TIM Lecture Series

Web Infections and Protections: Theory and Practice
February 27, 2014

"The reality of the Web is that you will never be totally safe – you will take damage. The question is, how are you going to deal with it?"

The first TIM lecture of 2014 was presented by Arnold Kwong, Managing Director of Extratelligence, whose lecture described aspects of his organization's research into web infections and protections over a 15-year period. > Read article


Technology Innovation Management Review (TIM Review)

January 2015: Cybersecurity > Read publication

  • Editorial: Cybersecurity (January 2015)) > Read article
  • Cybersecurity Skills Training: An Attacker-Centric Gamified Approach) > Read article
  • Botnet Takedown Initiatives: A Taxonomy and Performance Model) > Read article
  • Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities) > Read article
  • Identifying the Challenges in Commercializing High Technology: A Case Study of Quantum Key Distribution Technology) > Read article
  • Q&A. Should the Internet Be Considered Critical Infrastructure?) > Read article

November 2014: Cybersecurity > Read publication

October 2014: Cybersecurity > Read publication

August 2013: Cybersecurity > Read publication

  • Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity > Read article
  • Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity > Read article
  • An Enterprise Security Program and Architecture to Support Business Drivers > Read article
  • Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk > Read article
  • A Research Agenda for Security Engineering > Read article
  • Multifactor Authentication: Its Time Has Come > Read article
  • On the Road to Holistic Decision Making in Adaptive Security > Read article
  • Servitization in a Security Business: Changing the Logic of Value Creation > Read article

July 2013: Cybersecurity > Read publication

  • Cybersecurity Futures: How Can We Regulate Emergent Risks? > Read article
  • Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research > Read article
  • Peer-to-Peer Enclaves for Improving Network Defence > Read article
  • Keystone Business Models for Network Security Processors > Read article
  • Managing Cybersecurity Research and Experimental Development: The REVO Approach > Read article
  • Security Challenges in Smart-Grid Metering and Control Systems > Read article
  • Q&A. Should Startups Care about Application Security? > Read article