Editorial: Cyber-Resilience in Supply Chains (April 2015). Technology Innovation Management Review, 5(4): 3-5. http://doi.org/10.22215/timreview/884
2015. Download this article (219.96 KB)Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962
2016. Editorial_TIMReview_February2016.pdf (202.08 KB)Editorial: Managing Innovation (April 2016). Technology Innovation Management Review, 6(4): 3-4. http://doi.org/10.22215/timreview/976
2016. Download this article (190.7 KB)Editorial: Cybersecurity (January 2015). Technology Innovation Management Review, 5(1): 3-4. http://doi.org/10.22215/timreview/860
2015. Download this article (199.33 KB)Editorial: Insights (May 2015). Technology Innovation Management Review, 5(5): 3-4. http://doi.org/10.22215/timreview/893
2015. Download this article (255.36 KB)Q&A. Should the Internet Be Considered Critical Infrastructure?. Technology Innovation Management Review, 5(1): 37-40. http://doi.org/10.22215/timreview/865
2015. Download this article (301.82 KB)A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks. Technology Innovation Management Review, 5(6): 6-16. http://doi.org/10.22215/timreview/902
2015. Download this article (539.85 KB)Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
2013. Download this article (697.06 KB)Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects. Technology Innovation Management Review, 5(6): 26-34. http://doi.org/10.22215/timreview/904
2015. Download this article (538.96 KB)An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
2013. Download this article (659.03 KB)License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966
2016. Shah_et_al_TIMReview_February2016.pdf (498.76 KB)Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
2017. Download this article as a PDF (621.85 KB)Anticipating the Economic Benefits of Blockchain. Technology Innovation Management Review, 7(10): 6-13. http://doi.org/10.22215/timreview/1109
2017. Download this article as a PDF (446.39 KB)A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technology Innovation Management Review, 5(6): 17-25. http://doi.org/10.22215/timreview/903
2015. Download this article (574.88 KB)Editorial: Insights (November 2019). Technology Innovation Management Review, 9(11): 3-4. http://doi.org/10.22215/timreview/1278
2019. Download the Editorial as PDF (315.44 KB)TIM Lecture Series – Building Trust in an IoT-Enabled World. Technology Innovation Management Review, 7(6): 50-54. http://doi.org/10.22215/timreview/1084
2017. Download this article as a PDF (290.64 KB)Crowdsourcing Literature Reviews in New Domains. Technology Innovation Management Review, 6(2): 5-14. http://doi.org/10.22215/timreview/963
2016. Weiss_TIMReview_February2016.pdf (935.17 KB)Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
2014. Download this article (855.18 KB)The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11): 40-53. http://doi.org/10.22215/timreview/1282
2019. Download this article as PDF (1.37 MB)Q&A. How Can I Secure My Digital Supply Chain?. Technology Innovation Management Review, 5(4): 40-43. http://doi.org/10.22215/timreview/890
2015. Download this article (294.17 KB)A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors. Technology Innovation Management Review, 7(10): 35-40. http://doi.org/10.22215/timreview/1112
2017. Download this article as a PDF (354.9 KB)TIM Seminar – Transforming a Desert City into an International Cybersecurity Hub and Ecosystem. Technology Innovation Management Review, 6(4): 43-45. http://doi.org/10.22215/timreview/982
2016. Download this article (362.3 KB)