Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects. Technology Innovation Management Review, 5(6): 26-34. http://doi.org/10.22215/timreview/904
2015. ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
Resolving Legitimacy Deficits in Technology Startups through Professional Services Practices. Technology Innovation Management Review, 4(6): 22-27. http://doi.org/10.22215/timreview/801
2014. ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)