January 2015 Download this article as a PDF

From the Editor-in-Chief

Welcome to the January 2015 issue of the Technology Innovation Management Review. The editorial theme of this issue is Cybersecurity, and I am pleased to welcome back our guest editor, Tony Bailetti, Director of Carleton University's Technology Innovation Management program (TIM) and Executive Director (Acting) of the VENUS Cybersecurity Corporation.

In addition to reading the current issue, we encourage you to revisit our previous four issues on the theme of Cybersecurity:

In February, our guest editors will be Stephen L. Vargo, Marja Toivonen, and Risto Rajala for a special issue arising from the 2014 Annual Conference of the European Association for Research on Services (RESER), which was held last September in Helsinki, Finland.

Please note that 2015 RESER conference will be held in Copenhagen, Denmark, from September 10–12. The conference theme will be "Innovative Services in the 21st Century", and it will be preceded by a doctoral colloquium from September 8–9, 2015.

We hope you enjoy this issue of the TIM Review and will share your comments online. Please contact us with article topics and submissions, suggestions for future themes, and any other feedback.

Chris McPhee
Editor-in-Chief


From the Guest Editor

It has been my pleasure to be the guest editor for five issues of the TIM Review that have examined the theme of Cybersecurity: July and August 2013; October and November 2014; and January 2015. These five issues are the outcomes of a capacity-building initiative led by the VENUS Cybersecurity Corporation and Carleton University in Ottawa, Canada. This initiative offers many opportunities for scholarly inquiry and innovative industrial initiatives.

A total of 57 authors contributed 28 articles, 3 Q&As, and 2 summaries of lectures to these five issues. Of these 57 authors, 19 (33%) were from industry, 25 (44%) were from academia, 12 (21%) were from government, and 1 (2%) was from a not-for-profit organization. Fifteen of the 57 authors (26%) were faculty, students, or alumni of Carleton University's Technology Innovation Management (TIM) program. 

The January 2015 issue of the TIM Review includes four articles and one Q&A. They contribute insights, a method, a model, a case study, and an answer to a question.   

Mackenzie Adams is Vice President and Creative Director at SOMANDA, a consulting company. She and Maged Makramella are graduate students in the Technology Innovation Management program at Carleton University. In their article, they discuss the use of gamification methods that enable all employees and organizational leaders to play the roles of various types of attackers in an effort to reduce the number of successful attacks due to human vulnerability exploits.

Reza Shirazi is an Analyst Programmer at the Canada Revenue Agency, Information Technology Branch. His article contributes a model to predict the performance of botnet takedown initiatives and a set of hypotheses anchored around the model.

Mohamed Amin is a Solution Architect for Alcatel-Lucent Canada and Zaid Tariq is a Senior Network Engineer for Cisco Systems. In their article, they argue that high intrusiveness by car manufacturers in defining module interfaces and subcomponents for suppliers would lead to more secure cars.

Anas Al Natsheh is at the Centre for Measurement and Information Systems (CEMIS-Oulu) in Oulu, Finland, and at Kajaani University of Applied Sciences, also in Finland. Saheed Adebayo Gbadegeshin, Antti Rimpiläinen, Irna Imamovic-Tokalic and Andrea Zambrano are Project Researchers at the Kajaani University of Applied Sciences in Finland. Their article examines the challenges in commercializing high technologies successfully and sustainably using quantum key distribution (QKD) technology as a case study.

Walter Miron is a Director of Technology Strategy at TELUS Communications. His Q&A answers the question: Should the Internet be considered critical infrastructure?

We encourage the readers of the TIM Review, their colleagues, and their organizations to act decisively to improve the security of cyberspace.

We thank you for reading the journal.

Tony Bailetti
Guest Editor

Share this article:

Cite this article:

Rate This Content: 
1 votes have been cast, with an average score of 5 stars

Keywords: automotive manufacturing, botnet takedowns, botnets, commercialization, critical infrastructure, cyber-attacks, cybersecurity, employee training, gamification, Internet, outsourcing, quantum key distribution

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Badbot Fields
If you see these fields, something is wrong.
If you see this field, something is wrong.
If you see this field, something is wrong.
If you see this field, something is wrong.