{"id":"https://openalex.org/W2921855430","doi":"https://doi.org/10.1109/istel.2018.8661018","title":"A New Adaptive Cyber-security Capability Maturity Model","display_name":"A New Adaptive Cyber-security Capability Maturity Model","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2921855430","doi":"https://doi.org/10.1109/istel.2018.8661018","mag":"2921855430"},"language":"en","primary_location":{"id":"doi:10.1109/istel.2018.8661018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istel.2018.8661018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th International Symposium on Telecommunications (IST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066289822","display_name":"Fariba Ghaffari","orcid":"https://orcid.org/0000-0003-2785-9950"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Fariba Ghaffari","raw_affiliation_strings":["Tarbait Modares University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Tarbait Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004249245","display_name":"Abouzar Arabsorkhi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102178","display_name":"ICT Research Institute","ror":"https://ror.org/01a3g2z22","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210102178"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Abouzar Arabsorkhi","raw_affiliation_strings":["Iran Telecommunication Center, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Iran Telecommunication Center, Tehran, Iran","institution_ids":["https://openalex.org/I4210102178"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066289822"],"corresponding_institution_ids":["https://openalex.org/I1516879"],"apc_list":null,"apc_paid":null,"fwci":1.1781,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.86538558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"298","last_page":"304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/capability-maturity-model","display_name":"Capability Maturity Model","score":0.8786509037017822},{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.8735712766647339},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.6069182753562927},{"id":"https://openalex.org/keywords/service-integration-maturity-model","display_name":"Service Integration Maturity Model","score":0.5884912610054016},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5738545060157776},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5659360885620117},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5280029773712158},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5097259879112244},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5039648413658142},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48030394315719604},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.44993308186531067},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.38074928522109985},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3559436798095703},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.33258387446403503},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2966630458831787},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12878993153572083},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08336418867111206}],"concepts":[{"id":"https://openalex.org/C85890633","wikidata":"https://www.wikidata.org/wiki/Q929673","display_name":"Capability Maturity Model","level":3,"score":0.8786509037017822},{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.8735712766647339},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.6069182753562927},{"id":"https://openalex.org/C73890322","wikidata":"https://www.wikidata.org/wiki/Q7455693","display_name":"Service Integration Maturity Model","level":4,"score":0.5884912610054016},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5738545060157776},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5659360885620117},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5280029773712158},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5097259879112244},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5039648413658142},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48030394315719604},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.44993308186531067},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.38074928522109985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3559436798095703},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.33258387446403503},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2966630458831787},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12878993153572083},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08336418867111206},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/istel.2018.8661018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istel.2018.8661018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th International Symposium on Telecommunications (IST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W133626225","https://openalex.org/W1530267349","https://openalex.org/W1539987097","https://openalex.org/W1566014294","https://openalex.org/W2003542868","https://openalex.org/W2128910927","https://openalex.org/W2168647144","https://openalex.org/W2498029175","https://openalex.org/W2619045612","https://openalex.org/W2789825598","https://openalex.org/W2974720746","https://openalex.org/W6605443016","https://openalex.org/W6723969745"],"related_works":["https://openalex.org/W2806063704","https://openalex.org/W2889844859","https://openalex.org/W2530870121","https://openalex.org/W3175617745","https://openalex.org/W2912268755","https://openalex.org/W2992877076","https://openalex.org/W797518012","https://openalex.org/W2734763330","https://openalex.org/W2961659353","https://openalex.org/W4384822944"],"abstract_inverted_index":{"One":[0],"of":[1,5,74,79,102,107,111,124,143,168],"the":[2,18,27,37,55,60,72,92,100,108,114,122,128,141,164],"key":[3],"indicators":[4],"success":[6],"in":[7,11],"deploying":[8],"business":[9],"processes":[10],"organizations":[12,131],"is":[13,40,84,95,127],"to":[14,17,32,98,120,134,162],"pay":[15],"attention":[16],"organization's":[19,103],"current":[20,56],"status":[21],"and":[22,35,45,62,146,153],"its":[23],"proper":[24],"targeting":[25],"for":[26,66,166],"future.":[28],"As":[29],"our":[30],"need":[31],"continuous":[33,44],"planning":[34],"improvement,":[36],"maturity":[38,69,93,151],"model":[39,51,70,94],"presented":[41],"as":[42,86],"a":[43,87,90,159],"level-based":[46],"performance":[47],"evaluation":[48,167],"tool.":[49],"This":[50],"shows":[52],"not":[53,89],"only":[54],"situation,":[57],"but":[58],"also":[59,96],"closest":[61],"most":[63],"desirable":[64],"situation":[65],"managers.":[67],"Also,":[68],"determines":[71],"amount":[73],"progress":[75],"based":[76,139],"on":[77,140],"set":[78],"specific":[80],"criteria.":[81],"Since":[82],"security":[83,126,145],"known":[85],"process":[88],"product,":[91],"used":[97,119],"measure":[99],"level":[101,123],"security.":[104],"Today,":[105],"because":[106],"growing":[109],"importance":[110],"security,":[112],"identifying":[113],"factors":[115],"that":[116,130],"can":[117],"be":[118],"assess":[121],"cyber":[125],"ability":[129],"are":[132],"trying":[133],"achieve.":[135],"In":[136],"this":[137],"paper,":[138],"conditions":[142],"information":[144],"technology":[147],"maturity,":[148],"examining":[149],"different":[150],"models":[152],"reviewing":[154],"content":[155],"literature,":[156],"we":[157],"propose":[158],"comprehensive":[160],"framework":[161],"defining":[163],"criteria":[165],"organizational":[169],"maturity.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
