Supply system's technology configuration as a contributor to end-user vulnerability

Lindsay Robertson, Katina Michael, Albert Munoz Aneiros

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.

Original languageEnglish (US)
Title of host publication2015 IEEE International Symposium on Technology and Society, ISTAS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479982837
DOIs
StatePublished - Mar 22 2016
Externally publishedYes
EventIEEE International Symposium on Technology and Society, ISTAS 2015 - Dublin, Ireland
Duration: Nov 11 2015Nov 12 2015

Publication series

NameInternational Symposium on Technology and Society, Proceedings
Volume2016-March

Conference

ConferenceIEEE International Symposium on Technology and Society, ISTAS 2015
Country/TerritoryIreland
CityDublin
Period11/11/1511/12/15

Keywords

  • Exposure
  • Individual
  • Risk
  • Technology
  • Vulnerability

ASJC Scopus subject areas

  • General Engineering
  • General Social Sciences

Fingerprint

Dive into the research topics of 'Supply system's technology configuration as a contributor to end-user vulnerability'. Together they form a unique fingerprint.

Cite this