Export 9 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C and Author is Dan Craigen  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Craigen, D. 2014. Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
PDF icon Download this article (846.35 KB)
D
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
PDF icon Download this article (925.14 KB)
Muegge, S., & Craigen, D. 2015. A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks. Technology Innovation Management Review, 5(6): 6-16. http://doi.org/10.22215/timreview/902
PDF icon Download this article (539.85 KB)
Bailetti, T., Craigen, D., Hudson, D., Levesque, R., McKeen, S., & Walsh, D. ’A. 2013. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
PDF icon Download this article (874.36 KB)
E
McPhee, C., Craigen, D., & Muegge, S. 2015. Editorial: Critical Infrastructures and Cybersecurity (June 2015). Technology Innovation Management Review, 5(6): 3-5. http://doi.org/10.22215/timreview/901
PDF icon Download this article (215.73 KB)
McPhee, C., & Craigen, D. 2016. Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962
PDF icon Editorial_TIMReview_February2016.pdf (202.08 KB)
M
Craigen, D., Vandeth, D., & Walsh, D. ’A. 2013. Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
PDF icon Download this article (400.83 KB)
T
Frincke, D., Craigen, D., Nadima, N., Low, A., & Thomas, M. 2015. TIM Lecture Series – Three Collaborations Enabling Cybersecurity. Technology Innovation Management Review, 5(6): 45-48. http://doi.org/10.22215/timreview/906
PDF icon Download this article (263.6 KB)