Development of Risk Based Business Continuity Plan Using House of Risk Method on Container Terminal

D. R. Akbari, R. O.S. Gurning

Research output: Contribution to journalConference articlepeer-review

1 Citation (Scopus)

Abstract

Business processes on every organization is essential to be maintained sustainably. Business disruption in certain area by large scale disaster weakens community resilience through halting productivity as experienced recently, and could also further impact national, regional and the global economy. Most of organizations have not realized that business continuity plan (BCP) is essential to their business continuity. This study aims to analyze the disruptions that might happen on container terminal and rank which disruption contributes most to the loss. This study also try to explain how business continuity plan can minimize the loss caused. The case study in this research is a container terminal. To be able to maintain business continuity in an organization, the terminal should implement business continuity planning in order to identify the risks of a disaster then provide procedures and strategies to reduce or minimize the risk. The development focused on the company's ability to identify disruptions that might disrupt the business process and also to take action as. The research will be carried out using House of Risk method. Development & integration of the actual BCP will be conducted based on international standard ISO 22301:2012. The ranking of each identified risk agents and also the biggest contributor of the Aggregate Risk Potential will be the main output of this research.

Original languageEnglish
Article number012024
JournalIOP Conference Series: Earth and Environmental Science
Volume557
Issue number1
DOIs
Publication statusPublished - 14 Sept 2020
Event2nd Maritime Safety International Conference, MASTIC 2020 - Surabaya, Indonesia
Duration: 18 Jul 2020 → …

Fingerprint

Dive into the research topics of 'Development of Risk Based Business Continuity Plan Using House of Risk Method on Container Terminal'. Together they form a unique fingerprint.

Cite this