{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T06:42:55Z","timestamp":1748932975218,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T00:00:00Z","timestamp":1478736000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100013405","name":"Netherlands Enterprise Agency","doi-asserted-by":"crossref","award":["SBIR12C021"],"award-info":[{"award-number":["SBIR12C021"]}],"id":[{"id":"10.13039\/100013405","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Decis. Anal."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s40165-016-0022-1","type":"journal-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T11:42:45Z","timestamp":1478778165000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An analytics approach to adaptive maturity models using organizational characteristics"],"prefix":"10.1186","volume":"3","author":[{"given":"Thijs","family":"Baars","sequence":"first","affiliation":[]},{"given":"Frederik","family":"Mijnhardt","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Vlaanderen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9237-221X","authenticated-orcid":false,"given":"Marco","family":"Spruit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","unstructured":"Ayyagari M, Beck T, Demirg\u00fc\u00e7-Kunt A. Small and medium enterprises across the globe: a new database. Policy Research Working Papers. 2003. doi: 10.1596\/1813-9450-3127 .","DOI":"10.1596\/1813-9450-3127"},{"issue":"1","key":"22_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1002\/mpr.329","volume":"20","author":"MJ Azur","year":"2011","unstructured":"Azur MJ, Stuart EA, Frangakis C, Leaf PJ. Multiple imputation by chained equations: what is it and how does it work? Int J Methods Psychiatr Res. 2011;20(1):40\u20139. doi: 10.1002\/mpr.329 .","journal-title":"Int J Methods Psychiatr Res."},{"key":"22_CR3","unstructured":"Baars T, van den Bemd L, Theuns M, van den Akker R, Sch\u00f6nbeck M, Brinkkemper S. Cyber security in smart grid substations. 2012. http:\/\/www.cs.uu.nl\/research\/techreps\/repo\/CS-2012\/2012-017.pdf ."},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s12599-009-0044-5","volume":"1","author":"J Becker","year":"2009","unstructured":"Becker J, Knackstedt R, P\u00f6ppelbu\u00ff J. Developing maturity models for IT management. Bus Inf Syst Eng. 2009;1(3):213\u201322. doi: 10.1007\/s12599-009-0044-5 .","journal-title":"Bus Inf Syst Eng."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Bekkers W, Spruit M. The situational assessment method put to the test: improvements based on case studies. In: 4th International workshop on software product management. IEEE. Sydney; 2010. p. 7\u201316.","DOI":"10.1109\/IWSPM.2010.5623871"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Bekkers W, van de Weerd I, Brinkkemper S, Mahieu A. The influence of situational factors in software product management: an empirical study. In: 2008 Second international workshop on software product management IEEE. Barcelona; 2008. p. 41\u201348. ISBN 978-1-4244-4083-2. doi: 10.1109\/IWSPM.2008.8 .","DOI":"10.1109\/IWSPM.2008.8"},{"issue":"4","key":"22_CR7","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/52.300034","volume":"8","author":"TB Bollinger","year":"1991","unstructured":"Bollinger TB, McGowan C. A critical look at software capability evaluations. IEEE Softw. 1991;8(4):25\u201341.","journal-title":"IEEE Softw."},{"key":"22_CR8","unstructured":"Buuren SV, Groothuis-Oudshoorn K, Robitzsch A, Vink G, Jolani S, Doove L. Package \u00e2\u0102\u0178 mice \u00e2\u0102\u0179. Technical report, CRAN, 2013. http:\/\/cran.rproject.org\/web\/packages\/mice\/mice.pdf ."},{"key":"22_CR9","unstructured":"CBS, Share organizations hit by ICT-securityincidents [orig. in Dutch] Amsterdam: Statistics Netherlands (CBS); 2011. http:\/\/www.cbs.nl\/nl-NL\/menu\/themas\/bedrijven\/cijfers\/incidenteel\/maatwerk\/2011-3293-tab.htm ."},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Cleveland WS, Devlin SJ. Locally weighted regression: an approach to regression analysis by local fitting. J Am Stat Assoc. 1988;83(403):596\u2013610. http:\/\/www.jstor.org\/stable\/2289282 .","DOI":"10.1080\/01621459.1988.10478639"},{"key":"22_CR11","unstructured":"CMMI Product Team, CMMI\u00c2\u0151 for Development, Version 1.3 CMMI-DEV, V1.3, Technical Report November, Software Engineering Institute, Carnegie Mellon University, Pittsburgh; 2010. http:\/\/www.sei.cmu.edu\/reports\/10tr033.pdf ."},{"issue":"1","key":"22_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1111\/j.2044-8317.2011.02014.x","volume":"65","author":"RA Cribbie","year":"2012","unstructured":"Cribbie RA, Fiksenbaum L, Keselman HJ, Wilcox RR. Effect of non-normality on test statistics for one-way independent groups designs. Br J Math Stat Psychol. 2012;65(1):56\u201373. doi: 10.1111\/j.2044-8317.2011.02014.x .","journal-title":"Br J Math Stat Psychol."},{"key":"22_CR13","unstructured":"de Bruin T, Freeze R, Kulkarni U, Rosemann M. Understanding the main phases of developing a maturity assessment model. In: Proceedings of the ACIS 2005. Sidney: AIS; 2005. http:\/\/aisel.aisnet.org\/acis2005\/109 ."},{"issue":"2","key":"22_CR14","first-page":"153","volume":"19","author":"ED Leeuw de","year":"2009","unstructured":"de Leeuw ED, Hox J, Huisman M. Prevention and treatment of item nonresponse. J Off Stat. 2009;19(2):153\u201376.","journal-title":"J Off Stat."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Duncan RB. Characteristics of organizational environments and perceived environmental uncertainty. Adm Sci Q. 1972;17(3):313\u201327. http:\/\/www.jstor.org\/stable\/2392145 .","DOI":"10.2307\/2392145"},{"issue":"5","key":"22_CR16","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1002\/(SICI)1097-4571(198809)39:5<293::AID-ASI1>3.0.CO;2-I","volume":"39","author":"M Eisenberg","year":"1988","unstructured":"Eisenberg M, Barry C. Order effects: a study of the possible influence of presentation order on user judgments of document relevance. J Am Soc Inf Sci. 1988;39(5):293\u2013300.","journal-title":"J Am Soc Inf Sci"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Frigge M, Hoaglin DC, Iglewicz B. Some implementations of the boxplot. Am Stat 1989;43(1):50\u20134. http:\/\/www.jstor.org\/stable\/2685173 .","DOI":"10.1080\/00031305.1989.10475612"},{"issue":"3","key":"22_CR18","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/s11121-007-0070-9","volume":"8","author":"JW Graham","year":"2007","unstructured":"Graham JW, Olchowski AE, Gilreath TD. How many imputations are really needed? Some practical clarifications of multiple imputation theory. Prev Sci. 2007;8(3):206\u201313. doi: 10.1007\/s11121-007-0070-9 .","journal-title":"Prev Sci."},{"key":"22_CR19","unstructured":"Guttman B, Roback EA. Special Publication 800-12 an intorduction to computer security: the NIST handbook. Technical Report 800, National Institute for Standards and Technology, Gaithersburg; 1995. 3019753058. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-12\/handbook.pdf ."},{"issue":"2","key":"22_CR20","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/383371.383376","volume":"30","author":"J Iversen","year":"1999","unstructured":"Iversen J, Nielsen PA, Nerbjerg J. Situated assessment of problems in software development. DATA BASE Adv Inf Syst. 1999;30(2):66\u201382.","journal-title":"DATA BASE Adv Inf Syst."},{"key":"22_CR21","unstructured":"Joint Technical Committee ISO, IEC JTC 1, ISO, IEC 27002, Technical Report november 2007, International Organization for Standardization\/International Electrotechnical Commission. Geneva; 2008."},{"issue":"5","key":"22_CR22","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1145\/358189.358074","volume":"27","author":"JL King","year":"1984","unstructured":"King JL, Kraemer KL. Evolution and organizational information systems: an assessment of Nolan\u2019s stage model. Commun ACM. 1984;27(5):466\u201375.","journal-title":"Commun ACM"},{"issue":"1","key":"22_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/S0950-5849(99)00054-3","volume":"42","author":"JP Kuilboer","year":"2000","unstructured":"Kuilboer JP, Ashrafi N. Software process and product improvement: an empirical assessment. Inf Softw Technol. 2000;42(1):27\u201334. doi: 10.1016\/S0950-5849(99)00054-3 .","journal-title":"Inf Softw Technol."},{"issue":"404","key":"22_CR24","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1080\/01621459.1988.10478722","volume":"83","author":"RJA Little","year":"1988","unstructured":"Little RJA. A test of missing completely at random for multivaraite data with missing values. J Am Stat Assoc. 1988;83(404):1198\u2013202.","journal-title":"J Am Stat Assoc."},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"McCormack K, Willems J, Bergh JVD, Deschoolmeester D, Willaert P, Temberger MI, Krinjar R, Trkman P, Ladeira MB, Oliveira MPVD, Vuksic VB, Vlahovic N. A global investigation of key turning points in business process maturity. Bus Process Manag J. 2009;15(5):792\u2013815. ISBN 1463715091098. doi: 10.1108\/14637150910987946 .","DOI":"10.1108\/14637150910987946"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Mettler T, Rohner P, Winter R. Towards a classification of maturity models in information systems. In: A. D\u2019Atri, M. De Marco, A.M. Braccini, F. Cabiddu, editors Management of the interconnected world. Heidelberg: Physica-Verlag HD; 2010. p. 333\u2013341. ISBN 978- 3-7908-2403-2. doi: 10.1007\/978-3-7908-2404-9 .","DOI":"10.1007\/978-3-7908-2404-9"},{"issue":"2","key":"22_CR27","first-page":"106","volume":"56","author":"F Mijnhardt","year":"2014","unstructured":"Mijnhardt F, Baars T, Spruit M. Organizational characteristics influencing information security maturity. J Comput Inf Syst. 2014;56(2):106\u201315.","journal-title":"J Comput Inf Syst."},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Paulk MC, Curtis B, Chrissis MB, Weber CV. Capability maturity model for software, an analytics approach to adaptive maturity aodels 29 Version 1.1. Technical Report February. Pittsburgh: Carnegie Mellon University; 1993. http:\/\/www.sei.cmu.edu\/reports\/93tr024.pdf .","DOI":"10.21236\/ADA263403"},{"key":"22_CR29","unstructured":"P\u00f6ppelbu\u00df J, P\u00f6ppelbu\u00ff J, R\u00f6glinger M. What makes a useful maturity model? A framework of general design principles for maturity models and its demonstration in buisiness process management. In: Proceedings of the ECIS 2011. Helsinki; 2011. http:\/\/aisel.aisnet.org\/ecis2011\/28\/ ."},{"issue":"1","key":"22_CR30","first-page":"21","volume":"2","author":"NM Razali","year":"2011","unstructured":"Razali NM, Wah YB. Power comparisons of Shapiro\u2013Wilk, Kolmogorov\u2013Smirnov, Lilliefors and Anderson-Darling tests. J Stat Model Anal. 2011;2(1):21\u201333.","journal-title":"J Stat Model Anal."},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Rubin DB. Multiple imputation for nonresponse in surveys. 1st ed. New York: Wiley; 1987. ISBN 0-471-08705-X.","DOI":"10.1002\/9780470316696"},{"key":"22_CR32","unstructured":"Ruiter JT. Cost of cyber crime largely met by businesses, 2012. https:\/\/www.tno.nl\/content.cfm?context=overtno&content=nieuwsbericht&laag1=37&laag2=2&itemid=2012-04-1011:37:10.0&Taal=2 ."},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Shapiro SS, Wilk MB. An analysis of variance test for normality (complete samples). Biometrika 1965;52(3):591\u2013611. http:\/\/www.jstor.org\/stable\/2333709 .","DOI":"10.1093\/biomet\/52.3-4.591"},{"key":"22_CR34","unstructured":"Silveira V. Updating your password on LinkedIn and other account security best practices. 2012. http:\/\/blog.linkedin.com\/2012\/06\/06\/updating-your-password-on-linkedinand-other-account-security-best-practices\/ ."},{"issue":"4","key":"22_CR35","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/s11135-006-9054-2","volume":"42","author":"P Siminski","year":"2006","unstructured":"Siminski P. Order effects in batteries of questions. Qual Quant. 2006;42(4):477\u201390. doi: 10.1007\/s11135-006-9054-2 .","journal-title":"Qual Quant."},{"key":"22_CR36","unstructured":"Spruit M, Roeling M. ISFAM: the information security focus area maturity model. In: Proceedings of the twenty second European conference information system ECIS 2014, Tel Aviv, Israel, 2014."},{"issue":"4","key":"22_CR37","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/IJBIR.2014100103","volume":"5","author":"M Spruit","year":"2014","unstructured":"Spruit M, de Boer T. Business intelligence as a service: a vendor\u2019s approach. Int J Bus Intell Res. 2014;5(4):26\u201343.","journal-title":"Int J Bus Intell Res."},{"key":"22_CR38","doi-asserted-by":"publisher","unstructured":"Steenbergen M, Bos R, Brinkkemper S, Weerd I, Bekkers W. The design of focus area maturity models. In: Winter R, Zhao JL, Aier S, editors, Global perspectives on design science research, LNCS6105, 6105 edn. St. Gallen: Springer; 2010. p. 319\u2013332. ISBN 978-3-642-13334-3. doi: 10.1007\/978-3-642-13335-0_22 .","DOI":"10.1007\/978-3-642-13335-0_22"},{"key":"22_CR39","unstructured":"The Associated Press, Yahoo Email Account Passwords Stolen, 2014. http:\/\/www.npr.org\/2014\/01\/31\/269186875\/yahoo-email-account-passwords-stolen ."},{"key":"22_CR40","unstructured":"The Commission of the European Communities, COMMISSION RECOMMENDATION of 6 May 2003 concerning the definition of micro, small and medium-sized enterprises. Off J Eur Union 2003;124:36\u201341. http:\/\/eurlex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2003:124:0036:0041:en:PDF ."},{"issue":"4","key":"22_CR41","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/0305-0483(95)00017-I","volume":"23","author":"JYL Thong","year":"1995","unstructured":"Thong JYL, Yap CS. CEO characteristics, organizational characteristics and information technology adoption in small businesses. Omega Int J Manag Sci. 1995;23(4):429\u201342. doi: 10.1016\/0305-0483(95)00017-I .","journal-title":"Omega Int J Manag Sci."},{"key":"22_CR42","unstructured":"Tukey JW. Exploratory data analysis. Massachusetts: Addison-Wesley Professional, Reading; 1977. ISBN 0-201-07616-0."},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"van Buuren S, Groothuis-Oudshoorn K. MICE: multivariate imputation by chained equations. R J Stat Softw. 2011;45(3). http:\/\/www.stefvanbuuren.nl\/publications\/MICEinR-Draft.pdf .","DOI":"10.18637\/jss.v045.i03"},{"key":"22_CR44","unstructured":"van Straalen V. Many ICT-security incidents at organizations [original in Dutch], 2011. http:\/\/www.cbs.nl\/nl-NL\/menu\/themas\/bedrijven\/publicaties\/digitaleeconomie\/artikelen\/2011-3293-wm.htm ."},{"key":"22_CR45","unstructured":"Watts HS. Characterizing the software process: a maturity framework. Technical report CMU\/SEI-87-TR-11, Carnegie-Mellon University. 1987."},{"issue":"4","key":"22_CR46","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.techfore.2005.06.005","volume":"73","author":"W Weimer-Jehle","year":"2006","unstructured":"Weimer-Jehle W. Cross-impact balances: a system-theoretical approach to cross-impact analysis. Technol Forecast Soc Change. 2006;73(4):334\u201361. doi: 10.1016\/j.techfore.2005.06.005 .","journal-title":"Technol Forecast Soc Change"},{"key":"22_CR47","doi-asserted-by":"publisher","first-page":"3689","DOI":"10.1016\/j.physa.2008.02.006","volume":"387","author":"W Weimer-Jehle","year":"2007","unstructured":"Weimer-Jehle W. Cross-impact balances applying pair interaction systems and multi-value Kauffman nets to multidisciplinary systems analysis. Phys Stat Mech Appl. 2007;387:3689\u2013700. doi: 10.1016\/j.physa.2008.02.006 .","journal-title":"Phys Stat Mech Appl."},{"issue":"1","key":"22_CR48","doi-asserted-by":"publisher","first-page":"51","DOI":"10.3102\/00346543065001051","volume":"65","author":"RR Wilcox","year":"1995","unstructured":"Wilcox RR. ANOVA: a paradigm for low power and misleading measures of effect size? Rev Educ Res. 1995;65(1):51\u201377. doi: 10.3102\/00346543065001051 .","journal-title":"Rev Educ Res."},{"issue":"3","key":"22_CR49","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1037\/0003-066X.53.3.300","volume":"53","author":"RR Wilcox","year":"1998","unstructured":"Wilcox RR. How many discoveries have been lost by ignoring modem statistical methods? Am Psychol. 1998;53(3):300\u201314.","journal-title":"Am Psychol"},{"issue":"12","key":"22_CR50","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1080\/02664763.2012.724665","volume":"39","author":"RR Wilcox","year":"2012","unstructured":"Wilcox RR, Erceg-Hurn DM. Comparing two dependent groups via quantiles. J Appl Stat. 2012;39(12):2655\u201364. doi: 10.1080\/02664763.2012.724665 .","journal-title":"J Appl Stat."},{"key":"22_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/00949655.2012.754026","volume":"84","author":"RR Wilcox","year":"2013","unstructured":"Wilcox RR, Erceg-Hurn DM, Clark F, Carlson M. Comparing two independent groups via the lower and upper quantiles. J Stat Comput Simul. 2013;84:1\u20139. doi: 10.1080\/00949655.2012.754026 .","journal-title":"J Stat Comput Simul."}],"container-title":["Decision Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40165-016-0022-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40165-016-0022-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40165-016-0022-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T09:15:40Z","timestamp":1589706940000},"score":1,"resource":{"primary":{"URL":"http:\/\/decisionanalyticsjournal.springeropen.com\/articles\/10.1186\/s40165-016-0022-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,10]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["22"],"URL":"https:\/\/doi.org\/10.1186\/s40165-016-0022-1","relation":{},"ISSN":["2193-8636"],"issn-type":[{"type":"electronic","value":"2193-8636"}],"subject":[],"published":{"date-parts":[[2016,11,10]]},"article-number":"5"}}