Journal articles on the topic 'Cybersecurity maturity model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity maturity model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (October 18, 2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Full textYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (February 13, 2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Full textP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 24, 2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Full textDotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Full textAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.
Full textPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Full textAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (September 2, 2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Full textRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (August 31, 2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Full textColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (March 1, 2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Full textAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Full textRoy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Full textSabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada." Electronics 13, no. 16 (August 16, 2024): 3257. http://dx.doi.org/10.3390/electronics13163257.
Full textDomnik, Jan, and Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework." Journal of Cybersecurity and Privacy 4, no. 2 (March 30, 2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Full textPatrick, Mayala, Edrick Mugisha, Keneth Mbaga, and Mansour Likamba. "Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)." Social Science and Humanities Journal 8, no. 10 (October 26, 2024): 5688–97. http://dx.doi.org/10.18535/sshj.v8i10.1421.
Full textVarona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (September 6, 2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Full textAlmomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Full textPigola, Angélica, and Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats." Communications of the Association for Information Systems 53, no. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Full textUraipan, Naris, Prasong Praneetpolgrang, and Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (April 27, 2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Full textFerreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Full textMori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (October 1, 2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Full textBaykız, Tekin, and Şuay Nilhan Açıkalın. "THE DIGITALIZATION OF DIPLOMACY MATURITY MODEL (DD-MM): A NEW MODEL FOR OPTIMIZING DIPLOMATIC DIGITALIZATION." Journal of Nusantara Studies (JONUS) 9, no. 2 (July 31, 2024): 441–73. http://dx.doi.org/10.24200/jonus.vol9iss2pp441-473.
Full textHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López, and Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity." Applied Sciences 13, no. 14 (July 19, 2023): 8339. http://dx.doi.org/10.3390/app13148339.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (September 6, 2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Full textTabim, Verônica Maurer, Cíntia Wilke Franco, and João Pedro Hoerde. "Digital transformation in e-commerce logistics." Brazilian Journal of Operations & Production Management 21, no. 1 (March 2, 2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Full textAmanda, Delpia, Nurul Mutiah, and Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI." Coding Jurnal Komputer dan Aplikasi 11, no. 2 (September 1, 2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Full textFajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (February 24, 2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Full textKvint, V. L., A. V. Babkin, and E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems." Russian Journal of Industrial Economics 15, no. 3 (October 8, 2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Full textMuttaqin, Hidayatul, and Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector." Cakrawala Repositori IMWI 6, no. 3 (July 7, 2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Full textTolkachov, Maksym, Nataliia Dzheniuk, Serhii Yevseiev, Yurii Lysetskyi, Volodymyr Shulha, Ivan Grod, Serhii Faraon, Ihor Ivanchenko, Igor Pasko, and Dmytro Balagura. "Development of a method for protecting information resources in a corporate network by segmenting traffic." Eastern-European Journal of Enterprise Technologies 5, no. 9 (131) (October 23, 2024): 63–78. http://dx.doi.org/10.15587/1729-4061.2024.313158.
Full textGarba, Adamu Abdullahi, Maheyzah Muhamad Siraj, and Siti Hajar Othman. "An Explanatory Review on Cybersecurity Capability Maturity Models." Advances in Science, Technology and Engineering Systems Journal 5, no. 4 (2020): 762–69. http://dx.doi.org/10.25046/aj050490.
Full textMiron, Walter, and Kevin Muita. "Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 33–39. http://dx.doi.org/10.22215/timreview/837.
Full textMiron, Walter, and Kevin Muita. "Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 33–39. http://dx.doi.org/10.22215/timreview837.
Full textKolomiyets, Ganna M., and Maryna O. Moskalenko. "Confidence-Building Challenges in e-Commerce." Business Inform 8, no. 559 (2024): 224–30. http://dx.doi.org/10.32983/2222-4459-2024-8-224-230.
Full textPayette, Jay, Esther Anegbe, Erika Caceres, and Steven Muegge. "Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects." Technology Innovation Management Review 5, no. 6 (June 26, 2015): 26–34. http://dx.doi.org/10.22215/timreview/904.
Full textPayette, Jay, Esther Anegbe, Erika Caceres, and Steven Muegge. "Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects." Technology Innovation Management Review 5, no. 6 (June 26, 2015): 26–34. http://dx.doi.org/10.22215/timreview904.
Full textKoolen, Christof, Kim Wuyts, Wouter Joosen, and Peggy Valcke. "From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models." Computer Law & Security Review 52 (April 2024): 105914. http://dx.doi.org/10.1016/j.clsr.2023.105914.
Full textKour, Ravdeep, and Ramin Karim. "Cybersecurity workforce in railway: its maturity and awareness." Journal of Quality in Maintenance Engineering ahead-of-print, ahead-of-print (December 18, 2020). http://dx.doi.org/10.1108/jqme-07-2020-0059.
Full textBaikloy, Ekkachat, Prasong Praneetpolgrang, and Nivet Jirawichitchai. "Development of Cyber Resilient Capability Maturity Model for Cloud Computing Services." TEM Journal, August 27, 2020, 915–23. http://dx.doi.org/10.18421/tem93-11.
Full text(GCSCC), Global Cyber Security Capacity Cent. "Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition." SSRN Electronic Journal, 2021. http://dx.doi.org/10.2139/ssrn.3822153.
Full text(GCSCC), Global Cyber Security Capacity Cent. "Cybersecurity Capacity Maturity Model for Nations (CMM) Revised Edition." SSRN Electronic Journal, 2016. http://dx.doi.org/10.2139/ssrn.3657116.
Full textLee, GangSeok, SuHyun Kim, ImYoung Lee, Suzana Brown, and Yuri Aldoradin Carbajal. "Adapting cybersecurity maturity models for resource‐constrained settings: A case study of Peru." ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, October 22, 2024. http://dx.doi.org/10.1002/isd2.12350.
Full textTabansky, Lior, and Eynan Lichterman. "PROGRESS: the sectoral approach to cyber resilience." International Journal of Information Security 24, no. 1 (November 7, 2024). http://dx.doi.org/10.1007/s10207-024-00910-3.
Full textKulugh, Victor Emmanuel, Uche M. Mbanaso, and Gloria Chukwudebe. "Cybersecurity Resilience Maturity Assessment Model for Critical National Information Infrastructure." SN Computer Science 3, no. 3 (April 10, 2022). http://dx.doi.org/10.1007/s42979-022-01108-x.
Full textJ.D., Rafael Dean Brown. "Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework." International Review of Law 2018, no. 4 (December 1, 2019). http://dx.doi.org/10.29117/irl.2018.0036.
Full textSkarga-Bandurova, Inna, Igor Kotsiuba, and Erkuden Rios Velasco. "Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios." Frontiers in Computer Science 3 (March 10, 2021). http://dx.doi.org/10.3389/fcomp.2021.614337.
Full textVance, David, Mingzhou Jin, Christopher Price, Sachin U. Nimbalkar, and Thomas Wenning. "Smart manufacturing maturity models and their applicability: a review." Journal of Manufacturing Technology Management, April 26, 2023. http://dx.doi.org/10.1108/jmtm-03-2022-0103.
Full text"INTEGRATING CYBERSECURITY MATURITY: A HYBRID MODEL FOR BOTH TRADITIONAL ENVIRONMENT AND CLOUD ENVIRONMENT." International Research Journal of Modernization in Engineering Technology and Science, December 24, 2023. http://dx.doi.org/10.56726/irjmets47210.
Full textAlshammari, Fahad H. "Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models." Service Oriented Computing and Applications, November 15, 2022. http://dx.doi.org/10.1007/s11761-022-00354-4.
Full textHedberg, David, Martin Lundgren, and Marcus Nohlberg. "Cybersecurity in modern cars: awareness and readiness of auto workshops." Information & Computer Security, February 1, 2024. http://dx.doi.org/10.1108/ics-11-2023-0211.
Full text