Export 72 results:
[ Author(Asc)] Title Type Year
Filters: Keyword is cybersecurity  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Dupont, B. 2013. Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
PDF icon Download this article (406.22 KB)
Douba, N., Rütten, B., Scheidl, D., Soble, P., & Walsh, D. ’A. 2014. Safety in the Online World of the Future. Technology Innovation Management Review, 4(11): 41-48. http://doi.org/10.22215/timreview/849
PDF icon Download this article (826.83 KB)
Davis, A. 2015. Building Cyber-Resilience into Supply Chains. Technology Innovation Management Review, 5(4): 19-27. http://doi.org/10.22215/timreview/887
PDF icon Download this article (735.13 KB)
C
Cybenko, G. 2014. TIM Lecture Series – Cybersecurity Metrics and Simulation. Technology Innovation Management Review, 4(10): 43-45. http://doi.org/10.22215/timreview/839
PDF icon Download this article (277.81 KB)
Craigen, D., Walsh, D. ’A., & Whyte, D. 2013. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
PDF icon Download this article (385.67 KB)
Craigen, D. 2014. Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
PDF icon Download this article (846.35 KB)
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
PDF icon Download this article (925.14 KB)
Craigen, D., Vandeth, D., & Walsh, D. ’A. 2013. Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
PDF icon Download this article (400.83 KB)
Card, P. 2013. TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
PDF icon Download this article (238.31 KB)
B
Boyes, H. 2015. Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review, 5(4): 28-34. http://doi.org/10.22215/timreview/888
PDF icon Download this article (448.34 KB)
Bailetti, T., & Gad, M. 2016. Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965
PDF icon BailettiGad_TIMReview_February2016.pdf (501.18 KB)
Bailetti, T., & Craigen, D. 2020. Examining the Relationship Between Cybersecurity and Scaling Value for New Companies. Technology Innovation Management Review, 10(2): 62-70. http://doi.org/10.22215/timreview/1329
PDF icon Download this article as PDF (976.31 KB)
Bailetti, T., & Zijdemans, E. 2014. Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
PDF icon Download this article (856.67 KB)
Bailetti, T., Gad, M., & Shah, A. 2016. Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
PDF icon Bailetti_et_al_TIMReview_February2016.pdf (316.83 KB)
Bailetti, T., Craigen, D., Hudson, D., Levesque, R., McKeen, S., & Walsh, D. ’A. 2013. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
PDF icon Download this article (874.36 KB)
Bailetti, T., Levesque, R., & Walsh, D. ’A. 2014. The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
PDF icon Download this article (775.68 KB)
A
Archer, D. W., & Wick, A. 2013. Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
PDF icon Download this article (362.23 KB)
Amin, M., & Tariq, Z. 2015. Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
PDF icon Download this article (506.06 KB)
Alvarenga, A., & Tanev, G. 2017. A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technology Innovation Management Review, 7(4): 32-43. http://doi.org/10.22215/timreview/1069
PDF icon Download this article as a PDF (729.21 KB)
Adegboyega, O. 2015. Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory. Technology Innovation Management Review, 5(6): 35-44. http://doi.org/10.22215/timreview/905
PDF icon Download this article (659.28 KB)
Adams, M., & Makramalla, M. 2015. Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
PDF icon Download this article (587.19 KB)
Adams, M. 2017. Big Data and Individual Privacy in the Age of the Internet of Things. Technology Innovation Management Review, 7(4): 12-24. http://doi.org/10.22215/timreview/1067
PDF icon Download this article as a PDF (649.28 KB)