{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:03:29Z","timestamp":1747224209500,"version":"3.40.5"},"reference-count":21,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>Information Systems in the past few years became a keystone of society. History shows that in some Information Systems one simple failure can lead to disproportioned economic and social damages. Initially used in structural systems, the theory of vulnerability searches for this type of failure. This theory identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. To test and evaluate these failures injections and analyze the impacts of them in sensitive Information Systems, simulation provides an interesting approach. By mimicking systems and representing them through models, simulation studies an imitated system without disrupting the system itself. Simulation provides a safer approach to explore and test the system in damage scenarios without real consequences. This paper discusses the use of the theory of vulnerability in Information Systems simulation.<\/p>","DOI":"10.4018\/irmj.2012040102","type":"journal-article","created":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T13:35:33Z","timestamp":1333028133000},"page":"22-33","source":"Crossref","is-referenced-by-count":0,"title":["Potential Use of the Theory of Vulnerability in Information Systems"],"prefix":"10.4018","volume":"25","author":[{"given":"Pedro S\u00e1","family":"Silva","sequence":"first","affiliation":[{"name":"Coimbra Institute of Accounting and Administration, Portugal"}]},{"given":"Jorge","family":"Pinto","sequence":"additional","affiliation":[{"name":"University of Tr\u00e1s-os-Montes and Alto Douro, Portugal"}]},{"given":"Jo\u00e3o","family":"Varaj\u00e3o","sequence":"additional","affiliation":[{"name":"University of Tr\u00e1s-os-Montes and Alto Douro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0506-4284","authenticated-orcid":true,"given":"Ant\u00f3nio","family":"Trigo","sequence":"additional","affiliation":[{"name":"Coimbra Institute of Accounting and Administration, Portugal"}]},{"given":"Isabel","family":"Bentes","sequence":"additional","affiliation":[{"name":"University of Tr\u00e1s-os-Montes and Alto Douro, Portugal"}]},{"given":"Humberto","family":"Varum","sequence":"additional","affiliation":[{"name":"University of Aveiro, Portugal"}]}],"member":"2432","reference":[{"key":"irmj.2012040102-0","doi-asserted-by":"publisher","DOI":"10.1080\/02630250108970297"},{"key":"irmj.2012040102-1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4730(02)00068-1"},{"journal-title":"Learning by doing: A comprehensive guide to simulations, computer games, and pedagogy in e-learning and other educational experiences","year":"2005","author":"C.Aldrich","key":"irmj.2012040102-2"},{"journal-title":"Discrete-event system simulation","year":"1996","author":"J.Banks","key":"irmj.2012040102-3"},{"key":"irmj.2012040102-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2009.04.001"},{"key":"irmj.2012040102-5","doi-asserted-by":"crossref","unstructured":"Carson, J. S., II. (2005). Introduction to modeling and simulation. Paper presented at the Winter Simulation Conference, Orlando, FL.","DOI":"10.1109\/WSC.2004.1371297"},{"key":"irmj.2012040102-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.06.013"},{"key":"irmj.2012040102-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfs.2009.08.004"},{"journal-title":"Information systems achieving success by avoiding failure","year":"2005","author":"J.Fortune","key":"irmj.2012040102-8"},{"key":"irmj.2012040102-9","doi-asserted-by":"publisher","DOI":"10.1097\/01.SIH.0000258411.38212.32"},{"key":"irmj.2012040102-10","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2010040103"},{"key":"irmj.2012040102-11","doi-asserted-by":"crossref","unstructured":"Gogg, T. J., & Mott, J. R. A. (1993). Introduction to simulation. Paper presented at the Winter Simulation Conference, Los Angeles, CA.","DOI":"10.1145\/256563.256571"},{"key":"irmj.2012040102-12","doi-asserted-by":"publisher","DOI":"10.1145\/99977.99990"},{"key":"irmj.2012040102-13","doi-asserted-by":"crossref","unstructured":"Ingalls, R. G. (2008). Introduction to simulation. Paper presented at the Winter Simulation Conference, Miami, FL.","DOI":"10.1109\/WSC.2008.4736052"},{"key":"irmj.2012040102-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"irmj.2012040102-15","doi-asserted-by":"publisher","DOI":"10.1504\/IJRAM.2008.019311"},{"key":"irmj.2012040102-16","doi-asserted-by":"publisher","DOI":"10.1504\/IJATM.2008.020217"},{"journal-title":"Simulation modeling and analysis","year":"1991","author":"A. M.Law","key":"irmj.2012040102-17"},{"issue":"18","key":"irmj.2012040102-18","first-page":"17","article-title":"A theory of structural vulnerability.","volume":"77","author":"Z.Lu","year":"1999","journal-title":"The Structural Engineer"},{"journal-title":"The risk of a vulnerable scenario","year":"2002","author":"J.Pinto","key":"irmj.2012040102-19"},{"key":"irmj.2012040102-20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4730(02)00020-6"}],"container-title":["Information Resources Management Journal"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=65101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:10:51Z","timestamp":1654114251000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/irmj.2012040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/irmj.2012040102","relation":{},"ISSN":["1040-1628","1533-7979"],"issn-type":[{"type":"print","value":"1040-1628"},{"type":"electronic","value":"1533-7979"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}