:::

詳目顯示

回上一頁
題名:資訊系統災害復原場址之評估、選擇與改善
作者:楊嘉麗
作者(外文):Yang, Chia-Lee
校院名稱:國立交通大學
系所名稱:科技管理研究所
指導教授:袁建中
學位類別:博士
出版日期:2015
主題關鍵詞:災害復原場址選擇多準則決策巨量資料資訊系統Disaster Recovery (DR)Site SelectionMulti-criterion decision making (MCDM)Big DataInformation system
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:3
現代組織運作對資訊系統的仰賴程度日益加深,維持資訊系統的穩定可用已經是組織營運上的重要因素,因此當組織面臨自然或人為災害時,確保資訊系統可快速進行災害復原,已是現代組織持續營運的重要機制。故此,如何有效評估與選擇一適當的資訊系統災害復原場址,成為許多組織重要的決策議題。然而,資訊系統災害復原場址的選擇,同時須考量資訊建置成本、災害風險、關鍵業務、復原時間、復原地點等問題,場址評估之複雜性不言可喻。
儘管資訊系統災害復原議題,日益受到資訊與災害領域研究者重視。然而,過去研究並未針對如何選擇與評估適當的資訊系統災害復原場址,進行系統性分析,因此,本研究旨在探討影響災害復原場址評估之關鍵要素,並建構一個資訊系統災害復原場址之評估、選擇與改善之定量分析架構。
本研究將針對前述研究缺口,建構一混合式多準則決策模式(Hybrid MCDM model),即結合決策實驗室分析法(DEMATEL)、實驗室決策網路程序分析法(DNP)和最佳化妥協解法(VIKOR),取得各構面及評估準則間之相互影響關係、影響權重和理想值之差距,建構適用於一般資訊系統災害復原場址之評估準則。進而並將準則實證於一台灣研究機構,進行巨量資料災害復原場址之評估、選擇與改善。本架構可用於以進行一般資訊系統災害復原場址之評估,並可根據評估準則最大之差距為優先改善,建構災害復原場址績效的改善策略。
Disaster Recovery sites are an important mechanism in continuous information system operations. Such mechanisms can sustain IT availability and ensure business continuity during natural or human-made disasters. How to evaluate, select and improve an appropriate information system DR has become high priority for many organizations. Concerning the cost and risk aspects, the information system DR site selection problems are multi-criterion decision making (MCDM) problems in nature. For such problems, the decision aspects include the critical business assessment, service recovery time requirements, site location, and more. The importance and complexities of information system DR sites increases with advances in IT and the categories of possible disasters. However, very few researchers tried to study related issues during past years based on the authors’ extremely limited knowledge. Thus, this paper aims to define a quantitative analytic framework for evaluating, selecting DR sites in general, and the DR sites in the Big Data era in special.
A hybrid MCDM framework consisting of the Decision-Making Trial and Evaluation Laboratory (DEMATEL), DEMATEL-based network process (DNP) and VIšekriterijumsko KOmpromisno Rangiranje (VIKOR) will be proposed to construct the complex influence relations between aspects as well as criteria and further, derive weight associated with each aspect and criteria. Further, we use an empirical study on evaluating, selecting, and improving three DR sites belonging to a real Taiwanese research institute Big Data applications to illustrate the feasibility of the proposed framework. Our proposed analytic framework can be used for evaluating and selecting the most suitable information system DR sites. Furthermore, the analytic results can serve as a foundation for information technology (IT) managers’ strategies to reduce the performance gaps of a DR site’ performance.
Ablanedo-Rosas, J. H., Gao, H., Alidaee, B., &; Teng, W.-Y. (2009). Allocation of emergency and recovery centres in Hidalgo, Mexico. International Journal of Services Sciences, 2(2), 206-218.
Alesi, P. (2008). Building enterprise-wide resilience by integrating business continuity capability into day-to-day business culture and technology. Journal of Business Continuity &; Emergency Planning, 2(3), 214-220.
Alexander, D. (1991). Natural disasters: a framework for research and teaching. Disasters, 15(3), 209-226.
Alexander, D. (1997). The study of natural disasters, 1977–1997: some reflections on a changing field of knowledge. Disasters, 21(4), 284-304.
Altay, N., &; Green, W. G. (2006). OR/MS research in disaster operations management. European journal of operational research, 175(1), 475-493.
ANAO. (2009). Business Continuity Management: Building resilience in public sector entities. Australia: The Australian National Audit Office(ANAO).
Andreolini, M., Colajanni, M., Pietri, M., &; Tosi, S. (2014). Adaptive, scalable and reliable monitoring of big data on clouds. Journal of Parallel and Distributed Computing(0). doi: http://dx.doi.org/10.1016/j.jpdc.2014.08.007
Anthopoulos, L. G., Kostavara, E., &; Pantouvakis, J.-P. (2013). An Effective Disaster Recovery Model for Construction Projects. Procedia - Social and Behavioral Sciences, 74(0), 21-30. doi: http://dx.doi.org/10.1016/j.sbspro.2013.03.026
Asbury, J.-E. (1995). Overview of focus group research. Qualitative health research, 5(4), 414-420.
Asgary, A., Anjum, M. I., &; Azimi, N. (2012). Disaster recovery and business continuity after the 2010 flood in Pakistan: Case of small businesses. International Journal of Disaster Risk Reduction, 2(0), 46-56. doi: http://dx.doi.org/10.1016/j.ijdrr.2012.08.001
Balcik, B., &; Beamon, B. M. (2008). Facility location in humanitarian relief. International Journal of Logistics, 11(2), 101-121.
Belk, R. W. (2007). Handbook of Qualitative Research Methods in Marketing: Edward Elgar Publishing, Incorporated.
Berman, J. J. (2013). Principles of big data: preparing, sharing, and analyzing complex information. MA, USA: Newnes,Morgan Kaufmann, Elsevier.
Bertrand, C. (2005). Business continuity and mission critical applications. Network Security, 2005(8), 9-11. doi: http://dx.doi.org/10.1016/S1353-4858(05)70269-5
Bianco, A., Giraudo, L., &; Hay, D. (2010, 6-10 Dec. 2010). Optimal Resource Allocation for Disaster Recovery. Paper presented at the Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE.
Bowen, P., Hash, J., &; Wilson, M. (2006). SP 800-100. Information Security Handbook: A Guide for Managers. USA: NIST.
Boyd, D., &; Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, communication &; society, 15(5), 662-679.
Broder, J. F., &; Tucker, E. (2011). Risk analysis and the security survey: Elsevier.
Brooks, C., Bedernjak, M., Juran, I., &; Merryman, J. (2002). Disaster Recovery Strategies. Retrieved from ftp://skolai.daba.lv/pub/Arhivatori/adsm_clients/SG246844/sg246844_disaster_recovery.pdf: IBM Redbook.
Bryson, K.-M., Millar, H., Joseph, A., &; Mobolurin, A. (2002). Using formal MS/OR modeling to support disaster recovery planning. European Journal of Operational Research, 141(3), 679-688. doi: http://dx.doi.org/10.1016/S0377-2217(01)00275-2
BS25999. (2007). 25999-2 Business Continuity Management-Part2: Specification Business Continuity Management: Retrieved from From http://www.25999.info/bs25999-2.htm
Buffington, J., &; Rouda, N. (2014). Data Protection and Disaster Recovery for Big Data. Enterprise Strategy Group Research Report.
Cegiela, R. (2006, 25-27 May 2006). Selecting Technology for Disaster Recovery. Paper presented at the Dependability of Computer Systems, 2006. DepCos-RELCOMEX '06. International Conference on.
Chang, R. M., Kauffman, R. J., &; Kwon, Y. (2014). Understanding the paradigm shift to computational social science in the presence of big data. Decision Support Systems, 63(0), 67-80. doi: http://dx.doi.org/10.1016/j.dss.2013.08.008
Chang, Y., Wilkinson, S., Potangaroa, R., &; Seville, E. (2012). Managing resources in disaster recovery projects. Engineering, Construction and Architectural Management, 19(5), 557-580.
Chen, C. P., &; Zhang, C.-Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, 314-347.
Chen, R., Sharman, R., Rao, H. R., &; Upadhyaya, S. J. (2008). Coordination in emergency response management. Communications of the ACM, 51(5), 66-73.
Chisholm, P. (2008). Disaster Recovery Planning Is Business-Critical. The CPA Journal, 78(7), 11.
Chun, B.-G., Ihm, S., Maniatis, P., &; Naik, M. (2010). Clonecloud: boosting mobile device applications through cloud clone execution. arXiv preprint arXiv:1009.3088. .
Clitherow, D., Brookbanks, M., Clayton, N., &; Spear, G. (2008). Combining high availability and disaster recovery solutions for critical IT environments. IBM Systems Journal, 47(4), 563-575. doi: 10.1147/sj.2008.5386509
Council, T. E. T. D. (2013). TAIWAN ICT INDUSTRY. Taiwan External Trade Development Council.
Covas, M. T., Silva, C. A., &; Dias, L. C. (2013). On locating sustainable Data Centers in Portugal: Problem structuring and GIS-based analysis. Sustainable Computing: Informatics and Systems, 3(1), 27-35. doi: http://dx.doi.org/10.1016/j.suscom.2012.12.001
Dai, S.-Y., &; Kuo, S.-Y. (2007). Mapmon: A host-based malware detection tool. Paper presented at the Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on.
Daim, T. U., Bhatla, A., &; Mansour, M. (2013). Site selection for a data centre–a multi-criteria decision-making model. International Journal of Sustainable Engineering, 6(1), 10-22.
de Boer, J. (1995). An introduction to disaster medicine in Europe. The Journal of Emergency Medicine, 13(2), 211-216. doi: http://dx.doi.org/10.1016/0736-4679(94)00147-2
Dekle, J., Lavieri, M. S., Martin, E., Emir-Farinas, H., &; Francis, R. L. (2005). A Florida county locates disaster recovery centers. Interfaces, 35(2), 133-139.
Dermol, U., &; Kontić, B. (2011). Use of strategic environmental assessment in the site selection process for a radioactive waste disposal facility in Slovenia. Journal of Environmental Management, 92(1), 43-52. doi: http://dx.doi.org/10.1016/j.jenvman.2010.08.010
Dilley, M. (2005). Natural disaster hotspots: a global risk analysis (Vol. 5): World Bank Publications.
Dissanayake, S., &; Önal, H. (2011). Amenity driven price effects and conservation reserve site selection: A dynamic linear integer programming approach. Ecological Economics, 70(12), 2225-2235.
Dix, J. (2013). Cloud computing causing rethinking of disaster recovery
Feng, N., &; Li, M. (2011). An information systems security risk assessment model under uncertain environment. Applied Soft Computing, 11(7), 4332-4340. doi: http://dx.doi.org/10.1016/j.asoc.2010.06.005
Fontela, E., &; Gabus, A. (1976). The DEMATEL observer: DEMATEL.
Forrum, W. E. (2013). The Global Competitiveness Report 2013 - 2014 World Economic Forum.
Fothergill, A., Maestas, E. G., &; Darlington, J. D. (1999). Race, ethnicity and disasters in the United States: A review of the literature. Disasters, 23(2), 156-173.
Fothergill, A., &; Peek, L. A. (2004). Poverty and disasters in the United States: A review of recent sociological findings. Natural hazards, 32(1), 89-110.
Görmez, N., Köksalan, M., &; Salman, F. (2011). Locating disaster response facilities in Istanbul. Journal of the Operational Research Society, 62(7), 1239-1252.
Gandomi, A., &; Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2014.10.007
Gantz, J., &; Reinsel, D. (2011). Extracting value from chaos. IDC iview(1142), 9-10.
García, J. L., Alvarado, A., Blanco, J., Jiménez, E., Maldonado, A. A., &; Cortés, G. (2014). Multi-attribute evaluation and selection of sites for agricultural product warehouses based on an Analytic Hierarchy Process. Computers and Electronics in Agriculture, 100(0), 60-69. doi: http://dx.doi.org/10.1016/j.compag.2013.10.009
Garlasu, D., Sandulescu, V., Halcu, I., Neculoiu, G., Grigoriu, O., Marinescu, M., &; Marinescu, V. (2013). A big data implementation based on Grid computing. Paper presented at the Roedunet International Conference (RoEduNet), 2013 11th.
GartnerGroup. ( 2009). Gartner IT Infrastructure, Operations and Management Summit. Orlando, FL: Gartner Group.
Ginda, G., &; Dytczak, M. (2009). Identification of building repair policy choice criteria role. Technological and Economic Development of Economy(2), 213-228.
Gregory, P. H. (2011). IT disaster recovery planning for dummies: John Wiley &; Sons.
Group, G. (2012). The Importance of 'Big Data': A Definition: Gartner Group.
Hale, T., &; Moberg, C. R. (2005). Improving supply chain disaster preparedness: a decision process for secure site location. International Journal of Physical Distribution &; Logistics Management, 35(3), 195-207.
Hanaoka, S., &; Qadir, F. M. (2005). Logistics problems in recovery assistance of Indian Ocean earthquake and tsunami disaster. Paper presented at the Scientific Forum on The Tsunami, Its Impact and Recovery.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., &; Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47(0), 98-115. doi: http://dx.doi.org/10.1016/j.is.2014.07.006
Hassin, R., Ravi, R., &; Salman, F. S. (2010). Facility location on a network with unreliable links: Working paper. Retrieved October 24, 2012, from http://www. di. unipi. it/di/groups/optimize/Events/proceedings/M/B/4/MB4-4. pdf.
Hawkins, S. M., Yen, D. C., &; Chou, D. C. (2000). Disaster recovery planning: a strategy for data security. Information Management &; Computer Security, 8(5), 222-230.
He, Q., Guo, Y., Wang, Y., &; Qiang, B. (2013, 14-16 Aug. 2013). A web site protection oriented remote backup and recovery method. Paper presented at the Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on.
Herbane, B., Elliott, D., &; Swartz, E. M. (2004). Business continuity management: time for a strategic role? Long Range Planning, 37(5), 435-457.
Hiles, A. (2010). The definitive handbook of business continuity management: John Wiley &; Sons.
Hoopes, J. (2009). Chapter 10 - Disaster Recovery. Boston: Syngress.
Hristidis, V., Chen, S.-C., Li, T., Luis, S., &; Deng, Y. (2010). Survey of data management and analysis in disaster situations. Journal of Systems and Software, 83(10), 1701-1714.
Hsu, C.-Y., Chen, K.-T., &; Tzeng, G.-H. (2007). FMCDM with fuzzy DEMATEL approach for customers' choice behavior model. International Journal of Fuzzy Systems, 9(4), 236.
Huang, C.-Y., Shyu, J. Z., &; Tzeng, G.-H. (2007). Reconfiguring the innovation policy portfolios for Taiwan's SIP Mall industry. Technovation, 27(12), 744-765.
IDC. ( 2009). Digital data to double every 18 months, worldwide marketplace model and forecast. Framingham, MA. .
Iyer, R. K., &; Sarkis, J. (1998). Disaster recovery planning in an automated manufacturing environment. Engineering Management, IEEE Transactions on, 45(2), 163-175.
Järveläinen, J. (2013). IT incidents and business impacts: Validating a framework for continuity management in information systems. International Journal of Information Management, 33(3), 583-590. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2013.03.001
Jia, H., Ordóñez, F., &; Dessouky, M. (2007). A modeling framework for facility location of medical services for large-scale emergencies. IIE transactions, 39(1), 41-55.
Judson, J. (2012). Disaster Recovery Best Practices - Templates, Documents and Examples of Disaster Recovery in the Public Domain PLUS access to content.theartofservice.com for downloading: Emereo Publishing.
Kaisler, S., Armour, F., Espinosa, J. A., &; Money, W. (2013, 7-10 Jan. 2013). Big Data: Issues and Challenges Moving Forward. Paper presented at the System Sciences (HICSS), 2013 46th Hawaii International Conference on.
Kambatla, K., Kollias, G., Kumar, V., &; Grama, A. (2014). Trends in big data analytics. Journal of Parallel and Distributed Computing, 74(7), 2561-2573.
Kankanhalli, A., Teo, H.-H., Tan, B. C., &; Wei, K.-K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139-154.
Kant, K. (2009). Data center evolution: A tutorial on state of the art, issues, and challenges. Computer Networks, 53(17), 2939-2965. doi: http://dx.doi.org/10.1016/j.comnet.2009.10.004
Katal, A., Wazid, M., &; Goudar, R. H. (2013, 8-10 Aug. 2013). Big data: Issues, challenges, tools and Good practices. Paper presented at the Contemporary Computing (IC3), 2013 Sixth International Conference on.
King, R. P., Halim, N., Garcia-Molina, H., &; Polyzois, C. A. (1991). Management of a remote backup copy for disaster recovery. ACM Transactions on Database Systems (TODS), 16(2), 338-368.
Kshetri, N. (2014). Big data׳s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145. doi: http://dx.doi.org/10.1016/j.telpol.2014.10.002
Lee, C.-W., Hsieh, K.-Y., Hsieh, S.-Y., &; Hsiao, H.-C. (2014). A Dynamic Data Placement Strategy for Hadoop in Heterogeneous Environments. Big Data Research, 1(0), 14-22. doi: http://dx.doi.org/10.1016/j.bdr.2014.07.002
Lee, S.-G., Chae, S. H., &; Cho, K. M. (2013). Drivers and inhibitors of SaaS adoption in Korea. International Journal of Information Management, 33(3), 429-440. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.006
Lee, Y.-C., Li, M.-L., Yen, T.-M., &; Huang, T.-H. (2010). Analysis of adopting an integrated decision making trial and evaluation laboratory on a technology acceptance model. Expert Systems with Applications, 37(2), 1745-1754.
Li, W., Yang, Y., &; Yuan, D. (2015). 6 - Cost-effective data reliability assurance for data maintenance. In W. Li, Y. Yang &; D. Yuan (Eds.), Reliability Assurance of Big Data in the Cloud (pp. 45-63). Boston: Morgan Kaufmann.
Lin, G., Deze, Z., Peng, L., &; Song, G. (2014). Cost Minimization for Big Data Processing in Geo-Distributed Data Centers. Emerging Topics in Computing, IEEE Transactions on, 2(3), 314-323. doi: 10.1109/TETC.2014.2310456
Lin, L., Shuang, W., Yifang, L., &; Shouyang, W. (2014). A New Idea of Study on the Influence Factors of Companies’ Debt Costs in the Big Data Era. Procedia Computer Science, 31(0), 532-541. doi: http://dx.doi.org/10.1016/j.procs.2014.05.299
Lindell, M. K., &; Prater, C. S. (2003). Assessing community impacts of natural disasters. Natural Hazards Review, 4(4), 176-185.
Losada, C., Scaparra, M. P., &; O’Hanley, J. R. (2012). Optimizing system resilience: a facility protection model with recovery time. European Journal of Operational Research, 217(3), 519-530.
Lumpp, T., Schneider, J., Holtz, J., Mueller, M., Lenz, N., Biazetti, A., &; Petersen, D. (2008). From high availability and disaster recovery to business continuity solutions. IBM Systems Journal, 47(4), 605-619.
Lynch, C. (2008). Big data: How do your data grow? Nature, 455(7209), 28-29.
Lyon, L. (2014). Disaster Recovery and the Big Data Application. Database journal, from http://www.databasejournal.com/features/db2/disaster-recovery-and-the-big-data-application.html
MacGregor, B., &; Morrison, D. E. (1995). From focus groups to editing groups. A new method of reception analysis. Media Culture and Society, 17(1), 141-150.
Manovich, L. (2011). Trending: the promises and the challenges of big social data.
McDowall, R. (2001). Computer (In) security–2: computer system backup and recovery. The Quality Assurance Journal, 5(3), 149-155.
Minelli, M., Chambers, M., &; Dhiraj, A. (2012). Big data, big analytics: emerging business intelligence and analytic trends for today's businesses: John Wiley &; Sons.
Miyagawa, M. (2012). Joint distribution of distances to the first and the second nearest facilities. Journal of geographical systems, 14(2), 209-222.
Nakamura, S., Nakayama, K., &; Nakagawa, T. (2009). Optimal backup interval of database by incremental backup method. Paper presented at the Industrial Engineering and Engineering Management, 2009. IEEM 2009. IEEE International Conference on.
NASA. (2003). Cyber security: the status of information security and the effects of the Federal Information Security Management Act (FISMA) at NASA: National Aeronautics and Space Administration(NASA).USA.
Nigg, J. M. (1995). Disaster recovery as a social process.
Ning, W., &; Luo, P. (2008, 12-14 Oct. 2008). Research on the Information Resources Management Center Construction in E-Government. Paper presented at the Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on.
Omar, A., Alijani, D., &; Mason, R. (2011). Information technology disaster recovery plan: Case study. Academy of Strategic Management Journal, 10(2), 127-141.
Opricovic, S. (1998). Multicriteria optimization of civil engineering systems. Faculty of Civil Engineering, Belgrade, 2(1), 5-21.
Opricovic, S., &; Tzeng, G.-H. (2004). Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS. European Journal of Operational Research, 156(2), 445-455.
Ou Yang, Y.-P., Shieh, H.-M., Leu, J.-D., &; Tzeng, G.-H. (2008). A novel hybrid MCDM model combined with DEMATEL and ANP with applications. International Journal of Operations Research, 5(3), 160-168.
Pereira, N., Carneiro, J. F., Araújo, A., Bezzeghoud, M., &; Borges, J. (2014). Seismic and structural geology constraints to the selection of CO2 storage sites—The case of the onshore Lusitanian basin, Portugal. Journal of Applied Geophysics, 102(0), 21-38. doi: http://dx.doi.org/10.1016/j.jappgeo.2013.12.001
Philip Chen, C. L., &; Zhang, C.-Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275(0), 314-347. doi: http://dx.doi.org/10.1016/j.ins.2014.01.015
Pirkul, H., &; Schilling, D. (1989). The capacitated maximal covering location problem with backup service. Annals of Operations Research, 18(1), 141-154.
Power, D. J. (2014). Using ‘Big Data’for analytics and decision support. Journal of Decision Systems, 23(2), 222-228.
Rajagopalan, S., Cully, B., O'Connor, R., &; Warfield, A. (2012). SecondSite: disaster tolerance as a service. Paper presented at the ACM SIGPLAN Notices.
Reich, B. H., &; Benbasat, I. (2000). Factors that influence the social dimension of alignment between business and information technology objectives. MIS quarterly, 81-113.
Rikalovic, A., Cosic, I., &; Lazarevic, D. (2014). GIS Based Multi-criteria Analysis for Industrial Site Selection. Procedia Engineering, 69(0), 1054-1063. doi: http://dx.doi.org/10.1016/j.proeng.2014.03.090
Riolli, L., &; Savicki, V. (2003). Information system organizational resilience. Omega, 31(3), 227-233.
Rivera, T. (2014). Protechting data in the big data world: SNIA-Data protection and capacity optimization commitee.
Roberts, W. C. (2006, 23-25 Oct. 2006). Business Continuity Planning for Disasters is Just Good Planning. Paper presented at the Military Communications Conference, 2006. MILCOM 2006. IEEE.
Roebuck, K. (2012). Business continuity and disaster recovery: High-impact Technology - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors: Emereo Publishing.
Rose, A. (2007). Economic resilience to natural and man-made disasters: Multidisciplinary origins and contextual dimensions. Environmental Hazards, 7(4), 383-398.
Rose, A. Z. (2009). A framework for analyzing the total economic impacts of terrorist attacks and natural disasters. Journal of Homeland Security and Emergency Management, 6(1).
Rothstein, P. J. (2007). Disaster Recovery Testing: Exercising Your Contingency Plan (2007 Edition): Rothstein Associates Incorporated.
Rozanski, N., &; Woods, E. (2011). Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives: Pearson Education.
Rutherford, W. H., &; de Boer, J. (1983). The definition and classification of disasters. Injury, 15(1), 10-12. doi: http://dx.doi.org/10.1016/0020-1383(83)90154-7.
Saaty, T. L. (1999). Decision making for leaders: the analytic hierarchy process for decisions in a complex world (Vol. 2): RWS publications.
Salmela, H. (2008). Analysing business losses caused by information systems risk: a business process analysis approach. Journal of Information Technology, 23(3), 185-202.
Schniederjans, M. J., Hoffman, J. J., &; Sirmans, G. S. (1995). Using goal programming and the analytic hierarchy process in house selection. The Journal of Real Estate Finance and Economics, 11(2), 167-176.
Seifert, J. W. (2002). The effects of September 11, 2001, terrorist attacks on public and private information infrastructures: a preliminary assessment of lessons learned. Government Information Quarterly, 19(3), 225-242.
Sembiring, J., &; Siregar, M. I. H. (2013). A Decision Model for IT Risk Management on Disaster Recovery Center in an Enterprise Architecture Model. Procedia Technology, 11(0), 1142-1146. doi: http://dx.doi.org/10.1016/j.protcy.2013.12.306
Sengupta, S., &; Annervaz, K. (2014). Multi-site data distribution for disaster recovery—A planning framework. Future Generation Computer Systems, 41, 53-64.
Serrelis, E., &; Alexandris, N. (2006, 26-28 Aug. 2006). Disaster Recovery Sites as a Tool of Managing Extreme Attacks. Paper presented at the Internet Surveillance and Protection, 2006. ICISP '06. International Conference on.
Shafer, J. ( 2010). I/O virtualization bottlenecks in cloud computing today. Paper presented at the Proceedings of the 2nd conference on I/O virtualization.
Smith, G. (2012). Planning for Post-Disaster Recovery: A Review of the United States Disaster Assistance Framework: Island Press.
Snedaker, S. (2013). Business continuity and disaster recovery: Planning for IT professionals: Newnes.
Spillan, J., &; Hough, M. (2003). Crisis planning in small businesses:: Importance, Impetus and Indifference. European Management Journal, 21(3), 398-407.
Stewart, D. W. (2007). Focus groups: Theory and practice (Vol. 20): Sage.
Sutton, S. G., &; Arnold, V. (2013). Focus group methods: Using interactive and nominal groups to explore emerging technology-driven phenomena in accounting and information systems. International Journal of Accounting Information Systems, 14(2), 81-88.
Tammineedi, R. L. (2010). Business continuity management: a standards-based approach. Information Security Journal: A Global Perspective, 19(1), 36-50.
TechAdvisory.org. (2010). Disaster Recovery: An Increasingly Important Aspect of Your Business
Teeft, C. (2014). 3 Cool New Disaster Recovery Technologies.
Thompson, R. G., Singleton Jr, F., Thrall, R. M., &; Smith, B. A. (1986). Comparative site evaluations for locating a high-energy physics lab in Texas. Interfaces, 16(6), 35-49.
Tian, W., &; Zhao, Y. (2015). 2 - Big Data Technologies and Cloud Computing. In W. Tian &; Y. Zhao (Eds.), Optimized Cloud Resource Management and Scheduling (pp. 17-49). Boston: Morgan Kaufmann.
Toigo, J. W. (2000). Disaster Recovery Planning: Strategies for Protecting Critical Information: Prentice Hall PTR.
Torabi, S., &; Mansouri, S. (2015). Integrated business continuity and disaster recovery planning: Towards organizational resilienceAuthor-Name: Sahebjamnia, N. European Journal of Operational Research, 242(1), 261-273.
Tso, Y.-E., &; McEntire, D. A. (2007). Emergency Management in Taiwan: Learning from Past and Current Experiences.
Ueno, Y., Miyaho, N., Suzuki, S., &; Ichihara, K. (2010, 22-27 Aug. 2010). Performance Evaluation of a Disaster Recovery System and Practical Network System Applications. Paper presented at the Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on.
Vahidnia, M. H., Alesheikh, A. A., &; Alimohammadi, A. (2009). Hospital site selection using fuzzy AHP and its derivatives. Journal of environmental management, 90(10), 3048-3056.
Van Aalst, M. K. (2006). The impacts of climate change on the risk of natural disasters. Disasters, 30(1), 5-18.
Villars, R. L., Olofson, C. W., &; Eastwood, M. (2011). Big data: What it is and why you should care. White Paper, IDC.
Wallace, M., Webber, L., &; Webber, L. (2011). The Disaster Recovery Handbook: A Step-by-step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets: AMACOM.
Wang, G., Qin, L., Li, G., &; Chen, L. (2009). Landfill site selection using spatial information technologies and AHP: a case study in Beijing, China. Journal of Environmental Management, 90(8), 2414-2421.
Whitson, G. (2003). Computer security: theory, process and management. Journal of computing sciences in colleges, 18(6), 57-66.
Wiboonrat, M. (2008, 28-30 June 2008). An empirical IT contingency planning model for disaster recovery strategy selection. Paper presented at the Engineering Management Conference, 2008. IEMC Europe 2008. IEEE International.
Woldu, L. (2013). Cloud Governance Model and Security for Cloud Service Providers.
Wood, T., Cecchet, E., Ramakrishnan, K., Shenoy, P., Van Der Merwe, J., &; Venkataramani, A. (2010). Disaster recovery as a cloud service: Economic benefits &; deployment challenges. Paper presented at the Proceedings of the 2nd USENIX conference on Hot topics in cloud computing.
Wu, H.-H., Chen, H.-K., &; Shieh, J.-I. (2010). Evaluating performance criteria of Employment Service Outreach Program personnel by DEMATEL method. Expert Systems with Applications, 37(7), 5219-5223.
Wu, H.-H., &; Tsai, Y.-N. (2011). A DEMATEL method to evaluate the causal relations among the criteria in auto spare parts industry. Applied Mathematics and Computation, 218(5), 2334-2342.
Zhang, N., Yan, Y., Xu, S., &; Su, W. (2014). A distributed data storage and processing framework for next-generation residential distribution systems. Electric Power Systems Research, 116(0), 174-181. doi: http://dx.doi.org/10.1016/j.epsr.2014.06.005
Zheng, F., &; Wang, F. (2014). Modeling location problem of the regional disaster recovery centers for emergency platform system. Paper presented at the Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on.
Zhou, Q., Huang, W., &; Zhang, Y. (2011). Identifying critical success factors in emergency management using a fuzzy DEMATEL method. Safety Science, 49(2), 243-252.
Zikopoulos, P., &; Eaton, C. (2011). Understanding big data: Analytics for enterprise class hadoop and streaming data: McGraw-Hill Osborne Media.
Zikopoulos, P., Parasuraman, K., Deutsch, T., Giles, J., &; Corrigan, D. (2012). Harness the Power of Big Data The IBM Big Data Platform: McGraw Hill Professional.
Zsidisin, G. A., Melnyk, S. A., &; Ragatz, G. L. (2005). An institutional theory perspective of business continuity planning for purchasing and supply management. International journal of production research, 43(16), 3401-3420.



 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE