@inproceedings{2f37f2550faf4175835043e541d3686d,
title = "Simulation in information systems: Potential of the vulnerability theory",
abstract = "Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.",
keywords = "failure scenarios, information systems, modeling, Simulation, vulnerability",
author = "Silva, {Pedro S{\'a}} and Jorge Pinto and Jo{\~a}o Varaj{\~a}o and Ant{\'o}nio Trigo and Cruz-Cunha, {Maria Manuela} and Isabel Bentes and Humberto Varum and Jitendra Agarwal",
year = "2010",
month = dec,
day = "1",
doi = "10.1007/978-3-642-16402-6_24",
language = "English",
isbn = "3642164013",
volume = "109 CCIS",
series = "Communications in Computer and Information Science",
number = "PART 1",
pages = "219--229",
booktitle = "Communications in Computer and Information Science",
edition = "PART 1",
note = "International Conference on ENTERprise Information Systems, CENTERIS 2010 ; Conference date: 20-10-2010 Through 22-10-2010",
}