{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:30:24Z","timestamp":1764588624944,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813245"},{"type":"electronic","value":"9783031813252"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81325-2_12","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:07:35Z","timestamp":1740409655000},"page":"166-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Comparative Evaluation of Cybersecurity Maturity Models and Frameworks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5462-2489","authenticated-orcid":false,"given":"Konstantinos","family":"Papachristofis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4361-4032","authenticated-orcid":false,"given":"Georgios","family":"Vardoulias","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8625-6290","authenticated-orcid":false,"given":"Konstantinos","family":"Vavousis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"12_CR1","unstructured":"National Cyber Security Centre (NCSC) Annual Review 2023"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1504\/IJBIS.2020.106800","volume":"34","author":"DP Dube","year":"2020","unstructured":"Dube, D.P., Mohanty, R.P.: Towards development of a cyber security capability maturity model. Int. J. Business Information Systems 34(1), 104\u2013127 (2020)","journal-title":"Int. J. Business Information Systems"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Anass Rabii, M., Saliha, A., Khadija, O.T., Ounsa, R.: Information and cyber security maturity models: a systematic literature review. (2020)","DOI":"10.1108\/ICS-03-2019-0039"},{"key":"12_CR4","unstructured":"Victor, E.K., Mbanaso, U.M., Gloria, C.: Cybersecurity resilience maturity assessment model for Critical National Information Infrastructure. (2021)"},{"key":"12_CR5","unstructured":"\u201cThe Directive on Security of Network and Information Systems (NIS Directive): Directive (EU) 2016\/1148 of the European Parliament and of the Council (2016)"},{"key":"12_CR6","unstructured":"Adamu, A.G., et. al.: An Explanatory Review on Cybersecurity Capability Maturity Models. (2020)"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Rea-Guaman, A.M., et al.: Comparative Study of Cybersecurity Capability Maturity Models. In: Antonia, M., Antoni, M., O'Connor, R.V., Terry, R., Alec, D., (eds.), Software Process Improvement and Capability Determination, pp. 100-113. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67383-7_8","DOI":"10.1007\/978-3-319-67383-7_8"},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"225","DOI":"10.30630\/joiv.4.4.482","volume":"4","author":"S Diah","year":"2020","unstructured":"Diah, S., et al.: Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO\/IEC 27002 and PCI DSS. JOIV\u202f: International Journal on Informatics Visualization 4(4), 225\u2013230 (2020)","journal-title":"JOIV : International Journal on Informatics Visualization"},{"key":"12_CR9","unstructured":"ISACA: COBIT 5 for Information Security"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Souha\u00efl, E., El Houssa\u00efni, et al.: CAT5: A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework. International Journal of Advanced Computer Science and Applications 7(2), 070253 (2016)","DOI":"10.14569\/IJACSA.2016.070253"},{"key":"12_CR11","unstructured":"NIST: Cybersecurity Framework v1.1. (2014)"},{"issue":"3","key":"12_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.5121\/csit.2017.70305","volume":"7","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi, S., Alsaleh, M.: Information security maturity model for NIST cyber security framework. Computer Science & Information Technology (CS & IT) 7(3), 51\u201362 (2017)","journal-title":"Computer Science & Information Technology (CS & IT)"},{"key":"12_CR13","unstructured":"Cybersecurity Framework: ver. 1.1., NIST, USA (2018)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"NIST: Cybersecurity Framework v2.0. concept paper (draft), (2023)","DOI":"10.6028\/NIST.SP.1305"},{"key":"12_CR15","unstructured":"EU Cybersecurity Act: Regulation (EU) 2019\/881 of the European Parliament and of the Council of 17 April 2019 (2019)"},{"key":"12_CR16","unstructured":"Regulation (Eu) 2016\/679 Of The European Parliament And Of The Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016)"},{"key":"12_CR17","unstructured":"NIST: Framework for Improving Critical Infrastructure Cybersecurity ver1.1, (2018)"},{"key":"12_CR18","unstructured":"Cybersecurity Capability Maturity Model (C2M2) Ver2.1, (2022)"},{"key":"12_CR19","unstructured":"ISO\/IEC 27001: Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Requirements. (2013)"},{"key":"12_CR20","unstructured":"ISO\/IEC 27001: Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Requirements (2022)"},{"key":"12_CR21","unstructured":"Bodeau, D.J., et al.: MITRE Cyber Resiliency Metrics, Measures of Effectiveness, and Scoring. (2018)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"dos Santos-Neto, J., et. al.: Enterprise maturity models: a systematic literature review (2019)","DOI":"10.1080\/17517575.2019.1575986"},{"issue":"3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1504\/IJBIS.2021.119431","volume":"38","author":"DP Dube","year":"2021","unstructured":"Dube, D.P., Mohanty, R.P.: The application of cyber security capability maturity model to identify the impact of internal efficiency factors on the external effectiveness of cyber security. Int. J. Business Information Systems 38(3), 367\u2013392 (2021)","journal-title":"Int. J. Business Information Systems"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Mazlina, Z., et al.: Organisational Information Security Management Maturity Model. International Journal of Advanced Computer Science and Applications 12(9) (2021)","DOI":"10.14569\/IJACSA.2021.0120974"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81325-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:07:42Z","timestamp":1740409662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81325-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813245","9783031813252"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81325-2_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}