Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
2014. Download this article (855.18 KB)The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
2014. Download this article (775.68 KB)Q&A. What Motivates Cyber-Attackers?. Technology Innovation Management Review, 4(10): 40-42. http://doi.org/10.22215/timreview/838
2014. Download this article (341.63 KB)Safety in the Online World of the Future. Technology Innovation Management Review, 4(11): 41-48. http://doi.org/10.22215/timreview/849
2014. Download this article (826.83 KB)TIM Lecture Series – Cybersecurity Metrics and Simulation. Technology Innovation Management Review, 4(10): 43-45. http://doi.org/10.22215/timreview/839
2014. Download this article (277.81 KB)TIM Lecture Series – The Business of Cybersecurity. Technology Innovation Management Review, 4(4): 53-57. http://doi.org/10.22215/timreview/785
2014. Download this article (281.12 KB)TIM Lecture Series – The Laboratory for Analytic Sciences: Developing the Art and Science of Analysis. Technology Innovation Management Review, 4(7): 52-54. http://doi.org/10.22215/timreview/813
2014. Download this article (342.28 KB)TIM Lecture Series – Web Infections and Protections: Theory and Practice. Technology Innovation Management Review, 4(3): 35-. http://doi.org/10.22215/timreview/774
2014. Download this article (240.66 KB)Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
2013. Download this article (406.22 KB)Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
2013. Download this article (874.36 KB)Editorial: Cybersecurity (August 2013). Technology Innovation Management Review, 3(8): 3-4. http://doi.org/10.22215/timreview/710
2013. Download this article (340.04 KB)Editorial: Cybersecurity (July 2013). Technology Innovation Management Review, 3(7): 3-5. http://doi.org/10.22215/timreview/699
2013. Download this article (212.7 KB)An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
2013. Download this article (659.03 KB)Keystone Business Models for Network Security Processors. Technology Innovation Management Review, 3(7): 25-33. http://doi.org/10.22215/timreview/703
2013. Download this article (620.12 KB)Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
2013. Download this article (400.83 KB)Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
2013. Download this article (362.23 KB)Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
2013. Download this article (697.06 KB)Q&A. Should Startups Care about Application Security?. Technology Innovation Management Review, 3(7): 50-52. http://doi.org/10.22215/timreview/706
2013. Download this article (247.41 KB)A Research Agenda for Security Engineering. Technology Innovation Management Review, 3(8): 41-50. http://doi.org/10.22215/timreview/715
2013. Download this article (781.18 KB)On the Road to Holistic Decision Making in Adaptive Security. Technology Innovation Management Review, 3(8): 59-64. http://doi.org/10.22215/timreview/717
2013. Download this article (676.46 KB)Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
2013. Download this article (385.67 KB)Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management Review, 3(7): 42-49. http://doi.org/10.22215/timreview/702
2013. Download this article (506.02 KB)TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
2013. Download this article (238.31 KB)