{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T17:20:28Z","timestamp":1764350428260,"version":"3.41.0"},"reference-count":34,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Selection of a suitable disaster recovery solution is an essential activity performed in an enterprise to facilitate recovery of critical business functions and Information Technology (IT) systems within a tolerable time limit known as disaster recovery time (DRT). The estimation of optimal DRT plays a significant role in IT as it influences overall costs required to ensure business continuity. The estimation of optimal DRT depends upon the capabilities of a chosen disaster recovery solution and multiple conflicting attributes. This paper presents an integrated approach to selecting the best disaster recovery solution using analytic network process (ANP) and estimating optimal DRT using Multi-Attribute Utility Theory (MAUT). ANP is applied to determine the best disaster recovery solution using seven criteria: people, recovery objectives, security, technology, cost, site infrastructure, and regulatory. MAUT estimates the optimal DRT for the best disaster recovery solution based on three conflicting attributes: cost, reliability, and processed backlog transactions. The proposed approach applies to an enterprise application in the banking sector and this paper tests its effectiveness by comparing the results from four different enterprises. This study offers valuable insights to the disaster recovery practitioner to select the best disaster recovery solution and to estimate optimal DRT.<\/jats:p>","DOI":"10.1142\/s0219622018500372","type":"journal-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T02:25:35Z","timestamp":1528770335000},"page":"171-207","source":"Crossref","is-referenced-by-count":4,"title":["Prioritizing and Optimizing Disaster Recovery Solution using Analytic Network Process and Multi Attribute Utility Theory"],"prefix":"10.1142","volume":"18","author":[{"given":"Viral","family":"Gupta","sequence":"first","affiliation":[{"name":"Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida 201313, India"}]},{"given":"P. K.","family":"Kapur","sequence":"additional","affiliation":[{"name":"Centre for Interdisciplinary Research, Amity University Uttar Pradesh, Noida 201313, India"}]},{"given":"Deepak","family":"Kumar","sequence":"additional","affiliation":[{"name":"Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida 201313, India"}]}],"member":"219","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"S0219622018500372BIB002","unstructured":"R. L. Krutz and D. V. Russel , The CISSP Prep Guide Gold Edition (Wiley Publishing, Inc., Indianapolis, Indiana, 2002), pp. 377\u2013408."},{"key":"S0219622018500372BIB003","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0027-8"},{"key":"S0219622018500372BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.11.035"},{"key":"S0219622018500372BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-204-9"},{"key":"S0219622018500372BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.137"},{"key":"S0219622018500372BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.10.019"},{"key":"S0219622018500372BIB010","volume-title":"Disaster Recovery Strategies with Tivoli Storage Management","author":"Brooks C.","year":"2002","edition":"2"},{"issue":"1","key":"S0219622018500372BIB012","doi-asserted-by":"crossref","first-page":"6","DOI":"10.69554\/MNLR1417","volume":"7","author":"Smith J.","year":"2013","journal-title":"Journal of Business Continuity and Emergency Planning"},{"issue":"1","key":"S0219622018500372BIB018","first-page":"1","volume":"1","author":"Maheshwari V.","year":"2010","journal-title":"International Journal of Disaster Recovery and Business Continuity"},{"issue":"2","key":"S0219622018500372BIB022","first-page":"48","volume":"1","author":"Lenk A.","year":"2013","journal-title":"International Journal of Cloud Computing"},{"key":"S0219622018500372BIB028","doi-asserted-by":"publisher","DOI":"10.4018\/jitr.2011100102"},{"issue":"3","key":"S0219622018500372BIB030","first-page":"132","volume":"9","author":"Alhazmi O. H.","year":"2015","journal-title":"International Journal of Computer Science and Security"},{"key":"S0219622018500372BIB031","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v7n4p39"},{"key":"S0219622018500372BIB032","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008002843"},{"key":"S0219622018500372BIB033","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622014500382"},{"key":"S0219622018500372BIB037","doi-asserted-by":"publisher","DOI":"10.1080\/17509653.2009.10671079"},{"key":"S0219622018500372BIB039","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSCI.2008.017590"},{"key":"S0219622018500372BIB040","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622014500679"},{"key":"S0219622018500372BIB042","doi-asserted-by":"publisher","DOI":"10.1142\/S021962201340004X"},{"key":"S0219622018500372BIB043","doi-asserted-by":"publisher","DOI":"10.5194\/isprsarchives-XL-4-353-2014"},{"key":"S0219622018500372BIB044","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622012500095"},{"key":"S0219622018500372BIB045","doi-asserted-by":"publisher","DOI":"10.1504\/IJTMKT.2016.073351"},{"key":"S0219622018500372BIB047","doi-asserted-by":"publisher","DOI":"10.3846\/20294913.2016.1210694"},{"key":"S0219622018500372BIB048","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.07.010"},{"key":"S0219622018500372BIB049","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-016-0460-0"},{"issue":"1","key":"S0219622018500372BIB050","first-page":"35","volume":"2","author":"Triantaphyllou E.","year":"1995","journal-title":"International Journal of Industrial Engineering: Applications and Practice"},{"issue":"1","key":"S0219622018500372BIB051","first-page":"50","volume":"15","author":"Singh O.","year":"2012","journal-title":"Communications in Dependability and Quality Management"},{"key":"S0219622018500372BIB052","doi-asserted-by":"publisher","DOI":"10.1142\/4011"},{"key":"S0219622018500372BIB054","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(79)90033-5"},{"issue":"1","key":"S0219622018500372BIB055","first-page":"24","volume":"15","author":"Kapur P. K.","year":"2012","journal-title":"Communications in Dependability and Quality Management"},{"issue":"4","key":"S0219622018500372BIB056","first-page":"5","volume":"16","author":"Kapur P. K.","year":"2013","journal-title":"Communications in Dependability and Quality Management"},{"key":"S0219622018500372BIB057","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1360(199709)6:5<248::AID-MCDA151>3.0.CO;2-W"},{"key":"S0219622018500372BIB058","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.04.005"},{"key":"S0219622018500372BIB059","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139174084"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622018500372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T02:38:30Z","timestamp":1751683110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622018500372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":34,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2019,1,29]]},"published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1142\/S0219622018500372"],"URL":"https:\/\/doi.org\/10.1142\/s0219622018500372","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"type":"print","value":"0219-6220"},{"type":"electronic","value":"1793-6845"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}