{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:31:00Z","timestamp":1725985860804},"reference-count":17,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2019,11,2]]},"DOI":"10.1080\/19393555.2019.1689318","type":"journal-article","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T06:42:27Z","timestamp":1573713747000},"page":"164-177","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context"],"prefix":"10.1080","volume":"28","author":[{"given":"Ashutosh","family":"Bahuguna","sequence":"first","affiliation":[{"name":"Uttarakhand Technical University, Dehradun and Scientist \u2013 Indian Computer Emergency Response Team, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. K.","family":"Bisht","sequence":"additional","affiliation":[{"name":"School of Computing, Graphic Era Hill University, Dehradun, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeetendra","family":"Pande","sequence":"additional","affiliation":[{"name":"School of Computer Science & IT, Uttarakhand Open University, Haldwani, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"CIT0001","unstructured":"Ahmad, A., 2016. PhD thesis A cyber exercise post assessment framework: In Malaysia perspectives: University of Glasgow."},{"key":"CIT0002","unstructured":"Cooper, D. R. & Schindler, P. (2014). Business research methods (pp. 384\u2013391). New York, NY, USA: McGraw-hill Education."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"CIT0004","volume-title":"Cyber power index: Findings and methodology","author":"Hamilton B. A.","year":"2011"},{"key":"CIT0005","volume-title":"Cyber Readiness Index 2.0","author":"Hathaway M.","year":"2015"},{"key":"CIT0006","unstructured":"Indian Computer Emergency Response Team, (2017, September 13). CERT-In. Retrieved from: http:\/\/www.cert-in.org.in"},{"key":"CIT0007","volume-title":"Global Cybersecurity Index (GCI) 2017","author":"International Telecommunication Union (ITU)","year":"2017"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.21236\/ADA421664"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655090"},{"key":"CIT0010","unstructured":"Ministry of Electronics & Information Technology, Government of India (2019, Nov. 09). Information Technology Act 2000. Retrieved from https:\/\/meity.gov.in\/content\/information-technology-act-2000-0."},{"key":"CIT0011","volume-title":"National cyber security policy","author":"Ministry of Electronics and IT","year":"2013"},{"key":"CIT0012","volume-title":"What is WANNACRY\/WANACRYPT0R?","author":"National Cybersecurity and Communications Integration","year":"2017"},{"key":"CIT0013","unstructured":"National Cyber Security Policy-(2013), Web link: https:\/\/nciipc.gov.in\/documents\/National_Cyber_Security_Policy-2013.pdf"},{"key":"CIT0014","volume-title":"Payment Card Industry (PCI) data security standard","author":"PCI Security Standards Council","year":"2016"},{"key":"CIT0015","unstructured":"Sedgewick, A. (2014). Retrieved from Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0: https:\/\/www.nist.gov\/publications\/framework-improving-critical-infrastructure-cybersecurity-version\u201310"},{"key":"CIT0016","unstructured":"UK Government. (n.d.) cyber essentials. [Online] Retrieved from: http:\/\/www.cyberessentials.org\/"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.60"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2019.1689318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T14:22:31Z","timestamp":1608214951000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2019.1689318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"references-count":17,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11,2]]}},"alternative-id":["10.1080\/19393555.2019.1689318"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2019.1689318","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}