Author
Listed:
- Pedro Sá Silva
(Coimbra Institute of Accounting and Administration, Portugal)
- Jorge Pinto
(University of Trás-os-Montes and Alto Douro, Portugal)
- João Varajão
(University of Trás-os-Montes and Alto Douro, Portugal)
- António Trigo
(Coimbra Institute of Accounting and Administration, Portugal)
- Isabel Bentes
(University of Trás-os-Montes and Alto Douro, Portugal)
- Humberto Varum
(University of Aveiro, Portugal)
Abstract
Information Systems in the past few years became a keystone of society. History shows that in some Information Systems one simple failure can lead to disproportioned economic and social damages. Initially used in structural systems, the theory of vulnerability searches for this type of failure. This theory identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. To test and evaluate these failures injections and analyze the impacts of them in sensitive Information Systems, simulation provides an interesting approach. By mimicking systems and representing them through models, simulation studies an imitated system without disrupting the system itself. Simulation provides a safer approach to explore and test the system in damage scenarios without real consequences. This paper discusses the use of the theory of vulnerability in Information Systems simulation.
Suggested Citation
Pedro Sá Silva & Jorge Pinto & João Varajão & António Trigo & Isabel Bentes & Humberto Varum, 2012.
"Potential Use of the Theory of Vulnerability in Information Systems,"
Information Resources Management Journal (IRMJ), IGI Global, vol. 25(2), pages 22-33, April.
Handle:
RePEc:igg:rmj000:v:25:y:2012:i:2:p:22-33
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:rmj000:v:25:y:2012:i:2:p:22-33. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.