Skip to main content

Using Analytical Methods in Business Continuity Planning

  • Conference paper
Modeling and Simulation in Engineering, Economics and Management (MS 2012)

Abstract

Business continuity focuses on ensuring an organization can continue to provide services when faced with various crisis events. Part of the business continuity planning process involves: Business Impact Analysis; Risk Assessment; and Strategy Development. In practice, these activities often rely on ad hoc methods for collecting and analyzing data necessary for developing the business continuity plan. In this paper we discuss how various analytical methods that have been successfully used for addressing other problems, may be applied to the three phases of business continuity planning mentioned above.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Helft, M., Bunkley, N.: Disaster in Japan Batters Suppliers, New York Times (March 14, 2011)

    Google Scholar 

  2. Engemann, K.J., Henderson, D.M.: Business Continuity and Risk Management: Essentials of Organizational Resilience. Rothstein Associates, Brookfield (2012)

    Google Scholar 

  3. Sikdar, P.: Alternate Approaches to Business Impact Analysis. Information Security Journal: A Global Perspective 20(3), 128–134 (2011)

    Article  Google Scholar 

  4. Keeney, R.A.: Value Focused Thinking. Harvard University Press, Cambridge (1992)

    Google Scholar 

  5. Mula, J., Peidro, D., Díaz-Madroñero, M., Vicens, E.: Mathematical Programming Models for Supply Chain Production and Transport Planning. European Journal of Operational Research 204(3), 377–390 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  6. Karvetski, C.W., Lambert, J.H., Linkov, I.: Scenario and Multiple Criteria Decision Analysis for Energy and Environmental Security of Military and Industrial Installations. Integrated Environmental Assessment and Management (7), 228–236 (2011)

    Article  Google Scholar 

  7. Zio, E., Sansavini, G.: Modeling Interdependent Network Systems for Identifying Cascade-Safe Operating Margins. IEEE Transactions on Reliability 60(1), 94–101 (2011)

    Article  Google Scholar 

  8. Setola, R., Bologna, S., Casalicchio, E., Masucci, V.: An Integrated Approach For Simulating Interdependencies. In: Papa, M., Shenoi, S. (eds.) Critical Infrastructure Protection II. IFIP, vol. 290, pp. 229–239. Springer, Boston (2009)

    Chapter  Google Scholar 

  9. Kerzner, H.: Project Management: A Systems Approach to Planning, Scheduling, and Controlling. John Wiley and Sons, New York (2008)

    Google Scholar 

  10. Miller, H.E., Engemann, K.J.: A Monte Carlo Simulation Model of Supply Chain Risk Due To Natural Disasters. International Journal of Technology, Policy and Management 8(4), 460–480 (2008)

    Article  Google Scholar 

  11. Brysona, K., Millar, H., Josephc, A., Mambourin, A.: Using Formal MS/OR Modeling To Support Disaster Recovery Planning. European Journal of Operational Research 141(3), 679–688 (2002)

    Article  Google Scholar 

  12. Altay, N., Green, W.G.: OR/MS Research in Disaster Operations Management. European Journal of Operational Research (175), 475–493 (2006)

    Article  MATH  Google Scholar 

  13. Christopher, M., Peck, H.: Building the Resilient Supply Chain. International Journal of Logistics Management 15(2), 1–14 (2004)

    Article  Google Scholar 

  14. Zsidisin, G.A., Ritchie, R.A.: Supply Chain Risk: A Handbook of Assessment, Management, and Performance. Springer (2008)

    Google Scholar 

  15. Mack, E.: Major Satellite Outage Affecting ISPs, ATMs, Flights; CNET (October 6, 2011), http://news.cnet.com/8301-1023_3-20116846-93/major-satellite-outage-affecting-isps-atms-flights/

  16. Cardoso, J.M.P., Diniz, P.C.: Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks. In: Bier, V.M., Azaiez, N.M. (eds.) Game Theoretic Risk Analysis of Security Threats. International Series in Operations Research & Management Science. Springer, Boston (2009)

    Google Scholar 

  17. Bajgoric, N.: Server Operating Environment for Business Continuance: Framework for Selection. International Journal of Business Continuity and Risk Management 1(4), 317–338 (2010)

    Article  Google Scholar 

  18. Escaleras, M.P., Register, C.A.: Mitigating Natural Disasters through Collective Action: The Effectiveness of Tsunami Early Warnings. Southern Economic Journal 74(4), 1018–1034 (2008)

    Google Scholar 

  19. Engemann, K.J., Miller, H.E.: Operations Risk Management at a Major Bank. Interfaces 22(6), 140–149 (1992)

    Article  Google Scholar 

  20. Aven, T.: Risk Analysis. Wiley, Chichester (2008)

    Book  MATH  Google Scholar 

  21. Aven, T., Steen, R.: On the Boundaries of Probabilistic Risk Assessment in the Face of Uncertainties, A Case of Piracy and Armed Robberies Against Ships in the Gulf of Aden. International Journal of Business Continuity and Risk Management 1(2), 113 (2010)

    Article  Google Scholar 

  22. Paulsson, U., Nilsson, C., Wandel, S.: Estimation of Disruption Risk Exposure In Supply Chains. International Journal of Business Continuity and Risk Management 2(1), 1–19 (2011)

    Article  Google Scholar 

  23. Grossi, P., Kunreuther, H.: Catastrophe Modeling: A New Approach to Managing Risk. Huebner International Series on Risk, Insurance and Economic Security (2005)

    Google Scholar 

  24. Aven, T., Aven, E.: On how to understand and express enterprise risk. International Journal of Business Continuity and Risk Management 2(1), 20–34 (2011)

    Article  Google Scholar 

  25. Engemann, K.J., Miller, H.E.: Critical Infrastructure and Smart Technology Risk Modeling Using Computational Intelligence. International Journal of Business Continuity and Risk Management 1(1), 91–111 (2009)

    Article  Google Scholar 

  26. Bughin, J., Chui, M., Manyika, J.: Clouds, Big Data, And Smart Assets: Ten Tech-Enabled Business Trends to Watch. McKinsey Quarterly, 1–14 (2010)

    Google Scholar 

  27. Hammond, J.S., Keeney, R.L., Raiffa, H.: The Hidden Traps in Decision Making. Harvard Business Review, 1–9 (September-October 1998)

    Google Scholar 

  28. Morecroft, J.D.W.: Strategy Support Models. Strategic Management Journal 5(3), 215–229 (1984)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Miller, H.E., Engemann, K.J. (2012). Using Analytical Methods in Business Continuity Planning. In: Engemann, K.J., Gil-Lafuente, A.M., Merigó, J.M. (eds) Modeling and Simulation in Engineering, Economics and Management. MS 2012. Lecture Notes in Business Information Processing, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30433-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30433-0_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30432-3

  • Online ISBN: 978-3-642-30433-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy