{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:13:56Z","timestamp":1725570836687},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164019"},{"type":"electronic","value":"9783642164026"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16402-6_24","type":"book-chapter","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T10:25:34Z","timestamp":1291199134000},"page":"219-229","source":"Crossref","is-referenced-by-count":2,"title":["Simulation in Information Systems: Potential of the Vulnerability Theory"],"prefix":"10.1007","author":[{"given":"Pedro S\u00e1","family":"Silva","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Varaj\u00e3o","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio","family":"Trigo","sequence":"additional","affiliation":[]},{"given":"Maria Manuela","family":"Cruz-Cunha","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Bentes","sequence":"additional","affiliation":[]},{"given":"Humberto","family":"Varum","sequence":"additional","affiliation":[]},{"given":"Jitendra","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Gogg, T.J., Mott, J.R.A.: Introduction to Simulation. In: Simulation Conference Proceedings, pp. 9\u201317 (Winter 1993)","DOI":"10.1145\/256563.256571"},{"key":"24_CR2","volume-title":"Simulation Modeling and Analysis","author":"A.M. Law","year":"1991","unstructured":"Law, A.M., Kelton, W.D.: Simulation Modeling and Analysis. McGraw-Hill Higher Education, New York (1991)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Sanchez, P.J.: Fundamentals of simulation modeling. In: Simulation Conference 2007, pp. 54\u201362 (Winter 2007)","DOI":"10.1109\/WSC.2007.4419588"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Seila, A.F.: Introduction to simulation. In: Simulation Conference Proceedings, pp. 7\u201315 (Winter 1995)","DOI":"10.1145\/224401.224407"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1016\/j.dss.2006.06.013","volume":"42","author":"N. Domenica Di","year":"2007","unstructured":"Di Domenica, N., Mitra, G., Valente, P., Birbilis, G.: Stochastic programming and scenario generation within a simulation framework: An information systems perspective. Decision Support Systems\u00a042, 2197\u20132218 (2007)","journal-title":"Decision Support Systems"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Banks, J.: Introduction to simulation. In: Simulation Conference Proceedings, vol. 1, 11, pp. 9\u201316 (Winter 2000)","DOI":"10.1109\/WSC.2000.899690"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Carson II, J.S.: Introduction to modeling and simulation. In: Simulation Conference, 2005 Proceedings of the Winter, p. 8 (2005)","DOI":"10.1109\/WSC.2005.1574235"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.ijpe.2006.06.022","volume":"121","author":"L. Whicker","year":"2009","unstructured":"Whicker, L., Bernon, M., Templar, S., Mena, C.: Understanding the relationships between time and cost to improve supply chain performance. International Journal of Production Economics\u00a0121, 641\u2013650 (2009)","journal-title":"International Journal of Production Economics"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1504\/IJATM.2008.020217","volume":"8","author":"S. Latorre","year":"2008","unstructured":"Latorre, S., Pointet, J.-M.: The contributions and consequences of simulation tools and digital mock-ups on design and production as applied to the automobile and aeronautics industries. International Journal of Automotive Technology and Management\u00a08, 350\u2013368 (2008)","journal-title":"International Journal of Automotive Technology and Management"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1504\/IJRAM.2008.019311","volume":"9","author":"K. Kosmidou","year":"2008","unstructured":"Kosmidou, K., Zopounidis, C.: Predicting US commercial bank failures via a multicriteria approach. International Journal of Risk Assessment and Management\u00a09, 26\u201343 (2008)","journal-title":"International Journal of Risk Assessment and Management"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jfs.2009.08.004","volume":"6","author":"P. Docherty","year":"2010","unstructured":"Docherty, P., Wang, G.: Using synthetic data to evaluate the impact of RTGS on systemic risk in the Australian payments system. Journal of Financial Stability\u00a06, 103\u2013117 (2010)","journal-title":"Journal of Financial Stability"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/02630250108970297","volume":"18","author":"J. Agarwal","year":"2001","unstructured":"Agarwal, J., Blockley, D.I., Woodman, N.J.: Vulnerability of systems. Civil Engineering and Environmental Systems\u00a018, 141\u2013165 (2001)","journal-title":"Civil Engineering and Environmental Systems"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Ingalls, R.G.: Introduction to simulation. In: Simulation Conference, WSC 2008, pp. 17\u201326 (Winter 2008)","DOI":"10.1109\/WSC.2008.4736052"},{"key":"24_CR14","volume-title":"Discrete-Event System Simulation","author":"J. Banks","year":"1996","unstructured":"Banks, J., Carson, J.S., Nelson, B.L.: Discrete-Event System Simulation. Prentice Hall, Englewood Cliffs (1996)"},{"key":"24_CR15","volume-title":"Simulation: The Practice of Model Development and Use","author":"S. Robinson","year":"2003","unstructured":"Robinson, S.: Simulation: The Practice of Model Development and Use. Wiley, Chichester (2003)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Goldsman, D.: Introduction to simulation. In: Simulation Conference, pp. 26\u201337 (Winter 2007)","DOI":"10.1109\/WSC.2007.4419585"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1023\/A:1011139719773","volume":"13","author":"G.M. Giaglis","year":"2001","unstructured":"Giaglis, G.M.: A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques. International Journal of Flexible Manufacturing Systems\u00a013, 209\u2013228 (2001)","journal-title":"International Journal of Flexible Manufacturing Systems"},{"key":"24_CR18","first-page":"17","volume":"77","author":"Z. Lu","year":"1999","unstructured":"Lu, Z., Yu, Y., Woodman, N.J., Blockley, D.I.: A theory of structural vulnerability. The Structural Engineer\u00a077, 17\u201324 (1999)","journal-title":"The Structural Engineer"},{"key":"24_CR19","unstructured":"Pinto, J.T.: The risk of a vulnerable scenario. PhD thesis, University of Bristol, UK (2002)"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0167-4730(02)00020-6","volume":"24","author":"J.T. Pinto","year":"2002","unstructured":"Pinto, J.T., Blockley, D.I., Woodman, N.J.: The risk of vulnerable failure. Structural Safety\u00a024, 107\u2013122 (2002)","journal-title":"Structural Safety"},{"key":"24_CR21","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0167-4730(02)00068-1","volume":"25","author":"J. Agarwal","year":"2003","unstructured":"Agarwal, J., Blockley, D., Woodman, N.: Vulnerability of structural systems. Structural Safety\u00a025, 263\u2013286 (2003)","journal-title":"Structural Safety"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Pinto, J.T., Varum, H., Bentes, I., Agarwal, J.: A Theory of Vulnerability of Water Pipe Network (TVWPN). Water Resources Management (2010), http:\/\/www.springerlink.com\/content\/x0240l6077428716\/","DOI":"10.1007\/s11269-010-9655-3"}],"container-title":["Communications in Computer and Information Science","ENTERprise Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16402-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T14:31:27Z","timestamp":1559831487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16402-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164019","9783642164026"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16402-6_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}