Wikipedia:Articles for deletion/Capability Maturity Model Cybersecurity

From Wikipedia, the free encyclopedia
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was delete.  Sandstein  12:38, 16 December 2015 (UTC)[reply]

Capability Maturity Model Cybersecurity[edit]

Capability Maturity Model Cybersecurity (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
CMMI Version 1.3 (edit | talk | history | protect | delete | links | watch | logs | views)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

Essay / borderline promotional page, almost entirely sourced to the materials from the project developers themselves. Also nominating CMMI Version 1.3, for the same reason. (I have split the nomination of these two articles away from Wikipedia:Articles for deletion/Capability Maturity Model Integration, due to keep votes.) - Mike Rosoft (talk) 17:27, 8 December 2015 (UTC)[reply]

  • Delete Capability Maturity Model Cybersecurity: The article is a mess, not just in formatting (excessive use of capitals, sometimes For Each Word In A Sentence), but also in the extent to which it is about CMM in general, general lines about as-is and to-be models, interwoven with general Gartner platitudes, stress on particular institutions and burnishing of registered marks which may or may not be relevant. In the absence of a clear running narrative thread, the best that can be applied is WP:TNT. There may be an article which can be constructed in future for "Cybersecurity Capability Maturity Model (C2M2)" in various fields ([1],  – via HighBeam (subscription required) ), but better started afresh. AllyD (talk) 19:47, 8 December 2015 (UTC)[reply]
  • Delete both. There is no independent notability, and the topic is adequately covered in the CMM and CMMI articles. There is no need for a redirect for Version 1.3, as CMMI will come up first. --Bejnar (talk) 02:42, 9 December 2015 (UTC)[reply]
Note: This debate has been included in the list of Computing-related deletion discussions. • Gene93k (talk) 02:53, 15 December 2015 (UTC)[reply]

If you read the background, you will understand how CMM for IT applications has evolved, to now include measurement of cybersecurity defenses. CMM Cybersecurity is using the CMM model as described to measure capability. The 'As Is' and 'To Be' method is how you measure capability in to the future by setting the 'To Be' goal. This is a standard method. The use of caps is to describe the letters that make up an acronym like CMM. Capability Maturity Model. (talk)Sean p connors (talk) 20:25, 15 December 2015 (UTC)[reply]

The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.