{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:18Z","timestamp":1750220358906,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,29]]},"DOI":"10.1145\/3468784.3470466","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T22:43:46Z","timestamp":1626821026000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Assuring long-term operational resilience in a pandemic: Lessons learned from COVID-19"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Hofbauer","sequence":"first","affiliation":[{"name":"team Technology Management GmbH, Austria"}]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Brahim Herbane Ethn\u00e9 Swartz and Dominic Elliott. 2004. Business Continuity Management: Time for a Strategic Role? Article in Long Range Planning. https:\/\/www.researchgate.net\/profile\/Ethne-Swartz\/publication\/240177042_Business_Continuity_Management_Time_for_a_Strategic_Role\/links\/5d23141492851cf4406f5462\/Business-Continuity-Management-Time-for-a-Strategic-Role.pdf  Brahim Herbane Ethn\u00e9 Swartz and Dominic Elliott. 2004. Business Continuity Management: Time for a Strategic Role? Article in Long Range Planning. https:\/\/www.researchgate.net\/profile\/Ethne-Swartz\/publication\/240177042_Business_Continuity_Management_Time_for_a_Strategic_Role\/links\/5d23141492851cf4406f5462\/Business-Continuity-Management-Time-for-a-Strategic-Role.pdf","DOI":"10.1016\/j.lrp.2004.07.010"},{"key":"e_1_3_2_1_2_1","unstructured":"Department of Humanitarian Affairs\/United Nations Disaster Relief Office \u2013 United Nations Development Programme. 1992. An Overview of Disaster Management. http:\/\/www.nzdl.org\/cgi-bin\/library?e=d-00000-00\u2014off-0aedl\u201300-0\u2014-0-10-0\u20140\u20140direct-10\u20144\u2014\u2014-0-1l\u201311-en-50\u201420-about\u201400-0-1-00-0-0-11-1-0utfZz-8-00&cl=CL1.3&d=HASH68c99b49db2847ff4206b4.4.3.2.3&gt=1  Department of Humanitarian Affairs\/United Nations Disaster Relief Office \u2013 United Nations Development Programme. 1992. An Overview of Disaster Management. http:\/\/www.nzdl.org\/cgi-bin\/library?e=d-00000-00\u2014off-0aedl\u201300-0\u2014-0-10-0\u20140\u20140direct-10\u20144\u2014\u2014-0-1l\u201311-en-50\u201420-about\u201400-0-1-00-0-0-11-1-0utfZz-8-00&cl=CL1.3&d=HASH68c99b49db2847ff4206b4.4.3.2.3&gt=1"},{"volume-title":"Resilient ICT research based on lessons learned from the Great East Japan Earthquake","author":"Nemoto Yoshiaki","key":"e_1_3_2_1_3_1","unstructured":"Yoshiaki Nemoto , and Kiyoshi Hamaguchi . 2014. Resilient ICT research based on lessons learned from the Great East Japan Earthquake . IEEE. https:\/\/ieeexplore.ieee.org\/abstract\/document\/6766082 Yoshiaki Nemoto, and Kiyoshi Hamaguchi. 2014. Resilient ICT research based on lessons learned from the Great East Japan Earthquake. IEEE. https:\/\/ieeexplore.ieee.org\/abstract\/document\/6766082"},{"key":"e_1_3_2_1_4_1","volume-title":"Doerfel","author":"Chewning Lisa V.","year":"2021","unstructured":"Lisa V. Chewning , Chih-Hui Lai , and Marya L . Doerfel . 2021 . Organizational Resilience and Using Information and Communication Technologies to Rebuild Communication Structures. Sage Journals. https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0893318912465815 Lisa V. Chewning, Chih-Hui Lai, and Marya L. Doerfel. 2021. Organizational Resilience and Using Information and Communication Technologies to Rebuild Communication Structures. Sage Journals. https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0893318912465815"},{"key":"e_1_3_2_1_5_1","volume-title":"von Hippel","author":"Beyea Jan","year":"2013","unstructured":"Jan Beyea , Edwin Lyman , and Frank N . von Hippel . 2013 . Accounting for long-term doses in \u201cworldwide health effects of the Fukushima Daiichi nuclear accident. From the journal: Energy & Environmental Science . https:\/\/pubs.rsc.org\/en\/content\/articlelanding\/2013\/ee\/c2ee24183h#!divAbstract Jan Beyea, Edwin Lyman, and Frank N. von Hippel. 2013. Accounting for long-term doses in \u201cworldwide health effects of the Fukushima Daiichi nuclear accident. From the journal: Energy & Environmental Science. https:\/\/pubs.rsc.org\/en\/content\/articlelanding\/2013\/ee\/c2ee24183h#!divAbstract"},{"key":"e_1_3_2_1_6_1","volume-title":"Temperature Rise of 1.5\u00b0C could happen by","author":"Carana Sam","year":"2024","unstructured":"Sam Carana . 2015. Temperature Rise of 1.5\u00b0C could happen by 2024 . Below 2C. https:\/\/below2c.org\/2015\/12\/temperature-rise-1-5c-happen-2024\/ Sam Carana. 2015. Temperature Rise of 1.5\u00b0C could happen by 2024. Below2C. https:\/\/below2c.org\/2015\/12\/temperature-rise-1-5c-happen-2024\/"},{"key":"e_1_3_2_1_7_1","unstructured":"McKinsey & Company. 2018. Don't stress out: how to build long-term resilience. https:\/\/www.mckinsey.com\/business-functions\/organization\/our-insights\/the-organization-blog\/dont-stress-out-how-to-build-longterm-resilience#  McKinsey & Company. 2018. Don't stress out: how to build long-term resilience. https:\/\/www.mckinsey.com\/business-functions\/organization\/our-insights\/the-organization-blog\/dont-stress-out-how-to-build-longterm-resilience#"},{"key":"e_1_3_2_1_8_1","unstructured":"NIST. 2010. Contingency Planning Guide for Federal Information Systems. NIST Special Publication 800-34 Revision 1. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-34r1.pdf  NIST. 2010. Contingency Planning Guide for Federal Information Systems. NIST Special Publication 800-34 Revision 1. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-34r1.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Queensland Fire and Emergency Services. 2018. Queensland Prevention Preparedness Response and Recovery Disaster Management Guideline. https:\/\/www.disaster.qld.gov.au\/dmg\/Documents\/QLD-Disaster-Management-Guideline.pdf  Queensland Fire and Emergency Services. 2018. Queensland Prevention Preparedness Response and Recovery Disaster Management Guideline. https:\/\/www.disaster.qld.gov.au\/dmg\/Documents\/QLD-Disaster-Management-Guideline.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Joe Oleksak and John Hampson. 2020. The new Business Continuity Management Booklet: Four questions you should ask. Plante Moran. https:\/\/www.plantemoran.com\/explore-our-thinking\/insight\/2020\/02\/the-new-business-continuity-management-booklet-four-questions  Joe Oleksak and John Hampson. 2020. The new Business Continuity Management Booklet: Four questions you should ask. Plante Moran. https:\/\/www.plantemoran.com\/explore-our-thinking\/insight\/2020\/02\/the-new-business-continuity-management-booklet-four-questions"},{"key":"e_1_3_2_1_11_1","unstructured":"Kim Le. 2016. SOX Walk-through Overview. A2Q2. https:\/\/www.a2q2.com\/blog\/sox\/sox-walk-through-overview\/#:\u223c:text=Test%20of%20Design%20(TOD)%20%E2%80%93 operates%20as%20it%20was%20designed  Kim Le. 2016. SOX Walk-through Overview. A2Q2. https:\/\/www.a2q2.com\/blog\/sox\/sox-walk-through-overview\/#:\u223c:text=Test%20of%20Design%20(TOD)%20%E2%80%93 operates%20as%20it%20was%20designed"},{"key":"e_1_3_2_1_12_1","unstructured":"NIST. 2020. Security and Privacy Controls for Information Systems and Organizations. NIST Special Publication 800-53 Revision 5. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r5.pdf  NIST. 2020. Security and Privacy Controls for Information Systems and Organizations. NIST Special Publication 800-53 Revision 5. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r5.pdf"},{"key":"e_1_3_2_1_13_1","unstructured":"London First. 2003. Expecting the unexpected Business Continuity in an uncertain world. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/61089\/expecting-the-unexpected.pdf  London First. 2003. Expecting the unexpected Business Continuity in an uncertain world. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/61089\/expecting-the-unexpected.pdf"},{"key":"e_1_3_2_1_14_1","unstructured":"Jessie Reed. 2019. Data Center Disaster Recovery: A Complete Guide. Nakivo. https:\/\/www.nakivo.com\/blog\/data-center-disaster-recovery-a-complete-guide\/  Jessie Reed. 2019. Data Center Disaster Recovery: A Complete Guide. Nakivo. https:\/\/www.nakivo.com\/blog\/data-center-disaster-recovery-a-complete-guide\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Marten B\u00fctow. 2019. Thus spoke the BSI\u2026.T-Systems. https:\/\/www.t-systems.com\/de\/en\/newsroom\/expert-blogs\/thus-spoke-the-bsi-76334  Marten B\u00fctow. 2019. Thus spoke the BSI\u2026.T-Systems. https:\/\/www.t-systems.com\/de\/en\/newsroom\/expert-blogs\/thus-spoke-the-bsi-76334"},{"key":"e_1_3_2_1_16_1","unstructured":"European Commission. 2016. What is a data breach and what do we have to do in case of a data breach? https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/reform\/rules-business-and-organisations\/obligations\/what-data-breach-and-what-do-we-have-do-case-data-breach_en  European Commission. 2016. What is a data breach and what do we have to do in case of a data breach? https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/reform\/rules-business-and-organisations\/obligations\/what-data-breach-and-what-do-we-have-do-case-data-breach_en"},{"key":"e_1_3_2_1_17_1","unstructured":"Bank for International Settlements. 2020. Principles for operational resilience. https:\/\/www.bis.org\/bcbs\/publ\/d509.pdf  Bank for International Settlements. 2020. Principles for operational resilience. https:\/\/www.bis.org\/bcbs\/publ\/d509.pdf"},{"key":"e_1_3_2_1_18_1","volume-title":"Operational Resilience: Identifying Critical Business Processes. https:\/\/insights.crosscountry-consulting.com\/operational-resilience-identifying-critical-business-processes","author":"Consulting CrossCountry","year":"2020","unstructured":"CrossCountry Consulting . 2020 . Operational Resilience: Identifying Critical Business Processes. https:\/\/insights.crosscountry-consulting.com\/operational-resilience-identifying-critical-business-processes CrossCountry Consulting. 2020. Operational Resilience: Identifying Critical Business Processes. https:\/\/insights.crosscountry-consulting.com\/operational-resilience-identifying-critical-business-processes"},{"key":"e_1_3_2_1_19_1","unstructured":"NIST. 2018. Framework Version 1.1. NIST Cybersecurity Framework. https:\/\/www.nist.gov\/cyberframework  NIST. 2018. Framework Version 1.1. NIST Cybersecurity Framework. https:\/\/www.nist.gov\/cyberframework"},{"key":"e_1_3_2_1_20_1","unstructured":"IBM Cloud Education. 2019. What are Security Controls? IBM. https:\/\/www.ibm.com\/cloud\/learn\/security-controls  IBM Cloud Education. 2019. What are Security Controls? IBM. https:\/\/www.ibm.com\/cloud\/learn\/security-controls"},{"key":"e_1_3_2_1_21_1","unstructured":"Margaret Langsett. 2016. Six levels of business continuity maturity. Virtual corporation. https:\/\/www.continuitycentral.com\/index.php\/news\/business-continuity-news\/1293-six-levels-of-business-continuity-maturity  Margaret Langsett. 2016. Six levels of business continuity maturity. Virtual corporation. https:\/\/www.continuitycentral.com\/index.php\/news\/business-continuity-news\/1293-six-levels-of-business-continuity-maturity"},{"key":"e_1_3_2_1_22_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. 2020. Orientation guide to documentation of compliance according to Section 8a (3) BSIG. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/IT-SiG\/Orientierungshilfe_8a_3_eng.pdf?__blob=publicationFile&v=3  Bundesamt f\u00fcr Sicherheit in der Informationstechnik. 2020. Orientation guide to documentation of compliance according to Section 8a (3) BSIG. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/IT-SiG\/Orientierungshilfe_8a_3_eng.pdf?__blob=publicationFile&v=3"},{"key":"e_1_3_2_1_23_1","unstructured":"Moh Heng Goh. 2019. What are the Types of Business Continuity Strategy? BCM Institute. https:\/\/blog.bcm-institute.org\/bcm-planning-methodology\/what-are-the-types-of-business-continuity-strategy  Moh Heng Goh. 2019. What are the Types of Business Continuity Strategy? BCM Institute. https:\/\/blog.bcm-institute.org\/bcm-planning-methodology\/what-are-the-types-of-business-continuity-strategy"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Paul Malliet Fr\u00e9d\u00e9ric Reyn\u00e8s Gissela Landa Meriem Hamdi-Cherif and Aur\u00e9lien Saussay. 2020. Assessing Short-Term and Long-Term Economic and Environmental Effects of the COVID-19 Crisis in France. Environmental and Resource Economics. https:\/\/link.springer.com\/article\/10.1007\/s10640-020-00488-z  Paul Malliet Fr\u00e9d\u00e9ric Reyn\u00e8s Gissela Landa Meriem Hamdi-Cherif and Aur\u00e9lien Saussay. 2020. Assessing Short-Term and Long-Term Economic and Environmental Effects of the COVID-19 Crisis in France. Environmental and Resource Economics. https:\/\/link.springer.com\/article\/10.1007\/s10640-020-00488-z","DOI":"10.1007\/s10640-020-00488-z"},{"key":"e_1_3_2_1_25_1","unstructured":"HP Enterprise Security. 2011. Next-Generation Application Monitoring: Combining Application Security Monitoring and SIEM. http:\/\/docs.media.bitpipe.com\/io_10x\/io_101711\/item_478578\/TT%2011-105%20HP%20Enterprise%20Security.pdf  HP Enterprise Security. 2011. Next-Generation Application Monitoring: Combining Application Security Monitoring and SIEM. http:\/\/docs.media.bitpipe.com\/io_10x\/io_101711\/item_478578\/TT%2011-105%20HP%20Enterprise%20Security.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"Karen Scarfone. 2015. IBM Security QRadar: SIEM product overview. SearchSecurity. https:\/\/searchsecurity.techtarget.com\/feature\/IBM-Security-QRadar-SIEM-product-overview  Karen Scarfone. 2015. IBM Security QRadar: SIEM product overview. SearchSecurity. https:\/\/searchsecurity.techtarget.com\/feature\/IBM-Security-QRadar-SIEM-product-overview"},{"key":"e_1_3_2_1_27_1","unstructured":"Stephen Cooper. 2020. Splunk SIEM Review & Alternatives. Comparitech. https:\/\/www.comparitech.com\/net-admin\/splunk-siem-review-alternatives\/  Stephen Cooper. 2020. Splunk SIEM Review & Alternatives. Comparitech. https:\/\/www.comparitech.com\/net-admin\/splunk-siem-review-alternatives\/"},{"key":"e_1_3_2_1_28_1","unstructured":"Sander Berkouwer. 2018. The Cloud Identity Dilemma. Semperis. https:\/\/www.semperis.com\/blog\/cloud-identity-dilemma\/  Sander Berkouwer. 2018. The Cloud Identity Dilemma. Semperis. https:\/\/www.semperis.com\/blog\/cloud-identity-dilemma\/"},{"key":"e_1_3_2_1_29_1","volume-title":"all","author":"Neil Ferguson","year":"2020","unstructured":"Neil Ferguson et. all . 2020 . Impact of non-pharmaceutical interventions [NPIs] to reduce COVID19 mortality and healthcare demand. Imperial College . https:\/\/medium.com\/tomas-pueyo\/coronavirus-der-hammer-und-der-tanz-abf9015cb2af Neil Ferguson et. all. 2020. Impact of non-pharmaceutical interventions [NPIs] to reduce COVID19 mortality and healthcare demand. Imperial College. https:\/\/medium.com\/tomas-pueyo\/coronavirus-der-hammer-und-der-tanz-abf9015cb2af"},{"key":"e_1_3_2_1_30_1","unstructured":"MITRE. 2020. ATT&CK Matrix for Enterprise. MITRE ATT&CK. https:\/\/attack.mitre.org\/  MITRE. 2020. ATT&CK Matrix for Enterprise. MITRE ATT&CK. https:\/\/attack.mitre.org\/"},{"key":"e_1_3_2_1_31_1","unstructured":"Simmons & Simmons LLP. 2020. Operational resilience \u2013 outsourcing and third party risk management. https:\/\/www.simmons-simmons.com\/en\/publications\/cka512adwj5yq0999l3fbcm1d\/operational-resilience\u2014outsourcing-and-third-party-risk-management  Simmons & Simmons LLP. 2020. Operational resilience \u2013 outsourcing and third party risk management. https:\/\/www.simmons-simmons.com\/en\/publications\/cka512adwj5yq0999l3fbcm1d\/operational-resilience\u2014outsourcing-and-third-party-risk-management"},{"key":"e_1_3_2_1_32_1","unstructured":"Federal Office for Information Security. 2009. BSI Standard 100-4 Business Continuity Management. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/BSIStandards\/standard_100-4_e_pdf.pdf?__blob=publicationFile&v=1  Federal Office for Information Security. 2009. BSI Standard 100-4 Business Continuity Management. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/BSIStandards\/standard_100-4_e_pdf.pdf?__blob=publicationFile&v=1"},{"key":"e_1_3_2_1_33_1","unstructured":"Edward Bishop. 2020. Our New Normal Of Remote Work Makes Data Loss Prevention Crucial For GDPR Compliance. Forbes. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/06\/15\/our-new-normal-of-remote-work-makes-data-loss-prevention-crucial-for-gdpr-compliance\/?sh=24adde665937  Edward Bishop. 2020. Our New Normal Of Remote Work Makes Data Loss Prevention Crucial For GDPR Compliance. Forbes. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/06\/15\/our-new-normal-of-remote-work-makes-data-loss-prevention-crucial-for-gdpr-compliance\/?sh=24adde665937"},{"key":"e_1_3_2_1_34_1","unstructured":"Michael Berman. 2020. What's The Difference Between Business Continuity Management (BCM) And Pandemic Planning? NContracts. https:\/\/www.ncontracts.com\/integrated-risk-blog\/whats-the-difference-between-business-continuity-management-bcm-and-pandemic-planning\/  Michael Berman. 2020. What's The Difference Between Business Continuity Management (BCM) And Pandemic Planning? NContracts. https:\/\/www.ncontracts.com\/integrated-risk-blog\/whats-the-difference-between-business-continuity-management-bcm-and-pandemic-planning\/"},{"key":"e_1_3_2_1_35_1","unstructured":"CREST. 2019. What is Cyber Threat Intelligence and how is it used? https:\/\/www.crest-approved.org\/wp-content\/uploads\/CREST-Cyber-Threat-Intelligence.pdf  CREST. 2019. What is Cyber Threat Intelligence and how is it used? https:\/\/www.crest-approved.org\/wp-content\/uploads\/CREST-Cyber-Threat-Intelligence.pdf"},{"key":"e_1_3_2_1_36_1","unstructured":"Eske Ofner. 2021. Keep calm and\u2026? Five Tips For Successful Crisis Management. FACT24. https:\/\/fact24.com\/en\/five-tips-for-successful-crisis-management\/  Eske Ofner. 2021. Keep calm and\u2026? Five Tips For Successful Crisis Management. FACT24. https:\/\/fact24.com\/en\/five-tips-for-successful-crisis-management\/"}],"event":{"name":"IAIT2021: The 12th International Conference on Advances in Information Technology","acronym":"IAIT2021","location":"Bangkok Thailand"},"container-title":["The 12th International Conference on Advances in Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468784.3470466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468784.3470466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:21Z","timestamp":1750191441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468784.3470466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,29]]},"references-count":36,"alternative-id":["10.1145\/3468784.3470466","10.1145\/3468784"],"URL":"https:\/\/doi.org\/10.1145\/3468784.3470466","relation":{},"subject":[],"published":{"date-parts":[[2021,6,29]]},"assertion":[{"value":"2021-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}