{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:04:22Z","timestamp":1774364662404,"version":"3.50.1"},"reference-count":75,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002913","name":"Government of Flanders","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002913","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.cose.2026.104868","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T00:05:34Z","timestamp":1771891534000},"page":"104868","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cybersecurity maturity of Flemish firms: drivers and consequences"],"prefix":"10.1016","volume":"165","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4624-4353","authenticated-orcid":false,"given":"Thomas","family":"Standaert","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7274-7432","authenticated-orcid":false,"given":"Tom","family":"Evens","sequence":"additional","affiliation":[]},{"given":"Petra","family":"Andries","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2026.104868_bib0001","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.bushor.2019.03.010","article-title":"Muddling through cybersecurity: insights from the U.S. healthcare industry","volume":"62","author":"Abraham","year":"2019","journal-title":"Bus. Horiz."},{"key":"10.1016\/j.cose.2026.104868_bib0002","unstructured":"Accenture, 2025. State of cybersecurity resilience 2025: elevate your cybersecurity to fit an AI-driven world. Available at https:\/\/www.accenture.com\/content\/dam\/accenture\/final\/accenture-com\/document-3\/State-of-Cybersecurity-report.pdf."},{"key":"10.1016\/j.cose.2026.104868_bib0003","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1108\/MD-09-2018-0973","article-title":"The adoption of Industry 4.0 technologies in SMEs: results of an international study","volume":"58","author":"Agostini","year":"2020","journal-title":"Manag. Decis."},{"key":"10.1016\/j.cose.2026.104868_bib0004","series-title":"Proceedings of the Cyber Risks and the Boardroom Conference","article-title":"Boards of directors, corporate governance and cyber-risks: sharpening the focus","author":"Aguilar","year":"2014"},{"key":"10.1016\/j.cose.2026.104868_bib0005","unstructured":"Anant, V., Glynn, M., Greis, J., Kosturos, N., Kristensen, I., Lewis, C., Santos, L., 2022. Securing your organization by recruiting, hiring, and retaining cybersecurity talent to reduce cyberrisk."},{"key":"10.1016\/j.cose.2026.104868_bib0006","doi-asserted-by":"crossref","first-page":"893","DOI":"10.25300\/MISQ\/2017\/41.3.10","article-title":"When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches","volume":"41","author":"Angst","year":"2017","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104868_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.techfore.2020.120420","article-title":"Role of institutional pressures and resources in the adoption of big data analytics powered artificial intelligence, sustainable manufacturing practices and circular economy capabilities","volume":"163","author":"Bag","year":"2021","journal-title":"Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.cose.2026.104868_bib0008","doi-asserted-by":"crossref","first-page":"3849","DOI":"10.1007\/s10462-020-09942-2","article-title":"Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities","volume":"54","author":"B\u00e9cue","year":"2021","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.cose.2026.104868_bib0009","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1057\/gpp.2014.19","article-title":"Insurability of cyber risk: an empirical analysis","volume":"40","author":"Biener","year":"2015","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"key":"10.1016\/j.cose.2026.104868_bib0010","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/j.jaccpubpol.2018.10.004","article-title":"Cybersecurity insurance and risk-sharing","volume":"37","author":"Bodin","year":"2018","journal-title":"J. Account. Public Policy"},{"key":"10.1016\/j.cose.2026.104868_bib0011","unstructured":"B\u00f6hme, R., Schwartz, G., 2010. Modeling Cyber-insurance: towards a unifying framework, Workshop on the Economics of Information Security."},{"key":"10.1016\/j.cose.2026.104868_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.techfore.2025.123996","article-title":"Cybersecurity maturity model: systematic literature review and a proposed model","volume":"213","author":"B\u00fcy\u00fck\u00f6zkan","year":"2025","journal-title":"Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.cose.2026.104868_bib0013","first-page":"36","article-title":"Explore success factors that impact artificial intelligence adoption on telecom industry in China","volume":"8","author":"Chen","year":"2021","journal-title":"J. Manag. Anal."},{"key":"10.1016\/j.cose.2026.104868_bib0014","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.procs.2021.12.012","article-title":"Factors affecting cloud ERP adoption decisions in organizations","volume":"196","author":"Christiansen","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.cose.2026.104868_bib0015","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1108\/IMDS-08-2018-0365","article-title":"Investigating the influence of organizational factors on blockchain adoption","volume":"119","author":"Clohessy","year":"2019","journal-title":"Ind. Manag. Data Syst."},{"key":"10.1016\/j.cose.2026.104868_bib0016","doi-asserted-by":"crossref","first-page":"569","DOI":"10.2307\/2233763","article-title":"Innovation and learning: the two faces of R & D","volume":"99","author":"Cohen","year":"1989","journal-title":"Econ. J."},{"key":"10.1016\/j.cose.2026.104868_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2019.103165","article-title":"Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts","volume":"114","author":"Corallo","year":"2020","journal-title":"Comput. Ind."},{"key":"10.1016\/j.cose.2026.104868_bib0018","series-title":"Proceedings of the Workshop on Governance of Technology, Information and Policies","first-page":"35","article-title":"Information security governance: integrating security into the organizational culture","author":"Corriss","year":"2010"},{"key":"10.1016\/j.cose.2026.104868_bib0019","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.jfineco.2022.12.002","article-title":"Pirates without borders: the propagation of cyberattacks through firms\u2019 supply chains","volume":"147","author":"Crosignani","year":"2023","journal-title":"J. Financ. Econ."},{"key":"10.1016\/j.cose.2026.104868_bib0020","unstructured":"CrowdStrike, 2025. 2025 Global threat report. Available at https:\/\/www.crowdstrike.com\/en-us\/global-threat-report\/."},{"key":"10.1016\/j.cose.2026.104868_bib0021","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104868_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101747","article-title":"A comprehensive model of information security factors for decision-makers","volume":"92","author":"Diesch","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104868_bib0023","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11187-023-00803-0","article-title":"Should firms invest more in cybersecurity?","volume":"63","author":"Dinkova","year":"2024","journal-title":"Small Bus. Econ."},{"key":"10.1016\/j.cose.2026.104868_bib0024","first-page":"12179","volume":"50","author":"Dom\u00ednguez","year":"2017"},{"key":"10.1016\/j.cose.2026.104868_bib0025","doi-asserted-by":"crossref","first-page":"C1","DOI":"10.2308\/ciia-52419","article-title":"Accounting and cybersecurity risk management","volume":"13","author":"Eaton","year":"2019","journal-title":"Curr. Issues Audit."},{"key":"10.1016\/j.cose.2026.104868_bib0026","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1108\/JRF-09-2016-0122","article-title":"What do we know about cyber risk and cyber risk insurance?","volume":"17","author":"Eling","year":"2016","journal-title":"J. Risk Finance"},{"key":"10.1016\/j.cose.2026.104868_bib0027","first-page":"32","article-title":"Offering security diagnosis as a service for cloud SaaS applications","volume":"44","author":"Elsayed","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.cose.2026.104868_bib0028","unstructured":"ENISA, 2025. ENISA threat landscape 2025. Available at https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA\/20Threat\/20Landscape\/202025.pdf."},{"key":"10.1016\/j.cose.2026.104868_bib0029","series-title":"ICT Security in Enterprises: Statistics Explained","year":"2024"},{"key":"10.1016\/j.cose.2026.104868_bib0030","series-title":"ICT Usage in Enterprises (isoc_e)","year":"2024"},{"key":"10.1016\/j.cose.2026.104868_bib0031","article-title":"Stakeholder perspectives and requirements on cybersecurity in Europe","volume":"61","author":"Fischer-H\u00fcbner","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.cose.2026.104868_bib0032","unstructured":"FortiGuard, L., 2025. 2025 Fortinet global threat landscape report. Available at https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/threat-landscape-report-2025.pdf."},{"key":"10.1016\/j.cose.2026.104868_bib0033","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/S0148-2963(00)00152-1","article-title":"Organizational innovation adoption: a multi-level framework of determinants and opportunities for future research","volume":"55","author":"Frambach","year":"2002","journal-title":"J. Bus. Res."},{"key":"10.1016\/j.cose.2026.104868_bib0034","series-title":"Proceedings of the Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021","first-page":"116","article-title":"The cost of incidents in essential services-data from Swedish NIS","author":"Franke","year":"2022"},{"key":"10.1016\/j.cose.2026.104868_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102840","article-title":"Governing cybersecurity from the boardroom: challenges, drivers, and ways ahead","volume":"121","author":"Gale","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104868_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103380","article-title":"Empirically evaluating the effect of security precautions on cyber incidents","volume":"133","author":"Gandal","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104868_bib0037","series-title":"Gartner Says Cybersecurity Risk Set to Be a Primary Buying Consideration For Chief Supply Chain Officers","year":"2023"},{"key":"10.1016\/j.cose.2026.104868_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.techsoc.2023.102301","article-title":"Intelligent automation implementation and corporate sustainability performance: the enabling role of corporate social responsibility strategy","volume":"74","author":"Ghobakhloo","year":"2023","journal-title":"Technol. Soc."},{"key":"10.1016\/j.cose.2026.104868_bib0039","doi-asserted-by":"crossref","first-page":"203","DOI":"10.2753\/MIS0742-1222280208","article-title":"Understanding nonmalicious security violations in the workplace: a composite behavior model","volume":"28","author":"Guo","year":"2011","journal-title":"J. Manag. Inf. Syst."},{"key":"10.1016\/j.cose.2026.104868_bib0040","series-title":"Multivariate Data Analysis","author":"Hair","year":"2009"},{"key":"10.1016\/j.cose.2026.104868_bib0041","article-title":"Evaluating the cyber security readiness of organizations and its influence on performance","volume":"58","author":"Hasan","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.cose.2026.104868_bib0042","first-page":"1","article-title":"Cybersecurity's impact on customer experience: an analysis of data breaches and trust erosion","volume":"15","author":"Hassan","year":"2023","journal-title":"Emerg. Trends Mach. Intell. Big Data"},{"key":"10.1016\/j.cose.2026.104868_bib0043","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.techfore.2019.05.021","article-title":"Driving forces and barriers of Industry 4.0: do multinational and small and medium-sized companies have equal opportunities?","volume":"146","author":"Horv\u00e1th","year":"2019","journal-title":"Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.cose.2026.104868_bib0044","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1287\/isre.1110.0393","article-title":"Institutional influences on information systems security innovations","volume":"23","author":"Hsu","year":"2012","journal-title":"Inf. Syst. Res."},{"key":"10.1016\/j.cose.2026.104868_bib0045","unstructured":"Kaminski, P., Rezek, C., Richter, W., Sorel, M., 2017. Protecting your critical digital assets: not all systems and data are created equal. McKinsey & Company, Business Technology Office."},{"key":"10.1016\/j.cose.2026.104868_bib0046","unstructured":"Kenny, D.A., 2016. Multiple latent variable models: confirmatory factor analysis, Available at http:\/\/davidakenny.net\/cm\/mfactor.htm."},{"key":"10.1016\/j.cose.2026.104868_bib0047","series-title":"Fundamentals of Information Systems Security","author":"Kim","year":"2016"},{"key":"10.1016\/j.cose.2026.104868_bib0048","series-title":"Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI)","first-page":"716","article-title":"Developing cybersecurity workforce: introducing CyberSec labs for industry standard cybersecurity training","author":"Kose","year":"2021"},{"key":"10.1016\/j.cose.2026.104868_bib0049","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1108\/JBS-06-2020-0116","article-title":"Cybersecurity: investing for competitive outcomes","volume":"43","author":"Kosutic","year":"2022","journal-title":"J. Bus. Strategy"},{"key":"10.1016\/j.cose.2026.104868_bib0050","doi-asserted-by":"crossref","first-page":"451","DOI":"10.25300\/MISQ\/2014\/38.2.06","article-title":"Proactive versus reactive security investments in the healthcare sector","volume":"38","author":"Kwon","year":"2014","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104868_bib0051","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.compind.2018.09.004","article-title":"Cybersecurity for Industry 4.0 in the current literature: a reference framework","volume":"103","author":"Lezzi","year":"2018","journal-title":"Comput. Ind."},{"key":"10.1016\/j.cose.2026.104868_bib0052","first-page":"28","article-title":"An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital","volume":"34","author":"Lian","year":"2014","journal-title":"Int. J. Inf. Manage"},{"key":"10.1016\/j.cose.2026.104868_bib0053","article-title":"Big data analytics adoption: determinants and performances among small to medium-sized enterprises","volume":"54","author":"Maroufkhani","year":"2020","journal-title":"Int. J. Inf. Manage"},{"key":"10.1016\/j.cose.2026.104868_bib0054","series-title":"South African Computer Science and Information Systems Research Trends","first-page":"374","article-title":"Cybersecurity as a competitive advantage for entrepreneurs","author":"Mmango","year":"2024"},{"key":"10.1016\/j.cose.2026.104868_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104674","article-title":"Identifying key factors of cybersecurity readiness in organizations: insights from Malaysian critical infrastructure","volume":"159","author":"Mohamed Noor","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104868_bib0056","series-title":"Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions","author":"Mowbray","year":"2013"},{"key":"10.1016\/j.cose.2026.104868_bib0057","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/s12525-020-00442-3","article-title":"The adoption of artificial intelligence and robotics in the hotel industry: prospects and challenges","volume":"31","author":"Nam","year":"2021","journal-title":"Electron. Mark."},{"key":"10.1016\/j.cose.2026.104868_bib0058","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1016\/j.jcorpfin.2004.01.001","article-title":"Replacement versus adaptation investments and equity value","volume":"11","author":"Nwaeze","year":"2005","journal-title":"J. Corp. Finance"},{"key":"10.1016\/j.cose.2026.104868_bib0059","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103507","article-title":"Informing cybersecurity strategic commitment through top management perceptions: the role of institutional pressures","volume":"58","author":"Ogbanufe","year":"2021","journal-title":"Inf. Manag."},{"key":"10.1016\/j.cose.2026.104868_bib0060","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","article-title":"Improving employees' compliance through information systems security training: an action research study","volume":"34","author":"Puhakainen","year":"2010","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104868_bib0061","unstructured":"Sobers, R., 2024. 157 Cybersecurity statistics and trends [updated 2024]."},{"key":"10.1016\/j.cose.2026.104868_bib0062","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","article-title":"User participation in information systems security risk management","volume":"34","author":"Spears","year":"2010","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104868_bib0063","series-title":"Strengthening Industrial Cybersecurity to Protect Business Intelligence","first-page":"1","article-title":"Cybersecurity: protecting Information in a digital world","author":"Srisakthi","year":"2024"},{"key":"10.1016\/j.cose.2026.104868_bib0064","series-title":"Guide to Operational Technology (OT) Security. Special Publication (NIST SP)","author":"Stouffer","year":"2023"},{"key":"10.1016\/j.cose.2026.104868_bib0065","series-title":"The Processes of Technological Innovation","author":"Tornatzky","year":"1990"},{"key":"10.1016\/j.cose.2026.104868_bib0066","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1108\/ICS-06-2017-0042","article-title":"Strategic value alignment for information security management: a critical success factor analysis","volume":"26","author":"Tu","year":"2018","journal-title":"Inf. Comput. Secur."},{"key":"10.1016\/j.cose.2026.104868_bib0067","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1108\/BPMJ-10-2019-0411","article-title":"Influence of artificial intelligence (AI) on firm performance: the business value of AI-based transformation projects","volume":"26","author":"Wamba-Taguimdje","year":"2020","journal-title":"Bus. Process Manag. J."},{"key":"10.1016\/j.cose.2026.104868_bib0068","doi-asserted-by":"crossref","DOI":"10.1016\/j.digbus.2021.100014","article-title":"Understanding incentives for cybersecurity investments: development and application of a typology","volume":"1","author":"Wessels","year":"2021","journal-title":"Digital Bus."},{"key":"10.1016\/j.cose.2026.104868_bib0069","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1111\/padm.12773","article-title":"Seeding the cloud: consultancy services in the nascent field of cyber capacity building","volume":"100","author":"Willers","year":"2022","journal-title":"Public Adm."},{"key":"10.1016\/j.cose.2026.104868_bib0070","series-title":"Proceedings of the 17th International Business Information Management Association (IBIMA)","first-page":"1","article-title":"The importance of governance and culture on strategic information security","author":"Williams","year":"2011"},{"key":"10.1016\/j.cose.2026.104868_bib0071","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1080\/23738871.2017.1360927","article-title":"Policy measures and cyber insurance: a framework","volume":"2","author":"Woods","year":"2017","journal-title":"J. Cyber Policy"},{"key":"10.1016\/j.cose.2026.104868_bib0072","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.tourman.2017.11.012","article-title":"Predicting determinants of hotel success and development using Structural Equation Modelling (SEM)-ANFIS method","volume":"66","author":"Yadegaridehkordi","year":"2018","journal-title":"Tour. Manage"},{"key":"10.1016\/j.cose.2026.104868_bib0073","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.techfore.2018.02.003","article-title":"Critical success factors for adoption of 3D printing","volume":"132","author":"Yeh","year":"2018","journal-title":"Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.cose.2026.104868_bib0074","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102724","article-title":"A systematic synthesis of critical success factors for cybersecurity","volume":"118","author":"Yeoh","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104868_bib0075","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.ijmedinf.2007.08.011","article-title":"An evaluation framework for Health Information Systems: human, organization and technology-fit factors (HOT-fit)","volume":"77","author":"Yusof","year":"2008","journal-title":"Int. J. Med. Inform."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000441?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000441?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T14:18:27Z","timestamp":1774361907000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404826000441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":75,"alternative-id":["S0167404826000441"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2026.104868","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cybersecurity maturity of Flemish firms: drivers and consequences","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2026.104868","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104868"}}