Simulation in information systems: Potential of the vulnerability theory

Pedro Sá Silva, Jorge Pinto, João Varajão, António Trigo, Maria Manuela Cruz-Cunha, Isabel Bentes, Humberto Varum, Jitendra Agarwal

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Abstract

Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.

Original languageEnglish
Title of host publicationCommunications in Computer and Information Science
Pages219-229
Number of pages11
Volume109 CCIS
EditionPART 1
DOIs
Publication statusPublished - 1 Dec 2010
EventInternational Conference on ENTERprise Information Systems, CENTERIS 2010 - Viana do Castelo, United Kingdom
Duration: 20 Oct 201022 Oct 2010

Publication series

NameCommunications in Computer and Information Science
NumberPART 1
Volume109 CCIS
ISSN (Print)18650929

Conference

ConferenceInternational Conference on ENTERprise Information Systems, CENTERIS 2010
CountryUnited Kingdom
CityViana do Castelo
Period20/10/1022/10/10

Keywords

  • failure scenarios
  • information systems
  • modeling
  • Simulation
  • vulnerability

Fingerprint Dive into the research topics of 'Simulation in information systems: Potential of the vulnerability theory'. Together they form a unique fingerprint.

Cite this