2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT) 2017
DOI: 10.1109/caipt.2017.8320736
|View full text |Cite
|
Sign up to set email alerts
|

Risk analysis on the development of a business continuity plan

Abstract: In the era of globalization increasingly advanced enterprise engaged in the sale of concrete iron will execute business processes by using software, hardware, networking, and others. Judging from the condition and the current reality of this company did not rule out the occurrence of the risk due to the problems in terms of data security, data integrity, hard disk damage, IT business continuity process. In this research conducted a risk analysis of the entire area of IT and business processes within the compan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 2 publications
0
3
0
1
Order By: Relevance
“…Penelitian tersebut merancang BCP menggunakan siklus PDSA (Plan-Do-Study-Act) dan menghasilkan daftar strategi efektif yang dapat diterapkan ketika catatan kesehatan elektronik terhenti [10]. Penelitian lain telah merancang BCP dengan menggunakan tahapan 1) inisiasi projek, 2) penilaian risiko, 3) analisis dampak bisnis, 4) strategi mitigasi, 5) pengembangan BCP, 6) pengujian dan audit, 7) pemeliharaan, namun penelitian tersebut lebih berfokus pada penilaian dan evaluasi risiko [11]. Selain itu, juga terdapat peneliti yang merancang BCP menggunakan acuan ISO 22301:2102 [12] [13].…”
Section: Tinjauan Literaturunclassified
“…Penelitian tersebut merancang BCP menggunakan siklus PDSA (Plan-Do-Study-Act) dan menghasilkan daftar strategi efektif yang dapat diterapkan ketika catatan kesehatan elektronik terhenti [10]. Penelitian lain telah merancang BCP dengan menggunakan tahapan 1) inisiasi projek, 2) penilaian risiko, 3) analisis dampak bisnis, 4) strategi mitigasi, 5) pengembangan BCP, 6) pengujian dan audit, 7) pemeliharaan, namun penelitian tersebut lebih berfokus pada penilaian dan evaluasi risiko [11]. Selain itu, juga terdapat peneliti yang merancang BCP menggunakan acuan ISO 22301:2102 [12] [13].…”
Section: Tinjauan Literaturunclassified
“…These networks provide a large amount of information that can be accessed anonymously, making them ideal platforms for spreading false information, mischief, and misdemeanors: fraudsters and attackers can hide their harmful actions within the mountains of data. As these networks continue to spread, fraudsters' possibilities to manipulate them for their own gain have grown as well [61,62].…”
Section: Risk Control and Fraud Detectionmentioning
confidence: 99%
“…Furthermore, they can help in dealing with similar virus outbreaks in the future. A disturbing incident is any form of security breach, whether intentional or not, that causes economic growth to not run normally [5].…”
Section: Introductionmentioning
confidence: 99%