Predictability of SOC Systems. Technological Extreme Events

  • Giovanna Bimonte
Part of the New Economic Windows book series (NEW)


The growth of societal networks of every kind (information, communication, transportation, etc.), the progressive interpenetration of natural and artificial systems, and the continually increasing complexity1 of human organizations and institutions promises to magnify the impacts and to generate new types and combinations of technological extreme events. Given these observations, extreme events emerge as a powerful focus for organizing research activities that can advance scientific knowledge and benefit society.

The possibility to develop some new tools, as exploratory model, open new possibility research to forecast complex adaptive model and to predict Technological Extreme Events on SOC system.

Whereas complex adaptive systems and agent-based models of them originally seemed to pose a problem for policy analysis, they may also present an opportunity. The failure of computerized decision support systems to provide significant help for most problems is striking when contrasted with the impact of computer technology in other spheres. Looking back, we can now see that most policy problems involve complex and adaptive systems, and that for those problems the classical approaches of predictive modeling and optimization that have been used in decision support software are not appropriate. The next stage in the development of complexity science could well include a reformulation of decision theory and the emergence of the first really useful computer-assisted reasoning for policy analysis.


Extreme Event Computer Network Adaptive System Exploratory Modeling Complex Adaptive System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adams, E.N., (1984). Optimising preventive maintenance of software products, IBM Journal of Research & Development 28(1), 2–14CrossRefGoogle Scholar
  2. 2.
    Bak, P., Tang, C., Wiesenfeld, K., (1987) Self-organized criticality: an explanation of 1/f noise. Physic Review Letters 59, 381–384MathSciNetCrossRefGoogle Scholar
  3. 3.
    Bak, P., (1996) How nature works: the science of self-organized criticality. Copernicus, New YorkMATHCrossRefGoogle Scholar
  4. 4.
    Bankes, S., (1993) Exploratory Modeling for Policy Analysis. Operations Research 41(3), 435–449CrossRefGoogle Scholar
  5. 5.
    Bankes, S., (1996) Exploratory Modeling. Encyclopedia of Operations Research and Management Science, Saul I. Gass and Carl M. Harris, eds., Kluwer Academic Publishers, BostonGoogle Scholar
  6. 6.
    Choi, T., Liker, J., (1995). Bringing Japanese continuous improvement to US manufacturing: the roles of process orientation and communications. Decision Sciences 26, 5CrossRefGoogle Scholar
  7. 7.
    Christie, A.M., (2002). Network Survivability. Analysis Using Easel TECHNICAL REPORT CMU/SEI-2002-TR-039 Google Scholar
  8. 8.
    Dooley, K., Van de Ven, A., (1999). Explaining complex organizational dynamics. Organization Science 10(3), 358–372CrossRefGoogle Scholar
  9. 9.
    Kauffman, S., (1995). At Home in the Universe. Oxford University Press, New YorkGoogle Scholar
  10. 10.
    Guastello, S., (1995). Chaos, Catastrophe, and Human Affairs. Erlbaum, Mahwah, NJGoogle Scholar
  11. 11.
    Iba, T., Hirokane, M., Kawakami, H., Takenaka, H., Takefuji, Y., (2000). Exploratory Model Building. Toward Agent-Based Economics. International Session, The 4th Annual Meeting of the Japan Association for Evolutionary Economics, TokyoGoogle Scholar
  12. 12.
    Littlewood B., (1989). Predicting software reliability, Philosophical Transactions of the Royal Society of London A327, 513–527Google Scholar
  13. 13.
    Mitzenmacher, M., (2005). Editorial: The Future of Power Law Research. Internet Mathematics 2(4), 525–534MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Aspnes, J., Feigenbaum, J., Mitzenmacher, M., Parkes, D., (2003). Towards Better Definitions and Measures of Internet Security. In Workshop on Large-Scale Network Security and Deployment Obstacles Google Scholar
  15. 15.
    Peitgen, H.O., Jurgens, H., Saupe, D., (1992). Chaos and Fractals: New Frontiers of Science. Springer, New YorkCrossRefGoogle Scholar
  16. 16.
    Salzano M. (2008) The Analysis of Extreme Events — Some Forecasting Approches. In: C. Perna and M. Sibillo, Mathematical and Statistical Methods in Insurance and Finance. Springer, Milan Berlin Heidelberg New YorkGoogle Scholar
  17. 17.
    Salzano M. (2008) Forecasting Financial Extreme Events: a SOC Approach. In: L. D’Ambra, P. Rostirolla, M. Squillante, Metodi, Modelli, e Tecnologie dell’Informazione a Supporto delle Decisioni. Parte prima: metodologie Google Scholar
  18. 18.
    Wasserman, S., Faust, K., (1994). Social Network Analysis. Cambridge University Press, New YorkGoogle Scholar
  19. 19.
    Zimmerman, B., Lindberg, C., Plsek, P., (1998). Edgeware. VHA, Irving, TXGoogle Scholar

Copyright information

© Springer-Verlag Italia 2010

Authors and Affiliations

  • Giovanna Bimonte
    • 1
  1. 1.Department of Economic and Statistic SciencesUniversity of SalernoFiscianoItaly

Personalised recommendations