{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
McPhee, C., & Craigen, D. 2016. Editorial: Cybersecurity (February 2016). Technology Innovation Management Review, 6(2): 3-4. http://doi.org/10.22215/timreview/962\par \par Bailetti, T., & Gad, M. 2016. Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965\par \par McGuire, C. F. 2015. TIM Lecture Series ? The Expanding Cybersecurity Threat. Technology Innovation Management Review, 5(3): 56-48. http://doi.org/10.22215/timreview/881\par \par Maheux, B. 2014. Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848\par \par McPhee, C., & Bailetti, T. 2014. Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843\par \par }