Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Simulation in Information Systems: Potential of the Vulnerability Theory
Publication

Publications

Simulation in Information Systems: Potential of the Vulnerability Theory

Title
Simulation in Information Systems: Potential of the Vulnerability Theory
Type
Article in International Conference Proceedings Book
Year
2010
Authors
Pedro Sa Silva
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Jorge Pinto
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Joao Varajao
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Antonio Trigo
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Maria Manuela Cruz Cunha
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Isabel Bentes
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Humberto Varum
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Jitendra Agarwal
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Conference proceedings International
Pages: 219-229
International Conference on Enterprise Information Systems
Viana do Castelo, PORTUGAL, OCT 20-22, 2010
Scientific classification
FOS: Engineering and technology > Civil engineering
CORDIS: Technological sciences > Engineering > Civil engineering > Structural engineering
Other information
Authenticus ID: P-003-AQB
Abstract (EN): Systems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 11
Documents
We could not find any documents associated to the publication.
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-07 at 23:32:27 | Privacy Policy | Personal Data Protection Policy | Whistleblowing