{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:04:00Z","timestamp":1774551840747,"version":"3.50.1"},"reference-count":71,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2020,9,2]]},"DOI":"10.1080\/19393555.2020.1767239","type":"journal-article","created":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T11:01:54Z","timestamp":1590145314000},"page":"250-266","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":14,"title":["Country-level cybersecurity posture assessment:Study and analysis of practices"],"prefix":"10.1080","volume":"29","author":[{"given":"Ashutosh","family":"Bahuguna","sequence":"first","affiliation":[{"name":"Scientist- Indian Computer Emergency Response Team, Ministry of Electronics and IT, Government of India, New Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. K.","family":"Bisht","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computing, Graphic Era Hill University, Dehradun, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeetendra","family":"Pande","sequence":"additional","affiliation":[{"name":"School of Computer Science & IT, Uttarakhand Open University, Haldwani, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2020,5,22]]},"reference":[{"key":"cit0001","unstructured":"Asia Pacific Computer Emergency Response Team (APCERT). (2017). APCERT media release. Retrieved May 30, 2017, from. www.apcert.org: http:\/\/www.apcert.org\/documents\/"},{"key":"cit0002","volume-title":"Public governance, performance and accountability act 2013","author":"Australian Government","year":"2013"},{"key":"cit0003","unstructured":"Australian Government. (2020, March 16). Department of Home Affairs: https:\/\/cybersecuritystrategy.homeaffairs.gov.au\/"},{"key":"cit0004","volume-title":"ASX 100 cyber health check report","author":"Australian Government, ASIC, KPMG, Deloitte, EY, Pwc.","year":"2017"},{"key":"cit0005","unstructured":"CERT Bulgaria. (2020, March 16). Home page. CERT Bulgaria. https:\/\/www.govcert.bg\/EN\/Pages\/default.aspx"},{"key":"cit0006","unstructured":"CERT-In. (2020, March 16). CERT-In. Indian Computer Emergency Response Team. https:\/\/www.cert-in.org.in\/"},{"key":"cit0007","volume-title":"Cybersecurity Malaysia","author":"Cybersecurity Malaysia","year":"2020"},{"key":"cit0008","unstructured":"Data Exchange Agency. (2020, March 14). Data exchange agency. https:\/\/dea.gov.ge\/?web=0&action=news_archive&p_num=8&lang=eng"},{"key":"cit0009","volume-title":"National cybersecurity plan 2022","author":"Department of Information and Communications Technology, Republic of the Philippines","year":"2019"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.2307\/249133"},{"key":"cit0011","volume-title":"Cyber power index","author":"Economist Intelligence Unit and Booz Allen Hamilton","year":"2011"},{"key":"cit0012","unstructured":"Egypt CERT - Home. (2020, March 15). Egypt CERT. https:\/\/www.egcert.eg\/"},{"key":"cit0013","unstructured":"ENISA. (2011). Hungary Country Report. European Union Agency for Cybersecurity."},{"key":"cit0014","volume-title":"Critical information infrastructures protection approaches in EU","author":"European Union Agency for Network and Information Security","year":"2015"},{"key":"cit0015","volume-title":"Report on national and international cyber security exercises","author":"European Union Agency for Network and Information Security","year":"2015"},{"key":"cit0016","unstructured":"European Union Agency for Network and Information Security (ENISA). (2016, October 20). Cyber Europe 2016. (ENISA) Retrieved May 30, 2017, from. www.enisa.europa.eu: https:\/\/www.enisa.europa.eu\/news\/enisa-news\/cyber-europe-2016"},{"key":"cit0017","volume-title":"The 2015 report on national and international cyber security exercises - survey, analysis and recommendations","author":"European Union Agency For Network And Information Security (ENISA)","year":"2015"},{"key":"cit0018","volume-title":"Cyber security report","author":"Federal Chancellery of the Republic of Austria","year":"2014"},{"key":"cit0019","volume-title":"The state of IT security in Germany","author":"Federal Office for Information Security (BSI)","year":"2018"},{"key":"cit0020","unstructured":"French Government. (2020, March 14). The French internet resilience observatory. French Government: The French Internet Resilience Observatory. https:\/\/www.ssi.gouv.fr\/en\/strategic-committee\/the-french-internet-resilience-observatory\/"},{"key":"cit0021","unstructured":"Government Communications Security Bureau. (2020). Annaul reports. New Zealand Government: https:\/\/www.gcsb.govt.nz\/publications\/annual-reports\/"},{"key":"cit0022","volume-title":"Public information act","author":"Government of Estonia","year":"2016"},{"key":"cit0023","volume-title":"Finland\u00b4s cyber security strategy","author":"Government of Finalnd","year":"2013"},{"key":"cit0024","volume-title":"National cybersecurity strategy","author":"Government of Kenya","year":"2014"},{"key":"cit0025","volume-title":"FTSE 350 cyber governance health check 2018","author":"Government of the United Kingdom","year":"2018"},{"key":"cit0026","volume-title":"CYBER READINESS INDEX 2.0","author":"Hathaway M.","year":"2015"},{"key":"cit0027","unstructured":"ICS-CERT. (n.d.). Home. Retrieved April 24, 2017, from. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT): https:\/\/ics-cert.us-cert.gov\/"},{"key":"cit0028","volume-title":"Annual report","author":"Indian Computer Emergency Response Team (CERT-In)","year":"2015"},{"key":"cit0029","unstructured":"International Telecommunication Union (ITU) and International Multilateral Partnership Against Cyber Threats (IMPACT). (2013). ITU-IMPACT ALERT. ITU."},{"key":"cit0030","volume-title":"ISO\/IEC TR 15443-1:2012","author":"ISO\/IEC","year":"2012"},{"key":"cit0031","unstructured":"ITU. (2013). cyberwellness profile mauritania. In ITU, Cyberwellness Profile. International Telecommunication Union."},{"key":"cit0032","volume-title":"Cybersecurity in Burkina Faso: Situation and initiatives","author":"ITU","year":"2014"},{"key":"cit0033","unstructured":"ITU. (2015c). Cyberwellness profile of Singapore."},{"key":"cit0034","unstructured":"ITU. (2015d). Cyberwellness profile of Turkey."},{"key":"cit0035","unstructured":"ITU. (2020a, March 16). https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/Oman-third-best-prepared-in-world-to-thwart-cyber-attacks.aspx"},{"key":"cit0036","unstructured":"ITU. (2020b, March 16). ITU ALERT (Applied Learning for Emergency Response Teams). ITU ALERT (Applied Learning for Emergency Response Teams). International Telecommunication Union: https:\/\/www.itu.int\/en\/ITU-D\/Regional-Presence\/Europe\/Pages\/Events\/2018\/CYBDRILL\/ITU-ALERT-Cyber-drill.aspx"},{"key":"cit0037","unstructured":"ITU. (n.d.). National strategies repository. Retrieved April 24, 2017, from. International Telecommunication Union: http:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/National-Strategies-repository.aspx"},{"key":"cit0038","volume-title":"Global cybersecurity index & cyberwellness profiles","author":"ITU, ABI Reserach","year":"2015"},{"key":"cit0039","volume-title":"Cyberwellness profile - United Kingdom","author":"ITU","year":"2015"},{"key":"cit0040","volume-title":"CyberWellness profile Austria","author":"ITU","year":"2015"},{"key":"cit0041","unstructured":"ITU-Impact. (n.d.). Cyberwellness Profile of Rwanda. International Telecommunication Union."},{"key":"cit0042","unstructured":"Korea Internet & Security Agency. (2008). national information security index. Retrieved May 2, 2017, from. https:\/\/www.itu.int\/ITU-D\/cyb\/events\/2008\/brisbane\/docs\/weon-national-information-security-index-brisbane-july-08.pdf"},{"key":"cit0043","unstructured":"Korea Internet and Security Agency. (n.d.). Korea internet and security agency. Retrieved May 30, 2017, from. http:\/\/www.kisa.or.kr"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01622-1_44"},{"key":"cit0045","volume-title":"Information technology act","author":"Ministry of Electronics and IT","year":"2000"},{"key":"cit0046","volume-title":"National cyber security policy","author":"Ministry of Electronics and IT","year":"2013"},{"key":"cit0047","unstructured":"Ministry of Electronics and IT. (2017). Annual Report 2016-2017."},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1145\/1509096.1509174"},{"key":"cit0049","unstructured":"National Computer Board. (2020, March 16). National computer board. National Computer Board. Government of mauritius: http:\/\/www.ncb.mu\/English\/News\/Pages\/National-Cybersecurity-Drill.aspx"},{"key":"cit0050","volume-title":"Cyber security assessment Netherlands","author":"National Coordinator for Security and Counterterrorism (NCTV)","year":"2019"},{"key":"cit0051","unstructured":"National Electronic Information Security Authority. (2019). NEISA. (National Electronic Information Security Authority) National electronic information security authority. Hungarian Government: Retrieved May 30, 2017, from. http:\/\/www.neih.gov.hu\/en"},{"key":"cit0052","volume-title":"Information security continuous monitoring (ISCM) for federal information systems and organizations","author":"National Institute of Standards and Technology (NIST)","year":"2011"},{"key":"cit0053","unstructured":"National Cyber Security Index, Republic of Korea. (2020, March 16) National cyber security index. National Cyber Security Index. Republic of Korea: https:\/\/ncsi.ega.ee\/country\/kr\/"},{"key":"cit0054","unstructured":"National Institute of Standards and Technology (NIST). (2020, March 16). National checklist program repository. National Vulnerablity Database. https:\/\/nvd.nist.gov\/ncp\/repository"},{"key":"cit0055","volume-title":"National cyber security organisation: Hungary","author":"NATO Cooperative Cyber Defence Center of Excellence (CCDCOE)","year":"2015"},{"key":"cit0056","volume-title":"Slovak republic - cyber readiness at a glance","author":"Potomac Institute for Policy Studies","year":"2019"},{"key":"cit0057","unstructured":"Republic of Estonia. (2020, March 15). Republic of Estonia - information system authority (RIA). Information System Authority (RIA). https:\/\/www.ria.ee\/en\/cyber-security\/supervision.html"},{"key":"cit0058","first-page":"108","volume":"6","author":"Setiadi F.","year":"2012","journal-title":"International Journal of Information Technology & Computer Science (IJITCS)"},{"issue":"15","key":"cit0059","first-page":"32","author":"Shannak R. O.","year":"2009","journal-title":"European Journal of Economics, Finance and Administrative Sciences"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035238"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.034"},{"key":"cit0062","volume-title":"How can Barbados shape the future of internet","author":"Telecommunication Unit, Government of barbados","year":"2017"},{"key":"cit0063","volume-title":"Cyber security assessment Netherlands (CSAN)","author":"The National Cyber Security Centre (NCSC)","year":"2016"},{"key":"cit0064","unstructured":"Times of Oman. (2015, July 26). Oman third best prepared in world to thwart cyber attacks. Times of Oman Retrieved May 30, 2017, from. http:\/\/timesofoman.com\/: http:\/\/timesofoman.com\/article\/64332\/Oman\/Education\/Oman-was-cited-as-a-country-with-some-of-the-best-organisational-practices-thanks-to-its-High-Level-Cyber-Security-Strategy-and-Master-Plan"},{"key":"cit0065","unstructured":"U.S. Department of Homeland Security. (2016, October 4). Cyber storm: Securing cyber space. (U.S. Department of Homeland Security) Retrieved May 30, 2017, from. www.dhs.gov: https:\/\/www.dhs.gov\/cyber-storm"},{"key":"cit0066","volume-title":"The Cyber index - international security trends and realities","author":"United Nations","year":"2013"},{"key":"cit0067","unstructured":"United Nations Institute for Disarmament Research. (2020, March 16). Cyber policy portal. Cyber Policy Portal. https:\/\/cyberpolicyportal.org\/en\/states\/israel"},{"key":"cit0068","volume-title":"E-Readiness study in Georgia -Nationwide survey","author":"United States Agency for International Development","year":"2016"},{"key":"cit0069","unstructured":"US Department Homeland Security. (2020, March 16). CYBER STORM: Securing cyber space. CYBER STORM: Securing Cyber Space. https:\/\/www.cisa.gov\/cyber-storm-securing-cyber-space"},{"key":"cit0070","first-page":"850","volume-title":"Handbook of science and technology for homeland security edited by John G. Voeller,","author":"Voeller J. G.","year":"2010"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107866"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2020.1767239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,26]],"date-time":"2021-05-26T03:26:09Z","timestamp":1621999569000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2020.1767239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,22]]},"references-count":71,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9,2]]}},"alternative-id":["10.1080\/19393555.2020.1767239"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2020.1767239","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-05-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}