<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chris McPhee</style></author><author><style face="normal" font="default" size="100%">Dan Craigen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Editorial: Cybersecurity (February 2016)</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion</style></keyword><keyword><style  face="normal" font="default" size="100%">licensing</style></keyword><keyword><style  face="normal" font="default" size="100%">literature reviews</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">multisided platforms</style></keyword><keyword><style  face="normal" font="default" size="100%">new domains</style></keyword><keyword><style  face="normal" font="default" size="100%">open source</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">02/2016</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/962</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">3-4</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue><custom1><style face="normal" font="default" size="100%">Technology Innovation Management Review
Chris McPhee is Editor-in-Chief of the &lt;em&gt;Technology Innovation Management Review&lt;/em&gt;. Chris holds an MASc degree in Technology Innovation Management from Carleton University in Ottawa, Canada, and BScH and MSc degrees in Biology from Queen's University in Kingston, Canada. He has over 15 years of management, design, and content-development experience in Canada and Scotland, primarily in the science, health, and education sectors. As an advisor and editor, he helps entrepreneurs, executives, and researchers develop and express their ideas.</style></custom1><custom2><style face="normal" font="default" size="100%">Communications Security Establishment
Dan Craigen is a Science Advisor at the Communications Security Establishment in Canada and a Visiting Scholar in the Technology Innovation Management Program at Carleton University in Ottawa, Canada. Previously, he was President of ORA Canada, a company that focused on High Assurance/Formal Methods and distributed its technology to over 60 countries. His research interests include formal methods, the science of cybersecurity, and technology transfer. He was the chair of two NATO research task groups pertaining to validation, verification, and certification of embedded systems and high-assurance technologies. He received his BScH and MSc degrees in Mathematics from Carleton University.</style></custom2></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tony Bailetti</style></author><author><style face="normal" font="default" size="100%">Mahmoud Gad</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Examining the Modes Malware Suppliers Use to Provide Goods and Services</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agents</style></keyword><keyword><style  face="normal" font="default" size="100%">customers</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">modes</style></keyword><keyword><style  face="normal" font="default" size="100%">multisided platform</style></keyword><keyword><style  face="normal" font="default" size="100%">suppliers</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">02/2016</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/965</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">21-27</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Malware suppliers use various modes to provide goods and services to customers. By mode, we mean “the way” the malware supplier chooses to function. These modes increase monetization opportunities and enable many security breaches worldwide. A theoretically sound framework that can be used to examine the various modes that malware suppliers use to produce and sell malware is needed. We apply a general model specified recently by Hagiu and Wright to study five modes that malware suppliers use to deliver goods and services to their customers. The framework presented in this article can be used to predict the mode in which a malware supplier will function; to study which types of malware suppliers, agents, and customers are attracted to each mode; to discover new modes; and to better understand the threat a malware supplier presents.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><custom1><style face="normal" font="default" size="100%">Carleton University
Tony Bailetti is an Associate Professor in the Sprott School of Business and the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. Professor Bailetti is the Director of Carleton University's Technology Innovation Management (TIM) program. His research, teaching, and community contributions support technology entrepreneurship, regional economic development, and international co-innovation.</style></custom1><custom2><style face="normal" font="default" size="100%">VENUS Cybersecurity Corporation
Mahmoud M. Gad is a Research Associate at VENUS Cybersecurity. He holds a PhD in Electrical and Computer Engineering from the University of Ottawa in Canada and an MSc in Electrical and Computer Engineering from the University of Maryland in College Park, United States. His research interests include cybercrime markets, machine learning for intrusion detection, analysis of large-scale networks, and cognitive radio networks.</style></custom2></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cheri F. McGuire</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">TIM Lecture Series – The Expanding Cybersecurity Threat</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">antivirus</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-espionage</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">data breaches</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">private-public partnerships</style></keyword><keyword><style  face="normal" font="default" size="100%">ransomware</style></keyword><keyword><style  face="normal" font="default" size="100%">scareware</style></keyword><keyword><style  face="normal" font="default" size="100%">social engineering</style></keyword><keyword><style  face="normal" font="default" size="100%">Symantec</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">03/2015</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/881</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">56-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue><custom1><style face="normal" font="default" size="100%">Symantec
Cheri McGuire is Vice President for Global Government Affairs and Cybersecurity Policy at Symantec, where she is responsible for the global public policy agenda and government engagement strategy, which includes cybersecurity, data integrity, critical infrastructure protection, and privacy. She currently serves on the World Economic Forum Global Agenda Council on Cybersecurity, and on the boards of the Information Technology Industry Council, the US Information Technology Office in China, and the National Cyber Security Alliance. She also is a past board member of the IT Information Sharing and Analysis Center, a former member of the Industry Executive Subcommittee of the President’s National Security Telecommunications Advisory Committee, and a former Chair of the US IT Sector Coordinating Council. Ms. McGuire is a frequent presenter on technology policy issues, including testifying five times before the US Congress on cybersecurity, privacy, and cybercrime. Prior to joining Symantec, she served as Director for Critical Infrastructure and Cybersecurity in Microsoft’s Trustworthy Computing Group, and she has held numerous positions in the Department of Homeland Security, Booz Allen Hamilton, and a telecom engineering firm that was acquired by Exelon Infrastructure Services. She was also a Congressional staffer for seven years. Ms. McGuire holds an MBA from The George Washington University and a BA from the University of California, Riverside.</style></custom1></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Brent Maheux</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing the Intentions and Timing of Malware</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">optimal timing</style></keyword><keyword><style  face="normal" font="default" size="100%">persistence</style></keyword><keyword><style  face="normal" font="default" size="100%">stealth</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">11/2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/848</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">34-40</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Malware has become a significant, complex, and widespread problem within the computer industry. It represents one of the most prevalent threats to cybersecurity and is increasingly able to circumvent current detection and mitigation techniques. To help better understand when a malware attack might happen, this article proposes an intention-based classification of malware and merges it with an optimal timing model to help predict the timing of malware based on its classification. The classification model is based on an examination of eight malware samples, and it identifies four malware classifications and commonalities based on the dimensions of persistence and stealth. The goal of the article is to provide a better understanding of when cyber-conflict will happen, and to help defenders better mitigate the potential damage.</style></abstract><issue><style face="normal" font="default" size="100%">11</style></issue><custom1><style face="normal" font="default" size="100%">Carleton University
Brent Maheux is a Senior Software Specialist for the Canadian Government. He holds an MEng degree in Technology Innovation Management from Carleton University in Ottawa, Canada, and a BCS degree in Computer Science from Dalhousie University in Halifax, Canada. He has over 7 years working experience within the public and private sector specializing in product design and implementation.</style></custom1></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chris McPhee</style></author><author><style face="normal" font="default" size="100%">Tony Bailetti</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Editorial: Cybersecurity (November 2014)</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crimeware</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">globalization</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">science of cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">scientific contributions</style></keyword><keyword><style  face="normal" font="default" size="100%">startups</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">11/2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/843</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">3-4</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">11</style></issue><custom1><style face="normal" font="default" size="100%">Technology Innovation Management Review
Chris McPhee is Editor-in-Chief of the &lt;em&gt;Technology Innovation Management Review&lt;/em&gt;. Chris holds an MASc degree in Technology Innovation Management from Carleton University in Ottawa and BScH and MSc degrees in Biology from Queen's University in Kingston. He has over 15 years of management, design, and content-development experience in Canada and Scotland, primarily in the science, health, and education sectors. As an advisor and editor, he helps entrepreneurs, executives, and researchers develop and express their ideas.</style></custom1><custom2><style face="normal" font="default" size="100%">Carleton University
Tony Bailetti is an Associate Professor in the Sprott School of Business and the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. Professor Bailetti is the Director of Carleton University's Technology Innovation Management (TIM) program. His research, teaching, and community contributions support technology entrepreneurship, regional economic development, and international co-innovation.</style></custom2></record></records></xml>