Potential Use of the Theory of Vulnerability in Information Systems

Potential Use of the Theory of Vulnerability in Information Systems

Pedro Sá Silva, Jorge Pinto, João Varajão, António Trigo, Isabel Bentes, Humberto Varum
Copyright: © 2012 |Volume: 25 |Issue: 2 |Pages: 12
ISSN: 1040-1628|EISSN: 1533-7979|EISBN13: 9781466610224|DOI: 10.4018/irmj.2012040102
Cite Article Cite Article

MLA

Silva, Pedro Sá, et al. "Potential Use of the Theory of Vulnerability in Information Systems." IRMJ vol.25, no.2 2012: pp.22-33. http://doi.org/10.4018/irmj.2012040102

APA

Silva, P. S., Pinto, J., Varajão, J., Trigo, A., Bentes, I., & Varum, H. (2012). Potential Use of the Theory of Vulnerability in Information Systems. Information Resources Management Journal (IRMJ), 25(2), 22-33. http://doi.org/10.4018/irmj.2012040102

Chicago

Silva, Pedro Sá, et al. "Potential Use of the Theory of Vulnerability in Information Systems," Information Resources Management Journal (IRMJ) 25, no.2: 22-33. http://doi.org/10.4018/irmj.2012040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Information Systems in the past few years became a keystone of society. History shows that in some Information Systems one simple failure can lead to disproportioned economic and social damages. Initially used in structural systems, the theory of vulnerability searches for this type of failure. This theory identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. To test and evaluate these failures injections and analyze the impacts of them in sensitive Information Systems, simulation provides an interesting approach. By mimicking systems and representing them through models, simulation studies an imitated system without disrupting the system itself. Simulation provides a safer approach to explore and test the system in damage scenarios without real consequences. This paper discusses the use of the theory of vulnerability in Information Systems simulation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.