Export 72 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is cybersecurity  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
McPhee, C., & Khan, O. 2015. Editorial: Cyber-Resilience in Supply Chains (April 2015). Technology Innovation Management Review, 5(4): 3-5. http://doi.org/10.22215/timreview/884
PDF icon Download this article (219.96 KB)
McPhee, C., & Craigen, D. 2016. Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962
PDF icon Editorial_TIMReview_February2016.pdf (202.08 KB)
McPhee, C. 2016. Editorial: Managing Innovation (April 2016). Technology Innovation Management Review, 6(4): 3-4. http://doi.org/10.22215/timreview/976
PDF icon Download this article (190.7 KB)
McPhee, C., & Bailetti, T. 2015. Editorial: Cybersecurity (January 2015). Technology Innovation Management Review, 5(1): 3-4. http://doi.org/10.22215/timreview/860
PDF icon Download this article (199.33 KB)
McPhee, C. 2015. Editorial: Insights (May 2015). Technology Innovation Management Review, 5(5): 3-4. http://doi.org/10.22215/timreview/893
PDF icon Download this article (255.36 KB)
Miron, W. 2015. Q&A. Should the Internet Be Considered Critical Infrastructure?. Technology Innovation Management Review, 5(1): 37-40. http://doi.org/10.22215/timreview/865
PDF icon Download this article (301.82 KB)
Muegge, S., & Craigen, D. 2015. A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks. Technology Innovation Management Review, 5(6): 6-16. http://doi.org/10.22215/timreview/902
PDF icon Download this article (539.85 KB)
O
O’Neill, P. 2013. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
PDF icon Download this article (697.06 KB)
R
Ritchot, B. 2013. An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
PDF icon Download this article (659.03 KB)
S
Shah, A., Selman, S., & Abualhaol, I. 2016. License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966
PDF icon Shah_et_al_TIMReview_February2016.pdf (498.76 KB)
Shah, A., Abualhaol, I., Gad, M., & Weiss, M. 2017. Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
PDF icon Download this article as a PDF (621.85 KB)
Swan, M. 2017. Anticipating the Economic Benefits of Blockchain. Technology Innovation Management Review, 7(10): 6-13. http://doi.org/10.22215/timreview/1109
PDF icon Download this article as a PDF (446.39 KB)
T
Tanev, G., Tzolov, P., & Apiafi, R. 2015. A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technology Innovation Management Review, 5(6): 17-25. http://doi.org/10.22215/timreview/903
PDF icon Download this article (574.88 KB)
Tanev, S., & Sandstrom, G. 2019. Editorial: Insights (November 2019). Technology Innovation Management Review, 9(11): 3-4. http://doi.org/10.22215/timreview/1278
PDF icon Download the Editorial as PDF (315.44 KB)
W
Watson, J., Marshall, J., Young, M., Smetny, P., & Mann, D. 2017. TIM Lecture Series – Building Trust in an IoT-Enabled World. Technology Innovation Management Review, 7(6): 50-54. http://doi.org/10.22215/timreview/1084
PDF icon Download this article as a PDF (290.64 KB)
Weiss, M. 2016. Crowdsourcing Literature Reviews in New Domains. Technology Innovation Management Review, 6(2): 5-14. http://doi.org/10.22215/timreview/963
PDF icon Weiss_TIMReview_February2016.pdf (935.17 KB)
Westerlund, M., & Rajala, R. 2014. Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
PDF icon Download this article (855.18 KB)
Westerlund, M. 2019. The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11): 40-53. http://doi.org/10.22215/timreview/1282
PDF icon Download this article as PDF (1.37 MB)
Wilding, R., & Wheatley, M. 2015. Q&A. How Can I Secure My Digital Supply Chain?. Technology Innovation Management Review, 5(4): 40-43. http://doi.org/10.22215/timreview/890
PDF icon Download this article (294.17 KB)
Wolfond, G. 2017. A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors. Technology Innovation Management Review, 7(10): 35-40. http://doi.org/10.22215/timreview/1112
PDF icon Download this article as a PDF (354.9 KB)
Z
Zehavi, R. 2016. TIM Seminar – Transforming a Desert City into an International Cybersecurity Hub and Ecosystem. Technology Innovation Management Review, 6(4): 43-45. http://doi.org/10.22215/timreview/982
PDF icon Download this article (362.3 KB)
Breadbasket