Cybersecurity Futures: How Can We Regulate Emergent Risks?. Technology Innovation Management Review, 3(7): 6-11. http://doi.org/10.22215/timreview/700
2013. 
Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity. Technology Innovation Management Review, 3(8): 5-14. http://doi.org/10.22215/timreview/711
2013. 
Editorial: Cybersecurity (August 2013). Technology Innovation Management Review, 3(8): 3-4. http://doi.org/10.22215/timreview/710
2013. 
Editorial: Cybersecurity (July 2013). Technology Innovation Management Review, 3(7): 3-5. http://doi.org/10.22215/timreview/699
2013. 
An Enterprise Security Program and Architecture to Support Business Drivers. Technology Innovation Management Review, 3(8): 25-33. http://doi.org/10.22215/timreview/713
2013. 
Keystone Business Models for Network Security Processors. Technology Innovation Management Review, 3(7): 25-33. http://doi.org/10.22215/timreview/703
2013. 
Managing Cybersecurity Research and Experimental Development: The REVO Approach. Technology Innovation Management Review, 3(7): 34-41. http://doi.org/10.22215/timreview/705
2013. 
Peer-to-Peer Enclaves for Improving Network Defence. Technology Innovation Management Review, 3(7): 19-24. http://doi.org/10.22215/timreview/701
2013. 
Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk. Technology Innovation Management Review, 3(8): 34-40. http://doi.org/10.22215/timreview/714
2013. 
Q&A. Should Startups Care about Application Security?. Technology Innovation Management Review, 3(7): 50-52. http://doi.org/10.22215/timreview/706
2013. 
A Research Agenda for Security Engineering. Technology Innovation Management Review, 3(8): 41-50. http://doi.org/10.22215/timreview/715
2013. 
On the Road to Holistic Decision Making in Adaptive Security. Technology Innovation Management Review, 3(8): 59-64. http://doi.org/10.22215/timreview/717
2013. 
Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research. Technology Innovation Management Review, 3(7): 12-18. http://doi.org/10.22215/timreview/704
2013. 
Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management Review, 3(7): 42-49. http://doi.org/10.22215/timreview/702
2013. 
TIM Lecture Series – Using Risk to Drive a Security Service. Technology Innovation Management Review, 3(6): 42-45. http://doi.org/10.22215/timreview/696
2013. 
Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
2014. 
Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
2014. 
Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://doi.org/10.22215/timreview/846
2014. 
Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
2014. 
Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
2014. 
Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843
2014. 
Editorial: Cybersecurity (October 2014). Technology Innovation Management Review, 4(10): 3-4. http://doi.org/10.22215/timreview/833
2014. 
Effective Digital Channel Marketing for Cybersecurity Solutions. Technology Innovation Management Review, 4(10): 22-32. http://doi.org/10.22215/timreview/836
2014. 
The Online World of the Future: Safe, Productive, and Creative. Technology Innovation Management Review, 4(10): 5-12. http://doi.org/10.22215/timreview/834
2014. 
Q&A. What Motivates Cyber-Attackers?. Technology Innovation Management Review, 4(10): 40-42. http://doi.org/10.22215/timreview/838
2014. 