From Disaster Response Planning to e-Resilience: A Literature Review

Natural and man-made crises as well as IT-security issues foster the interest in robust and resilient business information systems. Informa tion and Communication Technologies (ICT) are essential for successful e-b usiness. If ICT technologies interrupt, the whole (e-) business continuity is th reatened. ICT interruptions causing serious loss in organization’s reputation, trust an d revenues. This circumstance should increase manager’s interest in the concepts of disa ster recovery planning (DRP), business continuity management (BCM) and, the emerg ing imperative, resilience. This paper at hand presents the results of a database dr iven literature review on these concepts and its interrelation.

[1]  Liang Tang,et al.  Data Mining Meets the Needs of Disaster Information Management , 2013, IEEE Transactions on Human-Machine Systems.

[2]  Shigeki Yamada,et al.  Requirements for Resilient Information and Communication Technology , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.

[3]  Y. K. Malaiya,et al.  Evaluating disaster recovery plans using the cloud , 2013, 2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS).

[4]  Yashwant K. Malaiya,et al.  Assessing Disaster Recovery Alternatives: On-Site, Colocation or Cloud , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.

[5]  Tom Costello Business Continuity: Beyond Disaster Recovery , 2012, IT Prof..

[6]  Organisational Resilience in the South African services sector , 2012, 2012 Proceedings of PICMET '12: Technology Management for Emerging Technologies.

[7]  Rémi Bastide,et al.  A model driven engineering approach for business continuity management in e-Health systems , 2012, 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST).

[8]  A. Madni,et al.  Towards a conceptual framework for resilience engineering , 2011, IEEE Engineering Management Review.

[9]  Govindan Marthandan,et al.  Factors influencing the success of the disaster recovery planning process: A conceptual paper , 2011, 2011 International Conference on Research and Innovation in Information Systems.

[10]  Dirk Draheim,et al.  Towards Exploiting Social Software for Business Continuity Management , 2011, 2011 22nd International Workshop on Database and Expert Systems Applications.

[11]  Gerard Garlick Improving Resilience with Community Cloud Computing , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[12]  Manik Dey Business Continuity Planning (BCP) methodology — Essential for every business , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).

[13]  Gerald Quirchmayr,et al.  A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation , 2011, IEEE Transactions on Services Computing.

[14]  Dwen-Ren Tsai,et al.  Constructing a risk dependency-based availability model , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[15]  Wasif Gilani,et al.  A Model-Driven Framework for Process-Centric Business Continuity Management , 2010, 2010 Seventh International Conference on the Quality of Information and Communications Technology.

[16]  Brahim Herbane,et al.  Business Continuity Management: A Crisis Management Approach , 2010 .

[17]  Gang Chen BCM Mechanism Based on Infinite-horizon Growth Model in E-commerce , 2009, 2009 Second International Symposium on Electronic Commerce and Security.

[18]  Simon Liu,et al.  From Ancient Fortress to Modern Cyberdefense , 2009, IT Professional.

[19]  Todd W. Kolb The Ingredients of Successful IT Management and Governance , 2008, IT Professional.

[20]  Wei-Ning Chen,et al.  RiskPatrol: A risk management system considering the integration risk management with business continuity processes , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[21]  Katherine O'Callaghan,et al.  Restoring Service after an Unplanned IT Outage , 2008, IT Professional.

[22]  Robert McDonald New considerations for security compliance, reliability and business continuity , 2008, 2008 IEEE Rural Electric Power Conference.

[23]  Yuk-Hee Chan,et al.  Adoption of business continuity planning processes in IT service management , 2008, 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management.

[24]  Zhaoyu Zhang,et al.  The Research on Business Continuity Planning of E-government Based on Information Security Risk Management , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[25]  Gerald Quirchmayr,et al.  Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[26]  Timothy J. Cousins Devising Post-Disaster Continuity Plans that Meet Actual Recovery Needs , 2007, IEEE Technology and Society Magazine.

[27]  M.A. Thornton,et al.  Techniques for Disaster Tolerant Information Technology Systems , 2007, 2007 1st Annual IEEE Systems Conference.

[28]  E. Zambon,et al.  A Model Supporting Business Continuity Auditing and Planning in Information Systems , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[29]  W. Roberts Business Continuity Planning for Disasters is Just Good Planning , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[30]  G.F. Hayhoe Managing in a Post-9/11, Post-Katrina World: An Introduction to Disaster-recovery Planning for Technical Communicators , 2006, 2006 IEEE International Professional Communication Conference.

[31]  Klara Nelson,et al.  Examining Factors Associated with IT Disaster Preparedness , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[32]  Y. Sheffi Preparing for the big one [supply chain management] , 2005 .

[33]  Kun Wang,et al.  A Disaster Recovery System Model in an E-government System , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[34]  Feng Yuan,et al.  A Mathematical Approach to Disaster Recovery Planning , 2005, 2005 First International Conference on Semantics, Knowledge and Grid.

[35]  Benjamin B. M. Shao Optimal redundancy allocation for information technology disaster recovery in the network economy , 2005, IEEE Transactions on Dependable and Secure Computing.

[36]  P. Fallara Disaster recovery planning , 2004 .

[37]  Michael R. Grimaila Maximizing business information security's educational value , 2004, IEEE Security & Privacy Magazine.

[38]  Stuart Kent,et al.  Model Driven , 2002 .

[39]  Ernest Jordan Project Prioritization and Selection: The Disaster Scenario , 1999, HICSS.

[40]  Joseph Sarkis,et al.  Disaster recovery planning in an automated manufacturing environment , 1998 .

[41]  C. Hart Doing a literature review: releasing the social science research imagination. , 1998 .