Zeitschriftenartikel zum Thema „Cybersecurity maturity model“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cybersecurity maturity model" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Der volle Inhalt der QuelleYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Der volle Inhalt der QuelleP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Der volle Inhalt der QuellePrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Eseoghene Kokogho, and Obianuju Clement Onwuzulike. "Developing a cybersecurity maturity model for fintech firms using predictive analytics." International Journal of Science and Technology Research Archive 8, no. 1 (2025): 023–49. https://doi.org/10.53771/ijstra.2025.8.1.0021.
Der volle Inhalt der QuelleZwarts, Hendrik, Jaco Du Toit, and Basie Von Solms. "Augmenting Cybersecurity Awareness at Critical Infrastructures in Developing Countries Through a Cybersecurity Governance Maturity Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 726–33. https://doi.org/10.34190/eccws.24.1.3708.
Der volle Inhalt der QuelleBüyüközkan, Gülçin, and Merve Güler. "Cybersecurity maturity model: Systematic literature review and a proposed model." Technological Forecasting and Social Change 213 (April 2025): 123996. https://doi.org/10.1016/j.techfore.2025.123996.
Der volle Inhalt der QuelleDotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Der volle Inhalt der QuelleAliyu, Aliyu, Leandros Maglaras, Ying He, et al. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (2020): 3660. http://dx.doi.org/10.3390/app10103660.
Der volle Inhalt der QuellePeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Der volle Inhalt der QuelleAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Der volle Inhalt der QuelleRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Der volle Inhalt der QuelleColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Der volle Inhalt der QuelleAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Der volle Inhalt der QuelleRoy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Der volle Inhalt der QuellePanalangin, Mansur L., Ariel Roy L. Reyes, Haron A. Mohamad, Shahara A. Abo, and Arnold S. Cararag. "Building a Resilient Computer Emergency Response Team (CERT): A Strategic Approach Using SWOT Analysis and the CERT Resilience Maturity Model for Cybersecurity Preparedness in the Bangsamoro Government, Philippines." American Journal of Innovation in Science and Engineering 4, no. 2 (2025): 41–48. https://doi.org/10.54536/ajise.v4i2.4289.
Der volle Inhalt der QuelleKulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.
Der volle Inhalt der QuelleSabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada." Electronics 13, no. 16 (2024): 3257. http://dx.doi.org/10.3390/electronics13163257.
Der volle Inhalt der QuelleDomnik, Jan, and Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Der volle Inhalt der QuelleFerreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Der volle Inhalt der QuellePatrick, Mayala, Edrick Mugisha, Keneth Mbaga, and Mansour Likamba. "Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)." Social Science and Humanities Journal 8, no. 10 (2024): 5688–97. http://dx.doi.org/10.18535/sshj.v8i10.1421.
Der volle Inhalt der QuelleAlmomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Der volle Inhalt der QuelleUraipan, Naris, Prasong Praneetpolgrang, and Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Der volle Inhalt der QuellePigola, Angélica, and Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats." Communications of the Association for Information Systems 53, no. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Der volle Inhalt der QuelleVarona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Der volle Inhalt der QuelleMori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Der volle Inhalt der QuelleBaykız, Tekin, and Şuay Nilhan Açıkalın. "THE DIGITALIZATION OF DIPLOMACY MATURITY MODEL (DD-MM): A NEW MODEL FOR OPTIMIZING DIPLOMATIC DIGITALIZATION." Journal of Nusantara Studies (JONUS) 9, no. 2 (2024): 441–73. http://dx.doi.org/10.24200/jonus.vol9iss2pp441-473.
Der volle Inhalt der QuelleRohith, Lakshmi Narasimha. "Defining Observability Maturity: A Blueprint for Scalable and Resilient IT Operations." International Scientific Journal of Engineering and Management 03, no. 09 (2024): 1–7. https://doi.org/10.55041/isjem02080.
Der volle Inhalt der QuelleHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López, and Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity." Applied Sciences 13, no. 14 (2023): 8339. http://dx.doi.org/10.3390/app13148339.
Der volle Inhalt der QuelleBlinov, A. V., and S. V. Bezzateev. "DevSecOps: UNIFYING DEVELOPMENT AND SECURITY PROCESSES." Voprosy kiberbezopasnosti 2, no. 66 (2025): 78–89. https://doi.org/10.21681/2311-3456-2025-2-78-89.
Der volle Inhalt der QuelleVivek Madan. "The Role of Compliance in Cybersecurity: Strengthening the Digital Fortress." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3757–61. https://doi.org/10.32628/cseit25112851.
Der volle Inhalt der QuelleFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Der volle Inhalt der QuelleLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Der volle Inhalt der QuelleГузенко, Н. В. "Цифровая зрелость транспортной инфраструктуры как стратегический ресурс пространственного развития регионов". Vestnik of Rostov state University (RINH) 32, № 2 (2025): 21–34. https://doi.org/10.54220/v.rsue.1991-0533.2025.90.2.002.
Der volle Inhalt der QuelleTabim, Verônica Maurer, Cíntia Wilke Franco, and João Pedro Hoerde. "Digital transformation in e-commerce logistics." Brazilian Journal of Operations & Production Management 21, no. 1 (2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Der volle Inhalt der QuelleMalik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Scholars Journal of Engineering and Technology 13, no. 06 (2025): 401–23. https://doi.org/10.36347/sjet.2025.v13i06.005.
Der volle Inhalt der QuelleAmanda, Delpia, Nurul Mutiah, and Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI." Coding Jurnal Komputer dan Aplikasi 11, no. 2 (2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Der volle Inhalt der QuelleFajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Der volle Inhalt der QuelleKvint, V. L., A. V. Babkin, and E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems." Russian Journal of Industrial Economics 15, no. 3 (2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Der volle Inhalt der QuelleAibueva, Rayana A. M., and Hamid Sh Nasurov. "CYBERSECURITY OF COMPANIES: THE IMPORTANCE OF TRAINING EMPLOYEES IN DIGITAL LITERACY TO PROTECT CORPORATE DATA." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 2/15, no. 155 (2025): 5–11. https://doi.org/10.36871/ek.up.p.r.2025.02.15.001.
Der volle Inhalt der QuelleANNA, ANGELOGIANNI, POLITIS ILIAS, MOHAMMADI FARNAZ, and XENAKIS CHRISTOS. "On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats." IEEE ACCESS 8 (December 16, 2020): 224677–701. https://doi.org/10.1109/ACCESS.2020.3045322.
Der volle Inhalt der QuelleCHISOM ELIZABETH ALOZIE and UZOAMAKA OKAFOR. "Balancing efficiency and security: The role of voluntary standards and emerging technologies in cyber risk management framework in the global space." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 2411–33. https://doi.org/10.30574/wjarr.2025.26.2.1896.
Der volle Inhalt der QuellePrasanna Kumar Kandregula. "Building secure projects: Cybersecurity principles for every stage." International Journal of Science and Research Archive 15, no. 2 (2025): 723–32. https://doi.org/10.30574/ijsra.2025.15.2.1460.
Der volle Inhalt der QuelleYarovenko, Hanna, Olha Horbachova, Roman Bylbas, and Dmytro Latysh. "Digitalization As a Socio-Economic Challenge: Modeling the Impact On the Level of Cybercrime Considering Socio-Economic, Technological and Institutional Factors." SocioEconomic Challenges 9, no. 2 (2025): 282–315. https://doi.org/10.61093/sec.9(2).282-315.2025.
Der volle Inhalt der QuelleKhavanov, Artem. "DEVELOPMENT AND IMPLEMENTATION OF COMPLIANCE INDICATORS TO ASSESS THE MATURITY LEVEL OF THE ECONOMIC SECURITY SYSTEM OF ENTERPRISES." Economic scope, no. 201 (June 10, 2025): 230–33. https://doi.org/10.30838/ep.201.230-233.
Der volle Inhalt der QuelleKhudyntsev, Mykola M., and Igor L. Palazhchenko. "Cybersecurity maturity models for cybersecurity assessment in critical infrastructure." Environmental safety and natural resources 52, no. 4 (2024): 122–34. https://doi.org/10.32347/2411-4049.2024.4.122-134.
Der volle Inhalt der QuelleAscue, Olga, Omar Valle, and José Santisteban. "BLOCKSAGE: Blockchain-Based Cloud Architecture for Sensitive Data Management in SMEs." Sustainability 17, no. 4 (2025): 1352. https://doi.org/10.3390/su17041352.
Der volle Inhalt der QuelleMuttaqin, Hidayatul, and Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector." Cakrawala Repositori IMWI 6, no. 3 (2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Der volle Inhalt der QuelleGarba, Adamu Abdullahi, Maheyzah Muhamad Siraj, and Siti Hajar Othman. "An Explanatory Review on Cybersecurity Capability Maturity Models." Advances in Science, Technology and Engineering Systems Journal 5, no. 4 (2020): 762–69. http://dx.doi.org/10.25046/aj050490.
Der volle Inhalt der QuelleTolkachov, Maksym, Nataliia Dzheniuk, Serhii Yevseiev, et al. "Development of a method for protecting information resources in a corporate network by segmenting traffic." Eastern-European Journal of Enterprise Technologies 5, no. 9 (131) (2024): 63–78. http://dx.doi.org/10.15587/1729-4061.2024.313158.
Der volle Inhalt der QuelleMiron, Walter, and Kevin Muita. "Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure." Technology Innovation Management Review 4, no. 10 (2014): 33–39. http://dx.doi.org/10.22215/timreview/837.
Der volle Inhalt der Quelle