@article {943, title = {Securing Cyberspace: Towards an Agenda for Research and Practice}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {11/2015}, pages = {26-34}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i) research is conducted, ii) cybersecurity researchers are educated, iii) new defendable systems are developed, and iv) effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.}, keywords = {Canada, challenges, countermeasures, cyber security, cybersafety, cybersecurity, cyberspace, detection, Internet of Things, leadership, mitigation, research, security}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/943}, url = {http://timreview.ca/article/943}, author = {Renaud Levesque and D{\textquoteright}Arcy Walsh and David Whyte} } @article {834, title = {The Online World of the Future: Safe, Productive, and Creative}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {10/2014}, pages = {5-12}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {A safer online world is required to attain higher levels of productivity and creativity. We offer a view of a future state of the online world that places safety, productivity, and creativity above all else. The online world envisaged for 2030 is safe (i.e., users communicate with accuracy and enduring confidence), productive (i.e., users make timely decisions that have an ongoing global effect), and creative (i.e., users can connect seemingly unrelated information online). The proposed view differs from other views of the future online world that are anchored around technology solutions, confrontation, deception, and personal or commercial gain. The following seven conditions characterize the proposed view of the online world: i) global-scale autonomous learning systems; ii) humans co-working with machines; iii) human factors that are authentic and transferrable; iv) global scale whole-brain communities; v) foundational knowledge that is authentic and transferrable; vi) timely productive communication; and vii) continuous technological adaptation. These conditions are expected to enable new social-behavioural, socio-technical, and organizational interaction models. }, keywords = {bisociation, cybersecurity, excludability, future vision, Industrial Internet, Internet, Internet of Everything, Internet of Things, online, productivity, rivalry, safety, security}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/834}, url = {http://timreview.ca/article/834}, author = {Tony Bailetti and Renaud Levesque and D{\textquoteright}Arcy Walsh} } @article {849, title = {Safety in the Online World of the Future}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {11/2014}, pages = {41-48}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {In this article, we address what it means to be safe in the online world of the future by advocating the perspective whereby improving safety will improve resilience in cyberspace. We adopt a specific approach towards transdisciplinarity; present a weakly transdisciplinary model of the safety context and an initial position about what existing disciplines are most relevant; and link prospect theory to risk-based decision making as one example that could lead to a new paradigm for safety. By treating safety as a transdisciplinary challenge, there is an opportunity to enable the participants of the online world to become more productive and creative than ever before. The beneficiary of this increased productivity and creativity will ultimately be the public. The perspective of this article is of interest to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.}, keywords = {cybersecurity, prospect theory, risk-based decision making, safety, security, weak transdisciplinary}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/849}, url = {http://timreview.ca/article/849}, author = {Nadeem Douba and Bj{\"o}rn R{\"u}tten and David Scheidl and Paul Soble and D{\textquoteright}Arcy Walsh} } @article {711, title = {Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {08/2013}, pages = {5-14}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {An engine designed to convert innovation into a country{\textquoteright}s global leadership position in a specific product market is examined in this article, using Canada and cybersecurity as an example. Five entities are core to the innovation engine: an ecosystem, a project community, an external community, a platform, and a corporation. The ecosystem is the focus of innovation in firm-specific factors that determine outcomes in global competition; the project community is the focus of innovation in research and development; and the external community is the focus of innovation in resources produced and used by economic actors that operate outside of the focal product market. Strategic intent, governance, resource flows, and organizational agreements bind the five entities together. Operating the innovation engine in Canada is expected to improve the level and quality of prosperity, security, and capacity of Canadians, increase the number of Canadian-based companies that successfully compete globally in cybersecurity product markets, and better protect Canada{\textquoteright}s critical infrastructure. Researchers interested in learning how to create, implement, improve, and grow innovation engines will find this article interesting. The article will also be of interest to senior management teams in industry and government, chief information and technology officers, social and policy analysts, academics, and individual citizens who wish to learn how to secure cyberspace. }, keywords = {business ecosystem, cybersecurity, innovation engine, innovation in commercialization, innovation in research and development}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/711}, url = {http://timreview.ca/article/711}, author = {Tony Bailetti and Dan Craigen and David Hudson and Renaud Levesque and Stuart McKeen and D{\textquoteright}Arcy Walsh} } @article {705, title = {Managing Cybersecurity Research and Experimental Development: The REVO Approach}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {07/2013}, pages = {34-41}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-program managers, academe, corporate leads, government leads, chief information officers, chief technology officers, and social and technology policy analysts. The approach is compatible with international standards and procedures published by the Organisation for Economic Co-operation and Development (OECD) and the Treasury Board of Canada Secretariat (TBS). The key benefits of the approach are the following: i) the breadth of the overall (cybersecurity) space is described; ii) depth statements about specific (cybersecurity) challenges are articulated and mapped to the breadth of the problem; iii) specific (cybersecurity) initiatives that have been resourced through funding or personnel are tracked and linked to specific challenges; and iv) progress is assessed through key performance indicators. Although we present examples from cybersecurity, the method may be transferred to other domains. We have found the approach to be rigorous yet adaptive to change; it challenges an organization to be explicit about the nature of its research and experimental development in a manner that fosters alignment with evolving business priorities, knowledge transfer, and partner engagement. }, keywords = {cybersecurity, experimental development, performance indicators, research, research program lifecycle, research-activity descriptions, research-requirement statements, strategic research contexts}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/705}, url = {http://timreview.ca/article/705}, author = {Dan Craigen and Drew Vandeth and D{\textquoteright}Arcy Walsh} } @article {704, title = {Securing Canada{\textquoteright}s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {07/2013}, pages = {12-18}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..}, keywords = {Canada, cyberdefence, cyberinfrastructure, cybersecurity, entrepreneurship, experimental development program, information-technology infrastructure, management, research}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/704}, url = {http://timreview.ca/article/704}, author = {Dan Craigen and D{\textquoteright}Arcy Walsh and David Whyte} }