{"id":"https://openalex.org/W3028347386","doi":"https://doi.org/10.1080/19393555.2020.1767239","title":"Country-level cybersecurity posture assessment:Study and analysis of practices","display_name":"Country-level cybersecurity posture assessment:Study and analysis of practices","publication_year":2020,"publication_date":"2020-05-22","ids":{"openalex":"https://openalex.org/W3028347386","doi":"https://doi.org/10.1080/19393555.2020.1767239","mag":"3028347386"},"language":"en","primary_location":{"id":"doi:10.1080/19393555.2020.1767239","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393555.2020.1767239","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007294691","display_name":"Ashutosh Bahuguna","orcid":null},"institutions":[{"id":"https://openalex.org/I2799351866","display_name":"Government of India","ror":"https://ror.org/036h6g940","country_code":"IN","type":"government","lineage":["https://openalex.org/I2799351866"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ashutosh Bahuguna","raw_affiliation_strings":["Scientist- Indian Computer Emergency Response Team, Ministry of Electronics and IT, Government of India, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Scientist- Indian Computer Emergency Response Team, Ministry of Electronics and IT, Government of India, New Delhi, India","institution_ids":["https://openalex.org/I2799351866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053316249","display_name":"Raj Kishor Bisht","orcid":"https://orcid.org/0000-0002-2691-8210"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. K. Bisht","raw_affiliation_strings":["Department of Mathematics and Computing, Graphic Era Hill University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computing, Graphic Era Hill University, Dehradun, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084461580","display_name":"Jeetendra Pande","orcid":"https://orcid.org/0000-0003-1750-0231"},"institutions":[{"id":"https://openalex.org/I185596852","display_name":"Uttarakhand Open University","ror":"https://ror.org/04wvk1327","country_code":"IN","type":"education","lineage":["https://openalex.org/I185596852"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jeetendra Pande","raw_affiliation_strings":["School of Computer Science & IT, Uttarakhand Open University, Haldwani, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & IT, Uttarakhand Open University, Haldwani, India","institution_ids":["https://openalex.org/I185596852"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007294691"],"corresponding_institution_ids":["https://openalex.org/I2799351866"],"apc_list":null,"apc_paid":null,"fwci":3.7366,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.94157979,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"29","issue":"5","first_page":"250","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.7806982398033142},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.7479844689369202},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6875998973846436},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.55497807264328},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.49230873584747314},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4617919921875},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.45934802293777466},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34523093700408936},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.26889175176620483},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16035333275794983},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.07938140630722046}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.7806982398033142},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.7479844689369202},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6875998973846436},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.55497807264328},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.49230873584747314},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4617919921875},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.45934802293777466},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34523093700408936},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26889175176620483},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16035333275794983},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.07938140630722046},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/19393555.2020.1767239","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393555.2020.1767239","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W323285220","https://openalex.org/W435389104","https://openalex.org/W566072128","https://openalex.org/W1989048875","https://openalex.org/W2062428612","https://openalex.org/W2164827649","https://openalex.org/W2341011676","https://openalex.org/W2345934262","https://openalex.org/W2618688419","https://openalex.org/W2789091839","https://openalex.org/W2970897640","https://openalex.org/W2992853260","https://openalex.org/W3011185495","https://openalex.org/W3125979372","https://openalex.org/W4390119134"],"related_works":["https://openalex.org/W2350538196","https://openalex.org/W4389213123","https://openalex.org/W4235612493","https://openalex.org/W4252295490","https://openalex.org/W1961102902","https://openalex.org/W2481569570","https://openalex.org/W4362685783","https://openalex.org/W2230785849","https://openalex.org/W4242728933","https://openalex.org/W772033406"],"abstract_inverted_index":{"Along":[0],"with":[1,131],"positive":[2],"impacts,":[3],"ICT":[4,36],"transformation":[5],"also":[6],"increases":[7],"the":[8,18,32,39,42,91,96,111,118,136],"exposure":[9],"of":[10,34,41,95,134,141],"critical":[11],"infrastructure":[12],"to":[13,29,62,67,77],"cyber-attacks.":[14],"Keeping":[15],"in":[16],"view":[17],"constantly":[19],"evolving":[20],"cyber-threat":[21],"landscape,":[22],"it":[23],"is":[24],"vital":[25],"for":[26,71,103,145],"a":[27,46,60,79,146],"country":[28,61],"continuously":[30,69],"assure":[31],"cybersecurity":[33,84,104,113,119,147],"its":[35],"infrastructure.":[37],"Recently":[38],"security":[40],"cyberspace":[43],"has":[44],"got":[45],"much-needed":[47],"emphasis":[48],"from":[49],"Governments":[50],"and":[51,86,93,98,107,122,139],"International":[52],"Agencies.":[53],"To":[54],"generate":[55],"assurance,":[56],"actions":[57],"initiated":[58],"by":[59,101,126],"counter":[63],"cyber":[64],"threats":[65],"need":[66],"be":[68],"assessed":[70],"implementation":[72],"&":[73],"effectiveness.This":[74],"study":[75,92],"aims":[76],"offer":[78],"new":[80],"perspective":[81],"on":[82,110],"country-wide":[83],"benchmarking":[85],"assurance.":[87],"The":[88],"paper":[89],"presents":[90],"analysis":[94],"methods":[97,143],"practices":[99,124],"adopted":[100,144],"countries":[102,128],"posture":[105,120,148],"assessment":[106,121],"generating":[108],"assurance":[109,123],"implemented":[112,125],"measures.":[114],"In":[115],"this":[116],"paper,":[117],"37":[127],"are":[129],"studied":[130],"an":[132],"objective":[133],"understanding":[135],"global":[137],"scenario":[138],"identification":[140],"different":[142],"assessment.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
