[1]
“Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)”, Soc. sci. humanities j., vol. 8, no. 10, pp. 5688–5697, Oct. 2024, doi: 10.18535/sshj.v8i10.1421.