Using Boundary Management for More Effective Product Development. Technology Innovation Management Review, 3(10): 30-35. http://doi.org/10.22215/timreview/734
2013. Download this article (746.91 KB)Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
2015. Download this article (506.06 KB)A Managerial Decision Tool for R&D Outsourcing and Partner Selection in High-Technology Industries. Technology Innovation Management Review, 7(3): 25-32. http://doi.org/10.22215/timreview/1062
2017. Download this article as a PDF (666.8 KB)Editorial: Insights (March 2017). Technology Innovation Management Review, 7(3): 3-3. http://doi.org/10.22215/timreview/1059
2017. Download this article as a PDF (181.72 KB)Editorial: Cybersecurity (January 2015). Technology Innovation Management Review, 5(1): 3-4. http://doi.org/10.22215/timreview/860
2015. Download this article (199.33 KB)