Business Continuity Management
eBook - ePub

Business Continuity Management

A Crisis Management Approach

  1. 344 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Business Continuity Management

A Crisis Management Approach

About this book

Since the publication of the first edition in 2002, interest in crisis management has been fuelled by a number of events, including 9/11.

The first edition of this text was praised for its rigorous yet logical approach, and this is continued in the second edition, which provides a well-researched, theoretically robust approach to the topic combined with empirical research in continuity management. New chapters are included on digital resilience and principles of risk management for business continuity. All chapters are revised and updated with particular attention being paid to the impact on smaller companies. New cases include: South Africa Bank, Lego, Morgan Stanley Dean Witter; small companies impacted by 9/11; and the New York City power outage of August 2003.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Business Continuity Management by Ethne Swartz,Dominic Elliott,Brahim Herbane,Ethné Swartz in PDF and/or ePUB format, as well as other popular books in Negocios y empresa & Negocios en general. We have over one million books available in our catalogue for you to explore.

Information

1
Continuity Management in Historical Context

Introduction

The objective of this chapter is to review the development of business continuity management (BCM) into its current form from its origins in disaster recovery planning. The focus is on the evolution of the practice, from its origins in disaster recovery to contingency planning and finally to a more strategically focused management concern. The roots of BCM lie in information systems but then extended beyond this as organisations became more dependent upon technologies that drove core business processes. Hence, pushed by changing stakeholder and organisational needs, BCM has, over the last twenty years, moved from a technical focus to a compliance focus and has now moved towards a strategic focus, within some businesses. The chapter concludes by envisioning how BCM might move into the future through the development in some organisations of a business continuity (BC) capability.

The Ubiquity of Technology

[A] frog if put in cold water will not bestir itself if that water is heated up slowly and gradually and will in the end let itself be boiled alive, too comfortable with continuity to realize that continuous change at some point may become intolerable and demand a change in behavior.
(Handy, 1990: 9)
The boiled frog syndrome has entered the management literature as a warning to those who fail to detect environmental change and take action (Handy, 1990; Frost, 1994). Examining the reintroduction to the social world of those isolated from normal life for long periods of time enables us to detect the stark changes in them that the rest of us barely notice. Nelson Mandela’s autobiography describes how, on his release from prison in 1990 after serving a twenty-six-year sentence, a television crew “thrust a long, dark and furry object at me. I recoiled slightly, wondering if it were a new fangled weapon developed while I was in prison. Winnie informed me that it was a microphone” (Mandela, 1994: 673). After undergoing voluntary exile from the “real world” during his ten-year premiership, former prime minister Tony Blair acquired his first mobile telephone (Sky News, 2006) and had to master new competences such as learning how to use it. Such technology had become ubiquitous during his term in office and any nine-year-old might have been a knowledgeable tutor for the former premier.
Since the first edition of this book was written, terrorist attacks in North America (9/11), London (7/7), Istanbul, Madrid, Beslan, Mumbai and the Maldives, to name but a few, have had a tremendous impact, both physically and emotionally. Very human disasters have been triggered by natural events, including the South East Asian Tsunami of 2004, Cyclone Nargis of 2008 which devastated Myanmar, and the pounding of New Orleans by Hurricane Katrina in 2005. New records for high summer temperatures, with unseasonal flooding elsewhere, have seen forest fires rage across the Peloponnese in Greece while English towns were struck by flooding not experienced within human memory.
Such events grab the headlines and undoubtedly trigger business interruptions for small and large organisations alike. Given that lives are often put at risk in many crises, we have learned that such events will have a disproportionate impact upon management considerations compared to the more mundane, but more probable, interruptions likely to befall managers and their organisations. Whether the trigger is viewed as a major event or a more trivial systems failure, BCM a process intended to support organisations in building resilience and, where necessary, to recover key activities as quickly as possible in order to minimise organisational impacts and protect key stakeholders.
Tension has arisen because the focus upon great events is detrimental to the exploration of the minutiae of everyday life. This tension is also evident in the fields of BC and crisis management. Historians fall into one of at least two camps: those who are primarily concerned with the great figures of history, kings and presidents, and those who seek to better understand the experiences and practices of those everyday people who often remain nameless yet are the ancestors of the majority of us. Similarly, within this book, although reference is made to well-known incidents and recoveries, this indicates the relative ease of access to such cases whose data are available in the public domain. Conversely, the sparse reference to small businesses and mundane examples hides the fact that the value of BC is in building day-to-day resilience and the associated recovery capability.
The routines of organisational and personal life depend today more than ever upon digital tools. The developed world has seen a rapid growth in online shopping, ever more sophisticated data-mining opportunities and supply chain management. Retailers have learned how to exploit the data available from loyalty cards, enabling detailed consumer profiles to be drawn. Google provides about three-quarters of the “external referrals for most websites” reports Google Watch (2007), worrying that such dominance undermines the principles of the World Wide Web. Finkelstein (2007) suggests a threat to privacy since a wide range of internet service providers may maintain detailed records of customers’ activities and thus their interests. He also reports the allegation that Yahoo! assisted the Chinese authorities to imprison dissidents. The digital age provides an opportunity for the kind of Big Brother surveillance of which not even Orwell could conceive.
In banking, the personal touch was superseded by the telephone interface, itself increasingly replaced by internet services, and, as we turn full circle, personal banking is now being reintroduced as a “value added service”. With a plethora of goods from which to choose, customers have become more demanding and less tolerant of sloppy service or delays. As such change occurs incrementally we hardly notice it, but for those such as Nelson Mandela and Tony Blair who have been temporarily isolated, the changes associated with stepping back into the real world were immense. They were not concerned only with great events but with the humdrum minutiae of living everyday life, from shopping to speaking to friends, and using social networking technologies.
Change, fuelled by new information and communication technology (ICT), may be seen as a constant – it is estimated by award-winning scientist and futurist Ray Kurzweil that such communications technologies double their capacity and power each year, while the hardward is becoming smaller by a factor of 100 every decade (Kurzweil, 2007). Linked to this, in business the reliance on technology and on fellow members of the organisational supply chain has increased both dependencies and the potential for interruptions. The need to ensure BC is in place has never been greater.
BCM is a maturing discipline. Although its origins lie in Information Systems (IS) protection, it is evolving into a full business-wide process. Kurzweiler (2007) posits that the greater affordability and miniaturisation of technology has democratised access to technology so that no single individual remains untouched by technological change. However, this text is less concerned with the technology itself than with the concomitant changes to the organisational processes, systems and operations which new developments have made possible. Organisations are socio-technical systems, and to manage them effectively for continuity, all elements must be considered. The roots of the experiences of the three authors of this book lie in a variety of sub-disciplines, including strategy, industrial crisis and Information Systems. Inevitably, these have shaped this book and the theoretical approach to BCM. Throughout this text we use the Business Continuity Institute’s (BCI, 2007a) definition, which closely fitted our earlier definition (see Elliott et al., 2001), and has provided the basis for the definition of British Standard 25999:
Business Continuity Management is a holistic management process that identifies potential impacts that threaten an organisation and provides a framework for building resilience and the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities.
(BSI, 2006)
This definition of BCM is firmly rooted in a crisis management approach (see Shrivastava, 1987a; Smith, 1990; Pauchant and Mitroff, 1992) and is broader in scope than more traditional approaches, which emphasise hard systems (see, for example, Doswell, 2000). The next section outlines what is meant by a crisis management approach. Then, Chapter 1 considers the strategic importance of being able to deal with crises and interruptions effectively; how “service continuity” might be a more appropriate term than “business continuity”. Finally, we examine the historical development of BCM.

A Crisis Management Approach to Business Continuity

A key part of this book’s contribution to the development of BCM lies in its crisis management approach, which underpins all aspects of this text. Such an approach may be defined as one that:
• recognises the social and technical characteristics of business interruptions;
• emphasises the contribution that managers may make to the resolution of interruptions;
• assumes that managers may build resilience to business interruptions through processes and changes to operating norms and practices;
• assumes that organisations themselves may play a major role in “incubating the potential for failure”;
• recognises that, if managed properly, interruptions do not inevitably result in crises;
• acknowledges the impact, potential or realised, of interruptions upon a wide range of stakeholders;
• clearly recognises that a crisis unfolds through a series of salient phases, often providing managers with several points at which an intervention can be made to limit the impact of the threat faced by the organisation.
Figure 1.1 illustrates how a crisis management view of BC acknowledges first that the organisation is part of an environment characterised by uncertainty and change, leading to new challenges. Inside this environment, regulation, legislation and stakeholders help to shape the BC process within individual organisations. That process will be shaped by the historical legacy of the continuity process and the accumulated knowledge within an organisation. In addition, a key driver is the strategic
Figure1.1 The continuity management process in context.
importance that business continuity management is regarded as having, both inside and outside the organisation.
Earlier BC publications (see, for example, Ginn, 1989; Andersen, 1992; Strohl Systems, 1995) have restricted their attentions to IS management and protection. More recent practical guides and case studies have a broader range of interests extending to all facilities (see, for example, Hiles and Barnes, 1999; Vancoppenolle, 1999) and, in some cases, to reputation management (Elliott et al., 1999a).
This broadening of BC reflects the underlying assumption that crisis incidents or business interruptions are systemic in nature, comprising both social and technical elements. Such a view has been well developed within the field of crisis management (Turner, 1976; Turner and Pidgeon, 1997; Shrivastava, 1987a; Smith, 1990; Pauchant and Douville, 1993; Perrow, 1997; Castillo, 2004). For example, the Challenger disaster (1986) arose from the convergence of technical failure (faulty seals) and the NASA culture. This created assumptions about the ability of staff to always succeed and the organisation became “deaf” to concerns about safety. Thus when specific safety issues were raised, the culture conspired to push ahead with the launch, resulting in tragedy (see Schwartz, 1987; Starbuck and Milliken, 1988; Pauchant and Mitroff, 1992; Vaughan, 1997). Within such a framework, the focus of disaster recovery upon the hardware is inherently flawed in that little or no consideration is given to human, organisational or social aspects of the system, nor to the interaction between components (Lewis, 2005).

Strategic Importance

The environment in which organisations operate is very complex, with change and innovation driven by increased competition and technology change. The judicious management of technology and the exploitation of Information Systems in particular are recognised as key skills which will determine organisational advantage in the “Information Society” (Bangemann, 1994, quoted in Crowe, 1996). Pilger (1998) disputes the label “information society”, arguing that “media age” is more apt and that much information is managed and filtered for good or ill. The concerns expressed by the Google Watch organisation seem pertinent here, given the data that are held by internet service providers, search engine providers and retailers about the detail of our wants and preferences. Such a view recognises that the technology which makes information processing so easy is programmed and controlled by people and organisations: that is, there are social as well as technical dimensions. This is depicted in the case of fear uncertainty and doubt (FUD) and Sun Microsystems, shown in Box 1.1.
The prominence given to the protection of IS has been highlighted earlier and forms a key consideration within this text but does not encompass the full scope of BCM. An underlying assumption of this book is that BC permeates all areas of activity. Box 1.1 highlights two high-profile “interruptions” with far-reaching consequences for the organisations involved.
Box 1.1 FUD – Fear, Uncertainty and Doubt
Emerging from the early days of the personal computer industry, “fear, uncertainty and doubt” (...

Table of contents

  1. Contents
  2. Preface
  3. 1 Continuity Management in Historical Context
  4. 2 Legal Drivers and Business Continuity Management Standards
  5. 3 Digital Resilience and Business Continuity Management
  6. 4 Initiating, Redefining and Planning for Business Continuity Management
  7. 5 Continuity Analysis and Planning
  8. 6 Embedding Business Continuity Management
  9. 7 Operational Management
  10. 8 Reflections on Past and Future
  11. Notes
  12. Index