Abstract
Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gogg, T.J., Mott, J.R.A.: Introduction to Simulation. In: Simulation Conference Proceedings, pp. 9–17 (Winter 1993)
Law, A.M., Kelton, W.D.: Simulation Modeling and Analysis. McGraw-Hill Higher Education, New York (1991)
Sanchez, P.J.: Fundamentals of simulation modeling. In: Simulation Conference 2007, pp. 54–62 (Winter 2007)
Seila, A.F.: Introduction to simulation. In: Simulation Conference Proceedings, pp. 7–15 (Winter 1995)
Di Domenica, N., Mitra, G., Valente, P., Birbilis, G.: Stochastic programming and scenario generation within a simulation framework: An information systems perspective. Decision Support Systems 42, 2197–2218 (2007)
Banks, J.: Introduction to simulation. In: Simulation Conference Proceedings, vol. 1, 11, pp. 9–16 (Winter 2000)
Carson II, J.S.: Introduction to modeling and simulation. In: Simulation Conference, 2005 Proceedings of the Winter, p. 8 (2005)
Whicker, L., Bernon, M., Templar, S., Mena, C.: Understanding the relationships between time and cost to improve supply chain performance. International Journal of Production Economics 121, 641–650 (2009)
Latorre, S., Pointet, J.-M.: The contributions and consequences of simulation tools and digital mock-ups on design and production as applied to the automobile and aeronautics industries. International Journal of Automotive Technology and Management 8, 350–368 (2008)
Kosmidou, K., Zopounidis, C.: Predicting US commercial bank failures via a multicriteria approach. International Journal of Risk Assessment and Management 9, 26–43 (2008)
Docherty, P., Wang, G.: Using synthetic data to evaluate the impact of RTGS on systemic risk in the Australian payments system. Journal of Financial Stability 6, 103–117 (2010)
Agarwal, J., Blockley, D.I., Woodman, N.J.: Vulnerability of systems. Civil Engineering and Environmental Systems 18, 141–165 (2001)
Ingalls, R.G.: Introduction to simulation. In: Simulation Conference, WSC 2008, pp. 17–26 (Winter 2008)
Banks, J., Carson, J.S., Nelson, B.L.: Discrete-Event System Simulation. Prentice Hall, Englewood Cliffs (1996)
Robinson, S.: Simulation: The Practice of Model Development and Use. Wiley, Chichester (2003)
Goldsman, D.: Introduction to simulation. In: Simulation Conference, pp. 26–37 (Winter 2007)
Giaglis, G.M.: A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques. International Journal of Flexible Manufacturing Systems 13, 209–228 (2001)
Lu, Z., Yu, Y., Woodman, N.J., Blockley, D.I.: A theory of structural vulnerability. The Structural Engineer 77, 17–24 (1999)
Pinto, J.T.: The risk of a vulnerable scenario. PhD thesis, University of Bristol, UK (2002)
Pinto, J.T., Blockley, D.I., Woodman, N.J.: The risk of vulnerable failure. Structural Safety 24, 107–122 (2002)
Agarwal, J., Blockley, D., Woodman, N.: Vulnerability of structural systems. Structural Safety 25, 263–286 (2003)
Pinto, J.T., Varum, H., Bentes, I., Agarwal, J.: A Theory of Vulnerability of Water Pipe Network (TVWPN). Water Resources Management (2010), http://www.springerlink.com/content/x0240l6077428716/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Silva, P.S. et al. (2010). Simulation in Information Systems: Potential of the Vulnerability Theory. In: Quintela Varajão, J.E., Cruz-Cunha, M.M., Putnik, G.D., Trigo, A. (eds) ENTERprise Information Systems. CENTERIS 2010. Communications in Computer and Information Science, vol 109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16402-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-16402-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16401-9
Online ISBN: 978-3-642-16402-6
eBook Packages: Computer ScienceComputer Science (R0)