Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Information and cyber security maturity models: a systematic literature review
A Rabii, S Assoul, K Ouazzani Touhami… - Information & Computer …, 2020 - emerald.com
Purpose This paper aims to clarify the uncertainty reflected in the current state of information
security maturity evaluation where it has not enough matured and converged so that a …
security maturity evaluation where it has not enough matured and converged so that a …
Cybersecurity maturity model: Systematic literature review and a proposed model
The growing importance of cybersecurity stems from its strategic value to various
stakeholders, including individuals, businesses, governments, and society as a whole …
stakeholders, including individuals, businesses, governments, and society as a whole …
CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …
information security is essentially defined by the maturity of security operations and incident …
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
K Shaheen, AH Zolait - Information & Computer Security, 2023 - emerald.com
Purpose This study aims to determine the impacts of the Bahrain Government framework
[cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the …
[cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the …
Cybersecurity for railways–A maturity model
With the advancements in and widespread adoption of information and communication
technologies in infrastructures, cyber-attacks are becoming more frequent and more severe …
technologies in infrastructures, cyber-attacks are becoming more frequent and more severe …
[HTML][HTML] The cybersecurity focus area maturity (CYSFAM) model
The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss
of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving …
of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving …
Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats
Advanced cybersecurity threats with automated capabilities are on the rise in industries such
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …
[HTML][HTML] AIM triad: a prioritization strategy for public institutions to improve information security maturity
J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
In today's world, private and government organizations are legally obligated to prioritize their
information security. They need to provide proof that they are continually improving their …
information security. They need to provide proof that they are continually improving their …
Application of grounded theory in construction of factors of internal efficiency and external effectiveness of cyber security and develo** impact models
DP Dube, RP Mohanty - Organizational Cybersecurity Journal …, 2023 - emerald.com
Purpose As evident from the literature review, the research on cyber security performance is
centered on security metrics, maturity models, etc. Essentially, all these are helpful for …
centered on security metrics, maturity models, etc. Essentially, all these are helpful for …
A nis directive compliant cybersecurity maturity assessment framework
The EU NIS Directive introduces obligations related to the security of the network and
information systems for Operators of Essential Services and for Digital Service Providers …
information systems for Operators of Essential Services and for Digital Service Providers …