Disaster Planning and Management

Recent events such as hurricanes, tsunamis, earthquakes, power outages, and the threat of pandemics have highlighted our vulnerability to natural disasters. This vulnerability is exacerbated by many organizations’ increasing dependence on computer, telecommunications, and other technologies, and trends toward integrating suppliers and business partners into everyday business operations. In response many organizations are implementing disaster recovery planning processes. In this paper we discuss how to identify threats and scenarios; how to articulate the disaster recovery strategies; and four elements of the generic disaster recovery plan: Mitigation, preparedness, response, and recovery. We then provide examples of software that can help disaster recovery professionals in the planning and implementation process. Finally we present some trends that will reinforce the criticality of the issue.

[1]  Denise Johnson McManus,et al.  Recovery of Financial Services Firms in the World Trade Center, Post 9/11/01 , 2004, Inf. Secur. J. A Glob. Perspect..

[2]  Fausto Guzzetti,et al.  Use of GIS Technology in the Prediction and Monitoring of Landslide Hazard , 1999 .

[3]  V. Tsihrintzis,et al.  Use of Geographic Information Systems (GIS) in water resources: A review , 1996 .

[4]  Joseph Sarkis,et al.  Disaster recovery planning in an automated manufacturing environment , 1998 .

[5]  An Empirical Assessment of IT Disaster Probabilities , 2001 .

[6]  Michael Wallace,et al.  The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets , 2004 .

[7]  Holmes E. Miller,et al.  Operations Risk Management at a Major Bank , 1992 .

[8]  D. I. Heywood,et al.  An Introduction to Geographical Information Systems , 2002 .

[9]  Nancy R. Mead,et al.  Survivability: Protecting Your Critical Systems , 1999, IEEE Internet Comput..

[10]  H. Kunreuther Mitigating disaster losses through insurance , 1996 .

[11]  Kurt J. Engemann,et al.  A Methodology for Managing Information-Based Risk , 1996 .

[12]  RICHAFID BASKERVILLE,et al.  Information systems security design methods: implications for information systems development , 1993, CSUR.

[13]  Priscilla M. Regan,et al.  Emergency Response Systems and the Creeping Legibility of People and Places , 2004, Inf. Soc..

[14]  Steven A. Melnyk Effective Practices in Business Continuity Planning for Purchasing and Supply Management , 2003 .

[15]  Colin Maslen "Testing the plan is more important than the plan itself" , 1996, Inf. Manag. Comput. Secur..

[16]  Richard C. Larson,et al.  Urban Police Patrol Analysis , 1972 .

[17]  H. Kunreuther,et al.  Managing Catastrophic Risk: Lessons from Canada , 2001 .

[18]  Richard Larson,et al.  O.R. Models for Homeland Security , 2004 .

[19]  RICHARD C. LARSON,et al.  A hypercube queuing model for facility location and redistricting in urban emergency services , 1974, Comput. Oper. Res..

[20]  Murray Turoff,et al.  Past and future emergency response information systems , 2002, CACM.

[21]  David L. Craft,et al.  Emergency response to a smallpox attack: The case for mass vaccination , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[22]  Michael E. Whitman Enemy at the gate: threats to information security , 2003, CACM.

[23]  Susan L. Cutter,et al.  GI Science, Disasters, and Emergency Management , 2003, Trans. GIS.

[24]  Andrew Hiles,et al.  Business Continuity: Best Practices , 2002 .

[25]  Craig Voelkert Achieving a balanced fire protection plan. , 2006, Occupational health & safety.