TY - GEN
T1 - Supply system's technology configuration as a contributor to end-user vulnerability
AU - Robertson, Lindsay
AU - Michael, Katina
AU - Aneiros, Albert Munoz
PY - 2016/3/22
Y1 - 2016/3/22
N2 - Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.
AB - Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.
KW - Exposure
KW - Individual
KW - Risk
KW - Technology
KW - Vulnerability
UR - http://www.scopus.com/inward/record.url?scp=84965100929&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84965100929&partnerID=8YFLogxK
U2 - 10.1109/ISTAS.2015.7439445
DO - 10.1109/ISTAS.2015.7439445
M3 - Conference contribution
AN - SCOPUS:84965100929
T3 - International Symposium on Technology and Society, Proceedings
BT - 2015 IEEE International Symposium on Technology and Society, ISTAS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - IEEE International Symposium on Technology and Society, ISTAS 2015
Y2 - 11 November 2015 through 12 November 2015
ER -