TY - JOUR T1 - Reflecting on 10 Years of the TIM Review JF - Technology Innovation Management Review Y1 - 2017 A1 - Chris McPhee A1 - Teemu Santonen A1 - Ahmed Shah A1 - Ali Nazari KW - business KW - entrepreneurship KW - innovation KW - journal KW - management KW - open source KW - OSBR KW - research KW - scientometric analyses KW - technology KW - TIM Review KW - topic KW - topic modelling AB - In July 2007, the first issue of this journal was published under the banner of the Open Source Business Resource. Re-launched with a broader scope in 2011 as the Technology Innovation Management Review, the journal now celebrates its 10th anniversary. In this article, we review the 10-year history of the journal to examine what themes have been covered, who has contributed, and how much the articles have been read and cited. During those 10 years, the journal has published 120 monthly issues, including more than 800 publications by more than 800 international authors from industry, academia, the public sector, and beyond. As discovered with topic modelling, the journal has covered seven themes: open source business, technology entrepreneurship, growing a business, research approaches, social innovation, living labs, and cybersecurity. Overall, the website has attracted over 1 million readers from around the world – 31% from Asia, 30% from the Americas, 26% from Europe, 8% from Africa, and 5% from Oceania – with over 25,000 readers now accessing the site each month. PB - Talent First Network CY - Ottawa VL - 7 UR - http://timreview.ca/article/1087 IS - 7 U1 - Technology Innovation Management Review Chris McPhee is Editor-in-Chief of the Technology Innovation Management Review. Chris holds an MASc degree in Technology Innovation Management from Carleton University in Ottawa, Canada, and BScH and MSc degrees in Biology from Queen’s University in Kingston, Canada. He has nearly 20 years of management, design, and content-development experience in Canada and Scotland, primarily in the science, health, and education sectors. As an advisor and editor, he helps entrepreneurs, executives, and researchers develop and express their ideas. U2 - Laurea University of Applied Sciences Teemu Santonen is a Principal Lecturer at the Laurea University of Applied Sciences in Finland and is leading Laurea’s Centre for Applied Research and Development (CARD) in the area of Service Design and Open Innovation. At Laurea, he has personally initiated and managed various research projects achieving 2.5 M EUR in cumulative funding. He received his PhD (Econ.) degree in Information Systems Science from Aalto University in Finland in 2005 and has published or presented over 50 papers in international peer-refereed journals and at conferences. Currently, his research interests focus on social network analysis (SNA), Scientometrics”, and innovation management. At Laurea, Santonen has also filed several invention disclosures that have resulted in a startup company and one patent. The Finnish Inventor Support Association has honoured Santonen’s novel crowdsourcing project as the best school-related innovation in Finland. He is also a scientific panel member of ISPIM (The International Society for Professional Innovation Management) and is a former board member of Finnish Strategic Management Society. Prior to his academic career, Santonen worked for over a decade as a consultant and development manager in leading Finnish financial, media, and ICT sector organizations. U3 - Global Cybersecurity Resource, Carleton University Ahmed Shah holds a BEng in Software Engineering from Lakehead University in Thunder Bay, Canada, and an MEng in Technology Innovation Management from Carleton University in Ottawa, Canada. Ahmed has experience working in a wide variety of research roles at the VENUS Cybersecurity Corporation, the Global Cybersecurity Resource, and Carleton University. U4 - Global Cybersecurity Resource, Carleton University Ali Nazari is a consultant in the field of information technology and software applications. Ali holds a BSc degree in Computer Science from Shahid Beheshti University in Tehran, Iran, and an MSc degree in Technology Information Management from Payam Noor University, also in Tehran. Currently, he is a graduate student in the Technology Innovation Management Program at Carleton University in Ottawa, Canada. He has 7 years of experience in data analysis, design, and development of IT/software applications and 10 years of experience with planning, consulting, and managing IT/software issues. ER - TY - JOUR T1 - License Compliance in Open Source Cybersecurity Projects JF - Technology Innovation Management Review Y1 - 2016 A1 - Ahmed Shah A1 - Selman Selman A1 - Ibrahim Abualhaol KW - contamination KW - copyright KW - cybersecurity KW - GPL KW - license KW - open source KW - third-party code AB - Developers of cybersecurity software often include and rely upon open source software packages in their commercial software products. Before open source code is absorbed into a proprietary product, developers must check the package license to see if the project is permissively licensed, thereby allowing for commercial-friendly inheritance and redistribution. However, there is a risk that the open source package license could be inaccurate due to being silently contaminated with restrictively licensed open source code that may prohibit the sale or confidentiality of commercial derivative work. Contamination of commercial products could lead to expensive remediation costs, damage to the company's reputation, and costly legal fees. In this article, we report on our preliminary analysis of more than 200 open source cybersecurity projects to identify the most frequently used license types and languages and to look for evidence of permissively licensed open source projects that are likely contaminated by restrictive licensed material (i.e., containing commercial-unfriendly code). Our analysis identified restrictive license contamination cases occurring in permissively licensed open source projects. Furthermore, we found a high proportion of code that lacked copyright attribution. We expect that the results of this study will: i) provide managers and developers with an understanding of how contamination can occur, ii) provide open source communities with an understanding on how they can better protect their intellectual property by including licenses and copyright information in their code, and ii) provide entrepreneurs with an understanding of the open source cybersecurity domain in terms of licensing and contamination and how they affect decisions about cybersecurity software architectures. PB - Talent First Network CY - Ottawa VL - 6 UR - http://timreview.ca/article/966 IS - 2 U1 - Carleton University Ahmed Shah holds a BEng in Software Engineering and is pursuing an MASc degree in Technology Innovation Management at Carleton University in Ottawa, Canada. Ahmed has experience working in cybersecurity research with the VENUS Cybersecurity Corporation and has experience managing legal deliverables at IBM. U2 - Carleton University Selman Selman is a Software Engineer at Synopsys under the Software Integrity Group. He is also carrying out graduate studies in Technology Innovation Management at Carleton University in Ottawa, Canada. U3 - Carleton University Ibrahim Abualhaol holds BSc and MSc degrees in Electrical Engineering from Jordan University of Science and Technology, an MEng in Technology Innovation Management from Carleton University in Ottawa, Canada, and a PhD in Electrical Engineering from the University of Mississippi in Oxford, United States. He worked for two years as a Wireless Engineer at Broadcom Corporation and as a System Engineer Intern at Qualcomm Incorporation in the United States. He then worked as an Assistant Professor of Wireless Communications at Khalifa University, United Arab Emirates for four years. Currently, he is a Cybersecurity R & D Engineer working on operationalizing collective intelligence with artificial intelligence to improve cybersecurity. He is senior member of IEEE, a member of Phi Kappa Phi, and a member of Sigma Xi. ER -