Journal articles on the topic 'Cybersecurity maturity model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity maturity model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Full textYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Full textP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Full textPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Eseoghene Kokogho, and Obianuju Clement Onwuzulike. "Developing a cybersecurity maturity model for fintech firms using predictive analytics." International Journal of Science and Technology Research Archive 8, no. 1 (2025): 023–49. https://doi.org/10.53771/ijstra.2025.8.1.0021.
Full textZwarts, Hendrik, Jaco Du Toit, and Basie Von Solms. "Augmenting Cybersecurity Awareness at Critical Infrastructures in Developing Countries Through a Cybersecurity Governance Maturity Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 726–33. https://doi.org/10.34190/eccws.24.1.3708.
Full textBüyüközkan, Gülçin, and Merve Güler. "Cybersecurity maturity model: Systematic literature review and a proposed model." Technological Forecasting and Social Change 213 (April 2025): 123996. https://doi.org/10.1016/j.techfore.2025.123996.
Full textDotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Full textAliyu, Aliyu, Leandros Maglaras, Ying He, et al. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (2020): 3660. http://dx.doi.org/10.3390/app10103660.
Full textPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Full textAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Full textRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Full textColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Full textAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Full textRoy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Full textPanalangin, Mansur L., Ariel Roy L. Reyes, Haron A. Mohamad, Shahara A. Abo, and Arnold S. Cararag. "Building a Resilient Computer Emergency Response Team (CERT): A Strategic Approach Using SWOT Analysis and the CERT Resilience Maturity Model for Cybersecurity Preparedness in the Bangsamoro Government, Philippines." American Journal of Innovation in Science and Engineering 4, no. 2 (2025): 41–48. https://doi.org/10.54536/ajise.v4i2.4289.
Full textKulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.
Full textSabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada." Electronics 13, no. 16 (2024): 3257. http://dx.doi.org/10.3390/electronics13163257.
Full textDomnik, Jan, and Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Full textFerreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Full textPatrick, Mayala, Edrick Mugisha, Keneth Mbaga, and Mansour Likamba. "Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)." Social Science and Humanities Journal 8, no. 10 (2024): 5688–97. http://dx.doi.org/10.18535/sshj.v8i10.1421.
Full textAlmomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Full textUraipan, Naris, Prasong Praneetpolgrang, and Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Full textPigola, Angélica, and Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats." Communications of the Association for Information Systems 53, no. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Full textVarona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Full textMori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Full textBaykız, Tekin, and Şuay Nilhan Açıkalın. "THE DIGITALIZATION OF DIPLOMACY MATURITY MODEL (DD-MM): A NEW MODEL FOR OPTIMIZING DIPLOMATIC DIGITALIZATION." Journal of Nusantara Studies (JONUS) 9, no. 2 (2024): 441–73. http://dx.doi.org/10.24200/jonus.vol9iss2pp441-473.
Full textRohith, Lakshmi Narasimha. "Defining Observability Maturity: A Blueprint for Scalable and Resilient IT Operations." International Scientific Journal of Engineering and Management 03, no. 09 (2024): 1–7. https://doi.org/10.55041/isjem02080.
Full textHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López, and Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity." Applied Sciences 13, no. 14 (2023): 8339. http://dx.doi.org/10.3390/app13148339.
Full textBlinov, A. V., and S. V. Bezzateev. "DevSecOps: UNIFYING DEVELOPMENT AND SECURITY PROCESSES." Voprosy kiberbezopasnosti 2, no. 66 (2025): 78–89. https://doi.org/10.21681/2311-3456-2025-2-78-89.
Full textVivek Madan. "The Role of Compliance in Cybersecurity: Strengthening the Digital Fortress." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3757–61. https://doi.org/10.32628/cseit25112851.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Full textГузенко, Н. В. "Цифровая зрелость транспортной инфраструктуры как стратегический ресурс пространственного развития регионов". Vestnik of Rostov state University (RINH) 32, № 2 (2025): 21–34. https://doi.org/10.54220/v.rsue.1991-0533.2025.90.2.002.
Full textTabim, Verônica Maurer, Cíntia Wilke Franco, and João Pedro Hoerde. "Digital transformation in e-commerce logistics." Brazilian Journal of Operations & Production Management 21, no. 1 (2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Full textMalik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Scholars Journal of Engineering and Technology 13, no. 06 (2025): 401–23. https://doi.org/10.36347/sjet.2025.v13i06.005.
Full textAmanda, Delpia, Nurul Mutiah, and Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI." Coding Jurnal Komputer dan Aplikasi 11, no. 2 (2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Full textFajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Full textKvint, V. L., A. V. Babkin, and E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems." Russian Journal of Industrial Economics 15, no. 3 (2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Full textAibueva, Rayana A. M., and Hamid Sh Nasurov. "CYBERSECURITY OF COMPANIES: THE IMPORTANCE OF TRAINING EMPLOYEES IN DIGITAL LITERACY TO PROTECT CORPORATE DATA." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 2/15, no. 155 (2025): 5–11. https://doi.org/10.36871/ek.up.p.r.2025.02.15.001.
Full textANNA, ANGELOGIANNI, POLITIS ILIAS, MOHAMMADI FARNAZ, and XENAKIS CHRISTOS. "On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats." IEEE ACCESS 8 (December 16, 2020): 224677–701. https://doi.org/10.1109/ACCESS.2020.3045322.
Full textCHISOM ELIZABETH ALOZIE and UZOAMAKA OKAFOR. "Balancing efficiency and security: The role of voluntary standards and emerging technologies in cyber risk management framework in the global space." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 2411–33. https://doi.org/10.30574/wjarr.2025.26.2.1896.
Full textPrasanna Kumar Kandregula. "Building secure projects: Cybersecurity principles for every stage." International Journal of Science and Research Archive 15, no. 2 (2025): 723–32. https://doi.org/10.30574/ijsra.2025.15.2.1460.
Full textYarovenko, Hanna, Olha Horbachova, Roman Bylbas, and Dmytro Latysh. "Digitalization As a Socio-Economic Challenge: Modeling the Impact On the Level of Cybercrime Considering Socio-Economic, Technological and Institutional Factors." SocioEconomic Challenges 9, no. 2 (2025): 282–315. https://doi.org/10.61093/sec.9(2).282-315.2025.
Full textKhavanov, Artem. "DEVELOPMENT AND IMPLEMENTATION OF COMPLIANCE INDICATORS TO ASSESS THE MATURITY LEVEL OF THE ECONOMIC SECURITY SYSTEM OF ENTERPRISES." Economic scope, no. 201 (June 10, 2025): 230–33. https://doi.org/10.30838/ep.201.230-233.
Full textKhudyntsev, Mykola M., and Igor L. Palazhchenko. "Cybersecurity maturity models for cybersecurity assessment in critical infrastructure." Environmental safety and natural resources 52, no. 4 (2024): 122–34. https://doi.org/10.32347/2411-4049.2024.4.122-134.
Full textAscue, Olga, Omar Valle, and José Santisteban. "BLOCKSAGE: Blockchain-Based Cloud Architecture for Sensitive Data Management in SMEs." Sustainability 17, no. 4 (2025): 1352. https://doi.org/10.3390/su17041352.
Full textMuttaqin, Hidayatul, and Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector." Cakrawala Repositori IMWI 6, no. 3 (2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Full textGarba, Adamu Abdullahi, Maheyzah Muhamad Siraj, and Siti Hajar Othman. "An Explanatory Review on Cybersecurity Capability Maturity Models." Advances in Science, Technology and Engineering Systems Journal 5, no. 4 (2020): 762–69. http://dx.doi.org/10.25046/aj050490.
Full textTolkachov, Maksym, Nataliia Dzheniuk, Serhii Yevseiev, et al. "Development of a method for protecting information resources in a corporate network by segmenting traffic." Eastern-European Journal of Enterprise Technologies 5, no. 9 (131) (2024): 63–78. http://dx.doi.org/10.15587/1729-4061.2024.313158.
Full textMiron, Walter, and Kevin Muita. "Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure." Technology Innovation Management Review 4, no. 10 (2014): 33–39. http://dx.doi.org/10.22215/timreview/837.
Full text