TY - JOUR T1 - Conceptualizing a New Domain Using Topic Modeling and Concept Mapping: A Case Study of Managed Security Services for Small Businesses JF - Technology Innovation Management Review Y1 - 2019 A1 - Michael Weiss A1 - Steven Muegge AB - The objective of this paper is to show how topic modeling and concept mapping can be used to conduct a literature review in a new domain. The paper makes two contributions. First, it uses topic modeling to map out the literature in the new domain. Topic modeling provides an alternative to manual clustering of articles and allows the identification of non-obvious connections between ideas expressed in a collection of articles. Second, it identifies the underlying concepts in the new domain and their relationships by creating a concept map from the extracted topics . As a case study, the paper reviews the recent literature in the intersection of managed security services and small businesses. In particular, it identifies elements of the managed security services concept as it applies to small businesses. The audience of the paper includes anyone who is exploring a new domain by reviewing the literature, and in particular, students, researchers, and members of industrial R&D projects. PB - Talent First Network CY - Ottawa VL - 9 UR - https://timreview.ca/article/1261 IS - 8 U1 -

Carleton University

Michael Weiss holds a faculty appointment in the Department of Systems and Computer Engineering at Carleton University, and is a member of the Technology Innovation Management program. His research interests include open source ecosystems, mashups/Web 2.0, business process modeling, social network analysis, and product architecture and design. Michael has published on the evolution of open source communities, licensing of open services, and innovation in the mashup ecosystem.

U2 -

Carleton University

Steven Muegge is an Associate Professor of Entrepreneurship at Carleton University in Ottawa, Canada. Dr. Muegge leads an active research program in technology entrepreneurship within the Technology Innovation Management (TIM) program. His research, teaching, and community service interests include platforms, communities, and business ecosystems, and the business models of technology entrepreneurs, especially in early-stage product-market spaces. Dr. Muegge holds a Bachelor of Engineering degree in Engineering Physics from McMaster University, a Master of Engineering degree in Telecommunications Technology Management from Carleton University, and a Ph.D. in Management from Carleton University.

ER - TY - JOUR T1 - Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams JF - Technology Innovation Management Review Y1 - 2017 A1 - Ahmed Shah A1 - Ibrahim Abualhaol A1 - Mahmoud Gad A1 - Michael Weiss KW - anomaly detection KW - cybersecurity KW - exploratory analysis KW - real-time data streams KW - visualization AB - Security analysts can become overwhelmed with monitoring real-time security information that is important to help them defend their network. They also tend to focus on a limited portion of the alerts, and therefore risk missing important events and links between them. At the heart of the problem is the system that analysts use to detect, explore, and respond to cyber-attacks. Developers of security analysis systems face the challenge of developing a system that can present different sources of information at multiple levels of abstraction, while also creating a system that is intuitive to use. In this article, we examine the complementary nature of exploratory analysis and automated analysis by testing the development of a system that monitors real-time Border Gateway Protocol (BGP) traffic for anomalies that might indicate security threats. BGP is an essential component for supporting the infrastructure of the Internet; however, it is also highly vulnerable and can be hijacked by attackers to propagate spam or launch denial-of-service attacks. Some of the attack scenarios on the BGP infrastructure can be quite elaborate, and it is difficult, if not impossible, to fully automate the detection of such attacks. This article makes two contributions: i) it describes a prototype platform for computing indicators and threat alerts in real time and for visualizing the context of an alert, and ii) it discusses the interaction of exploratory analysis (visualization) and automated analysis. This article is relevant to students, security researchers, and developers who are interested in the development or use of real-time security monitoring systems. They will gain insights into the complementary aspects of automated analysis and exploratory analysis through the development of a real-time streaming system. PB - Talent First Network CY - Ottawa VL - 7 UR - http://timreview.ca/article/1068 IS - 4 U1 - VENUS Cybersecurity Corporation Ahmed Shah holds a BEng in Software Engineering from Lakehead University in Thunder Bay, Canada, and a MEng in Technology Innovation Management from Carleton University in Ottawa, Canada. Ahmed has experience working in a wide variety of research roles at the VENUS Cybersecurity Corporation, the Global Cybersecurity Resource, and Carleton University. U2 - Carleton University Ibrahim Abualhaol is a Research Scientist at Larus Technologies and an Adjunct Professor at Carleton University in Ottawa, Canada. He holds a BSc, an MSc, and a PhD in Electrical and Computer Engineering. He is a senior member of IEEE and a Professional Engineer (P.Eng) in Ontario, Canada. His research interests include real-time big-data analytics and its application in cybersecurity and wireless communication systems. U3 - VENUS Cybersecurity Corporation Mahmoud M. Gad is a Research Scientist at the VENUS Cybersecurity Corporation. He holds a PhD in Electrical and Computer Engineering from the University of Ottawa in Canada. Additionally, he holds an MSc in ECE from the University of Maryland in College Park, United States. His research interests include big-data analytics for cybersecurity, cyber-physical system risk assessment, cybercrime markets, and analysis of large-scale networks. U4 - Carleton University Michael Weiss holds a faculty appointment in the Department of Systems and Computer Engineering at Carleton University in Ottawa, Canada, and he is a member of the Technology Innovation Management program. His research interests include open source, ecosystems, mashups, patterns, and social network analysis. Michael has published on the evolution of open source business, mashups, platforms, and technology entrepreneurship. ER - TY - JOUR T1 - Crowdsourcing Literature Reviews in New Domains JF - Technology Innovation Management Review Y1 - 2016 A1 - Michael Weiss KW - co-creation KW - crowdsourcing KW - crowdsourcing platform KW - cybersecurity KW - literature review KW - narrative KW - new domains KW - systematic AB - Conducting a literature review in new domains presents unique challenges. The literature in a new domain is typically broad, fragmented, and growing quickly. Because little is known about the new domain, the literature review cannot be guided by established classifications of knowledge, unlike in an existing domain. Rather, it will be driven by evidence that challenges and extends existing knowledge. In a way, exploring a new domain means looking for anomalies in the evidence that cannot be explained by what is already known. This article summarizes lessons from conducting two literature reviews in new domains in the area of cybersecurity. It then presents a design for using leader-driven crowdsourcing to collect evidence and synthesize it into insights in a new domain. The article will be relevant to those who are exploring a new domain, in particular students, researchers, and members of R&D projects in industry. PB - Talent First Network CY - Ottawa VL - 6 UR - http://timreview.ca/article/963 IS - 2 U1 - Carleton University Michael Weiss holds a faculty appointment in the Department of Systems and Computer Engineering at Carleton University in Ottawa, Canada, and is a member of the Technology Innovation Management program. His research interests include open source, ecosystems, mashups, patterns, and social network analysis. Michael has published on the evolution of open source business, mashups, platforms, and technology entrepreneurship. ER - TY - JOUR T1 - Control and Diversity in Company-led Open Source Projects JF - Open Source Business Resource Y1 - 2011 A1 - Michael Weiss AB - A majority of open source development today is carried out by companies. Building on open source allows companies to focus their development effort on the points of difference over their competitors. This article discusses the recent trend towards collectives of companies that develop shared assets in the form of open source projects, and creates a model for company-led open source projects around two dimensions: the level of control over the project and the diversity of applications derived from the project. The article then explores how the model can be interpreted from a product line engineering perspective. PB - Talent First Network CY - Ottawa UR - http://timreview.ca/article/436 IS - April 2011 U1 - Carleton University Michael Weiss holds a faculty appointment in the Department of Systems and Computer Engineering at Carleton University, and is a member of the Technology Innovation Management program. His research interests include open source ecosystems, mashups/Web 2.0, business process modeling, social network analysis, and product architecture and design. Michael has published on the evolution of open source communities, licensing of open services, and the innovation in the mashup ecosystem. ER -