|
Ablanedo-Rosas, J. H., Gao, H., Alidaee, B., &; Teng, W.-Y. (2009). Allocation of emergency and recovery centres in Hidalgo, Mexico. International Journal of Services Sciences, 2(2), 206-218. Alesi, P. (2008). Building enterprise-wide resilience by integrating business continuity capability into day-to-day business culture and technology. Journal of Business Continuity &; Emergency Planning, 2(3), 214-220. Alexander, D. (1991). Natural disasters: a framework for research and teaching. Disasters, 15(3), 209-226. Alexander, D. (1997). The study of natural disasters, 1977–1997: some reflections on a changing field of knowledge. Disasters, 21(4), 284-304. Altay, N., &; Green, W. G. (2006). OR/MS research in disaster operations management. European journal of operational research, 175(1), 475-493. ANAO. (2009). Business Continuity Management: Building resilience in public sector entities. Australia: The Australian National Audit Office(ANAO). Andreolini, M., Colajanni, M., Pietri, M., &; Tosi, S. (2014). Adaptive, scalable and reliable monitoring of big data on clouds. Journal of Parallel and Distributed Computing(0). doi: http://dx.doi.org/10.1016/j.jpdc.2014.08.007 Anthopoulos, L. G., Kostavara, E., &; Pantouvakis, J.-P. (2013). An Effective Disaster Recovery Model for Construction Projects. Procedia - Social and Behavioral Sciences, 74(0), 21-30. doi: http://dx.doi.org/10.1016/j.sbspro.2013.03.026 Asbury, J.-E. (1995). Overview of focus group research. Qualitative health research, 5(4), 414-420. Asgary, A., Anjum, M. I., &; Azimi, N. (2012). Disaster recovery and business continuity after the 2010 flood in Pakistan: Case of small businesses. International Journal of Disaster Risk Reduction, 2(0), 46-56. doi: http://dx.doi.org/10.1016/j.ijdrr.2012.08.001 Balcik, B., &; Beamon, B. M. (2008). Facility location in humanitarian relief. International Journal of Logistics, 11(2), 101-121. Belk, R. W. (2007). Handbook of Qualitative Research Methods in Marketing: Edward Elgar Publishing, Incorporated. Berman, J. J. (2013). Principles of big data: preparing, sharing, and analyzing complex information. MA, USA: Newnes,Morgan Kaufmann, Elsevier. Bertrand, C. (2005). Business continuity and mission critical applications. Network Security, 2005(8), 9-11. doi: http://dx.doi.org/10.1016/S1353-4858(05)70269-5 Bianco, A., Giraudo, L., &; Hay, D. (2010, 6-10 Dec. 2010). Optimal Resource Allocation for Disaster Recovery. Paper presented at the Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. Bowen, P., Hash, J., &; Wilson, M. (2006). SP 800-100. Information Security Handbook: A Guide for Managers. USA: NIST. Boyd, D., &; Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, communication &; society, 15(5), 662-679. Broder, J. F., &; Tucker, E. (2011). Risk analysis and the security survey: Elsevier. Brooks, C., Bedernjak, M., Juran, I., &; Merryman, J. (2002). Disaster Recovery Strategies. Retrieved from ftp://skolai.daba.lv/pub/Arhivatori/adsm_clients/SG246844/sg246844_disaster_recovery.pdf: IBM Redbook. Bryson, K.-M., Millar, H., Joseph, A., &; Mobolurin, A. (2002). Using formal MS/OR modeling to support disaster recovery planning. European Journal of Operational Research, 141(3), 679-688. doi: http://dx.doi.org/10.1016/S0377-2217(01)00275-2 BS25999. (2007). 25999-2 Business Continuity Management-Part2: Specification Business Continuity Management: Retrieved from From http://www.25999.info/bs25999-2.htm Buffington, J., &; Rouda, N. (2014). Data Protection and Disaster Recovery for Big Data. Enterprise Strategy Group Research Report. Cegiela, R. (2006, 25-27 May 2006). Selecting Technology for Disaster Recovery. Paper presented at the Dependability of Computer Systems, 2006. DepCos-RELCOMEX '06. International Conference on. Chang, R. M., Kauffman, R. J., &; Kwon, Y. (2014). Understanding the paradigm shift to computational social science in the presence of big data. Decision Support Systems, 63(0), 67-80. doi: http://dx.doi.org/10.1016/j.dss.2013.08.008 Chang, Y., Wilkinson, S., Potangaroa, R., &; Seville, E. (2012). Managing resources in disaster recovery projects. Engineering, Construction and Architectural Management, 19(5), 557-580. Chen, C. P., &; Zhang, C.-Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, 314-347. Chen, R., Sharman, R., Rao, H. R., &; Upadhyaya, S. J. (2008). Coordination in emergency response management. Communications of the ACM, 51(5), 66-73. Chisholm, P. (2008). Disaster Recovery Planning Is Business-Critical. The CPA Journal, 78(7), 11. Chun, B.-G., Ihm, S., Maniatis, P., &; Naik, M. (2010). Clonecloud: boosting mobile device applications through cloud clone execution. arXiv preprint arXiv:1009.3088. . Clitherow, D., Brookbanks, M., Clayton, N., &; Spear, G. (2008). Combining high availability and disaster recovery solutions for critical IT environments. IBM Systems Journal, 47(4), 563-575. doi: 10.1147/sj.2008.5386509 Council, T. E. T. D. (2013). TAIWAN ICT INDUSTRY. Taiwan External Trade Development Council. Covas, M. T., Silva, C. A., &; Dias, L. C. (2013). On locating sustainable Data Centers in Portugal: Problem structuring and GIS-based analysis. Sustainable Computing: Informatics and Systems, 3(1), 27-35. doi: http://dx.doi.org/10.1016/j.suscom.2012.12.001 Dai, S.-Y., &; Kuo, S.-Y. (2007). Mapmon: A host-based malware detection tool. Paper presented at the Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on. Daim, T. U., Bhatla, A., &; Mansour, M. (2013). Site selection for a data centre–a multi-criteria decision-making model. International Journal of Sustainable Engineering, 6(1), 10-22. de Boer, J. (1995). An introduction to disaster medicine in Europe. The Journal of Emergency Medicine, 13(2), 211-216. doi: http://dx.doi.org/10.1016/0736-4679(94)00147-2 Dekle, J., Lavieri, M. S., Martin, E., Emir-Farinas, H., &; Francis, R. L. (2005). A Florida county locates disaster recovery centers. Interfaces, 35(2), 133-139. Dermol, U., &; Kontić, B. (2011). Use of strategic environmental assessment in the site selection process for a radioactive waste disposal facility in Slovenia. Journal of Environmental Management, 92(1), 43-52. doi: http://dx.doi.org/10.1016/j.jenvman.2010.08.010 Dilley, M. (2005). Natural disaster hotspots: a global risk analysis (Vol. 5): World Bank Publications. Dissanayake, S., &; Önal, H. (2011). Amenity driven price effects and conservation reserve site selection: A dynamic linear integer programming approach. Ecological Economics, 70(12), 2225-2235. Dix, J. (2013). Cloud computing causing rethinking of disaster recovery Feng, N., &; Li, M. (2011). An information systems security risk assessment model under uncertain environment. Applied Soft Computing, 11(7), 4332-4340. doi: http://dx.doi.org/10.1016/j.asoc.2010.06.005 Fontela, E., &; Gabus, A. (1976). The DEMATEL observer: DEMATEL. Forrum, W. E. (2013). The Global Competitiveness Report 2013 - 2014 World Economic Forum. Fothergill, A., Maestas, E. G., &; Darlington, J. D. (1999). Race, ethnicity and disasters in the United States: A review of the literature. Disasters, 23(2), 156-173. Fothergill, A., &; Peek, L. A. (2004). Poverty and disasters in the United States: A review of recent sociological findings. Natural hazards, 32(1), 89-110. Görmez, N., Köksalan, M., &; Salman, F. (2011). Locating disaster response facilities in Istanbul. Journal of the Operational Research Society, 62(7), 1239-1252. Gandomi, A., &; Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2014.10.007 Gantz, J., &; Reinsel, D. (2011). Extracting value from chaos. IDC iview(1142), 9-10. García, J. L., Alvarado, A., Blanco, J., Jiménez, E., Maldonado, A. A., &; Cortés, G. (2014). Multi-attribute evaluation and selection of sites for agricultural product warehouses based on an Analytic Hierarchy Process. Computers and Electronics in Agriculture, 100(0), 60-69. doi: http://dx.doi.org/10.1016/j.compag.2013.10.009 Garlasu, D., Sandulescu, V., Halcu, I., Neculoiu, G., Grigoriu, O., Marinescu, M., &; Marinescu, V. (2013). A big data implementation based on Grid computing. Paper presented at the Roedunet International Conference (RoEduNet), 2013 11th. GartnerGroup. ( 2009). Gartner IT Infrastructure, Operations and Management Summit. Orlando, FL: Gartner Group. Ginda, G., &; Dytczak, M. (2009). Identification of building repair policy choice criteria role. Technological and Economic Development of Economy(2), 213-228. Gregory, P. H. (2011). IT disaster recovery planning for dummies: John Wiley &; Sons. Group, G. (2012). The Importance of 'Big Data': A Definition: Gartner Group. Hale, T., &; Moberg, C. R. (2005). Improving supply chain disaster preparedness: a decision process for secure site location. International Journal of Physical Distribution &; Logistics Management, 35(3), 195-207. Hanaoka, S., &; Qadir, F. M. (2005). Logistics problems in recovery assistance of Indian Ocean earthquake and tsunami disaster. Paper presented at the Scientific Forum on The Tsunami, Its Impact and Recovery. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., &; Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47(0), 98-115. doi: http://dx.doi.org/10.1016/j.is.2014.07.006 Hassin, R., Ravi, R., &; Salman, F. S. (2010). Facility location on a network with unreliable links: Working paper. Retrieved October 24, 2012, from http://www. di. unipi. it/di/groups/optimize/Events/proceedings/M/B/4/MB4-4. pdf. Hawkins, S. M., Yen, D. C., &; Chou, D. C. (2000). Disaster recovery planning: a strategy for data security. Information Management &; Computer Security, 8(5), 222-230. He, Q., Guo, Y., Wang, Y., &; Qiang, B. (2013, 14-16 Aug. 2013). A web site protection oriented remote backup and recovery method. Paper presented at the Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on. Herbane, B., Elliott, D., &; Swartz, E. M. (2004). Business continuity management: time for a strategic role? Long Range Planning, 37(5), 435-457. Hiles, A. (2010). The definitive handbook of business continuity management: John Wiley &; Sons. Hoopes, J. (2009). Chapter 10 - Disaster Recovery. Boston: Syngress. Hristidis, V., Chen, S.-C., Li, T., Luis, S., &; Deng, Y. (2010). Survey of data management and analysis in disaster situations. Journal of Systems and Software, 83(10), 1701-1714. Hsu, C.-Y., Chen, K.-T., &; Tzeng, G.-H. (2007). FMCDM with fuzzy DEMATEL approach for customers' choice behavior model. International Journal of Fuzzy Systems, 9(4), 236. Huang, C.-Y., Shyu, J. Z., &; Tzeng, G.-H. (2007). Reconfiguring the innovation policy portfolios for Taiwan's SIP Mall industry. Technovation, 27(12), 744-765. IDC. ( 2009). Digital data to double every 18 months, worldwide marketplace model and forecast. Framingham, MA. . Iyer, R. K., &; Sarkis, J. (1998). Disaster recovery planning in an automated manufacturing environment. Engineering Management, IEEE Transactions on, 45(2), 163-175. Järveläinen, J. (2013). IT incidents and business impacts: Validating a framework for continuity management in information systems. International Journal of Information Management, 33(3), 583-590. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2013.03.001 Jia, H., Ordóñez, F., &; Dessouky, M. (2007). A modeling framework for facility location of medical services for large-scale emergencies. IIE transactions, 39(1), 41-55. Judson, J. (2012). Disaster Recovery Best Practices - Templates, Documents and Examples of Disaster Recovery in the Public Domain PLUS access to content.theartofservice.com for downloading: Emereo Publishing. Kaisler, S., Armour, F., Espinosa, J. A., &; Money, W. (2013, 7-10 Jan. 2013). Big Data: Issues and Challenges Moving Forward. Paper presented at the System Sciences (HICSS), 2013 46th Hawaii International Conference on. Kambatla, K., Kollias, G., Kumar, V., &; Grama, A. (2014). Trends in big data analytics. Journal of Parallel and Distributed Computing, 74(7), 2561-2573. Kankanhalli, A., Teo, H.-H., Tan, B. C., &; Wei, K.-K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139-154. Kant, K. (2009). Data center evolution: A tutorial on state of the art, issues, and challenges. Computer Networks, 53(17), 2939-2965. doi: http://dx.doi.org/10.1016/j.comnet.2009.10.004 Katal, A., Wazid, M., &; Goudar, R. H. (2013, 8-10 Aug. 2013). Big data: Issues, challenges, tools and Good practices. Paper presented at the Contemporary Computing (IC3), 2013 Sixth International Conference on. King, R. P., Halim, N., Garcia-Molina, H., &; Polyzois, C. A. (1991). Management of a remote backup copy for disaster recovery. ACM Transactions on Database Systems (TODS), 16(2), 338-368. Kshetri, N. (2014). Big data׳s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145. doi: http://dx.doi.org/10.1016/j.telpol.2014.10.002 Lee, C.-W., Hsieh, K.-Y., Hsieh, S.-Y., &; Hsiao, H.-C. (2014). A Dynamic Data Placement Strategy for Hadoop in Heterogeneous Environments. Big Data Research, 1(0), 14-22. doi: http://dx.doi.org/10.1016/j.bdr.2014.07.002 Lee, S.-G., Chae, S. H., &; Cho, K. M. (2013). Drivers and inhibitors of SaaS adoption in Korea. International Journal of Information Management, 33(3), 429-440. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.006 Lee, Y.-C., Li, M.-L., Yen, T.-M., &; Huang, T.-H. (2010). Analysis of adopting an integrated decision making trial and evaluation laboratory on a technology acceptance model. Expert Systems with Applications, 37(2), 1745-1754. Li, W., Yang, Y., &; Yuan, D. (2015). 6 - Cost-effective data reliability assurance for data maintenance. In W. Li, Y. Yang &; D. Yuan (Eds.), Reliability Assurance of Big Data in the Cloud (pp. 45-63). Boston: Morgan Kaufmann. Lin, G., Deze, Z., Peng, L., &; Song, G. (2014). Cost Minimization for Big Data Processing in Geo-Distributed Data Centers. Emerging Topics in Computing, IEEE Transactions on, 2(3), 314-323. doi: 10.1109/TETC.2014.2310456 Lin, L., Shuang, W., Yifang, L., &; Shouyang, W. (2014). A New Idea of Study on the Influence Factors of Companies’ Debt Costs in the Big Data Era. Procedia Computer Science, 31(0), 532-541. doi: http://dx.doi.org/10.1016/j.procs.2014.05.299 Lindell, M. K., &; Prater, C. S. (2003). Assessing community impacts of natural disasters. Natural Hazards Review, 4(4), 176-185. Losada, C., Scaparra, M. P., &; O’Hanley, J. R. (2012). Optimizing system resilience: a facility protection model with recovery time. European Journal of Operational Research, 217(3), 519-530. Lumpp, T., Schneider, J., Holtz, J., Mueller, M., Lenz, N., Biazetti, A., &; Petersen, D. (2008). From high availability and disaster recovery to business continuity solutions. IBM Systems Journal, 47(4), 605-619. Lynch, C. (2008). Big data: How do your data grow? Nature, 455(7209), 28-29. Lyon, L. (2014). Disaster Recovery and the Big Data Application. Database journal, from http://www.databasejournal.com/features/db2/disaster-recovery-and-the-big-data-application.html MacGregor, B., &; Morrison, D. E. (1995). From focus groups to editing groups. A new method of reception analysis. Media Culture and Society, 17(1), 141-150. Manovich, L. (2011). Trending: the promises and the challenges of big social data. McDowall, R. (2001). Computer (In) security–2: computer system backup and recovery. The Quality Assurance Journal, 5(3), 149-155. Minelli, M., Chambers, M., &; Dhiraj, A. (2012). Big data, big analytics: emerging business intelligence and analytic trends for today's businesses: John Wiley &; Sons. Miyagawa, M. (2012). Joint distribution of distances to the first and the second nearest facilities. Journal of geographical systems, 14(2), 209-222. Nakamura, S., Nakayama, K., &; Nakagawa, T. (2009). Optimal backup interval of database by incremental backup method. Paper presented at the Industrial Engineering and Engineering Management, 2009. IEEM 2009. IEEE International Conference on. NASA. (2003). Cyber security: the status of information security and the effects of the Federal Information Security Management Act (FISMA) at NASA: National Aeronautics and Space Administration(NASA).USA. Nigg, J. M. (1995). Disaster recovery as a social process. Ning, W., &; Luo, P. (2008, 12-14 Oct. 2008). Research on the Information Resources Management Center Construction in E-Government. Paper presented at the Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. Omar, A., Alijani, D., &; Mason, R. (2011). Information technology disaster recovery plan: Case study. Academy of Strategic Management Journal, 10(2), 127-141. Opricovic, S. (1998). Multicriteria optimization of civil engineering systems. Faculty of Civil Engineering, Belgrade, 2(1), 5-21. Opricovic, S., &; Tzeng, G.-H. (2004). Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS. European Journal of Operational Research, 156(2), 445-455. Ou Yang, Y.-P., Shieh, H.-M., Leu, J.-D., &; Tzeng, G.-H. (2008). A novel hybrid MCDM model combined with DEMATEL and ANP with applications. International Journal of Operations Research, 5(3), 160-168. Pereira, N., Carneiro, J. F., Araújo, A., Bezzeghoud, M., &; Borges, J. (2014). Seismic and structural geology constraints to the selection of CO2 storage sites—The case of the onshore Lusitanian basin, Portugal. Journal of Applied Geophysics, 102(0), 21-38. doi: http://dx.doi.org/10.1016/j.jappgeo.2013.12.001 Philip Chen, C. L., &; Zhang, C.-Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275(0), 314-347. doi: http://dx.doi.org/10.1016/j.ins.2014.01.015 Pirkul, H., &; Schilling, D. (1989). The capacitated maximal covering location problem with backup service. Annals of Operations Research, 18(1), 141-154. Power, D. J. (2014). Using ‘Big Data’for analytics and decision support. Journal of Decision Systems, 23(2), 222-228. Rajagopalan, S., Cully, B., O'Connor, R., &; Warfield, A. (2012). SecondSite: disaster tolerance as a service. Paper presented at the ACM SIGPLAN Notices. Reich, B. H., &; Benbasat, I. (2000). Factors that influence the social dimension of alignment between business and information technology objectives. MIS quarterly, 81-113. Rikalovic, A., Cosic, I., &; Lazarevic, D. (2014). GIS Based Multi-criteria Analysis for Industrial Site Selection. Procedia Engineering, 69(0), 1054-1063. doi: http://dx.doi.org/10.1016/j.proeng.2014.03.090 Riolli, L., &; Savicki, V. (2003). Information system organizational resilience. Omega, 31(3), 227-233. Rivera, T. (2014). Protechting data in the big data world: SNIA-Data protection and capacity optimization commitee. Roberts, W. C. (2006, 23-25 Oct. 2006). Business Continuity Planning for Disasters is Just Good Planning. Paper presented at the Military Communications Conference, 2006. MILCOM 2006. IEEE. Roebuck, K. (2012). Business continuity and disaster recovery: High-impact Technology - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors: Emereo Publishing. Rose, A. (2007). Economic resilience to natural and man-made disasters: Multidisciplinary origins and contextual dimensions. Environmental Hazards, 7(4), 383-398. Rose, A. Z. (2009). A framework for analyzing the total economic impacts of terrorist attacks and natural disasters. Journal of Homeland Security and Emergency Management, 6(1). Rothstein, P. J. (2007). Disaster Recovery Testing: Exercising Your Contingency Plan (2007 Edition): Rothstein Associates Incorporated. Rozanski, N., &; Woods, E. (2011). Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives: Pearson Education. Rutherford, W. H., &; de Boer, J. (1983). The definition and classification of disasters. Injury, 15(1), 10-12. doi: http://dx.doi.org/10.1016/0020-1383(83)90154-7. Saaty, T. L. (1999). Decision making for leaders: the analytic hierarchy process for decisions in a complex world (Vol. 2): RWS publications. Salmela, H. (2008). Analysing business losses caused by information systems risk: a business process analysis approach. Journal of Information Technology, 23(3), 185-202. Schniederjans, M. J., Hoffman, J. J., &; Sirmans, G. S. (1995). Using goal programming and the analytic hierarchy process in house selection. The Journal of Real Estate Finance and Economics, 11(2), 167-176. Seifert, J. W. (2002). The effects of September 11, 2001, terrorist attacks on public and private information infrastructures: a preliminary assessment of lessons learned. Government Information Quarterly, 19(3), 225-242. Sembiring, J., &; Siregar, M. I. H. (2013). A Decision Model for IT Risk Management on Disaster Recovery Center in an Enterprise Architecture Model. Procedia Technology, 11(0), 1142-1146. doi: http://dx.doi.org/10.1016/j.protcy.2013.12.306 Sengupta, S., &; Annervaz, K. (2014). Multi-site data distribution for disaster recovery—A planning framework. Future Generation Computer Systems, 41, 53-64. Serrelis, E., &; Alexandris, N. (2006, 26-28 Aug. 2006). Disaster Recovery Sites as a Tool of Managing Extreme Attacks. Paper presented at the Internet Surveillance and Protection, 2006. ICISP '06. International Conference on. Shafer, J. ( 2010). I/O virtualization bottlenecks in cloud computing today. Paper presented at the Proceedings of the 2nd conference on I/O virtualization. Smith, G. (2012). Planning for Post-Disaster Recovery: A Review of the United States Disaster Assistance Framework: Island Press. Snedaker, S. (2013). Business continuity and disaster recovery: Planning for IT professionals: Newnes. Spillan, J., &; Hough, M. (2003). Crisis planning in small businesses:: Importance, Impetus and Indifference. European Management Journal, 21(3), 398-407. Stewart, D. W. (2007). Focus groups: Theory and practice (Vol. 20): Sage. Sutton, S. G., &; Arnold, V. (2013). Focus group methods: Using interactive and nominal groups to explore emerging technology-driven phenomena in accounting and information systems. International Journal of Accounting Information Systems, 14(2), 81-88. Tammineedi, R. L. (2010). Business continuity management: a standards-based approach. Information Security Journal: A Global Perspective, 19(1), 36-50. TechAdvisory.org. (2010). Disaster Recovery: An Increasingly Important Aspect of Your Business Teeft, C. (2014). 3 Cool New Disaster Recovery Technologies. Thompson, R. G., Singleton Jr, F., Thrall, R. M., &; Smith, B. A. (1986). Comparative site evaluations for locating a high-energy physics lab in Texas. Interfaces, 16(6), 35-49. Tian, W., &; Zhao, Y. (2015). 2 - Big Data Technologies and Cloud Computing. In W. Tian &; Y. Zhao (Eds.), Optimized Cloud Resource Management and Scheduling (pp. 17-49). Boston: Morgan Kaufmann. Toigo, J. W. (2000). Disaster Recovery Planning: Strategies for Protecting Critical Information: Prentice Hall PTR. Torabi, S., &; Mansouri, S. (2015). Integrated business continuity and disaster recovery planning: Towards organizational resilienceAuthor-Name: Sahebjamnia, N. European Journal of Operational Research, 242(1), 261-273. Tso, Y.-E., &; McEntire, D. A. (2007). Emergency Management in Taiwan: Learning from Past and Current Experiences. Ueno, Y., Miyaho, N., Suzuki, S., &; Ichihara, K. (2010, 22-27 Aug. 2010). Performance Evaluation of a Disaster Recovery System and Practical Network System Applications. Paper presented at the Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on. Vahidnia, M. H., Alesheikh, A. A., &; Alimohammadi, A. (2009). Hospital site selection using fuzzy AHP and its derivatives. Journal of environmental management, 90(10), 3048-3056. Van Aalst, M. K. (2006). The impacts of climate change on the risk of natural disasters. Disasters, 30(1), 5-18. Villars, R. L., Olofson, C. W., &; Eastwood, M. (2011). Big data: What it is and why you should care. White Paper, IDC. Wallace, M., Webber, L., &; Webber, L. (2011). The Disaster Recovery Handbook: A Step-by-step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets: AMACOM. Wang, G., Qin, L., Li, G., &; Chen, L. (2009). Landfill site selection using spatial information technologies and AHP: a case study in Beijing, China. Journal of Environmental Management, 90(8), 2414-2421. Whitson, G. (2003). Computer security: theory, process and management. Journal of computing sciences in colleges, 18(6), 57-66. Wiboonrat, M. (2008, 28-30 June 2008). An empirical IT contingency planning model for disaster recovery strategy selection. Paper presented at the Engineering Management Conference, 2008. IEMC Europe 2008. IEEE International. Woldu, L. (2013). Cloud Governance Model and Security for Cloud Service Providers. Wood, T., Cecchet, E., Ramakrishnan, K., Shenoy, P., Van Der Merwe, J., &; Venkataramani, A. (2010). Disaster recovery as a cloud service: Economic benefits &; deployment challenges. Paper presented at the Proceedings of the 2nd USENIX conference on Hot topics in cloud computing. Wu, H.-H., Chen, H.-K., &; Shieh, J.-I. (2010). Evaluating performance criteria of Employment Service Outreach Program personnel by DEMATEL method. Expert Systems with Applications, 37(7), 5219-5223. Wu, H.-H., &; Tsai, Y.-N. (2011). A DEMATEL method to evaluate the causal relations among the criteria in auto spare parts industry. Applied Mathematics and Computation, 218(5), 2334-2342. Zhang, N., Yan, Y., Xu, S., &; Su, W. (2014). A distributed data storage and processing framework for next-generation residential distribution systems. Electric Power Systems Research, 116(0), 174-181. doi: http://dx.doi.org/10.1016/j.epsr.2014.06.005 Zheng, F., &; Wang, F. (2014). Modeling location problem of the regional disaster recovery centers for emergency platform system. Paper presented at the Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on. Zhou, Q., Huang, W., &; Zhang, Y. (2011). Identifying critical success factors in emergency management using a fuzzy DEMATEL method. Safety Science, 49(2), 243-252. Zikopoulos, P., &; Eaton, C. (2011). Understanding big data: Analytics for enterprise class hadoop and streaming data: McGraw-Hill Osborne Media. Zikopoulos, P., Parasuraman, K., Deutsch, T., Giles, J., &; Corrigan, D. (2012). Harness the Power of Big Data The IBM Big Data Platform: McGraw Hill Professional. Zsidisin, G. A., Melnyk, S. A., &; Ragatz, G. L. (2005). An institutional theory perspective of business continuity planning for purchasing and supply management. International journal of production research, 43(16), 3401-3420.
|