{"id":"https://openalex.org/W4360604859","doi":"https://doi.org/10.1109/icaiic57133.2023.10067127","title":"A Mini Literature Review on Integrating Cybersecurity for Business Continuity","display_name":"A Mini Literature Review on Integrating Cybersecurity for Business Continuity","publication_year":2023,"publication_date":"2023-02-20","ids":{"openalex":"https://openalex.org/W4360604859","doi":"https://doi.org/10.1109/icaiic57133.2023.10067127"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic57133.2023.10067127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic57133.2023.10067127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064618002","display_name":"Safa Altaha","orcid":"https://orcid.org/0009-0001-5751-7639"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Safa Altaha","raw_affiliation_strings":["King Faisal University,Dept. of Computer Networks &#x0026; Communications,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Faisal University,Dept. of Computer Networks &#x0026; Communications,Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067396198","display_name":"Mahabur Rahman","orcid":null},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"M M Hafizur Rahman","raw_affiliation_strings":["King Faisal University,Dept. of Computer Networks &#x0026; Communications,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Faisal University,Dept. of Computer Networks &#x0026; Communications,Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064618002"],"corresponding_institution_ids":["https://openalex.org/I4626487"],"apc_list":null,"apc_paid":null,"fwci":2.7533,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.91391703,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"353","last_page":"359"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.8694062829017639},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6759693622589111},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6674624681472778},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6015537977218628},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.586140513420105},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.5073577761650085},{"id":"https://openalex.org/keywords/disaster-recovery","display_name":"Disaster recovery","score":0.502732515335083},{"id":"https://openalex.org/keywords/business-operations","display_name":"Business operations","score":0.4993157386779785},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.49780845642089844},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4867120087146759},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.47153669595718384},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4688025116920471},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.38642898201942444},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.1651357114315033},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.15761855244636536},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.11614960432052612}],"concepts":[{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.8694062829017639},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6759693622589111},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6674624681472778},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6015537977218628},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.586140513420105},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.5073577761650085},{"id":"https://openalex.org/C129230348","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"Disaster recovery","level":2,"score":0.502732515335083},{"id":"https://openalex.org/C106201281","wikidata":"https://www.wikidata.org/wiki/Q336119","display_name":"Business operations","level":2,"score":0.4993157386779785},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.49780845642089844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4867120087146759},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.47153669595718384},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4688025116920471},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.38642898201942444},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.1651357114315033},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.15761855244636536},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.11614960432052612},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic57133.2023.10067127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic57133.2023.10067127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2005530480","https://openalex.org/W2410523426","https://openalex.org/W2560740547","https://openalex.org/W2921114734","https://openalex.org/W2981795700","https://openalex.org/W3026552127","https://openalex.org/W3132670582","https://openalex.org/W3138466396","https://openalex.org/W3186819284","https://openalex.org/W3193416175","https://openalex.org/W4239412360","https://openalex.org/W4321191075","https://openalex.org/W6714784988","https://openalex.org/W6769290993","https://openalex.org/W6799895753"],"related_works":["https://openalex.org/W2113707492","https://openalex.org/W573258854","https://openalex.org/W227301327","https://openalex.org/W1904939754","https://openalex.org/W1966853105","https://openalex.org/W4226067098","https://openalex.org/W2592168637","https://openalex.org/W3005858687","https://openalex.org/W2489141794","https://openalex.org/W2185671000"],"abstract_inverted_index":{"Governments,":[0],"organizations,":[1],"and":[2,12,23,37,55,77,81,101,104,113,127],"companies":[3],"shall":[4],"implement":[5],"some":[6],"measures":[7,84],"to":[8,58,109,116,131],"ensure":[9,117],"the":[10,89,97,119],"security":[11],"continuity":[13,76,103],"of":[14,46,48,52,65],"their":[15,74],"business":[16,59,66,75,102],"operations":[17],"especially":[18],"those":[19],"with":[20],"high":[21],"criticality":[22],"availability.":[24],"If":[25],"cyber":[26,141],"threats":[27],"can":[28],"bring":[29],"down":[30],"a":[31,34,69,134],"company":[32],"for":[33],"long":[35],"time":[36],"create":[38],"reputational":[39],"impacts":[40],"which":[41],"cause":[42],"painful":[43],"financial":[44],"losses":[45],"hundreds":[47],"thousands":[49],"or":[50],"millions":[51],"Saudi":[53],"riyals":[54],"significant":[56],"disruptions":[57],"operations,":[60],"then":[61],"we":[62],"should":[63],"think":[64],"continuity.":[67],"As":[68],"result,":[70],"as":[71,137],"organizations":[72,115],"build":[73],"disaster":[78],"recovery":[79],"plans":[80],"procedures,":[82],"cybersecurity":[83,100],"must":[85],"be":[86],"integrated":[87],"throughout":[88],"entire":[90],"process.":[91],"This":[92],"paper":[93],"focuses":[94],"on":[95],"falling":[96],"gaps":[98],"between":[99],"integrating":[105],"them":[106],"in":[107,125],"order":[108],"establish":[110],"resilience":[111],"systems":[112],"enable":[114],"that":[118],"proper":[120],"processes":[121],"are":[122,129],"being":[123],"put":[124],"place":[126],"resources":[128],"allocated":[130],"help":[132],"facilitate":[133],"smooth":[135],"transition":[136],"they":[138],"recover":[139],"from":[140],"incidents.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
