Knowledge (XXG)

:Articles for deletion/Cybersecurity strategy 5 Layout Capability Maturity Model - Knowledge (XXG)

Source 📝

166: 92: 87: 96: 79: 160: 126: 249:. (Compare the within linked pdf to this article.) As such, it appears to be purely promotional. I do not find any evidence that this model or the company that offers it have received 119: 218: 181: 148: 335: 306: 281: 262: 230: 210: 61: 142: 138: 198: 83: 188: 75: 67: 154: 17: 354: 40: 270:
A hybrid between promotional material and an introductory manual for the system. WP is the place for neither.
226: 206: 330: 350: 36: 258: 174: 222: 202: 323: 302: 29:
The following discussion is an archived debate of the proposed deletion of the article below.
349:
Subsequent comments should be made on the appropriate discussion page (such as the article's
35:
Subsequent comments should be made on the appropriate discussion page (such as the article's
319: 315: 294: 290: 250: 254: 277: 57: 298: 113: 246: 251:
significant coverage in reliable sources that are independent of the subject
272: 53: 197:
Original research by the editor. The article has been turned down at
343:
The above discussion is preserved as an archive of the debate.
199:
Draft:Cybersecurity strategy 5 Layout Capability Maturity Model
241:. The readily identified source of this is the contributor's 76:
Cybersecurity strategy 5 Layout Capability Maturity Model
68:
Cybersecurity strategy 5 Layout Capability Maturity Model
242: 109: 105: 101: 173: 187: 43:). No further edits should be made to this page. 357:). No further edits should be made to this page. 219:list of Computing-related deletion discussions 8: 217:Note: This debate has been included in the 216: 18:Knowledge (XXG):Articles for deletion 7: 24: 314:This is a misunderstanding of 1: 336:18:15, 4 November 2015 (UTC) 307:17:30, 3 November 2015 (UTC) 282:06:10, 2 November 2015 (UTC) 263:18:19, 29 October 2015 (UTC) 231:20:55, 28 October 2015 (UTC) 211:20:06, 28 October 2015 (UTC) 62:17:15, 5 November 2015 (UTC) 374: 346:Please do not modify it. 32:Please do not modify it. 233: 365: 348: 333: 328: 192: 191: 177: 129: 117: 99: 34: 373: 372: 368: 367: 366: 364: 363: 362: 361: 355:deletion review 344: 331: 324: 134: 125: 90: 74: 71: 48:The result was 41:deletion review 30: 22: 21: 20: 12: 11: 5: 371: 369: 360: 359: 339: 338: 326:Blue Rasberry 309: 284: 265: 235: 234: 195: 194: 131: 70: 65: 46: 45: 25: 23: 15: 14: 13: 10: 9: 6: 4: 3: 2: 370: 358: 356: 352: 347: 341: 340: 337: 334: 329: 327: 321: 318:and it fails 317: 313: 310: 308: 304: 300: 296: 292: 288: 285: 283: 279: 275: 274: 269: 266: 264: 260: 256: 252: 248: 244: 240: 237: 236: 232: 228: 224: 223:StarryGrandma 220: 215: 214: 213: 212: 208: 204: 203:StarryGrandma 200: 190: 186: 183: 180: 176: 172: 168: 165: 162: 159: 156: 153: 150: 147: 144: 140: 137: 136:Find sources: 132: 128: 124: 121: 115: 111: 107: 103: 98: 94: 89: 85: 81: 77: 73: 72: 69: 66: 64: 63: 59: 55: 51: 44: 42: 38: 33: 27: 26: 19: 345: 342: 325: 311: 286: 271: 267: 245:spiel about 238: 196: 184: 178: 170: 163: 157: 151: 145: 135: 122: 49: 47: 31: 28: 247:its service 243:own company 161:free images 351:talk page 255:Ningauble 37:talk page 353:or in a 120:View log 39:or in a 299:APerson 268:Delete. 167:WP refs 155:scholar 93:protect 88:history 332:(talk) 320:WP:GNG 316:WP:ENC 312:Delete 295:WP:GNG 291:WP:NOT 287:Delete 239:Delete 139:Google 97:delete 50:delete 303:talk! 278:talk 182:JSTOR 143:books 127:Stats 114:views 106:watch 102:links 16:< 293:and 289:per 259:talk 253:. ~ 227:talk 207:talk 175:FENS 149:news 110:logs 84:talk 80:edit 58:talk 273:DGG 189:TWL 118:– ( 54:KTC 52:. 322:. 305:) 297:. 280:) 261:) 229:) 221:. 209:) 201:. 169:) 112:| 108:| 104:| 100:| 95:| 91:| 86:| 82:| 60:) 301:( 276:( 257:( 225:( 205:( 193:) 185:· 179:· 171:· 164:· 158:· 152:· 146:· 141:( 133:( 130:) 123:· 116:) 78:( 56:(

Index

Knowledge (XXG):Articles for deletion
talk page
deletion review
KTC
talk
17:15, 5 November 2015 (UTC)
Cybersecurity strategy 5 Layout Capability Maturity Model
Cybersecurity strategy 5 Layout Capability Maturity Model
edit
talk
history
protect
delete
links
watch
logs
views
View log
Stats
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Draft:Cybersecurity strategy 5 Layout Capability Maturity Model
StarryGrandma

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.