Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review, 5(1): 5-14. http://doi.org/10.22215/timreview/861
2015. 
A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks. Technology Innovation Management Review, 5(6): 6-16. http://doi.org/10.22215/timreview/902
2015. 
Editorial: 100th Issue (November 2015). Technology Innovation Management Review, 5(11): 3-4. http://doi.org/10.22215/timreview/939
2015. 
Editorial: Critical Infrastructures and Cybersecurity (June 2015). Technology Innovation Management Review, 5(6): 3-5. http://doi.org/10.22215/timreview/901
2015. 
Editorial: Cyber-Resilience in Supply Chains (April 2015). Technology Innovation Management Review, 5(4): 3-5. http://doi.org/10.22215/timreview/884
2015. 
Editorial: Cybersecurity (January 2015). Technology Innovation Management Review, 5(1): 3-4. http://doi.org/10.22215/timreview/860
2015. 
Editorial: Insights (May 2015). Technology Innovation Management Review, 5(5): 3-4. http://doi.org/10.22215/timreview/893
2015. 
Q&A. How Can I Secure My Digital Supply Chain?. Technology Innovation Management Review, 5(4): 40-43. http://doi.org/10.22215/timreview/890
2015. 
Q&A. Should the Internet Be Considered Critical Infrastructure?. Technology Innovation Management Review, 5(1): 37-40. http://doi.org/10.22215/timreview/865
2015. 
Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory. Technology Innovation Management Review, 5(6): 35-44. http://doi.org/10.22215/timreview/905
2015. 
Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects. Technology Innovation Management Review, 5(6): 26-34. http://doi.org/10.22215/timreview/904
2015. 
Securing Cyberspace: Towards an Agenda for Research and Practice. Technology Innovation Management Review, 5(11): 26-34. http://doi.org/10.22215/timreview/943
2015. 
Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
2015. 
Supply Chain Cyber-Resilience: Creating an Agenda for Future Research. Technology Innovation Management Review, 5(4): 6-12. http://doi.org/10.22215/timreview/885
. 2015. 
TIM Lecture Series – The Expanding Cybersecurity Threat. Technology Innovation Management Review, 5(3): 56-48. http://doi.org/10.22215/timreview/881
2015. 
TIM Lecture Series – The Internet of Everything: Fridgebots, Smart Sneakers, and Connected Cars. Technology Innovation Management Review, 5(5): 47-49. http://doi.org/10.22215/timreview/898
2015. 
TIM Lecture Series – Three Collaborations Enabling Cybersecurity. Technology Innovation Management Review, 5(6): 45-48. http://doi.org/10.22215/timreview/906
2015. 
A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technology Innovation Management Review, 5(6): 17-25. http://doi.org/10.22215/timreview/903
2015. 
Assessing Scientific Contributions: A Proposed Framework and Its Application to Cybersecurity. Technology Innovation Management Review, 4(11): 5-13. http://doi.org/10.22215/timreview/844
2014. 
Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://doi.org/10.22215/timreview/848
2014. 
Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://doi.org/10.22215/timreview/846
2014. 
Cybersecurity Startups: The Importance of Early and Rapid Globalization. Technology Innovation Management Review, 4(11): 14-21. http://doi.org/10.22215/timreview/845
2014. 
Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://doi.org/10.22215/timreview/835
2014. 
Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://doi.org/10.22215/timreview/843
2014. 
Editorial: Cybersecurity (October 2014). Technology Innovation Management Review, 4(10): 3-4. http://doi.org/10.22215/timreview/833
2014. 