Information and cyber security maturity models: a systematic literature review

A Rabii, S Assoul, K Ouazzani Touhami… - Information & Computer …, 2020 - emerald.com
Purpose This paper aims to clarify the uncertainty reflected in the current state of information
security maturity evaluation where it has not enough matured and converged so that a …

Adapting big data standards, maturity models to smart grid distributed generation: Critical review

A Sundararajan, AS Hernandez, AI Sarwat - IET Smart Grid, 2020 - Wiley Online Library
Big data standards and capability maturity models (CMMs) help developers build
applications with reduced coupling and increased breadth of deployment. In smart grids …

CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities

D Schlette, M Vielberth, G Pernul - Computers & Security, 2021 - Elsevier
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …

Cybersecurity for railways–A maturity model

R Kour, R Karim, A Thaduri - … , Part F: Journal of Rail and …, 2020 - journals.sagepub.com
With the advancements in and widespread adoption of information and communication
technologies in infrastructures, cyber-attacks are becoming more frequent and more severe …

The cybersecurity focus area maturity (CYSFAM) model

B Yigit Ozkan, S van Lingen, M Spruit - Journal of Cybersecurity and …, 2021 - mdpi.com
The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss
of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving …

The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain

K Shaheen, AH Zolait - Information & Computer Security, 2023 - emerald.com
Purpose This study aims to determine the impacts of the Bahrain Government framework
[cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the …

Digital literacy of digital natives

D Suša Vugec, AM Stjepić - … Challenges: The Human Side of the Digital …, 2022 - Springer
Digital transformation is quickly progressing in all spheres of human life and new
generations have to adjust to changes that the digital age caused in the economy and …

The cybersecurity governance in changing the security psychology and security posture: insights into e-procurement

ABD Gani, Y Fernando - International Journal of …, 2021 - inderscienceonline.com
Security is a consistent and growing concern for e-commerce and e-procurement solutions
which demand for secure transactions to ensure the confidentiality, integrity and availability …

[PDF][PDF] Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data.

H Hnatiienko, NA Kiktev, T Babenko, A Desiatko… - ITS, 2021 - ceur-ws.org
Successful cybersecurity of any organizational system is based on the creation inadequacy
and implementation of an integrated multi-level system of measures that cover the main …

Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats

A Pigola, PR Da Costa - … of the Association for Information Systems, 2023 - aisel.aisnet.org
Advanced cybersecurity threats with automated capabilities are on the rise in industries such
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …