{"id":"https://openalex.org/W2982346827","doi":"https://doi.org/10.1109/nextcomp.2019.8883535","title":"An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review","display_name":"An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2982346827","doi":"https://doi.org/10.1109/nextcomp.2019.8883535","mag":"2982346827"},"language":"en","primary_location":{"id":"doi:10.1109/nextcomp.2019.8883535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nextcomp.2019.8883535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Conference on Next Generation Computing Applications (NextComp)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076649340","display_name":"Khangwelo Muronga","orcid":"https://orcid.org/0000-0002-7183-1069"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Khangwelo Muronga","raw_affiliation_strings":["School of Computing, College of Science, Engineering and Technology, University of South Africa, Tshwane, South Africa"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Science, Engineering and Technology, University of South Africa, Tshwane, South Africa","institution_ids":["https://openalex.org/I165390105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091054643","display_name":"Marlein Herselman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marlein Herselman","raw_affiliation_strings":["Next Generation Enterprises and Institutions, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Next Generation Enterprises and Institutions, Pretoria, South Africa","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079276848","display_name":"Ad\u00e9le Botha","orcid":"https://orcid.org/0000-0002-1147-1380"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adele Botha","raw_affiliation_strings":["Next Generation Enterprises and Institutions, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Next Generation Enterprises and Institutions, Pretoria, South Africa","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044951113","display_name":"Ad\u00e9le da Veiga","orcid":"https://orcid.org/0000-0001-9777-8721"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Adele Da Veiga","raw_affiliation_strings":["School of Computing, College of Science, Engineering and Technology, University of South Africa, Tshwane, South Africa"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Science, Engineering and Technology, University of South Africa, Tshwane, South Africa","institution_ids":["https://openalex.org/I165390105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076649340"],"corresponding_institution_ids":["https://openalex.org/I165390105"],"apc_list":null,"apc_paid":null,"fwci":0.6783,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.78865189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.8199821710586548},{"id":"https://openalex.org/keywords/capability-maturity-model","display_name":"Capability Maturity Model","score":0.6951082944869995},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6632227897644043},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6225969195365906},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5567637085914612},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5524876117706299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47153717279434204},{"id":"https://openalex.org/keywords/gap-analysis","display_name":"Gap analysis (conservation)","score":0.42129766941070557},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.34965917468070984},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3371455669403076},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1857319176197052},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09302213788032532},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08103689551353455}],"concepts":[{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.8199821710586548},{"id":"https://openalex.org/C85890633","wikidata":"https://www.wikidata.org/wiki/Q929673","display_name":"Capability Maturity Model","level":3,"score":0.6951082944869995},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6632227897644043},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6225969195365906},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5567637085914612},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5524876117706299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47153717279434204},{"id":"https://openalex.org/C2779977028","wikidata":"https://www.wikidata.org/wiki/Q1493813","display_name":"Gap analysis (conservation)","level":3,"score":0.42129766941070557},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.34965917468070984},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3371455669403076},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1857319176197052},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09302213788032532},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08103689551353455},{"id":"https://openalex.org/C130217890","wikidata":"https://www.wikidata.org/wiki/Q47041","display_name":"Biodiversity","level":2,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nextcomp.2019.8883535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nextcomp.2019.8883535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Conference on Next Generation Computing Applications (NextComp)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":79,"referenced_works":["https://openalex.org/W11088508","https://openalex.org/W137689262","https://openalex.org/W1516142278","https://openalex.org/W1522638377","https://openalex.org/W1534698610","https://openalex.org/W1567460507","https://openalex.org/W1641670073","https://openalex.org/W1863559378","https://openalex.org/W1903961850","https://openalex.org/W1970809283","https://openalex.org/W1974991139","https://openalex.org/W1979326769","https://openalex.org/W1983436120","https://openalex.org/W1987463984","https://openalex.org/W1995562058","https://openalex.org/W1996190548","https://openalex.org/W2001791196","https://openalex.org/W2002356434","https://openalex.org/W2003676537","https://openalex.org/W2012714294","https://openalex.org/W2017836055","https://openalex.org/W2029699977","https://openalex.org/W2030593876","https://openalex.org/W2030900365","https://openalex.org/W2044689761","https://openalex.org/W2055154488","https://openalex.org/W2058464881","https://openalex.org/W2065991300","https://openalex.org/W2068264290","https://openalex.org/W2071088326","https://openalex.org/W2074572600","https://openalex.org/W2075950485","https://openalex.org/W2081046118","https://openalex.org/W2082765746","https://openalex.org/W2083829472","https://openalex.org/W2086902678","https://openalex.org/W2087142541","https://openalex.org/W2091538045","https://openalex.org/W2110004046","https://openalex.org/W2110006972","https://openalex.org/W2111173506","https://openalex.org/W2114694198","https://openalex.org/W2119054568","https://openalex.org/W2142266459","https://openalex.org/W2144205856","https://openalex.org/W2148259798","https://openalex.org/W2167131774","https://openalex.org/W2214824317","https://openalex.org/W2272954987","https://openalex.org/W2316628866","https://openalex.org/W2413320545","https://openalex.org/W2475201703","https://openalex.org/W2513235682","https://openalex.org/W2524713590","https://openalex.org/W2557778508","https://openalex.org/W2579781957","https://openalex.org/W2597484800","https://openalex.org/W2606858076","https://openalex.org/W2610588201","https://openalex.org/W2617131032","https://openalex.org/W2735887463","https://openalex.org/W2737683981","https://openalex.org/W2740534380","https://openalex.org/W2743584090","https://openalex.org/W2743804473","https://openalex.org/W2753225097","https://openalex.org/W2756840615","https://openalex.org/W2757098988","https://openalex.org/W2768712154","https://openalex.org/W2780811731","https://openalex.org/W2793586190","https://openalex.org/W2916945671","https://openalex.org/W4285719527","https://openalex.org/W4299599126","https://openalex.org/W6600468049","https://openalex.org/W6671002441","https://openalex.org/W6742039808","https://openalex.org/W6745269598","https://openalex.org/W6747369057"],"related_works":["https://openalex.org/W2563825355","https://openalex.org/W4283172224","https://openalex.org/W2992877076","https://openalex.org/W4382725623","https://openalex.org/W2888066950","https://openalex.org/W2889844859","https://openalex.org/W3217511980","https://openalex.org/W2806063704","https://openalex.org/W4384822944","https://openalex.org/W2912268755"],"abstract_inverted_index":{"This":[0],"study":[1,26,91,125],"aimed":[2],"to":[3,37,72,86,103],"ascertain":[4],"the":[5,13,45,48,74,104,119,134,144,147,150],"types":[6],"of":[7,15,47,50,69,76,106,121,136,146],"approaches":[8],"that":[9,66,93,128],"are":[10,42,142],"applied":[11],"in":[12,44,98,133,149],"assessments":[14],"information":[16,51],"security":[17,52],"and":[18,22,53,57,113],"cybersecurity":[19,54],"user":[20,55],"awareness":[21,56],"training":[23,58],"programs.":[24,59,78,123],"The":[25,32,60,90,124],"focused":[27,35,63,117],"on":[28,36,64,118],"achieving":[29],"two":[30,114],"objectives.":[31,89],"first":[33],"objective":[34,62],"find":[38],"out":[39],"what":[40],"measurements":[41],"used":[43],"assessment":[46,105,120,135],"effectiveness":[49],"second":[61],"studies":[65,130],"made":[67],"use":[68,145],"maturity":[70,115],"models":[71,116],"measure":[73],"progress":[75],"these":[77,88,107,122,137],"A":[79],"Scoping":[80],"Literature":[81],"Review":[82],"process":[83],"was":[84],"followed":[85],"achieve":[87],"found":[92],"there":[94],"is":[95],"a":[96],"gap":[97],"current":[99],"literature":[100],"with":[101],"regards":[102],"programs,":[108,138],"as":[109,139],"only":[110],"five":[111],"papers":[112],"further":[126],"recommends":[127],"more":[129],"be":[131],"conducted":[132],"most":[140],"researchers":[141],"encouraging":[143],"programs":[148],"fight":[151],"against":[152],"cyber-attacks.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
