@article {862, title = {Botnet Takedown Initiatives: A Taxonomy and Performance Model}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {01/2015}, pages = {15-20}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Botnets have become one of the fastest-growing threats to the computer systems, assets, data, and capabilities relied upon by individuals and organizations worldwide. Botnet takedown initiatives are complex and as varied as the botnets themselves. However, there is no comprehensive database of botnet takedowns available to researchers and practitioners, nor is there a theoretical model to help predict the success or failure of future takedown initiatives. This article reports on the author{\textquoteright}s ongoing research that is contributing to both of these challenges and introduces a set of hypotheses relating to the performance of botnet takedown initiatives. In addition to researchers, the article will be of particular interest to personnel in technical, legal, and management functions of organizations interested in improving the quality of their communications and accelerating decision making for the purpose of launching and operating botnet takedown initiatives. It will also be of interest to entrepreneurs who wish to launch and grow cybersecurity ventures that provide solutions to botnet and malware threats.}, keywords = {botnet takedowns, cyber-attacks, dismantle cybercriminal networks, disrupt online networks}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/862}, url = {http://timreview.ca/article/862}, author = {Reza Shirazi} } @article {884, title = {Editorial: Cyber-Resilience in Supply Chains (April 2015)}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {04/2015}, pages = {3-5}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {cyber-attacks, cyber-resilience, cyber-risk, cybersecurity, resilience, supply chains}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/884}, url = {http://timreview.ca/article/884}, author = {Chris McPhee and Omera Khan} } @article {860, title = {Editorial: Cybersecurity (January 2015)}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {01/2015}, pages = {3-4}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {automotive manufacturing, botnet takedowns, botnets, commercialization, critical infrastructure, cyber-attacks, cybersecurity, employee training, gamification, Internet, outsourcing, quantum key distribution}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/860}, url = {http://timreview.ca/article/860}, author = {Chris McPhee and Tony Bailetti} } @article {865, title = {Q\&A. Should the Internet Be Considered Critical Infrastructure?}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {01/2015}, pages = {37-40}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {communication networks, critical infrastructure, cyber-attacks, cybersecurity, information technology, Internet, vulnerabilities}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/865}, url = {http://timreview.ca/article/865}, author = {Walter Miron} } @article {881, title = {TIM Lecture Series {\textendash} The Expanding Cybersecurity Threat}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {03/2015}, pages = {56-48}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {antivirus, cyber-attacks, cyber-espionage, cyber-threats, cybersecurity, data breaches, malware, private-public partnerships, ransomware, scareware, social engineering, Symantec}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/881}, url = {http://timreview.ca/article/881}, author = {Cheri F. McGuire} } @article {898, title = {TIM Lecture Series {\textendash} The Internet of Everything: Fridgebots, Smart Sneakers, and Connected Cars}, journal = {Technology Innovation Management Review}, volume = {5}, year = {2015}, month = {05/2015}, pages = {47-49}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {Consumer Internet of Things, cyber-attacks, cybersecurity, hackers, Industrial Internet, Internet of Everything, Internet of Things, IOT}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/898}, url = {http://timreview.ca/article/898}, author = {Jeff Greene} } @article {843, title = {Editorial: Cybersecurity (November 2014)}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {11/2014}, pages = {3-4}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {crimeware, cyber-attacks, cybersecurity, globalization, malware, safety, science of cybersecurity, scientific contributions, startups}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/843}, url = {http://timreview.ca/article/843}, author = {Chris McPhee and Tony Bailetti} }