{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:32:27Z","timestamp":1762252347071,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/istas.2015.7439415","type":"proceedings-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T16:22:00Z","timestamp":1458836520000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Modelling Cyber Security Governance Maturity"],"prefix":"10.1109","author":[{"given":"Rossouw","family":"de Bruin","sequence":"first","affiliation":[]},{"given":"S H","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Cyber operations maturity framework-A model for collaborative","author":"lamb","year":"2011","journal-title":"dynamic cybersecurity"},{"journal-title":"Data Security Experts Reveal the Biggest Mistake Companies Make with Data & Information Security","year":"0","author":"lord","key":"ref11"},{"journal-title":"The ESG Cybersecurity Maturity Model","year":"2014","author":"olstik","key":"ref12"},{"key":"ref13","first-page":"147","volume":"8","author":"park","year":"2014","journal-title":"Study on financial-sector information security level assessment and improvement anticipation model"},{"journal-title":"Press Trust of India Corporate Espionage Case Companies Paid Rs 2 5 Lakh Per Month to Obtain Stolen Documents Says Delhi Police","year":"0","key":"ref14"},{"journal-title":"Electricity Subsector Cybersecurity Capability Maturity Model","article-title":"U. S. Department of Energy and U. S. Department of Homeland Security","year":"2014","key":"ref15"},{"journal-title":"Oil and natural gas subsector cybersecurity capability maturity model (ONG-C2M2)","article-title":"U. S. Department of Energy and U. S. Department of Homeland Security","year":"2014","key":"ref16"},{"journal-title":"Cybersecurity Capability Maturity Model (ES-C2M2)","article-title":"U. S. Department of Energy and U.S. Department of Homeland Security","year":"0","key":"ref17"},{"journal-title":"Cybersecurity capability maturity model white paper","article-title":"U. S. Department of Homeland Security","year":"2014","key":"ref18"},{"journal-title":"Proceedings ot the 40th Hawaii International Conference on System Science Conference proceedings of the Xth conference held in Y","year":"2007","author":"white","key":"ref19"},{"article-title":"Cyber Security Governance Maturity","year":"2015","author":"de bruin","key":"ref4"},{"journal-title":"CREST","year":"0","key":"ref3"},{"journal-title":"The critical incident response maturity journey","year":"2013","author":"gardiner","key":"ref6"},{"journal-title":"Former GCHQ spy chief Andrew France revealed as CEO of Mike Lynch-funded Darktrace","year":"0","author":"france","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/09614520050116677"},{"journal-title":"Cyber security capability maturity model (CMM)-pilot","article-title":"Global Cyber Security Capacity Centre","year":"2014","key":"ref7"},{"journal-title":"CORE Security (n d ) The threat & vulnerability management maturity model","year":"0","key":"ref2"},{"journal-title":"Last night GitHub was hit with massive denial-of-service attack from China","year":"0","author":"brandom","key":"ref1"},{"journal-title":"DDoS Attack on Bank Hid $900 000 Cyberheist","year":"0","author":"krebs","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810862751"}],"event":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2015,11,11]]},"location":"Dublin, Ireland","end":{"date-parts":[[2015,11,12]]}},"container-title":["2015 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435985\/7439393\/07439415.pdf?arnumber=7439415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:20:46Z","timestamp":1490059246000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7439415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/istas.2015.7439415","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}