Business continuity strategies: protecting against unplanned disasters
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
2006
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Rev. ed. of: Manager's guide to contingency planning for disasters. 2nd ed. c1999. -- Includes index. |
Beschreibung: | 203 S. |
ISBN: | 0470040386 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022491638 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 070703s2006 xxu |||| 00||| eng d | ||
010 | |a 2006046217 | ||
020 | |a 0470040386 |c cloth |9 0-470-04038-6 | ||
035 | |a (OCoLC)68416996 | ||
035 | |a (DE-599)BVBBV022491638 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1051 | ||
050 | 0 | |a HD49 | |
082 | 0 | |a 658.4/056 |2 22 | |
084 | |a QP 300 |0 (DE-625)141850: |2 rvk | ||
084 | |a QP 340 |0 (DE-625)141861: |2 rvk | ||
100 | 1 | |a Myers, Kenneth N. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Business continuity strategies |b protecting against unplanned disasters |c Kenneth N. Myers |
264 | 1 | |a Hoboken, N.J. |b Wiley |c 2006 | |
300 | |a 203 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Rev. ed. of: Manager's guide to contingency planning for disasters. 2nd ed. c1999. -- Includes index. | ||
650 | 4 | |a Crisis management | |
650 | 4 | |a Risk assessment | |
650 | 4 | |a Strategic planning | |
650 | 0 | 7 | |a Krisenmanagement |0 (DE-588)4127374-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Strategisches Management |0 (DE-588)4124261-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Krisenmanagement |0 (DE-588)4127374-6 |D s |
689 | 0 | 1 | |a Strategisches Management |0 (DE-588)4124261-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015698849&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015698849 |
Datensatz im Suchindex
_version_ | 1804136587154423808 |
---|---|
adam_text | Contents
About the Author xv
Preface xvii
1 Defining the Problem 1
Business Continuity Concerns 1
Telephone Communications I
Computer Processing 2
Vital Facilities 6
Only a Computer Recovery Plan 7
Current Program May Not Work 8
Characteristics of a Sound Program 9
Cost Reduction Opportunities 10
How to Contain Program Development Costs 12
Where to Look for Cost Reductions in an Existing Computer Disaster
Recovery Plan 14
Audit Concerns 16
Involving Department Managers 17
Need for Cost Effective Solutions 18
Backup 19
2 Workplace Violence 21
Background 21
What Is Workplace Violence? 21
Who Is Vulnerable? 21
Contributing Factors 22
Liability 22
Employer Liability 22
Security 23
vii
viii Contents
Workplace Violence Incidents 24
Three Stages Prior to Workplace Violence 25
Prevention 25
Policy and Strategy 25
Workplace Violence and Boards of Directors 26
Reducing Exposure to Workplace Violence 26
What Can Employers Do to Protect Employees? 27
How Can Employees Protect Themselves? 27
Warning Signs of Violence 28
Performance Indicators 28
Employee Training 29
Supervisory Training 29
Alternate Dispute Resolution 30
Incident Response Team Training 30
Incident Response 31
Critical Incident Stress Debriefing 31
Recommendation 32
3 Final Reports of the Federal Building
and Fire Investigation of the World Trade Center Disaster 33
Introduction 33
Genesis of This Investigation 33
November 29, 2005 Report Recommendations 34
Increased Structural Integrity 36
Recommendation 1 36
Recommendation 2 37
Recommendation 3 38
Enhanced Fire Endurance of Structures 39
Recommendation 4 39
Recommendation 5 41
Recommendation 6 42
Recommendation 7 43
New Methods for Fire Resistant Design of Structures 44
Recommendation 8 44
Recommendation 9 45
Recommendation 10 46
Recommendation 11 47
Improved Active Fire Protection 48
Recommendation 12 48
Recommendation 13 49
Recommendation 14 50
Recommendation 15 51
Contents ix
Improved Building Evacuation 52
Recommendation 16 52
Recommendation 17 53
Recommendation 18 54
Recommendation 19 55
Recommendation 20 56
Improved Emergency Response 57
Recommendation 21 57
Recommendation 22 58
Recommendation 23 59
Recommendation 24 60
Improved Procedures and Practices 61
Recommendation 25 61
Recommendation 26 62
Recommendation 27 63
Recommendation 28 64
Education and Training 65
Recommendation 29 65
Recommendation 30 66
Looking Forward 67
4 New Contingency Program Paradigm 69
Background 69
Strategies versus Plans 69
Terrorist Incidents 70
Terrorism, Workplace Violence, and Boards of Directors 70
Old Paradigm 71
Organizational Responsibility 71
Foreign Corrupt Practices Act 71
Common Mistakes 72
Computer Oriented 72
Systemic Problems 74
New Paradigm 75
Mind Set 75
Organizational Responsibility 75
Terrorism 75
Facility Oriented 75
Workplace Violence 76
Contingency Program Components 76
Transitioning to the New Paradigm 78
Organizational Responsibility 78
Policy and Strategy 78
Development of Interim Processing Strategies 79
X Contents
5 Developing a Contingency Program 81
Management s Responsibility 81
How Much Market Share Could Cost You? 81
Protect Against What? 82
Contingency Planning Requires Specialization 83
Increased Technology Dependency 84
Corporate Issue 85
Contingency Program Phases 85
Prevention 87
Incident Recovery 87
Interim Processing 88
Discretionary Expense 89
Project Planning 90
Policy and Strategy 90
Limit Scope 91
Limit the Time Periods 92
Surgical Process 93
Game Plan 94
Team Concept 101
Prototype Programs 103
Awareness Education 104
Business and Environment 104
Types of Disasters 104
Potential Impact on Business 105
Program Objectives 108
Insurance Considerations 112
How Much Detail? 115
Establishing a Firm Foundation 116
Key ResuIt Areas 117
Convincing Others 119
Executive Briefings 122
Business Impact Analysis 124
Objective 124
What Is Really Critical 126
Awareness and Education 127
Regulatory Agency Reporting Requirements 129
Window 130
Selecting a Methodology 131
Philosophy 131
Setting the Stage for Success 133
Program Requirements 135
Program Development Steps 136
Key Tasks 137
Contents xi
Developing What If Interim Processing Strategies 139
Computer Processing Alternatives 140
Documentation 144
Cost Benefits 150
Corporate Benefits 152
Implementation 154
Tailor Presentations 154
Role of Senior Management 155
Role of a Steering Committee 155
Role of Department Managers 156
Role of First Line Supervisors 157
Role of Outside Specialists 158
Develop Program with First Line Supervisors 158
Obtain Department Managers Approval 165
Noncomputerized Business Functions 165
Maintenance and Testing 167
Objectives 167
Maintenance 167
Continuing Education and Preparedness Reviews 168
Technology Testing 169
6 Guidelines for Developing Contingency Programs
at Multiple Locations 173
Background 173
Objectives and Scope 173
Section I: Organization 174
Placement of Contingency Planning Activity 174
Organizational Functions 175
Section II: Standards for Implementation Planning 176
Methods Standards 176
Performance Standards 178
Section III: Standards for Developing Interim Processing Strategies 179
Methods Standards 179
Performance Standards 181
Section IV: Documentation Standards 182
Methods Standards 182
Peifonnance Standards 185
Section V: Standards for Ongoing Maintenance and Testing 186
Methods Standards 186
Performance Standards 188
7 Conceptual Business Continuity Strategies
for Loss of Computer Operations 189
xii Contents
Policy and Strategy 189
Policy 189
Strategy 189
Executive Summary 190
Normal Operations 190
Emergency Response 190
Interim Processing 191
Maintenance and User Continuing Education and Preparedness 191
Reviews
Glossary 195
Index 197
|
adam_txt |
Contents
About the Author xv
Preface xvii
1 Defining the Problem 1
Business Continuity Concerns 1
Telephone Communications I
Computer Processing 2
Vital Facilities 6
Only a Computer Recovery Plan 7
Current Program May Not Work 8
Characteristics of a Sound Program 9
Cost Reduction Opportunities 10
How to Contain Program Development Costs 12
Where to Look for Cost Reductions in an Existing Computer Disaster
Recovery Plan 14
Audit Concerns 16
Involving Department Managers 17
Need for Cost Effective Solutions 18
Backup 19
2 Workplace Violence 21
Background 21
What Is Workplace Violence? 21
Who Is Vulnerable? 21
Contributing Factors 22
Liability 22
Employer Liability 22
Security 23
vii
viii Contents
Workplace Violence Incidents 24
Three Stages Prior to Workplace Violence 25
Prevention 25
Policy and Strategy 25
Workplace Violence and Boards of Directors 26
Reducing Exposure to Workplace Violence 26
What Can Employers Do to Protect Employees? 27
How Can Employees Protect Themselves? 27
Warning Signs of Violence 28
Performance Indicators 28
Employee Training 29
Supervisory Training 29
Alternate Dispute Resolution 30
Incident Response Team Training 30
Incident Response 31
Critical Incident Stress Debriefing 31
Recommendation 32
3 Final Reports of the Federal Building
and Fire Investigation of the World Trade Center Disaster 33
Introduction 33
Genesis of This Investigation 33
November 29, 2005 Report Recommendations 34
Increased Structural Integrity 36
Recommendation 1 36
Recommendation 2 37
Recommendation 3 38
Enhanced Fire Endurance of Structures 39
Recommendation 4 39
Recommendation 5 41
Recommendation 6 42
Recommendation 7 43
New Methods for Fire Resistant Design of Structures 44
Recommendation 8 44
Recommendation 9 45
Recommendation 10 46
Recommendation 11 47
Improved Active Fire Protection 48
Recommendation 12 48
Recommendation 13 49
Recommendation 14 50
Recommendation 15 51
Contents ix
Improved Building Evacuation 52
Recommendation 16 52
Recommendation 17 53
Recommendation 18 54
Recommendation 19 55
Recommendation 20 56
Improved Emergency Response 57
Recommendation 21 57
Recommendation 22 58
Recommendation 23 59
Recommendation 24 60
Improved Procedures and Practices 61
Recommendation 25 61
Recommendation 26 62
Recommendation 27 63
Recommendation 28 64
Education and Training 65
Recommendation 29 65
Recommendation 30 66
Looking Forward 67
4 New Contingency Program Paradigm 69
Background 69
Strategies versus Plans 69
Terrorist Incidents 70
Terrorism, Workplace Violence, and Boards of Directors 70
Old Paradigm 71
Organizational Responsibility 71
Foreign Corrupt Practices Act 71
Common Mistakes 72
Computer Oriented 72
Systemic Problems 74
New Paradigm 75
Mind Set 75
Organizational Responsibility 75
Terrorism 75
Facility Oriented 75
Workplace Violence 76
Contingency Program Components 76
Transitioning to the New Paradigm 78
Organizational Responsibility 78
Policy and Strategy 78
Development of Interim Processing Strategies 79
X Contents
5 Developing a Contingency Program 81
Management's Responsibility 81
How Much Market Share Could Cost You? 81
Protect Against What? 82
Contingency Planning Requires Specialization 83
Increased Technology Dependency 84
Corporate Issue 85
Contingency Program Phases 85
Prevention 87
Incident Recovery 87
Interim Processing 88
Discretionary Expense 89
Project Planning 90
Policy and Strategy 90
Limit Scope 91
Limit the Time Periods 92
Surgical Process 93
Game Plan 94
Team Concept 101
Prototype Programs 103
Awareness Education 104
Business and Environment 104
Types of Disasters 104
Potential Impact on Business 105
Program Objectives 108
Insurance Considerations 112
How Much Detail? 115
Establishing a Firm Foundation 116
Key ResuIt Areas 117
Convincing Others 119
Executive Briefings 122
Business Impact Analysis 124
Objective 124
What Is Really Critical 126
Awareness and Education 127
Regulatory Agency Reporting Requirements 129
Window 130
Selecting a Methodology 131
Philosophy 131
Setting the Stage for Success 133
Program Requirements 135
Program Development Steps 136
Key Tasks 137
Contents xi
Developing "What If Interim Processing Strategies 139
Computer Processing Alternatives 140
Documentation 144
Cost Benefits 150
Corporate Benefits 152
Implementation 154
Tailor Presentations 154
Role of Senior Management 155
Role of a Steering Committee 155
Role of Department Managers 156
Role of First Line Supervisors 157
Role of Outside Specialists 158
Develop Program with First Line Supervisors 158
Obtain Department Managers'Approval 165
Noncomputerized Business Functions 165
Maintenance and Testing 167
Objectives 167
Maintenance 167
Continuing Education and Preparedness Reviews 168
Technology Testing 169
6 Guidelines for Developing Contingency Programs
at Multiple Locations 173
Background 173
Objectives and Scope 173
Section I: Organization 174
Placement of Contingency Planning Activity 174
Organizational Functions 175
Section II: Standards for Implementation Planning 176
Methods Standards 176
Performance Standards 178
Section III: Standards for Developing Interim Processing Strategies 179
Methods Standards 179
Performance Standards 181
Section IV: Documentation Standards 182
Methods Standards 182
Peifonnance Standards 185
Section V: Standards for Ongoing Maintenance and Testing 186
Methods Standards 186
Performance Standards 188
7 Conceptual Business Continuity Strategies
for Loss of Computer Operations 189
xii Contents
Policy and Strategy 189
Policy 189
Strategy 189
Executive Summary 190
Normal Operations 190
Emergency Response 190
Interim Processing 191
Maintenance and User Continuing Education and Preparedness 191
Reviews
Glossary 195
Index 197 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Myers, Kenneth N. |
author_facet | Myers, Kenneth N. |
author_role | aut |
author_sort | Myers, Kenneth N. |
author_variant | k n m kn knm |
building | Verbundindex |
bvnumber | BV022491638 |
callnumber-first | H - Social Science |
callnumber-label | HD49 |
callnumber-raw | HD49 |
callnumber-search | HD49 |
callnumber-sort | HD 249 |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_rvk | QP 300 QP 340 |
ctrlnum | (OCoLC)68416996 (DE-599)BVBBV022491638 |
dewey-full | 658.4/056 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/056 |
dewey-search | 658.4/056 |
dewey-sort | 3658.4 256 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01667nam a2200445zc 4500</leader><controlfield tag="001">BV022491638</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070703s2006 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006046217</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470040386</subfield><subfield code="c">cloth</subfield><subfield code="9">0-470-04038-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)68416996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022491638</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1051</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD49</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/056</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 300</subfield><subfield code="0">(DE-625)141850:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 340</subfield><subfield code="0">(DE-625)141861:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Myers, Kenneth N.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business continuity strategies</subfield><subfield code="b">protecting against unplanned disasters</subfield><subfield code="c">Kenneth N. Myers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">203 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Rev. ed. of: Manager's guide to contingency planning for disasters. 2nd ed. c1999. -- Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crisis management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Strategic planning</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Krisenmanagement</subfield><subfield code="0">(DE-588)4127374-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Strategisches Management</subfield><subfield code="0">(DE-588)4124261-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Krisenmanagement</subfield><subfield code="0">(DE-588)4127374-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Strategisches Management</subfield><subfield code="0">(DE-588)4124261-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015698849&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015698849</subfield></datafield></record></collection> |
id | DE-604.BV022491638 |
illustrated | Not Illustrated |
index_date | 2024-07-02T17:52:06Z |
indexdate | 2024-07-09T20:58:46Z |
institution | BVB |
isbn | 0470040386 |
language | English |
lccn | 2006046217 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015698849 |
oclc_num | 68416996 |
open_access_boolean | |
owner | DE-1051 |
owner_facet | DE-1051 |
physical | 203 S. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Wiley |
record_format | marc |
spelling | Myers, Kenneth N. Verfasser aut Business continuity strategies protecting against unplanned disasters Kenneth N. Myers Hoboken, N.J. Wiley 2006 203 S. txt rdacontent n rdamedia nc rdacarrier Rev. ed. of: Manager's guide to contingency planning for disasters. 2nd ed. c1999. -- Includes index. Crisis management Risk assessment Strategic planning Krisenmanagement (DE-588)4127374-6 gnd rswk-swf Strategisches Management (DE-588)4124261-0 gnd rswk-swf Krisenmanagement (DE-588)4127374-6 s Strategisches Management (DE-588)4124261-0 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015698849&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Myers, Kenneth N. Business continuity strategies protecting against unplanned disasters Crisis management Risk assessment Strategic planning Krisenmanagement (DE-588)4127374-6 gnd Strategisches Management (DE-588)4124261-0 gnd |
subject_GND | (DE-588)4127374-6 (DE-588)4124261-0 |
title | Business continuity strategies protecting against unplanned disasters |
title_auth | Business continuity strategies protecting against unplanned disasters |
title_exact_search | Business continuity strategies protecting against unplanned disasters |
title_exact_search_txtP | Business continuity strategies protecting against unplanned disasters |
title_full | Business continuity strategies protecting against unplanned disasters Kenneth N. Myers |
title_fullStr | Business continuity strategies protecting against unplanned disasters Kenneth N. Myers |
title_full_unstemmed | Business continuity strategies protecting against unplanned disasters Kenneth N. Myers |
title_short | Business continuity strategies |
title_sort | business continuity strategies protecting against unplanned disasters |
title_sub | protecting against unplanned disasters |
topic | Crisis management Risk assessment Strategic planning Krisenmanagement (DE-588)4127374-6 gnd Strategisches Management (DE-588)4124261-0 gnd |
topic_facet | Crisis management Risk assessment Strategic planning Krisenmanagement Strategisches Management |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015698849&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT myerskennethn businesscontinuitystrategiesprotectingagainstunplanneddisasters |