%0 Journal Article %J Technology Innovation Management Review %D 2015 %T Editorial: Cybersecurity (January 2015) %A Chris McPhee %A Tony Bailetti %K automotive manufacturing %K botnet takedowns %K botnets %K commercialization %K critical infrastructure %K cyber-attacks %K cybersecurity %K employee training %K gamification %K Internet %K outsourcing %K quantum key distribution %B Technology Innovation Management Review %I Talent First Network %C Ottawa %V 5 %P 3-4 %8 01/2015 %G eng %U http://timreview.ca/article/860 %N 1 %1 Technology Innovation Management Review Chris McPhee is Editor-in-Chief of the Technology Innovation Management Review. Chris holds an MASc degree in Technology Innovation Management from Carleton University in Ottawa and BScH and MSc degrees in Biology from Queen's University in Kingston. He has over 15 years of management, design, and content-development experience in Canada and Scotland, primarily in the science, health, and education sectors. As an advisor and editor, he helps entrepreneurs, executives, and researchers develop and express their ideas. %2 Carleton University Tony Bailetti is an Associate Professor in the Sprott School of Business and the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. Professor Bailetti is the Director of Carleton University's Technology Innovation Management (TIM) program. His research, teaching, and community contributions support technology entrepreneurship, regional economic development, and international co-innovation. %R http://doi.org/10.22215/timreview/860 %0 Journal Article %J Technology Innovation Management Review %D 2015 %T Q&A. Should the Internet Be Considered Critical Infrastructure? %A Walter Miron %K communication networks %K critical infrastructure %K cyber-attacks %K cybersecurity %K information technology %K Internet %K vulnerabilities %B Technology Innovation Management Review %I Talent First Network %C Ottawa %V 5 %P 37-40 %8 01/2015 %G eng %U http://timreview.ca/article/865 %N 1 %1 TELUS Communications Walter Miron is a Director of Technology Strategy at TELUS Communications, where he is responsible for the evolution of their packet and optical networks. He has over 20 years of experience in enterprise and service provider networking conducting technology selection and service development projects. Walter is a member of the research program committee of the SAVI project, the Heavy Reading Global Ethernet Executive Council, and the ATOPs SDN/nFV Working Group. He is also the Chair of the Venus Cybersecurity Corporation and is a graduate student in the Technology Innovation Management (TIM) program at Carleton University in Ottawa, Canada. %R http://doi.org/10.22215/timreview/865 %0 Journal Article %J Technology Innovation Management Review %D 2014 %T The Online World of the Future: Safe, Productive, and Creative %A Tony Bailetti %A Renaud Levesque %A D’Arcy Walsh %K bisociation %K cybersecurity %K excludability %K future vision %K Industrial Internet %K Internet %K Internet of Everything %K Internet of Things %K online %K productivity %K rivalry %K safety %K security %X A safer online world is required to attain higher levels of productivity and creativity. We offer a view of a future state of the online world that places safety, productivity, and creativity above all else. The online world envisaged for 2030 is safe (i.e., users communicate with accuracy and enduring confidence), productive (i.e., users make timely decisions that have an ongoing global effect), and creative (i.e., users can connect seemingly unrelated information online). The proposed view differs from other views of the future online world that are anchored around technology solutions, confrontation, deception, and personal or commercial gain. The following seven conditions characterize the proposed view of the online world: i) global-scale autonomous learning systems; ii) humans co-working with machines; iii) human factors that are authentic and transferrable; iv) global scale whole-brain communities; v) foundational knowledge that is authentic and transferrable; vi) timely productive communication; and vii) continuous technological adaptation. These conditions are expected to enable new social-behavioural, socio-technical, and organizational interaction models. %B Technology Innovation Management Review %I Talent First Network %C Ottawa %V 4 %P 5-12 %8 10/2014 %G eng %U http://timreview.ca/article/834 %N 10 %1 Carleton University Tony Bailetti is an Associate Professor in the Sprott School of Business and the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. Professor Bailetti is the Director of Carleton University's Technology Innovation Management (TIM) program. His research, teaching, and community contributions support technology entrepreneurship, regional economic development, and international co-innovation. %2 Communications Security Establishment Renaud Levesque is the Director General of Core Systems at the Communications Security Establishment (CSE) in Ottawa, Canada, where he is responsible for R&D and systems development. He has significant experience in the delivery of capability and organizational change in highly technical environments. His career began at CSE in 1986 as a Systems Engineer, responsible for the development and deployment of numerous systems, including the CSE IP corporate network in 1991. In 2000 Renaud went to work in the private sector as Head of Speech Technologies at Locus Dialogue, and later at Infospace Inc., where he became Director of Speech Solutions Engineering. He rejoined CSE in 2003, where he assumed the lead role in the IT R&D section. Subsequently, as a Director General, he focused efforts towards the emergence of CSE's Joint Research Office and The Tutte Institute for Mathematics and Computing. Renaud holds a Bachelor of Engineering from l’École Polytechnique, Université de Montréal, Canada. %3 Communications Security Establishment D’Arcy Walsh is a Science Advisor at the Communications Security Establishment (CSE) in Ottawa, Canada. His research interests include software-engineering methods and techniques that support the development and deployment of dynamic systems, including dynamic languages, dynamic configuration, context-aware systems, and autonomic and autonomous systems. He received his BAH from Queen’s University in Kingston, Canada, and he received his BCS, his MCS, and his PhD in Computer Science from Carleton University in Ottawa, Canada. %R http://doi.org/10.22215/timreview/834 %0 Journal Article %J Technology Innovation Management Review %D 2014 %T TIM Lecture Series – Web Infections and Protections: Theory and Practice %A Arnold Kwong %K attack vectors %K countermeasures %K cybersecurity %K infections %K Internet %K privacy %K security %K targets %K threat vectors %K threats %B Technology Innovation Management Review %I Talent First Network %C Ottawa %V 4 %P 35- %8 03/2014 %G eng %U http://timreview.ca/article/774 %N 3 %1 Extratelligence Arnold Kwong has over thirty years experience in management, manufacturing, and technology applications. His operational expertise and cross-disciplinary outlook have been applied in planning, analysis, implementation, and problem-solving settings. A strong operational emphasis on quality and risk management comes from extensive practical work. Ongoing technical expertise, with ongoing research and application publications, focus on telecommunications, security models, mobile financial applications security, complex systems integration and deployment, software modeling of enterprises, real-time data collection, and advancements in computer science. His technical experiences include a core of multivendor complex systems analysis; data base/storage/data communications relationships; software design, development, and evaluation; and hardware/software architectural design and implementation issues. Areas of specific management expertise include complex product development and management, technological risk management, and regulatory compliance for organizations in both the public and private service and manufacturing sectors. Areas of specific technical experience include application architectures; system architectures; applications and Internet security; storage/data base administration, management, and enterprise modeling; networking and data communications; and computer science research. %R http://doi.org/10.22215/timreview/774