{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:42:05Z","timestamp":1770464525035,"version":"3.49.0"},"reference-count":76,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T00:00:00Z","timestamp":1679961600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,1,2]]},"DOI":"10.1080\/19393555.2023.2195577","type":"journal-article","created":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T08:44:35Z","timestamp":1679993075000},"page":"54-72","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":17,"title":["Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review"],"prefix":"10.1080","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9664-7148","authenticated-orcid":false,"given":"Nelson","family":"Russo","sequence":"first","affiliation":[{"name":"School of Science and Technology, University of Tr\u00e1s-os-Montes and Alto Douro, Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4398-8384","authenticated-orcid":false,"given":"Leonilde","family":"Reis","sequence":"additional","affiliation":[{"name":"School of Business Administration, Polytechnic Institute of Set\u00fabal, Set\u00fabal, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-4208","authenticated-orcid":false,"given":"Clara","family":"Silveira","sequence":"additional","affiliation":[{"name":"School of Technology and Management, Polytechnic Institute of Guarda, Guarda, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5383-9884","authenticated-orcid":false,"given":"Henrique S.","family":"Mamede","sequence":"additional","affiliation":[{"name":"Department of Science and Technology, Universidade Aberta, Lisbon, Portugal"}]}],"member":"301","published-online":{"date-parts":[[2023,3,28]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.34190\/ICCWS.20.011"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2019.11201"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI47359.2019.8988804"},{"key":"e_1_3_2_5_1","volume-title":"Enhancing business continuity and IT capability: system administration and server operating platforms","author":"Bajgori\u0107 N.","year":"2020","unstructured":"Bajgori\u0107, N., Turulja, L., Ibrahimovi\u0107, S., & Alagi\u0107, A. (2020). Enhancing business continuity and IT capability: system administration and server operating platforms. CRC Press."},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49454-8_11"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.5748\/9788599693124-13CONTECSI\/PS-3893"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"e_1_3_2_9_1","volume-title":"Manager\u2019s guide to business continuity exercises: Testing your plan","author":"Burtles J.","year":"2016","unstructured":"Burtles, J. (2016). Manager\u2019s guide to business continuity exercises: Testing your plan. Rothstein Publishing eBook Collection."},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv131bwtk"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44432.21.3.20040601\/82480.11"},{"key":"e_1_3_2_12_1","volume-title":"CMMI Model V2.0","author":"CMMI Institute","year":"2018","unstructured":"CMMI Institute. (2018). CMMI Model V2.0. Pittsburgh, PA: CMMI Institute."},{"key":"e_1_3_2_13_1","unstructured":"CompTIA. (2017). Planning A Modern It Architecture . Retrieved from https:\/\/connect.comptia.org\/content\/research\/planning-a-modern-it-architecture"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-126-5-199703010-00006"},{"key":"e_1_3_2_15_1","unstructured":"EBSCOConnect. (2021). Hello-How can we help? Retrieved January 22 2021 from https:\/\/connect.ebsco.com\/s\/?language=en_US"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.124"},{"issue":"129","key":"e_1_3_2_17_1","first-page":"51","article-title":"Process Maturity Models - Applicability and Usability Review","author":"Fryt M.","year":"2019","unstructured":"Fryt, M. (2019). Process Maturity Models - Applicability and Usability Review. World Scientific News, 129, 51\u201371.","journal-title":"World Scientific News"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON51383.2020.9284920"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41558-018-0180-3"},{"issue":"1","key":"e_1_3_2_21_1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.69554\/FCXY5798","article-title":"Lessons from disaster: Creating a business continuity plan that really works","volume":"10","author":"Hatton T.","year":"2016","unstructured":"Hatton, T., Grimshaw, E., Vargo, J., & Seville, E. (2016). Lessons from disaster: Creating a business continuity plan that really works. Journal of Business Continuity & Emergency Planning, 10(1), 84\u201392.","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/00076791.2010.511185"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"e_1_3_2_24_1","first-page":"23","volume-title":"The Definitive Handbook of Business Continuity Management","author":"Hibberd G.","year":"2011","unstructured":"Hibberd, G. (2011). Developing a BCM Strategy in Line with Business Strategy. In A. Hiles (Ed.), The Definitive Handbook of Business Continuity Management (3rd ed., pp. 23\u201330). Nova Jersey, USA: John Wiley & Sons."},{"key":"e_1_3_2_25_1","volume-title":"Fundamentals of risk management: understanding, evaluating and implementing effective risk management","author":"Hopkin P.","year":"2017","unstructured":"Hopkin, P. (2017). Fundamentals of risk management: understanding, evaluating and implementing effective risk management. (4th ed.). Kogan Page.","edition":"4"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4953970"},{"key":"e_1_3_2_27_1","volume-title":"COBIT 2019 framework - governance and management objectives","author":"ISACA","year":"2018","unstructured":"ISACA. (2018). COBIT 2019 framework - governance and management objectives."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.4102\/jamba.v11i1.660"},{"key":"e_1_3_2_29_1","volume-title":"Societal security - Business continuity management systems - Requirements","author":"ISO 22301","year":"2019","unstructured":"ISO 22301. (2019). Societal security - Business continuity management systems - Requirements. Switzerland: ISO."},{"key":"e_1_3_2_30_1","unstructured":"ISO 22316.(2017). Security and resilience - Organizational resilience - Principles and attributes . Switzerland: ISO."},{"key":"e_1_3_2_32_1","volume-title":"Information technology - Security techniques - Information security risk management","author":"ISO\/IEC 27005","year":"2018","unstructured":"ISO\/IEC 27005. (2018). Information technology - Security techniques - Information security risk management. ISO\/IEC."},{"key":"e_1_3_2_33_1","volume-title":"Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks","author":"ISO\/IEC 29180","year":"2012","unstructured":"ISO\/IEC 29180. (2012). Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks. ISO\/IEC."},{"key":"e_1_3_2_34_1","volume-title":"Information technology - Data centre facilities and infrastructures - Part 30: Earthquake risk and impact analysis","author":"ISO\/IEC TS 22237-30","year":"2022","unstructured":"ISO\/IEC TS 22237-30. (2022). Information technology - Data centre facilities and infrastructures - Part 30: Earthquake risk and impact analysis. ISO\/IEC TS."},{"key":"e_1_3_2_35_1","volume-title":"ITIL Foundation ITIL","author":"ITIL","year":"2019","unstructured":"ITIL. (2019). ITIL Foundation ITIL (4 Edition. ed.). AXELOS.","edition":"4"},{"key":"e_1_3_2_36_1","volume-title":"Procedures for performing systematic reviews","author":"Kitchenham B.","year":"2004","unstructured":"Kitchenham, B. (2004). Procedures for performing systematic reviews. Keele University."},{"key":"e_1_3_2_37_1","volume-title":"Business continuity planning: A project management approach","author":"Kliem R. L.","year":"2016","unstructured":"Kliem, R. L., & Richie, G. D. (2016). Business continuity planning: A project management approach. Auerbach Publications."},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS190202037L"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2015.7377283"},{"key":"e_1_3_2_40_1","first-page":"1","volume-title":"BLED 2014 Proceedings","volume":"32","author":"Maurer F.","year":"2014","unstructured":"Maurer, F., & Lechner, U. (2014). From Disaster Response Planning to e-Resilience: A Literature Review. BLED 2014 Proceedings, Bled, Slovenia, (Vol. 32, pp. 1\u201319). https:\/\/aisel.aisnet.org\/bled2014\/32"},{"issue":"6","key":"e_1_3_2_41_1","first-page":"87","article-title":"Surviving disasters: A multi-company case study on disaster recovery plans","volume":"22","author":"Miranda V. E.","year":"2020","unstructured":"Miranda, V. E., & Swanstrom, M. (2020). Surviving disasters: A multi-company case study on disaster recovery plans. Journal of Applied Business & Economics, 22(6), 87\u2013105.","journal-title":"Journal of Applied Business & Economics"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-017-0027-6"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1186\/2046-4053-4-1"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.20965\/jdr.2016.p0691"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2184-6"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2019.1686657"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.12821\/ijispm070201"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03704"},{"issue":"161","key":"e_1_3_2_50_1","first-page":"43","article-title":"How prepared are small and medium sized companies for business continuity management?","volume":"18","author":"P\u0103unescu C.","year":"2017","unstructured":"P\u0103unescu, C. (2017). How prepared are small and medium sized companies for business continuity management? Quality - Access to Success, 18(161), 43\u201348.","journal-title":"Quality - Access to Success"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2021.1887982"},{"key":"e_1_3_2_52_1","volume-title":"Business continuity increasing workplace resilience to disasters","author":"Phillips B. D.","year":"2021","unstructured":"Phillips, B. D., & Landahl, M. (2021). Business continuity increasing workplace resilience to disasters. Elsevier Inc."},{"key":"e_1_3_2_53_1","volume-title":"A guide to the project management body of knowledge (PMBOK\u00ae Guide) (6th ed.)","author":"PMI","year":"2017","unstructured":"PMI. (2017) . A guide to the project management body of knowledge (PMBOK\u00ae Guide) (6th ed.). Project Management Institute."},{"key":"e_1_3_2_54_1","volume-title":"Business","author":"Pride W. M.","year":"2013","unstructured":"Pride, W. M., Kapoor, J. R., & Hughes, R. J. (2013). Business. Cengage Learning."},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5042880"},{"key":"e_1_3_2_56_1","first-page":"31","volume-title":"The Definitive Handbook of Business Continuity Management","author":"Ramakrishnan R. K.","year":"2011","unstructured":"Ramakrishnan, R. K., & Viswanathan, S. (2011). The Importance of Business Strategy in Business Continuity Planning. In A. Hiles (Ed.), The Definitive Handbook of Business Continuity Management (3rd ed., pp. 31\u201336). New Jersey, USA: John Wiley & Sons."},{"issue":"4","key":"e_1_3_2_57_1","doi-asserted-by":"crossref","first-page":"298","DOI":"10.69554\/VOTA9018","article-title":"A metrics framework to get and keep management engaged","volume":"11","author":"Ream S.","year":"2018","unstructured":"Ream, S., & Mathew, S. (2018). A metrics framework to get and keep management engaged. Journal of Business Continuity & Emergency Planning, 11(4), 298\u2013308.","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJOPM-03-2016-0129"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1483586"},{"issue":"1","key":"e_1_3_2_60_1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.69554\/BDKY5442","article-title":"Assessing the resilience of an IT portfolio","volume":"13","author":"Ricks M.","year":"2019","unstructured":"Ricks, M., & Boswell, L. (2019). Assessing the resilience of an IT portfolio. Journal of Business Continuity & Emergency Planning, 13(1), 22\u201331.","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"e_1_3_2_61_1","unstructured":"Rimboiu C. (2020). Modern IT architecture to manage change foster innovation. CXOtoday Corner Office . Retrieved from https:\/\/www.cxotoday.com\/corner-office\/modern-it-architecture-to-manage-change-foster-innovation\/"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637151211225225"},{"key":"e_1_3_2_63_1","volume-title":"Programas de Fatura\u00e7\u00e3o Certificados - Guia Pr\u00e1tico para a Continuidade de Neg\u00f3cio","author":"Russo N.","year":"2020","unstructured":"Russo, N., & Reis, L. (2020a). Programas de Fatura\u00e7\u00e3o Certificados - Guia Pr\u00e1tico para a Continuidade de Neg\u00f3cio. FCA - Editora de Inform\u00e1tica."},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-4099-2.ch010"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.25046\/aj0506101"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI52073.2021.9476297"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2017.12.009"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v6i5.11461"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.12.006"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262029797.001.0001"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2020.3005506"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.06.015"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/2158244017706712"},{"issue":"1","key":"e_1_3_2_76_1","first-page":"19","article-title":"Leveraging work from home for business continuity during COVID-19 pandemic\u2013with reference to Bi solution adoption","volume":"19","author":"Tripathi A.","year":"2020","unstructured":"Tripathi, A., & Bagga, T. (2020). Leveraging work from home for business continuity during COVID-19 pandemic\u2013with reference to Bi solution adoption. Indian Journal of Economics and Business, 19(1), 19\u201334.","journal-title":"Indian Journal of Economics and Business"},{"issue":"2","key":"e_1_3_2_77_1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.69554\/YOBG9431","article-title":"Post-event reviews: Using a quantitative approach for analysing incident response to demonstrate the value of business continuity programmes and increase planning efficiency","volume":"11","author":"Vaidyanathan K.","year":"2017","unstructured":"Vaidyanathan, K. (2017). Post-event reviews: Using a quantitative approach for analysing incident response to demonstrate the value of business continuity programmes and increase planning efficiency. Journal of Business Continuity & Emergency Planning, 11(2), 107\u2013116.","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJPMPA.20210101.oa"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2205.04741"},{"issue":"1","key":"e_1_3_2_80_1","doi-asserted-by":"crossref","first-page":"62","DOI":"10.69554\/WQOH8846","article-title":"The strategic skills of business continuity managers: Putting business continuity management into corporate long-term planning","volume":"4","author":"Wong W. N.","year":"2009","unstructured":"Wong, W. N. (2009). The strategic skills of business continuity managers: Putting business continuity management into corporate long-term planning. Journal of Business Continuity & Emergency Planning, 4(1), 62\u201368.","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086706"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2016.12.002"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2023.2195577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T05:02:38Z","timestamp":1729141358000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2023.2195577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,28]]},"references-count":76,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"alternative-id":["10.1080\/19393555.2023.2195577"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2023.2195577","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}