Export 72 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is cybersecurity  [Clear All Filters]
2020
Bailetti, T., & Craigen, D. 2020. Examining the Relationship Between Cybersecurity and Scaling Value for New Companies. Technology Innovation Management Review, 10(2): 62-70. http://doi.org/10.22215/timreview/1329
PDF icon Download this article as PDF (976.31 KB)
2019
Tanev, S., & Sandstrom, G. 2019. Editorial: Insights (November 2019). Technology Innovation Management Review, 9(11): 3-4. http://doi.org/10.22215/timreview/1278
PDF icon Download the Editorial as PDF (315.44 KB)
Westerlund, M. 2019. The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11): 40-53. http://doi.org/10.22215/timreview/1282
PDF icon Download this article as PDF (1.37 MB)
2018
McPhee, C. 2018. Editorial: Innovation Strategy and Practice (November 2018). Technology Innovation Management Review, 8(11): 3-3. http://doi.org/10.22215/timreview/1194
PDF icon Editorial_TIMReview_November2018.pdf (215.51 KB)
Kaila, U., & Nyman, L. 2018. Information Security Best Practices: First Steps for Startups and SMEs. Technology Innovation Management Review, 8(11): 32-42. http://doi.org/10.22215/timreview/1198
PDF icon KailaNyman_TIMReview_November2018.pdf (647.73 KB)
2017
Swan, M. 2017. Anticipating the Economic Benefits of Blockchain. Technology Innovation Management Review, 7(10): 6-13. http://doi.org/10.22215/timreview/1109
PDF icon Download this article as a PDF (446.39 KB)
Adams, M. 2017. Big Data and Individual Privacy in the Age of the Internet of Things. Technology Innovation Management Review, 7(4): 12-24. http://doi.org/10.22215/timreview/1067
PDF icon Download this article as a PDF (649.28 KB)
Wolfond, G. 2017. A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors. Technology Innovation Management Review, 7(10): 35-40. http://doi.org/10.22215/timreview/1112
PDF icon Download this article as a PDF (354.9 KB)
Shah, A., Abualhaol, I., Gad, M., & Weiss, M. 2017. Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
PDF icon Download this article as a PDF (621.85 KB)
Alvarenga, A., & Tanev, G. 2017. A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technology Innovation Management Review, 7(4): 32-43. http://doi.org/10.22215/timreview/1069
PDF icon Download this article as a PDF (729.21 KB)
McPhee, C., & Weiss, M. 2017. Editorial: Cybersecurity (April 2017). Technology Innovation Management Review, 7(4): 3-4. http://doi.org/10.22215/timreview/1065
PDF icon Download this article as a PDF (194.73 KB)
McPhee, C. 2017. Editorial: Insights (June 2017). Technology Innovation Management Review, 7(6): 3-4. http://doi.org/10.22215/timreview/1079
PDF icon Download this article as a PDF (194.71 KB)
Hypponen, M., & Nyman, L. 2017. The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation. Technology Innovation Management Review, 7(4): 5-11. http://doi.org/10.22215/timreview/1066
PDF icon Download this article as a PDF (412.22 KB)
Watson, J., Marshall, J., Young, M., Smetny, P., & Mann, D. 2017. TIM Lecture Series – Building Trust in an IoT-Enabled World. Technology Innovation Management Review, 7(6): 50-54. http://doi.org/10.22215/timreview/1084
PDF icon Download this article as a PDF (290.64 KB)
2016
Weiss, M. 2016. Crowdsourcing Literature Reviews in New Domains. Technology Innovation Management Review, 6(2): 5-14. http://doi.org/10.22215/timreview/963
PDF icon Weiss_TIMReview_February2016.pdf (935.17 KB)
McPhee, C., & Craigen, D. 2016. Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962
PDF icon Editorial_TIMReview_February2016.pdf (202.08 KB)
McPhee, C. 2016. Editorial: Managing Innovation (April 2016). Technology Innovation Management Review, 6(4): 3-4. http://doi.org/10.22215/timreview/976
PDF icon Download this article (190.7 KB)
Bailetti, T., & Gad, M. 2016. Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965
PDF icon BailettiGad_TIMReview_February2016.pdf (501.18 KB)
Bailetti, T., Gad, M., & Shah, A. 2016. Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
PDF icon Bailetti_et_al_TIMReview_February2016.pdf (316.83 KB)
Shah, A., Selman, S., & Abualhaol, I. 2016. License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966
PDF icon Shah_et_al_TIMReview_February2016.pdf (498.76 KB)
Zehavi, R. 2016. TIM Seminar – Transforming a Desert City into an International Cybersecurity Hub and Ecosystem. Technology Innovation Management Review, 6(4): 43-45. http://doi.org/10.22215/timreview/982
PDF icon Download this article (362.3 KB)
2015
Davis, A. 2015. Building Cyber-Resilience into Supply Chains. Technology Innovation Management Review, 5(4): 19-27. http://doi.org/10.22215/timreview/887
PDF icon Download this article (735.13 KB)
Jensen, L. 2015. Challenges in Maritime Cyber-Resilience. Technology Innovation Management Review, 5(4): 35-39. http://doi.org/10.22215/timreview/889
PDF icon Download this article (292.56 KB)
Boyes, H. 2015. Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review, 5(4): 28-34. http://doi.org/10.22215/timreview/888
PDF icon Download this article (448.34 KB)
Adams, M., & Makramalla, M. 2015. Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
PDF icon Download this article (587.19 KB)

Pages