Please use this identifier to cite or link to this item: http://hdl.handle.net/10773/8428
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSá-Silva, P.pt
dc.contributor.authorPinto, J.pt
dc.contributor.authorVarajão, J.pt
dc.contributor.authorTrigo, A.pt
dc.contributor.authorCruz-Cunha, M.pt
dc.contributor.authorBentes, I.pt
dc.contributor.authorVarum, H.pt
dc.contributor.authorAgarwal, J.pt
dc.date.accessioned2012-05-02T15:15:02Z-
dc.date.issued2010-
dc.identifier.isbn978-3-642-16401-9pt
dc.identifier.urihttp://hdl.handle.net/10773/8428-
dc.description.abstractSystems simulation has been widely used in the last decades in order to analyze the impact of different scenarios in several areas, and its application to information systems in no exception. Analyzing information systems through simulation models is simultaneously much more affordable; it is required a smaller amount of resources and it is less disruptive with the real system. Since information systems are becoming a cornerstone for our society, a failure in these systems can have a huge impact. The theory of vulnerability identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. This paper discusses the use of the theory of vulnerability in information system simulation.pt
dc.language.isoengpt
dc.publisherSpringerpt
dc.rightsrestrictedAccesspor
dc.subjectSimulationpt
dc.subjectModelingpt
dc.subjectVulnerabilitypt
dc.subjectInformation systemspt
dc.subjectFailure scenariospt
dc.titleSimulation in Information Systems: Potential of the vulnerability theorypt
dc.typebookPartpt
degois.publication.firstPage219pt
degois.publication.issuePart 4-
degois.publication.lastPage229pt
degois.publication.titleENTERprise Information Systemspt
degois.publication.volume109-
dc.date.embargo10000-01-01-
dc.identifier.doi10.1007/978-3-642-24358-5pt
Appears in Collections:DECivil - Capítulo de livro

Files in This Item:
File Description SizeFormat 
D_019____procurar documento original.pdf921.63 kBAdobe PDFrestrictedAccess


FacebookTwitterLinkedIn
Formato BibTex MendeleyEndnote Degois 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.