From: An analytics approach to adaptive maturity models using organizational characteristics
Groups | P value | Critical P | Confidence interval | |
---|---|---|---|---|
Lower | Upper | |||
Risk management | ||||
   0–9, 10–49 | 0.045 | 0.05 | −7.314 | −1.708 |
   0–9, 50–250 | 0 | 0.025 | −12.065 | −4.812 |
   10–49, 50–250 | 0.01 | 0.0167 | −6.132 | −2.052 |
Policy development | ||||
   0–9, 10–49 | 0.019 | 0.025 | 1.388 | 11.76 |
   0–9, 50–250 | 0.098 | 0.05 | −1.012 | 8.12 |
   10–49, 50–250 | 0.046 | 0.017 | −5.345 | −1.379 |
Organizing information security | ||||
   0–9, 10–49 | 0 | 0.05 | −5.523 | −2.877 |
   0–9, 50–250 | 0 | 0.025 | −17.1108 | −11.791 |
   10–49, 50–250 | 0 | 0.017 | −13.108 | −7.529 |
Compliance | ||||
   0–9, 10–49 | 0 | 0.05 | −7.212 | −3.102 |
   0–9, 50–250 | 0 | 0.025 | −18.234 | −10.735 |
   10–49, 50–250 | 0 | 0.017 | −13.545 | −5.397 |
Business continuity management | ||||
   0–9, 10–49 | 0.322 | 0.05 | −3.486 | 0.492 |
   0–9, 50–250 | 0 | 0.025 | −11.982 | −5.037 |
   10–49, 50–250 | 0 | 0.017 | −9.517 | −4.514 |
Information security architecture | ||||
   0–9, 10–49 | 0.228 | 0.05 | −5.046 | −1.659 |
   0–9, 50–250 | 0 | 0.025 | −14.892 | −8.129 |
   10–49, 50–250 | 0 | 0.017 | −11.443 | −5.151 |