2013. Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
2013. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
2013. Editorial: Cybersecurity (August 2013). Technology Innovation Management Review, 3(8): 3-4. http://doi.org/10.22215/timreview/710
2013. Editorial: Cybersecurity (July 2013). Technology Innovation Management Review, 3(7): 3-5. http://doi.org/10.22215/timreview/699
2013. An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
2013. Keystone Business Models for Network Security Processors. Technology Innovation Management Review, 3(7): 25-33. http://doi.org/10.22215/timreview/703
2013. Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
2013. Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
2013. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
2013. Q&A. Should Startups Care about Application Security?. Technology Innovation Management Review, 3(7): 50-52. http://doi.org/10.22215/timreview/706
2013. A Research Agenda for Security Engineering. Technology Innovation Management Review, 3(8): 41-50. http://doi.org/10.22215/timreview/715
2013. On the Road to Holistic Decision Making in Adaptive Security. Technology Innovation Management Review, 3(8): 59-64. http://doi.org/10.22215/timreview/717
2013. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
2013. Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management Review, 3(7): 42-49. http://doi.org/10.22215/timreview/702
2013. TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
2014. Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
2014. Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
2014. Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://doi.org/10.22215/timreview/846
2014. Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
2014. Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843
2014. Editorial: Cybersecurity (October 2014). Technology Innovation Management Review, 4(10): 3-4. http://doi.org/10.22215/timreview/833
2014. Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
2014. The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
2014. Q&A. What Motivates Cyber-Attackers?. Technology Innovation Management Review, 4(10): 40-42. http://doi.org/10.22215/timreview/838
]