Journal articles on the topic 'Cybersecurity Maturity Model Certification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity Maturity Model Certification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Razikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (August 31, 2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Full textColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (March 1, 2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (September 6, 2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (December 31, 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Full textKour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (October 18, 2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Full textYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (February 13, 2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Full textKunsook, Kritiyaporn, Sotarat Thammaboosadee, and Rojjalak Chuckpaiwong. "Sustainable Organic Farming Maturity Model." International Journal on Advanced Science, Engineering and Information Technology 14, no. 2 (April 23, 2024): 706–16. http://dx.doi.org/10.18517/ijaseit.14.2.19504.
Full textMorales-Fernández, Rogelio, José Alfonso Brito-Rojas, and Jaime Arturo Villaseñor Marcial. "CAPABILITY MATURITY MODEL INTEGRATION (CMMI)." Revista de Investigación en Tecnologías de la Información 2, no. 3 (June 2014): 15–20. http://dx.doi.org/10.36825/riti.02.03.003.
Full textAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.
Full textPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Full textAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Full textRoy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Full textNowrozy, Raza. "GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity." Informatics 11, no. 3 (July 11, 2024): 45. http://dx.doi.org/10.3390/informatics11030045.
Full textEstorilio, Carla C. A., and Lígia de Oliveira Franzosi Bessa. "Relationship between food industries maturity and quality certification." Independent Journal of Management & Production 11, no. 7 (December 1, 2020): 2827–48. http://dx.doi.org/10.14807/ijmp.v11i7.1201.
Full textAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (September 2, 2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Full textDomnik, Jan, and Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework." Journal of Cybersecurity and Privacy 4, no. 2 (March 30, 2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Full textPigola, Angélica, and Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats." Communications of the Association for Information Systems 53, no. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Full textVarona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (September 6, 2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Full textAlmomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Full textUraipan, Naris, Prasong Praneetpolgrang, and Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (April 27, 2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Full textFerreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Full textMori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (October 1, 2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Full textScherz, Marco, Bernd Markus Zunk, Christian Steinmann, and Helmuth Kreiner. "How to Assess Sustainable Planning Processes of Buildings? A Maturity Assessment Model Approach for Designers." Sustainability 14, no. 5 (March 1, 2022): 2879. http://dx.doi.org/10.3390/su14052879.
Full textHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López, and Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity." Applied Sciences 13, no. 14 (July 19, 2023): 8339. http://dx.doi.org/10.3390/app13148339.
Full textRosak-Szyrocka, Joanna, and Marek Roszak. "The role of the EFQM model in precepting quality in Polish enterprises." Multidisciplinary Aspects of Production Engineering 2, no. 1 (September 1, 2019): 399–406. http://dx.doi.org/10.2478/mape-2019-0040.
Full textTavares de Aquino, Andre, and Renata Maciel de Melo. "Multicriteria model for selecting TQM consultancy and certification services." Benchmarking: An International Journal 23, no. 7 (October 3, 2016): 1736–50. http://dx.doi.org/10.1108/bij-05-2015-0049.
Full textKhan, T. U. R., P. Davis, and F. J. Behr. "A FRAMEWORK FOR AN OPEN SOURCE GEOSPATIAL CERTIFICATION MODEL." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B6 (June 17, 2016): 57–64. http://dx.doi.org/10.5194/isprs-archives-xli-b6-57-2016.
Full textMaingak, Akmal Zaifullah, Candiwan Candiwan, and Listyo Dwi Harsono. "Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution." TRIKONOMIKA 17, no. 1 (September 17, 2018): 28. http://dx.doi.org/10.23969/trikonomika.v17i1.1138.
Full textBotha-Badenhorst, Danielle, André Martin McDonald, Graham David Barbour, Ethan Buckinjohn, and Wian Gertenbach. "On The Zero-Trust Intranet Certification Problem." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 10–18. http://dx.doi.org/10.34190/iccws.19.1.2054.
Full textRibeiro, Renata Maciel, Sergio Ricardo Barros, Julio Cesar Wasserman, and Barbara Franz. "DIAGNOSIS FOR THE IMPLEMENTATION OF AN ENVIRONMENTAL MANAGEMENT SYSTEM IN A MICROBUSINESS IN THE URBAN VECTOR AND PEST CONTROL SECTOR." Brazilian Journal of Operations & Production Management 13, no. 1 (March 20, 2016): 32. http://dx.doi.org/10.14488/bjopm.2016.v13.n1.a3.
Full textTabim, Verônica Maurer, Cíntia Wilke Franco, and João Pedro Hoerde. "Digital transformation in e-commerce logistics." Brazilian Journal of Operations & Production Management 21, no. 1 (March 2, 2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Full textPark, Na-Eun, So-Hyun Park, Ye-Sol Oh, Jung-Hyun Moon, and Il-Gu Lee. "Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology." Sensors 22, no. 2 (January 12, 2022): 579. http://dx.doi.org/10.3390/s22020579.
Full textAmanda, Delpia, Nurul Mutiah, and Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI." Coding Jurnal Komputer dan Aplikasi 11, no. 2 (September 1, 2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Full textTaranukha, S. N., A. A. Kuzmin, and M. N. Saveleva. "Qualimetric model of maturity of competencies for graduates of basic educational programs." Informatics and education, no. 5 (July 4, 2020): 24–32. http://dx.doi.org/10.32517/0234-0453-2020-35-5-24-32.
Full textFajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (February 24, 2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Full textLisboa Malaquias, Felipe, Georgios Giantamidis, Stylianos Basagiannis, Simone Fulvio Rollini, and Isaac Amundson. "Towards a Methodology to Design Provably Secure Cyber-physical Systems." ACM SIGAda Ada Letters 43, no. 1 (October 30, 2023): 94–99. http://dx.doi.org/10.1145/3631483.3631499.
Full textDunn, Paul, and Barbara Sainty. "Professionalism in accounting: a five-factor model of ethical decision-making." Social Responsibility Journal 16, no. 2 (January 11, 2019): 255–69. http://dx.doi.org/10.1108/srj-11-2017-0240.
Full textKvint, V. L., A. V. Babkin, and E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems." Russian Journal of Industrial Economics 15, no. 3 (October 8, 2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Full textPereira, Soraia, Lara Silva, José Machado, and Alexandra Cabral. "The Clinical Informatization in Portugal." International Journal of Reliable and Quality E-Healthcare 9, no. 2 (April 2020): 34–47. http://dx.doi.org/10.4018/ijrqeh.2020040103.
Full textWella, Wella, and Laurentia Chia. "The Implementing ISO 9001 In Manufacture Industry." IJNMT (International Journal of New Media Technology) 6, no. 2 (January 16, 2020): 92–97. http://dx.doi.org/10.31937/ijnmt.v6i2.1248.
Full textKayisoglu, Gizem, Pelin Bolat, and Emre Duzenli. "Modelling of Maritime Cyber Security Education and Training." Pedagogika-Pedagogy 95, no. 6s (August 29, 2023): 64–78. http://dx.doi.org/10.53656/ped2023-6s.07.
Full textAhmed, Adel A. "Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things." Sensors 21, no. 8 (April 16, 2021): 2810. http://dx.doi.org/10.3390/s21082810.
Full textLee, Jung-Chieh, Chung-Yang Chen, and Yih-Chearng Shiue. "The moderating effects of organisational culture on the relationship between absorptive capacity and software process improvement success." Information Technology & People 30, no. 1 (March 6, 2017): 47–70. http://dx.doi.org/10.1108/itp-09-2013-0171.
Full textMuttaqin, Hidayatul, and Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector." Cakrawala Repositori IMWI 6, no. 3 (July 7, 2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Full textLerro, Angelo, Alberto Brandl, Manuela Battipede, and Piero Gili. "Preliminary Design of a Model-Free Synthetic Sensor for Aerodynamic Angle Estimation for Commercial Aviation." Sensors 19, no. 23 (November 23, 2019): 5133. http://dx.doi.org/10.3390/s19235133.
Full textVasiliev, S. A., I. A. Nikonova, and O. S. Miroshnichenko. "Banks, Financial Platforms and Big Data: Development Trends and Regulation Directions." Financial Journal 14, no. 5 (October 2022): 105–19. http://dx.doi.org/10.31107/2075-1990-2022-5-105-119.
Full textMeng, Baoluo, Daniel Larraz, Kit Siu, Abha Moitra, John Interrante, William Smith, Saswata Paul, et al. "VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System." Systems 9, no. 1 (March 3, 2021): 18. http://dx.doi.org/10.3390/systems9010018.
Full textJeyaraj, Andrew K., and Susan Liscouët-Hanke. "A Safety-Focused System Architecting Framework for the Conceptual Design of Aircraft Systems." Aerospace 9, no. 12 (December 3, 2022): 791. http://dx.doi.org/10.3390/aerospace9120791.
Full text