Business Continuity Plan: A Comprehensive Outlook

Henry O. Nwaete*
Northcentral University, Illinois, United States.
Periodicity:March - May'2022
DOI : https://doi.org/10.26634/jit.11.2.18882

Abstract

Business disruptions cannot be predicted within government, private, and commercial entities. It would be prudent on the part of organizations and every applicable community in which information systems are crucial for sustainability to make adequate provisions for the eventual threat or disruption to businesses. The mitigation and containment of business disruptions, which could result from natural disasters, including earthquakes, floods, hurricanes, etc., or man-made constraints, which might include system breaches, compromises, and unplanned downtime, should have to be strategically planned and implemented in a structured methodology. During disasters, organizations should not only focus on getting the assets and infrastructure back (called "Disaster Recovery"), but organizations will also do better if it makes SMART (specific, Measurable, Achievable, Relevant, and Time-bound) plans for "Business Continuity" (BC).

Keywords

Business Disruptions, Business Continuity, Service-Level Agreements, Software Defined Networking.

How to Cite this Article?

Nwaete, H. O. (2022). Business Continuity Plan: A Comprehensive Outlook. i-manager’s Journal on Information Technology, 11(2), 21-28. https://doi.org/10.26634/jit.11.2.18882

References

[1]. Badii, C., Bellini, P., Difino, A., & Nesi, P. (2020). Smart city IoT platform respecting GDPR privacy and security aspects. IEEE Access, 8, 23601-23623. https://doi.org/10.1109/ACCESS. 2020.2968741
[2]. Combass, T., & Shilling, A. (2016, September). Integrating cybersecurity into NAVAIR OTPS acquisition. In 2016, IEEE Autotestcon (pp. 1-5). IEEE. https://doi.org/10.1109/AUTEST. 2016.7589632
[3]. FEMA. (2020). National Continuity Program. Retrieved from https://www.fema.gov/about/offices/continuity
[4]. Ganji, A., & Miles, S. (2018, October). Toward Human- Centered Simulation Modeling for Critical Infrastructure Disaster Recovery Planning. In 2018, IEEE Global Humanitarian Technology Conference (GHTC) (pp. 1-8). IEEE. https://doi-org.proxy1.ncu.edu/10.1109/GHTC.2018.8601876
[5]. Hamadah, S., & Aqel, D. (2019, April). A proposed virtual private cloud-based disaster recovery strategy. In 2019, IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (pp. 469-473). IEEE. https://doi.org/10.1109/JEEIT.2019.8717404
[6]. Harding, M. (2018). Moving your business continuity management programme forward with recoverability measurement. Journal of Business Continuity & Emergency Planning, 12(2), 113-118.
[7]. Hennig, N. (2018). Privacy and Security Online: Best Practices for Cybersecurity. Retrieved from https://eds-bebscohost-com.proxy1.ncu.edu/eds/detail/detail?vid=3&sid=80bda4da-2b3d-4d33-8fbe-a6e57d9ba5d1%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=128707555&db=ehh
[8]. Lau, E. T., Chai, K. K., Chen, Y., & Loo, J. (2018). Efficient economic and resilience-based optimization for disaster recovery management of critical infrastructures. Energies, 11(12), 3418. https://doi.org/10.3390/en11123418
[9]. NIST. (2014). Standards for Security categorization of Federal Information and Information Systems. Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf
[10]. O'hara, B. T., & Malisow, B. (2016). Certified Cloud Security Professional. WILEY SYBEX.
[11]. Swanson, M. (2011). Contingency Planning Guide for Federal Information Systems (Vol. 800). DIANE Publishing.
[12]. Tucker, E. (2015). Business Continuity from Preparedness to Recovery: A Standards-Based Approach. Oxford, UK: Butterworth-Heinemann. Retrieved from https://ncuone.ncu.edu/d2l/le/content/176034/viewContent/1662300/View
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.