Cyberspace and Organizational Structure: An Analysis of ...

104
Air Force Institute of Technology AFIT Scholar eses and Dissertations Student Graduate Works 3-24-2016 Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment Michael D. Quigg II Follow this and additional works at: hps://scholar.afit.edu/etd Part of the Information Security Commons is esis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in eses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact richard.mansfield@afit.edu. Recommended Citation Quigg, Michael D. II, "Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment" (2016). eses and Dissertations. 409. hps://scholar.afit.edu/etd/409

Transcript of Cyberspace and Organizational Structure: An Analysis of ...

Page 1: Cyberspace and Organizational Structure: An Analysis of ...

Air Force Institute of TechnologyAFIT Scholar

Theses and Dissertations Student Graduate Works

3-24-2016

Cyberspace and Organizational Structure: AnAnalysis of the Critical Infrastructure EnvironmentMichael D. Quigg II

Follow this and additional works at: https://scholar.afit.edu/etd

Part of the Information Security Commons

This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses andDissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected].

Recommended CitationQuigg, Michael D. II, "Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment" (2016).Theses and Dissertations. 409.https://scholar.afit.edu/etd/409

Page 2: Cyberspace and Organizational Structure: An Analysis of ...

CYBERSPACEANDORGANIZATIONALSTRUCTURE:

ANANALYSISOFTHECRITICALINFRASTRUCTUREENVIRONMENT

THESIS

MichaelD.QuiggII,Captain,USA

AFIT‐ENV‐MS‐16‐M‐177

DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY

AIRFORCEINSTITUTEOFTECHNOLOGY

Wright-Patterson Air Force Base, Ohio

DISTRIBUTIONSTATEMENTA.APPROVEDFORPUBLICRELEASE;DISTRIBUTIONUNLIMITED.

Page 3: Cyberspace and Organizational Structure: An Analysis of ...

TheviewsexpressedinthisthesisarethoseoftheauthoranddonotreflecttheofficialpolicyorpositionoftheUnitedStatesAirForce,UnitedStatesArmy,DepartmentofDefense,ortheUnitedStatesGovernment.ThismaterialisdeclaredaworkoftheUnitedStatesGovernmentandisnotsubjecttocopyrightprotectionintheUnitedStates.

Page 4: Cyberspace and Organizational Structure: An Analysis of ...

AFIT-ENV-MS-16-M-177

CYBERSPACEANDORGANIZATIONALSTRUCTURE:

ANANALYSISOFTHECRITICALINFRASTRUCTUREENVIRONMENT

THESIS

PresentedtotheFaculty

DepartmentofSystemsEngineeringandManagement

GraduateSchoolofEngineeringandManagement

AirForceInstituteofTechnology

AirUniversity

AirEducationandTrainingCommand

InPartialFulfillmentoftheRequirementsforthe

DegreeofMasterofScienceinEngineeringManagement

MichaelD.QuiggII,BBA

Captain,USA

March2016

DISTRIBUTIONSTATEMENTA.APPROVEDFORPUBLICRELEASE;DISTRIBUTIONUNLIMITED.

Page 5: Cyberspace and Organizational Structure: An Analysis of ...

AFIT-ENV-MS-16-M-177

CYBERSPACEANDORGANIZATIONALSTRUCTURE:

ANANALYSISOFTHECRITICALINFRASTRUCTUREENVIRONMENT

MichaelD.QuiggII,BBA

Captain,USA

CommitteeMembership:

LTCMasonRice,PhDChair

MichaelR.Grimaila,PhD,CISM,CISSPMember

MajBenjaminRamsey,PhDMember

Page 6: Cyberspace and Organizational Structure: An Analysis of ...

AFIT-ENV-MS-16-M-177

iv

Abstract

Nowmorethanever,organizationsarebeingcreatedtoprotectthe

cyberspaceenvironment.Thecapabilityofcyberorganizationstaskedtodefend

criticalinfrastructurehasbeencalledintoquestionbynumerouscybersecurity

experts.Organizationaltheorystatesthatorganizationsshouldbeconstructedtofit

theiroperatingenvironmentproperly.Littleresearchinthisarealinks existing

organizationaltheorytocyberorganizationalstructure.Becauseofthecyberspace

connectiontocriticalinfrastructureassets,thefactorsthatinfluencethestructureof

cyberorganizationsdesignedtoprotecttheseassetswarrantanalysistoidentify

opportunitiesforimprovement.

Thisthesisanalyzesthecyber‐connectedcriticalinfrastructureenvironment

usingthedominantorganizationalstructuretheories.Byusingmultiplecasestudy

andcontentanalysis,2,856samplingunitsareanalyzedtoascertainthelevelof

perceiveduncertaintyintheenvironment(complexity,dynamism,and

munificence).Theresultsindicatethatthegeneralexternalenvironmentofcyber

organizationstaskedtoprotectcriticalinfrastructureishighlyuncertainthereby

meritingimplementationoforganicstructuringprinciples.

Page 7: Cyberspace and Organizational Structure: An Analysis of ...

AFIT-ENV-MS-16-M-177

v

TomySaviorJesusChrist,thesourceofeverythinggoodinmylife;momanddad;my

wifeformodelingChrist’slovewhileraisingthegirls.

Page 8: Cyberspace and Organizational Structure: An Analysis of ...

vi

Acknowledgments

IwouldliketothankLTCMasonRiceforjoyfullyacceptingmeasaresearch

pupilandforguidingmewithpassion,creativity,andkindness;JuanLopezforbeing

thepersonificationofmentorship,professionalism,andexcellenceduringmy

research;Dr.Grimailaforyourwisdomthroughoutandfornurturinganideaintoa

thesis;Dr.Ramseyforthetime,attention,andlevelofdetailyougavetomakingthis

aworkIcantrulytakejoyin.IamalsoindebtedtotheDepartmentofHomeland

Securityforfundingthisresearch.

Finally,thankyoutoMAJDerekYoung,StephenDunlap,andCPTJungsang

Yoonforyourincredibleselflessnessinsupportofthisresearch.

MichaelD.QuiggII

Page 9: Cyberspace and Organizational Structure: An Analysis of ...

vii

TableofContents

Page

Abstract.........................................................................................................................................................iv

Acknowledgments....................................................................................................................................vi

TableofContents......................................................................................................................................vii

ListofFigures.............................................................................................................................................ix

ListofTables................................................................................................................................................x

I.Introduction.............................................................................................................................................1

OperationalMotivation......................................................................................................................1ResearchQuestions.............................................................................................................................3Methodology...........................................................................................................................................3Limitations..............................................................................................................................................4Implications............................................................................................................................................4

II.LiteratureReview................................................................................................................................6

StructuringOrganizations................................................................................................................6OrganizationalStructureTheory...................................................................................................7InstitutionalTheory..........................................................................................................................8ResourceDependenceTheory.......................................................................................................8PopulationEcologyTheory............................................................................................................9StructuralContingencyTheory..................................................................................................10

Contingencies......................................................................................................................................10Technology..........................................................................................................................................11Size…......................................................................................................................................................11StrategyandStrategicChoice....................................................................................................12Environment.......................................................................................................................................12

EnvironmentalUncertainty..........................................................................................................13Complexity...........................................................................................................................................14Dynamism(Turbulence)...............................................................................................................14Munificence(Resource).................................................................................................................14

Structures.............................................................................................................................................15MechanisticandOrganicinPractice.........................................................................................16MechanisticOrganization:U.S.Army......................................................................................16CreatingMechanisticOrganizations.......................................................................................18OrganicOrganizations:ApacheIndians,AnonymousandAlQaeda.........................21CreatingOrganicOrganizations................................................................................................23

Page 10: Cyberspace and Organizational Structure: An Analysis of ...

viii

StructureandEnvironmentalUncertaintySynthesis........................................................25

III.Methodology......................................................................................................................................26

ResearchDesignandMethodology...........................................................................................26DataCollection....................................................................................................................................26ArtifactDiscrimination..................................................................................................................27OrganizationalDiversity...............................................................................................................29

Coding.....................................................................................................................................................29ContentCategories...........................................................................................................................30CoderTraining...................................................................................................................................32

DataReduction...................................................................................................................................32Validity...................................................................................................................................................33Reliability..............................................................................................................................................33

IV.AnalysisandResults.......................................................................................................................34

DescriptiveStatistics.......................................................................................................................34IntercoderAgreement.....................................................................................................................35CodeDistribution..............................................................................................................................36StrataAnalysis....................................................................................................................................38Complexity...........................................................................................................................................38Dynamism............................................................................................................................................38Munificence.........................................................................................................................................39

CoderAnalysis....................................................................................................................................40RecommendationsforAction......................................................................................................40

V.Conclusions..........................................................................................................................................42

ConclusionsofResearch.................................................................................................................42RecommendationsforFutureResearch..................................................................................44MeasureGovernmentCyberOrganizations..........................................................................44ReplicatetheStudy..........................................................................................................................44IdentifyDominantFactorsforMunificence..........................................................................44

AppendixA.ArtifactFinalSelection(FrontPageInformation).........................................45

AppendixB.ArtifactsMeetingSelectionCriteria.....................................................................65

AppendixC.RecordingUnitClassificationDiagram...............................................................67

AppendixD.CodedArtifactExample............................................................................................68

AppendixE.CoderTrainingBriefing.............................................................................................71

Bibliography..............................................................................................................................................87 

Page

Page 11: Cyberspace and Organizational Structure: An Analysis of ...

ix

ListofFigures

Figure Page

1.TheExternalEnvironmentandUncertainty........................................................................15

2.ArmyForceDevelopmentProcess(AR71‐32)[56]...........................................................19

3.ProcessMapforCreatingArmyOrganizations....................................................................20

4.ApacheStructuralDepiction........................................................................................................24

5:OrganizationalStructure,UncertaintyandtheExternalEnvironment.....................25

6.MaxqdaGraphicalUserInterface...............................................................................................30

7.UncertaintyintheGeneralExternalEnvironment.............................................................37

8.PercentageofUncertaintybyDimensionandStrata.........................................................38

9.CoderOverlap.....................................................................................................................................40

Page 12: Cyberspace and Organizational Structure: An Analysis of ...

x

ListofTables

Table Page

1.StructuralDimensionsofOrganizations....................................................................................7

2.CharacteristicsofMechanisticandOrganicStructures....................................................16

3.U.S.ArmyInfantryDivisionStructure......................................................................................17

4.ApacheIndians,AnonymousHackerGroupandAlQaedaStructures.......................22

5.StructuralFactorsPresentinCreatingOrganicOrganizations.....................................23

6.ArtifactCriteria..................................................................................................................................28

7.ArtifactRetrievalResults...............................................................................................................28

8.CodeCategoryDefinitions.............................................................................................................31

9.TotalCodesbyCoder.......................................................................................................................34

10.PagesCodedbyStrata..................................................................................................................34

11.Flesch‐KincaidReadingScores.................................................................................................35

12.CohensKappa...................................................................................................................................36

13.FrequencyAnalysisofCodes.....................................................................................................37

Page 13: Cyberspace and Organizational Structure: An Analysis of ...

1

CYBERSPACEANDORGANIZATIONALSTRUCTURE:

ANANALYSISOFTHECRITICALINFRASTRUCTUREENVIRONMENT

I.Introduction

OperationalMotivation

InhisbookBlink,Gladwell[27]describestheabilitytorenderaccurate

expertjudgmentinsituations(e.g.,detectingfraudulentartordiagnosingamedical

condition)quicklywithoutcollectingandanalyzingmassamountsofdata.Experts

incybersecurity,usingtechniquesdescribedbyGladwell,havedeclaredthat

governmentsarenotpreparedtorespondtocyber‐attacks[5,10,13,36].These

experts,understandingcriticalinfrastructurecybersecurity,inherentlyknowthat

responseorganizationscurrentlyinplaceareill‐fittohandleacrisisthatmaybe

rightaroundthecorner.

Theorganizationsthataresupposedtodefendagainstthesethreats(e.g.,

DepartmentofHomelandSecurityandU.S.CyberCommand)maynotbeableto

resistorrecoverfromapersistentcyber‐attack[36,59].Thissituationis

particularlytroublingbecausetheNationalSecurityAgency’sDirectorstatedthat

severalcountries,includingChinaandRussia,havethecybercapabilitiestodisrupt

electricalutilitiesthroughouttheUnitedStates[53].Withoutnecessarilyanalyzing

thecyberoperatingenvironment,expertsfullyunderstandthegovernmentis

modelingcurrentcyberdefenseorganizationsafterpracticallyeveryother

Page 14: Cyberspace and Organizational Structure: An Analysis of ...

2

governmentorganization(e.g.,rigid,slowtochange,andhierarchical).Perhapsthe

issuestheseorganizationsfacearefoundational.

AsColquitt,LepineandWessonstate,almosteverythinginorganizational

behaviorstartswithstructure[16].Ifsecurityandresilienceincyberspacearea

goal,thenananalysisofstructureshouldbeaninitialprimaryconsideration.

Thestudyoforganizationalstructureislargelyadisciplinewithinthesocial

sciencesandchampionedbyorganizationalstructuretheorists.Overthelastfifty

years,thisareaofresearchhasgrownconsiderably.Recenttheoryhasadvanced

significantlyfromthedivisionoflaboranalyzedbyAdamSmithandMaxWeber.It

appearsthatoncestablesystemsarenowrapidlyrestructuringinuncertain

emergentglobalmarkets,markedbyrapidtechnologicalchangeandtremendous

competition.

PersonalobservationswhileassignedtotheheadquartersstaffforanArmy

organizationtaskedwithcreatinganewcyberunitwereenlightening.Numerous

leadersworkedfuriouslytofindoutthebestwaytoaccomplishthetask.Timewas

limited.Thepressuretobereadytodefendthenetworkwasgreat.Attackson

militarynetworksweregrowingbytheday.Thissituationdidnotallowforslow

anddeliberatetheoreticalanalysis.Rather,itcreatedacyber‐organizationsolution

whosefutureeffectivenesswasinquestion.

Situationslikethisonearehappeningeverywherethereisaneedtodefend

criticalcyberassets.Theurgencyofthecircumstancecreatestheneedfor

Page 15: Cyberspace and Organizational Structure: An Analysis of ...

3

immediateaction.Thepervasivenessofinformationtechnologyandsocieties

increasingdependenceoncyberisnotlikelytoresolvequickly.Indeedacoupleof

decadesagoIlinitch,D’AveniandLewinclaimedaboutthisnewenvironment,

“Althoughnumerousorganizationsarebeingcreated,fewareexaminingthe

organizationalresearchandmanyareexperimentingwithdisaster”[32].Thisthesis

seekstofillthegapintheliteraturetoaddressthiscriticalissue.

ResearchQuestions

Thisthesisanalyzesrelevantorganizationalstructuretheoryandits

connectiontocyberorganizationstoanswerthefollowingresearchquestions:

1. Whatisorganizationalstructure?

2. Whattheoriescontributetoorganizationalstructure?

3. Howshouldorganizationsstructureincyberenvironments?

Methodology

Theresearchapproachisqualitative,pragmatic,andexploratoryinnature,

usingmultiplecasestudyandcontentanalysis.Theenvironmentofcyber‐connected

criticalinfrastructure,definedascriticalinfrastructurethatconnectstocyberspace

(primarilytheinternet),willbeevaluatedfromtheperspectiveoftheacademic,

governmentalandprivate/practitionercommunities.Documentsprovidethe

informationforanalysis.Contentanalysiscategorizesandquantifiesthelevelof

uncertaintyintheenvironment.

Page 16: Cyberspace and Organizational Structure: An Analysis of ...

4

Limitations

Limitationsrangedfromsoftwarefunctionalitytomethodselection.

Significantsoftwarelimitationsincludedthelackofflexibilityinsoftware

modification,anduserlicensesrequiringeachcodertohavetheircopyofthe

software.Theresearcherlimitedthecasestothecyber‐connectedcritical

infrastructureenvironment(thoughthenatureofcybercloselylinksthisresearch

withothercyberenvironments),andthesearchenginestoeightsources.

Documentation,providedbythesearchenginesforthedataset,were(insome

cases)limited;notallinformationonthecyber‐connectedcriticalinfrastructure

environmentisavailableandsomerequiredsubscriptions.Theavailabilityof

personnelwithknowledgeofthephenomena,theappropriatereadinglevel,and

codingexpertisewaslimited.Humancodingsufferednaturallimitationsfromthe

ambiguityofwordmeaningtofatigue.Themultiplecasestudyapproachwith

multiplestratawasusedtoovercomedatatriangulation(multipledatacollection

techniques,e.g.,surveys,interviews).Thisresearchusedappropriatetechniquesto

mitigatetheselimitationsandothers(e.g.,rest,training)

Implications

Theorydictatesthatorganizationsshouldstructuretofittheiroperating

environment.Theinsightsofthisanalysisshouldhelpstrategiccyberleaders,

particularlythosetaskedtoprotectcriticalinfrastructure,understandcritical

Page 17: Cyberspace and Organizational Structure: An Analysis of ...

5

aspectsoftheenvironment.Theconnectionsmadebetweenstructureand

environmentwillaidinstructuringmoreeffectivecyberresponseorganizations.

Page 18: Cyberspace and Organizational Structure: An Analysis of ...

6

II.LiteratureReview

StructuringOrganizations

Whendiscussingorganizationalstructure,itishelpfultodefinethemeaning

of“organizationalstructure.”Manypeople,whenhearingorganizationalstructure,

willconjureupapictureofanorganizationalchartofsomesort.However,

organizationalstructureencompassesfarmorethanachart.Organizational

structurecommonlybreaksintotwodimensions:structuralandcontextual[17,50].

Thesedimensionshelpexplaintheformsorganizationstakeandwhytheytake

them.Thestructuraldimensionsincludehoworganizationsattempttocontrol

behaviorandcompletetasks.Contextualdimensions,oftencalledcontingencies,are

forcesactingwithinandoutsidetheorganization,whichaffectthestructural

dimensions.Table1displayssomeofthesignificantstructuralandcontextual

dimensions.

Page 19: Cyberspace and Organizational Structure: An Analysis of ...

7

Table1.StructuralDimensionsofOrganizations

Type Dimensions TraitsStructural Specialization;centralization;

formalization;spanofcontrol;chainofcommand;personalspecialty.

Howmanytasksina job;whohastheauthority tomakedecisionsandwhere;howstandardizedandexplicitaretherules,policiesandprocedures;howmanypeoplearesupervised inaparticulargroup;whoreportstowhomupthehierarchy;whatiseveryonerequiredtoknow.

Contextual Size;strategy;culture;externalandinternalenvironment(competition,hostility,geography);technology.

Whatsizeistheorganizationanditssubunits;whatchoicesarebeingmadebyleadership;perceivedvaluesandbeliefs;whatishappeninginandaroundtheorganizationwhichcanaffectit;thepresenceandeffectsoftechnology.

Thisthesiswillexplorethesedimensionstodeterminetheirimplicationfor

structuringorganizationstooperateincyberspace.Whatfollowsisareviewofthe

dominanttheoreticalprinciples.

OrganizationalStructureTheory

Thestudyoftheexistenceoforganizationsandhowtosustainthatexistence

hasincreaseddramaticallyinthelast75years[49].Theriseandubiquitousnature

ofinformationtechnologyanditseffectsonorganizationalstructuretheoryinthe

socialscienceshaveledtoproportionatelyrapidtheorydevelopment[45].Few

couldforeseetheuniversalityandimportanceoftechnologicalsystems.Thefour

Page 20: Cyberspace and Organizational Structure: An Analysis of ...

8

dominant,historicaltheoriesonorganizationalstructureare(i)institutional,(ii)

resourcedependence,(iii)populationecology,and(iv)structuralcontingency.

InstitutionalTheory.

DimaggioandPowellintroducedinstitutionaltheory(orinstitutional

isomorphism)in1983.Thecruxofthistheorycanbesummeduprathersimply–

organizationstendtomimiceachother[20].DimaggioandPowellpointtothree

maintypesofisomorphism,whicharecoercive,mimeticandnormative.Coercion

explainshoworganizationsoftenresultinsimilarstructuresbecauseofsimilar

externalenvironmentalpressures(e.g.,governmentoversight).Mimeticexplains

howorganizationsinestablishedfieldstendtomimiceachotherasabulwark

againstuncertainty.Normativeisomorphicprocessesresultfromthe

professionalizationofafieldaccompaniedbycommontraining,standardsand

practices,whichcreatehomogeneity[20].Itisimportanttonote,thatinthecyber‐

connectedcriticalinfrastructureenvironment,institutionalisomorphismmaynot

behelpful.ObservationofgovernmentcyberstructuringintheU.S.Departmentof

Defenseindicatesthepresenceofisomorphism.Forexample,newlycreatedcyber

forcescloselyresembletraditionalmilitaryforces,eventhoughtherearecritical

differencesintheenvironmentsofeach.

ResourceDependenceTheory.

Resourcedependencetheoryarguesorganizationalsurvivalbeabout

acquiringandmaintainingresources[49].Thereisconsiderableoverlapbetween

Page 21: Cyberspace and Organizational Structure: An Analysis of ...

9

resourcedependenceandpopulationecology.However,thereareseveral

deviations;someexamplesareintherolesofinformationprocessingandstrategic

choice.Populationecologyarguesthat,givencertainconditions,strategicchoiceis

possible.However,mostorganizationsareoftenpowerlesstochoosebecauseof

inter‐organizationaldependenciesandinformationprocessingissues[1].Resource

dependencecountersbyofferingthatinformationsystemsdetermineorganizational

choiceandprovidecriticalinformation[49].Understandingwhatconstitutesa

resourceincyberisdifficult.However,somegeneralexamplesincludemoneyand

people.

PopulationEcologyTheory.

Populationecologyoffersexplanationsbasedonthenaturalselectionmodel.

AldrichandPfefferargueintheEnvironmentofOrganizationsthatorganizations

changebecauseofthedistributionofresourcesintheorganization’senvironment

[3].Theenvironmentselectstheorganizationalform,whichdemandsaconstant

senseofadaptation.Thelistofoncesuccessfulorganizationsthatdidnotadaptto

theenvironmentandquicklyfoundthemselvesobsoleteislong.Governmentcyber

organizationscanillaffordtobeapartofthisgroup.Aconsistentthemeis

developinginthealignmentoftheenvironmentandtheorganization.Structural

adaptationandflexiblestructuringinhighinformationtechnologyindustriesare

nowprominent.

Page 22: Cyberspace and Organizational Structure: An Analysis of ...

10

StructuralContingencyTheory.

Thistheoryoffersapotentialsynthesisofideasrepresentedinthetheories

above.Structuralcontingencytheorydeclaresthemosteffectiveorganizational

structureistheonewhichbest“fits”thecontingencies[22].Inherentinthis

definitionisthatstructureshouldbetailored.Donaldson[23]statesthatcertain

factorsinfluencestructure.Thesefactors(knownascontingencyfactors)include

technology,size,strategyandtheenvironment[23,47].Mostcontingenciesinvolve

theinternalboundaryoftheorganization,butsomeofthemostcriticalareoutside

ofthatboundary(e.g.,theexternalenvironment).Contingencytheoryoffersseveral

empiricallyverifiedresultsthatshoworganizationsthatfitthecontingencies

presentintheenvironmentoutperformthosewhodonot[23].Itisimportantto

notethatrarelydoesanorganizationhavetoaddressonecontingencyandnot

others,makingradicalorganizationaloverhaulspreferabletoprolonged

incrementalsteps[51].Heuristically,itisalsodesirabletomakethesechanges

earlierinthelifeofanorganizationthanlater,whichbodeswellforcyber

organizations,astheyareintheirinfancy.

Contingencies

Buildinguponcontingencytheory,whatfollowsisabriefreviewofthe

centralcontingenciesintheresearchliteratureandtheirrelevancetothecyber

environment.

Page 23: Cyberspace and Organizational Structure: An Analysis of ...

11

Technology.

Technologyandthechangesurroundingitincreaseperceiveduncertaintyfor

organizations[55].Asuncertaintyincreasessodoesthepressuretolearnand

increaseknowledge.Thispressureforknowledgecreatesnewworkroles,

workflows,andevenchangesthelanguageusedtodescribework[55].Thefocusis

notwhetherorganizationswilluseinformationtechnologytoaccomplish

something,buthowtheywillaccomplishthingswithinandaroundit.Cyber

organizationsshouldkeeptheseprinciplesinmind,andbecarefulnottodesign

structuresthatarecomfortablebutinappropriate.

Size.

Sizeconsiderablyaffectsthetypeandclassificationofanorganization[47].

Organizationalsizehasbeenfoundtoaffectnearlyeverythingthatdefines

organizationalstructure.Forinstance,largerorganizationsareoftenmorecomplex,

havemoreformalizationandsurvivelongerthansmallerorganizations[7].

Informationtechnology‐richenvironmentshavebeenshowntoreduceorganization

sizeasinformationsystemsreplacemiddlemanagementandallowother

organizationstoincreaseinsizewithoutdecreasingefficiencyandinnovativeness

[19].Itisimportanttonotethatefficiencyhasnotbeenshowntoimproveas

organizationalsizeincreases[28].Collyer[15]statesthatasthesizeoftheproject

increasessodoesthechanceoffailure.Thelikelihoodofthatfailureiscompounded

byincreasedspeedandquantityofchangeintheenvironment.Theconsensus

Page 24: Cyberspace and Organizational Structure: An Analysis of ...

12

appearstobeformingwhereinlargerorganizationsformright‐sizedsubunitsthat

performwellwhenbasedontherelevantfactors.

StrategyandStrategicChoice.

Thetypeofstrategyanorganizationpursuessignificantlyaffectsthe

structureoforganizations[1,12,23,47].Perhapsmostimportantly,when

organizationschooseastrategytomatchstructuretotherelevantcontingencies,

performanceincreases[21].Thisisastrategycyberorganizationsshouldpursue.

Environment.

Inlinewiththepopulationecologyandresourcedependenceperspectives,

organizationsthatcannotadapttotheirenvironmentcannotsurvive[33].

Environmentalcontingenciesarefundamentallyimportanttoorganizations.They

areofparticularimportancetocyberorganizations,whichhaveaprincipalsecurity

function.Itishelpfultoseparatetheinternalenvironmentoforganizationsfromthe

externalenvironmentoforganizations.Thisresearchwillexclusivelyfocusonthe

generalexternalenvironment,heredefinedastherelevantphysicalandsocial

factorsoutsidetheboundariesofanorganization[24]whichgenerallyeffectall

withinthecyber‐connectedcriticalinfrastructurearea.Limitedresearchconnecting

organizationalstructuretothecyberspaceenvironmentisavailable.However,

researchisbeginningtoemergeonorganizationaloperationsinacyber‐

environment.Forexample,Liuetal.,[41]haveaddressedcommandandcontrolin

cyber‐physical‐socialsystems(CPSS).However,Liu’sresearchfocusesfarmoreon

Page 25: Cyberspace and Organizational Structure: An Analysis of ...

13

thepotentialcapabilitiesofCPSSandfarlessonoptimalstructuraldimensionsfor

thoseoperatingincyberspace.

Thepresenceofcompetitionandhostilityintheenvironmentcan

significantlyaffectorganizations.Forexample,ifanorganizationperceivestheir

environmenttobehostileorcompetitive,itwillmovetowardcentralizationand

formalization[34,48].Thisreactionmaybeinstinctive.However,itcanleadtoa

structurethatisill‐suitedtomeetthechallengingcharacteristicsofthe

environment.Thisphenomenonisinsightfulinlightofnewlycreatedgovernment

cyberorganizations.Itappearscentralizationandformalizationareincreasingin

theseorganizationsconceivablytotheirperil.

Eachorganizationalenvironmenthasuniqueextrinsicfactors.Thesefactors

influenceorganizationalshape,meansandactionswithintheenvironment[11].In

assessingenvironmentalconsiderations,uncertaintyemergesasafocalpoint[11,

24,39].

EnvironmentalUncertainty

Dynamism,complexityandmunificenceremaintheprimarydimensionsused

toconceptualizethecentralpropertiesoforganizationenvironments[7,18,25]and

actassignificantmeasuresofperceiveduncertaintyintheexternalenvironment[1,

24,25].Thesethreedimensionsrelatetoforcesintheenvironmentthatcan

influencetheorganization.Forceisoperationallydefinedasanentityexternalto

Page 26: Cyberspace and Organizational Structure: An Analysis of ...

14

cyber‐connectedcriticalinfrastructureorganizationsthatcaneffectchangeintheir

environment.Theseforcescanbecompetitors,customers,economic,technological,

political,ethical,demographic,culturalandsocial[17,24,57].Notethatwhile

complexity,dynamismandmunificencearecapableofprovidinganextensiveview

oftheenvironment,theyarenottheonlydeterminantsofenvironmentaleffectson

structure[31].

Complexity.

Complexityrelatestothetotalamountofforcesintheenvironment,whether

theyareconnectingwitheachother,andthedegreebywhichtheycaninfluence

otherorganizations.Forexample,aweakforceinisolationlowersuncertainty,

whereasmanyinterconnectingstrongforcesincreaseuncertainty[2,18,24].

Dynamism(Turbulence).

Dynamismreferstochangemeasuredinspeedandquantity.Organizations

thatfaceasignificantamountofchangeoperateinenvironmentsthataremore

uncertain.Organizationsthatexperiencesmallamountsofchangehaveless

uncertainty.Anincreasedrateorspeedofchangeonlyaddstotheuncertainty[2,

18,24].

Munificence(Resource).

Munificencedealswithcapacity,ormoregenerally,theamountofresources

availabletosustainorsupportthatenvironment.Thiscategoryrepresentsa

considerableportionofthefocusofstructuraltheory.Asitpertainstouncertainty,

Page 27: Cyberspace and Organizational Structure: An Analysis of ...

15

thescarcertheresources,thegreatertheuncertainty[2,18,47].Figure1

conceptuallydepictsmunificence,complexityanddynamismassourcesof

uncertaintyintheexternalenvironment.

Figure1.TheExternalEnvironmentandUncertainty

Structures

Themechanisticandorganicstructuralcontinuumrepresentsthetypeof

formsorganizationscantake[11].Thiscontinuumofferstwoextremesfor

managementsystemsbasedonthelevelofperceiveduncertaintyinthe

environment.Empiricalresultsstronglyindicatethatperceivedenvironmental

uncertaintysignificantlycorrelateswithorganicandmechanisticstructuraltypes.

Table2listscharacteristicsofthetwostructures.

Page 28: Cyberspace and Organizational Structure: An Analysis of ...

16

Table2.CharacteristicsofMechanisticandOrganicStructures

Mechanistic OrganicSpecializedindividual tasks

VerticalhierarchyIndividualresponsibilityCentralized authority

Increasedrules,policiesandproceduresStandardizedverticalcommunication

DirectivesandordersFixed functionaldepartmentsStatusincreasesuphierarchyNarrowspanofcontrol

Adjustable teamtasksFlexible (flatter)structure

Team responsibilityDecentralizedauthorityDecreasedformalization

All‐encompassingcommunicationAdvice andinformationsharing

Fluid (mixed)functionaldepartmentsStatus increaseswithbrilliance

Wide spanofcontrol

MechanisticandOrganicinPractice

Twoorganizationsareusedasexamplestodemonstratemechanisticand

organicstructures.TheU.S.Armyisusedtotypifymechanisticstructures;Apache

Indians,AnonymousandAlQaedadisplayexamplesoforganicstructures.

MechanisticOrganization:U.S.Army.

AnArmyinfantrydivisionrepresentsanorganizationthatdisplays

mechanisticcharacteristics.WhilenotalloftheArmytrendstowardmechanistic,

mostoftheArmyeasilyfitsthisstructure.Atypicaldivisionislargelymechanistic

whenanalyzingitsdimensionaltraits.

ThisparticulartypeofstructureiscommonthroughouttheArmyregardless

oftheenvironmentandcontextinwhichitconductsbusiness.Recentcombat

operationsinIraqareanexample.Duringtheinitialcampaign,Armydivisionswere

deployedtodominatetheenvironmentwithmassresources,againstasingular,

Page 29: Cyberspace and Organizational Structure: An Analysis of ...

17

weakerandmechanisticadversary.Asthewarmaturedandkineticoperations

diminished,theArmyfounditsdivisionalstructureill‐suitedfornationbuilding,and

struggledtofindtheflexibilitytoadjustamidstthegrowingdynamicsand

complexities(e.g.,environmentaluncertainty)ofacounterinsurgency[4].This

experienceservestohighlighttheneedforflexibleorganizationalmodification

processes.Table3depictsthestructuraldimensionsofatypicalinfantrydivision.

Table3.U.S.ArmyInfantryDivisionStructure

Dimension Trait StructureSpecialization Highlyspecializeddowntotheindividual

throughtasklists;highlyfunctionalandcompartmentalizedintosubunits.

Mechanistic

Centralization Authoritytomakedecisionsisoftenkeptatmultiplelevelsabovetheworker.

Mechanistic

Formalization Highlyformalizedtasksdrivenbydoctrine,codifiedandcheckedfrequently;dozensofpoliciesandproceduresdictateactions.

Mechanistic

SpanofControl Theamountofpersonnelsupervisedisdoctrinally drivenandrigid;oftenanarrowandverticalhierarchy;difficulttochange.

Mechanistic

ChainofCommand

Doctrinally drivenandconsiderablyverticaloftenwithadozenleaderswithauthority tochangewhatthelowestindividualwilldo.

Mechanistic

Professionalism VariedwithdeliberateintentionsofbeinghighthroughouttheArmy.

Mixed‐Organic

Status Increasesupthehierarchy. MechanisticCommunication Morevertical than all encompassing;directive

andordersbased.Mechanistic

ThemeansofcreatinganArmyorganizationofferssomeexplanationasto

whytheyaremechanistic.

Page 30: Cyberspace and Organizational Structure: An Analysis of ...

18

CreatingMechanisticOrganizations.

TheArmycreatesorganizationsthroughtheForceDevelopmentProcess

which“consistsofdefiningmilitarycapabilities,designingforcestructuresto

providethesecapabilities,andtranslatingorganizationalconceptsbasedon

doctrine,technologies,materiel,manpowerrequirements,andlimitedresources

intoatrainedandreadyArmy”[56].

TherearefivephasesintheForceDevelopmentProcess,andtheyare:

(1)Developcapabilities.

(2)Designorganizations.

(3)Developorganizationalmodels.

(4)Determineorganizationalauthorizations.

(5)Documentorganizationalauthorizations.

Armyorganizationsfollowthisprocess,toincludeArmycyber

organizations.Thisfive‐stepprocessresultsinthecreationofanorganizational

structure.Figure3showsthemodelofthesystemofsystemsprocesswiththe

inputsandoutputs.

Page 31: Cyberspace and Organizational Structure: An Analysis of ...

19

OncetheArmyidentifiestherequirementforaneworganization,the

planning,programming,budgeting,andexecution(PPBE)processbeginstodevelop

theorganization.TheprocessmapinFigure4highlightsthekeysteps.

Figure2.ArmyForceDevelopmentProcess(AR71‐32)[56]

Page 32: Cyberspace and Organizational Structure: An Analysis of ...

20

RecieveGuidancefrom...

•NationalSecurityStrategy,NationalMilitaryStrategy,QuadrennialDefenseReview,NationalDefenseStrategy,DefensePlanningGuidance,GuidanceforDevelopmentoftheForce,GlobalForceManagementImplementationGuidance,GuidancefromtheArmy’sseniorleadership(TheArmyPlan),Jointwarfightingconcepts(suchasrapiddecisive,operations,peaceenforcementoperations),and/ornewmaterielcapabilitiesevolvingfromtheresearch,development,andacquisitionprocess.

then..

•Thecapabilitiesdevelopmentcommunitydevelopstheproposedorganization,designs,missions,andfunctionstomeettherequiredoperationalcapabilities,whichiscapturedinaUnitReferenceSheet(URS).

then...

•TrainingandDoctrineCommand(TRADOC)utilizestheArmyCapabilitiesIntegrationCenter(ARCIC)andproponentcentersandschoolstodevelopandanalyzethedesign.

then...

•TheapprovedURSdesignmovesforwardtoARCIC’sForceDesignDirectorateandtheArchitectureIntegrationandManagementDivisionwhomakessuretheproposedorganizationaldesignfitsthroughouttheArmyandthattheproposalisdoctrinallycorrect.

then...

•ForceDesignDirectorateforwardstheirdesigntothecommandinggeneraloftraininganddoctrinecommandforapproval.

then...

•ApprovedrecommendationsareforwardedtoDeputyChiefofStaffDirectorofForceManagmentforaforceintegrationfunctionalareasanalysis.

then...

•TheForcedesignupdateneedstobeapprovedbytheViceChiefofStaff,ArmyorChiefofStaff,Army.

then...

•TheUSArmyForceManagmentSupportAgency,inconjunctionwiththeappropriateforcemanagementproponent,appliesarchitecture,rules,standards,andguidancetothedoctrinallycorrectdesigntoproducetheorganizationalmodel.

then...

•HeadquartersDepartmentoftheArmyApprovesthemodelknownasaMilitaryTableofOrgranizationandEquipment.

then...

•Theorganizationissubmittedtothetotalarmyanalysis(TAA)processtocompeteforresourcestoperformthespecifiedcapabilitiesitwascreatedtodo.Resourcingvaries.

Figure3.ProcessMapforCreatingArmyOrganizations

Page 33: Cyberspace and Organizational Structure: An Analysis of ...

21

Theprocessmapdoesnotshowalloftheprocess.Forinstance,theArmywill

stillneedtopurchaseequipment,requisitionpersonnel,prepsites,andpublish

doctrine.Allofthishappenswithintheconfinesofwhathasoccurredpreviously.

Thisprocessdoesnothappenquickly.Seniorleaderapprovalcancausebottlenecks

(therearemanyinthisexample),transitionsfromoneorganizationtoanother,

rework,oradditions/modificationsfromapprovingofficials.Leadersoftenchange,

whichcreatesstagnationintheprocess.Severalotherfactorsandvariablescause

delaytoincludeembeddedsubprocesses.Allofthisaddsuptoanorganizational

creationprocessfacilitatingmechanisticentities.Perhapsthemostsignificantpoint

isthattheArmyevaluatesstructuralcontexttodetermineneededcapabilities,not

todeterminestructuralstrategy.

OrganicOrganizations:ApacheIndians,AnonymousandAlQaeda.

TheApacheIndians,AnonymousCyberNetwork,andAlQaedaoffer

examplesoforganicstructuringinanearlypureform.Thesethreeorganizations

exhibitedanunusualabilitytosucceedagainstvastlylargeradversaries;they

operateinhighlyuncertainenvironments,characterizedbysuddenandvast

amountsofchange,considerableforcesthatarepronetoshiftatamoment’snotice,

andlimitedavailabilityofresources.Table4depictsthestructuraldimensionsof

theseorganizations.

Page 34: Cyberspace and Organizational Structure: An Analysis of ...

22

Table4.ApacheIndians,AnonymousHackerGroupandAlQaedaStructures

Dimension Trait StructureSpecialization Lowlevelofspecializationwithoperators

performingabroadrangeofrandomtaskswithlittle standardization;fluidteamandnetwork‐basedtaskunits.

Organic

Centralization Personnelfollowemergentleadersandoftenactwithautonomy.

Organic

Formalization Frequentlynoformalizationispresentintheperformanceoftasks.

Organic

SpanofControl Emergentandvaried;at timesextraordinarilywide.

Organic

ChainofCommand

Emergentandflexiblebasedoncontingenciesfacingsubunits;nearflat organizationalhierarchywithcommonthemesallowingvariousactorstoplugintotheorganizationwhenneededordesired.

Organic

Professionalism Varied. MixedStatus Increaseswithdisplayedbrilliance. OrganicCommunication Rangesfromhorizontaltoallencompassing;

adviceandinformationsharing.Organic

TheApacheIndianshaveoccupiedwhatarenownorthernMexicoandthe

southwesternUnitedStatesforhundredsofyears.Theyincreasedinfameand

notorietyduringtheeraofSpanishConquistadorsintheAmericasinthe16th

century.TheSpanishappearedtobeunstoppableastheygainedconsiderable

groundthroughoutCentralAmericauntiltheyventurednorthandencounteredthe

Apache.TheSpanishmettheirmatchinanundersizedandunder‐resourced

adversary[9].

Page 35: Cyberspace and Organizational Structure: An Analysis of ...

23

Theanonymoushackergroupissimilar.TheyclashedwithFortune500

companies,computersecurityfirms,majorreligiousorganizationsandbrought

them,atleasttemporarily,greatdifficulty[44].

AlQaedahasverynoticeablykeptpowerfulmilitariesbusyforoveradecade.

Theyhavedonesousingsimpletechnologyandsneakytacticstomakeupfortheir

lackofairsupport,advancedcommunicationsandweaponry.Thereisa

commonalityinthesethreeorganizationsandtheiradversaries.Alloftheir

adversariesexhibitedtendenciestostructureandoperateinamechanisticfashion

despiteexternalenvironmentalconditionsthatsuggesttheopposite.

CreatingOrganicOrganizations.

Describingthecreationoftheseandotherorganicorganizationsisdifficult;

theyare,almostbydefinition,unstructured.However,BurnsandStalkerhighlight

thepresenceofthreefactorsinthecreationoforganicstructures:sharedbeliefsand

goals,commitmenttoacommonconcern,andpersonnelwithexpertisewhoemerge

asleaders[11].Table5showsthepresenceofthesefactors.

Table5.StructuralFactorsPresentinCreatingOrganicOrganizations

Organization Sharedbeliefs/goals

Commonconcern Emergentleaders

16thCenturyApacheIndians

Yes RepellingtheSpanishinvasion

Nant’ans

AnonymousHackerGroup

Yes Variesonemergent“operations”ofinterest

Opschampion;skilledhackers

AlQaeda Yes Repelthewest;establishacaliphate

Commanders/emirs

Page 36: Cyberspace and Organizational Structure: An Analysis of ...

24

Thestrengthofthefactorsappearstoincreasethestrengthofthe

organization.Whenbeliefsandgoalsbegintocompetewithoneanother,thiscan

createopposingfactions,effectivelyreducingthecollectivepoweroftheentity.A

commonconcernactstofocusthehorizontalstructure,whichcreatestheimpetus

formoreskilledleaderstochampionit.Weakeningthecommonconcernlikewise

weakenstheintegrationofexistinggroups.Followerschooseleadershipbasedon

proveneffectivenessintheareaofinterest.Theabsenceofskilledleadershinders

theabilityoftheorganizationtoaccomplishgoals.InthecaseoftheApache,leaders

areknownasNant’ans,spiritualandculturalfront‐runnerspeoplelikedfollowing

[9].ThereweremanyNant’ans,andtheywouldattimesalignwitheachotherwhen

needed.Whenonedied,anotherwouldemerge.Figure5isadepictionofhorizontal

andnetwork‐basednatureoftheApacheIndiansinthe16thcentury:

Nant’an

Nant’anNant’an

Nant’an

Figure4.ApacheStructuralDepiction 

Page 37: Cyberspace and Organizational Structure: An Analysis of ...

25

StructureandEnvironmentalUncertaintySynthesis

Asitrelatestoperformance,thegreatertheperceiveduncertaintyinthe

environment,themoretheorganizationshouldtakeanorganicform,andwithless

uncertainty,theyundertakeamechanisticform[11,29,39].Whenanorganization

takesanorganicforminanenvironmentthatishighlyuncertain,thisisconsidered

astructuralfit,whichisshowntoincreaseperformance[21].Thisalignmentseems

intuitive,asorganicstructuresaremorefluidandadaptable.Followingthesame

logic,organicstructuresarenotashelpfulinstableenvironments.Itisworthnoting

thatnosinglecontingencyorstructureappliestoall.Organicormechanistic

structuraltypesareonly“better”iftheyfitthecontingencies.Organizational

structuresandtheirrelationshiptoenvironmentaluncertaintyandstructural

contingencycanbesynthesizedasshowninFigure2.

Thisresearchseekstofindoutthelevelofuncertaintyinthegeneralexternal

environmentofcyberconnectedcriticalinfrastructuretodeterminestructural

guidanceforcyberorganizationstaskedwithprotectingthesecriticalassets.

Figure5:OrganizationalStructure,UncertaintyandtheExternalEnvironment

Page 38: Cyberspace and Organizational Structure: An Analysis of ...

26

III.Methodology

ResearchDesignandMethodology

Theresearchmethodisamultiplecasestudy.Theapproachisstructuredas

anexploratorystudywitharetrospectivelensfororganizationalpatterns.Thecase

studymethodallowsinvestigatorstoretaintheholisticandmeaningful

characteristicsofreal‐lifeeventssuchasindividuallifecycles,smallgroupbehavior,

organizationalandmanagerialprocessesandthematurationofindustries[60].

Thedataanalysistechniqueiscontentanalysis.Contentanalysisissuitable

forcondensingmanywordswithinadocumentintoasmallsetofcontentcategories

basedonexplicitcodingrulesforthepurposeofexaminingthem[6,30,37,54].The

contentcategorieswereestablishedaprioribasedtheorganizationalstructure

theoriesofpopulationecology,resourcedependenceandstructuralcontingency.

Thecategoriesweredefinediterativelytomaximizemutualexclusivityand

exhaustiveness[58].Thisresearchhighlightsexternalenvironmentaluncertainty

foritssignificantinfluenceinshapingorganizationalstructureacrossthefollowing

threemeasureddimensionalcategories:(i)complexity;(ii)dynamism(turbulence);

and,(iii)munificence(resource)[18].

DataCollection

Onceexternalenvironmentaluncertaintywaschosenasthefocusofthis

research,thecontentanalystwasabletodrawastratifiedpurposivesampleof

Page 39: Cyberspace and Organizational Structure: An Analysis of ...

27

artifacts(documents)fromthepublishedmaterial.Thestrata(cases)dividedinto

academia,governmentandprivate/practitioner[43,46].Eachrepresents

stakeholdersofpubliclyavailableinformationrelatedtocriticalinfrastructureand

cyberintheUnitedStates.Informationaboutthecyberlinkagetocritical

infrastructureisaspecifictopicofinterestwhererelevantinformationisknown

mostlytoaspecificsubsetofprofessionalswithinthesethreestrata[37].Search

engines(includingGoogle,RAND/CSIS/MITREand.govsources)identifiedthe

artifactsusingalgorithmsthatsortdocumentretrievalfromlargedatabases.This

processhelpstoidentifyartifactswiththemostreferencesandinformationrelated

tocriticalinfrastructureandcyber.TheU.S.GovernmentAccountabilityOffice’s

(GAO)definitionofartifactsasphysicallyseparable,minimallysized,andself‐

containedtextualinformationwasadopted[30].

ArtifactDiscrimination.

Artifactswereretrievedusingthesearchtermsindustrialcontrolsystem,

SCADA,andcriticalinfrastructurecyber,basedontheircloselinkagetocyber‐

connectedcriticalinfrastructure[8].Theinitialsearchharvestedalargenumberof

artifacts.Infilteringtheresults,additionalcriteriawereappliedtoachievea

relevantandrepresentativesampleforeachstratum.Table6liststhecriteria.The

contentanalystconvertedthefinalselectionofartifacts(AppendixA)into

individualportabledocumentformat(PDF)tominimizethefilesize,standardizethe

formatforallcoders,andmakeimportingintocodingsoftware(e.g.,Maxqda)easy.

Page 40: Cyberspace and Organizational Structure: An Analysis of ...

28

Table6.ArtifactCriteria

Category CriteriaContent Discusscyberandthecriticalinfrastructuregeneral

externalenvironmentGeography U.S.relatedTimeliness Publishedwithinthelastsevenyears(sinceJuly2008)Availability PubliclyavailableSize Nomorethan20codeablepagesperdocument

Table7containsthesearchresults.Moreartifactsthatareacademicwere

reviewedbecauseoftheirperceivedreliability,validityandtrust.Aslightlyhigher

amountofprivate/practitionerartifactswerereviewedthangovernmentbecauseof

searchenginelimitationsuniquetoRAND,CSISandMITRE.Google’splatform

dominatedbyitsabilitytoreturnresultsconcentratedonthefocusarea,whichwas

verytimely(usuallywithinoneyearofpublication).Governmentartifactselection

alsosufferedfromsearchenginelimitationsandsyntacticissues(e.g.,includedonly

minutesfromcongressionalmeetings)thatincreasedtheamountofartifactsneeded

tobeviewed.

Table7.ArtifactRetrievalResults

Strata InitialSample MetCriteria FinalRandomSampleAcademia 91 34 10(50%)Private/Practitioner 73 17 5(25%)Government 65 17 5(25%)Totals 229 68 20(n=60)

ArtifactswererandomizedusingMicrosoftExceltogeneratethefinalsample.

All68artifacts(AppendixB)meetingtheselectioncriterionwerecodedwithanA,

Page 41: Cyberspace and Organizational Structure: An Analysis of ...

29

P,G(academic,private/practitioner,andgovernment).Thefinalrandomsample

contained20documentspercoder(distributed10‐A/5‐P/5‐G)foratotalofn=60

documents.Itisimportanttonotethatincontentanalysis,unlikequantitative

statisticalanalysis,anaccuraterepresentationofallthedocumentsintheareaof

cyber‐connectedcriticalinfrastructureisnotthegoal.Thegoalistoretrieveauseful

setofartifactstoanswertheresearchquestionfairly[37].

OrganizationalDiversity.

Thedocumentsanalyzedbythecodersrepresentedadiverseamountof

informationfromallthreestrata.Parentorganizationsthathavepublishedcontent

includedinthefinalsampleare:AssociationforComputingMachinery,IEEE,Forbes,

ArmyResearchLab,InternationalJournalofCriticalInfrastructureProtection,

Economist,Tripwire,DepartmentofHomelandSecurity,InstituteforComputer

Sciences,SocialInformaticsandTelecommunicationsEngineering,WhiteHouse,

GovernmentAccountabilityOffice,DowJonesandCo.,andInternationalFederation

forInformationProcessing.

Coding

Krippendorfdefinescodingasthestepofclassifyingthesamplingor

recordingunitsintermsofthecategoriesoftheanalyticalconstructschosen[37].

Thesamplingunitelectedtocategorizetheinformationpresentintheartifactis

“thesentence”[54],becauseofitsabilitytoobtainmeaninginrelationtotext[37],

Page 42: Cyberspace and Organizational Structure: An Analysis of ...

30

andduetotheuseofhumancoders[30].Eachsentencewasreadandcodedagainst

thecodecategoriesusingtherecordingunitclassificationdiagramlistedin

AppendixC.Codersweretrainedtolookforrepetitivematerialsoasnottocodethe

sameinformationtwice.Thecoderswereinstructedtointerpretthesamplingunit

(e.g.,sentence)inthecontextofanentireartifact(e.g.,contextunit).This

interpretationismeaningfulandfeasibleforanartifactthatcontainslessthaneight

pagesofcodeablematerial[37].AnexampleofacodedartifactisinAppendixD.

ContentCategories.

TheMaxqdagraphicaluserinterfaceprovidesavisualdisplayofcode

categoriesandcodedmaterialtocheckoperationaldefinitionsagainstsampling

units,asdisplayedinFigure6.

Figure6:MaxqdaGraphicalUserInterface

Page 43: Cyberspace and Organizational Structure: An Analysis of ...

31

The“NotApplicable”codecategorywasincludedinadditiontotheexistinga

prioricategoriesofcomplexity,dynamismandmunificencetoensure

exhaustiveness[30,54].Allforcesdiscussedrelatetothegeneralexternal

environment.Table8liststhecodecategories.

Table8.CodeCategoryDefinitions

CodeCategory SubCategory DefinitionsComplexity Forcesinterconnecting Are theforcesinterconnecting?

(CONNECTEDNESS)Complexity Forcesnotconnecting Are theforcesdisconnected?

(CONNECTEDNESS)Complexity Many forces Are theforcesmany?(AMOUNT)Complexity Fewforces Are theforcesfew? (AMOUNT)Complexity Forcesarestrong Are theforcesstrong?

(STRENGTH)Complexity Forcesareweak Are theforcesweak?

(STRENGTH)Dynamism Forceschangea lot Isthereahighamountofchange?

(AMOUNT)Dynamism Forceschangeinfrequently Are forceschangingverylittle?

(AMOUNT)Dynamism Forceschangefast Ischangehappeningquickly?

(SPEED)Dynamism Forceschangeslowly Ischangehappeningslowly?

(SPEED)Munificence Resourcesarescarce Are theamountofresources

availablescarce?(AMOUNT)Munificence Resourcesarein

abundanceAre theamountofresourcesavailableabundant?(AMOUNT)

Not Applicable Not Applicable Allothersentences (N/A)

Page 44: Cyberspace and Organizational Structure: An Analysis of ...

32

CoderTraining.

Qualitativedataanalysissoftware(Maxqda)wasselectedfortheabilityto

managelargevolumesoftext,displayinformationwitheaseandforworkingwith

multiplecoders[52].ThecontentanalystfamiliarizedthecoderswithMaxqda,

operationaldefinitionsandcodecategories(seeAppendixE).Also,well‐defined

explicitcodinginstructionswerewrittenintoMaxqdatoimprovecoding

consistency[54].Onlythecontentanalysttrainedandevaluatedeachcoder[37].

Theyparticipatedinabetacodingsessiontoimprovecodingconsistencyandto

minimizeidiosyncraticjudgmentsinthecodingprocess[37].Thetrainingprocess

producedfavorablereliabilityresults.Thecoderstrainedondocumentsnot

includedinthefinalsample.Nocollaborationamongstthecoderswasallowed

duringthecodingprocess.

Threegraduatestudentswithastrongbackgroundincybercodedthe

documents.Theimportanceofcodersbeingfamiliarwiththephenomenaunder

considerationwasacriticalfactorincoderselection[37].Thereadinglevelofthe

documentsdemandedcoderswithahighereducationlevel.

DataReduction

Oncethecodersfinished,thecompletedthumbdrivesweregiventothe

contentanalysttoaggregate.Thecombineddatasetsgeneratednumerous

descriptivestatistics,charts,andtables.Thecontentanalystscrutinizedthedatafor

Page 45: Cyberspace and Organizational Structure: An Analysis of ...

33

outliers,incompleteartifacts,andotheranomalies.Alloftheartifactsweredeemed

completeandproperlycoded.ThedatawereimportedintoMicrosoftExceltolook

foranalysisofpatternsandtrendswithinandacrosstheset.Numerousgraphsand

tableswerecollapsedintoatightsetwhichbestarticulatedthefindings.

Validity

Everystepoftheresearchprocesswasconductedtoensurethequalityofthe

resultsledtoanacceptanceoftruth.TheguidelinessetforthbyKlausKrippendorff

[37]forvalidityincontentanalysiswerefollowedandreviewedperiodically

throughouttheresearchprocess.

Reliability

Toensurevalidinferencesfromthetext,wordmeaningandcategory

definitionsweretightened,multiplecoderswereusedandintercoderagreement

wascalculated.CohensKappa[14]wascalculatedasameasureofreliability.Itis

consideredastrictmeasureofagreementbetweencodersbasedontheselectionof

aparticularcodefortherecordingunit[42].

Page 46: Cyberspace and Organizational Structure: An Analysis of ...

34

IV.AnalysisandResults

DescriptiveStatistics

Table9showsthecodingunitsrangefrom1,594to2,067(mean=1,838).The

primaryreasonforthisvarianceliesinhoweachcoderinterpretedthecodingunit.

Theambiguityofthelanguageinthepublishedmaterialmightcauseonecoderto

perceivethepresenceofacodingunitwhileanotherdidnot.

Table9.TotalCodesbyCoder

Coder 1 2 3

Pages 156 156 156Documents 20 20 20Codingunits 2067 1853 1594

Table10showsthateachcoderread156pages,whichaveraged7.8pages

perartifact.Althoughthereweremoreacademicartifactsthangovernment,the

governmentartifactsaveragedmorepages(13.8).Subsequently,thedifficultyof

interpretingthesamplingunit(sentence)inrelationtothecontextunit(artifact)

increased[37].

Table10.PagesCodedbyStrata

Academic Government Private/Practitioner AggregatePagesRead 74 69 13 156PagesPerArtifact7.4 13.8 2.6 7.8

Page 47: Cyberspace and Organizational Structure: An Analysis of ...

35

Flesch‐KincaidReadingLevelandFleschReadingEasemeasureswere

calculatedforeachartifact.Table11showstheresults.TheFlesch‐Kincaidformulas

aremathematicalderivationsaccountingfortheamountofwordsinasentenceand

syllablesperwordtogenerateagradelevelguideforcomprehensionandeaseof

reading[26,35].Thetotalpagescodedwere156,withanaverage1,838recordable

unitsatagraduatereadinglevelandease(Flesch‐KincaidGrade16/Ease23).The

governmentdocumentsemergedasthemostdifficulttocomprehendbasedon

theseindicesandsufferedthehighestamountofdisagreement.

Table11.Flesch‐KincaidReadingScores

Strata ReadingLevel ReadingEaseAcademic 16 24Government 17 15Private/Practitioner 16 27TotalAverage 16 23

IntercoderAgreement

BasedonLandisandKoch[38],thecoderagreementinTable12rangesfrom

fair(21%‐40%)tosubstantial(61%‐80%)whichresultsinmoderateoverall

agreementwithKapparangingfrom51%‐60%.SeveralfactorscanaffectKappa

(e.g.,amountofcategories(13),specificityofdefinition);sincetheresearchis

exploratory,lowerlevelsofagreementareconsideredacceptable[42].Coderswere

allowedconsiderablelatitudeincontentinterpretationbasedontheirexpertiseand

training.Despitechallenges,theresultsindicateagreementbetweencoders.

Page 48: Cyberspace and Organizational Structure: An Analysis of ...

36

Table12.CohensKappa

Coders 1and2 1and3 2and3 Mean

Academic 0.66 0.71 0.71 0.69Government 0.39 0.47 0.29 0.38Private/Practitioner 0.36 0.51 0.31 0.40Kappa 0.52 0.60 0.51 0.54

CodeDistribution

Table13liststhefrequencydistributionofcodesacrossthesample(n=60).

Thecodersassignedadimensionalcodeto51.8%ofthecontent(2,856sentences).

Thecategory“notapplicable”wasremovedfromthefrequencyanalysisinTable13

toremovebias.Thefrequencyanalysisindicatesthatcomplexityhasastrong

presence(morethan91%)ineachstratum.Complexity(e.g.,forcesconnecting,

manyforces,forcesarestrong)accountsfor67.43%ofuncertaintyinthecontent

coded.Dynamism(e.g.,amountofchangeishigh,forceschangefast)accountsfor

8.12%ofuncertaintyinthecontentcoded.Munificence(e.g.,resourcesarescarce)

accountsfor5.85%ofuncertaintyinthecontentcoded.Basedoncoder

interpretation,asFigure7indicates,thereisastrongpresence(81.4%)of

uncertaintyinthegeneralexternalenvironmentpresentacrossthethreestrata

sampled.

Page 49: Cyberspace and Organizational Structure: An Analysis of ...

37

Table13.FrequencyAnalysisofCodes

Parentcode Code Frequency Percent DocumentsComplexity ForcesConnecting 872 30.53 56Complexity ManyForces 537 18.80 55Complexity ForcesareStrong 517 18.10 58Munificence ResourcesareinAbundance 225 7.88 36Munificence ResourcesareScarce 167 5.85 44Dynamism AmountofChangeisHigh 144 5.04 44Complexity ForcesNotConnecting 140 4.90 32Dynamism ForcesChangeFast 88 3.08 25Dynamism ForcesChangeSlowly 65 2.28 20Complexity ForcesareWeak 57 2.00 29Dynamism AmountofChangeisLow 34 1.19 11Complexity FewForces 10 0.35 8

Total 2,856 100.00 ‐

Figure7.UncertaintyintheGeneralExternalEnvironment

Page 50: Cyberspace and Organizational Structure: An Analysis of ...

38

StrataAnalysis

Thefollowingsectionswillprovideananalysisofthepresenceofuncertainty

inthegeneralexternalenvironment,withinandacrossstrata,displayedinFigure8.

Complexity.

Figure8illustratesthereisstrongevidencetosupportthatcomplexityis

extremelyhigh.Allthreestratashowedastrongpresenceofcomplexityinthe

generalexternalenvironment.Infact,thedataappearstobeastatisticaldead‐heat

atabout90%.

Dynamism.

Dynamismpresentsadifferentpicture.Private/practitionerdisplays

significantlyhigheruncertaintythangovernmentandacademicstrata.Thislevelof

Figure8.PercentageofUncertaintybyDimensionandStrata

Page 51: Cyberspace and Organizational Structure: An Analysis of ...

39

uncertaintyappearstobereasonablebecauseoftheincreasedcompetitionand

desireforrevenuepresentintheprivate/practitionerenvironment.This

environmentrequirestheabilitytodissolveorcreateorganizationsrapidly,modify

processes,andinnovateinresponsetomarketstimuli.

Thegovernmentstrataexhibitalowerpresenceofuncertainty.Unlike

private/practitioner,governmentfunctionsareslowtochange.Despitethis,coders

agreethereisvastlymorechange(dynamism)inthegeneralexternalenvironment

acrossallthreestrata.Infact,theamountofchangewasdetectedatfourtimesthe

frequency(seeTable13).

Munificence.

Itisclearfromtheresultsthereisexplanatorypowerandameasurable

degreeofresourcescarcity(munificence)intheenvironment.Thepresenceof

uncertaintyisloweroverallacrossallthreeenvironmentalresourcemeasures.

However,theacademicstrataexhibitsignificantlymoreperceivedresourcescarcity

inthegeneralexternalenvironment.Areasonableexplanationforthedifferenceis

thebreadthanddepthofresearchtheacademicsectordedicatestothiscomplex

area.

Page 52: Cyberspace and Organizational Structure: An Analysis of ...

40

CoderAnalysis

Figure9clearlydemonstratesthecoderswereconsistentintheircoding

acrossallthreedimensionsofuncertainty.Whilethereisslightdisagreementin

munificence(resource)andcomplexity(amount/connectednessofforces),thereis

generalagreementoverall.

RecommendationsforAction

Understandingtheoutcomespresentedinthisstudy,itwouldbelogicalto

structuregovernmentcyberorganizationsoperatinginthecriticalinfrastructure

environmentinanorganicfashionratherthanthecurrentmechanisticstructure.

Thegovernmentshouldgenerateseparateprocessesinthecreationofthese

Figure9.CoderOverlap

Page 53: Cyberspace and Organizational Structure: An Analysis of ...

41

organizationstoallowforfastimplementationandfrequentmodification.These

cyberorganizationsshouldhavethefollowingcharacteristicsiftheyaretosucceed:

Peopledonotperformhighlyspecializedtasksbuthaveabroaderview.

Achainofcommandexistsbutismoredecentralizedbecauseoftheneedforshiftingresponsibilities.

Thehighlevelofcomplexityandchangeintheenvironmentwarrantsknowledgeablepersonnelworkinginteamsandcoordinatingfrequentlytomakefastdecisionswhenneeded.

Communicationoftenoccursandatmanylevels.

Ordersanddirectivesdiminishasadviceandinformationsharingincrease.

Knowledgeandexpertiseincreaseindividualstatus.

Oneofthemostappealingaspectsoftheresearchisthepotentialfor

generalizabilitytoothercyberorganizationsoperatingwithintheUnitedStatesand

similarlydevelopedcountries.Onecouldmaketheargumentthatthecyber

environmentsoftheDepartmentofHomelandSecurity,theDepartmentofDefense,

privateutilitycompanies,andhightechnologyfirmshavesignificantsimilarities.

Itisworthmentioningthatsignificantbarriersexisttoimplementingthese

principlesintheDoDandothergovernmentagenciesrangingfromcultureto

strategicdirection.Understandingtheconnectionsbetweenorganizational

performance,structure,andtheenvironmentshouldactasanimpetusforthese

difficultchanges.

Page 54: Cyberspace and Organizational Structure: An Analysis of ...

42

V.Conclusions

ConclusionsofResearch

Fewtopicswithintheareaofnationalinterestaremoreimportantthanthe

understandingofhowtoorganizeincyberandprotectnationalcritical

infrastructureassetsfromcyberspacethreats.ParticipationattheUnitedStates

ArmyCyberTalksattheNationalDefenseUniversityinSeptemberof2015served

tostrengthentheneedforempiricalanalysisandevidencethatcouldleadto

organizationalstructuringdecisionsandadjustments.Innovationandknowledge

managementweredirectconcernsofattendees,whichrelatedirectlyto

organizationalstructure[40].Severalstructuraldimensionswererepeatedly

discussedasinhibitorstoperformancefurthervalidatingtheneedforthisresearch.

Thethreeresearchquestionsansweredinthisstudywere:

1. Whatisorganizationalstructure?

Answer:Theresearchliteraturedepictsorganizationalstructureintwodimensions:structuralandcontextual.Thecontextualdimensionssignificantlyaffectthestructuraldimensions.

2. Whattheoriescontributetoorganizationalstructure?

Answer:Institutionalisomorphism,resourcedependence,populationecology,andstructuralcontingencyaredominantorganizationaltheoriesthatcontributetotheexplanationoforganizationalstructure.Ofthesefourtheories,structuralcontingencyprovidesapragmaticexplanationofhowtostructureorganizationsbasedoncontextandcontingency.Theenvironmentemergesasaprominentpointoffocusineverydominanttheory.Thelevelofuncertaintywithregardtotheorganization'sgeneralexternalenvironmentshowsastrongconnectiontostructuraltype.

Page 55: Cyberspace and Organizational Structure: An Analysis of ...

43

3. Howshouldorganizationsstructureincyberenvironmentstodefendcriticalinfrastructure?

Answer:Theperceivedlevelofuncertainty,asmeasuredbythedegreeofcomplexity,dynamism,andmunificenceintheexternalenvironmentofcyberorganizationsrelateswelltothemechanisticandorganicstructuralcontinuum.Cyberorganizationsshouldstructureorganicallyinhighlyuncertainenvironmentsandmechanisticallyinlessuncertainenvironments.

Asitpertainstothecyber‐connectedcriticalinfrastructureenvironment,

forceswithinandacrossstrataareoverwhelminglynumerous,strongand

connecting.Theamountofchangeatpresentisveryhigh.Thespeedofchangeis

fastandresourcesaretypifiedbyanabundanceofinformationtechnologywithlow

barrierstoentrycreatingopportunityandavailabilityforadversaryandallyalike.

Theseelementscreatetheperceptionofahighlyuncertainsituationfor

organizationsoperatinginthecyber‐connectedcriticalinfrastructureenvironment.

Organicstructuringprinciplesallowfortheadaptabilityandflexibilitythis

environmentrequires.Thisresearchindicatesorganizationsshouldfolloworganic

structuringprincipleswhileoperatinginthecyber‐connectedcriticalinfrastructure

environment.

Page 56: Cyberspace and Organizational Structure: An Analysis of ...

44

RecommendationsforFutureResearch

MeasureGovernmentCyberOrganizations.

Thisresearchapproachedansweringthequestionofhowtostructure

organizationsincyberspacebyfirstanalyzingthecontextualdimensionofexternal

environmentaluncertainty.Itwillnowbeappropriateandhelpfultomeasure

empiricallystructuraldimensionsofgovernmentcyberorganizations(e.g.,DHSICS‐

CERT,USCYBERCOM),tocontributefurthertotheanswer.

ReplicatetheStudy.

ThisresearchfocusedontheU.S.only.HowevertheU.S.isnottheonly

countryinneedofstrategicdirectioninthecreationofcyberorganizationstasked

toprotectcriticalinfrastructure.Areplicativestudyforotheralliednationswho

mutuallysupportcyberalongsidetheU.S.(GreatBritain,Australia,Canada,andNew

Zealand),wouldcontributetotheoverallsecurityofeachnation.

IdentifyDominantFactorsforMunificence.

Munificence(resource)inthisresearchisbroadlydefined.Withtheinsight

gainedfromthisstudy,itisapparentthatresourceincyberwouldbenefitfrom

structuralequationmodeling(e.g.,confirmatoryfactoranalysis).Thisresearchwill

aidintheidentificationofdominantresourcefactorsinthecyber‐connectedcritical

infrastructureenvironment.

Page 57: Cyberspace and Organizational Structure: An Analysis of ...

45

AppendixA.ArtifactFinalSelection(FrontPageInformation)

Page 58: Cyberspace and Organizational Structure: An Analysis of ...

46

Page 59: Cyberspace and Organizational Structure: An Analysis of ...

47

Page 60: Cyberspace and Organizational Structure: An Analysis of ...

48

Page 61: Cyberspace and Organizational Structure: An Analysis of ...

49

Page 62: Cyberspace and Organizational Structure: An Analysis of ...

50

Page 63: Cyberspace and Organizational Structure: An Analysis of ...

51

Page 64: Cyberspace and Organizational Structure: An Analysis of ...

52

Page 65: Cyberspace and Organizational Structure: An Analysis of ...

53

Page 66: Cyberspace and Organizational Structure: An Analysis of ...

54

Page 67: Cyberspace and Organizational Structure: An Analysis of ...

55

Page 68: Cyberspace and Organizational Structure: An Analysis of ...

56

Page 69: Cyberspace and Organizational Structure: An Analysis of ...

57

Page 70: Cyberspace and Organizational Structure: An Analysis of ...

58

Page 71: Cyberspace and Organizational Structure: An Analysis of ...

59

Page 72: Cyberspace and Organizational Structure: An Analysis of ...

60

Page 73: Cyberspace and Organizational Structure: An Analysis of ...

61

Page 74: Cyberspace and Organizational Structure: An Analysis of ...

62

Page 75: Cyberspace and Organizational Structure: An Analysis of ...

63

Page 76: Cyberspace and Organizational Structure: An Analysis of ...

64

Page 77: Cyberspace and Organizational Structure: An Analysis of ...

65

AppendixB.ArtifactsMeetingSelectionCriteria

AASurveyofSCADAandCriticalInfrastructureIncidentsAATaxonomyofCyberAttacksonSCADASystemsAAWeb‐BasedRemoteLabforSCADAAAdvancedKeyforSecureSCADAACapabilitiesofDynamicReconfigurationMBICSACIDependencyAssessmentACreatingaCyberMovingTargetforCIACriticalInfrastructureDependenciesACyberCIProtectPayloadAnomalyDetectionACyberSecurityRiskAssessmentforSCADAandDCSNetworks2007ISATransactionsADecentralizedRiskManagementCIADetectingIntrusionsinSCADASystemsAEventTriggeredStratICSAFPGAsinIndustrialControlApplicationsAGSMSMSBasedMonitoringControlSystemsAImprovingSecurityforSCADAControlSystemsAIntrusionDetectioninSCADAAMethodologiesandApplicationsforCIANetworkIntrusionDetectionM0DBUSICSANetworkedControlSystemOverviewandResearchTrendsAProbabilisticRiskinCIAPublicPrivateCIARethinkingSecurityPropertiesSCADAASCADASecurityinLightofCyberWarfareASCADATestbedASecuritylssuesinSCADANetworksASecurityRetrofitforSCADAASecurityStrategiesforSCADANetworksAStateoftheArtinCIProtectionAStealthyDeceptionAttacksonWaterSCADASystemsATheCyberThreatLandscapeChallengesandFutureResearchDirectionsComputersSecurityATheSCADAChallengeSecuringCriticalInfrastructure2009NetworkSecurityAWindTurbinesSCADAAWinnHoneypotsPAmericasCIisvulnerabletoCyberForbesPAutomationWorldscada‐attacks‐double‐2014PCrashingtheSystemCITheEconomist

Page 78: Cyberspace and Organizational Structure: An Analysis of ...

66

PCriticalInfrastructureSecurityVulnerabilityTripwirePCSISInsuringICSSecurityPCyberattacksEscalateCIHomelandSecTodayPDHSPhishingCITheHillPIntheCrossfirePMcAfeeIntheDarkPrivateCIViewPMcAfeeonCIGeneralPProtectingtheNationsCIfromCyberPSANSICSCIResponsePStudyHalfofCIprosAttackSCMagazinePSurveyRevealsCIIssuesPTrendMicro‐ReportonCybersecurityandCriticalInfrastructureintheAmericasPVerizonDataBreachPVerizonEnergyCIGArmyResearchLabICSSecurityGCIAssessmentSmartGridSecurityGCyberThreatsfromCRIProtectingCIGDHSIGSecureICSGDHSStrategyforSecuringControlSystemsGDHSYearEndAssessmentGExecutiveOrderImprovingCICybersecurityGGAOCIProtectObservationsGGAOMaritimeCIProtectionGGAO‐15‐290,High‐RiskSeriesCIGICSSummaryReportGIdentifying,Understanding,andAnalyzingCIInterdependGNISTcybersecurityframeworkGNISTGuidetoICSSecurity2008GNISTGuidetoIndustrialControlSystemsSecurity2011GPPDCISecurityGPresidentialCyberspacePolicyReview

Page 79: Cyberspace and Organizational Structure: An Analysis of ...

67

AppendixC.RecordingUnitClassificationDiagram

Page 80: Cyberspace and Organizational Structure: An Analysis of ...

68

AppendixD.CodedArtifactExample

Page 81: Cyberspace and Organizational Structure: An Analysis of ...

69

Page 82: Cyberspace and Organizational Structure: An Analysis of ...

70

Page 83: Cyberspace and Organizational Structure: An Analysis of ...

71

AppendixE.CoderTrainingBriefing

Page 84: Cyberspace and Organizational Structure: An Analysis of ...

72

Page 85: Cyberspace and Organizational Structure: An Analysis of ...

73

Page 86: Cyberspace and Organizational Structure: An Analysis of ...

74

Page 87: Cyberspace and Organizational Structure: An Analysis of ...

75

Page 88: Cyberspace and Organizational Structure: An Analysis of ...

76

Page 89: Cyberspace and Organizational Structure: An Analysis of ...

77

Page 90: Cyberspace and Organizational Structure: An Analysis of ...

78

Page 91: Cyberspace and Organizational Structure: An Analysis of ...

79

Page 92: Cyberspace and Organizational Structure: An Analysis of ...

80

Page 93: Cyberspace and Organizational Structure: An Analysis of ...

81

Page 94: Cyberspace and Organizational Structure: An Analysis of ...

82

Page 95: Cyberspace and Organizational Structure: An Analysis of ...

83

Page 96: Cyberspace and Organizational Structure: An Analysis of ...

84

Page 97: Cyberspace and Organizational Structure: An Analysis of ...

85

Page 98: Cyberspace and Organizational Structure: An Analysis of ...

86

Page 99: Cyberspace and Organizational Structure: An Analysis of ...

87

Bibliography

1. H.Aldrich,OrganizationsandEnvironments,StanfordUniversityPress,StanfordCA,2008.

2. H.AldrichandD.Herker,Boundaryspanningrolesandorganizationstructure,AcademyofManagementReview,vol.2(2),pp.217‐230,1977.

3. H.AldrichandJ.Pfeffer,Environmentsoforganizations,AnnualReviewofSociology,vol.2,pp.79‐105,1976.

4. T.Barnett,BlueprintforAction:AFutureWorthCreating,BerkleyPublishingGroup,NewYorkNY,2005.

5. C.Bennett,U.S.notpreparedforcyberattacks,ex‐NSAchiefwarns,TheHill,November14,2014.

6. B.Berelson,ContentAnalysisinCommunicationResearch,FreePress,GlencoeIL,1952.

7. A.Bluedorn,Pilgrim’sprogress:Trendsandconvergenceinresearchonorganizationalsizeandenvironments,JournalofManagement,vol.19(2),pp.163‐191,1993.

8. S.Boyer,SCADA:SupervisoryControlandDataAcquisition(4thEdition),TheInstrumentation,Systems,andAutomationSociety,DurhamNC,2010.

9. O.BrafmanandR.Beckstrom,TheStarfishandtheSpider:TheUnstoppablePowerofLeaderlessOrganizations,Penguin,NewYorkNY,2006.

10. E.BumillerandT.Shanker,PanettawarnsofdirethreatofcyberattackonU.S.,NewYorkTimes,October11,2012.

11. T.Burns,andG.Stalker,TheManagementofInnovation,OxfordUniversityPress,NewYorkNY,1961.

12. J.Child,Organizationalstructure,environmentandperformance:Theroleofstrategicchoice,Sociology,vol.1(6),pp.1‐22,1972.

13. R.ClarkeandR.Knake,CyberWar,Harpercollins,NewYorkNY,2014.

Page 100: Cyberspace and Organizational Structure: An Analysis of ...

88

14. J.Cohen,Acoefficientofagreementfornominalscales,EducationalandPsychologicalMeasurement,vol.20(1),pp.37‐46,1960.

15. S.CollyerandC.Warren,Projectmanagementapproachesfordynamicenvironments,InternationalJournalofProjectManagement,vol.27(4),pp.355‐364,2009.

16. J.Colquitt,J.LepineandM.Wesson,OrganizationalBehavior:ImprovingPerformanceandCommitmentintheWorkplace,McGraw‐Hill,NewYorkNY,2011.

17. R.Daft,J.SormunenandD.Parks,Chiefexecutivescanning,environmentalcharacteristics,andcompanyperformance:Anempiricalstudy,StrategicManagementJournal,vol.9(2),pp.123‐139,1988.

18. G.DessandD.Beard,Dimensionsoforganizationaltaskenvironments,AdministrativeScienceQuarterly,vol.29(1),pp.52‐73,1984.

19. T.DewettandG.Jones,Theroleofinformationtechnologyintheorganization:Areview,model,andassessment,JournalofManagement,vol.27(3),pp.313‐346,2001.

20. P.DiMaggioandW.Powell,Theironcagerevisited:Institutionalisomorphismandcollectiverationalityinorganizationalfields,AmericanSociologicalReview,vol.48(2),pp.143‐166,1983.

21. L.Donaldson,Strategyandstructuraladjustmenttoregainfitandperformance:Indefenceofcontingencytheory,JournalofManagementStudies,vol.24(1),pp.1‐24,1987.

22. L.Donaldson,Thecontingencytheoryoforganizationaldesign:Challengesandopportunities,inOrganizationDesign,R.Burton,B.Eriksen,D.HkonssonandC.Snow(Eds.),Springer,NewYorkNY,pp.19‐40,2006.

23. L.Donaldson,Thenormalscienceofstructuralcontingencytheory,inStudyingOrganizations:TheoryandMethod,S.CleggandC.Hardy(Eds.),Sage,ThousandOaks,California,pp.51‐70,1999.

24. R.Duncan,Characteristicsoforganizationalenvironmentsandperceivedenvironmentaluncertainty,AdministrativeScienceQuarterly,vol.17(3),pp.313‐327,1972.

Page 101: Cyberspace and Organizational Structure: An Analysis of ...

89

25. P.Fiss,Buildingbettercausaltheories:Afuzzysetapproachtotypologiesinorganizationresearch,AcademyofManagementJournal,vol.54(2),pp.393‐420,2011.

26. R.Flesch,HowtoWritePlainEnglish:ABookforLawyersandConsumers,HarperandRow,NewYorkNY,1979.

27. M.Gladwell,Blink:ThePowerofThinkingWithoutThinking,BackBayBooks,NewYorkNY,2007.

28. R.GoodingandJ.WagnerIII,Ameta‐analyticreviewoftherelationshipbetweensizeandperformance:Theproductivityandefficiencyoforganizationsandtheirsubunits,AdministrativeScienceQuarterly,vol.30(4),pp.462‐481,1985.

29. L.GordonandV.Narayanan,Managementaccountingsystems,perceivedenvironmentaluncertaintyandorganizationstructure:Anempiricalinvestigation,Accounting,OrganizationsandSociety,vol.9(1),pp.33‐47,1984.

30. GovernmentAccountabilityOffice,ContentAnalysis:AMethodologyforStructuringandAnalyzingWrittenMaterial,WashingtonDC,1996.

31. R.Harris,Organizationaltaskenvironments:Anevaluationofconvergentanddiscriminantvalidity,JournalofManagementStudies,vol.41(5),pp.857‐882,2004.

32. A.Ilinitch,R.DAveniandA.Lewin,Neworganizationalformsandstrategiesformanaginginhypercompetitiveenvironments,OrganizationScience,vol.7(3),pp.211‐220,1996.

33. D.Jacobs,Dependencyandvulnerability:Anexchangeapproachtothecontroloforganizations,AdministrativeScienceQuarterly,vol.19(1),pp.45‐59,1974.

34. P.Khandwalla,Environmentanditsimpactontheorganization,InternationalStudiesofManagementandOrganization,vol.2(3),pp.297‐313,1972.

35. J.Kincaid,R.Fishburne,R.RogersandB.Chissom,DerivationofNewReadabilityFormulas(AutomatedReadabilityIndex,FogCountandFleschReadingEaseFormula)forNavyEnlistedPersonnel,NavalTechnicalTrainingCommandMillingtonTNResearchBranch,MillingtonTN,1975.

Page 102: Cyberspace and Organizational Structure: An Analysis of ...

90

36. T.Koppel,LightsOut:ACyberattack,ANationUnprepared,SurvivingtheAftermath,CrownPublishers,NewYorkNY,2015.

37. K.Krippendorff,ContentAnalysis:AnIntroductiontoitsMethodology,SagePublications,ThousandOaks,California,2013.

38. J.LandisandG.Koch,Themeasurementofobserveragreementforcategoricaldata,Biometrics,vol.33(1),pp.159‐174,1977.

39. P.Lawrence,andJ.Lorsch,Differentiationandintegrationincomplexorganizations,AdministrativeScienceQuarterly,vol.12(1),pp.1‐47,1967.

40. C.Liao,S.ChuangandP.To,Howknowledgemanagementmediatestherelationshipbetweenenvironmentandorganizationalstructure,JournalofBusinessResearch,vol.64(7),pp.728‐736,2011.

41. Z.Liu,D.Yang,D.Wen,W.ZhangandW.Mao,Cyber‐physical‐socialsystemsforcommandandcontrol,IEEEIntelligentSystems,vol.26(4),pp.92‐96,2011.

42. M.Lombard,J.Snyder‐duchandC.Bracken,Contentanalysisinmasscommunication,HumanCommunicationResearch,vol.28(4),pp.587‐604,2002.

43. C.OkoliandS.Pawlowski,TheDelphimethodasaresearchtool:Anexample,designconsiderationsandapplications,InformationandManagement,vol.42(1),pp.15‐29,2004.

44. P.Olson,WeAreAnonymous:InsidetheHackerWorldofLulzSec,Anonymous,andtheGlobalCyberInsurgency,BackBayBooks,NewYorkNY,2012.

45. W.Orlikowski,Thedualityoftechnology:Rethinkingtheconceptoftechnologyinorganizations,OrganizationScience,vol.3(3),pp.398‐427,1992.

46. M.Patten,UnderstandingResearchMethods:AnOverviewoftheEssentials(7thEdition),PyrczakPublishing,GlendaleCA,2009.

47. J.Pfeffer,OrganizationsandOrganizationTheory,Pitman,BostonMA,1982.

48. J.PfefferandH.Leblebici,Theeffectofcompetitiononsomedimensionsoforganizationalstructure,SocialForces,vol.52(2),pp.268‐279,1973.

Page 103: Cyberspace and Organizational Structure: An Analysis of ...

91

49. J.PfefferandG.Salancik,TheExternalControlofOrganizations:AResourceDependenceApproach,HarperandRow,NewYorkNY,1978.

50. D.Pugh,Themeasurementoforganizationstructures:Doescontextdetermineform?,OrganizationalDynamics,vol.1(4),pp.19‐34,1973.

51. J.Qiu,L.DonaldsonandB.Luo,Thebenefitsofpersistingwithparadigmsinorganizationalresearch,TheAcademyofManagementPerspectives,vol.26(1),pp.93‐104,2012.

52. M.Savin‐BadenandC.Major,QualitativeResearch:TheEssentialGuidetoTheoryandPractice,Routledge,Abingdon,UnitedKingdom,2012.

53. G.Seffers,Cybercommanderexpectsdamagingcriticalinfrastructureattack,Signal,December1,2014.

54. S.Stemler,Anoverviewofcontentanalysis,PracticalAssessment,ResearchandEvaluation,vol.7(17),2001.

55. M.TushmanandR.Nelson,Introduction:Technology,organization,andinnovation,AdministrativeScienceQuarterly,vol.35(1911),pp.18,1990.

56. U.S.Army,ForceDevelopmentandDocumentation,DepartmentoftheArmy,AR71‐32,GovernmentPrintingOffice,WashingtonDC,2013.

57. A.VandeVenandD.Ferry,MeasuringandAssessingOrganizations,JohnWileyandSons,NewYorkNY,1980.

58. R.Weber,BasicContentAnalysis(SecondEdition),SagePublications,ThousandOaksCA,1990.

59. S.Worrall,IstheUnitedStatesPreparedforaMassiveCyberattack?,NationalGeographic,WashingtonDC(news.nationalgeographic.com/2015/11/151108‐cybercrime‐cyberattack‐ted‐koppel‐computers‐hacking‐internet‐ngbooktalk),2015.

60. R.Yin,CaseStudyResearchDesignandMethods,SagePublications,ThousandOaks,California,2014.

Page 104: Cyberspace and Organizational Structure: An Analysis of ...

REPORTDOCUMENTATIONPAGEFormApprovedOMBNo.074‐0188

Thepublicreportingburdenforthiscollectionofinformationisestimatedtoaverage1hourperresponse,includingthetimeforreviewinginstructions,searchingexistingdatasources,gatheringandmaintainingthedataneeded,andcompletingandreviewingthecollectionofinformation.Sendcommentsregardingthisburdenestimateoranyotheraspectofthecollectionofinformation,includingsuggestionsforreducingthisburdentoDepartmentofDefense,WashingtonHeadquartersServices,DirectorateforInformationOperationsandReports(0704‐0188),1215JeffersonDavisHighway,Suite1204,Arlington,VA22202‐4302.Respondentsshouldbeawarethatnotwithstandinganyotherprovisionoflaw,nopersonshallbesubjecttoanypenaltyforfailingtocomplywithacollectionofinformationifitdoesnotdisplayacurrentlyvalidOMBcontrolnumber.PLEASEDONOTRETURNYOURFORMTOTHEABOVEADDRESS.1.REPORTDATE(DD‐MM‐YYYY)

24‐03‐20162.REPORTTYPE

Master’sThesis3.DATESCOVERED(From–To)

Aug2014‐Mar20164.TITLEANDSUBTITLE

CyberspaceandOrganizationalStructure:AnAnalysisoftheCriticalInfrastructureEnvironment

5a.CONTRACTNUMBER

5b.GRANTNUMBER

5c.PROGRAMELEMENTNUMBER

6.AUTHOR(S)

QuiggII,MichaelD.,Captain,USA

5d.PROJECTNUMBER

JON:15G2645e.TASKNUMBER

5f.WORKUNITNUMBER

7.PERFORMINGORGANIZATIONNAMES(S)ANDADDRESS(S)

AirForceInstituteofTechnologyGraduateSchoolofEngineeringandManagement(AFIT/EN)2950HobsonWay,Building640WPAFBOH45433‐8865

8.PERFORMINGORGANIZATIONREPORTNUMBER

AFIT‐ENV‐MS‐16‐M‐177

9.SPONSORING/MONITORINGAGENCYNAME(S)ANDADDRESS(ES)

DepartmentofHomelandSecurityICS‐CERTPOC:NeilHershfield,DHSICS‐CERTTechnicalLeadATTN:NPPD/CSC/NCSD/US‐CERTMailstop:0635,245MurrayLane,SW,Bldg410,Washington,DC20528Email:ics‐[email protected]:1‐877‐776‐7585

10.SPONSOR/MONITOR’SACRONYM(S)

DHS11.SPONSOR/MONITOR’SREPORTNUMBER(S)

12.DISTRIBUTION/AVAILABILITYSTATEMENT

DISTRIBUTIONSTATEMENTA.APPROVEDFORPUBLICRELEASE;DISTRIBUTIONUNLIMITED.

13.SUPPLEMENTARYNOTES

ThismaterialisdeclaredaworkoftheU.S.GovernmentandisnotsubjecttocopyrightprotectionintheUnitedStates.

14.ABSTRACT

Nowmorethanever,organizationsarebeingcreatedtoprotectthecyberspaceenvironment.Thecapabilityofcyberorganizationstaskedtodefendcriticalinfrastructurehasbeencalledintoquestionbynumerouscybersecurityexperts.Organizationaltheorystatesthatorganizationsshouldbeconstructedtofittheiroperatingenvironmentproperly.Littleresearchinthisarealinks existingorganizationaltheorytocyberorganizationalstructure.Becauseofthecyberspaceconnectiontocriticalinfrastructureassets,thefactorsthatinfluencethestructureofcyberorganizationsdesignedtoprotecttheseassetswarrantanalysistoidentifyopportunitiesforimprovement.Thisthesisanalyzesthecyber‐connectedcriticalinfrastructureenvironmentusingthedominantorganizationalstructuretheories.Byusingmultiplecasestudyandcontentanalysis,2,856samplingunitsrelatingtoenvironmentaluncertainty(complexity,dynamism,andmunificence) areanalyzedtoshowthegeneralexternalenvironmentofcyberorganizationstaskedtoprotectcriticalinfrastructureishighlyuncertaintherebymeritingimplementationoforganicstructuringprinciples.15.SUBJECTTERMS

Cyberorganizations,organizationalstructure,criticalinfrastructureprotection,contentanalysis,multiplecasestudy

16.SECURITYCLASSIFICATIONOF: 17.LIMITATIONOFABSTRACT

UU

18.NUMBEROFPAGES

103

19a.NAMEOFRESPONSIBLEPERSON

Rice,Mason,ENG,LTC,Ph.D,USAa.REPORT

U

b.ABSTRACT

U

c.THISPAGE

U19b.TELEPHONENUMBER(Includeareacode)(937)255‐3636x4620([email protected])

StandardForm298(Rev.8‐98)PrescribedbyANSIStd.Z39‐18