Information and cyber security maturity models: a systematic literature review

A Rabii, S Assoul, K Ouazzani Touhami… - Information & Computer …, 2020 - emerald.com
Purpose This paper aims to clarify the uncertainty reflected in the current state of information
security maturity evaluation where it has not enough matured and converged so that a …

Cybersecurity maturity model: Systematic literature review and a proposed model

G Büyüközkan, M Güler - Technological Forecasting and Social Change, 2025 - Elsevier
The growing importance of cybersecurity stems from its strategic value to various
stakeholders, including individuals, businesses, governments, and society as a whole …

CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities

D Schlette, M Vielberth, G Pernul - Computers & Security, 2021 - Elsevier
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …

The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain

K Shaheen, AH Zolait - Information & Computer Security, 2023 - emerald.com
Purpose This study aims to determine the impacts of the Bahrain Government framework
[cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the …

Cybersecurity for railways–A maturity model

R Kour, R Karim, A Thaduri - … , Part F: Journal of Rail and …, 2020 - journals.sagepub.com
With the advancements in and widespread adoption of information and communication
technologies in infrastructures, cyber-attacks are becoming more frequent and more severe …

[HTML][HTML] The cybersecurity focus area maturity (CYSFAM) model

B Yigit Ozkan, S Van Lingen, M Spruit - Journal of Cybersecurity and …, 2021 - mdpi.com
The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss
of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving …

Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats

A Pigola, PR Da Costa - … of the Association for Information Systems, 2023 - aisel.aisnet.org
Advanced cybersecurity threats with automated capabilities are on the rise in industries such
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …

[HTML][HTML] AIM triad: a prioritization strategy for public institutions to improve information security maturity

J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
In today's world, private and government organizations are legally obligated to prioritize their
information security. They need to provide proof that they are continually improving their …

Application of grounded theory in construction of factors of internal efficiency and external effectiveness of cyber security and develo** impact models

DP Dube, RP Mohanty - Organizational Cybersecurity Journal …, 2023 - emerald.com
Purpose As evident from the literature review, the research on cyber security performance is
centered on security metrics, maturity models, etc. Essentially, all these are helpful for …

A nis directive compliant cybersecurity maturity assessment framework

G Drivas, A Chatzopoulou, L Maglaras… - 2020 IEEE 44th …, 2020 - ieeexplore.ieee.org
The EU NIS Directive introduces obligations related to the security of the network and
information systems for Operators of Essential Services and for Digital Service Providers …