Skip to main content

Part of the book series: Network and Systems Management ((NASM))

  • 90 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pascale, R. T. “Zen and the art of management,” Harvard Business Review March–April 1978, pp. 153–162.

    Google Scholar 

  2. Zuboff, S. In the age of the smart machine (Basic Books, New York, 1988).

    Google Scholar 

  3. Zuboff, pp. 83–84.

    Google Scholar 

  4. Lucky, R. W. “Just right,” IEEE Spectrum Jan. 1997, p. 21.

    Google Scholar 

  5. Bernstein, L., and Yuhas, C. M. “Expert systems in network management—The second revolution,” IEEE Journal on Selected Areas in Communications 6:5 (June 1988). Bramer, M. Practical experience in building expert systems (Wiley, New York, 1990).

    Google Scholar 

  6. Eick, S. G., and Fyock, D. E. “Visualizing corporate data,” AT&T Technical Journal 75:1, 74–86 (Jan./Feb. 1996).

    Google Scholar 

  7. Anupam, V., Bajaj, C., Schikore, D., and Schikore, M. “Distributed and collaborative visualization,” Computer 27:7, 37–43 (July 1994).

    Google Scholar 

  8. Cunningham, J. P., Blewett, C. D., and Anderson, J. S. “Graphical interfaces for network operations and management,” User Interface Design and Development Issue, AT&T Technical Journal 72:3, 57–66 (May/June 1993).

    Google Scholar 

  9. Shedroff, N. “Interfaces for understanding,” More than screen deep (National Academy Press, Washington, DC, 1997), pp. 252–259.

    Google Scholar 

  10. Winograd, T. “Interspace and an every-citizen interface to the national information infrastructure,” More than screen deep (National Academy Press, Washington, DC, 1997), pp. 260–264.

    Google Scholar 

  11. Vaughan, N. “Networks and systems still seeking suitable frameworks,” Software Magazine Oct. 1994, pp. 53–58.

    Google Scholar 

  12. Blake, P. “Systems you can’t knock,” Telephony Feb. 23, 1998, pp.46–50.

    Google Scholar 

  13. Cosgrove, J. G. “Wisconsin brings network management under control,” Telephony Nov. 10, 1986.

    Google Scholar 

  14. Andrianopoulos, C. “Welcome to the telecom future,” Telephony Dec. 3, 1990.

    Google Scholar 

  15. Herman. “Let’s focus on content, not GUI’s,” Business Communications Review Aug. 1995, p. 52.

    Google Scholar 

  16. Myers, J., and VanderWall, J. “Lipstick on a bulldog,” Telephony Oct. 27, 1997, pp. 34–40.

    Google Scholar 

  17. Lee, B. H. “Embedded Internet systems: Poised for takeoff,” IEEE Internet Computing May/June 1998, pp. 24–29.

    Google Scholar 

  18. Krulwick, B. “Automating the Internet: Agents as user surrogates,” IEEE Internet Computing July/Aug. 1997, pp. 34–38.

    Google Scholar 

  19. Huhns, M. N., and Singh, M. P. “Workflow agents,” IEEE Internet Computing July/Aug. 1998, pp. 994–996.

    Google Scholar 

  20. Schneiderman, B., and Maes, P. “Direct manipulation vs interface agents,” Interactions Nov. Dec. 1997, pp. 42–61.

    Google Scholar 

  21. Amoroso, E., and Sharp, R. PCWEEK Intranet and Internet firewall strategies (Ziff-Davis Press, Macmillan Computer Publishing, Emeryville, CA, 1996).

    Google Scholar 

  22. Harmon, A. “‘Hacktivists’ of all persuasions take their struggle to the Web,” The New York Times Oct. 31, 1998, pp. A1, A6.

    Google Scholar 

  23. Cheswick, W. R., and Bellovin, S. M. Firewalls and Internet security: Repelling the wily hacker (Addison-Wesley, Reading, MA, 1994).

    Google Scholar 

  24. Levi, M. D., and Conrad, F. G. “A heuristic evaluation of a World Wide Web prototype,” Interactions: New Visions of Human-Computer Interaction 3:4, 50–61 (July/Aug. 1996).

    Google Scholar 

  25. Zuboff.

    Google Scholar 

  26. Maybury, M. T. “Intelligent multimedia interfaces for ‘each’ citizen,” More than screen deep (National Academy Press, Washington, DC, 1997), pp.246–251.

    Google Scholar 

  27. Terveen, L. “Computer-mediated collaboration,” More than screen deep (National Academy Press, Washington, DC, 1997), pp. 307–314.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Kluwer Academic Publishers

About this chapter

Cite this chapter

(2002). Pillar—Human Factors. In: Basic Concepts for Managing Telecommunications Networks. Network and Systems Management. Springer, Boston, MA. https://doi.org/10.1007/0-306-46970-7_9

Download citation

  • DOI: https://doi.org/10.1007/0-306-46970-7_9

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-306-46237-5

  • Online ISBN: 978-0-306-46970-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics