Disaster recovery planning: a strategy for data security

Article Properties
Abstract
Cite
Hawkins, Steve M., et al. “Disaster Recovery Planning: A Strategy for Data Security”. Information Management &Amp; Computer Security, vol. 8, no. 5, 2000, pp. 222-30, https://doi.org/10.1108/09685220010353150.
Hawkins, S. M., Yen, D. C., & Chou, D. C. (2000). Disaster recovery planning: a strategy for data security. Information Management &Amp; Computer Security, 8(5), 222-230. https://doi.org/10.1108/09685220010353150
Hawkins SM, Yen DC, Chou DC. Disaster recovery planning: a strategy for data security. Information Management & Computer Security. 2000;8(5):222-30.
Description

How can organizations protect against data loss in the event of a disaster? The paper emphasizes on the migration from centralized mainframe computers to distributed client/server systems that has created a concern on data security and discusses the importance of developing an effective disaster recovery plan to mitigate the risk of a loss. Data Security is needed. This paper suggests a possible solution. If a disaster occurs to the organization that destroys a server or the entire network, a company may not be able to recover from the loss. Developing an effective disaster recovery plan will help an organization protect them from data loss. Implementing a robust disaster recovery plan is vital for ensuring business continuity and minimizing the impact of unforeseen events. The paper provides a practical guide for organizations seeking to strengthen their data security.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled E‐mail viruses: how organizations can protect their e‐mails and was published in 2004. The most recent citation comes from a 2023 study titled E‐mail viruses: how organizations can protect their e‐mails . This article reached its peak citation in 2009 , with 3 citations.It has been cited in 17 different journals. Among related journals, the Information Management & Computer Security cited this research the most, with 3 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year