From Disaster Response Planning to e-Resilience: A Literature Review
暂无分享,去创建一个
[1] Liang Tang,et al. Data Mining Meets the Needs of Disaster Information Management , 2013, IEEE Transactions on Human-Machine Systems.
[2] Shigeki Yamada,et al. Requirements for Resilient Information and Communication Technology , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.
[3] Y. K. Malaiya,et al. Evaluating disaster recovery plans using the cloud , 2013, 2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS).
[4] Yashwant K. Malaiya,et al. Assessing Disaster Recovery Alternatives: On-Site, Colocation or Cloud , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.
[5] Tom Costello. Business Continuity: Beyond Disaster Recovery , 2012, IT Prof..
[6] Organisational Resilience in the South African services sector , 2012, 2012 Proceedings of PICMET '12: Technology Management for Emerging Technologies.
[7] Rémi Bastide,et al. A model driven engineering approach for business continuity management in e-Health systems , 2012, 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST).
[8] A. Madni,et al. Towards a conceptual framework for resilience engineering , 2011, IEEE Engineering Management Review.
[9] Govindan Marthandan,et al. Factors influencing the success of the disaster recovery planning process: A conceptual paper , 2011, 2011 International Conference on Research and Innovation in Information Systems.
[10] Dirk Draheim,et al. Towards Exploiting Social Software for Business Continuity Management , 2011, 2011 22nd International Workshop on Database and Expert Systems Applications.
[11] Gerard Garlick. Improving Resilience with Community Cloud Computing , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[12] Manik Dey. Business Continuity Planning (BCP) methodology — Essential for every business , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).
[13] Gerald Quirchmayr,et al. A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation , 2011, IEEE Transactions on Services Computing.
[14] Dwen-Ren Tsai,et al. Constructing a risk dependency-based availability model , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[15] Wasif Gilani,et al. A Model-Driven Framework for Process-Centric Business Continuity Management , 2010, 2010 Seventh International Conference on the Quality of Information and Communications Technology.
[16] Brahim Herbane,et al. Business Continuity Management: A Crisis Management Approach , 2010 .
[17] Gang Chen. BCM Mechanism Based on Infinite-horizon Growth Model in E-commerce , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[18] Simon Liu,et al. From Ancient Fortress to Modern Cyberdefense , 2009, IT Professional.
[19] Todd W. Kolb. The Ingredients of Successful IT Management and Governance , 2008, IT Professional.
[20] Wei-Ning Chen,et al. RiskPatrol: A risk management system considering the integration risk management with business continuity processes , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[21] Katherine O'Callaghan,et al. Restoring Service after an Unplanned IT Outage , 2008, IT Professional.
[22] Robert McDonald. New considerations for security compliance, reliability and business continuity , 2008, 2008 IEEE Rural Electric Power Conference.
[23] Yuk-Hee Chan,et al. Adoption of business continuity planning processes in IT service management , 2008, 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management.
[24] Zhaoyu Zhang,et al. The Research on Business Continuity Planning of E-government Based on Information Security Risk Management , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[25] Gerald Quirchmayr,et al. Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[26] Timothy J. Cousins. Devising Post-Disaster Continuity Plans that Meet Actual Recovery Needs , 2007, IEEE Technology and Society Magazine.
[27] M.A. Thornton,et al. Techniques for Disaster Tolerant Information Technology Systems , 2007, 2007 1st Annual IEEE Systems Conference.
[28] E. Zambon,et al. A Model Supporting Business Continuity Auditing and Planning in Information Systems , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[29] W. Roberts. Business Continuity Planning for Disasters is Just Good Planning , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[30] G.F. Hayhoe. Managing in a Post-9/11, Post-Katrina World: An Introduction to Disaster-recovery Planning for Technical Communicators , 2006, 2006 IEEE International Professional Communication Conference.
[31] Klara Nelson,et al. Examining Factors Associated with IT Disaster Preparedness , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[32] Y. Sheffi. Preparing for the big one [supply chain management] , 2005 .
[33] Kun Wang,et al. A Disaster Recovery System Model in an E-government System , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).
[34] Feng Yuan,et al. A Mathematical Approach to Disaster Recovery Planning , 2005, 2005 First International Conference on Semantics, Knowledge and Grid.
[35] Benjamin B. M. Shao. Optimal redundancy allocation for information technology disaster recovery in the network economy , 2005, IEEE Transactions on Dependable and Secure Computing.
[36] P. Fallara. Disaster recovery planning , 2004 .
[37] Michael R. Grimaila. Maximizing business information security's educational value , 2004, IEEE Security & Privacy Magazine.
[38] Stuart Kent,et al. Model Driven , 2002 .
[39] Ernest Jordan. Project Prioritization and Selection: The Disaster Scenario , 1999, HICSS.
[40] Joseph Sarkis,et al. Disaster recovery planning in an automated manufacturing environment , 1998 .
[41] C. Hart. Doing a literature review: releasing the social science research imagination. , 1998 .