{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:05:39Z","timestamp":1776780339989,"version":"3.51.2"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icaiic57133.2023.10067127","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:38:05Z","timestamp":1679593085000},"page":"353-359","source":"Crossref","is-referenced-by-count":5,"title":["A Mini Literature Review on Integrating Cybersecurity for Business Continuity"],"prefix":"10.1109","author":[{"given":"Safa","family":"Altaha","sequence":"first","affiliation":[{"name":"King Faisal University,Dept. of Computer Networks &#x0026; Communications,Saudi Arabia"}]},{"given":"M M","family":"Hafizur Rahman","sequence":"additional","affiliation":[{"name":"King Faisal University,Dept. of Computer Networks &#x0026; Communications,Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411618080254"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/su13063132"},{"key":"ref3","volume-title":"Integrating cybersecurity into business continuity strategies to achieve organization","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.29333\/ejmste\/8300"},{"issue":"6","key":"ref5","first-page":"7280","article-title":"Cyber-security and Business Continuity in Pandemic Times","volume":"25","author":"Bejarano","year":"2021","journal-title":"Annals of RSCB"},{"key":"ref6","article-title":"Preparing for a cyberattack by extending BCM into the C-suite","author":"Lieberman","year":"2015","journal-title":"ISACA"},{"issue":"11","key":"ref7","first-page":"1019","volume":"11","author":"Alhija","year":"2020","journal-title":"Cyber Security: Between Challenges and Prospects"},{"key":"ref8","volume-title":"5 steps to integrating business continuity and Cyber Resilience - IT news Africa","author":"Davies","year":"2018"},{"key":"ref9","article-title":"Integrated Business Continuity Planning and Information Security Policy Development Approach","volume-title":"International Conference on Information Systems","author":"J\u00e4rvel\u00e4inen","year":"2016"},{"key":"ref10","first-page":"942","article-title":"Study on Information Security Management System and Business Continuity Management in the Context of the Global Crisis","author":"Lampe","year":"2020","journal-title":"New Trends in Sustainable Business and Consumption"},{"issue":"3","key":"ref11","first-page":"224","article-title":"Breaking down silos between business continuity and cyber security","volume":"12","author":"Phillips","year":"2018","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44432.21.3.20040601\/82480.11"},{"key":"ref13","volume-title":"How to integrate cybersecurity into Business Continuity Planning","year":"2022"},{"issue":"4","key":"ref14","first-page":"329","article-title":"Mitigating risks by integrating business continuity and security","volume":"4","author":"Shaw","year":"2010","journal-title":"Journal Of Business Continuity and Emergency Planning"},{"key":"ref15","article-title":"Link between business continuity and Cybersecurity","author":"Davidson","year":"2017","journal-title":"PECB"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI52073.2021.9476324"},{"key":"ref17","article-title":"Cybersecurity and Business Continuity Integration Boosts Resilience","author":"Kirvan","year":"2019","journal-title":"SearchDisasterRecovery"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32727\/8.2023.3"},{"issue":"2","key":"ref19","first-page":"510","article-title":"Ovidius","volume":"XVII","author":"Alina","year":"2017","journal-title":"Internal Audit Role in Cybersecurity"},{"issue":"4","key":"ref20","first-page":"45","article-title":"ISO 27001-Information Systems Security, development, trends, technical and economic challenges","volume":"17","author":"Sikman","year":"2019","journal-title":"Annals of the Faculty of Engineering Hunedoara"},{"key":"ref21","first-page":"51","article-title":"The Effectiveness of Business Continuity Management System In Enterprises","author":"Radenovic","year":"2022","journal-title":"Business Continuity Management and Safety"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.3038411"}],"event":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","location":"Bali, Indonesia","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,23]]}},"container-title":["2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10066849\/10066958\/10067127.pdf?arnumber=10067127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:29:28Z","timestamp":1707830968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10067127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icaiic57133.2023.10067127","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}