{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:57:03Z","timestamp":1761947823977},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304323"},{"type":"electronic","value":"9783642304330"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30433-0_2","type":"book-chapter","created":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T07:17:22Z","timestamp":1338535042000},"page":"2-12","source":"Crossref","is-referenced-by-count":3,"title":["Using Analytical Methods in Business Continuity Planning"],"prefix":"10.1007","author":[{"given":"Holmes E.","family":"Miller","sequence":"first","affiliation":[]},{"given":"Kurt J.","family":"Engemann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Helft, M., Bunkley, N.: Disaster in Japan Batters Suppliers, New York Times (March 14, 2011)"},{"key":"2_CR2","volume-title":"Business Continuity and Risk Management: Essentials of Organizational Resilience","author":"K.J. Engemann","year":"2012","unstructured":"Engemann, K.J., Henderson, D.M.: Business Continuity and Risk Management: Essentials of Organizational Resilience. Rothstein Associates, Brookfield (2012)"},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/19393555.2010.551274","volume":"20","author":"P. Sikdar","year":"2011","unstructured":"Sikdar, P.: Alternate Approaches to Business Impact Analysis. Information Security Journal: A Global Perspective\u00a020(3), 128\u2013134 (2011)","journal-title":"Information Security Journal: A Global Perspective"},{"key":"2_CR4","volume-title":"Value Focused Thinking","author":"R.A. Keeney","year":"1992","unstructured":"Keeney, R.A.: Value Focused Thinking. Harvard University Press, Cambridge (1992)"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.ejor.2009.09.008","volume":"204","author":"J. Mula","year":"2010","unstructured":"Mula, J., Peidro, D., D\u00edaz-Madro\u00f1ero, M., Vicens, E.: Mathematical Programming Models for Supply Chain Production and Transport Planning. European Journal of Operational Research\u00a0204(3), 377\u2013390 (2010)","journal-title":"European Journal of Operational Research"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1002\/ieam.137","volume":"7","author":"C.W. Karvetski","year":"2011","unstructured":"Karvetski, C.W., Lambert, J.H., Linkov, I.: Scenario and Multiple Criteria Decision Analysis for Energy and Environmental Security of Military and Industrial Installations. Integrated Environmental Assessment and Management\u00a0(7), 228\u2013236 (2011)","journal-title":"Integrated Environmental Assessment and Management"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TR.2010.2104211","volume":"60","author":"E. Zio","year":"2011","unstructured":"Zio, E., Sansavini, G.: Modeling Interdependent Network Systems for Identifying Cascade-Safe Operating Margins. IEEE Transactions on Reliability\u00a060(1), 94\u2013101 (2011)","journal-title":"IEEE Transactions on Reliability"},{"key":"2_CR8","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-0-387-88523-0_17","volume-title":"Critical Infrastructure Protection II","author":"R. Setola","year":"2009","unstructured":"Setola, R., Bologna, S., Casalicchio, E., Masucci, V.: An Integrated Approach For Simulating Interdependencies. In: Papa, M., Shenoi, S. (eds.) Critical Infrastructure Protection II. IFIP, vol.\u00a0290, pp. 229\u2013239. Springer, Boston (2009)"},{"key":"2_CR9","volume-title":"Project Management: A Systems Approach to Planning, Scheduling, and Controlling","author":"H. Kerzner","year":"2008","unstructured":"Kerzner, H.: Project Management: A Systems Approach to Planning, Scheduling, and Controlling. John Wiley and Sons, New York (2008)"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1504\/IJTPM.2008.020169","volume":"8","author":"H.E. Miller","year":"2008","unstructured":"Miller, H.E., Engemann, K.J.: A Monte Carlo Simulation Model of Supply Chain Risk Due To Natural Disasters. International Journal of Technology, Policy and Management\u00a08(4), 460\u2013480 (2008)","journal-title":"International Journal of Technology, Policy and Management"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/S0377-2217(01)00275-2","volume":"141","author":"K. Brysona","year":"2002","unstructured":"Brysona, K., Millar, H., Josephc, A., Mambourin, A.: Using Formal MS\/OR Modeling To Support Disaster Recovery Planning. European Journal of Operational Research\u00a0141(3), 679\u2013688 (2002)","journal-title":"European Journal of Operational Research"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.ejor.2005.05.016","volume":"175","author":"N. Altay","year":"2006","unstructured":"Altay, N., Green, W.G.: OR\/MS Research in Disaster Operations Management. European Journal of Operational Research\u00a0(175), 475\u2013493 (2006)","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/09574090410700275","volume":"15","author":"M. Christopher","year":"2004","unstructured":"Christopher, M., Peck, H.: Building the Resilient Supply Chain. International Journal of Logistics Management\u00a015(2), 1\u201314 (2004)","journal-title":"International Journal of Logistics Management"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Zsidisin, G.A., Ritchie, R.A.: Supply Chain Risk: A Handbook of Assessment, Management, and Performance. Springer (2008)","DOI":"10.1007\/978-0-387-79934-6"},{"key":"2_CR15","unstructured":"Mack, E.: Major Satellite Outage Affecting ISPs, ATMs, Flights; CNET (October 6, 2011), http:\/\/news.cnet.com\/8301-1023_3-20116846-93\/major-satellite-outage-affecting-isps-atms-flights\/"},{"key":"2_CR16","volume-title":"Game Theoretic Risk Analysis of Security Threats. International Series in Operations Research & Management Science","author":"J.M.P. Cardoso","year":"2009","unstructured":"Cardoso, J.M.P., Diniz, P.C.: Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks. In: Bier, V.M., Azaiez, N.M. (eds.) Game Theoretic Risk Analysis of Security Threats. International Series in Operations Research & Management Science. Springer, Boston (2009)"},{"issue":"4","key":"2_CR17","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1504\/IJBCRM.2010.038622","volume":"1","author":"N. Bajgoric","year":"2010","unstructured":"Bajgoric, N.: Server Operating Environment for Business Continuance: Framework for Selection. International Journal of Business Continuity and Risk Management\u00a01(4), 317\u2013338 (2010)","journal-title":"International Journal of Business Continuity and Risk Management"},{"issue":"4","key":"2_CR18","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1002\/j.2325-8012.2008.tb00878.x","volume":"74","author":"M.P. Escaleras","year":"2008","unstructured":"Escaleras, M.P., Register, C.A.: Mitigating Natural Disasters through Collective Action: The Effectiveness of Tsunami Early Warnings. Southern Economic Journal\u00a074(4), 1018\u20131034 (2008)","journal-title":"Southern Economic Journal"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1287\/inte.22.6.140","volume":"22","author":"K.J. Engemann","year":"1992","unstructured":"Engemann, K.J., Miller, H.E.: Operations Risk Management at a Major Bank. Interfaces\u00a022(6), 140\u2013149 (1992)","journal-title":"Interfaces"},{"key":"2_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9780470694435","volume-title":"Risk Analysis","author":"T. Aven","year":"2008","unstructured":"Aven, T.: Risk Analysis. Wiley, Chichester (2008)"},{"issue":"2","key":"2_CR21","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1504\/IJBCRM.2010.033633","volume":"1","author":"T. Aven","year":"2010","unstructured":"Aven, T., Steen, R.: On the Boundaries of Probabilistic Risk Assessment in the Face of Uncertainties, A Case of Piracy and Armed Robberies Against Ships in the Gulf of Aden. International Journal of Business Continuity and Risk Management\u00a01(2), 113 (2010)","journal-title":"International Journal of Business Continuity and Risk Management"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJBCRM.2011.040011","volume":"2","author":"U. Paulsson","year":"2011","unstructured":"Paulsson, U., Nilsson, C., Wandel, S.: Estimation of Disruption Risk Exposure In Supply Chains. International Journal of Business Continuity and Risk Management\u00a02(1), 1\u201319 (2011)","journal-title":"International Journal of Business Continuity and Risk Management"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Grossi, P., Kunreuther, H.: Catastrophe Modeling: A New Approach to Managing Risk. Huebner International Series on Risk, Insurance and Economic Security (2005)","DOI":"10.1007\/b100669"},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1504\/IJBCRM.2011.040012","volume":"2","author":"T. Aven","year":"2011","unstructured":"Aven, T., Aven, E.: On how to understand and express enterprise risk. International Journal of Business Continuity and Risk Management\u00a02(1), 20\u201334 (2011)","journal-title":"International Journal of Business Continuity and Risk Management"},{"issue":"1","key":"2_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJBCRM.2009.028953","volume":"1","author":"K.J. Engemann","year":"2009","unstructured":"Engemann, K.J., Miller, H.E.: Critical Infrastructure and Smart Technology Risk Modeling Using Computational Intelligence. International Journal of Business Continuity and Risk Management\u00a01(1), 91\u2013111 (2009)","journal-title":"International Journal of Business Continuity and Risk Management"},{"key":"2_CR26","unstructured":"Bughin, J., Chui, M., Manyika, J.: Clouds, Big Data, And Smart Assets: Ten Tech-Enabled Business Trends to Watch. McKinsey Quarterly, 1\u201314 (2010)"},{"key":"2_CR27","unstructured":"Hammond, J.S., Keeney, R.L., Raiffa, H.: The Hidden Traps in Decision Making. Harvard Business Review, 1\u20139 (September-October 1998)"},{"issue":"3","key":"2_CR28","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1002\/smj.4250050303","volume":"5","author":"J.D.W. Morecroft","year":"1984","unstructured":"Morecroft, J.D.W.: Strategy Support Models. Strategic Management Journal\u00a05(3), 215\u2013229 (1984)","journal-title":"Strategic Management Journal"}],"container-title":["Lecture Notes in Business Information Processing","Modeling and Simulation in Engineering, Economics and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30433-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T15:17:39Z","timestamp":1642346259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30433-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304323","9783642304330"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30433-0_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}