IDEAS home Printed from https://ideas.repec.org/a/igg/rmj000/v25y2012i2p22-33.html
   My bibliography  Save this article

Potential Use of the Theory of Vulnerability in Information Systems

Author

Listed:
  • Pedro Sá Silva

    (Coimbra Institute of Accounting and Administration, Portugal)

  • Jorge Pinto

    (University of Trás-os-Montes and Alto Douro, Portugal)

  • João Varajão

    (University of Trás-os-Montes and Alto Douro, Portugal)

  • António Trigo

    (Coimbra Institute of Accounting and Administration, Portugal)

  • Isabel Bentes

    (University of Trás-os-Montes and Alto Douro, Portugal)

  • Humberto Varum

    (University of Aveiro, Portugal)

Abstract

Information Systems in the past few years became a keystone of society. History shows that in some Information Systems one simple failure can lead to disproportioned economic and social damages. Initially used in structural systems, the theory of vulnerability searches for this type of failure. This theory identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. To test and evaluate these failures injections and analyze the impacts of them in sensitive Information Systems, simulation provides an interesting approach. By mimicking systems and representing them through models, simulation studies an imitated system without disrupting the system itself. Simulation provides a safer approach to explore and test the system in damage scenarios without real consequences. This paper discusses the use of the theory of vulnerability in Information Systems simulation.

Suggested Citation

  • Pedro Sá Silva & Jorge Pinto & João Varajão & António Trigo & Isabel Bentes & Humberto Varum, 2012. "Potential Use of the Theory of Vulnerability in Information Systems," Information Resources Management Journal (IRMJ), IGI Global, vol. 25(2), pages 22-33, April.
  • Handle: RePEc:igg:rmj000:v:25:y:2012:i:2:p:22-33
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/irmj.2012040102
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Souad Latorre & Jean-Marc Pointet, 2008. "The contributions and consequences of simulation tools and digital mock-ups on design and production as applied to the automobile and aeronautics industries," International Journal of Automotive Technology and Management, Inderscience Enterprises Ltd, vol. 8(3), pages 350-368.
    2. Docherty, Peter & Wang, Gehong, 2010. "Using synthetic data to evaluate the impact of RTGS on systemic risk in the Australian payments system," Journal of Financial Stability, Elsevier, vol. 6(2), pages 103-117, June.
    3. Sanjay Goel & Eitel J.M. Lauría, 2010. "Quantification, Optimization and Uncertainty Modeling in Information Security Risks: A Matrix-Based Approach," Information Resources Management Journal (IRMJ), IGI Global, vol. 23(2), pages 33-52, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Capponi, Agostino & Chen, Peng-Chu, 2015. "Systemic risk mitigation in financial networks," Journal of Economic Dynamics and Control, Elsevier, vol. 58(C), pages 152-166.
    2. Soramäki, Kimmo & Cook, Samantha, 2013. "SinkRank: An algorithm for identifying systemically important banks in payment systems," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 7, pages 1-27.
    3. Clara Machado & Carlos León & Miguel Sarmiento & Freddy Cepeda & Orlando Chipatecua & Jorge Cely, 2011. "Riesgo Sistémico Y Estabilidad Del Sistema De Pagos De Alto Valor En Colombia: Análisis Bajo," Revista ESPE - Ensayos sobre Política Económica, Banco de la Republica de Colombia, vol. 29(65), pages 106-175, June.
    4. Maria Rosa Borges & Lauriano Ulica & Mariya Gubareva, 2020. "Systemic risk in the Angolan interbank payment system – a network approach," Applied Economics, Taylor & Francis Journals, vol. 52(45), pages 4900-4912, September.
    5. Francesco Cordoni & Luca Di Persio & Luca Prezioso, 2019. "A lending scheme for a system of interconnected banks with probabilistic constraints of failure," Papers 1903.06042, arXiv.org, revised Oct 2019.
    6. Ajit Desai & Jacob Sharples & Anneke Kosse, 2024. "Finding a needle in a haystack: a machine learning framework for anomaly detection in payment systems," IFC Bulletins chapters, in: Bank for International Settlements (ed.), Granular data: new horizons and challenges, volume 61, Bank for International Settlements.
    7. Schulz, Christian, 2011. "Liquidity requirements and payment delays - participant type dependent preferences," Working Paper Series 1291, European Central Bank.
    8. Peter Docherty & Gehong Wang, 2009. "A Revided Exposition of the Methodology for Testing Payments Systems Risk," Working Paper Series 159, Finance Discipline Group, UTS Business School, University of Technology, Sydney.
    9. Soramäki, Kimmo & Cook, Samantha, 2012. "Algorithm for identifying systemically important banks in payment systems," Economics Discussion Papers 2012-43, Kiel Institute for the World Economy (IfW Kiel).
    10. V. Maslennikov V. & A. Larionov V. & В. Масленников В. & А. Ларионов В., 2020. "Влияние поведенческого цикла на формирование денежных потоков // Impact of the behavioral Cycle on Cash Flow Formation," Финансы: теория и практика/Finance: Theory and Practice // Finance: Theory and Practice, ФГОБУВО Финансовый университет при Правительстве Российской Федерации // Financial University under The Government of Russian Federation, vol. 24(5), pages 100-111.
    11. Irving Fisher Committee, 2024. "Granular data: new horizons and challenges," IFC Bulletins, Bank for International Settlements, number 61.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:rmj000:v:25:y:2012:i:2:p:22-33. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.