Simulation in information systems: Potential of the vulnerability theory

4Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Silva, P. S., Pinto, J., Varajão, J., Trigo, A., Cruz-Cunha, M. M., Bentes, I., … Agarwal, J. (2010). Simulation in information systems: Potential of the vulnerability theory. In Communications in Computer and Information Science (Vol. 109 CCIS, pp. 219–229). https://doi.org/10.1007/978-3-642-16402-6_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free