{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:02:28Z","timestamp":1757592148226,"version":"3.40.3"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_1","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"3-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment"],"prefix":"10.1007","author":[{"given":"Michael","family":"Quigg","sequence":"first","affiliation":[]},{"given":"Juan","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Mason","family":"Rice","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Grimaila","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Ramsey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"unstructured":"Aldrich, H.: Organizations and Environments, Stanford University Press, Stanford, California (2008)","key":"1_CR1"},{"issue":"2","key":"1_CR2","doi-asserted-by":"crossref","first-page":"217","DOI":"10.5465\/amr.1977.4409044","volume":"2","author":"Howard Aldrich","year":"1977","unstructured":"Aldrich, H., Herker, D.: Boundary spanning roles and organization structure, Academy of Management Review, vol. 2(2), pp. 217\u2013230 (1977)","journal-title":"Academy of Management Review"},{"issue":"1","key":"1_CR3","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1146\/annurev.so.02.080176.000455","volume":"2","author":"H E Aldrich","year":"1976","unstructured":"Aldrich, H., Pfeffer, J.: Environments of organizations, Annual Reviewof Sociology, vol. 2, pp. 79\u2013105 (1976)","journal-title":"Annual Review of Sociology"},{"unstructured":"Barnett, T.: Blueprint for Action: A Future Worth Creating, Berkley Publishing Group, New York (2005)","key":"1_CR4"},{"unstructured":"C. Bennett, U.S. not prepared for cyberattacks, ex-NSA chief warns, The Hill, November 14, 2014","key":"1_CR5"},{"unstructured":"Berelson, B.: Content Analysis in Communication Research, Free Press,Glencoe, Illinois (1952)","key":"1_CR6"},{"issue":"2","key":"1_CR7","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1177\/014920639301900201","volume":"19","author":"A Bluedorn","year":"1993","unstructured":"Bluedorn, A.: Pilgrim\u2019s progress: Trends and convergence in research on organizational size and environments, Journal of Management vol. 19(2), pp. 163\u2013191 (1993)","journal-title":"Journal of Management"},{"issue":"3","key":"1_CR8","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/14719037.2013.769856","volume":"15","author":"Arjen Boin","year":"2013","unstructured":"Boin, A., van Eeten, M.: The resilient organization, Public Management Review vol. 15(3), pp. 429\u2013445, 2013","journal-title":"Public Management Review"},{"unstructured":"Boyer, S.: SCADA: Supervisory Control and Data Acquisition, Instrumentation,Systems and Automation Society, Research Triangle Park, North Carolina (2010)","key":"1_CR9"},{"unstructured":"Brafman, O., Beckstrom, R.: The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations, Penguin, New York (2006)","key":"1_CR10"},{"unstructured":"Bumiller, E., Shanker, T.: Panetta warns of dire threat of cyberattackon U.S., New York Times, October 11, 2012","key":"1_CR11"},{"unstructured":"Burns, T., Stalker, G.: The Management of Innovation, Tavistock, London,United Kingdom (1961)","key":"1_CR12"},{"doi-asserted-by":"crossref","unstructured":"Child, J.: Organizational structure, environment and performance: The roleof strategic choice, Sociology, vol. 6(1), pp. 1\u201322 (1972)","key":"1_CR13","DOI":"10.1177\/003803857200600101"},{"unstructured":"Clarke, R., Knake, R.: Cyber War: The Next Threat to National Security and What to Do About It, HarperCollins Publishers, New York (2010)","key":"1_CR14"},{"issue":"1","key":"1_CR15","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"Jacob Cohen","year":"1960","unstructured":"Cohen, J.: A coefficient of agreement for nominal scales, Educational and Psychological Measurement, vol. 20(1), pp. 37\u201346 (1960)","journal-title":"Educational and Psychological Measurement"},{"issue":"4","key":"1_CR16","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/j.ijproman.2008.04.004","volume":"27","author":"Simon Collyer","year":"2009","unstructured":"Collyer, S., Warren, C.: Project management approaches for dynamicenvironments, International Journal of Project Management, vol. 27(4),pp. 355\u2013364 (2009)","journal-title":"International Journal of Project Management"},{"unstructured":"Colquitt, J., LePine, J., Wesson, M.: Organizational Behavior: ImprovingPerformance and Commitment in the Workplace, McGraw-Hill, New York,2014","key":"1_CR17"},{"issue":"2","key":"1_CR18","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1002\/smj.4250090204","volume":"9","author":"Richard L Daft","year":"1988","unstructured":"Daft, R., Sormunen, J., Parks, D.: Chief executive scanning, environmentalcharacteristics and company performance: An empirical study, StrategicManagement Journal, vol. 9(2), pp. 123\u2013139 (1988)","journal-title":"Strategic Management Journal"},{"issue":"1","key":"1_CR19","doi-asserted-by":"crossref","first-page":"52","DOI":"10.2307\/2393080","volume":"29","author":"Gregory G. Dess","year":"1984","unstructured":"Dess, G., Beard, D.: Dimensions of organizational task environments,Administrative Science Quarterly, vol. 29(1), pp. 52\u201373, 1984","journal-title":"Administrative Science Quarterly"},{"issue":"3","key":"1_CR20","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1177\/014920630102700306","volume":"27","author":"T Dewett","year":"2001","unstructured":"Dewett, T., Jones, G.: The role of information technology in the organization:A review, model and assessment, Journal of Management, vol.27(3), pp. 313\u2013346 (2001)","journal-title":"Journal of Management"},{"issue":"2","key":"1_CR21","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/2095101","volume":"48","author":"Paul J. DiMaggio","year":"1983","unstructured":"DiMaggio, P., Powell, W.: P. DiMaggio and W. Powell, The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields, American SociologicalReview, vol. 48(2), pp. 147\u2013160 (1983)","journal-title":"American Sociological Review"},{"issue":"1","key":"1_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1467-6486.1987.tb00444.x","volume":"24","author":"Lex Donaldson","year":"1987","unstructured":"Donaldson, L.: Strategy and structural adjustment to regain fit and performance: In defense of contingency theory, Journal of Management Studies, vol. 24(1), pp. 1\u201324 (1987)","journal-title":"Journal of Management Studies"},{"doi-asserted-by":"crossref","unstructured":"Donaldson, L.: The normal science of structural contingency theory, inStudying Organizations: Theory and Method, S. Clegg and C. Hardy (Eds.),Sage Publications, London, United Kingdom, pp. 51\u201370 (1999)","key":"1_CR23","DOI":"10.4135\/9781446218556.n2"},{"doi-asserted-by":"crossref","unstructured":"Donaldson, L.: The contingency theory of organizational design: Challengesand opportunities, in Organization Design, R. Burton, B. Eriksen, D.Hakonsson and C. Snow (Eds.), Springer, New York, pp. 19\u201340 (2006)","key":"1_CR24","DOI":"10.1007\/0-387-34173-0_2"},{"issue":"3","key":"1_CR25","doi-asserted-by":"crossref","first-page":"313","DOI":"10.2307\/2392145","volume":"17","author":"Robert B. Duncan","year":"1972","unstructured":"Duncan, R.: Characteristics of organizational environments and perceivedenvironmental uncertainty, Administrative Science Quarterly, vol. 17(3),pp. 313\u2013327 (1972)","journal-title":"Administrative Science Quarterly"},{"issue":"2","key":"1_CR26","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/amj.2011.60263120","volume":"54","author":"Peer C. Fiss","year":"2011","unstructured":"Fiss, P.: Building better causal theories: A fuzzy set approach to typologiesin organization research, Academy of Management Journal, vol. 54(2), pp.393\u2013420 (2011)","journal-title":"Academy of Management Journal"},{"unstructured":"Flesch, R.: How to Write Plain English: A Book for Lawyers and Consumers,HarperCollins Publishers, New York (1979)","key":"1_CR27"},{"unstructured":"Gladwell, M.: Blink: The Power of Thinking Without Thinking, Back BayBooks, New York (2007)","key":"1_CR28"},{"issue":"4","key":"1_CR29","doi-asserted-by":"crossref","first-page":"462","DOI":"10.2307\/2392692","volume":"30","author":"Richard Z. Gooding","year":"1985","unstructured":"Gooding, R., Wagner, J.: A meta-analytic review of the relationshipbetween size and performance: The productivity and efficiency of organizationsand their sub-units, Administrative Science Quarterly, vol. 30(4), pp. 462\u2013481 (1985)","journal-title":"Administrative Science Quarterly"},{"doi-asserted-by":"crossref","unstructured":"Gordon, L., Narayanan, V.: Management accounting systems, perceivedenvironmental uncertainty and organization structure: An empirical investigation,Accounting, Organizations and Society, vol. 9(1), pp. 33\u201347 (1984)","key":"1_CR30","DOI":"10.1016\/0361-3682(84)90028-X"},{"unstructured":"Government Accountability Office, Content Analysis: A Methodology forStructuring and Analyzing Written Material, GAO\/PEMD-10.3.1, Washington,DC (1996)","key":"1_CR31"},{"issue":"5","key":"1_CR32","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1111\/j.1467-6486.2004.00456.x","volume":"41","author":"Randall D. Harris","year":"2004","unstructured":"Harris, R.: Organizational task environments: An evaluation of convergent and discriminant validity, Journal of Management Studies, vol. 41(5), pp. 857\u2013882 (2004)","journal-title":"Journal of Management Studies"},{"unstructured":"Hollnagel, E., Woods, D., Leveson, N.: Resilience Engineering: Concepts and Precepts, Ashgate Publishing, Burlington, Vermont (2006)","key":"1_CR33"},{"issue":"3","key":"1_CR34","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1287\/orsc.7.3.211","volume":"7","author":"Anne Y. Ilinitch","year":"1996","unstructured":"Ilinitch, A., D\u2019Aveni, R., Lewin, A.: New organizational forms and strategiesfor managing in hypercompetitive environments, Organization Science,vol. 7(3), pp. 211\u2013220 (1996)","journal-title":"Organization Science"},{"issue":"1","key":"1_CR35","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2307\/2391787","volume":"19","author":"David Jacobs","year":"1974","unstructured":"Jacobs, D.: Dependency and vulnerability: An exchange approach to the control of organizations, Administrative Science Quarterly, vol. 19(1), pp. 45\u201359 (1974)","journal-title":"Administrative Science Quarterly"},{"issue":"3","key":"1_CR36","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1080\/00208825.1972.11656125","volume":"2","author":"Pradip N. Khandwalla","year":"1972","unstructured":"Khandwalla, P.: Environment and its impact on the organization, InternationalStudies of Management and Organization, vol. 2(3), pp. 297\u2013313 (1972)","journal-title":"International Studies of Management & Organization"},{"doi-asserted-by":"crossref","unstructured":"Kincaid, J., Fishburne, R., Rogers, R., Chissom, B.: Derivation of New Readability Formulas (Automated Readability Index, Fog Count and Flesch Reading Ease Formula) for Navy Enlisted Personnel, Research Branch Report 8\u201375. Chief of Naval Technical Training Command, Naval Air Station Memphis, Millington, Tennessee (1975)","key":"1_CR37","DOI":"10.21236\/ADA006655"},{"unstructured":"Koppel, T.: Lights Out: A Cyberattack, A Nation Unprepared, Survivingthe Aftermath, Crown Publishers, New York (2015)","key":"1_CR38"},{"unstructured":"Krippendorff, K.: Content Analysis: An Introduction to its Methodology,Sage Publications, Thousand Oaks, California (2013)","key":"1_CR39"},{"doi-asserted-by":"crossref","unstructured":"Landis, J., Koch, G.: The measurement of observer agreement for categoricaldata, Biometrics, vol. 33(1), pp. 159\u2013174 (1977)","key":"1_CR40","DOI":"10.2307\/2529310"},{"issue":"1","key":"1_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2391211","volume":"12","author":"Paul R. Lawrence","year":"1967","unstructured":"Lawrence, P., Lorsch, J.: Differentiation and integration in complexorganizations, Administrative Science Quarterly, vol. 12(1), pp. 1\u201347 (1967)","journal-title":"Administrative Science Quarterly"},{"issue":"7","key":"1_CR42","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1016\/j.jbusres.2010.08.001","volume":"64","author":"Chechen Liao","year":"2011","unstructured":"Liao, C., Chuang, S., To, P.: How knowledge management mediates the relationship between environment and organizational structure, Journal of Business Research, vol. 64(7), pp. 728\u2013736 (2011)","journal-title":"Journal of Business Research"},{"issue":"4","key":"1_CR43","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MIS.2011.69","volume":"26","author":"Zhong Liu","year":"2011","unstructured":"Liu, Z., Yang, D., Wen, D., Zhang, W., Mao, W.: Cyber-physical-social systems for command and control, IEEE Intelligent Systems, vol. 26(4), pp. 92\u201396 (2011)","journal-title":"IEEE Intelligent Systems"},{"issue":"4","key":"1_CR44","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1111\/j.1468-2958.2002.tb00826.x","volume":"28","author":"Matthew Lombard","year":"2002","unstructured":"Lombard, M., Snyder-Duch, J., Campanella, C.: Bracken. Content analysis in mass communication: Assessment and reporting of inter-coder reliability, Human Communication Research, vol. 28(4), pp. 587\u2013604 (2002)","journal-title":"Human Communication Research"},{"issue":"1","key":"1_CR45","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.im.2003.11.002","volume":"42","author":"Chitu Okoli","year":"2004","unstructured":"Okoli, C., Pawlowski, S.: The Delphi method as a research tool: An example, design considerations and applications, Information and Management vol. 42(1), pp. 15\u201329 (2004)","journal-title":"Information & Management"},{"unstructured":"Olson, P.:We Are Anonymous: Inside the Hacker World of LulzSec, Anonymousand the Global Cyber Insurgency, Back Bay Books, New York (2013)","key":"1_CR46"},{"issue":"3","key":"1_CR47","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1287\/orsc.3.3.398","volume":"3","author":"Wanda J. Orlikowski","year":"1992","unstructured":"Orlikowski, W.: The duality of technology: Rethinking the concept of technologyin organizations, Organization Science, vol. 3(3), pp. 398\u2013427 (1992)","journal-title":"Organization Science"},{"unstructured":"Patten, M.: Understanding Research Methods: An Overview of the Essentials,Pyrczak Publishing, Glendale, California (2009)","key":"1_CR48"},{"unstructured":"Pfeffer, J.: Organizations and Organization Theory, Pitman, Boston, Massachusetts (1982)","key":"1_CR49"},{"issue":"2","key":"1_CR50","doi-asserted-by":"crossref","first-page":"268","DOI":"10.2307\/2576381","volume":"52","author":"J. Pfeffer","year":"1973","unstructured":"Pfeffer, J., Leblebici, H.: The effect of competition on some dimensionsof organizational structure, Social Forces, vol. 52(2), pp. 268\u2013279 (1973)","journal-title":"Social Forces"},{"unstructured":"Pfeffer, J., Salancik, G.: The External Control of Organizations: A Resource Dependence Approach, Stanford University Press, Stanford, California (2003)","key":"1_CR51"},{"doi-asserted-by":"crossref","unstructured":"Pugh, D.: The measurement of organization structures: Does context determineform? Organizational Dynamics, vol. 1(4), pp. 19\u201334 (1973)","key":"1_CR52","DOI":"10.1016\/S0090-2616(73)80021-X"},{"issue":"1","key":"1_CR53","doi-asserted-by":"crossref","first-page":"93","DOI":"10.5465\/amp.2011.0125","volume":"26","author":"Jane Qiu","year":"2012","unstructured":"Qiu, J., Donaldson, L., Luo, B.: The benefits of persisting with paradigmsin organizational research, Academy of Management Perspectives, vol.26(1), pp. 93\u2013104 (2012)","journal-title":"Academy of Management Perspectives"},{"unstructured":"Savin-Baden, M., Howell Major, C.: Qualitative Research: The EssentialGuide to Theory and Practice, Routledge, Abingdon, United Kingdom,(2012)","key":"1_CR54"},{"unstructured":"Seffers, G.: Cyber commander expects damaging critical infrastructure attack, Signal, December 1, 2014","key":"1_CR55"},{"unstructured":"Stemler, S.: An overview of content analysis, Practical Assessment, Research and Evaluation, vol. 7(17) (2001)","key":"1_CR56"},{"issue":"1","key":"1_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2393548","volume":"35","author":"Michael L. Tushman","year":"1990","unstructured":"Tushman, M., Nelson, R.: Introduction: Technology, organizations andinnovation, Administrative Science Quarterly, vol. 35(1), pp. 1\u20138 (1990)","journal-title":"Administrative Science Quarterly"},{"unstructured":"van de Ven, A., Ferry, D.: Measuring and Assessing Organizations, John Wiley and Sons, New York (1980)","key":"1_CR58"},{"doi-asserted-by":"crossref","unstructured":"Weber, R.: Basic Content Analysis, Sage Publications, Newbury Park, California (1990)","key":"1_CR59","DOI":"10.4135\/9781412983488"},{"unstructured":"Worrall, S. : Is the United States prepared for a massive cyberattack? National Geographic, Washington, DC, November 8, 2015","key":"1_CR60"},{"unstructured":"Yin, R.: Case Study Research Design and Methods, Sage Publications, Thousand Oaks, California (2014)","key":"1_CR61"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T01:06:35Z","timestamp":1604711195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}