2019
DOI: 10.1080/19393555.2019.1689318
|View full text |Cite
|
Sign up to set email alerts
|

Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The questionnaire also included five demographic items: (1) the level of enterprise’s informatisation; (2) the potential impact of an information incident on enterprise’s reputation; (3) the size of the enterprise; (4) business environment; and (5) the type of business activity. A questionnaire was designed for a self-reported assessment, which is a commonly used lightweight method in ISec scientific research [ 30 , 37 – 39 , 94 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The questionnaire also included five demographic items: (1) the level of enterprise’s informatisation; (2) the potential impact of an information incident on enterprise’s reputation; (3) the size of the enterprise; (4) business environment; and (5) the type of business activity. A questionnaire was designed for a self-reported assessment, which is a commonly used lightweight method in ISec scientific research [ 30 , 37 – 39 , 94 ].…”
Section: Methodsmentioning
confidence: 99%
“…(3) the size of the enterprise; (4) business environment; and (5) the type of business activity. A questionnaire was designed for a self-reported assessment, which is a commonly used lightweight method in ISec scientific research [30,[37][38][39]94].…”
Section: Plos Onementioning
confidence: 99%
“…This theory posits that the readiness of an organization to adopt and utilize technology is influenced by various factors, including toplevel management support. Bahuguna et al (2019) have highlighted the pivotal role of top-level management in achieving cyber-security readiness within organizations. Their study suggests that the support and involvement of top management is a crucial resource for enhancing an organization's cyber-security readiness.…”
Section: Literature Reviewmentioning
confidence: 99%