Cybersecurity maturity model: Systematic literature review and a proposed model

被引:0
作者
Buyukozkan, Gulcin [1 ]
Guler, Merve [1 ]
机构
[1] Galatasaray Univ, Ind Engn Dept, Ciragan Cd 36, TR-34349 Ortakoy Istanbul, Turkiye
关键词
Cybersecurity; Maturity model; Cybersecurity maturity model; Science mapping; Systematic literature review; CYBER SECURITY; ORGANIZATIONS; FRAMEWORK; RISK; TOOL;
D O I
10.1016/j.techfore.2025.123996
中图分类号
F [经济];
学科分类号
02 ;
摘要
The growing importance of cybersecurity stems from its strategic value to various stakeholders, including individuals, businesses, governments, and society as a whole. Ensuring robust cybersecurity programs and assessing maturity levels is critical for organizational resilience. Cybersecurity maturity models have emerged as essential tools for evaluating readiness and guiding improvements. This study aims to systematically review existing research with bibliometric analysis and propose a cybersecurity maturity model that will help organizations assess their readiness. Web of Science and Scopus databases were searched, and bibliometric networks were visualized and explored using the VOSViewer and Biblioshiny software. This study is one of the first attempts to examine cybersecurity maturity areas using the science mapping approach. The proposed cybersecurity maturity model uses bibliometric analysis, literature searches on academic papers, industry reports, and expert opinions. The proposed cybersecurity maturity model comprises five dimensions, fifteen factors, and five levels. The proposed model is applied to three companies to demonstrate the validity using real-world examples. This study significantly contributes to the body of knowledge on cybersecurity maturity. The proposed model serves as the foundation for future researchers interested in determining cybersecurity maturity. Additionally, practitioners can use the proposed maturity factors to lead their cybersecurity systems.
引用
收藏
页数:38
相关论文
共 108 条
[1]  
(2020)
[2]  
Ahanger T.A., Aljumah A., Atiquzzaman M., State-of-the-art survey of artificial intelligent techniques for IoT security, Comput. Netw., 206, (2022)
[3]  
Akinsanya O.O., Papadaki M., Sun L., Towards a maturity model for health-care cloud security (M2HCS), Inform. Comput. Secur., 28, pp. 321-345, (2020)
[4]  
AlDaajeh S., Alrabaee S., Strategic cybersecurity, Comput. Secur., 141, (2024)
[5]  
AlDaajeh S., Saleous H., Alrabaee S., Barka E., Breitinger F., Raymond Choo K.K., The role of national cybersecurity strategies on the improvement of cybersecurity education, Comput. Secur., 119, (2022)
[6]  
Aliyu A., Maglaras L., He Y., Yevseyeva I., Boiten E., Cook A., Janicke H., A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom, Appl. Sci. (Switzerland), 10, pp. 1-14, (2020)
[7]  
Al-Karaki J.N., Gawanmeh A., El-Yassami S., GoSafe: on the practical characterization of the overall security posture of an organization information system using smart auditing and ranking, J. King Saud Univ. Comput. Inform. Sci., (2020)
[8]  
Alladi T., Chamola V., Zeadally S., Industrial control systems: cyberattack trends and countermeasures, Comput. Commun., 155, pp. 1-8, (2020)
[9]  
Allan A., Perkins E., (2009)
[10]  
Al-Matari O.M.M., Helal I.M.A., Mazen S.A., Elhennawy S., Adopting security maturity model to the organizations’ capability model, Egyptian Inform. J., 22, pp. 193-199, (2021)