Supply system's technology configuration as a contributor to end-user vulnerability

Lindsay Robertson, Katina Michael, Albert Munoz Aneiros

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.

Original languageEnglish (US)
Title of host publication2015 IEEE International Symposium on Technology and Society, ISTAS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479982837
DOIs
StatePublished - Mar 22 2016
Externally publishedYes
EventIEEE International Symposium on Technology and Society, ISTAS 2015 - Dublin, Ireland
Duration: Nov 11 2015Nov 12 2015

Publication series

NameInternational Symposium on Technology and Society, Proceedings
Volume2016-March

Conference

ConferenceIEEE International Symposium on Technology and Society, ISTAS 2015
CountryIreland
CityDublin
Period11/11/1511/12/15

Fingerprint

vulnerability
supply
cause
evaluation

Keywords

  • Exposure
  • Individual
  • Risk
  • Technology
  • Vulnerability

ASJC Scopus subject areas

  • Engineering(all)
  • Social Sciences(all)

Cite this

Robertson, L., Michael, K., & Aneiros, A. M. (2016). Supply system's technology configuration as a contributor to end-user vulnerability. In 2015 IEEE International Symposium on Technology and Society, ISTAS 2015 [7439445] (International Symposium on Technology and Society, Proceedings; Vol. 2016-March). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISTAS.2015.7439445

Supply system's technology configuration as a contributor to end-user vulnerability. / Robertson, Lindsay; Michael, Katina; Aneiros, Albert Munoz.

2015 IEEE International Symposium on Technology and Society, ISTAS 2015. Institute of Electrical and Electronics Engineers Inc., 2016. 7439445 (International Symposium on Technology and Society, Proceedings; Vol. 2016-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Robertson, L, Michael, K & Aneiros, AM 2016, Supply system's technology configuration as a contributor to end-user vulnerability. in 2015 IEEE International Symposium on Technology and Society, ISTAS 2015., 7439445, International Symposium on Technology and Society, Proceedings, vol. 2016-March, Institute of Electrical and Electronics Engineers Inc., IEEE International Symposium on Technology and Society, ISTAS 2015, Dublin, Ireland, 11/11/15. https://doi.org/10.1109/ISTAS.2015.7439445
Robertson L, Michael K, Aneiros AM. Supply system's technology configuration as a contributor to end-user vulnerability. In 2015 IEEE International Symposium on Technology and Society, ISTAS 2015. Institute of Electrical and Electronics Engineers Inc. 2016. 7439445. (International Symposium on Technology and Society, Proceedings). https://doi.org/10.1109/ISTAS.2015.7439445
Robertson, Lindsay ; Michael, Katina ; Aneiros, Albert Munoz. / Supply system's technology configuration as a contributor to end-user vulnerability. 2015 IEEE International Symposium on Technology and Society, ISTAS 2015. Institute of Electrical and Electronics Engineers Inc., 2016. (International Symposium on Technology and Society, Proceedings).
@inproceedings{97983c19e8354f719f9f20c67d0878ee,
title = "Supply system's technology configuration as a contributor to end-user vulnerability",
abstract = "Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of {"}exposure{"} that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.",
keywords = "Exposure, Individual, Risk, Technology, Vulnerability",
author = "Lindsay Robertson and Katina Michael and Aneiros, {Albert Munoz}",
year = "2016",
month = "3",
day = "22",
doi = "10.1109/ISTAS.2015.7439445",
language = "English (US)",
series = "International Symposium on Technology and Society, Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2015 IEEE International Symposium on Technology and Society, ISTAS 2015",

}

TY - GEN

T1 - Supply system's technology configuration as a contributor to end-user vulnerability

AU - Robertson, Lindsay

AU - Michael, Katina

AU - Aneiros, Albert Munoz

PY - 2016/3/22

Y1 - 2016/3/22

N2 - Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.

AB - Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user 'exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.

KW - Exposure

KW - Individual

KW - Risk

KW - Technology

KW - Vulnerability

UR - http://www.scopus.com/inward/record.url?scp=84965100929&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84965100929&partnerID=8YFLogxK

U2 - 10.1109/ISTAS.2015.7439445

DO - 10.1109/ISTAS.2015.7439445

M3 - Conference contribution

AN - SCOPUS:84965100929

T3 - International Symposium on Technology and Society, Proceedings

BT - 2015 IEEE International Symposium on Technology and Society, ISTAS 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -