{"id":"https://openalex.org/W2070946571","doi":"https://doi.org/10.1108/09685229710182857","title":"A project planning process for business continuity","display_name":"A project planning process for business continuity","publication_year":1997,"publication_date":"1997-05-01","ids":{"openalex":"https://openalex.org/W2070946571","doi":"https://doi.org/10.1108/09685229710182857","mag":"2070946571"},"language":"en","primary_location":{"id":"doi:10.1108/09685229710182857","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229710182857","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083440268","display_name":"Kon Karakasidis","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137100","display_name":"KPMG (Australia)","ror":"https://ror.org/04cwh4511","country_code":"AU","type":"company","lineage":["https://openalex.org/I4210135825","https://openalex.org/I4210137100"]},{"id":"https://openalex.org/I8691672","display_name":"KPMG (United Kingdom)","ror":"https://ror.org/05rjsp326","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210135825","https://openalex.org/I8691672"]}],"countries":["AU","GB"],"is_corresponding":true,"raw_author_name":"Kon Karakasidis","raw_affiliation_strings":["KPMG Information Technology Consulting Division, Melbourne, Australia","(KPMG Information Technology Consulting Division, Melbourne, Australia)"],"affiliations":[{"raw_affiliation_string":"KPMG Information Technology Consulting Division, Melbourne, Australia","institution_ids":["https://openalex.org/I4210137100"]},{"raw_affiliation_string":"(KPMG Information Technology Consulting Division, Melbourne, Australia)","institution_ids":["https://openalex.org/I8691672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5083440268"],"corresponding_institution_ids":["https://openalex.org/I4210137100","https://openalex.org/I8691672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.30554049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"5","issue":"2","first_page":"72","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.9200999736785889,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.9200999736785889,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11912","display_name":"Outsourcing and Supply Chain Management","score":0.9071000218391418,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/timeline","display_name":"Timeline","score":0.8341846466064453},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.7113361358642578},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5533475875854492},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.4942372143268585},{"id":"https://openalex.org/keywords/business-process-modeling","display_name":"Business process modeling","score":0.4767654538154602},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.46455830335617065},{"id":"https://openalex.org/keywords/business-process-management","display_name":"Business process management","score":0.4623703956604004},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4509720504283905},{"id":"https://openalex.org/keywords/business-system-planning","display_name":"Business system planning","score":0.44763290882110596},{"id":"https://openalex.org/keywords/artifact-centric-business-process-model","display_name":"Artifact-centric business process model","score":0.4338854253292084},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.41432899236679077},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.4128047823905945},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3275523781776428},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.12852010130882263},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.11783221364021301},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09646058082580566}],"concepts":[{"id":"https://openalex.org/C4438859","wikidata":"https://www.wikidata.org/wiki/Q186117","display_name":"Timeline","level":2,"score":0.8341846466064453},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.7113361358642578},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5533475875854492},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.4942372143268585},{"id":"https://openalex.org/C207505557","wikidata":"https://www.wikidata.org/wiki/Q4374012","display_name":"Business process modeling","level":4,"score":0.4767654538154602},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.46455830335617065},{"id":"https://openalex.org/C80309976","wikidata":"https://www.wikidata.org/wiki/Q7007379","display_name":"Business process management","level":4,"score":0.4623703956604004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4509720504283905},{"id":"https://openalex.org/C18465707","wikidata":"https://www.wikidata.org/wiki/Q5001797","display_name":"Business system planning","level":2,"score":0.44763290882110596},{"id":"https://openalex.org/C162754035","wikidata":"https://www.wikidata.org/wiki/Q17006331","display_name":"Artifact-centric business process model","level":5,"score":0.4338854253292084},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.41432899236679077},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.4128047823905945},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3275523781776428},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.12852010130882263},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.11783221364021301},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09646058082580566},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685229710182857","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229710182857","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2184258672","https://openalex.org/W2066228984","https://openalex.org/W2534879192","https://openalex.org/W2999942143","https://openalex.org/W1488157296","https://openalex.org/W2163535864","https://openalex.org/W2465234653","https://openalex.org/W3152177532","https://openalex.org/W2097547132","https://openalex.org/W2154764760"],"abstract_inverted_index":{"Discusses":[0],"the":[1,13],"formulation":[2],"of":[3,21],"a":[4,9,19,27,34],"business":[5,14,28],"recovery":[6,15],"plan.":[7],"As":[8],"starting":[10],"point,":[11],"presents":[12],"timeline":[16],"model.":[17],"Gives":[18],"framework":[20],"components":[22],"to":[23],"be":[24],"considered":[25],"in":[26],"continuity":[29],"project":[30],"planning":[31],"process,":[32],"i.e.":[33],"risk":[35],"reduction":[36],"programme.":[37]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
