Advertisement

Simulation in Information Systems: Potential of the Vulnerability Theory

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 109)

Abstract

Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.

Keywords

Simulation modeling vulnerability information systems failure scenarios 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gogg, T.J., Mott, J.R.A.: Introduction to Simulation. In: Simulation Conference Proceedings, pp. 9–17 (Winter 1993)Google Scholar
  2. 2.
    Law, A.M., Kelton, W.D.: Simulation Modeling and Analysis. McGraw-Hill Higher Education, New York (1991)zbMATHGoogle Scholar
  3. 3.
    Sanchez, P.J.: Fundamentals of simulation modeling. In: Simulation Conference 2007, pp. 54–62 (Winter 2007)Google Scholar
  4. 4.
    Seila, A.F.: Introduction to simulation. In: Simulation Conference Proceedings, pp. 7–15 (Winter 1995)Google Scholar
  5. 5.
    Di Domenica, N., Mitra, G., Valente, P., Birbilis, G.: Stochastic programming and scenario generation within a simulation framework: An information systems perspective. Decision Support Systems 42, 2197–2218 (2007)CrossRefGoogle Scholar
  6. 6.
    Banks, J.: Introduction to simulation. In: Simulation Conference Proceedings, vol. 1, 11, pp. 9–16 (Winter 2000)Google Scholar
  7. 7.
    Carson II, J.S.: Introduction to modeling and simulation. In: Simulation Conference, 2005 Proceedings of the Winter, p. 8 (2005)Google Scholar
  8. 8.
    Whicker, L., Bernon, M., Templar, S., Mena, C.: Understanding the relationships between time and cost to improve supply chain performance. International Journal of Production Economics 121, 641–650 (2009)CrossRefGoogle Scholar
  9. 9.
    Latorre, S., Pointet, J.-M.: The contributions and consequences of simulation tools and digital mock-ups on design and production as applied to the automobile and aeronautics industries. International Journal of Automotive Technology and Management 8, 350–368 (2008)CrossRefGoogle Scholar
  10. 10.
    Kosmidou, K., Zopounidis, C.: Predicting US commercial bank failures via a multicriteria approach. International Journal of Risk Assessment and Management 9, 26–43 (2008)CrossRefGoogle Scholar
  11. 11.
    Docherty, P., Wang, G.: Using synthetic data to evaluate the impact of RTGS on systemic risk in the Australian payments system. Journal of Financial Stability 6, 103–117 (2010)CrossRefGoogle Scholar
  12. 12.
    Agarwal, J., Blockley, D.I., Woodman, N.J.: Vulnerability of systems. Civil Engineering and Environmental Systems 18, 141–165 (2001)CrossRefGoogle Scholar
  13. 13.
    Ingalls, R.G.: Introduction to simulation. In: Simulation Conference, WSC 2008, pp. 17–26 (Winter 2008)Google Scholar
  14. 14.
    Banks, J., Carson, J.S., Nelson, B.L.: Discrete-Event System Simulation. Prentice Hall, Englewood Cliffs (1996)Google Scholar
  15. 15.
    Robinson, S.: Simulation: The Practice of Model Development and Use. Wiley, Chichester (2003)Google Scholar
  16. 16.
    Goldsman, D.: Introduction to simulation. In: Simulation Conference, pp. 26–37 (Winter 2007)Google Scholar
  17. 17.
    Giaglis, G.M.: A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques. International Journal of Flexible Manufacturing Systems 13, 209–228 (2001)CrossRefGoogle Scholar
  18. 18.
    Lu, Z., Yu, Y., Woodman, N.J., Blockley, D.I.: A theory of structural vulnerability. The Structural Engineer 77, 17–24 (1999)Google Scholar
  19. 19.
    Pinto, J.T.: The risk of a vulnerable scenario. PhD thesis, University of Bristol, UK (2002)Google Scholar
  20. 20.
    Pinto, J.T., Blockley, D.I., Woodman, N.J.: The risk of vulnerable failure. Structural Safety 24, 107–122 (2002)CrossRefGoogle Scholar
  21. 21.
    Agarwal, J., Blockley, D., Woodman, N.: Vulnerability of structural systems. Structural Safety 25, 263–286 (2003)CrossRefGoogle Scholar
  22. 22.
    Pinto, J.T., Varum, H., Bentes, I., Agarwal, J.: A Theory of Vulnerability of Water Pipe Network (TVWPN). Water Resources Management (2010), http://www.springerlink.com/content/x0240l6077428716/

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.Coimbra Institute of Accounting and Administration, Quinta Agrícola - BencantaCoimbraPortugal
  2. 2.University of Trás-os-Montes e Alto DouroPortugal
  3. 3.Centro ALGORITMIPortugal
  4. 4.Polytechnic Institute of Cávado e AvePortugal
  5. 5.University of AveiroPortugal
  6. 6.University of BristolU.K.
  7. 7.CITEPE Research CentreUniversity of MinhoPortugal

Personalised recommendations