Export 68 results:
Author Title Type [ Year
Filters: First Letter Of Last Name is A [Clear All Filters]
Developing a Social Network as a Means of Obtaining Entrepreneurial Knowledge Needed for Internationalization. Technology Innovation Management Review, 4(9): 11-18. http://doi.org/10.22215/timreview/827
2014. 
Down the Rabbit Hole: How Structural Holes in Entrepreneurs' Social Networks Impact Early Venture Growth. Technology Innovation Management Review, 4(9): 19-27. http://doi.org/10.22215/timreview/828
2014. 
The Government of India's Role in Promoting Innovation through Policy Initiatives for Entrepreneurship Development. Technology Innovation Management Review, 4(8): 11-17. http://doi.org/10.22215/timreview/818
2014. 
Integrating Design for All in Living Labs. Technology Innovation Management Review, 4(5): 50-59. http://doi.org/10.22215/timreview/793
2014. 
Overcoming Barriers to Collaboration in an Open Source Ecosystem. Technology Innovation Management Review, 4(1): 18-27. http://doi.org/10.22215/timreview/758
. 2014. 
Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
2015. 
Luxury and Creativity: Exploration, Exploitation, or Preservation?. Technology Innovation Management Review, 5(7): 41-49. http://doi.org/10.22215/timreview/913
2015. 
Personal Health Systems Technologies: Critical Issues in Service Innovation and Diffusion. Technology Innovation Management Review, 5(2): 46-57. http://doi.org/10.22215/timreview/873
2015. 
Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory. Technology Innovation Management Review, 5(6): 35-44. http://doi.org/10.22215/timreview/905
2015. 
Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects. Technology Innovation Management Review, 5(6): 26-34. http://doi.org/10.22215/timreview/904
2015. 
Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
2015. 
A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technology Innovation Management Review, 5(6): 17-25. http://doi.org/10.22215/timreview/903
2015. 
The Cuckoo’s Nest Approach for Co-Creating Business Ecosystems in Smart Cities. Technology Innovation Management Review, 6(12): 26-37. http://doi.org/10.22215/timreview/1039
2016. 
The Cuckoo’s Nest Approach for Co-Creating Business Ecosystems in Smart Cities. Technology Innovation Management Review, 6(12): 26-37. http://doi.org/10.22215/timreview/1039
2016. 
A Framework for Sustainable Circular Business Model Innovation. Technology Innovation Management Review, 6(7): 5-12. http://doi.org/10.22215/timreview/1000
2016. 
License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966
2016. 
Managing Innovation Ecosystems to Create and Capture Value in ICT Industries. Technology Innovation Management Review, 6(10): 17-24. http://doi.org/10.22215/timreview/1024
2016. 
Q&A. How Can You Teach Innovation and Entrepreneurship?. Technology Innovation Management Review, 6(10): 45-50. http://doi.org/10.22215/timreview/1027
2016. 
Rejuvenating the Cider Route in Quebec: An Action Design Research Approach to Stakeholder Collaboration and Innovation. Technology Innovation Management Review, 6(11): 6-17. http://doi.org/10.22215/timreview/1030
2016. 
Academic Publishing, Internet Technology, and Disruptive Innovation. Technology Innovation Management Review, 7(11): 47-56. http://doi.org/10.22215/timreview/1120
2017. 
Big Data and Individual Privacy in the Age of the Internet of Things. Technology Innovation Management Review, 7(4): 12-24. http://doi.org/10.22215/timreview/1067
2017. 
Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
2017. 
A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technology Innovation Management Review, 7(4): 32-43. http://doi.org/10.22215/timreview/1069
2017. 
The Fourth Industrial Revolution (Industry 4.0): A Social Innovation Perspective. Technology Innovation Management Review, 7(11): 12-20. http://doi.org/10.22215/timreview/1117
2017. 
Q&A. Is Internal Audit Ready for Blockchain?. Technology Innovation Management Review, 7(10): 41-44. http://doi.org/10.22215/timreview/1113
2017. 