2014. The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
PDF icon Download this article (775.68 KB)
Han, C., & Dongre, R. 2014. Q&A. What Motivates Cyber-Attackers?. Technology Innovation Management Review, 4(10): 40-42. http://doi.org/10.22215/timreview/838
PDF icon Download this article (341.63 KB)
Douba, N., Rütten, B., Scheidl, D., Soble, P., & Walsh, D. ’A. 2014. Safety in the Online World of the Future. Technology Innovation Management Review, 4(11): 41-48. http://doi.org/10.22215/timreview/849
PDF icon Download this article (826.83 KB)
Cybenko, G. 2014. TIM Lecture Series – Cybersecurity Metrics and Simulation. Technology Innovation Management Review, 4(10): 43-45. http://doi.org/10.22215/timreview/839
PDF icon Download this article (277.81 KB)
Grau, D., & Kennedy, C. 2014. TIM Lecture Series – The Business of Cybersecurity. Technology Innovation Management Review, 4(4): 53-57. http://doi.org/10.22215/timreview/785
PDF icon Download this article (281.12 KB)
J. Harris, D. 2014. TIM Lecture Series – The Laboratory for Analytic Sciences: Developing the Art and Science of Analysis. Technology Innovation Management Review, 4(7): 52-54. http://doi.org/10.22215/timreview/813
PDF icon Download this article (342.28 KB)
Kwong, A. 2014. TIM Lecture Series – Web Infections and Protections: Theory and Practice. Technology Innovation Management Review, 4(3): 35-. http://doi.org/10.22215/timreview/774
PDF icon Download this article (240.66 KB)
2013
Dupont, B. 2013. Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
PDF icon Download this article (406.22 KB)
Bailetti, T., Craigen, D., Hudson, D., Levesque, R., McKeen, S., & Walsh, D. ’A. 2013. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
PDF icon Download this article (874.36 KB)
McPhee, C., & Bailetti, T. 2013. Editorial: Cybersecurity (August 2013). Technology Innovation Management Review, 3(8): 3-4. http://doi.org/10.22215/timreview/710
PDF icon Download this article (340.04 KB)
McPhee, C., & Bailetti, T. 2013. Editorial: Cybersecurity (July 2013). Technology Innovation Management Review, 3(7): 3-5. http://doi.org/10.22215/timreview/699
PDF icon Download this article (212.7 KB)
Ritchot, B. 2013. An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
PDF icon Download this article (659.03 KB)
Low, A., & Muegge, S. 2013. Keystone Business Models for Network Security Processors. Technology Innovation Management Review, 3(7): 25-33. http://doi.org/10.22215/timreview/703
PDF icon Download this article (620.12 KB)
Craigen, D., Vandeth, D., & Walsh, D. ’A. 2013. Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
PDF icon Download this article (400.83 KB)
Archer, D. W., & Wick, A. 2013. Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
PDF icon Download this article (362.23 KB)
O’Neill, P. 2013. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
PDF icon Download this article (697.06 KB)
Koussa, S. 2013. Q&A. Should Startups Care about Application Security?. Technology Innovation Management Review, 3(7): 50-52. http://doi.org/10.22215/timreview/706
PDF icon Download this article (247.41 KB)
Goyette, R., Robichaud, Y., & Marinier, F. 2013. A Research Agenda for Security Engineering. Technology Innovation Management Review, 3(8): 41-50. http://doi.org/10.22215/timreview/715
PDF icon Download this article (781.18 KB)
Emami-Taba, M., Amoui, M., & Tahvildari, L. 2013. On the Road to Holistic Decision Making in Adaptive Security. Technology Innovation Management Review, 3(8): 59-64. http://doi.org/10.22215/timreview/717
PDF icon Download this article (676.46 KB)
Craigen, D., Walsh, D. ’A., & Whyte, D. 2013. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
PDF icon Download this article (385.67 KB)
Fan, X., & Gong, G. 2013. Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management Review, 3(7): 42-49. http://doi.org/10.22215/timreview/702
PDF icon Download this article (506.02 KB)
Card, P. 2013. TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
PDF icon Download this article (238.31 KB)
Breadbasket