<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "https://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.1" specific-use="sps-1.9" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">dyna</journal-id>
			<journal-title-group>
				<journal-title>DYNA</journal-title>
				<abbrev-journal-title abbrev-type="publisher">Dyna rev.fac.nac.minas</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="ppub">0012-7353</issn>
			<issn pub-type="epub">2346-2183</issn>
			<publisher>
				<publisher-name>Universidad Nacional de Colombia</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.15446/dyna.v90n227.107420</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Articles</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Aeronautic maturity cybersecurity: a framework</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Madurez en ciberseguridad aeronáutica: un marco de trabajo</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0003-0105-8178</contrib-id>
					<name>
						<surname>Brito-Acuña</surname>
						<given-names>Guillermo</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>a</sup></xref>
				</contrib>
				<aff id="aff1">
					<label>a</label>
					<institution content-type="original">Empresa Cubana de Navegación Aérea, La Habana, Cuba. guillermo.brito@aeronav.avianet.cu</institution>
					<institution content-type="orgname">Empresa Cubana de Navegación Aérea</institution>
					<addr-line>
						<city>La Habana</city>
					</addr-line>
					<country country="CU">Cuba</country>
					<email>guillermo.brito@aeronav.avianet.cu</email>
				</aff>
			</contrib-group>
			<pub-date date-type="pub" publication-format="electronic">
				<day>14</day>
				<month>03</month>
				<year>2024</year>
			</pub-date>
			<pub-date date-type="collection" publication-format="electronic">
				<season>Jul-Sep</season>
				<year>2023</year>
			</pub-date>
			<volume>90</volume>
			<issue>227</issue>
			<fpage>24</fpage>
			<lpage>34</lpage>
			<history>
				<date date-type="received">
					<day>23</day>
					<month>02</month>
					<year>2023</year>
				</date>
				<date date-type="rev-recd">
					<day>25</day>
					<month>05</month>
					<year>2023</year>
				</date>
				<date date-type="accepted">
					<day>09</day>
					<month>06</month>
					<year>2023</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/" xml:lang="en">
					<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License</license-p>
				</license>
			</permissions>
			<abstract>
				<title>Abstract</title>
				<p>This article presents the results of a systematic review of the methods to implement cybersecurity maturity. Based on them, it proposes a framework for excellence in aeronautical cybersecurity that integrates the objectives of aeronautical cybersecurity with capabilities and requirements, which contributes to increasing the maturity of aeronautical cybersecurity. It exposes 13 objectives with 120 capabilities and 5 functional maturity levels to gradually meet up to 600 aeronautical cybersecurity requirements. Which were taken from articles with good practices associated with publications of the last 5 years and the criteria resulting from the collaboration of managers and the validation of experts in the industry, which allowed it to be enriched with good practices associated with the management of cybersecurity and the resilience of these infrastructures.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>Resumen</title>
				<p>Este artículo presenta los resultados de una revisión sistemática a los métodos para implementar madurez en ciberseguridad. A partir de ellos propone un marco de trabajo para la excelencia en ciberseguridad aeronáutica que integra los objetivos de ciberseguridad aeronáutica con capacidades y requerimientos, lo que contribuye a elevar la madurez de la ciberseguridad aeronáutica. Expone 13 objetivos con 120 capacidades y 5 Niveles funcionales de madurez para gradualmente cumplir hasta 600 requerimientos de ciberseguridad aeronáutica. Las cuales fueron tomadas de artículos con buenas prácticas asociadas a publicaciones de los últimos 5 años y el criterio resultado de la colaboración de directivos y la validación de expertos en la industria, lo que permitió se enriqueciera el mismo con buenas prácticas asociadas a la gestión de la ciberseguridad y la resiliencia de estas infraestructuras.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>cybersecurity</kwd>
				<kwd>maturity</kwd>
				<kwd>aeronautics</kwd>
				<kwd>framework</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>ciberseguridad</kwd>
				<kwd>madurez</kwd>
				<kwd>aeronáutica</kwd>
				<kwd>marco de trabajo</kwd>
			</kwd-group>
			<counts>
				<fig-count count="1"/>
				<table-count count="0"/>
				<equation-count count="0"/>
				<ref-count count="125"/>
				<page-count count="11"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>1. Introduction</title>
			<p>The need for cybersecurity is widely accepted, both by countries, companies or organizations, regardless of their size. In the aviation industry, the issue takes effect with Resolution A39-19, Direction of Cybersecurity in Civil Aviation [<xref ref-type="bibr" rid="B1">1</xref>] recognizing that the global aviation system is a highly complex and integrated system with critical information and technologies that depend on the availability, integrity and confidentiality of the data. In view of compliance with the ICAO established improvement plan until 2030 [<xref ref-type="bibr" rid="B2">2</xref>] and the implementation of the Global Aeronautical Information Management System (SWIM) [<xref ref-type="bibr" rid="B3">3</xref>], where it will be exchanged with global stakeholders such as airlines, aircraft, civil and military controllers, etc.</p>
			<p>Block 1: Establish a solid Cybersecurity device to support information management.</p>
			<p>Block 2: Manage the security, integrity, confidentiality and availability of the information that will allow mitigating the risks of intentional interruption and modification of air traffic management information that is critical to operational safety.</p>
			<p>The increase in capabilities using cyber-attacks against information and communications systems and the concern of states regarding the possibility of attacks on the air traffic management system are recognized. Agreeing on the creation of groups of experts, the development of capacities to protect critical information, data technology and increase the resilience of the infrastructure, guaranteeing its maintainability and development. To this end, in 2020, CANSO published the standard of excellence in cybersecurity for air navigation services, supported by the practices proposed in NIST CSF, endorsed by the experience of its implementation in the European Union [<xref ref-type="bibr" rid="B5">5</xref>-<xref ref-type="bibr" rid="B7">7</xref>]. This presents a strategy for the continuous improvement of ANSP cybersecurity based on criteria of capacity and maturity (excellence).</p>
			<p>This article is organized as follows: section II presents the results of the systematic review; section III presents the framework proposal for excellence in aeronautical cybersecurity that integrates the specific objectives of aeronautical cybersecurity with capabilities and requirements, contributing to raising the management of maturity in aeronautical cybersecurity. 13 objectives with 120 capabilities and 5 maturity levels are exposed to obtain 600 requirements broken down by maturity stages; in section IV the conclusions are presented.</p>
		</sec>
		<sec>
			<title>2. Review of the state of the art</title>
			<p>During the systematic review, the following terms that identify the research areas were considered: information security management system maturity, maturity cybersecurity and capability maturity cybersecurity. Among the selected sources are specialized databases such as IEEE, Science Direct, SpringerLink and Wiley Online Library. As a result, 28,138 publications regarding maturity in cybersecurity between 2018 and 2022 were analyzed. Of these, a group of 352 articles were considered relevant, identifying 23 primary articles within them. These articles, according to the Petersen criteria, were classified as: Solution proposals (Kour, Karim, Thaduri, &amp; Transit, 2020), Evaluation searches (Kour et al., 2020), Opinion articles (Kour et al., 2020), Experience articles (Kour et al., 2020) and Philosophical articles (Kour et al., 2020). From their analysis, the following observations are made:</p>
			<p>The non-standardization of the terms is maintained since each author uses different vocabularies for the same meaning.</p>
			<p>The supremacy of the COBIT model for IT governance issues [<xref ref-type="bibr" rid="B29">29</xref>]. A tendency to use it in conjunction with other standards associated with cybersecurity such as ISO 27000 or NIST CSF was identified.</p>
			<p>Although it is still a developing area, a moderate increase has been identified in the creation of models or frameworks more adapted to their realities, be in industries, institutions or countries. Mainly adapting existing models or creating new models and frameworks. Such is the case of airports, health, banking, the cloud or SCADA systems.</p>
			<p>The concept of frameworks for maturity in cybersecurity has appeared in the literature. These are practical implementations of existing maturity models or concrete applications on specific areas. Although the use of the framework or model nomenclature is more conditioned to the area where it is developed since in its structure they do not present differences.</p>
			<p>Both the models and the frameworks present objectives that are traceable to cybersecurity standards. Those, in turn, can be divided into capabilities that establish metrics, controls, or requirements.</p>
			<p>It is observed that security controls when related to maturity levels only influence the way the process or control is carried out (depending on the characteristics of the level). Without establishing new cybersecurity requirements. Although there are models [<xref ref-type="bibr" rid="B10">10</xref>,<xref ref-type="bibr" rid="B20">20</xref>] where the complexity of the security requirements increases as a function of level maturity.</p>
			<p>A small improvement is identified in the tools used to implement the models or frameworks. Where the main tools for its implementation and easy management are developed in MS-Excel files [<xref ref-type="bibr" rid="B20">20</xref>,<xref ref-type="bibr" rid="B21">21</xref>] although there are others that do it through applications for specific domains [<xref ref-type="bibr" rid="B8">8</xref>].</p>
			<p>Several models [<xref ref-type="bibr" rid="B30">30</xref>-<xref ref-type="bibr" rid="B33">33</xref>] link organizational resilience to cybersecurity and define that cybersecurity requirements must be supported by good practices and standards associated with the area of competence.</p>
		</sec>
		<sec>
			<title>3. Aeronautic cybersecurity framework</title>
			<p>For the development of the proposal, the implementation of a framework is considered, seen as a broad overview or scheme of interconnected elements, which defines a standardized set of concepts, practices and criteria to focus on a particular type of problem [<xref ref-type="bibr" rid="B30">30</xref>,<xref ref-type="bibr" rid="B31">31</xref>]. They provide a base structure to organize the components of a process [<xref ref-type="bibr" rid="B34">34</xref>], including capabilities, rules and methods applicable to any scenario regardless of its size or complexity [<xref ref-type="bibr" rid="B35">35</xref>]. They define three levels of application from three perspectives: the executive, business process managers, and operations managers [<xref ref-type="bibr" rid="B36">36</xref>,<xref ref-type="bibr" rid="B37">37</xref>]. This will maintain the structure proposed in the standard for excellence in cybersecurity proposed by Canso, to which the capabilities layer was added and, consequently, the requirements layer was expanded.</p>
			<p>
				<xref ref-type="fig" rid="f1">Fig. 1</xref> exposes the simplified structure of the framework and the traceability between COBIT, NIST CSF, the standard for excellence in aviation cybersecurity [<xref ref-type="bibr" rid="B38">38</xref>], proposed by CANSO. It exposes 13 objectives, 120 capabilities and 5 maturity levels to obtain 600 maturity requirements.</p>
			<sec>
				<title>3.1 Standard ratio and tired goals</title>
				<p>Regarding the cybersecurity standards that the framework respects, those recommended by CANSO, that is, COBIT and NIST CSF will be maintained. COBIT for its results in the management of IT governance will be traceable with the Objectives:</p>
				<p>Leadership and Governance: Where senior management demonstrates leadership and commitment to cybersecurity. Policies necessary to manage and monitor regulatory, legal, risk, environmental, and operational requirements related to cybersecurity are approved and help ensure that cybersecurity supports business objectives, optimizes business investment, and appropriately manages risks and opportunities related to cybersecurity. </p>
				<p>Cybersecurity Management System: Where the elements that establish security policies, processes and objectives are related. Through a culture of security, it fosters cooperation between stakeholders, manages threat and risk assessment, and acts as an independent party to provide advice, audit systems and processes without having a direct role in the operation.</p>
				<p>NIST CSF for its part will be traceable to the objectives:</p>
				<p>Asset Management: Where the data, personnel, devices, systems and facilities that allow the organization to achieve its business objectives are managed according to their relative importance and their risk strategy.</p>
				<p>Risk Assessment: Where the cybersecurity risk for operations is understood, including the mission, functions, image or reputation, assets and people. It includes managing threats and vulnerabilities and identifying control gaps for areas and managing the assessed risks.</p>
				<sec>
					<title>Levels and stages of maturity and capability</title>
					<p>Regarding the levels of maturity or capacity used in the framework, the following concepts will be added:</p>
					<p>Stage: Period of fulfillment of requirements between one level and another.</p>
					<p>Level 0) Incomplete: Where the requirements that allow cybersecurity to be considered at level A - Informal are not met.</p>
					<p>
						<fig id="f1">
							<label>Figure 1</label>
							<caption>
								<title>Structure of the framework for aviation cybersecurity maturity.</title>
							</caption>
							<graphic xlink:href="2346-2183-dyna-90-227-24-gf1.jpg"/>
							<attrib>Source: Own elaboration.</attrib>
						</fig>
					</p>
					<p>Maintaining the levels proposed by fatigue as follows:</p>
					<p>Level 1) A - Informal: Where the requirements are met to a large extent by the expertise of its members.</p>
					<p>Level 2) B - Defined: Where compliance with the requirements is indicated and organized with an organizational vision.</p>
					<p>Level 3) C - Managed: Where the organization documents the procedures, rules and responsibilities of its actors and establishes mechanisms to meet its goals.</p>
					<p>Level 4) D - Secured: Where the cybersecurity results are interpreted through metrics, all the previous stages are consolidated through the automation of processes and formally involve the interested parties.</p>
					<p>Level 5) E - Optimized: Where the organization seeks the continuous improvement of its cybersecurity through international practices. The system is able to quickly adapt to changes in terms of threats, vulnerabilities, risks, economic strategy or organizational needs.</p>
				</sec>
			</sec>
		</sec>
		<sec>
			<title>4. Identification and validation by experts of the capacities and requirements by level</title>
			<p>The foundations for building excellence are obtained by consolidating the requirements based on the level of maturity of the capability. These capabilities are grouped by their objectives, which have been established according to the characteristics of the maturity levels, while increasing their completeness and compliance, strengthened with specific standards, in organizational resilience and good practices identified in the literature. Therefore, knowing the objectives and levels, it was imperative to determine the security and resilience requirements to be implemented, as well as in what capacity to contain it and at what level of maturity.</p>
			<p>To determine the requirements, the systematic review of the bibliography, the Delphi method and the focus group were applied as scientific methods The systematic review of the bibliography: Identifies, evaluates and combines the evidence of the primary research studies through an explicit and rigorous method. Being useful to evaluate and interpret relevant information available associated with an investigation [<xref ref-type="bibr" rid="B39">39</xref>].</p>
			<p>The Delphi method: It is used internationally in several areas of knowledge; its purpose is to socialize, externalize and combine the knowledge of experts under anonymity, enabling the participation of geographically dispersed experts [<xref ref-type="bibr" rid="B40">40</xref>].</p>
			<p>The focus group: it is a type of group interview to collect opinions and knowledge on a specific topic. Its application stimulates the members to emit ideas about the object under investigation and the interaction between them allows to consider additional aspects or identify common problems [<xref ref-type="bibr" rid="B41">41</xref>].</p>
			<p>For the identification of requirements, a bibliographic review of standards, models, frameworks and articles on the subject was carried out. This information was enriched by particularizing it to the aeronautical environment with the help of experts, making use of the Delphi method in its first round. The results obtained were submitted to the focus group where the proposal was enriched with real experiences, proposing the capacities, the development of a software for the management of the framework, the <xref ref-type="fig" rid="f1">Fig. 1</xref>. representing the stages and levels of maturity and the extension of the scope to others. standards not directly involved with cybersecurity but implementing them would provide good practices for the resilience of the organization. Finally, the second round of Delphi was applied with the proposal refined in the previous step.</p>
			<p>For the systematic review, the one previously carried out in 1.3 was expanded by adding the requirements established in multiple standards and consolidated capacity and maturity models, such is the case of the ISO 27000 family [<xref ref-type="bibr" rid="B41">41</xref>], the NIST SP 800 series standards related to NIST Cybersecurity Framework (NIST CSF) Version 2.0 [<xref ref-type="bibr" rid="B42">42</xref>] or NIST SP 800-53 rev.5 [<xref ref-type="bibr" rid="B43">43</xref>], Cybersecurity Maturity Model Certification (CMMC) Version 2.0 [<xref ref-type="bibr" rid="B44">44</xref>], Cybersecurity Capacity Maturity Model for Nations (CMM) [<xref ref-type="bibr" rid="B45">45</xref>], Cybersecurity Capability Maturity Model (C2M2) Version 2.1 [<xref ref-type="bibr" rid="B46">46</xref>] and the Cybersecurity Framework Version 4.2 [<xref ref-type="bibr" rid="B47">47</xref>] implemented in Uruguay [<xref ref-type="bibr" rid="B48">48</xref>]. The relevance of the requirements found was validated by identifying recent scientific publications (5 years) that developed the topic.</p>
			<p>There were 783 basic cybersecurity practices were determined, which were located at the corresponding maturity level and were developed observing the characteristics of the levels towards which they mature or the data necessary to guarantee their assurance at previous levels. Allowing the emergence and specification of new requirements, supported by the increase in complexity and completeness of said specifications for implementation.</p>
			<p>These practices, once the framework has been adopted, are considered requirements for its implementation depending on the level to be reached. The capabilities arose from the accumulation of requirements on a specific capability within each objective. As the existence of few publications that issued clear criteria on requirements, capacities and objectives was identified, it was decided to submit the proposal to the first round of experts.</p>
			<p>To apply Delphi and the focus group, it is necessary to identify experts in aeronautical cybersecurity. To this end, the following expert selection criteria were considered [<xref ref-type="bibr" rid="B49">49</xref>]:</p>
			<p>Having performed roles related to cybersecurity.</p>
			<p>More than five years of experience in cybersecurity and more than three years linked to aeronautical cybersecurity.</p>
			<p>Having successfully managed improvements in cybersecurity in organizations related to aeronautics or other similar critical infrastructures.</p>
			<p>Possess knowledge in the branches of engineering related to critical infrastructures, CNS/ATM, quality management, process improvement, methodologies, models and cybersecurity maturity standards.</p>
			<p>Possess publications and industry recognition for their contributions to aeronautical cybersecurity.</p>
			<p>For this reason, 27 candidates for experts from both the national industry and other service providers, aeronautical technique producers or international regulatory bodies were contacted. Twenty-one of them agreed to participate and had their curricular synthesis reviewed. Representing 9 organizations (5 Cuban and 8 foreign), with nationality from Cuba (14), Argentina, Chile, Mexico, the Dominican Republic, the Netherlands, the United States and Germany. Of the 21 experts, 6 whose competence indices were less than 0.5 were dismissed. Out the selected 15 experts, 12 obtained a high competence coefficient and 3 of them medium. Which were characterized to guarantee their quality for research.</p>
			<p>Based on the correlation proposal between objectives, capabilities, requirements and levels, the first round of Delphi was carried out to adapt the proposal to the aeronautical context. Carried out through a virtual discussion group, supported by video conference, where the moderator informed that the purpose of the meeting is to identify the cybersecurity capabilities and requirements by level to be implemented in the organizations that ensure aeronautical services. The anonymity and confidentiality of the responses to the survey or criteria that will be obtained at the meeting was guaranteed.</p>
			<p>To ensure the understanding of the experts, the moderator explains each objective and the maturity requirements by level, for each capability. In parallel, for each capacity explained, each expert receives a survey in which to assess, according to the Likert scale, their degree of agreement or disagreement, the relevance or otherwise of each capacity or its requirements by level. In addition, it allows you to propose changes for each question. In the first round, the experts proposed a total of 56 changes, which can be summarized in the following items:</p>
			<p>They proposed 52 adaptations of requirements that were ahead of the characteristics of the level of maturity. Incorporating specialized standard practices in other capacities that are not exactly cybersecurity, these approaches are supported under the hypothesis that implementing standardized good practices in key capacities will contribute to increasing organizational resilience. And considering the complexity of implementation of the framework, the use of tools for its management.</p>
			<p>Considering the results obtained through the expert method, they were submitted to an exploratory focus group, to which industry executives and other interested parties were added, which enriched the proposal with real experiences, also proposing the following recommendations for execution.</p>
			<p>Use the ISO 55000 standard in the case of asset management, CMMi for software project development, ISO 28000 for supply chain security management and ISO 22301 for business continuity.</p>
			<p>Develop a tool that allows the control of the complete management cycle of the improvements projected by the system of excellence in cybersecurity, which is compatible with the quality management systems and the operational safety management system and which can cover several organizations.</p>
			<p>Once the proposal was updated considering the established recommendations, the second round of the survey was carried out. The experts once again gave their consideration on the practices, evidencing a higher level of consensus than in the first round and a greater acceptance of the proposal. The experts valued the use of the recommendations for the implementation of the framework, observing a high concordance with the proposals issued in the focus group (in all cases above 85%). To demonstrate the reliability of the answers given by the experts in the questionnaires, it was necessary to calculate the coefficient of agreement between them.</p>
			<p>For the processing of the results of the survey, a method was used that consists of identifying the frequency in each category of the Likert scale defined in the survey and the percentages of concordance of each category are calculated according to the characteristics proposed by the author, then it is calculated in a percentage index, which integrates in a single value the acceptance of the group of evaluators on the characteristics of the model. The percentage index of the experts in each of the questions exceeds the value of 85. Therefore, the processing carried out through the Likert scale shows the acceptance by the community of experts of the objectives, capacities, levels and their requirements, as well as the software presented in support of the management of the framework for excellence in aeronautical cybersecurity.</p>
			<p>From these analyses, it was possible to define the correlation between the cybersecurity and resilience requirements based on the level of maturity, for each capacity that makes up each of the objectives proposed in the standard of excellence for air navigation. Functional recommendations were determined that facilitate the management of the complete cycle associated with the necessary improvements to implement the framework and its interrelation with consolidated processes in the industry, such as Quality Management or Operational Safety Management [<xref ref-type="bibr" rid="B50">50</xref>].</p>
		</sec>
		<sec>
			<title>5. List of objectives, capabilities and specification of requirements by level</title>
			<p>Expanding on the results reached in the previous section, the correlation obtained between the objectives, capacities and requirements by level is presented, and references are made to articles found that validate the topicality of the topic.</p>
			<p>Within the Leadership and Governance objective, the practices associated with ISO 38500 [<xref ref-type="bibr" rid="B51">51</xref>], GCSCC [<xref ref-type="bibr" rid="B52">52</xref>], CMM, ITIL and COBIT5 [<xref ref-type="bibr" rid="B53">53</xref>] are followed. The proposed capabilities to mature are: 1) Security Policy [<xref ref-type="bibr" rid="B54">54</xref>]; 2) Legal Basis [<xref ref-type="bibr" rid="B55">55</xref>]; 3) Rules [56]; 4) Functions, Roles and Responsibilities [<xref ref-type="bibr" rid="B57">57</xref>]; 5) Procedures [<xref ref-type="bibr" rid="B58">58</xref>]; 6) Personnel [<xref ref-type="bibr" rid="B59">59</xref>]; 7) System Security Plan [<xref ref-type="bibr" rid="B60">60</xref>]; 8) Training [<xref ref-type="bibr" rid="B61">61</xref>]; 9) Planning, Execution and Strategy [<xref ref-type="bibr" rid="B62">62</xref>] and 10) Evaluation [<xref ref-type="bibr" rid="B63">63</xref>] and Continuous Improvement [<xref ref-type="bibr" rid="B64">64</xref>].</p>
			<p>In the Information Security Management System objective, the practices associated with ISO 27000, 27001, 27003 and 27004 [<xref ref-type="bibr" rid="B65">65</xref>] and the Standard of Excellence in Cybersecurity established by CANSO are adapted. As the purpose of this objective is to direct the management, it is proposed to maintain the following capacities 11) Leadership and Governance; 12) Information Security Management System; 13) Asset Management; 14) Risk assessment; 15) Exchange of information; 16) Supply chain risk management; 17) Identity management and access control; 18) Human-Centered Security; 19) Protective technology; 20) Anomalies and events; 21) Response planning; 22) Mitigation and 23) Recovery Planning.</p>
			<p>In the Asset Management objective, the practices recommended in ISO 55000, 55001 and 55002 [<xref ref-type="bibr" rid="B66">66</xref>] are adapted, proposing the following capabilities: 24) Management Diagnosis [<xref ref-type="bibr" rid="B67">67</xref>]; 25) Asset Policy and Strategy [<xref ref-type="bibr" rid="B68">68</xref>]; 26) Design and Construction of the System [<xref ref-type="bibr" rid="B69">69</xref>]; 27) Acquisition [<xref ref-type="bibr" rid="B70">70</xref>]; 28) Verification [<xref ref-type="bibr" rid="B71">71</xref>]; 29) Asset Information Management [<xref ref-type="bibr" rid="B72">72</xref>]; 30) Operate [<xref ref-type="bibr" rid="B73">73</xref>]; 31) Maintenance and Repair [<xref ref-type="bibr" rid="B74">74</xref>] and 32) Dispose or Replace [<xref ref-type="bibr" rid="B75">75</xref>].</p>
			<p>The Risk Assessment objective responds to the recommended practices in the ISO 31000 family, ISO 27005, NIST SP 800-30 [<xref ref-type="bibr" rid="B76">76</xref>] and Cyber Security and Risk Assessment Guide, proposing the following capacities: 33) Scope of Management [<xref ref-type="bibr" rid="B77">77</xref>]; 34) Identification of Events [<xref ref-type="bibr" rid="B78">78</xref>]; 35) Risk Assessment [<xref ref-type="bibr" rid="B79">79</xref>]; 36) Risk Response [<xref ref-type="bibr" rid="B80">80</xref>]; 37) Control Capabilities [<xref ref-type="bibr" rid="B81">81</xref>]; 38) Information and Communication [<xref ref-type="bibr" rid="B82">82</xref>] and 39) Monitoring and Supervision [<xref ref-type="bibr" rid="B83">83</xref>].</p>
			<p>The Information Exchange objective provides the practices suggested by NIST SP 800-47 and ISO 20614 and ISO 27032 proposing as capabilities: 40) Scope of the Exchange [<xref ref-type="bibr" rid="B84">84</xref>]; 41) Classification [<xref ref-type="bibr" rid="B85">85</xref>]; 42) Compilation [<xref ref-type="bibr" rid="B86">86</xref>]; 43) Relevance [<xref ref-type="bibr" rid="B87">87</xref>]; 44) Reliability [88]; 45) Priority [<xref ref-type="bibr" rid="B89">89</xref>]; 46) Communication of Vulnerability Solutions [<xref ref-type="bibr" rid="B90">90</xref>]; and 47) Elimination [<xref ref-type="bibr" rid="B91">91</xref>].</p>
			<p>In the Risk Management objective in the supply chain, the practices of ISO 28000 and 28001 are adapted, proposing the capacities: 48) Strategic Alignment and Impact [<xref ref-type="bibr" rid="B92">92</xref>]; 49) External Chaining Input Supply [<xref ref-type="bibr" rid="B93">93</xref>]; 50) Internal People Management and Teamwork [<xref ref-type="bibr" rid="B94">94</xref>]; 51) Surveillance in Fundamental Capacity [<xref ref-type="bibr" rid="B95">95</xref>]; 52) Analysis and Mitigation of Risks in the Supply Chain [<xref ref-type="bibr" rid="B96">96</xref>]; 53) Evaluation of Suppliers [<xref ref-type="bibr" rid="B97">97</xref>] and 54) Quality, Verification and Validation [<xref ref-type="bibr" rid="B98">98</xref>].</p>
			<p>The Identity Management and Access Control objective complements the practices declared in ISO 29146, NIST SP 800-205 and the ISO 24760 family, for which reason it proposes the following capabilities: 55) Management of identities and credentials for users and devices [<xref ref-type="bibr" rid="B99">99</xref>]; 56) Access and Physical Protection [<xref ref-type="bibr" rid="B100">100</xref>]; 57) Remote Access [<xref ref-type="bibr" rid="B101">101</xref>]; 58) Permits with less privilege and segregation of duties [<xref ref-type="bibr" rid="B102">102</xref>]; 59) Integrity and Segregation [<xref ref-type="bibr" rid="B103">103</xref>] and 60) Authentication and Verification of Credentials.</p>
			<p>The Human-Centered Security objective uses the success factors declared in ISO 27501, ISO 30408, NIST SP 800-181, ICAO Manual 9859 and 10057 and the CANSO Human Resources Management Excellence Model, at the same time that proposes as capacities: 61) Politics and Strategy; 62) Contractual Relationship; 63) Training / Awareness [<xref ref-type="bibr" rid="B104">104</xref>]; 64) Training; 65) Resources, Performance and Management by Competencies [<xref ref-type="bibr" rid="B105">105</xref>]; 66) External Interested Parties; 67) Prevention, Investigation and Learning [<xref ref-type="bibr" rid="B106">106</xref>] and 68) Sanctions Policy and Just Culture.</p>
			<p>In the Protective Technology objective, recommended practices are included in NIST SP 800-160, NIST SP 800-40, NIST SP 800-86, CMMi, ISO 62443 data protection [<xref ref-type="bibr" rid="B106">106</xref>], the maturity model for web applications against cyber-attacks based on in OSWAP [<xref ref-type="bibr" rid="B107">107</xref>], and the Action Plan for the implementation of an ICAO Cybersecurity Strategy, the proposed capabilities are: 69) Cryptography [<xref ref-type="bibr" rid="B108">108</xref>]; 70) Personnel and Assignment of Cybersecurity Roles [<xref ref-type="bibr" rid="B109">109</xref>]; 71) Security in Unattended Systems and Unconnected Assets [<xref ref-type="bibr" rid="B110">110</xref>]; 72) Resilience in capacity to ensure availability [<xref ref-type="bibr" rid="B111">111</xref>]; 73) Baseline and Update [<xref ref-type="bibr" rid="B112">112</xref>]; 74) Vulnerability Management [<xref ref-type="bibr" rid="B113">113</xref>]; 75) Guarantee of Integrity and Non-repudiation [<xref ref-type="bibr" rid="B114">114</xref>]; 76) Safeguards [<xref ref-type="bibr" rid="B115">115</xref>]; 77) Antivirus Protection [<xref ref-type="bibr" rid="B116">116</xref>]; 78) energetic; 79) Security Management in the Systems Development Life Cycle; 80) Management of Resilience Requirements from Systems Development; 81) Test Management in Systems development; 82) Development and Production Environment Management; 83) Mature Software Development; 84) Remote maintenance; 85) Audit logs ; 86) Removable Media [<xref ref-type="bibr" rid="B117">117</xref>]; 87) Firewall, protection of networks and communications [<xref ref-type="bibr" rid="B59">59</xref>]; 88) Deployment Resilience Techniques [<xref ref-type="bibr" rid="B118">118</xref>]; 89) Technology Monitoring [<xref ref-type="bibr" rid="B119">119</xref>] and 90) Security Architecture [<xref ref-type="bibr" rid="B120">120</xref>].</p>
			<p>The Anomalies and Events objective uses the success factors declared in NIST SP 800-92, NIST SP 800-94 and NIST SP 800-137 and the maturity-oriented model in forensic analysis [<xref ref-type="bibr" rid="B121">121</xref>] to propose the capabilities: 91 ) Specialized information system on threats and vulnerabilities; 92) Prioritization and Impact of Events; 93) Monitoring of anomalies [<xref ref-type="bibr" rid="B122">122</xref>]; 94) Learning and Knowledge Management [<xref ref-type="bibr" rid="B123">123</xref>]; 95) Baseline of Systems, Network and Data Flow; 96) Analysis of Events; 97) Correlation of Events; 98) Responsibility in detection; 99) Verification of Detection Actions; 100) Communication of Detections; 101) Report of Events; 102) Event Investigation Procedures and 103) Forensic Analysis.</p>
			<p>The Response Planning objective includes success factors declared in CSFPC, NIST 800-61, ISO 27035, ICAO Doc. 9756 and the CANSO Emergency Response Plan, to present the capabilities: 104) Tolerance, Categorization and Priority; 105) Incident Response Plans [<xref ref-type="bibr" rid="B124">124</xref>]; 106) Training and Training [<xref ref-type="bibr" rid="B104">104</xref>]; 107) Execution of the Incident Response Plan; 108) Verification of Response and Recovery Actions; 109) Timely Communication; 110) Response Strategy and 111) Public relations management.</p>
			<p>The Mitigation objective bases its capabilities on the success factors declared in ISO 22316, ISO 22317 and BSI 65000 proposing: 112) Ability to Contain or Mitigate Incidents; 113) Mitigation Actions; 114) Response Efficiency and 115) Trained Personnel [<xref ref-type="bibr" rid="B104">104</xref>].</p>
			<p>Finally, the Recovery Planning objective is supported by the ISO 22301, ISO 22313 and ISO 24762 standards, it presents the following capabilities: 116) Recovery Plans; 117) Accuracy in Execution; 118) Response, Mitigation and Recovery Plans and Lessons Learned [<xref ref-type="bibr" rid="B125">125</xref>]; 119) Coordination and 120) Update.</p>
			<p>Each capacity will present requirements that will gain in completeness and complexity depending on the level of maturity that is intended to be obtained. The levels to be used were those previously explained. Therefore, the framework will have 600 requirements, 120 for each defined level except for the Stage or Incomplete Level where all the minimum requirements have not yet been met to reach level A - Informal.</p>
			<p>Each requirement is correlated with a level and with a capacity, these may have 3 states: 1) Pending: When all the requirements proposed for a stage are not met, the organization is not able to provide evidence of compliance and its implementation is not projected. compliance. 2) In process: When the organization has projected its compliance through actions, tasks and the necessary assurance for its compliance. 3) Fulfilled: when the institution is capable of providing evidence of compliance with all the requirements stipulated in the stage and the level of maturity evaluated. Evidence of compliance will serve as the basis for determining the state of maturity of the organization and a source of comparison between entities. To use the framework, the following constraint is used:</p>
			<p>Restriction 1: It is only possible to declare a requirement fulfilled when all the requirements of previous stages are fulfilled.</p>
		</sec>
		<sec sec-type="conclusions">
			<title>6. Conclusions</title>
			<p>In conclusion, this article has presented a framework for the management of aeronautical cybersecurity maturity, based on a systematic review of publications and enriched with good practices provided by executives and experts in the industry. The framework includes 13 objectives, 120 capabilities, and 5 functional levels of maturity, with a total of 600 requirements that can be used to achieve maturity levels in a certifiable and gradual manner. The framework not only contributes to improving the resilience of aeronautical infrastructures, but also enhances their integration with other management systems such as security, quality, or safety. This framework represents an important step forward in the development and implementation of effective cybersecurity management practices in the aeronautical industry.</p>
		</sec>
	</body>
	<back>
		<ref-list>
			<title>References</title>
			<ref id="B1">
				<label>[1]</label>
				<mixed-citation>[1] ICAO, Resolution A41-19: Addressing cybersecurity in civil aviation, Montreal, Canada, 2022. [consultation, May 7, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.icao.int/aviationcybersecurity/Documents/A41-19.pdf">https://www.icao.int/aviationcybersecurity/Documents/A41-19.pdf</ext-link> .</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>ICAO</collab>
					</person-group>
					<source>Resolution A41-19: Addressing cybersecurity in civil aviation</source>
					<publisher-loc>Montreal, Canada</publisher-loc>
					<year>2022</year>
					<day>07</day>
					<month>05</month>
					<year>2023</year>
					<ext-link ext-link-type="uri" xlink:href="https://www.icao.int/aviationcybersecurity/Documents/A41-19.pdf">https://www.icao.int/aviationcybersecurity/Documents/A41-19.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B2">
				<label>[2]</label>
				<mixed-citation>[2] ICAO, 2016 - 2030 Global Air Navigation Plan - ICAO Doc. 9750-AN/963, 5<sup>th</sup> Edition, Montreal, Canada, 2022. [consultation, May 7, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.icao.int/airnavigation/documents/ganp-2016-interactive.pdf">https://www.icao.int/airnavigation/documents/ganp-2016-interactive.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>ICAO</collab>
					</person-group>
					<year>2016</year>
					<source>2030 Global Air Navigation Plan - ICAO Doc. 9750-AN/963</source>
					<edition>5th </edition>
					<publisher-loc>Montreal, Canada</publisher-loc>
					<year>2022</year>
					<day>07</day>
					<month>05</month>
					<year>2023</year>
					<ext-link ext-link-type="uri" xlink:href="https://www.icao.int/airnavigation/documents/ganp-2016-interactive.pdf">https://www.icao.int/airnavigation/documents/ganp-2016-interactive.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B3">
				<label>[3]</label>
				<mixed-citation>[3] Zhang, X., Zhong, S., and Mahadevan, S., Airport surface movement prediction and safety assessment with spatial-temporal graph convolutional neural network. Transportation Research Part C: Emerging Technologies, 144, art. 103873, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="http://dx.doi.org/10.1016/j.trc.2022.103873">http://dx.doi.org/10.1016/j.trc.2022.103873</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Zhong</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Mahadevan</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<article-title>Airport surface movement prediction and safety assessment with spatial-temporal graph convolutional neural network</article-title>
					<source>Transportation Research Part C: Emerging Technologies</source>
					<volume>144</volume>
					<fpage>103873</fpage>
					<lpage>103873</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="http://dx.doi.org/10.1016/j.trc.2022.103873">http://dx.doi.org/10.1016/j.trc.2022.103873</ext-link>
				</element-citation>
			</ref>
			<ref id="B4">
				<label>[4]</label>
				<mixed-citation>[4] Sridhar, B., and Bell, D., Sustainable aviation operations and the role of information technology and data science: background, current status and future directions. AIAA AVIATION 2022 Forum. 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2514/6.2022-3705">https://doi.org/10.2514/6.2022-3705</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Sridhar</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Bell</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<source>Sustainable aviation operations and the role of information technology and data science: background, current status and future directions</source>
					<publisher-name>AIAA AVIATION</publisher-name>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2514/6.2022-3705">https://doi.org/10.2514/6.2022-3705</ext-link>
				</element-citation>
			</ref>
			<ref id="B5">
				<label>[5]</label>
				<mixed-citation>[5] Stroeve, S., Smeltink, J., and Kirwan, B,. Assessing and advancing safety management in aviation. Safety, 8(2), art. 20, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/safety8020020">https://doi.org/10.3390/safety8020020</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Stroeve</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Smeltink</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Kirwan</surname>
							<given-names>B</given-names>
						</name>
					</person-group>
					<article-title>Assessing and advancing safety management in aviation</article-title>
					<source>Safety</source>
					<volume>8</volume>
					<issue>2</issue>
					<fpage>20</fpage>
					<lpage>20</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/safety8020020">https://doi.org/10.3390/safety8020020</ext-link>
				</element-citation>
			</ref>
			<ref id="B6">
				<label>[6]</label>
				<mixed-citation>[6] Yoon, M.G., and Kim, J.K., Evaluation methodology for safety maturity in air navigation safety. Journal of Air Transport Management, 98, e102159, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jairtraman.2021.102159">https://doi.org/10.1016/j.jairtraman.2021.102159</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yoon</surname>
							<given-names>M.G.</given-names>
						</name>
						<name>
							<surname>Kim</surname>
							<given-names>J.K.</given-names>
						</name>
					</person-group>
					<article-title>Evaluation methodology for safety maturity in air navigation safety</article-title>
					<source>Journal of Air Transport Management</source>
					<volume>98</volume>
					<elocation-id>e102159</elocation-id>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jairtraman.2021.102159">https://doi.org/10.1016/j.jairtraman.2021.102159</ext-link>
				</element-citation>
			</ref>
			<ref id="B7">
				<label>[7]</label>
				<mixed-citation>[7] Jia, Z., and Qi, F., Developing a civil aviation safety management maturity model to promote the safety level of civil aviation. International Journal of Reliability and Safety, 15(4), art. 306, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1504/ijrs.2021.10050705">https://doi.org/10.1504/ijrs.2021.10050705</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Jia</surname>
							<given-names>Z.</given-names>
						</name>
						<name>
							<surname>Qi</surname>
							<given-names>F.</given-names>
						</name>
					</person-group>
					<article-title>Developing a civil aviation safety management maturity model to promote the safety level of civil aviation</article-title>
					<source>International Journal of Reliability and Safety</source>
					<volume>15</volume>
					<issue>4</issue>
					<fpage>306</fpage>
					<lpage>306</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1504/ijrs.2021.10050705">https://doi.org/10.1504/ijrs.2021.10050705</ext-link>
				</element-citation>
			</ref>
			<ref id="B8">
				<label>[8]</label>
				<mixed-citation>[8] Kour, R., Karim, R., and Thaduri, A., Cybersecurity for railways. A maturity model. Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit, 234 (10), pp 1129-1148, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0954409719881849">https://doi.org/10.1177/0954409719881849 </ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Kour</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Karim</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Thaduri</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>Cybersecurity for railways. A maturity model. Proceedings of the Institution of Mechanical Engineers</article-title>
					<source>Part F: Journal of Rail and Rapid Transit</source>
					<volume>234</volume>
					<issue>10</issue>
					<fpage>1129</fpage>
					<lpage>1148</lpage>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0954409719881849">https://doi.org/10.1177/0954409719881849 </ext-link>
				</element-citation>
			</ref>
			<ref id="B9">
				<label>[9]</label>
				<mixed-citation>[9] Yigit-Ozkan, B., van Lingen, S., and Spruit, M., The Cybersecurity Focus Area Maturity (CYSFAM) Model. Journal of Cybersecurity and Privacy, 1(1), pp. 119-139, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/jcp1010007">https://doi.org/10.3390/jcp1010007</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yigit-Ozkan</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>van Lingen</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Spruit</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>The Cybersecurity Focus Area Maturity (CYSFAM) Model</article-title>
					<source>Journal of Cybersecurity and Privacy</source>
					<volume>1</volume>
					<issue>1</issue>
					<fpage>119</fpage>
					<lpage>139</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/jcp1010007">https://doi.org/10.3390/jcp1010007</ext-link>
				</element-citation>
			</ref>
			<ref id="B10">
				<label>[10]</label>
				<mixed-citation>[10] Ghaffari, F., and Arabsorkhi, A., A New adaptive cyber-security capability maturity model. 2018 9<sup>th</sup> International Symposium on Telecommunications (IST), 2018. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/istel.2018.8661018">https://doi.org/10.1109/istel.2018.8661018</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Ghaffari</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Arabsorkhi</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<source>A New adaptive cyber-security capability maturity model</source>
					<conf-date>2018</conf-date>
					<conf-name>9thInternational Symposium on Telecommunications</conf-name>
					<conf-sponsor>IST</conf-sponsor>
					<year>2018</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/istel.2018.8661018">https://doi.org/10.1109/istel.2018.8661018</ext-link>
				</element-citation>
			</ref>
			<ref id="B11">
				<label>[11]</label>
				<mixed-citation>[11] Almomani, I., Ahmed, M., and Maglaras, L., Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. Peer J Computer Science, 7, e703. Portico, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7717/peerj-cs.703">https://doi.org/10.7717/peerj-cs.703</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Almomani</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Ahmed</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Maglaras</surname>
							<given-names>L.</given-names>
						</name>
					</person-group>
					<article-title>Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia</article-title>
					<source>Peer J Computer Science</source>
					<volume>7</volume>
					<elocation-id>e703</elocation-id>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7717/peerj-cs.703">https://doi.org/10.7717/peerj-cs.703</ext-link>
				</element-citation>
			</ref>
			<ref id="B12">
				<label>[12]</label>
				<mixed-citation>[12] Rea-Guaman, A.M., Mejía, J., San Feliu, T., and Calvo-Manzano, J.A., AVARCIBER: a framework for assessing cybersecurity risks. Cluster Computing, 23(3), pp. 1827-1843, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10586-019-03034-9">https://doi.org/10.1007/s10586-019-03034-9</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Rea-Guaman</surname>
							<given-names>A.M.</given-names>
						</name>
						<name>
							<surname>Mejía</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>San Feliu</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Calvo-Manzano</surname>
							<given-names>J.A.</given-names>
						</name>
					</person-group>
					<article-title>AVARCIBER: a framework for assessing cybersecurity risks</article-title>
					<source>Cluster Computing</source>
					<volume>23</volume>
					<issue>3</issue>
					<fpage>1827</fpage>
					<lpage>1843</lpage>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10586-019-03034-9">https://doi.org/10.1007/s10586-019-03034-9</ext-link>
				</element-citation>
			</ref>
			<ref id="B13">
				<label>[13]</label>
				<mixed-citation>[13] Aliyu, A., Maglaras, L., He, Y., Yevseyeva, I., Boiten, E., Cook, A., and Janicke, H., A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom. Applied Sciences, 10(10), e3660, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/app10103660">https://doi.org/10.3390/app10103660</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Aliyu</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Maglaras</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>He</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Yevseyeva</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Boiten</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Cook</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Janicke</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<article-title>A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom</article-title>
					<source>Applied Sciences</source>
					<volume>10</volume>
					<issue>10</issue>
					<elocation-id>e3660</elocation-id>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/app10103660">https://doi.org/10.3390/app10103660</ext-link>
				</element-citation>
			</ref>
			<ref id="B14">
				<label>[14]</label>
				<mixed-citation>[14] Perales-Manrique, J.H., and Molina-Chirinos, J.A., Modelo de madurez de analítica de datos para el sector financiero, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19083/tesis/652126">https://doi.org/10.19083/tesis/652126</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Perales-Manrique</surname>
							<given-names>J.H.</given-names>
						</name>
						<name>
							<surname>Molina-Chirinos</surname>
							<given-names>J.A.</given-names>
						</name>
					</person-group>
					<source>Modelo de madurez de analítica de datos para el sector financiero</source>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19083/tesis/652126">https://doi.org/10.19083/tesis/652126</ext-link>
				</element-citation>
			</ref>
			<ref id="B15">
				<label>[15]</label>
				<mixed-citation>[15] Al-Matari, O.M.M., Helal, I.M.A., Mazen, S.A., and Elhennawy, S., Adopting security maturity model to the organizations’ capability model. Egyptian Informatics Journal, 22(2), pp. 193-199, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.eij.2020.08.001">https://doi.org/10.1016/j.eij.2020.08.001</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Al-Matari</surname>
							<given-names>O.M.M.</given-names>
						</name>
						<name>
							<surname>Helal</surname>
							<given-names>I.M.A.</given-names>
						</name>
						<name>
							<surname>Mazen</surname>
							<given-names>S.A.</given-names>
						</name>
						<name>
							<surname>Elhennawy</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<article-title>Adopting security maturity model to the organizations’ capability model</article-title>
					<source>Egyptian Informatics Journal</source>
					<volume>22</volume>
					<issue>2</issue>
					<fpage>193</fpage>
					<lpage>199</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.eij.2020.08.001">https://doi.org/10.1016/j.eij.2020.08.001</ext-link>
				</element-citation>
			</ref>
			<ref id="B16">
				<label>[16]</label>
				<mixed-citation>[16] Schlette, D., Vielberth, M., and Pernul, G., CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities. Computers &amp; Security, 111, e102482, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cose.2021.102482">https://doi.org/10.1016/j.cose.2021.102482</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Schlette</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Vielberth</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Pernul</surname>
							<given-names>G.</given-names>
						</name>
					</person-group>
					<source>CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities</source>
					<publisher-name>Computers &amp; Security</publisher-name>
					<volume>111</volume>
					<elocation-id>e102482</elocation-id>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cose.2021.102482">https://doi.org/10.1016/j.cose.2021.102482</ext-link>
				</element-citation>
			</ref>
			<ref id="B17">
				<label>[17]</label>
				<mixed-citation>[17] Malhotra, O., Dey, S., Foo, E., and Helbig, M., Cyber Security maturity model capability at the airports, ACIS 2021 Proceedings, 55, [online]. 2021. Available at: <ext-link ext-link-type="uri" xlink:href="https://aisel.aisnet.org/acis2021/55">https://aisel.aisnet.org/acis2021/55</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Malhotra</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Dey</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Foo</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Helbig</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<source>Cyber Security maturity model capability at the airports</source>
					<publisher-name>ACIS</publisher-name>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://aisel.aisnet.org/acis2021/55">https://aisel.aisnet.org/acis2021/55</ext-link>
				</element-citation>
			</ref>
			<ref id="B18">
				<label>[18]</label>
				<mixed-citation>[18] Schmitz, C., Schmid, M., Harborth, D., and Pape, S., Maturity level assessments of information security controls: an empirical analysis of practitioners assessment capabilities. Computers &amp; Security, 108, e102306, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cose.2021.102306">https://doi.org/10.1016/j.cose.2021.102306</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Schmitz</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Schmid</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Harborth</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Pape</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<article-title>Maturity level assessments of information security controls: an empirical analysis of practitioners assessment capabilities</article-title>
					<source>Computers &amp; Security</source>
					<volume>108</volume>
					<elocation-id>e102306</elocation-id>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cose.2021.102306">https://doi.org/10.1016/j.cose.2021.102306</ext-link>
				</element-citation>
			</ref>
			<ref id="B19">
				<label>[19]</label>
				<mixed-citation>[19] Yigit-Ozkan, B., and Spruit, M., A questionnaire model for cybersecurity maturity assessment of critical infrastructures. Information and operational technology security systems, 2019, pp. 49-60. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-12085-6_5">https://doi.org/10.1007/978-3-030-12085-6_5</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Yigit-Ozkan</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Spruit</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<chapter-title>A questionnaire model for cybersecurity maturity assessment of critical infrastructures</chapter-title>
					<source>Information and operational technology security systems</source>
					<year>2019</year>
					<fpage>49</fpage>
					<lpage>60</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-12085-6_5">https://doi.org/10.1007/978-3-030-12085-6_5</ext-link>
				</element-citation>
			</ref>
			<ref id="B20">
				<label>[20]</label>
				<mixed-citation>[20] Pérez-Navarro, H.B. y Salcedo-Jara, H.L., Modelo de madurez en ciberseguridad para empresas que manejan datos de salud, [en línea]. 2022. Disponible en: <ext-link ext-link-type="uri" xlink:href="http://hdl.handle.net/10757/655801">http://hdl.handle.net/10757/655801</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Pérez-Navarro</surname>
							<given-names>H.B.</given-names>
						</name>
						<name>
							<surname>Salcedo-Jara</surname>
							<given-names>H.L.</given-names>
						</name>
					</person-group>
					<source>Modelo de madurez en ciberseguridad para empresas que manejan datos de salud</source>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="http://hdl.handle.net/10757/655801">http://hdl.handle.net/10757/655801</ext-link>
				</element-citation>
			</ref>
			<ref id="B21">
				<label>[21]</label>
				<mixed-citation>[21] Cyber Security - An introduction to assessment and maturity frameworks. An introduction to cyber modeling and simulation, 2018, pp. 9-18. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/9781119420842.ch2">https://doi.org/10.1002/9781119420842.ch2</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<chapter-title>Cyber Security - An introduction to assessment and maturity frameworks</chapter-title>
					<source>An introduction to cyber modeling and simulation</source>
					<year>2018</year>
					<fpage>9</fpage>
					<lpage>18</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/9781119420842.ch2">https://doi.org/10.1002/9781119420842.ch2</ext-link>
				</element-citation>
			</ref>
			<ref id="B22">
				<label>[22]</label>
				<mixed-citation>[22] Zárate-Santos, I.J., Herramienta de armonización entre las normas 27001 y NIST800-53 como pilares para la medición del nivel de madurez del SGSI, [en línea]. 2022. Disponible en: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/26924">https://hdl.handle.net/10983/26924</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Zárate-Santos</surname>
							<given-names>I.J.</given-names>
						</name>
					</person-group>
					<source>Herramienta de armonización entre las normas 27001 y NIST800-53 como pilares para la medición del nivel de madurez del</source>
					<publisher-name>SGSI</publisher-name>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/26924">https://hdl.handle.net/10983/26924</ext-link>
				</element-citation>
			</ref>
			<ref id="B23">
				<label>[23]</label>
				<mixed-citation>[23] Aristizábal-Correa, J.M., Marín-Ramírez, L., and Álvarez-Salazar, J., Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil. Revista Colombiana de Computación, 20(2), pp. 56-67, 2019. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.29375/25392115.3722">https://doi.org/10.29375/25392115.3722</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Aristizábal-Correa</surname>
							<given-names>J.M.</given-names>
						</name>
						<name>
							<surname>Marín-Ramírez</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Álvarez-Salazar</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<article-title>Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil</article-title>
					<source>Revista Colombiana de Computación</source>
					<volume>20</volume>
					<issue>2</issue>
					<fpage>56</fpage>
					<lpage>67</lpage>
					<year>2019</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.29375/25392115.3722">https://doi.org/10.29375/25392115.3722</ext-link>
				</element-citation>
			</ref>
			<ref id="B24">
				<label>[24]</label>
				<mixed-citation>[24] Drivas, G., Chatzopoulou, A., Maglaras, L., Lambrinoudakis, C., Cook, A., and Janicke, H., A NIS directive compliant cybersecurity maturity assessment framework. 2020 IEEE 44<sup>t</sup>
 <sup>h</sup> Annual Computers, Software, and Applications Conference (COMPSAC), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/compsac48688.2020.00-20">https://doi.org/10.1109/compsac48688.2020.00-20</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Drivas</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Chatzopoulou</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Maglaras</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Lambrinoudakis</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Cook</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Janicke</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<source>A NIS directive compliant cybersecurity maturity assessment framework</source>
					<conf-date>2020</conf-date><sup>h</sup><conf-name>44tAnnual Computers, Software, and Applications Conference</conf-name>
					<conf-sponsor>COMPSAC</conf-sponsor>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/compsac48688.2020.00-20">https://doi.org/10.1109/compsac48688.2020.00-20</ext-link>
				</element-citation>
			</ref>
			<ref id="B25">
				<label>[25]</label>
				<mixed-citation>[25] Dube, D.P., and Mohanty, R.P., Towards development of a cyber security capability maturity model. International Journal of Business Information Systems, 34(1), art. 104, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1504/ijbis.2020.106800">https://doi.org/10.1504/ijbis.2020.106800</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Dube</surname>
							<given-names>D.P.</given-names>
						</name>
						<name>
							<surname>Mohanty</surname>
							<given-names>R.P.</given-names>
						</name>
					</person-group>
					<article-title>Towards development of a cyber security capability maturity model</article-title>
					<source>International Journal of Business Information Systems</source>
					<volume>34</volume>
					<issue>1</issue>
					<fpage>104</fpage>
					<lpage>104</lpage>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1504/ijbis.2020.106800">https://doi.org/10.1504/ijbis.2020.106800</ext-link>
				</element-citation>
			</ref>
			<ref id="B26">
				<label>[26]</label>
				<mixed-citation>[26] Maglaras, L., Drivas, G., Chouliaras, N., Boiten, E., Lambrinoudakis, C., and Ioannidis, S., Cybersecurity in the era of digital transformation: the case of Greece. 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/itia50152.2020.9312297">https://doi.org/10.1109/itia50152.2020.9312297</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Maglaras</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Drivas</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Chouliaras</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Boiten</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Lambrinoudakis</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Ioannidis</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<source>Cybersecurity in the era of digital transformation: the case of Greece</source>
					<conf-date>2020</conf-date>
					<conf-name>International Conference on Internet of Things and Intelligent Applications</conf-name>
					<conf-date>ITIA</conf-date>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/itia50152.2020.9312297">https://doi.org/10.1109/itia50152.2020.9312297</ext-link>
				</element-citation>
			</ref>
			<ref id="B27">
				<label>[27]</label>
				<mixed-citation>[27] Gallardo, J., Torres, R., and Tessini, O., Surveillance platform of cybersecurity maturity of micro and small enterprises. 2020 39<sup>th</sup> International Conference of the Chilean Computer Science Society (SCCC), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/sccc51225.2020.9281264">https://doi.org/10.1109/sccc51225.2020.9281264</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Gallardo</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Torres</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Tessini</surname>
							<given-names>O.</given-names>
						</name>
					</person-group>
					<source>Surveillance platform of cybersecurity maturity of micro and small enterprises</source>
					<conf-date>2020</conf-date><sup>th</sup><conf-name>39International Conference of the Chilean Computer Science Society</conf-name>
					<conf-sponsor>SCCC</conf-sponsor>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/sccc51225.2020.9281264">https://doi.org/10.1109/sccc51225.2020.9281264</ext-link>
				</element-citation>
			</ref>
			<ref id="B28">
				<label>[28]</label>
				<mixed-citation>[28] Orellana-Cabrera, X.E., and Álvarez-Galarza, M.D., Marco de trabajo de gobierno de TI orientado a la ciberseguridad para el sector bancario bajo COBIT 2019. Polo del Conocimiento, 7(3), pp. 706-726, 2022. Available at: <ext-link ext-link-type="uri" xlink:href="https://dialnet.unirioja.es/descarga/articulo/8399852.pdf">https://dialnet.unirioja.es/descarga/articulo/8399852.pdf </ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Orellana-Cabrera</surname>
							<given-names>X.E.</given-names>
						</name>
						<name>
							<surname>Álvarez-Galarza</surname>
							<given-names>M.D.</given-names>
						</name>
					</person-group>
					<article-title>Marco de trabajo de gobierno de TI orientado a la ciberseguridad para el sector bancario bajo COBIT 2019</article-title>
					<source>Polo del Conocimiento</source>
					<volume>7</volume>
					<issue>3</issue>
					<fpage>706</fpage>
					<lpage>726</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://dialnet.unirioja.es/descarga/articulo/8399852.pdf">https://dialnet.unirioja.es/descarga/articulo/8399852.pdf </ext-link>
				</element-citation>
			</ref>
			<ref id="B29">
				<label>[29]</label>
				<mixed-citation>[29] Akinsanya, O.O., Papadaki, M., and Sun, L., Current cybersecurity maturity models: how effective in healthcare cloud?. In CERC 2019, pp. 211-222. Available at: <ext-link ext-link-type="uri" xlink:href="https://ceur-ws.org/Vol-2348/paper16.pdf">https://ceur-ws.org/Vol-2348/paper16.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Akinsanya</surname>
							<given-names>O.O.</given-names>
						</name>
						<name>
							<surname>Papadaki</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Sun</surname>
							<given-names>L.</given-names>
						</name>
					</person-group>
					<source>Current cybersecurity maturity models: how effective in healthcare cloud?</source>
					<publisher-name>CERC</publisher-name>
					<year>2019</year>
					<fpage>211</fpage>
					<lpage>222</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://ceur-ws.org/Vol-2348/paper16.pdf">https://ceur-ws.org/Vol-2348/paper16.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B30">
				<label>[30]</label>
				<mixed-citation>[30] Stastny, P., and Stoica, A.-M., Protecting aviation safety against cybersecurity threats. IOP Conference Series: Materials Science and Engineering, 1226(1), art. 012025, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1088/1757-899x/1226/1/012025">https://doi.org/10.1088/1757-899x/1226/1/012025</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Stastny</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Stoica</surname>
							<given-names>A.-M.</given-names>
						</name>
					</person-group>
					<article-title>Protecting aviation safety against cybersecurity threats</article-title>
					<source>IOP Conference Series: Materials Science and Engineering</source>
					<volume>1226</volume>
					<issue>1</issue>
					<fpage>012025</fpage>
					<lpage>012025</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1088/1757-899x/1226/1/012025">https://doi.org/10.1088/1757-899x/1226/1/012025</ext-link>
				</element-citation>
			</ref>
			<ref id="B31">
				<label>[31]</label>
				<mixed-citation>[31] Olarte-Rojas, A.D., Propuesta metodológica para la evaluación de la madurez del sistema de gestión de continuidad del negocio en el sector financiero bancario colombiano bajo el enfoque de la norma ISO 22301:2012. SIGNOS - Investigación En Sistemas de Gestión, 8(1), art. 31, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15332/s2145-1389.2016.0001.02">https://doi.org/10.15332/s2145-1389.2016.0001.02</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Olarte-Rojas</surname>
							<given-names>A.D.</given-names>
						</name>
					</person-group>
					<article-title>Propuesta metodológica para la evaluación de la madurez del sistema de gestión de continuidad del negocio en el sector financiero bancario colombiano bajo el enfoque de la norma ISO 22301:2012</article-title>
					<publisher-name>SIGNOS</publisher-name>
					<source>Investigación En Sistemas de Gestión</source>
					<volume>8</volume>
					<issue>1</issue>
					<fpage>31</fpage>
					<lpage>31</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15332/s2145-1389.2016.0001.02">https://doi.org/10.15332/s2145-1389.2016.0001.02</ext-link>
				</element-citation>
			</ref>
			<ref id="B32">
				<label>[32]</label>
				<mixed-citation>[32] Uche-M.M., Lucienne A., and Oghenevovwero-Zion. A.A., Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) framework. The African Journal of Information and Communication (AJIC), 23, 2019. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23962/10539/27535">https://doi.org/10.23962/10539/27535</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Uche-M.M.</surname>
							<given-names>Lucienne A.</given-names>
						</name>
						<name>
							<surname>Oghenevovwero-Zion</surname>
							<given-names>A.A.</given-names>
						</name>
					</person-group>
					<article-title>Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) framework</article-title>
					<source>The African Journal of Information and Communication (AJIC)</source>
					<volume>23</volume>
					<year>2019</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23962/10539/27535">https://doi.org/10.23962/10539/27535</ext-link>
				</element-citation>
			</ref>
			<ref id="B33">
				<label>[33]</label>
				<mixed-citation>[33] Irene-Christine, D., and Thinyane, M., Comparative analysis of cyber resilience strategy in Asia-Pacific countries. 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00027">https://doi.org/10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00027</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Irene-Christine</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Thinyane</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<source>Comparative analysis of cyber resilience strategy in Asia-Pacific countries</source>
					<conf-date>2020</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)</conf-name>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00027">https://doi.org/10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00027</ext-link>
				</element-citation>
			</ref>
			<ref id="B34">
				<label>[34]</label>
				<mixed-citation>[34] Chaudhary, M., and Chopra, A., Planning CMMI Implementation. CMMI for Development, pp 71-80, 2016. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-1-4842-2529-5_3">https://doi.org/10.1007/978-1-4842-2529-5_3</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Chaudhary</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Chopra</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<source>Planning CMMI Implementation</source>
					<publisher-name>CMMI for Development</publisher-name>
					<fpage>71</fpage>
					<lpage>80</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-1-4842-2529-5_3">https://doi.org/10.1007/978-1-4842-2529-5_3</ext-link>
				</element-citation>
			</ref>
			<ref id="B35">
				<label>[35]</label>
				<mixed-citation>[35] Carrizo, D. y Alfaro, A., Método de aseguramiento de la calidad en una metodología de desarrollo de software: un enfoque práctico. Ingeniare. Revista Chilena de Ingeniería, 26(1), pp. 114-129, 2018. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4067/s0718-33052018000100114">https://doi.org/10.4067/s0718-33052018000100114</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Carrizo</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Alfaro</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>Método de aseguramiento de la calidad en una metodología de desarrollo de software: un enfoque práctico. Ingeniare</article-title>
					<source>Revista Chilena de Ingeniería</source>
					<volume>26</volume>
					<issue>1</issue>
					<fpage>114</fpage>
					<lpage>129</lpage>
					<year>2018</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4067/s0718-33052018000100114">https://doi.org/10.4067/s0718-33052018000100114</ext-link>
				</element-citation>
			</ref>
			<ref id="B36">
				<label>[36]</label>
				<mixed-citation>[36] Combining NIST SP 800-55 and SP 800-26. Official (ISC)2® Guide to the ISSEP® CBK®, Second Edition, 2005, pp. 781-786. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1201/9780203888933.axc">https://doi.org/10.1201/9780203888933.axc</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<source>Combining NIST SP 800-55 and SP 800-26. Official (ISC)2® Guide to the ISSEP® CBK®</source>
					<edition>Second </edition>
					<year>2005</year>
					<fpage>781</fpage>
					<lpage>786</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1201/9780203888933.axc">https://doi.org/10.1201/9780203888933.axc</ext-link>
				</element-citation>
			</ref>
			<ref id="B37">
				<label>[37]</label>
				<mixed-citation>[37] CANSO, Standard of excellence in cybersecurity, Civil Air Navigation Services Organization, [online]. 2020. [consultation, May 7, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/">https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>CANSO</collab>
					</person-group>
					<source>Standard of excellence in cybersecurity, Civil Air Navigation Services Organization</source>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/">https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/</ext-link>
				</element-citation>
			</ref>
			<ref id="B38">
				<label>[38]</label>
				<mixed-citation>[38] Meza, J.A.D., Castro, M.L.C., Vivas, R.V.J., and Rueda, A.C.C., Collaborative learning tools used in virtual higher education programs: a sistematic review of literature in Iberoamerica. In: 2020 15<sup>th</sup> Iberian Conference on Information Systems and Technologies (CISTI), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23919/cisti49556.2020.9140901">https://doi.org/10.23919/cisti49556.2020.9140901</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Meza</surname>
							<given-names>J.A.D.</given-names>
						</name>
						<name>
							<surname>Castro</surname>
							<given-names>M.L.C.</given-names>
						</name>
						<name>
							<surname>Vivas</surname>
							<given-names>R.V.J.</given-names>
						</name>
						<name>
							<surname>Rueda</surname>
							<given-names>A.C.C.</given-names>
						</name>
					</person-group>
					<source>Collaborative learning tools used in virtual higher education programs: a sistematic review of literature in Iberoamerica</source>
					<conf-date>2020</conf-date>
					<conf-name>15thIberian Conference on Information Systems and Technologies</conf-name>
					<conf-sponsor>CISTI</conf-sponsor>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23919/cisti49556.2020.9140901">https://doi.org/10.23919/cisti49556.2020.9140901</ext-link>
				</element-citation>
			</ref>
			<ref id="B39">
				<label>[39]</label>
				<mixed-citation>[39] Yogarajah, T., Shanmuganathan, V., and Kuhaneswaran, B., Evaluation and validation using Delphi method &amp; field test for subfertility decision support system. 2020 From Innovation to Impact (FITI), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/fiti52050.2020.9424878">https://doi.org/10.1109/fiti52050.2020.9424878</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Yogarajah</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Shanmuganathan</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Kuhaneswaran</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<source>Evaluation and validation using Delphi method &amp; field test for subfertility decision support system</source>
					<conf-date>2020</conf-date>
					<conf-name>From Innovation to Impact</conf-name>
					<conf-sponsor>FITI</conf-sponsor>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/fiti52050.2020.9424878">https://doi.org/10.1109/fiti52050.2020.9424878</ext-link>
				</element-citation>
			</ref>
			<ref id="B40">
				<label>[40]</label>
				<mixed-citation>[40] Fajardo-Castro, L.V., Evaluación, diagnóstico e intervención: equipos de alto desempeño. Evaluación, Diagnóstico e Intervención En Psicología Organizacional: Nivel Grupo, pp 41-63, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14718/9789585133785.2021.3">https://doi.org/10.14718/9789585133785.2021.3</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Fajardo-Castro</surname>
							<given-names>L.V.</given-names>
						</name>
					</person-group>
					<chapter-title>Evaluación, diagnóstico e intervención: equipos de alto desempeño. Evaluación, Diagnóstico e Intervención</chapter-title>
					<source>Psicología Organizacional: Nivel Grupo</source>
					<fpage>41</fpage>
					<lpage>63</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14718/9789585133785.2021.3">https://doi.org/10.14718/9789585133785.2021.3</ext-link>
				</element-citation>
			</ref>
			<ref id="B41">
				<label>[41]</label>
				<mixed-citation>[41] ISO 27001 and the management system requirements, ISO/IEC 27001:2022, 2022, pp 17-21. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2307/j.ctv30qq13d.6">https://doi.org/10.2307/j.ctv30qq13d.6</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<source>ISO 27001 and the management system requirements</source>
					<publisher-name>ISO/IEC</publisher-name>
					<year>2022</year>
					<fpage>17</fpage>
					<lpage>21</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2307/j.ctv30qq13d.6">https://doi.org/10.2307/j.ctv30qq13d.6</ext-link>
				</element-citation>
			</ref>
			<ref id="B42">
				<label>[42]</label>
				<mixed-citation>[42] Bartock, M., Brule, J., Li-Baboud, Y.-S., Lightman, S., McCarthy, J., Reczek, K., Northrip, D., Scholz, A., and Suloway, T., Cybersecurity profile for the responsible use of Positioning, Navigation and Timing (PNT) services, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.6028/nist.ir.8323-draft">https://doi.org/10.6028/nist.ir.8323-draft</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bartock</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Brule</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Li-Baboud</surname>
							<given-names>Y.-S.</given-names>
						</name>
						<name>
							<surname>Lightman</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>McCarthy</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Reczek</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Northrip</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Scholz</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Suloway</surname>
							<given-names>T.</given-names>
						</name>
					</person-group>
					<source>Cybersecurity profile for the responsible use of Positioning</source>
					<publisher-name>Navigation and Timing (PNT) services</publisher-name>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.6028/nist.ir.8323-draft">https://doi.org/10.6028/nist.ir.8323-draft</ext-link>
				</element-citation>
			</ref>
			<ref id="B43">
				<label>[43]</label>
				<mixed-citation>[43] Amiruddin, A., Afiansyah, H.G., and Nugroho, H.A., Cyber-Risk management planning using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8. 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/icimcis53775.2021.9699337">https://doi.org/10.1109/icimcis53775.2021.9699337</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Amiruddin</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Afiansyah</surname>
							<given-names>H.G.</given-names>
						</name>
						<name>
							<surname>Nugroho</surname>
							<given-names>H.A.</given-names>
						</name>
					</person-group>
					<source>Cyber-Risk management planning using NIST CSF v1.1, NIST SP 800-53</source>
					<conf-name>International Conference on Informatics, Multimedia, Cyber and Information System</conf-name>
					<conf-sponsor>ICIMCIS</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/icimcis53775.2021.9699337">https://doi.org/10.1109/icimcis53775.2021.9699337</ext-link>
				</element-citation>
			</ref>
			<ref id="B44">
				<label>[44]</label>
				<mixed-citation>[44] Bashofi, I., and Salman, M., Cybersecurity Maturity assessment design using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002. 2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/cyberneticscom55287.2022.9865640">https://doi.org/10.1109/cyberneticscom55287.2022.9865640</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Bashofi</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Salman</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<source>Cybersecurity Maturity assessment design using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002</source>
					<conf-date>2022</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)</conf-name>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/cyberneticscom55287.2022.9865640">https://doi.org/10.1109/cyberneticscom55287.2022.9865640</ext-link>
				</element-citation>
			</ref>
			<ref id="B45">
				<label>[45]</label>
				<mixed-citation>[45] GCSCC, Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Ed. SSRN Electronic Journal, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2139/ssrn.3822153">https://doi.org/10.2139/ssrn.3822153</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<collab>GCSCC</collab>
					</person-group>
					<article-title>Cybersecurity Capacity Maturity Model for Nations (CMM) 2021</article-title>
					<source>SSRN Electronic Journal</source>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2139/ssrn.3822153">https://doi.org/10.2139/ssrn.3822153</ext-link>
				</element-citation>
			</ref>
			<ref id="B46">
				<label>[46]</label>
				<mixed-citation>[46] U.S. Departamento de Energía, Modelo de madurez de la capacidad de ciberseguridad (C2M2) versión 2.1, Departamento de Energía de EE.UU., Washington, DC, [online]. 2022. [consultation, May 7, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.energy.gov/sites/default/files/2022-06/C2M2%20Version%202.1%20June%202022.pdf">https://www.energy.gov/sites/default/files/2022-06/C2M2%20Version%202.1%20June%202022.pdf </ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>U.S. Departamento de Energía</collab>
					</person-group>
					<source>Modelo de madurez de la capacidad de ciberseguridad (C2M2)</source>
					<version>2.1</version>
					<publisher-name>Departamento de Energía de EE.UU</publisher-name>
					<publisher-loc>Washington, DC</publisher-loc>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://www.energy.gov/sites/default/files/2022-06/C2M2%20Version%202.1%20June%202022.pdf">https://www.energy.gov/sites/default/files/2022-06/C2M2%20Version%202.1%20June%202022.pdf </ext-link>
				</element-citation>
			</ref>
			<ref id="B47">
				<label>[47]</label>
				<mixed-citation>[47] Amiruddin, A., Afiansyah, H.G., and Nugroho, H.A., Cyber-Risk management planning using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8. 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/icimcis53775.2021.9699337">https://doi.org/10.1109/icimcis53775.2021.9699337</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Amiruddin</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Afiansyah</surname>
							<given-names>H.G.</given-names>
						</name>
						<name>
							<surname>Nugroho</surname>
							<given-names>H.A.</given-names>
						</name>
					</person-group>
					<source>Cyber-Risk management planning using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8</source>
					<conf-date>2021</conf-date>
					<conf-name>International Conference on Informatics, Multimedia, Cyber and Information System</conf-name>
					<conf-sponsor>ICIMCIS</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/icimcis53775.2021.9699337">https://doi.org/10.1109/icimcis53775.2021.9699337</ext-link>
				</element-citation>
			</ref>
			<ref id="B48">
				<label>[48]</label>
				<mixed-citation>[48] Dammert, D.L. y Núñez, L.C., Enfrentando las ciberamenazas: estrategias nacionales de ciberseguridad en el Cono Sur. Seguridad, Ciencia &amp; Defensa, 5(5), pp. 107-129, [online]. 2019. [consultation, May 7<sup>th</sup>, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.utdt.edu/handle/20.500.13098/2294">https://repositorio.utdt.edu/handle/20.500.13098/2294</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Dammert</surname>
							<given-names>D.L.</given-names>
						</name>
						<name>
							<surname>Núñez</surname>
							<given-names>L.C.</given-names>
						</name>
					</person-group>
					<article-title>Enfrentando las ciberamenazas: estrategias nacionales de ciberseguridad en el Cono Sur</article-title>
					<source>Seguridad, Ciencia &amp; Defensa</source>
					<volume>5</volume>
					<issue>5</issue>
					<fpage>107</fpage>
					<lpage>129</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://repositorio.utdt.edu/handle/20.500.13098/2294">https://repositorio.utdt.edu/handle/20.500.13098/2294</ext-link>
				</element-citation>
			</ref>
			<ref id="B49">
				<label>[49]</label>
				<mixed-citation>[49] Herrera-Masó, J.R., Calero-Ricardo, J.L., González-Rangel, M.Á., Collazo-Ramos, M.I. y Travieso-González, Y., El método de consulta a expertos en tres niveles de validación. Revista Habanera de Ciencias Médicas, 21(1), [online]. 2022. [consultation, May 7<sup>th</sup>, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://scielo.sld.cu/scielo.php?pid=S1729-519X2022000100014&amp;script=sci_arttext&amp;tlng=en">https://scielo.sld.cu/scielo.php?pid=S1729-519X2022000100014&amp;script=sci_arttext&amp;tlng=en</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Herrera-Masó</surname>
							<given-names>J.R.</given-names>
						</name>
						<name>
							<surname>Calero-Ricardo</surname>
							<given-names>J.L.</given-names>
						</name>
						<name>
							<surname>González-Rangel</surname>
							<given-names>M.Á.</given-names>
						</name>
						<name>
							<surname>Collazo-Ramos</surname>
							<given-names>M.I.</given-names>
						</name>
						<name>
							<surname>Travieso-González</surname>
							<given-names>Y.</given-names>
						</name>
					</person-group>
					<article-title>El método de consulta a expertos en tres niveles de validación</article-title>
					<source>Revista Habanera de Ciencias Médicas</source>
					<volume>21</volume>
					<issue>1</issue>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://scielo.sld.cu/scielo.php?pid=S1729-519X2022000100014&amp;script=sci_arttext&amp;tlng=en">https://scielo.sld.cu/scielo.php?pid=S1729-519X2022000100014&amp;script=sci_arttext&amp;tlng=en</ext-link>
				</element-citation>
			</ref>
			<ref id="B50">
				<label>[50]</label>
				<mixed-citation>[50] CANSO, Standard of excellence in cybersecurity, Civil Air Navigation Services Organization, [online]. 2020. [consultation, May 7<sup>th</sup>, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/">https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>CANSO</collab>
					</person-group>
					<source>Standard of excellence in cybersecurity</source>
					<publisher-name>Civil Air Navigation Services Organization</publisher-name>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/">https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/</ext-link>
				</element-citation>
			</ref>
			<ref id="B51">
				<label>[51]</label>
				<mixed-citation>[51] Visitsilp, B., and Bhumpenpein, N., Guidelines for Information technology governance based on integrated ISO 38500 and COBIT 2019. In: 2021 Research, Invention, and Innovation Congress: Innovation Electricals and Electronics (RI2C), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ri2c51727.2021.9559772">https://doi.org/10.1109/ri2c51727.2021.9559772</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Visitsilp</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Bhumpenpein</surname>
							<given-names>N.</given-names>
						</name>
					</person-group>
					<source>Guidelines for Information technology governance based on integrated ISO 38500 and COBIT 2019. In: 2021 Research, Invention</source>
					<conf-name>Innovation Congress: Innovation Electricals and Electronics</conf-name>
					<conf-sponsor>RI2C</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ri2c51727.2021.9559772">https://doi.org/10.1109/ri2c51727.2021.9559772</ext-link>
				</element-citation>
			</ref>
			<ref id="B52">
				<label>[52]</label>
				<mixed-citation>[52] Zwarts, H., Du Toit, J., and Von Solms, B., A Cyber-Diplomacy and Cybersecurity Awareness Framework (CDAF) for developing countries. European Conference on Cyber Warfare and Security, 21(1), pp. 341-349, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.34190/eccws.21.1.226">https://doi.org/10.34190/eccws.21.1.226</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Zwarts</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Du Toit</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Von Solms</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<source>A Cyber-Diplomacy and Cybersecurity Awareness Framework (CDAF) for developing countries</source>
					<conf-name>European Conference on Cyber Warfare and Security</conf-name>
					<volume>21</volume>
					<issue>1</issue>
					<fpage>341</fpage>
					<lpage>349</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.34190/eccws.21.1.226">https://doi.org/10.34190/eccws.21.1.226</ext-link>
				</element-citation>
			</ref>
			<ref id="B53">
				<label>[53]</label>
				<mixed-citation>[53] Livshitz, I.I., Lontsikh, P.A., Lontsikh, N.P., Golovina, E.Y., and Safonova, O.M., The effects of cyber-security risks on added value of consulting services for IT-security management systems in holding companies. 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&amp;QM&amp;IS), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/itqmis51053.2020.9322883">https://doi.org/10.1109/itqmis51053.2020.9322883</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Livshitz</surname>
							<given-names>I.I.</given-names>
						</name>
						<name>
							<surname>Lontsikh</surname>
							<given-names>P.A.</given-names>
						</name>
						<name>
							<surname>Lontsikh</surname>
							<given-names>N.P.</given-names>
						</name>
						<name>
							<surname>Golovina</surname>
							<given-names>E.Y.</given-names>
						</name>
						<name>
							<surname>Safonova</surname>
							<given-names>O.M.</given-names>
						</name>
					</person-group>
					<source>The effects of cyber-security risks on added value of consulting services for IT-security management systems in holding companies</source>
					<conf-date>2020</conf-date>
					<conf-name>International Conference Quality Management, Transport and Information Security, Information Technologies</conf-name>
					<conf-sponsor>IT&amp;QM&amp;IS</conf-sponsor>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/itqmis51053.2020.9322883">https://doi.org/10.1109/itqmis51053.2020.9322883</ext-link>
				</element-citation>
			</ref>
			<ref id="B54">
				<label>[54]</label>
				<mixed-citation>[54] Neira-Melendrez, J.R., Seguridad de información en IoT y Big Data: un mapeo sistemático, [en línea]. 2021. [consulta, Mayo 7, 2023]. Disponible en: <comment>Disponible en: <ext-link ext-link-type="uri" xlink:href="https://dspace.ups.edu.ec/bitstream/123456789/20578/1/UPS-GT003303.pdf">https://dspace.ups.edu.ec/bitstream/123456789/20578/1/UPS-GT003303.pdf</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Neira-Melendrez</surname>
							<given-names>J.R.</given-names>
						</name>
					</person-group>
					<source>Seguridad de información en IoT y Big Data: un mapeo sistemático</source>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">Mayo 7, 2023</date-in-citation>
					<comment>Disponible en: <ext-link ext-link-type="uri" xlink:href="https://dspace.ups.edu.ec/bitstream/123456789/20578/1/UPS-GT003303.pdf">https://dspace.ups.edu.ec/bitstream/123456789/20578/1/UPS-GT003303.pdf</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B55">
				<label>[55]</label>
				<mixed-citation>[55] Fernández-González, F.C., Fuentes-García-Romero-de-Tejada, C., González-Manzano, L. y Fuentes-García-Romero-de-Tejada, J.M.D., Revisión sistemática de la jurisprudencia española sobre ciberseguridad y privacidad (1995-2020), Revista de privacidad y derecho digital, VI (4), [en línea]. 2021. [consulta, Mayo 7, 2023]. Disponible en: <comment>Disponible en: <ext-link ext-link-type="uri" xlink:href="https://e-archivo.uc3m.es/bitstream/handle/10016/34078/revision_RPDD_2021.pdf">https://e-archivo.uc3m.es/bitstream/handle/10016/34078/revision_RPDD_2021.pdf</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Fernández-González</surname>
							<given-names>F.C.</given-names>
						</name>
						<name>
							<surname>Fuentes-García-Romero-de-Tejada</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>González-Manzano</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Fuentes-García-Romero-de-Tejada</surname>
							<given-names>J.M.D.</given-names>
						</name>
					</person-group>
					<article-title>Revisión sistemática de la jurisprudencia española sobre ciberseguridad y privacidad (1995-2020)</article-title>
					<source>Revista de privacidad y derecho digital</source>
					<volume>VI</volume>
					<issue>4</issue>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">Mayo 7, 2023</date-in-citation>
					<comment>Disponible en: <ext-link ext-link-type="uri" xlink:href="https://e-archivo.uc3m.es/bitstream/handle/10016/34078/revision_RPDD_2021.pdf">https://e-archivo.uc3m.es/bitstream/handle/10016/34078/revision_RPDD_2021.pdf</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B56">
				<label>[56]</label>
				<mixed-citation>[56] Tasheva, I., Cybersecurity post-COVID-19: lessons learned and policy recommendations. European View, 20(2), pp. 140-149, 2021. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/17816858211059250">https://doi.org/10.1177/17816858211059250</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Tasheva</surname>
							<given-names>I.</given-names>
						</name>
					</person-group>
					<article-title>Cybersecurity post-COVID-19: lessons learned and policy recommendations</article-title>
					<source>European View</source>
					<volume>20</volume>
					<issue>2</issue>
					<fpage>140</fpage>
					<lpage>149</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/17816858211059250">https://doi.org/10.1177/17816858211059250</ext-link>
				</element-citation>
			</ref>
			<ref id="B57">
				<label>[57]</label>
				<mixed-citation>[57] Perales-Manrique, J.H. y Molina-Chirinos, J.A., Modelo de madurez de analítica de datos para el sector financiero, 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19083/tesis/652126">https://doi.org/10.19083/tesis/652126</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Perales-Manrique</surname>
							<given-names>J.H.</given-names>
						</name>
						<name>
							<surname>Molina-Chirinos</surname>
							<given-names>J.A.</given-names>
						</name>
					</person-group>
					<source>Modelo de madurez de analítica de datos para el sector financiero</source>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19083/tesis/652126">https://doi.org/10.19083/tesis/652126</ext-link>
				</element-citation>
			</ref>
			<ref id="B58">
				<label>[58]</label>
				<mixed-citation>[58] Campos, J.L.S., Vigencia ontológica de la ciberseguridad en el marco de la seguridad informática chilena. Convenio de Budapest. Aula Virtual, 3(6), pp. 132-148, [en línea]. 2022. [consulta, Mayo 7, 2023]. Disponible en: <comment>Disponible en: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/30286">https://hdl.handle.net/10983/30286</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Campos</surname>
							<given-names>J.L.S.</given-names>
						</name>
					</person-group>
					<article-title>Vigencia ontológica de la ciberseguridad en el marco de la seguridad informática chilena</article-title>
					<source>Convenio de Budapest. Aula Virtual</source>
					<volume>3</volume>
					<issue>6</issue>
					<fpage>132</fpage>
					<lpage>148</lpage>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">Mayo 7, 2023</date-in-citation>
					<comment>Disponible en: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/30286">https://hdl.handle.net/10983/30286</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B59">
				<label>[59]</label>
				<mixed-citation>[59] Guayara-Murillo, E.A. y Moyano-Murcia, E.F., Propuesta de orientación en ciberseguridad para la formación de los estudiantes de media técnica especializada del colegio OEA IED basado en el marco NIST SP800-181, 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/30286">https://hdl.handle.net/10983/30286</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Guayara-Murillo</surname>
							<given-names>E.A.</given-names>
						</name>
						<name>
							<surname>Moyano-Murcia</surname>
							<given-names>E.F.</given-names>
						</name>
					</person-group>
					<source>Propuesta de orientación en ciberseguridad para la formación de los estudiantes de media técnica especializada del colegio OEA IED basado en el marco NIST SP800-181</source>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/30286">https://hdl.handle.net/10983/30286</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B60">
				<label>[60]</label>
				<mixed-citation>[60] Armenta, E.R., and Carrillo, A.L.I. Towards an implementation of Information Technologies Governance. In: 2022 IEEE Mexican International Conference on Computer Science (ENC), 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/enc56672.2022.9882923">https://doi.org/10.1109/enc56672.2022.9882923</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Armenta</surname>
							<given-names>E.R.</given-names>
						</name>
						<name>
							<surname>Carrillo</surname>
							<given-names>A.L.I.</given-names>
						</name>
					</person-group>
					<source>Towards an implementation of Information Technologies Governance</source>
					<conf-date>2022</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>Mexican International Conference on Computer Science (ENC)</conf-name>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/enc56672.2022.9882923">https://doi.org/10.1109/enc56672.2022.9882923</ext-link>
				</element-citation>
			</ref>
			<ref id="B61">
				<label>[61]</label>
				<mixed-citation>[61] Pérez-Cuestas. J.A., Estrategia de capacitación en seguridad de la información basado en NIST 800-50 para una empresa en el sector financiero, 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/27647">https://hdl.handle.net/10983/27647</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">Pérez-Cuestas. J.A.</person-group>
					<source>Estrategia de capacitación en seguridad de la información basado en NIST 800-50 para una empresa en el sector financiero</source>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10983/27647">https://hdl.handle.net/10983/27647</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B62">
				<label>[62]</label>
				<mixed-citation>[62] Ebert, J., Newton, O., O’Rear, J., Riley, S., Park, J., and Gupta, M., Leveraging aviation risk models to combat cybersecurity threats in vehicular networks. Information, 12(10), 390, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/info12100390">https://doi.org/10.3390/info12100390</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ebert</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Newton</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>O’Rear</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Riley</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Park</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Gupta</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Leveraging aviation risk models to combat cybersecurity threats in vehicular networks</article-title>
					<source>Information</source>
					<volume>12</volume>
					<issue>10</issue>
					<fpage>390</fpage>
					<lpage>390</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/info12100390">https://doi.org/10.3390/info12100390</ext-link>
				</element-citation>
			</ref>
			<ref id="B63">
				<label>[63]</label>
				<mixed-citation>[63] Ballestero, F., Cómo mejorar la ciberseguridad en España. Boletín Económico de ICE, 3148, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.32796/bice.2022.3148.7457">https://doi.org/10.32796/bice.2022.3148.7457</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ballestero</surname>
							<given-names>F.</given-names>
						</name>
					</person-group>
					<article-title>Cómo mejorar la ciberseguridad en España</article-title>
					<source>Boletín Económico de ICE</source>
					<fpage>3148</fpage>
					<lpage>3148</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.32796/bice.2022.3148.7457">https://doi.org/10.32796/bice.2022.3148.7457</ext-link>
				</element-citation>
			</ref>
			<ref id="B64">
				<label>[64]</label>
				<mixed-citation>[64] Mezher, A.A., and Mdlool, A.S., Relationship between continuous improvement and quality cybersecurity. PalArch's Journal of Archaeology of Egypt/Egyptology, 19(2), pp. 365-377, 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://archives.palarch.nl/index.php/jae/article/view/11036">https://archives.palarch.nl/index.php/jae/article/view/11036</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Mezher</surname>
							<given-names>A.A.</given-names>
						</name>
						<name>
							<surname>Mdlool</surname>
							<given-names>A.S.</given-names>
						</name>
					</person-group>
					<article-title>Relationship between continuous improvement and quality cybersecurity</article-title>
					<source>PalArch's Journal of Archaeology of Egypt/Egyptology</source>
					<volume>19</volume>
					<issue>2</issue>
					<fpage>365</fpage>
					<lpage>377</lpage>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://archives.palarch.nl/index.php/jae/article/view/11036">https://archives.palarch.nl/index.php/jae/article/view/11036</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B65">
				<label>[65]</label>
				<mixed-citation>[65] Koza, E., Semantic analysis of ISO/IEC 27000 standard series and NIST cybersecurity framework to outline differences and consistencies in the context of operational and strategic information security. Med. Eng. Themes, 2, pp. 26-39, 2022. [consultation, May 7, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://themedicon.com/pdf/engineeringthemes/MCET-02-021.pdf">https://themedicon.com/pdf/engineeringthemes/MCET-02-021.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Koza</surname>
							<given-names>E.</given-names>
						</name>
					</person-group>
					<article-title>Semantic analysis of ISO/IEC 27000 standard series and NIST cybersecurity framework to outline differences and consistencies in the context of operational and strategic information security</article-title>
					<source>Med. Eng. Themes</source>
					<volume>2</volume>
					<fpage>26</fpage>
					<lpage>39</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://themedicon.com/pdf/engineeringthemes/MCET-02-021.pdf">https://themedicon.com/pdf/engineeringthemes/MCET-02-021.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B66">
				<label>[66]</label>
				<mixed-citation>[66] Hastings, N.A.J., ISO 55000 Series Standards. Physical Asset Management, pp. 595-621, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-62836-9_29">https://doi.org/10.1007/978-3-030-62836-9_29</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Hastings</surname>
							<given-names>N.A.J.</given-names>
						</name>
					</person-group>
					<article-title>ISO 55000 Series Standards</article-title>
					<source>Physical Asset Management</source>
					<fpage>595</fpage>
					<lpage>621</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-62836-9_29">https://doi.org/10.1007/978-3-030-62836-9_29</ext-link>
				</element-citation>
			</ref>
			<ref id="B67">
				<label>[67]</label>
				<mixed-citation>[67] Alsyouf, I., Alsuwaidi, M., Hamdan, S., and Shamsuzzaman, M., Impact of ISO 55000 on organisational performance: evidence from certified UAE firms. Total Quality Management &amp; Business Excellence, 32(1-2), pp. 134-152, 2018. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/14783363.2018.1537750">https://doi.org/10.1080/14783363.2018.1537750</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Alsyouf</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Alsuwaidi</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Hamdan</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Shamsuzzaman</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Impact of ISO 55000 on organisational performance: evidence from certified UAE firms</article-title>
					<source>Total Quality Management &amp; Business Excellence</source>
					<volume>32</volume>
					<issue>1-2</issue>
					<fpage>134</fpage>
					<lpage>152</lpage>
					<year>2018</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/14783363.2018.1537750">https://doi.org/10.1080/14783363.2018.1537750</ext-link>
				</element-citation>
			</ref>
			<ref id="B68">
				<label>[68]</label>
				<mixed-citation>[68] Ali, H., The strategic implementation asset management system basis ISO 55000: a case study on Indonesian Railways Company. Journal of Business Management Review, 2(3), pp. 226-244, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.47153/jbmr23.1022021">https://doi.org/10.47153/jbmr23.1022021</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ali</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<article-title>The strategic implementation asset management system basis ISO 55000: a case study on Indonesian Railways Company</article-title>
					<source>Journal of Business Management Review</source>
					<volume>2</volume>
					<issue>3</issue>
					<fpage>226</fpage>
					<lpage>244</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.47153/jbmr23.1022021">https://doi.org/10.47153/jbmr23.1022021</ext-link>
				</element-citation>
			</ref>
			<ref id="B69">
				<label>[69]</label>
				<mixed-citation>[69] da-Silva, R.F., and de Souza, G.F.M., Modeling a maintenance management framework for asset management based on ISO 55000 series guidelines. Journal of Quality in Maintenance Engineering, 28(4), pp. 915-937, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/jqme-08-2020-0082">https://doi.org/10.1108/jqme-08-2020-0082</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>da-Silva</surname>
							<given-names>R.F.</given-names>
						</name>
						<name>
							<surname>de Souza</surname>
							<given-names>G.F.M.</given-names>
						</name>
					</person-group>
					<article-title>Modeling a maintenance management framework for asset management based on ISO 55000 series guidelines</article-title>
					<source>Journal of Quality in Maintenance Engineering</source>
					<volume>28</volume>
					<issue>4</issue>
					<fpage>915</fpage>
					<lpage>937</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/jqme-08-2020-0082">https://doi.org/10.1108/jqme-08-2020-0082</ext-link>
				</element-citation>
			</ref>
			<ref id="B70">
				<label>[70]</label>
				<mixed-citation>[70] Villanueva, G.A., Naranjo, A.F., and Jerez-Romero, E., Propuesta de mejora de la gestión de mantenimiento de los activos de una compañía certificadoras de productos y servicios, 2021. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.ecci.edu.co/handle/001/1025">https://repositorio.ecci.edu.co/handle/001/1025</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Villanueva</surname>
							<given-names>G.A.</given-names>
						</name>
						<name>
							<surname>Naranjo</surname>
							<given-names>A.F.</given-names>
						</name>
						<name>
							<surname>Jerez-Romero</surname>
							<given-names>E.</given-names>
						</name>
					</person-group>
					<source>Propuesta de mejora de la gestión de mantenimiento de los activos de una compañía certificadoras de productos y servicios</source>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.ecci.edu.co/handle/001/1025">https://repositorio.ecci.edu.co/handle/001/1025</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B71">
				<label>[71]</label>
				<mixed-citation>[71] -Cádiz, L.A., Sistema de información para la administración de activos fijos del Colegio María Inmaculada. Dr. Thesis, Universidad Andrés Bello, Santiago, Chile 2021. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.unab.cl/xmlui/handle/ria/19233">https://repositorio.unab.cl/xmlui/handle/ria/19233</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Cádiz</surname>
							<given-names>L.A.</given-names>
						</name>
					</person-group>
					<source>Sistema de información para la administración de activos fijos del Colegio María Inmaculada</source>
					<comment content-type="degree">Thesis</comment>
					<publisher-name>Universidad Andrés Bello</publisher-name>
					<publisher-loc>Santiago, Chile</publisher-loc>
					<publisher-loc>Santiago, Chile</publisher-loc>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.unab.cl/xmlui/handle/ria/19233">https://repositorio.unab.cl/xmlui/handle/ria/19233</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B72">
				<label>[72]</label>
				<mixed-citation>[72] Angulo-Morris, M.A., Maceto-Rodríguez, J.F. y Quintana-Carbal, Y.F., Evaluación bajo la normatividad ISO 55000 de la gestión de activos al área de molienda de la empresa del sector minero de materiales preciosos Touchstone Colombia. 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://bibliotecadigital.udea.edu.co/handle/10495/29982">https://bibliotecadigital.udea.edu.co/handle/10495/29982</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Angulo-Morris</surname>
							<given-names>M.A.</given-names>
						</name>
						<name>
							<surname>Maceto-Rodríguez</surname>
							<given-names>J.F.</given-names>
						</name>
						<name>
							<surname>Quintana-Carbal</surname>
							<given-names>Y.F.</given-names>
						</name>
					</person-group>
					<source>Evaluación bajo la normatividad ISO 55000 de la gestión de activos al área de molienda de la empresa del sector minero de materiales preciosos Touchstone Colombia</source>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://bibliotecadigital.udea.edu.co/handle/10495/29982">https://bibliotecadigital.udea.edu.co/handle/10495/29982</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B73">
				<label>[73]</label>
				<mixed-citation>[73] Parra, C., Viveros, P., Kristjanpoller, F., Crespo, A., González-Prida, V. y Gómez, J., Técnicas de auditorías para los procesos de: mantenimiento, fiabilidad operacional y gestión de activos (AMORMS &amp; AMS-ISO 55001). INGEMAN, Escuela Superior de Ingenieros Industriales, Sevilla, España, 2 (35842.61124), 4, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13140/RG">https://doi.org/10.13140/RG</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Parra</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Viveros</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Kristjanpoller</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Crespo</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>González-Prida</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Gómez</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<source>Técnicas de auditorías para los procesos de: mantenimiento, fiabilidad operacional y gestión de activos (AMORMS &amp; AMS-ISO 55001)</source>
					<publisher-name>INGEMAN, Escuela Superior de Ingenieros Industriales</publisher-name>
					<publisher-loc>Sevilla</publisher-loc>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13140/RG">https://doi.org/10.13140/RG</ext-link>
				</element-citation>
			</ref>
			<ref id="B74">
				<label>[74]</label>
				<mixed-citation>[74] Torres-Martinez. A.M., Método de gestión de mantenimiento basado en la norma ISO 55000 para mejorar los indicadores de mantenimiento (RAM), en equipos de perforación de la Compañía Minera Las Bambas Arequipa-Perú 2021, 2021. [consultation, May 7, 2023]. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/profile/Carlos-Parra-19/publication/349505815_TECNICAS_DE_AUDITORIA_PARA_LOS_PROCESOS_DE_MANTENIMIENTO_FIABILIDAD_OPERACIONAL_Y_GESTION_DE_ACTIVOS_AMORMS_AMS-ISO_55001/links/603efb2d92851c077f129ca6/TECNICAS-DE-AUDITORIA-PARA-LOS-PROCESOS-DE-MANTENIMIENTO-FIABILIDAD-OPERACIONAL-Y-GESTION-DE-ACTIVOS-AMORMS-AMS-ISO-55001.pdf">https://www.researchgate.net/profile/Carlos-Parra-19/publication/349505815_TECNICAS_DE_AUDITORIA_PARA_LOS_PROCESOS_DE_MANTENIMIENTO_FIABILIDAD_OPERACIONAL_Y_GESTION_DE_ACTIVOS_AMORMS_AMS-ISO_55001/links/603efb2d92851c077f129ca6/TECNICAS-DE-AUDITORIA-PARA-LOS-PROCESOS-DE-MANTENIMIENTO-FIABILIDAD-OPERACIONAL-Y-GESTION-DE-ACTIVOS-AMORMS-AMS-ISO-55001.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">Torres-Martinez. A.M.</person-group>
					<source>Método de gestión de mantenimiento basado en la norma ISO 55000 para mejorar los indicadores de mantenimiento (RAM), en equipos de perforación de la</source>
					<publisher-name>Compañía Minera Las Bambas</publisher-name>
					<publisher-loc>Arequipa-Perú</publisher-loc>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/profile/Carlos-Parra-19/publication/349505815_TECNICAS_DE_AUDITORIA_PARA_LOS_PROCESOS_DE_MANTENIMIENTO_FIABILIDAD_OPERACIONAL_Y_GESTION_DE_ACTIVOS_AMORMS_AMS-ISO_55001/links/603efb2d92851c077f129ca6/TECNICAS-DE-AUDITORIA-PARA-LOS-PROCESOS-DE-MANTENIMIENTO-FIABILIDAD-OPERACIONAL-Y-GESTION-DE-ACTIVOS-AMORMS-AMS-ISO-55001.pdf">https://www.researchgate.net/profile/Carlos-Parra-19/publication/349505815_TECNICAS_DE_AUDITORIA_PARA_LOS_PROCESOS_DE_MANTENIMIENTO_FIABILIDAD_OPERACIONAL_Y_GESTION_DE_ACTIVOS_AMORMS_AMS-ISO_55001/links/603efb2d92851c077f129ca6/TECNICAS-DE-AUDITORIA-PARA-LOS-PROCESOS-DE-MANTENIMIENTO-FIABILIDAD-OPERACIONAL-Y-GESTION-DE-ACTIVOS-AMORMS-AMS-ISO-55001.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B75">
				<label>[75]</label>
				<mixed-citation>[75] Rodríguez-Ramos, P.A., Moreira-Mendoza, N.R. y Arteaga-Linzan, Á., Herramienta para la toma de decisiones en el reemplazo de activos. Ingeniería Mecánica, 25(1), pp. 1-7, 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://scielo.sld.cu/scielo.php?pid=S1815-59442022000100001&amp;script=sci_arttext&amp;tlng=pt">https://scielo.sld.cu/scielo.php?pid=S1815-59442022000100001&amp;script=sci_arttext&amp;tlng=pt</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Rodríguez-Ramos</surname>
							<given-names>P.A.</given-names>
						</name>
						<name>
							<surname>Moreira-Mendoza</surname>
							<given-names>N.R.</given-names>
						</name>
						<name>
							<surname>Arteaga-Linzan</surname>
							<given-names>Á.</given-names>
						</name>
					</person-group>
					<article-title>Herramienta para la toma de decisiones en el reemplazo de activos</article-title>
					<source>Ingeniería Mecánica</source>
					<volume>25</volume>
					<issue>1</issue>
					<fpage>1</fpage>
					<lpage>7</lpage>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://scielo.sld.cu/scielo.php?pid=S1815-59442022000100001&amp;script=sci_arttext&amp;tlng=pt">https://scielo.sld.cu/scielo.php?pid=S1815-59442022000100001&amp;script=sci_arttext&amp;tlng=pt</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B76">
				<label>[76]</label>
				<mixed-citation>[76] Putra, I.M.M., and Mutijarsa, K., Designing information security risk management on Bali Regional Police Command Center based on ISO 27005. In: 2021 3<sup>rd</sup> East Indonesia Conference on Computer and Information Technology (EIConCIT), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/eiconcit50028.2021.9431865">https://doi.org/10.1109/eiconcit50028.2021.9431865</ext-link> .</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Putra</surname>
							<given-names>I.M.M.</given-names>
						</name>
						<name>
							<surname>Mutijarsa</surname>
							<given-names>K.</given-names>
						</name>
					</person-group>
					<source>Designing information security risk management on Bali Regional Police Command Center based on ISO 27005</source>
					<conf-date>2021</conf-date>
					<conf-name>3rdEast Indonesia Conference on Computer and Information Technology</conf-name>
					<conf-sponsor>EIConCIT</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/eiconcit50028.2021.9431865">https://doi.org/10.1109/eiconcit50028.2021.9431865</ext-link>
				</element-citation>
			</ref>
			<ref id="B77">
				<label>[77]</label>
				<mixed-citation>[77] Amiruddin, A., Afiansyah, H.G., and Nugroho, H.A., Cyber-Risk management planning using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8. In: 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/icimcis53775.2021.9699337">https://doi.org/10.1109/icimcis53775.2021.9699337</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Amiruddin</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Afiansyah</surname>
							<given-names>H.G.</given-names>
						</name>
						<name>
							<surname>Nugroho</surname>
							<given-names>H.A.</given-names>
						</name>
					</person-group>
					<source>Cyber-Risk management planning using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8</source>
					<conf-date>2021</conf-date>
					<conf-name>International Conference on Informatics, Multimedia, Cyber and Information System</conf-name>
					<conf-sponsor>ICIMCIS</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/icimcis53775.2021.9699337">https://doi.org/10.1109/icimcis53775.2021.9699337</ext-link>
				</element-citation>
			</ref>
			<ref id="B78">
				<label>[78]</label>
				<mixed-citation>[78] Majid, S.A., Nugraha, A., Sulistiyono, B.B., Suryaningsih, L., Widodo, S., Kholdun, A.I., Febrian, W.D., Wahdiniawati, S.A., Marlita, D., Wiwah, A., and Endri, E., The effect of safety risk management and airport personnel competency on aviation safety performance. Uncertain Supply Chain Management, 10(4), pp. 1509-1522, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5267/j.uscm.2022.6.004">https://doi.org/10.5267/j.uscm.2022.6.004</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Majid</surname>
							<given-names>S.A.</given-names>
						</name>
						<name>
							<surname>Nugraha</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Sulistiyono</surname>
							<given-names>B.B.</given-names>
						</name>
						<name>
							<surname>Suryaningsih</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Widodo</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Kholdun</surname>
							<given-names>A.I.</given-names>
						</name>
						<name>
							<surname>Febrian</surname>
							<given-names>W.D.</given-names>
						</name>
						<name>
							<surname>Wahdiniawati</surname>
							<given-names>S.A.</given-names>
						</name>
						<name>
							<surname>Marlita</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Wiwah</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Endri</surname>
							<given-names>E.</given-names>
						</name>
					</person-group>
					<article-title>The effect of safety risk management and airport personnel competency on aviation safety performance</article-title>
					<source>Uncertain Supply Chain Management</source>
					<volume>10</volume>
					<issue>4</issue>
					<fpage>1509</fpage>
					<lpage>1522</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5267/j.uscm.2022.6.004">https://doi.org/10.5267/j.uscm.2022.6.004</ext-link>
				</element-citation>
			</ref>
			<ref id="B79">
				<label>[79]</label>
				<mixed-citation>[79] Ullah, F., Qayyum, S., Thaheem, M.J., Al-Turjman, F., and Sepasgozar, S.M.E., Risk management in sustainable smart cities governance: a TOE framework. Technological Forecasting and Social Change, 167, art. 120743, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.techfore.2021.120743">https://doi.org/10.1016/j.techfore.2021.120743</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ullah</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Qayyum</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Thaheem</surname>
							<given-names>M.J.</given-names>
						</name>
						<name>
							<surname>Al-Turjman</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Sepasgozar</surname>
							<given-names>S.M.E.</given-names>
						</name>
					</person-group>
					<article-title>Risk management in sustainable smart cities governance: a TOE framework</article-title>
					<source>Technological Forecasting and Social Change</source>
					<volume>167</volume>
					<fpage>120743</fpage>
					<lpage>120743</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.techfore.2021.120743">https://doi.org/10.1016/j.techfore.2021.120743</ext-link>
				</element-citation>
			</ref>
			<ref id="B80">
				<label>[80]</label>
				<mixed-citation>[80] Luqman, A., Akram, M., and Alcantud, J.C.R., Digraph and matrix approach for risk evaluations under Pythagorean fuzzy information. Expert Systems with Applications, 170, art. 114518, 2021. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.eswa.2020.114518">https://doi.org/10.1016/j.eswa.2020.114518</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Luqman</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Akram</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Alcantud</surname>
							<given-names>J.C.R.</given-names>
						</name>
					</person-group>
					<article-title>Digraph and matrix approach for risk evaluations under Pythagorean fuzzy information</article-title>
					<source>Expert Systems with Applications</source>
					<volume>170</volume>
					<fpage>114518</fpage>
					<lpage>114518</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.eswa.2020.114518">https://doi.org/10.1016/j.eswa.2020.114518</ext-link>
				</element-citation>
			</ref>
			<ref id="B81">
				<label>[81]</label>
				<mixed-citation>[81] Angelopoulos, A.N., Bates, S., Candès, E.J., Jordan, M.I., and Lei, L.J., Learn then test: calibrating predictive algorithms to achieve risk control, 2021.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Angelopoulos</surname>
							<given-names>A.N.</given-names>
						</name>
						<name>
							<surname>Bates</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Candès</surname>
							<given-names>E.J.</given-names>
						</name>
						<name>
							<surname>Jordan</surname>
							<given-names>M.I.</given-names>
						</name>
						<name>
							<surname>Lei</surname>
							<given-names>L.J.</given-names>
						</name>
					</person-group>
					<source>Learn then test: calibrating predictive algorithms to achieve risk control</source>
					<year>2021</year>
				</element-citation>
			</ref>
			<ref id="B82">
				<label>[82]</label>
				<mixed-citation>[82] Chow, Y.-L., and Pavone, M., A framework for time-consistent, risk-averse model predictive control: theory and algorithms. In: 2014 American Control Conference, 2014. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/acc.2014.6859437">https://doi.org/10.1109/acc.2014.6859437</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Chow</surname>
							<given-names>Y.-L.</given-names>
						</name>
						<name>
							<surname>Pavone</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<source>A framework for time-consistent, risk-averse model predictive control: theory and algorithms</source>
					<conf-date>2014</conf-date>
					<conf-name>American Control Conference</conf-name>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/acc.2014.6859437">https://doi.org/10.1109/acc.2014.6859437</ext-link>
				</element-citation>
			</ref>
			<ref id="B83">
				<label>[83]</label>
				<mixed-citation>[83] Khan, A., and Malaika, M., Central Bank risk management, fintech, and cybersecurity. SSRN Electronic Journal, 2021(105), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2139/ssrn.4026279">https://doi.org/10.2139/ssrn.4026279</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Khan</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Malaika</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Central Bank risk management, fintech, and cybersecurity</article-title>
					<source>SSRN Electronic Journal</source>
					<volume>2021</volume>
					<issue>105</issue>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2139/ssrn.4026279">https://doi.org/10.2139/ssrn.4026279</ext-link>
				</element-citation>
			</ref>
			<ref id="B84">
				<label>[84]</label>
				<mixed-citation>[84] Viktoriia, H., Hnatienko, H., and Babenko, T., An intelligent model to assess information systems security level. In: 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/worlds451998.2021.9514019">https://doi.org/10.1109/worlds451998.2021.9514019</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Viktoriia</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Hnatienko</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Babenko</surname>
							<given-names>T.</given-names>
						</name>
					</person-group>
					<source>An intelligent model to assess information systems security level</source>
					<conf-date>2021</conf-date>
					<conf-name>FifthWorld Conference on Smart Trends in Systems Security and Sustainability</conf-name>
					<conf-sponsor>WorldS4</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/worlds451998.2021.9514019">https://doi.org/10.1109/worlds451998.2021.9514019</ext-link>
				</element-citation>
			</ref>
			<ref id="B85">
				<label>[85]</label>
				<mixed-citation>[85] Almaiah, M.A., Al-Zahrani, A., Almomani, O., and Alhwaitat, A.K., Classification of cyber security threats on mobile devices and applications. Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Studies in Big Data, 90, pp. 107-123, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-74575-2_6">https://doi.org/10.1007/978-3-030-74575-2_6</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Almaiah</surname>
							<given-names>M.A.</given-names>
						</name>
						<name>
							<surname>Al-Zahrani</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Almomani</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Alhwaitat</surname>
							<given-names>A.K.</given-names>
						</name>
					</person-group>
					<article-title>Classification of cyber security threats on mobile devices and applications. Artificial Intelligence and Blockchain for Future Cybersecurity Applications</article-title>
					<source>Studies in Big Data</source>
					<volume>90</volume>
					<fpage>107</fpage>
					<lpage>123</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-74575-2_6">https://doi.org/10.1007/978-3-030-74575-2_6</ext-link>
				</element-citation>
			</ref>
			<ref id="B86">
				<label>[86]</label>
				<mixed-citation>[86] Saki, A.A., Suresh, A., Topaloglu, R.O., and Ghosh, S., Split compilation for security of quantum circuits. In: 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/iccad51958.2021.9643478">https://doi.org/10.1109/iccad51958.2021.9643478</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Saki</surname>
							<given-names>A.A.</given-names>
						</name>
						<name>
							<surname>Suresh</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Topaloglu</surname>
							<given-names>R.O.</given-names>
						</name>
						<name>
							<surname>Ghosh</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<source>Split compilation for security of quantum circuits</source>
					<conf-date>2021</conf-date>
					<conf-sponsor>IEEE/ACM</conf-sponsor>
					<conf-name>International Conference On Computer Aided Design (ICCAD)</conf-name>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/iccad51958.2021.9643478">https://doi.org/10.1109/iccad51958.2021.9643478</ext-link>
				</element-citation>
			</ref>
			<ref id="B87">
				<label>[87]</label>
				<mixed-citation>[87] Pavón-González, Y., Ortega-González, Y.C., Infante-Abreu, M.B. y Delgado-Fernández, M., Método para proyectar el conocimiento de tecnologías de la información pertinente a la Ingeniería Industrial. Revista Universidad y Sociedad, 13(6), pp. 10-21, 2021. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2218-36202021000600010">https://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2218-36202021000600010</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Pavón-González</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Ortega-González</surname>
							<given-names>Y.C.</given-names>
						</name>
						<name>
							<surname>Infante-Abreu</surname>
							<given-names>M.B.</given-names>
						</name>
						<name>
							<surname>Delgado-Fernández</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Método para proyectar el conocimiento de tecnologías de la información pertinente a la Ingeniería Industrial</article-title>
					<source>Revista Universidad y Sociedad</source>
					<volume>13</volume>
					<issue>6</issue>
					<fpage>10</fpage>
					<lpage>21</lpage>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2218-36202021000600010">https://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2218-36202021000600010</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B88">
				<label>[88]</label>
				<mixed-citation>[88] Rawal, B.S., Manogaran, G., and Peter, A., Recovery strategies for database. Cybersecurity and Identity Access Management, 2022, pp. 201-207. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-981-19-2658-7_16">https://doi.org/10.1007/978-981-19-2658-7_16</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Rawal</surname>
							<given-names>B.S.</given-names>
						</name>
						<name>
							<surname>Manogaran</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Peter</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>Recovery strategies for database</article-title>
					<source>Cybersecurity and Identity Access Management</source>
					<year>2022</year>
					<fpage>201</fpage>
					<lpage>207</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-981-19-2658-7_16">https://doi.org/10.1007/978-981-19-2658-7_16</ext-link>
				</element-citation>
			</ref>
			<ref id="B89">
				<label>[89]</label>
				<mixed-citation>[89] González-Rodríguez, J.C. y Acevedo-Navas, C., Aproximación al panorama actual de la protección de infraestructuras críticas en Colombia. Panorama en seguridad y defensa visto desde las instituciones de educación superior de las Fuerzas Armadas, 2021, pp. 11-24. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21830/9789585380226.01">https://doi.org/10.21830/9789585380226.01</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>González-Rodríguez</surname>
							<given-names>J.C.</given-names>
						</name>
						<name>
							<surname>Acevedo-Navas</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<source>Aproximación al panorama actual de la protección de infraestructuras críticas en Colombia. Panorama en seguridad y defensa visto desde las instituciones de educación superior de las Fuerzas Armadas</source>
					<year>2021</year>
					<fpage>11</fpage>
					<lpage>24</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21830/9789585380226.01">https://doi.org/10.21830/9789585380226.01</ext-link>
				</element-citation>
			</ref>
			<ref id="B90">
				<label>[90]</label>
				<mixed-citation>[90] Martínez-Rincón. L.C., Diseño técnico estructurado de un centro de respuesta a incidentes cibernéticos. 2021 [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repository.unad.edu.co/handle/10596/48312">https://repository.unad.edu.co/handle/10596/48312</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Martínez-Rincón</surname>
							<given-names>L.C.</given-names>
						</name>
					</person-group>
					<source>Diseño técnico estructurado de un centro de respuesta a incidentes cibernéticos</source>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repository.unad.edu.co/handle/10596/48312">https://repository.unad.edu.co/handle/10596/48312</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B91">
				<label>[91]</label>
				<mixed-citation>[91] Velandia-Sanchez. F., Capacidades técnicas, legales y de gestión para equipos Blueteam y Redteam, 2020. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repository.unad.edu.co/handle/10596/48107">https://repository.unad.edu.co/handle/10596/48107</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Velandia-Sanchez</surname>
							<given-names>F.</given-names>
						</name>
					</person-group>
					<source>Capacidades técnicas, legales y de gestión para equipos Blueteam y Redteam</source>
					<year>2020</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repository.unad.edu.co/handle/10596/48107">https://repository.unad.edu.co/handle/10596/48107</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B92">
				<label>[92]</label>
				<mixed-citation>[92] Almanza J.A.R., and Cano M.J.J., Cadenas de suministro. Revista Sistemas, 164, pp. 24-41, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.29236/sistemas.n164a4">https://doi.org/10.29236/sistemas.n164a4</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Almanza</surname>
							<given-names>J.A.R.</given-names>
						</name>
						<name>
							<surname>Cano</surname>
							<given-names>M.J.J.</given-names>
						</name>
					</person-group>
					<article-title>Cadenas de suministro</article-title>
					<source>Revista Sistemas</source>
					<volume>164</volume>
					<fpage>24</fpage>
					<lpage>41</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.29236/sistemas.n164a4">https://doi.org/10.29236/sistemas.n164a4</ext-link>
				</element-citation>
			</ref>
			<ref id="B93">
				<label>[93]</label>
				<mixed-citation>[93] Mariano-Díaz. R., Ciberseguridad en cadenas de suministros inteligentes en América Latina y el Caribe, 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.cepal.org/handle/11362/48065">https://repositorio.cepal.org/handle/11362/48065</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Mariano-Díaz</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>Ciberseguridad en cadenas de suministros inteligentes en América Latina y el Caribe</source>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.cepal.org/handle/11362/48065">https://repositorio.cepal.org/handle/11362/48065</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B94">
				<label>[94]</label>
				<mixed-citation>[94] Valiente, J., (2022). Ciberseguridad en la cadena de suministro de la industria digital. Industria química, 99, pp. 57-59, 2022. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://dialnet.unirioja.es/servlet/articulo?codigo=8357825">https://dialnet.unirioja.es/servlet/articulo?codigo=8357825</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Valiente</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>Ciberseguridad en la cadena de suministro de la industria digital</article-title>
					<source>Industria química</source>
					<volume>99</volume>
					<fpage>57</fpage>
					<lpage>59</lpage>
					<year>2022</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://dialnet.unirioja.es/servlet/articulo?codigo=8357825">https://dialnet.unirioja.es/servlet/articulo?codigo=8357825</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B95">
				<label>[95]</label>
				<mixed-citation>[95] Miranda-Asuar, C., Gestión de riesgo de la cadena de suministro: un estudio de técnicas y herramientas. 2021. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://riunet.upv.es/handle/10251/175707">https://riunet.upv.es/handle/10251/175707</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Miranda-Asuar</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<source>Gestión de riesgo de la cadena de suministro: un estudio de técnicas y herramientas</source>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://riunet.upv.es/handle/10251/175707">https://riunet.upv.es/handle/10251/175707</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B96">
				<label>[96]</label>
				<mixed-citation>[96] Zamudio-Pereda, O., y Izquierdo-Requejo, A.A., Modelo de gestión de riesgo de la cadena de suministro como elemento diferenciador. Review of Global Management, 6(1), pp. 14-34, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19083/rgm.v6i1.1487">https://doi.org/10.19083/rgm.v6i1.1487</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zamudio-Pereda</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Izquierdo-Requejo</surname>
							<given-names>A.A.</given-names>
						</name>
					</person-group>
					<article-title>Modelo de gestión de riesgo de la cadena de suministro como elemento diferenciador</article-title>
					<source>Review of Global Management</source>
					<volume>6</volume>
					<issue>1</issue>
					<fpage>14</fpage>
					<lpage>34</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19083/rgm.v6i1.1487">https://doi.org/10.19083/rgm.v6i1.1487</ext-link>
				</element-citation>
			</ref>
			<ref id="B97">
				<label>[97]</label>
				<mixed-citation>[97] Vega-de-la-Cruz, L.O., and Pérez-Pravia, M.C., Gestión integrada de riesgos de la seguridad de las cadenas de suministros con enfoque al servicio al cliente. Ingeniería y Competitividad, 24(02), art. 11197, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.25100/iyc.v0i00.11197">https://doi.org/10.25100/iyc.v0i00.11197</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Vega-de-la-Cruz</surname>
							<given-names>L.O.</given-names>
						</name>
						<name>
							<surname>Pérez-Pravia</surname>
							<given-names>M.C.</given-names>
						</name>
					</person-group>
					<article-title>Gestión integrada de riesgos de la seguridad de las cadenas de suministros con enfoque al servicio al cliente</article-title>
					<source>Ingeniería y Competitividad</source>
					<volume>24</volume>
					<issue>02</issue>
					<fpage>11197</fpage>
					<lpage>11197</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.25100/iyc.v0i00.11197">https://doi.org/10.25100/iyc.v0i00.11197</ext-link>
				</element-citation>
			</ref>
			<ref id="B98">
				<label>[98]</label>
				<mixed-citation>[98] Sánchez Suárez, Y., Pérez Castañeira, J.A., Sangroni Laguardia, N., Cruz Blanco, C. and Medina-Nogueira, Y.E., Retos actuales de la logística y la cadena de suministro, 42(1), pp. 169-184, 2021. [consultation, May 7, 2023]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://go.gale.com/ps/i.do?id=GALE%7CA678804788&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=02585960&amp;p=IFME&amp;sw=w&amp;userGroupName=anon%7E34d17fb5&amp;aty=open+web+entry">https://go.gale.com/ps/i.do?id=GALE%7CA678804788&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=02585960&amp;p=IFME&amp;sw=w&amp;userGroupName=anon%7E34d17fb5&amp;aty=open+web+entry</ext-link>
					</comment>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Sánchez Suárez</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Pérez Castañeira</surname>
							<given-names>J.A.</given-names>
						</name>
						<name>
							<surname>Sangroni Laguardia</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Cruz Blanco</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Medina-Nogueira</surname>
							<given-names>Y.E.</given-names>
						</name>
					</person-group>
					<source>Retos actuales de la logística y la cadena de suministro</source>
					<volume>42</volume>
					<issue>1</issue>
					<fpage>169</fpage>
					<lpage>184</lpage>
					<year>2021</year>
					<date-in-citation content-type="access-date" iso-8601-date="2023-05-07">May 7, 2023</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://go.gale.com/ps/i.do?id=GALE%7CA678804788&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=02585960&amp;p=IFME&amp;sw=w&amp;userGroupName=anon%7E34d17fb5&amp;aty=open+web+entry">https://go.gale.com/ps/i.do?id=GALE%7CA678804788&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=02585960&amp;p=IFME&amp;sw=w&amp;userGroupName=anon%7E34d17fb5&amp;aty=open+web+entry</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B99">
				<label>[99]</label>
				<mixed-citation>[99] Pérez-Ramírez, R., Políticas, casos de estudio, técnicas de simulación y programas de competencias en la educación de logística y cadena de suministro en México, 2020, pp. 1-14. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.35429/h.2020.1.1.14">https://doi.org/10.35429/h.2020.1.1.14</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Pérez-Ramírez</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>Políticas, casos de estudio, técnicas de simulación y programas de competencias en la educación de logística y cadena de suministro en México</source>
					<year>2020</year>
					<fpage>1</fpage>
					<lpage>14</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.35429/h.2020.1.1.14">https://doi.org/10.35429/h.2020.1.1.14</ext-link>
				</element-citation>
			</ref>
			<ref id="B100">
				<label>[100]</label>
				<mixed-citation>[100] Castaño-Gómez, M., López-Echeverry, A.M., y Villa-Sánchez, P.A., Revisión del uso de tecnologías y dispositivos IoT en los sistemas de seguridad física. Ingeniería y Competitividad, 24(1), art. 11034, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.25100/iyc.v24i1.11034">https://doi.org/10.25100/iyc.v24i1.11034</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Castaño-Gómez</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>López-Echeverry</surname>
							<given-names>A.M.</given-names>
						</name>
						<name>
							<surname>Villa-Sánchez</surname>
							<given-names>P.A.</given-names>
						</name>
					</person-group>
					<article-title>Revisión del uso de tecnologías y dispositivos IoT en los sistemas de seguridad física</article-title>
					<source>Ingeniería y Competitividad</source>
					<volume>24</volume>
					<issue>1</issue>
					<fpage>11034</fpage>
					<lpage>11034</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.25100/iyc.v24i1.11034">https://doi.org/10.25100/iyc.v24i1.11034</ext-link>
				</element-citation>
			</ref>
			<ref id="B101">
				<label>[101]</label>
				<mixed-citation>[101] Agyare, R., Adu-Boahene, C., y Nikoi, S.N., Gestión remota segura de redes y control de acceso a redes, el caso de la Universidad de Educación-Campus de Kumasi, 6(1), pp 18-45, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.11648/j.ijse.20220601.13">https://doi.org/10.11648/j.ijse.20220601.13</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Agyare</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Adu-Boahene</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Nikoi</surname>
							<given-names>S.N.</given-names>
						</name>
					</person-group>
					<article-title>Gestión remota segura de redes y control de acceso a redes</article-title>
					<source>el caso de la Universidad de Educación-Campus de Kumasi</source>
					<volume>6</volume>
					<issue>1</issue>
					<fpage>18</fpage>
					<lpage>45</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.11648/j.ijse.20220601.13">https://doi.org/10.11648/j.ijse.20220601.13</ext-link>
				</element-citation>
			</ref>
			<ref id="B102">
				<label>[102]</label>
				<mixed-citation>[102] Collier, Z.A., and Sarkis, J., The zero trust supply chain: Managing supply chain risk in the absence of trust. International Journal of Production Research, 59(11), pp 3430-3445, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/00207543.2021.1884311">https://doi.org/10.1080/00207543.2021.1884311</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Collier</surname>
							<given-names>Z.A.</given-names>
						</name>
						<name>
							<surname>Sarkis</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<article-title>The zero trust supply chain: Managing supply chain risk in the absence of trust</article-title>
					<source>International Journal of Production Research</source>
					<volume>59</volume>
					<issue>11</issue>
					<fpage>3430</fpage>
					<lpage>3445</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/00207543.2021.1884311">https://doi.org/10.1080/00207543.2021.1884311</ext-link>
				</element-citation>
			</ref>
			<ref id="B103">
				<label>[103]</label>
				<mixed-citation>[103] Paredes, C.M., Martínez-Castro, D., Ibarra-Junquera, V., and González-Potes, A., Detection and isolation of DoS and Integrity cyber attacks in cyber-physical systems with a neural network-based architecture. Electronics, 10(18), art. 2238, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/electronics10182238">https://doi.org/10.3390/electronics10182238</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Paredes</surname>
							<given-names>C.M.</given-names>
						</name>
						<name>
							<surname>Martínez-Castro</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Ibarra-Junquera</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>González-Potes</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>Detection and isolation of DoS and Integrity cyber attacks in cyber-physical systems with a neural network-based architecture</article-title>
					<source>Electronics</source>
					<volume>10</volume>
					<issue>18</issue>
					<fpage>2238</fpage>
					<lpage>2238</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/electronics10182238">https://doi.org/10.3390/electronics10182238</ext-link>
				</element-citation>
			</ref>
			<ref id="B104">
				<label>[104]</label>
				<mixed-citation>[104] Khader, M., Karam, M., and Fares, H., Cybersecurity awareness framework for academia. Information, 12(10), art. 417, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/info12100417">https://doi.org/10.3390/info12100417</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Khader</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Karam</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Fares</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<article-title>Cybersecurity awareness framework for academia</article-title>
					<source>Information</source>
					<volume>12</volume>
					<issue>10</issue>
					<fpage>417</fpage>
					<lpage>417</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/info12100417">https://doi.org/10.3390/info12100417</ext-link>
				</element-citation>
			</ref>
			<ref id="B105">
				<label>[105]</label>
				<mixed-citation>[105] Arblaster, M., 5 - Safety Regulation of Air Traffic Management. Air Traffic Management, pp. 87-115, 2018. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/b978-0-12-811118-5.00005-9">https://doi.org/10.1016/b978-0-12-811118-5.00005-9</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Arblaster</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Safety Regulation of Air Traffic Management</article-title>
					<source>Air Traffic Management</source>
					<fpage>87</fpage>
					<lpage>115</lpage>
					<year>2018</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/b978-0-12-811118-5.00005-9">https://doi.org/10.1016/b978-0-12-811118-5.00005-9</ext-link>
				</element-citation>
			</ref>
			<ref id="B106">
				<label>[106]</label>
				<mixed-citation>[106] Pollini, A., Callari, T.C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., and Guerri, D., Leveraging human factors in cybersecurity: an integrated methodological approach. Cognition, Technology &amp; Work, 24(2), pp. 371-390, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10111-021-00683-y">https://doi.org/10.1007/s10111-021-00683-y</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Pollini</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Callari</surname>
							<given-names>T.C.</given-names>
						</name>
						<name>
							<surname>Tedeschi</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Ruscio</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Save</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Chiarugi</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Guerri</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<article-title>Leveraging human factors in cybersecurity: an integrated methodological approach</article-title>
					<source>Cognition, Technology &amp; Work</source>
					<volume>24</volume>
					<issue>2</issue>
					<fpage>371</fpage>
					<lpage>390</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10111-021-00683-y">https://doi.org/10.1007/s10111-021-00683-y</ext-link>
				</element-citation>
			</ref>
			<ref id="B107">
				<label>[107]</label>
				<mixed-citation>[107] Bredenkamp, I.E., Kritzinger, E., and Herselman, M., A conceptual consumer data protection maturity model for government adoption: South African context. Lecture Notes in Networks and Systems, pp. 820-834, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-90318-3_64">https://doi.org/10.1007/978-3-030-90318-3_64</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Bredenkamp</surname>
							<given-names>I.E.</given-names>
						</name>
						<name>
							<surname>Kritzinger</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Herselman</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>A conceptual consumer data protection maturity model for government adoption: South African context</article-title>
					<source>Lecture Notes in Networks and Systems</source>
					<fpage>820</fpage>
					<lpage>834</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-90318-3_64">https://doi.org/10.1007/978-3-030-90318-3_64</ext-link>
				</element-citation>
			</ref>
			<ref id="B108">
				<label>[108]</label>
				<mixed-citation>[108] Rojas-Velásquez, R.G., y Muedas-Higginson, A.C., Modelo de madurez de seguridad de aplicaciones web ante ciberataques para clínicas de nivel 2, 2019 Available at: <ext-link ext-link-type="uri" xlink:href="https://renati.sunedu.gob.pe/handle/sunedu/3003964">https://renati.sunedu.gob.pe/handle/sunedu/3003964</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Rojas-Velásquez</surname>
							<given-names>R.G.</given-names>
						</name>
						<name>
							<surname>Muedas-Higginson</surname>
							<given-names>A.C.</given-names>
						</name>
					</person-group>
					<source>Modelo de madurez de seguridad de aplicaciones web ante ciberataques para clínicas de nivel 2</source>
					<year>2019</year>
					<ext-link ext-link-type="uri" xlink:href="https://renati.sunedu.gob.pe/handle/sunedu/3003964">https://renati.sunedu.gob.pe/handle/sunedu/3003964</ext-link>
				</element-citation>
			</ref>
			<ref id="B109">
				<label>[109]</label>
				<mixed-citation>[109] Xie, Y., Gardi, A., and Sabatini, R., Cybersecurity trends in low-altitude air traffic management. in: 2022 IEEE/AIAA 41<sup>st</sup> Digital Avionics Systems Conference (DASC), 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/dasc55683.2022.9925840">https://doi.org/10.1109/dasc55683.2022.9925840</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Xie</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Gardi</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Sabatini</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>Cybersecurity trends in low-altitude air traffic management</source>
					<conf-date>2022</conf-date>
					<conf-sponsor>IEEE/AIAA</conf-sponsor><sup>st</sup><conf-name>41Digital Avionics Systems Conference</conf-name>
					<conf-sponsor>DASC</conf-sponsor>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/dasc55683.2022.9925840">https://doi.org/10.1109/dasc55683.2022.9925840</ext-link>
				</element-citation>
			</ref>
			<ref id="B110">
				<label>[110]</label>
				<mixed-citation>[110] Dolezilek, D., Gammel, D., and Fernandes, W., Cybersecurity based on IEC 62351 and IEC 62443 for IEC 61850 systems. 15<sup>th</sup> International Conference on Developments in Power System Protection (DPSP 2020), 2020. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1049/cp.2020.0016">https://doi.org/10.1049/cp.2020.0016</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Dolezilek</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Gammel</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Fernandes</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<source>Cybersecurity based on IEC 62351 and IEC 62443 for IEC 61850 systems</source><sup>th</sup><conf-name>15International Conference on Developments in Power System Protection</conf-name>
					<conf-sponsor>DPSP</conf-sponsor>
					<conf-date>2020</conf-date>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1049/cp.2020.0016">https://doi.org/10.1049/cp.2020.0016</ext-link>
				</element-citation>
			</ref>
			<ref id="B111">
				<label>[111]</label>
				<mixed-citation>[111] Bellini, E., Sargsyan, G., and Kavallieros, D., Cyber-resilience. Internet of Things, Threats, Landscape, and Countermeasures, pp. 291-333, 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1201/9781003006152-8">https://doi.org/10.1201/9781003006152-8</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bellini</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Sargsyan</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Kavallieros</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<source>Cyber-resilience. Internet of Things, Threats, Landscape, and Countermeasures</source>
					<fpage>291</fpage>
					<lpage>333</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1201/9781003006152-8">https://doi.org/10.1201/9781003006152-8</ext-link>
				</element-citation>
			</ref>
			<ref id="B112">
				<label>[112]</label>
				<mixed-citation>[112] Martinez, S., Gransart, C., Stienne, O., Deniau, V., and Bon, P., SoREn, How dynamic software update tools can help cybersecurity systems to improve monitoring and actions. JUCS - Journal of Universal Computer Science, 28(1), pp 27-53, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3897/jucs.66857">https://doi.org/10.3897/jucs.66857</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Martinez</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Gransart</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Stienne</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Deniau</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Bon</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<article-title>SoREn, How dynamic software update tools can help cybersecurity systems to improve monitoring and actions</article-title>
					<source>JUCS - Journal of Universal Computer Science</source>
					<volume>28</volume>
					<issue>1</issue>
					<fpage>27</fpage>
					<lpage>53</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3897/jucs.66857">https://doi.org/10.3897/jucs.66857</ext-link>
				</element-citation>
			</ref>
			<ref id="B113">
				<label>[113]</label>
				<mixed-citation>[113] Li, Q., Li, Y., Liu, S., Wang, X., and Chaoui, H., Incomplete information stochastic game theoretic vulnerability management for wide-area damping control against cyber attacks. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 12(1), pp 124-134, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/jetcas.2022.3151645">https://doi.org/10.1109/jetcas.2022.3151645</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>Q.</given-names>
						</name>
						<name>
							<surname>Li</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Liu</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Chaoui</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<article-title>Incomplete information stochastic game theoretic vulnerability management for wide-area damping control against cyber attacks</article-title>
					<source>IEEE Journal on Emerging and Selected Topics in Circuits and Systems</source>
					<volume>12</volume>
					<issue>1</issue>
					<fpage>124</fpage>
					<lpage>134</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/jetcas.2022.3151645">https://doi.org/10.1109/jetcas.2022.3151645</ext-link>
				</element-citation>
			</ref>
			<ref id="B114">
				<label>[114]</label>
				<mixed-citation>[114] Sorge, C., IT Security measures and their relation to data protection. Law and Technology in a Global Digital Society, pp. 179-197, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-90513-2_10">https://doi.org/10.1007/978-3-030-90513-2_10</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sorge</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<article-title>IT Security measures and their relation to data protection</article-title>
					<source>Law and Technology in a Global Digital Society</source>
					<fpage>179</fpage>
					<lpage>197</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-90513-2_10">https://doi.org/10.1007/978-3-030-90513-2_10</ext-link>
				</element-citation>
			</ref>
			<ref id="B115">
				<label>[115]</label>
				<mixed-citation>[115] Kumar, R., and Venkatesh, K., Centralized and Decentralized data backup approaches. Advances in Intelligent Systems and Computing, pp. 687-698, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-981-16-5652-1_60">https://doi.org/10.1007/978-981-16-5652-1_60</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Kumar</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Venkatesh</surname>
							<given-names>K.</given-names>
						</name>
					</person-group>
					<article-title>Centralized and Decentralized data backup approaches</article-title>
					<source>Advances in Intelligent Systems and Computing</source>
					<fpage>687</fpage>
					<lpage>698</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-981-16-5652-1_60">https://doi.org/10.1007/978-981-16-5652-1_60</ext-link>
				</element-citation>
			</ref>
			<ref id="B116">
				<label>[116]</label>
				<mixed-citation>[116] Pérez-Sánchez, A., and Palacios, R., Evaluation of local security event management system vs. standard antivirus Software. Applied Sciences , 12(3), art. 1076, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/app12031076">https://doi.org/10.3390/app12031076</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Pérez-Sánchez</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Palacios</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>Evaluation of local security event management system vs. standard antivirus Software</source>
					<source>Applied Sciences</source>
					<volume>12</volume>
					<issue>3</issue>
					<fpage>1076</fpage>
					<lpage>1076</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/app12031076">https://doi.org/10.3390/app12031076</ext-link>
				</element-citation>
			</ref>
			<ref id="B117">
				<label>[117]</label>
				<mixed-citation>[117] Zhang, X., Ma, H., and Tse, C.K., Assessing the robustness of cyber-physical power systems by considering wide-area protection functions. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 12(1), pp 107-114, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/jetcas.2022.3144443">https://doi.org/10.1109/jetcas.2022.3144443</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Ma</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Tse</surname>
							<given-names>C.K.</given-names>
						</name>
					</person-group>
					<article-title>Assessing the robustness of cyber-physical power systems by considering wide-area protection functions</article-title>
					<source>IEEE Journal on Emerging and Selected Topics in Circuits and Systems</source>
					<volume>12</volume>
					<issue>1</issue>
					<fpage>107</fpage>
					<lpage>114</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/jetcas.2022.3144443">https://doi.org/10.1109/jetcas.2022.3144443</ext-link>
				</element-citation>
			</ref>
			<ref id="B118">
				<label>[118]</label>
				<mixed-citation>[118] Potteiger, B., Dubey, A., Cai, F., Koutsoukos, X., and Zhang, Z., Moving target defense for the security and resilience of mixed time and event triggered cyber-physical systems. Journal of Systems Architecture, 125, art. 102420, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.sysarc.2022.102420">https://doi.org/10.1016/j.sysarc.2022.102420</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Potteiger</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Dubey</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Cai</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Koutsoukos</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>Z.</given-names>
						</name>
					</person-group>
					<article-title>Moving target defense for the security and resilience of mixed time and event triggered cyber-physical systems</article-title>
					<source>Journal of Systems Architecture</source>
					<volume>125</volume>
					<fpage>102420</fpage>
					<lpage>102420</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.sysarc.2022.102420">https://doi.org/10.1016/j.sysarc.2022.102420</ext-link>
				</element-citation>
			</ref>
			<ref id="B119">
				<label>[119]</label>
				<mixed-citation>[119] Unal, U., Kahya, C.N., Kurtlutepe, Y., and Dag, H., Investigation of cyber situation awareness via SIEM tools: a constructive review. 2021 6<sup>th</sup> International Conference on Computer Science and Engineering (UBMK), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ubmk52708.2021.9558964">https://doi.org/10.1109/ubmk52708.2021.9558964</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Unal</surname>
							<given-names>U.</given-names>
						</name>
						<name>
							<surname>Kahya</surname>
							<given-names>C.N.</given-names>
						</name>
						<name>
							<surname>Kurtlutepe</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Dag</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<source>Investigation of cyber situation awareness via SIEM tools: a constructive review</source>
					<conf-date>2021</conf-date>
					<conf-name>6thInternational Conference on Computer Science and Engineering</conf-name>
					<conf-sponsor>UBMK</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ubmk52708.2021.9558964">https://doi.org/10.1109/ubmk52708.2021.9558964</ext-link>
				</element-citation>
			</ref>
			<ref id="B120">
				<label>[120]</label>
				<mixed-citation>[120] Laue, T., Kleiner, C., Detken, K.O., and Klecker, T., A SIEM architecture for multidimensional anomaly detection. 2021 11<sup>th</sup> IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/idaacs53288.2021.9660903">https://doi.org/10.1109/idaacs53288.2021.9660903</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Laue</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Kleiner</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Detken</surname>
							<given-names>K.O.</given-names>
						</name>
						<name>
							<surname>Klecker</surname>
							<given-names>T.</given-names>
						</name>
					</person-group>
					<source>A SIEM architecture for multidimensional anomaly detection</source>
					<conf-date>2021</conf-date><sup>th</sup><conf-name>11IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</conf-name>
					<conf-sponsor>IDAACS</conf-sponsor>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/idaacs53288.2021.9660903">https://doi.org/10.1109/idaacs53288.2021.9660903</ext-link>
				</element-citation>
			</ref>
			<ref id="B121">
				<label>[121]</label>
				<mixed-citation>[121] Bankole, F., Taiwo, A., and Claims, I., An extended digital forensic readiness and maturity model. Forensic Science International: Digital Investigation, 40, art. 301348, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.fsidi.2022.301348">https://doi.org/10.1016/j.fsidi.2022.301348</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bankole</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Taiwo</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Claims</surname>
							<given-names>I.</given-names>
						</name>
					</person-group>
					<source>An extended digital forensic readiness and maturity model</source>
					<publisher-name>Forensic Science International: Digital Investigation</publisher-name>
					<volume>40</volume>
					<fpage>301348</fpage>
					<lpage>301348</lpage>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.fsidi.2022.301348">https://doi.org/10.1016/j.fsidi.2022.301348</ext-link>
				</element-citation>
			</ref>
			<ref id="B122">
				<label>[122]</label>
				<mixed-citation>[122] Folino, G., Godano, C.O., and Pisani, F.S., A scalable cybersecurity framework for anomaly detection in user behaviour, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21203/rs.3.rs-1912478/v1">https://doi.org/10.21203/rs.3.rs-1912478/v1</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Folino</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Godano</surname>
							<given-names>C.O.</given-names>
						</name>
						<name>
							<surname>Pisani</surname>
							<given-names>F.S.</given-names>
						</name>
					</person-group>
					<source>A scalable cybersecurity framework for anomaly detection in user behaviour</source>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21203/rs.3.rs-1912478/v1">https://doi.org/10.21203/rs.3.rs-1912478/v1</ext-link>
				</element-citation>
			</ref>
			<ref id="B123">
				<label>[123]</label>
				<mixed-citation>[123] Sarker, I.H., Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects, 2022. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.20944/preprints202209.0032.v1">https://doi.org/10.20944/preprints202209.0032.v1</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Sarker</surname>
							<given-names>I.H.</given-names>
						</name>
					</person-group>
					<source>Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects</source>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.20944/preprints202209.0032.v1">https://doi.org/10.20944/preprints202209.0032.v1</ext-link>
				</element-citation>
			</ref>
			<ref id="B124">
				<label>[124]</label>
				<mixed-citation>[124] Gómez-Orjuela, F.H., y Valencia-Valencia, H., Diseño de un procedimiento de gestión de incidentes de ciberseguridad que articule la gestión de riesgos, continuidad, crisis y resiliencia que se pueda integrar a la respuesta corporativa. 2021. DOI: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18235/0004373">https://doi.org/10.18235/0004373</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Gómez-Orjuela</surname>
							<given-names>F.H.</given-names>
						</name>
						<name>
							<surname>Valencia-Valencia</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<source>Diseño de un procedimiento de gestión de incidentes de ciberseguridad que articule la gestión de riesgos, continuidad, crisis y resiliencia que se pueda integrar a la respuesta corporativa</source>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18235/0004373">https://doi.org/10.18235/0004373</ext-link>
				</element-citation>
			</ref>
			<ref id="B125">
				<label>[125]</label>
				<mixed-citation>[125] Senabre-López, S., Sota-Macia, I., y Munera-López, J., Fortaleciendo la ciberresiliencia del sector financiero. Revista de Estabilidad Financiera/Banco de España, pp 93-111, 2021. Available at: <ext-link ext-link-type="uri" xlink:href="https://repositorio.bde.es/handle/123456789/19366">https://repositorio.bde.es/handle/123456789/19366</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Senabre-López</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Sota-Macia</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Munera-López</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<article-title>Fortaleciendo la ciberresiliencia del sector financiero</article-title>
					<source>Revista de Estabilidad Financiera/Banco de España</source>
					<fpage>93</fpage>
					<lpage>111</lpage>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://repositorio.bde.es/handle/123456789/19366">https://repositorio.bde.es/handle/123456789/19366</ext-link>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn1">
				<label>How to cite:</label>
				<p> Brito-Acuña, G., Aeronautic maturity cybersecurity: a Framework. DYNA, 90(227), pp. 24-34, July - September, 2023.</p>
			</fn>
		</fn-group>
		<fn-group>
			<fn fn-type="other" id="fn2">
				<label>G. Brito-Acuña,</label>
				<p> Is graduated as Electronic Technicianin 2004 and BSc. Eng in Computer Engineer in 2010, from the CUJAE. MSc. in Software Quality in the 4<sup>th</sup> edition of the University of Informatics Sciences. Since 2014, he has been a National Specialist in Aeronautical Cybersecurity at the Cuban Air Navigation Company and is a member of the global aeronautical cybersecurity working group. He has research interests in cybersecurity, risk management, aeronautics, resilience, operational security and the maturity of processes applied in critical CNS/ATM infrastructures. ORCID: 0000-0003-0105-8178</p>
			</fn>
		</fn-group>
	</back>
</article>