Documente Academic
Documente Profesional
Documente Cultură
a
i
MTPD
i
DD
i
FT
i
w
i
K 1
Table 2
Measures used to determine critical functions.
Measures Reference Description Type of use
Function recovery time
(C1)
Hawkins et al.
(2000)
The time needed to return a function to its usual state Disaster recovery planning
Function recovery cost
(C2)
Nosworthy (2000)
and Hawkins et al.
(2000)
Cost of operations for returning the function to its usual state Risk analysis and business process/disaster
recovery planning
Possibility of
outsourcing function
(C3)
Black and Porter
(1996)
Existence of companies to outsource the function CSFs for TQM in membership organizations
Possibility of insuring
function (C4)
Ernest-Jones (2005) Possibility of insuring function to compensate losses impairment in
activity
Consequence of breakdown in business
process
Possibility of using
parallel resources
(C5)
It is a new measure Existence of parallel resources to perform this function
Importance of function
in production of key
products (C6)
Sambasivan and Fei
(2008) and
Nosworthy 2000
Functions have different role in production of key products and some
of functions can be done in any time while some of them should be
done at their specic time
Benet of implementation environmental
management system(EMS)/risk analysis
and business impacts
Number of products
requiring a given
function (C7)
It is a new measure Using the function for producing several key products
Required manpower for
function recovery
(C8)
Niazi et al. (2006)
and Hung et al.
(2005)
Manpower needed for returning the function to its usual state CSFs for software process improvement/CSF
for knowledge management system/
Technological level of
function (C9)
It is a new measure Level of technology of the function affects the number of required
labor and technological level of recovery operations
Vulnerability of function
(C10)
Nosworthy (2000) Degree of inuencing from threats according to the value of Risk
Priority Number (RPN)
Risk analysis and business impacts
Possibility of attack and
any threat to the
function (C11)
Nosworthy (2000) Likelihood of occurring threats is different for each function Risk analysis and business impacts
Total oat time of
function (C12)
It is a new measure The time that a function may be delayed without impacting the
overall production time
Required specic
conditions of
function (C13)
It is a new measure Conditions such as necessity of existence at least l time unit between
two functions, give a specic condition to function
MBCO
Normal
Level
Operating level of a key Product
Incidence
t
Time
MTPD
t'
Resuming point
Restoring point
A
B
B
Completely
Stopped
(Include BCP
processes)
Operate under
normal level
(Include disaster
recovery processes)
A
Fig. 4. A graphical denition of BIA measures.
314 S.A. Torabi et al. / Safety Science 68 (2014) 309323
In this equation, MTPD
i
indicates the MTPD of the ith key product,
DD
i
is dened as the date on which product i is expected to be deliv-
ered and FT
i
is dened as the total processing times of all required
key functions of the key product I (i.e., ow time). Notably, the
due date should be greater than or equal to ow time (Cheng and
Gupta, 1989). Moreover, a
i
, MBCO
i
and w
i
denote the normal operat-
ing level, MBCO and relative importance of ith product obtained
from ANP, respectively. In addition, K is the total risk appetite of
organization determined based upon the organizations strategic
viewpoints which can be represented as the percentage of total per-
formance and n is the number of key products. Formula (1) has been
inspired by the resilience function proposed by Zobel and Khansa
(2014) and it is based on the total loss of key products during the dis-
ruption period. Based on Eq. (1), a surface can be drawn for each
value of risk appetite with different combination of MTPDand MBCO
values for key products as shown in Fig. 5 schematically.
By xing the amount of risk appetite, for each MBCO a tally point
for MTPD would be obtained. After determining the MBCO and
MTPD measures for key products, the next step is determining these
parameters for critical functions. Notably, obtaining MBCO for criti-
cal functions of key products is a simple task since the MBCO mea-
sure for each critical function is equal to the MBCO of related key
product. However, calculating the MTPD measure for critical func-
tions is more complicated. For this, we develop a backward progres-
sive algorithm called MTPD algorithm to determine the MTPD
measure for each critical function whose steps are as follow:
Step 1: Determine the different groups of critical functions
according to the precedence relations among them so that the
rst set of critical functions are those functions without any
prerequisite.
Step 2: Prioritize the current set of functions according to their
ranks extracted by the ANP method and their required recovery
resources.
Step 3: By starting from the rst set of critical functions,
set MTPD = 1 for those functions that could be recovered
at the rst available time slot (e.g., working day). After-
wards, add one time unit for MTPD of remained functions
of the current set (if any) which can be recovered at the
next working day.
Step 4: Repeat step 3 for the rest of critical functions in the next
levels.
In this manner, the MTPD of critical functions are determined in
such a way that they are recovered in the order of their ranking and
required resources level by level. Noteworthy, it is assumed that
the organization supplies its required resources from the outside
suppliers at the recovery phase and thus there is no restriction in
the amount of supply. However, the only limitation is the required
times for recovery of critical functions. Accordingly, we simply add
one time unit to MTPD of those functions at the current group of
critical functions which could be recovered in the next working
day.
Normal level=
i 10000
5000
4000
3000
2000
1000
0
24 36 48 60 72 96 120 144 200 MTPD
(Hour)
MBCO
Fig. 5. A sample curve for MTPD and MBCO.
Table 3
Product groups.
Product group Part Code Product group Part Code
Brake disks Peraid BDP1 Complete Torus Mazda CTM
Peugeot 206 BDP2 Cylinder Benz 10 ton CB1
Peugeot 405 BDP3 Benz Mayler CB2
Peykan BDP4 Complete Axle Peykan CAP1
Roa BDR Peugeot RD CAP2
Steering tuber Nissan STN Bush Mazda BM
Peraid STP1 Peraid BP1
Peugeot 206 STP2 Peugeot 405 BP2
Peugeot 405 STP3 Wheel Bearing Peykan WBP1
Peugeot RD STP4 Peraid WBP2
Peykan STP5 Peugeot 405 WBP3
Xantia STX Wheel sink Peykan WSP1
Torus tuber Mazda TTM Peraid WSP2
Nissan TTN Peugeot 405 WSP3
Peraid TTP1
Peugeot 405 TTP2
Peraid WSP2
Peugeot 405 WSP3
S.A. Torabi et al. / Safety Science 68 (2014) 309323 315
3. A case study
In this section, the proposed BIA framework is applied to an
industrial case company which produces some auto parts. Lahijan
steering and suspension parts (LSSP) company is an auto parts
manufacturer since 1984 in the north of Iran and has 150 employ-
ees. Due to importance of continuity in the delivery of companys
products under any circumstances, BCMS is being implemented
in the company, and the proposed methodology has been used to
conduct the BIA process. Hereafter, the details of the proposed
methodology is elaborated step-by-step.
3.1. Determining the key products
LSSP Company is producing thirty products in nine categories as
summarized in Table 3. According to the methodology, ANP was
utilized to rank the products. To this end, network structure of
key products selection problem was identied by applying fuzzy
DEMATEL technique. For this, a questionnaire was designed and
twenty experts including four top managers of the company,
twelve middle managers (e.g., Disks production manager, Bush
production manager, Axle production manager, Quality control
manager, and warehouse manager) and four interested parties of
the organization (i.e., companys main shareholders, city authori-
ties, main suppliers, and companys contractors) lled out the
questionnaire.
The opinions of experts were gathered as linguistic terms for
which suitable fuzzy triangular numbers were considered to con-
vert them into the numerical scale. CFCS method was used to
defuzzify these triangular fuzzy numbers. After calculating the ini-
tial direct and total inuence matrices denoted by D and T, respec-
tively, and applying MMDE method proposed by Li and Tzeng
(2009) to explore the important relationships between products
measures, the threshold value was calculated as 0.4458 (see
Appendix B for details). So, we kept those relationships with a
score greater than the threshold value in matrix T. In this way,
the network structure of the key products selection problem can
be depicted as Fig. 6.
In the last step of identifying key products, all products should
be ranked by the ANP method. In this step, required pair-wise com-
parison matrices were gathered by interviewing with top manag-
ers of the company and nal weights were calculated by the
Super Decision software. Table 4 shows the corresponding results
of the ANP method for ranking of products in which the raw
weights are the values from limit super matrix, normal weights
are normalized values of raw weights and the ideal values are
obtained from the normalized values by dividing each value by
the largest one in each column from which the nal ranks are
obtained.
Accordingly, Brake disks for Peraid, Peugeot 206 and Peugeot
405 (BDP3, BDP2 and BDP1) were selected as the key products of
the company while considering the available budget and desired
maturation level for implementing the BCMS within the company.
Key products selection
Defection of
customers
Higher
Insurance cost
Importance of
product for the
country
Influence on
Market
Loss of the
technological
level of
company
Loss of revenue
Rate of deviation
from companys
objectives
Influence on
human
Damage on
companys image
and reputation
Loss of interest
parties supports
Fig. 6. Network structure for key products selection.
Table 4
ANP weights and nal ranking of products.
Name Ideal weights Normal weights Raw weights Final ranks
BDP1 0.919275 0.0518811 0.049961 3
BDP2 0.991354 0.0559487 0.053878 2
BDP3 1 0.0564367 0.054348 1
BDP4 0.84727 0.0478198 0.04605 5
BDR 0.91613 0.0517035 0.04979 4
STN 0.635009 0.0358373 0.034511 13
STP1 0.611489 0.0345102 0.033233 15
STP2 0.688565 0.0388602 0.037422 8
STP3 0.715437 0.0403774 0.038883 7
STP4 0.621795 0.0350917 0.033793 14
STP5 0.601064 0.0339225 0.032667 16
STX 0.780759 0.0440638 0.042433 6
TTM 0.677687 0.0382465 0.036831 10
TTN 0.647277 0.03653 0.035178 12
TTP1 0.662384 0.0373825 0.035999 11
TTP2 0.679422 0.0383441 0.036925 9
CTM 0.505973 0.0285559 0.027499 19
CB1 0.576093 0.0325123 0.031309 17
CB2 0.574755 0.0324375 0.031237 18
CAP1 0.482072 0.0272069 0.0262 21
CAP2 0.490893 0.0277043 0.026679 20
BM 0.298898 0.0168683 0.016244 28
BP1 0.286324 0.016159 0.015561 30
BP2 0.294476 0.0166191 0.016004 29
WBP1 0.342317 0.019319 0.018604 27
WBP2 0.355924 0.0200874 0.019344 26
WBP3 0.384937 0.021725 0.020921 23
WSP1 0.360341 0.0203367 0.019584 25
WSP2 0.382849 0.0216067 0.020807 24
WSP3 0.388194 0.0219088 0.021098 22
316 S.A. Torabi et al. / Safety Science 68 (2014) 309323
3.2. Key products breakdown structure
To identify those required functions for producing the three
selected key products, RWBS matrix is used. In this way, to dene
PCWBS and FWBS and nally RWBS matrices, an interview was
conducted with the mangers of brake disks production department
and according to Table 5, fourteen functions were identied for
companys key products. In this table, rows show the main compo-
nents of key products activities (PCWBS) and columns are the func-
tions needed to produce key products.
3.3. Determining critical functions
Similar to key products selection procedure, relationships
between thirteen criteria were evaluated by the same team of
experts who were used in Section 3.1. By using CFCS method trian-
gular fuzzy numbers were transformed to their crisp values and
nally initial direct inuence matrix (D) and total inuence matrix
(T) in DEMATEL were calculated (see Appendix B for details). Similar
to Section 3.1, 0.1975 was calculated as the threshold value by the
MMDE algorithm (see Appendix B for details). Next, the network
structure for selecting the critical functions was depicted as Fig. 7.
Finally, functions were ranked by the ANP method through
Super Decision software. Table 6 shows the nal ranking of
functions.
Accordingly, f
11
, f
10
, f
13
, f
8
and f
12
were identied as the most
critical functions.
3.4. Estimating the MTPD and MBCO measures
Table 7 shows the required information for each key product.
Accordingly, based on Eq. (1) we would have:
Figs. 8ac shows the relevant charts for the above function.
Accordingly, we can nd a feasible set of triplets (x, y, z) and deter-
mine the MBCO and MTPD measures for each key product by draw-
ing a set of contours.
After conducting an interview with the top managers of LSSP,
k = 0.7 was selected as the acceptable risk appetite of the company.
In other words, the maximum total loss of 30% is tolerable for com-
panys top manager during any disruptive event. For each feasible
point in these surfaces, a MBCO and MTPD can be dened. For
example, triplet (0.63, 0.72, 0.74) is a feasible point in Fig. 8b, there-
fore we would have:
MTPD
BDP
1
5
1200 MBCO
BDP
1
1200
0:63 3
MTPD
BDP
2
5
900 MBCO
BDP
2
900
0:72 4
MTPD
BDP
3
5
1650 MBCO
BDP
3
1650
0:74 5
Based on Fig. 9, company sets the following MBCO for each key
product. Therefore, the related MTPD for each key product is as
follows:
MBCO
BDP1
300 ! MTPD
BDP1
4:2 5
MBCO
BDP2
200 ! MTPD
BDP2
4:6 5
MBCO
BDP3
400 ! MTPD
BDP3
4:9 5
Now, the MBCO measure for critical functions should be less
than or equal to the MBCO of related key products. To determine
the MTPD measure for critical functions based on the proposed
MTPD algorithm (Section 2.4), the required resources are shown
in Table 8.
Table 5
RWBS matrix.
Get
orders
Finance
and
administration
actions
Control
of
raw
materials
Control
of discs
Storing
raw
material
Storing
nal
products
Sale and
marketing
functions
Casting
and
cooling
Turning
with
CNC
Drilling
holes
with
vertical
CNC
Tolerance
control
of holes
Cleaning
functions
Protective
coating
Packaging
Requests
and administrative
activities
1 1 0 0 0 0 1 0 0 0 0 0 0 0
Control activities 0 0 1 1 0 0 0 0 0 0 1 0 0 0
Body of disc 0 0 0 0 1 0 0 1 0 0 0 0 0 0
Final product 0 0 0 0 0 1 0 0 1 1 0 1 1 1
2
S.A. Torabi et al. / Safety Science 68 (2014) 309323 317
According to the proposed MTPD algorithm, the rst set of func-
tions with no prerequisite (i.e., f
1
, f
2
, f
3
and f
8
) are rst selected to
be recovered. In this manner, they are recovered in the order of
their ranking and required resources (see Table 6). So, f
3
that needs
only 1 manpower and 1 h is rst recovered. Then, f
1
is chosen
which needs 2 manpower and 2 h for recovery. Similarly f
2
and f
8
are recovered next. In this way, for all of these functions we could
set: MTPD = 1 as they could be recovered at the rst working day.
Similarly, for other critical functions, the MTPD measure is esti-
mated in such a way that they could be recovered in the next
working days. Notably, each working day includes 8 working hours
in our case study.
4. Implementation tips
In this study, a novel framework has been developed for con-
ducting a BIA process as the key element of a BCMS. To implement
the proposed BIA framework, some implementation tips should be
regarded as follows:
The measures correlation: this study introduces several mea-
sures to identify key products/critical functions. One of the most
important hints in this step is considering the correlation
between measures. If we do not consider correlation between
measures, the products/function will be ranked in a wrong
way and the developed BCMS cannot work efciently. Using
DEMATEL could help to identify these correlations after which
the ANP method can be applied to rank the products/functions.
Group decision making: BCMS is a comprehensive approach to
control those risks threatening the organization. Therefore, for
implementing an effective BCMS, the BIA process should be con-
ducted in an accurate way for which the opinion of several peo-
ple at different levels of the organization should be taken into
account via a group decision making process. Nevertheless, to
get involved the BIA committee members effectively, they
should be familiar with BCM concept for which they might be
trained through a short workshop within the company.
MBCO determination: the most important purpose of imple-
menting a BCMS is establishing a vital process in the organiza-
tion so that the organizations strategic goals could be achieved
even any disruption happens. Also, as shown in Fig. 2, BIA is clo-
sely related to the organizations goals. Accordingly, the BCM
team should be care about the risk appetite level they select
for determining the key products MBCO measure. Therefore,
in the proposed framework, the risk appetite is considered as
the main parameter when estimating the MBCO and MTPD
measures (see Eq. (1)).
MTPD algorithm: to determine a feasible set of MTPD measures
for critical functions, we suggested dening the MBCO for each
critical function as equal to MBCO of its respective product
while the level of MBCO denes the required resources for
Function recovery cost Function recovery time
Selecting the critical functions
Number of products
requiring a given function
Importance of function in
production of key products
Capability of insuring function
Capability of
outsourcing
function
Production
specific
conditions
Capability of
using parallel
resources
Manpower
requirement
for recover
function
Possibility of
attack and
any threat to
function
Vulnerability
of function
Total float
time of
function
Technological
level of
function
Fig. 7. Network structure for selecting the critical functions.
Table 6
Ranking of functions.
Name Ideal weights Normal weights Raw weights Final ranks
f
1
0.3445 0.0368 0.0265 12
f
2
0.3293 0.0352 0.0253 14
f
3
0.3420 0.0366 0.0263 13
f
4
0.4000 0.0428 0.0307 10
f
5
0.3990 0.0427 0.0307 11
f
6
0.4036 0.0431 0.0310 9
f
7
0.4863 0.0520 0.0374 8
f
8
0.6665 0.0713 0.0512 4
f
9
0.5040 0.0539 0.0387 7
f
10
0.7873 0.0842 0.0605 2
f
11
1.0000 0.1069 0.0769 1
f
12
0.6164 0.0659 0.0474 5
f
13
0.7657 0.0819 0.0589 3
f
14
0.5689 0.0608 0.0437 6
Table 7
Parameters of each key product.
Key product a DD (in days) FT (in days) Normal weight
BDP3 1200 7 2 0.2985
BDP2 900 7 2 0.3492
BDP1 1650 7 2 0.3523
318 S.A. Torabi et al. / Safety Science 68 (2014) 309323
recover. Consequently, based on the required recovery times
and the resources of critical functions and their precedence
relations, the MTPD for each critical function can be dened.
5. Conclusion remarks
Business impact analysis (BIA) is one of the key processes when
implementing a business continuity management system (BCMS)
which gives a proper apperception about the organizations key
products and processes. Data gathering and data analysis are two
main steps of BIA. This study develops a novel methodology for
conducting a BIA process in a systematic way. First, organizations
key products are identied through applying a hybrid fuzzy DEM-
ATEL-ANP method for which several relevant criteria were sug-
gested. Second, by preparing a RWBS matrix, all functions which
are needed to produce key products, are identied. Then, via iden-
tifying relevant criteria, functions are ranked by using a similar
fuzzy DEMATE-NP method to identify the critical functions. Finally,
a novel algorithm is used to identify continuity parameters includ-
ing the MTPD and MBCO measures for both key products and their
critical functions. In this manner, the MTPD and MBCO for key
products are rst dened based on the risk appetite level of the
organization and then the MTPD of critical functions are deter-
mined through a simple MTPD algorithm.
According to the special characteristics of each organization,
developing more tailored BIA frameworks for example for
service-oriented organizations (e.g., banking industry) could be
considered as a good direction for further studies. In addition, by
accounting for resource limitations when developing business
continuity and recovery plans, future researches can take resource
allocation considerations into account.
Acknowledgement
This study was supported by the University of Tehran under the
research grant no. 8109920/1/14. The authors are grateful for this
nancial support.
Appendix A. Applied fuzzy DEMATEL-ANP method
Analytic network process (ANP) is a general form of analytic
hierarchy process (AHP) proposed by Saaty (2001) by which a net-
work of interrelationships between the elements of a decision
problem can be used instead of a linear hierarchy structure. The
rst step of ANP is determining the network structure of the prob-
lem for which this study uses the fuzzy DEMATEL method. DEMA-
TEL is based on graph theory and uses the experts opinions about
the inuence degree of each element on other elements to nd the
casual relationships among them (Tzeng et al., 2007; Chen et al.,
2011). Yang et al. (2008) proposed using DEMATEL for evaluating
the interdependencies between a numbers of criteria. This study
proposes a hybrid approach of fuzzy DEMATEL and ANP for select-
ing key products and their critical functions. Required data are
gathered by using of distributing a questionnaire between decision
makers (DM). After receiving DMs replies, the received data are
analyzed to rank the products and by considering the available
Fig. 8a. Chart of model 2 for k = 0.6.
Fig. 8b. Chart of model 2 for k = 0.7.
Fig. 8c. Chart of model 2 for k = 0.8.
S.A. Torabi et al. / Safety Science 68 (2014) 309323 319
resources and desired maturation level of BCMS, some of them are
selected as organizations key products.
This study uses the fuzzy DEMATEL method for identifying the
network of interrelationship between those criteria used to iden-
tify key products and critical functions. In this way, ve linguistic
terms are used to indicate the inuence degree of each element
Fig. 9. The MTPD and MBCO for key products. (a) MTPD and MBCO for BDP
1
. (b) MTPD and MBCO for BDP
2
. (c) MTPD and MBCO for BDP
3
.
Table 8
Required manpower and cost of recovery based on MTPD algorithm.
Step Sets Functions Manpower Facility Cost Required recovery time (h) MTPD Order of allocation
Step 1 {f
1
, f
2
, f
3
, f
8
} F
1
2 0 200$ 2 1 2
F
2
1 0 100$ 1 1 4
F
3
1 0 100$ 1 1 1
F
8
5 2 6000$ 4 1 3
Step 2 {f
4
, f
7
, f
10
} F
4
1 2 800$ 3 2 3
F
7
3 0 300$ 3 2 2
F
10
1 1 8100$ 2 2 1
Step 3 {f
6
, f
11
} F
6
2 2 4200$ 5 3 2
F
11
1 1 5100$ 3 3 1
Step 4 {f
5
, f
12
, f
13
} F
5
2 1 2100$ 4 4 3
F
12
0 1 3000$ 2 4 1
F
13
1 1 5100$ 2 4 2
Step 5 {f
9
, f
14
} F
9
4 1 800$ 5 5 2
F
14
2 1 6200$ 3 5 1
Table A.1
Linguistic terms used to determine inuence degrees.
Linguistic variable Inuence score Corresponding triangular
fuzzy number (TFN)
No inuence (NO) 0 (0, 0, 0.25)
Very low inuence (VL) 1 (0, 0.25, 0.5)
Low inuence (L) 2 (0.25, 0.5, 0.75)
High inuence (H) 3 (0.5, 0.75, 1)
Very high inuence (VH) 4 (0.75, 1, 1)
0
0.25 0.5 0.75 1
1
VH
H L VL
NO
Fig. A.1. Triangular fuzzy membership functions of linguistic terms.
320 S.A. Torabi et al. / Safety Science 68 (2014) 309323
one another one. Table A.1 and Fig. A.1 show these linguistic terms
along with their equivalent fuzzy membership functions.
The steps of fuzzy DEMATEL are as follow:
Step 1: Calculating the average matrix A
Each member of the experts committee indicates her/his opin-
ion about the inuence degree of criterion i on criterion j denoted
by X
k
ij
from which the matrix provided by kth expert is constructed
as X
k
. Notably, X
k
ij
values are rst determined as linguistic terms
and then transformed to their equivalent TFNs. Then, the average
matrix A is formed by calculating the average of X
k
ij
values.
Step 2: Transforming the average matrix into the initial direct-rela-
tion matrix
In this study, the average matrix A whose elements are in the
form of triangular fuzzy numbers is transformed into the initial
direct relation matrix by the Converting Fuzzy data into Crisp
Scores (CFCS) method (Chang et al., 2011).
Step 3: Calculating the normalized initial direct matrix D
s min
1
max
i
P
n
j1
ja
ij
j
;
1
max
j
P
n
i1
ja
ij
j
2
4
3
5
A1
Table B.1
Initial direct inuence matrix (D).
Initial direct matrix (D) C1 C2 C3 C4 C5 C6 C7 C8 C9 C10
C1 0.000 0.092 0.110 0.151 0.013 0.030 0.151 0.069 0.100 0.044
C2 0.110 0.000 0.110 0.151 0.110 0.030 0.036 0.051 0.100 0.044
C3 0.115 0.089 0.000 0.063 0.110 0.088 0.119 0.030 0.125 0.038
C4 0.110 0.045 0.109 0.000 0.039 0.118 0.038 0.110 0.110 0.024
C5 0.125 0.133 0.097 0.076 0.000 0.124 0.118 0.097 0.133 0.060
C6 0.125 0.119 0.104 0.044 0.124 0.000 0.044 0.024 0.125 0.104
C7 0.107 0.076 0.115 0.030 0.076 0.050 0.000 0.024 0.118 0.151
C8 0.106 0.076 0.038 0.024 0.076 0.047 0.030 0.000 0.118 0.038
C9 0.076 0.076 0.151 0.076 0.115 0.076 0.106 0.071 0.000 0.151
C10 0.076 0.076 0.076 0.076 0.115 0.097 0.097 0.071 0.071 0.000
Table B.2
Total inuence matrix (T).
Total relation matrix (T) C1 C2 C3 C4 C5 C6 C7 C8 C9 C10
C1 0.318 0.346 0.419 0.382 0.278 0.257 0.400 0.257 0.427 0.276
C2 0.421 0.268 0.421 0.389 0.362 0.264 0.307 0.248 0.430 0.269
C3 0.444 0.370 0.344 0.327 0.383 0.323 0.397 0.235 0.472 0.291
C4 0.401 0.298 0.397 0.232 0.288 0.319 0.289 0.280 0.418 0.243
C5 0.519 0.461 0.494 0.387 0.338 0.398 0.446 0.331 0.547 0.356
C6 0.468 0.410 0.452 0.327 0.410 0.255 0.348 0.241 0.487 0.354
C7 0.420 0.345 0.429 0.287 0.344 0.281 0.281 0.221 0.446 0.376
C8 0.340 0.277 0.283 0.220 0.273 0.217 0.239 0.149 0.364 0.217
C9 0.452 0.392 0.512 0.364 0.425 0.346 0.420 0.295 0.402 0.413
C10 0.397 0.346 0.393 0.321 0.375 0.322 0.361 0.262 0.410 0.238
Table B.3
Threshold value calculation.
Steps Calculation
Step 1: the ordered triplets set T
{(0.5476, 5, 9), (0.5187, 5, 1), (0.5119, 9, 3), (0.4939, 5, 3), (0.4866, 6, 9), (0.4682, 6, 1), (0.4720, 3, 9), (0.4682, 6, 1),
(0.4521, 6, 3), (0.4520, 9, 1), (0.4463, 7, 9), (0.4458, 5, 7), (0.4444, 3, 1), (0.42961, 2, 9), . . . , (0.1492, 8, 8),}
Step 2: dispatch-node set T
Di
{5, 5, 9, 5, 6, 6, 3, 6, 6, 9, 7, 5, 3, 2, 7, 1, 9, 2, 2, 7, 9, 1, 4, 9, 6, 6, . . .. . . , 8}
Step 3.1: T
t
Di
set and MDE
t
Di
values T1 = {5}, MDE1 = 0; T2 = {5}, MDE2 = 0;T3 = {5, 5, 9}, MDE3 = 0.0283; T4 = {5, 5, 9, 5},
MDE4 = 0.0654; T5 = {5, 5, 9, 5, 6}, MDE5 = 0.0494; T6 = {5, 5, 9, 5, 6, 6}, MDE6 = 0.0290, MDE100 = 0
Step 3.2: set of 100 MDE
t
Di
{0, 0, 0.0283, 0.0654, 0.0494, 0.0290, 0.0273, 0.0327, 0.0428, 0.0266, 0.0283, 0.0503, . . .. . ... , 0.0013, 0}
Step 4.1: maximum MDE
t
Di
0.0654
Step 4.2: dispath-node set of maximum MDE
t
Di
T4 = {5, 5, 9, 5} = {5, 9}
Step 5: receive-node set, T
Re
{9, 1, 3, 3, 9, 9, 1, 2, 3, 1, 9, 7, 1, 9, 3, 9, 5, 1, 3, 7, 7, 3, 9, 10, 2, 5, . . .. . .. , 8}
Step 6.1: T
t
Re
set and MDE
t
Re
values T1 = {9}, MDE1 = 0; T2 = {9, 1}, MDE2 = 0; T3 = {9, 1, 3}, MDE3 = 0; T4 = {9, 1, 3, 3},
MDE4 = 0.0196; T5 = {9, 1, 3, 3, 9}, MDE5 = 0.0145; T6 = {9, 1, 3, 3, 9, 9}, MDE6 = 0.029;
T7 = {9, 1, 3, 3, 9, 9, 1}, MDE7 = 0.0065; T8 = {9, 1, 3, 3, 9, 9, 1, 2}, MDE8 = 0.0163, . . . , MDE100 = 0
Step 6.2: Set of 100 MDE
t
Re
{0, 0, 0, 0.0196, 0.0145, 0.029, 0.0065, 0.0163, 0.0189, 0.0181, 0.0229, 0.0272, 0.0302, 0.0551, 0.0354,
0.0404, 0.0405, 0.0423, 0.0433, 0.0345, . . .. . .. . .. . .. . .. . .. . . , 0.0013, 0}
Step 7.1: maximum MDE
t
Re
0.0551
Step 7.2: dispath-node set of maximum MDE
t
Re
T14 = {9, 1, 3, 3, 9, 9, 1, 2, 3, 1, 9, 7, 1, 9} = {9, 1, 3, 2, 7}
Step 8.1: T
Di
max
{(0.5476, 5, 9), (0.5187, 5, 1), (0.5119, 9, 3), (0.4939, 5, 3)}
Step 8.2: T
Re
max
{(0.5476, 5, 9), (0.5187, 5, 1), (0.5119, 9, 3), (0.4939, 5, 3), (0.4866, 6, 9), (0.4682, 6, 1), (0.4720, 3, 9),
(0.4682, 6, 1), (0.4521, 6, 3), (0.4520, 9, 1), (0.4463, 7, 9), (0.4458, 5, 7), (0.4444, 3, 1), (0.42961, 2, 9)}
Step 8.3: T
Th
{(0.5476, 5, 9), (0.5187, 5, 1), (0.5119, 9, 3), (0.4939, 5, 3), (0.4520, 9, 1), (0.4458, 5, 7)}
Step 8.4: threshold value 0.4458
S.A. Torabi et al. / Safety Science 68 (2014) 309323 321
D s:A A2
Step 4: Calculating the total relation matrix T
The direct matrix D just account for direct inuence ows
between criteria. However, there will be innite sequence of indi-
rect effects between criteria which should be considered. In this
manner, the total inuence matrix denoted by T, reects the total
inuence degree among criteria whose elements are denoted by
t
ij
which indicates the total direct and indirect inuence of crite-
rion i on criterion j. The Eq. (A3) calculates the matrix T.
T DI D
1
A3
Table B.4
Initial direct inuence matrix (D).
Initial direct matrix (D) C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C13
C1 0.000 0.098 0.022 0.016 0.027 0.008 0.010 0.064 0.016 0.016 0.010 0.040 0.027
C2 0.104 0.000 0.040 0.016 0.008 0.042 0.047 0.045 0.008 0.045 0.057 0.034 0.027
C3 0.096 0.100 0.000 0.022 0.010 0.041 0.081 0.107 0.010 0.040 0.082 0.082 0.114
C4 0.057 0.068 0.064 0.000 0.045 0.042 0.068 0.016 0.040 0.064 0.064 0.026 0.022
C5 0.042 0.120 0.008 0.010 0.000 0.064 0.068 0.097 0.026 0.047 0.057 0.040 0.022
C6 0.022 0.022 0.034 0.041 0.010 0.000 0.112 0.040 0.034 0.068 0.063 0.040 0.045
C7 0.040 0.027 0.042 0.022 0.016 0.034 0.000 0.008 0.022 0.010 0.027 0.016 0.034
C8 0.120 0.137 0.008 0.010 0.040 0.045 0.068 0.000 0.088 0.026 0.022 0.114 0.100
C9 0.104 0.114 0.120 0.016 0.022 0.040 0.067 0.088 0.000 0.022 0.016 0.040 0.079
C10 0.067 0.068 0.040 0.034 0.045 0.079 0.107 0.100 0.042 0.000 0.120 0.026 0.068
C11 0.079 0.045 0.012 0.067 0.026 0.068 0.079 0.088 0.016 0.114 0.000 0.079 0.034
C12 0.088 0.120 0.034 0.022 0.016 0.045 0.068 0.079 0.040 0.088 0.100 0.000 0.040
C13 0.040 0.079 0.100 0.026 0.040 0.057 0.079 0.067 0.114 0.068 0.088 0.108 0.000
Table B.5
Total inuence matrix (T).
Total relation matrix (T) C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C13
C1 0.070 0.168 0.058 0.038 0.049 0.050 0.069 0.118 0.051 0.060 0.061 0.089 0.073
C2 0.180 0.091 0.083 0.047 0.038 0.092 0.120 0.117 0.051 0.099 0.118 0.096 0.085
C3 0.231 0.247 0.080 0.072 0.059 0.128 0.203 0.221 0.088 0.135 0.186 0.188 0.203
C4 0.155 0.173 0.119 0.038 0.078 0.106 0.160 0.108 0.087 0.130 0.141 0.099 0.092
C5 0.148 0.225 0.066 0.047 0.036 0.128 0.162 0.180 0.080 0.115 0.134 0.116 0.094
C6 0.115 0.122 0.090 0.075 0.044 0.062 0.196 0.120 0.083 0.130 0.135 0.108 0.110
C7 0.092 0.086 0.074 0.041 0.035 0.067 0.051 0.058 0.049 0.048 0.069 0.058 0.071
C8 0.248 0.279 0.092 0.055 0.084 0.126 0.184 0.118 0.154 0.115 0.125 0.206 0.184
C9 0.230 0.251 0.188 0.059 0.065 0.117 0.179 0.195 0.068 0.104 0.115 0.140 0.170
C10 0.202 0.214 0.117 0.085 0.092 0.164 0.231 0.214 0.115 0.096 0.217 0.133 0.162
C11 0.198 0.180 0.083 0.109 0.071 0.145 0.193 0.189 0.084 0.191 0.100 0.165 0.120
C12 0.215 0.252 0.105 0.069 0.062 0.126 0.184 0.189 0.104 0.171 0.194 0.097 0.129
C13 0.200 0.250 0.188 0.082 0.091 0.155 0.223 0.206 0.187 0.173 0.206 0.220 0.115
Table B.6
Calculation of threshold value.
Steps Calculation
Step 1: the ordered triplets set T
{(0.2786, 8, 2), (0.2521, 12, 2), (0.2514, 9, 2), (0.2501, 13, 2), (0.2482, 8, 1), (0.2474, 3, 2), (0.2306, 3, 1),
(0.2305, 10, 7), (0.2297, 9, 1), (0.2253, 5, 2), (0.2229, 13, 7), (0.2208, 3, 8), (0.2197, 13, 12),
(0.2174, 10, 11), (0.2146, 12, 1), (0.2145, 10, 2), (0.2140, 10, 8), (0.2063, 13, 8), . . . , (0.0348, 7, 5),}
Step 2: dispatch-node set T
Di
{8, 12, 9, 13, 8, 3, 3, 10, 9, 5, 13, 3, 13, 10, 12, 10, 10, 13, 13, 8, 3, 3, 10, 13, 11, 6, 9, . . . , 7}
Step 3.1: T
t
Di
set and MDE
t
Di
values T1 = {8}, MDE1 = 0; T2 = {8, 12}, MDE2 = 0; T3 = {8, 12, 9}, MDE3 = 0; T4 = {8, 12, 9, 13},
MDE4 = 0; T5 = {8, 12, 9, 13, 8}, MDE5 = 0.0135; T6 = {8, 12, 9, 13, 8, 3}, MDE6 = 0.0097, . . .. . .. . .. , MDE169 = 0
Step 3.2: set of 169 MDE
t
Di
{0, 0, 0, 0, 0.0135, 0.0097, 0.0119, 0.0098, 0.0094, 0.0084, 0.0074, 0.0117, 0.0145, 0.0107,
0.0067, 0.0073, 0.0102, 0.0122, 0.0156, 0.0140, 0.0145, 0.0163, 0.0177, 0.0199, 0.0221, 0.0228, 0.0212, . . .. . ... , 0.0001, 0}
Step 4.1: maximum MDE
t
Di
0.0228
Step 4.2: dispath-node set of maximum MDE
t
Di
T26 = {8, 12, 9, 13, 8, 3, 3, 10, 9, 5, 13, 3, 13, 10, 12, 10, 10, 13, 13, 8, 3, 3, 10, 13, 11, 6} = {8, 12, 9, 13, 3, 10, 5, 11, 6}
Step 5: receive-node set, T
Re
{2, 2, 2, 2, 1, 2, 1, 7, 1, 2, 7, 8, 12, 11, 1, 2, 8, 8, 11, 12, 13, 7, 1, 1, 1, 7, 8, . . .. . .. , 5}
Step 6.1: T
t
Re
set and MDE
t
Re
values T1 = {2}, MDE1 = 0; T2 = {2, 2}, MDE2 = 0; T3 = {2, 2, 2}, MDE3 = 0;T4 = {2, 2, 2, 2},
MDE4 = 0; T5 = {2, 2, 2, 2, 1}, MDE5 = 0.0963; T6 = {2, 2, 2, 2, 1, 2}, MDE6 = 0.1213, . . .. . .. . .. , MDE169 = 0
Step 6.2: set of 169MDE
t
Re
{0, 0, 0, 0, 0.0963, 0.1213, 0.0474, 0.0661, 0.0539, 0.0669, 0.0345, 0.0468, 0.0463,
0.0425, 0.0437, 0.0506, 0.0415, 0.0377, 0.0292, 0.0212, 0.0241, . . . , 0.0001, 0}
Step 7.1: maximum MDE
t
Re
0.1213
Step 7.2: dispath-node set of maximum MDE
t
Re
T6 = {2, 2, 2, 2, 1, 2} = {2, 1}
Step 8.1: T
Di
max
{(0.2786, 8, 2), (0.2521, 12, 2), (0.2514, 9, 2), (0.2501, 13, 2), (0.2482, 8, 1), (0.2474, 3, 2),
(0.2306, 3, 1), (0.2305, 10, 7), (0.2297, 9, 1), (0.2253, 5, 2), (0.2229, 13, 7), (0.2208, 3, 8),
(0.2197, 13, 12), (0.2174, 10, 11), (0.2146, 12, 1), (0.2145, 10, 2), (0.2140, 10, 8), (0.2063, 13, 8),
(0.2061, 13, 11), (0.2056, 8, 12), (0.2033, 3, 13), (0.2032, 3, 7), (0.2016, 10, 1), (0.2005, 13, 1), (0.1975, 11, 1), (0.1958, 6, 7)}
Step 8.2: T
Re
max
{(0.2786, 8, 2), (0.2521, 12, 2), (0.2514, 9, 2), (0.2501, 13, 2), (0.2482, 8, 1), (0.2474, 3, 2)}
Step 8.3: T
Th
{(0.2786, 8, 2), (0.2521, 12, 2), (0.2514, 9, 2), (0.2501, 13, 2), (0.2482, 8, 1), (0.2474, 3, 2), (0.2306, 3, 1),
(0.2297, 9, 1), (0.2253, 5, 2), (0.2146, 12, 1), (0.2145, 10, 2), (0.2016, 10, 1), (0.2005, 13, 1), (0.1975, 11, 1)}
Step 8.4: threshold value 0.1975
322 S.A. Torabi et al. / Safety Science 68 (2014) 309323
Step 5: Dening a threshold value to create impact relation map
To nd the nal network of inuence ows among criteria, a
threshold value is used to discriminate between considerable and
negligible inuence ows. The threshold value can be chosen by
decision makers through discussions with experts. However, this
method is not appropriate at all. Hence, this study uses the maxi-
mum mean de-entropy (MMDE) algorithm developed by Li and
Tzeng (2009) to determine a good threshold value.
Now according to the calculated threshold value, we can elim-
inate minor effects and dene the nal matrix T
p
whose elements
are as follows:
t
p
ij
0 if t
ij
< p
t
ij
if t
ij
Pp
A4
At last, according to the network constructed from the mean-
ingful inuences, products are ranked by ANP method. The inter-
ested reader is referred to Chung et al. (2005) for details of ANP
method.
Appendix B. Initial direct and total inuence matrices
The initial direct inuence matrix and total inuence matrix
which denoted by matrix D and T, respectively for key products
are shown in Tables B.1 and B.2. To calculate the proper threshold
value, MMDE method is used, and the exact value is calculated as
0.4458. The implementation process of MMDE method for key
products is shown in Table B.3.
Similar to key products selection procedure, the details of D
and T matrices and implementing the MMDE algorithm for critical
functions are shown in Tables B.4B.6, respectively.
References
Abdel-Razek, R.H., 1997. How construction managers would like their performance
to be evaluated. J. Constr. Eng. Manage. 123 (3), 208213.
Akkiraju, R., Bhattacharjya, D., Gupta, S., 2012. Towards effective business process
availability management. J. Serv. Sci. Res. 4 (2), 319351.
Bhamra, R., Dani, S., Burnard, K., 2011. Resilience: the concept, a literature review
and future directions. Int. J. Prod. Res. 49 (18), 53755393.
Black, S.A., Porter, L.J., 1996. Identication of the critical factors of TQM. Decis. Sci.
27 (1), 121.
British Standard Institute, 2006. BS 25999-1. Business continuity management Code
of practice. United Kingdom: BSI Knowledge Centre.
Business continuity management, Keeping the wheels in motion, 2000. Australian
Business Continuity Management Institute.
Cha, S.-C., Juo, P.-W., Liu, L.-T., Chen, W.-N., 2008. Riskpatrol: a risk management
system considering the integration risk management with business continuity
processes. IEEE Int. Conf. Intell. Secur. Inform., 110115.
Chang, B., Chang, C.-W., Wu, C.-H., 2011. Fuzzy DEMATEL method for developing
supplier selection criteria. Exp. Syst. Appl. 38 (3), 18501858.
Chen, F.-H., Hsu, T.-S., Tzeng, G.-H., 2011. A balanced scorecard approach to
establish a performance evaluation and relationship model for hot spring hotels
based on a hybrid mcdm model combining dematel and anp. Int. J. Hospital.
Manage. 30 (4), 908932.
Cheng, T., Gupta, M., 1989. Survey of scheduling research involving due date
determination decisions. Eur. J. Oper. Res. 38 (2), 156166.
Chung, S.-H., Lee, A.H., Pearn, W.-L., 2005. Analytic network process approach for
product mix planning in semiconductor fabricator. Int. J. Prod. Econ. 96 (1), 15
36.
Cooper, R.G., Kleinschmidt, E.J., 1987. New products: what separates winners from
losers? J. Prod. Innov. Manage 4 (3), 169184.
Ernest-Jones, T., 2005. Business continuity strategy the life line. Network Secur.
2005 (8), 59.
Geelen-Baass, B.N., Johnstone, J.M., 2008. Building resiliency: ensuring business
continuity is on the health care agenda. Austral. Health Rev. 32 (1), 161173.
Gibb, F., Buchanan, S., 2006. A framework for business continuity management. Int.
J. Inf. Manage. 26 (2), 128141.
Globerson, S., 1994. Impact of various work-breakdown structures on project
conceptualization. Int. J. Project Manage. 12 (3), 165171.
Hashemi Golpayegani, S.A., Emamizadeh, B., 2007. Designing work breakdown
structures using modular neural networks. Decis. Support Syst. 44 (1), 202222.
Hawkins, S.M., Yen, D.C., Chou, D.C., 2000. Disaster recovery planning: a strategy for
data security. Inform. Manage. Comput. Secur. 8 (5), 222230.
Hung, Y.-C., Huang, S.-M., Lin, Q.-P., 2005. Critical factors in adopting a knowledge
management system for the pharmaceutical industry. Indus. Manage. Data Syst.
105 (2), 164183.
ISO 22301, 2012. Societal security Business continuity management systems -
Requirements. Switzerland: International Organization for Standardization.
ISO 22313, 2012. Societal security. Business continuity management systems
requirements. Terms and denitions. Terms and denitions. Switzerland:
International Organization for Standardization.
Kepenach, R.J., 2007. Business continuity plan design. IEEE Int. Conf. Internet
Monitor. Protect., ICIMP 2007, 27.
Li, C.-W., Tzeng, G.-H., 2009. Identication of a threshold value for the dematel
method using the maximum mean de-entropy algorithm to nd critical services
provided by a semiconductor intellectual property mall. Exp. Syst. Appl. 36 (6),
98919898.
Mbugua, L.M., Harris, P., Holt, G.D., Olomolaiye, P.O., 1999. A framework for
determining critical success factors inuencing construction business
performance. In: Proceedings of the Association of Researchers in
Construction Management, 15th Annual ARCOM Conference, pp. 255264.
Niazi, M., Wilson, D., Zowghi, D., 2006. Critical success factors for software process
improvement implementation: an empirical study. Software Process: Improve
Pract. 11 (2), 193211.
Nosworthy, J.D., 2000. A practical risk analysis approach: managing BCM risk.
Comput. Secur. 19 (7), 596614.
Randeree, K., Mahal, A., Narwani, A., 2012. A business continuity management
maturity model for the UAE banking sector. Business Process Manage. J. 18 (3),
472492.
Ranjan, P., Kumar, P., Abhishek, K., 2012. Business continuity planning in Indian
perspective. J. Adv. Comput. Res.: Int. J. 1 (12).
Saaty, T.L., 1990. How to make a decision: the analytic hierarchy process. Eur. J.
Oper. Res. 48 (1), 926.
Saaty, T.L., 2001. The Analytic Network Process: Decision Making with Dependence
and Feedback. RWS Publication.
Sambasivan, M., Fei, N.Y., 2008. Evaluation of critical success factors of
implementation of ISO 14001 using analytic hierarchy process (AHP): a case
study from Malaysia. J. Clean. Prod. 16 (13), 14241433.
Sayal, M., 2006. Business Impact Analysis Using Time Correlations, DEECS, LNCS
4055, pp. 167 181.
Sikdar, P., 2011. Alternate approaches to business impact analysis. Inform. Secur. J,:
A Global Perspect. 20 (3), 128134.
The Federal Financial Institutions Examination Council (FFIEC), 2008. Business
Continuity Planning Booklet.
Tjoa, S., Jakoubi, S., Quirchmayr, G., 2008. Enhancing Business Impact Analysis and
Risk Assessment applying a Risk-Aware Business Process Modeling and
Simulation Methodology. In: The Third International Conference on
Availability, Reliability and Security.
Tzeng, G.-H., Chiang, C.-H., Li, C.-W., 2007. Evaluating intertwined effects in e-
learning programs: a novel hybrid mcdm model based on factor analysis and
dematel. Exp. Syst. Appl. 32 (4), 10281044.
Western Australian Government, 2009. Business continuity management:
Guidelines. Second ed.
Yang, Y.-P.O., Shieh, H.-M., Leu, J.-D., Tzeng, G.-H., 2008. A novel hybrid MCDM
model combined with DEMATEL and ANP with applications. Int. J. Operat. Res. 5
(3), 160168.
Zsidisin, G.A., Melnyk, S.A., Ragatz, G.L., 2005. An institutional theory perspective of
business continuity planning for purchasing and supply management. Int. J.
Prod. Res. 43 (16), 34013420.
Zobel, C.W., Khansa, L., 2014. Characterizing multi-event disaster resilience.
Comput. Oper. Res. 42, 8394.
S.A. Torabi et al. / Safety Science 68 (2014) 309323 323