Skip to main content

Simulation in Information Systems: Potential of the Vulnerability Theory

  • Conference paper
ENTERprise Information Systems (CENTERIS 2010)

Abstract

Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gogg, T.J., Mott, J.R.A.: Introduction to Simulation. In: Simulation Conference Proceedings, pp. 9–17 (Winter 1993)

    Google Scholar 

  2. Law, A.M., Kelton, W.D.: Simulation Modeling and Analysis. McGraw-Hill Higher Education, New York (1991)

    MATH  Google Scholar 

  3. Sanchez, P.J.: Fundamentals of simulation modeling. In: Simulation Conference 2007, pp. 54–62 (Winter 2007)

    Google Scholar 

  4. Seila, A.F.: Introduction to simulation. In: Simulation Conference Proceedings, pp. 7–15 (Winter 1995)

    Google Scholar 

  5. Di Domenica, N., Mitra, G., Valente, P., Birbilis, G.: Stochastic programming and scenario generation within a simulation framework: An information systems perspective. Decision Support Systems 42, 2197–2218 (2007)

    Article  Google Scholar 

  6. Banks, J.: Introduction to simulation. In: Simulation Conference Proceedings, vol. 1, 11, pp. 9–16 (Winter 2000)

    Google Scholar 

  7. Carson II, J.S.: Introduction to modeling and simulation. In: Simulation Conference, 2005 Proceedings of the Winter, p. 8 (2005)

    Google Scholar 

  8. Whicker, L., Bernon, M., Templar, S., Mena, C.: Understanding the relationships between time and cost to improve supply chain performance. International Journal of Production Economics 121, 641–650 (2009)

    Article  Google Scholar 

  9. Latorre, S., Pointet, J.-M.: The contributions and consequences of simulation tools and digital mock-ups on design and production as applied to the automobile and aeronautics industries. International Journal of Automotive Technology and Management 8, 350–368 (2008)

    Article  Google Scholar 

  10. Kosmidou, K., Zopounidis, C.: Predicting US commercial bank failures via a multicriteria approach. International Journal of Risk Assessment and Management 9, 26–43 (2008)

    Article  Google Scholar 

  11. Docherty, P., Wang, G.: Using synthetic data to evaluate the impact of RTGS on systemic risk in the Australian payments system. Journal of Financial Stability 6, 103–117 (2010)

    Article  Google Scholar 

  12. Agarwal, J., Blockley, D.I., Woodman, N.J.: Vulnerability of systems. Civil Engineering and Environmental Systems 18, 141–165 (2001)

    Article  Google Scholar 

  13. Ingalls, R.G.: Introduction to simulation. In: Simulation Conference, WSC 2008, pp. 17–26 (Winter 2008)

    Google Scholar 

  14. Banks, J., Carson, J.S., Nelson, B.L.: Discrete-Event System Simulation. Prentice Hall, Englewood Cliffs (1996)

    Google Scholar 

  15. Robinson, S.: Simulation: The Practice of Model Development and Use. Wiley, Chichester (2003)

    Google Scholar 

  16. Goldsman, D.: Introduction to simulation. In: Simulation Conference, pp. 26–37 (Winter 2007)

    Google Scholar 

  17. Giaglis, G.M.: A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques. International Journal of Flexible Manufacturing Systems 13, 209–228 (2001)

    Article  Google Scholar 

  18. Lu, Z., Yu, Y., Woodman, N.J., Blockley, D.I.: A theory of structural vulnerability. The Structural Engineer 77, 17–24 (1999)

    Google Scholar 

  19. Pinto, J.T.: The risk of a vulnerable scenario. PhD thesis, University of Bristol, UK (2002)

    Google Scholar 

  20. Pinto, J.T., Blockley, D.I., Woodman, N.J.: The risk of vulnerable failure. Structural Safety 24, 107–122 (2002)

    Article  Google Scholar 

  21. Agarwal, J., Blockley, D., Woodman, N.: Vulnerability of structural systems. Structural Safety 25, 263–286 (2003)

    Article  Google Scholar 

  22. Pinto, J.T., Varum, H., Bentes, I., Agarwal, J.: A Theory of Vulnerability of Water Pipe Network (TVWPN). Water Resources Management (2010), http://www.springerlink.com/content/x0240l6077428716/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Silva, P.S. et al. (2010). Simulation in Information Systems: Potential of the Vulnerability Theory. In: Quintela Varajão, J.E., Cruz-Cunha, M.M., Putnik, G.D., Trigo, A. (eds) ENTERprise Information Systems. CENTERIS 2010. Communications in Computer and Information Science, vol 109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16402-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16402-6_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16401-9

  • Online ISBN: 978-3-642-16402-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics