Skip to main content

E-Maintenance and Vulnerability

  • Conference paper
Engineering Asset Management

Abstract

Teleservice, utilizing modern information processing and communication tools, is by now a well-known way of supporting a product and we have seen the emergence of e-manufacturing and related types of e-service, in particular e-maintenance. In discussions of the present and future of e-manufacturing and e-maintenance systems are among other things risks and vulnerabilities related to utilization of e-services identified as an important area for further research. In this paper the concepts of e-maintenance and vulnerability are briefly described. The vulnerability of the e-maintenance system and its consequences for the managed assets are discussed to some extent. From different risk analysis approaches, e.g. related to computer and network security, several methodologies and tools for the management of vulnerability can be identified and an analysis methodology is proposed. The paper represents the view of a risk analyst and reliability engineer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6 References

  1. Lee, J. (1998). Teleservice engineering in manufacturing: challenges and opportunities. International Journal of Machine Tools & Manufacture, 38, 901–910.

    Article  Google Scholar 

  2. Mathieu, V. (2001). Product services: from a service supporting the product to a service supporting the client. Journal of Business and Industrial Marketing, 16(1), 39–61.

    Article  MathSciNet  Google Scholar 

  3. Kumar, R., & Kumar, U. (2004). A conceptual framework for the development of a service delivery strategy for industrial systems and products. Journal of Business and Industrial Marketing, 19(5), 310–319.

    Article  Google Scholar 

  4. Koç, M., Ni, J., Lee, J., & Bandyopadhyay, P. (2005). Introduction to e-Manufacturing. In: R. Zurawski (Ed.) Industrial Information Technology Handbook, Boca Raton: CRC Press, Chapter 97.

    Google Scholar 

  5. McCrossin, R. (2003). Managing risk in telemedicine. Journal of Telemedicine and Telecare, 9(Suppl.1), 36–39.

    Article  Google Scholar 

  6. Tettero, O., Out, D.J., Franken, H.M. & Schot, J. (1997). Information security embedded in the design of telematics systems. Computers and Security, 16(2), 145–164.

    Article  Google Scholar 

  7. Koc, M. & Lee, J. (2001). A system framework for next-generation e-maintenance systems. Center for Intelligent Maintenance Systems, Univ. of Wisconsin-Milwaukee.

    Google Scholar 

  8. IEV, International Electrotechnical Vocabulary, (International Electrotechnical Commission, Geneva, 2006). (Available IEC January 2006) http://std.iec.ch/iec60050

    Google Scholar 

  9. Avizienis, A., Laprie, J.-C., Randell, B. & Landwehr, C. (2002). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11–33

    Article  Google Scholar 

  10. Stephenson, P. (2004). Applying impact and vulnerability analysis to risk management. Computer Fraud and Security, Issue 2, 16–20.

    Google Scholar 

  11. Stamatis, D.H. (1995). Failure Mode and Effect Analysis: FMEA from Theory to Execution. Milwaukee: ASQ.

    Google Scholar 

  12. IEC 61882 (2001). Hazard and operability studies (HAZOP studies) — Application guide, International Standard IEC 61882. Genève: International Electrical Commission.

    Google Scholar 

  13. Debray, B., et al. (2004). Defining safety functions and safety barriers from fault and event trees analysis of major industrial hazards. In: C. Spitzer et al. (Eds.), Proceedings of PSAM7-EREL’ 04. London: Springer, pp.358–363.

    Google Scholar 

  14. Söderholm, P. & Akersten, P.A. (2005). Scenario analysis in testability design, using event tree analysis. Paper, submitted for publication.

    Google Scholar 

  15. Iung, B. (2003). From remote maintenance to MAS-based e-maintenance of an industrial process, Journal of Intelligent Manufacturing, 14 59–82.

    Article  Google Scholar 

  16. Hollnagel, E. (2004). Barriers and Accident Prevention, or how to improve safety by understanding the nature of accidents rather than finding their causes. Aldershot: Ashgate.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joseph Mathew Jim Kennedy Lin Ma Andy Tan Deryk Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 2006 CIEAM/MESA

About this paper

Cite this paper

Akersten, P.A. (2006). E-Maintenance and Vulnerability. In: Mathew, J., Kennedy, J., Ma, L., Tan, A., Anderson, D. (eds) Engineering Asset Management. Springer, London. https://doi.org/10.1007/978-1-84628-814-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-814-2_13

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-583-7

  • Online ISBN: 978-1-84628-814-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics