Advertisement

E-Maintenance and Vulnerability

  • Per Anders Akersten
Conference paper

Abstract

Teleservice, utilizing modern information processing and communication tools, is by now a well-known way of supporting a product and we have seen the emergence of e-manufacturing and related types of e-service, in particular e-maintenance. In discussions of the present and future of e-manufacturing and e-maintenance systems are among other things risks and vulnerabilities related to utilization of e-services identified as an important area for further research. In this paper the concepts of e-maintenance and vulnerability are briefly described. The vulnerability of the e-maintenance system and its consequences for the managed assets are discussed to some extent. From different risk analysis approaches, e.g. related to computer and network security, several methodologies and tools for the management of vulnerability can be identified and an analysis methodology is proposed. The paper represents the view of a risk analyst and reliability engineer.

Key Words

e-maintenance e-service vulnerability risk analysis security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6 References

  1. [1]
    Lee, J. (1998). Teleservice engineering in manufacturing: challenges and opportunities. International Journal of Machine Tools & Manufacture, 38, 901–910.CrossRefGoogle Scholar
  2. [2]
    Mathieu, V. (2001). Product services: from a service supporting the product to a service supporting the client. Journal of Business and Industrial Marketing, 16(1), 39–61.CrossRefMathSciNetGoogle Scholar
  3. [3]
    Kumar, R., & Kumar, U. (2004). A conceptual framework for the development of a service delivery strategy for industrial systems and products. Journal of Business and Industrial Marketing, 19(5), 310–319.CrossRefGoogle Scholar
  4. [4]
    Koç, M., Ni, J., Lee, J., & Bandyopadhyay, P. (2005). Introduction to e-Manufacturing. In: R. Zurawski (Ed.) Industrial Information Technology Handbook, Boca Raton: CRC Press, Chapter 97.Google Scholar
  5. [5]
    McCrossin, R. (2003). Managing risk in telemedicine. Journal of Telemedicine and Telecare, 9(Suppl.1), 36–39.CrossRefGoogle Scholar
  6. [6]
    Tettero, O., Out, D.J., Franken, H.M. & Schot, J. (1997). Information security embedded in the design of telematics systems. Computers and Security, 16(2), 145–164.CrossRefGoogle Scholar
  7. [7]
    Koc, M. & Lee, J. (2001). A system framework for next-generation e-maintenance systems. Center for Intelligent Maintenance Systems, Univ. of Wisconsin-Milwaukee.Google Scholar
  8. [8]
    IEV, International Electrotechnical Vocabulary, (International Electrotechnical Commission, Geneva, 2006). (Available IEC January 2006) http://std.iec.ch/iec60050 Google Scholar
  9. [9]
    Avizienis, A., Laprie, J.-C., Randell, B. & Landwehr, C. (2002). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11–33CrossRefGoogle Scholar
  10. [10]
    Stephenson, P. (2004). Applying impact and vulnerability analysis to risk management. Computer Fraud and Security, Issue 2, 16–20.Google Scholar
  11. [11]
    Stamatis, D.H. (1995). Failure Mode and Effect Analysis: FMEA from Theory to Execution. Milwaukee: ASQ.Google Scholar
  12. [12]
    IEC 61882 (2001). Hazard and operability studies (HAZOP studies) — Application guide, International Standard IEC 61882. Genève: International Electrical Commission.Google Scholar
  13. [13]
    Debray, B., et al. (2004). Defining safety functions and safety barriers from fault and event trees analysis of major industrial hazards. In: C. Spitzer et al. (Eds.), Proceedings of PSAM7-EREL’ 04. London: Springer, pp.358–363.Google Scholar
  14. [14]
    Söderholm, P. & Akersten, P.A. (2005). Scenario analysis in testability design, using event tree analysis. Paper, submitted for publication.Google Scholar
  15. [15]
    Iung, B. (2003). From remote maintenance to MAS-based e-maintenance of an industrial process, Journal of Intelligent Manufacturing, 14 59–82.CrossRefGoogle Scholar
  16. [16]
    Hollnagel, E. (2004). Barriers and Accident Prevention, or how to improve safety by understanding the nature of accidents rather than finding their causes. Aldershot: Ashgate.Google Scholar

Copyright information

© CIEAM/MESA 2006

Authors and Affiliations

  • Per Anders Akersten
    • 1
  1. 1.Centre for Dependability & Maintenance, and Division of Operation & Maintenance EngineeringLuleå University of TechnologyLuleåSweden

Personalised recommendations