Academia.eduAcademia.edu

Outline

Business continuity planning methodology

https://doi.org/10.1108/09653561011038039

Abstract

Purpose-The purpose of this paper is to present a multi-usable business continuity planning methodology. It comprises business continuity planning on the organizational and departmental levels. Design/methodology/approach-The methodology has been developed, tested and confirmed in three comprehensive cases. Senior management, IT managers and employees in the three case organizations have participated in this action research effort during the development, implementation or training on business continuity plans and planning. Findings-The methodology has been tested and confirmed, and is suitable for explaining business continuity planning to senior managements and employees in both public and private sector organizations. Practical implications-The methodology description can be used for explaining the issues to senior managements and forms the foundation for a business continuity plan, which is part of an organization's IT-and information security program. It may also be used to explain business continuity planning to other staff in an organization. The methodology can also be used to model business continuity planning, as a basis for training planning, and as support in different training contexts to achieve individual and organizational learning on business continuity plans and activities. Originality/value-The methodology of using a staircase or capability maturity model is a commonly used concept and can be adapted to any organization.

Key takeaways
sparkles

AI

  1. The proposed methodology effectively explains business continuity planning to senior management and staff across sectors.
  2. Training and awareness at all organizational levels enhance engagement and understanding of business continuity planning.
  3. The methodology was validated through three cases, averaging an 8.06 rating on a 10-point scale.
  4. Integration of IT and information security is crucial for maintaining effective business continuity plans.
  5. Understanding one's current maturity level in business continuity planning informs necessary improvements and actions.

References (39)

  1. The Stairway model is extended with the new EU AEO model (Authorised Economic Operator) from end of 2007 -an organization with an AEO certificate is on level 4 or 5 in the Staircase, available at: www.tullverket.se/sokordao/a/authorisedeconomicoperatoraeo.
  2. Anderson, G. (1994), "A proactive model for training needs analysis", Journal of European Industrial Training, Vol. 18 No. 3, pp. 23-8
  3. Anttila, J., Kajava, J. and Varonen, R. (2004), "Balanced integration of information security into business management", Proceedings of the 30th EUROMICRO' 04, IEEE.
  4. Arkin, A. (1994), "Computing the future means of training", Personnel Management, August, pp. 36-40.
  5. Baldwin, T.T. and Ford, J.K. (1988), "Transfer training: a review and directions for future research", Personnel Psychology, Vol. 41, pp. 63-105.
  6. Bazerman, M.H. (2002), Judgement in Managerial Decision Making, 5th ed., John Wiley, New York, NY.
  7. CMMI (2007), Carnegie Mellon University, Pittsburgh, PA, available at: www.sei.cmu.edu/cmmi/ Dulac, N. and Leveson, N. (2004), "An approach to design for safety in complex systems", Proceedings of the International Conference on System Engineering (INCOSE '04), Toulouse, June.
  8. Dulac, N. and Leveson, N. (2005), "Incorporating safety in early system architecture trade studies", Proceedings of the International Conference of the System Safety Society (ISSC '05), San Diego, August.
  9. Fallera, P. (2004), "Disaster recovery planning -the best defense is a well managed offense", Potentials, IEEE, Vol. 22 No. 5, December.
  10. Goldstein, I.L. (1992), Training in Organizations: Needs Assessment, Development and Evaluation, Brooks/Cole Publishing Co., Monterey, CA.
  11. Grimaila, M.R. (2004), "Maximizing business information security's educational value", IEEE Security and Privacy, Vol. 2 No. 1, pp. 56-60.
  12. Gummesson, E. (2000), Qualitative Methods in Management Research, 2nd ed., Sage, Thousand Oaks, CA.
  13. Helms, R.W., van Oorschot, S., Herweijer, J. and Plas, M. (2006), "An integral IT continuity framework for undisrupted business operations", Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES'06), IEEE.
  14. ISO/IEC 17799 (2005), Information Technology -Security Techniques -Code of Practice for Information Security Management.
  15. Johnson, C.W. (2006), "What are emergent properties and how do they affect the engineering of complex systems?", Reliability Engineering and System Safety, Vol. 91 No. 12, pp. 1475-81.
  16. Kajava, J., Varonen, R., Anttila, J., Savola, R. and Ro ¨ning, J. (2006), "Senior executives' commitment to information security -from motivation to responsibility", Proceedings of the International Conference on Computational Intelligence and Security, IEEE.
  17. Lam, W. (2002), "Ensuring business continuity", IT Pro IEEE, May/June.
  18. Lempinen, H. (2002), Security Model as a Part of the Strategy of a Private Hospital (in Finnish), University of Oulu, Oulu.
  19. Lierman, B. (1994), "How to develop a training simulation", Training & Development, February, pp. 50-2.
  20. Lindstro ¨m, J. and Ha ¨gerfors, A. (2009), "A model for explaining strategic IT-and information security to senior management", International Journal of Public Information Systems, Vol. 2009 No. 1.
  21. Ma, Q. and Pearson, J.M. (2005), "ISO 17799: 'Best practices' in information security management?", Communications of the Association for Information Systems, Vol. 15, pp. 577-91.
  22. Molander, C. (1990), Organization Development, Mulvie & McDougall.
  23. Reason, P. and Bradbury, H. (Eds) (2001), Handbook of Action Research: Participative Inquiry and Practice, Sage Publications, London.
  24. Roberts, W. (2006), "Business continuity planning for disasters is just good planning", Proceedings of the Military Communications Conference (MILCOM 2006).
  25. Samuelsson, S. (2002), "A study of teaching and learning environments for business games" (in Swedish), Licentiate thesis, Lulea ˚University of Technology, Lulea ˚.
  26. Samuelsson, S. (2006), "IT-based business games for experimental learning -system structure and enablers" (in Swedish), doctoral thesis, Lulea ˚University of Technology, Lulea ˚.
  27. Samuelsson, S. and Ha ¨gerfors, A. (2004), "Computer supported business games", Proceedings of the Information System research Seminars in Scandinavia (IRIS 27).
  28. Senge, P.M. (1994), The Fifth Discipline Fieldbook. Strategies and Tools for Building a Learning Organization, Currency Doubleday, New York, NY.
  29. Sipponen, M. (2007), "Information security management standards: problems and solutions", The DATA BASE for Advances in Information Systems, Vol. 38 No. 1, February.
  30. Smith, D. (2004), "For whom the bell tolls: imagining accidents and the development of crisis simulation in organizations", Simulation & Gaming, September, pp. 347-62.
  31. SSE-CMM (2003), Systems Security Engineering-Capability Maturity Model. SSE-CMM Project, v 3.0 edition.
  32. Summerville, J. (1999), "Role of awareness of cognitive style in hypermedia", International Journal of Educational Technology, Vol. 1 No. 1, July.
  33. Swanson, M., Wohl, A., Pope, L., Gance, T., Hash, J. and Thomas, R. (2002), Contingency Planning Guide for Information Technology Systems, NIST Special Publication, June, pp. 800-34.
  34. Swedish Customs Services Stairway TM model (2000), available at: www.tullverket.se/s okordao/s/servicetrappan.4.5b2d990b116c8e66b0f800050.html
  35. Swedish Emergency Management Agency (2006), "BITS -Basic Level for Information Security", available at: www.krisberedskapsmyndigheten.se/templates/Publication____1143.aspx, 2006:1
  36. Swedish Finance Inspection (2005), "Status of the finance industry's crisis management 2005:3", report from 17-March-2005 (in Swedish), Dnr 05-1249-601.
  37. Verstraeti, C. (2004), "Planning for the unexpected", IEEE Manufacturing Engineer, June/July.
  38. Villegas, J. (1996), "Simulation supported industrial training from an organisational learning perspective", doctoral thesis, Department of Computer and Information Science, Linko ¨ping.
  39. Warren, M. (1979), Traning for Results: A System Approach to the Development of Human Resources in Industry, 2nd ed., Addison-Wesley, Glen View, IL.