Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pascale, R. T. “Zen and the art of management,” Harvard Business Review March–April 1978, pp. 153–162.
Zuboff, S. In the age of the smart machine (Basic Books, New York, 1988).
Zuboff, pp. 83–84.
Lucky, R. W. “Just right,” IEEE Spectrum Jan. 1997, p. 21.
Bernstein, L., and Yuhas, C. M. “Expert systems in network management—The second revolution,” IEEE Journal on Selected Areas in Communications 6:5 (June 1988). Bramer, M. Practical experience in building expert systems (Wiley, New York, 1990).
Eick, S. G., and Fyock, D. E. “Visualizing corporate data,” AT&T Technical Journal 75:1, 74–86 (Jan./Feb. 1996).
Anupam, V., Bajaj, C., Schikore, D., and Schikore, M. “Distributed and collaborative visualization,” Computer 27:7, 37–43 (July 1994).
Cunningham, J. P., Blewett, C. D., and Anderson, J. S. “Graphical interfaces for network operations and management,” User Interface Design and Development Issue, AT&T Technical Journal 72:3, 57–66 (May/June 1993).
Shedroff, N. “Interfaces for understanding,” More than screen deep (National Academy Press, Washington, DC, 1997), pp. 252–259.
Winograd, T. “Interspace and an every-citizen interface to the national information infrastructure,” More than screen deep (National Academy Press, Washington, DC, 1997), pp. 260–264.
Vaughan, N. “Networks and systems still seeking suitable frameworks,” Software Magazine Oct. 1994, pp. 53–58.
Blake, P. “Systems you can’t knock,” Telephony Feb. 23, 1998, pp.46–50.
Cosgrove, J. G. “Wisconsin brings network management under control,” Telephony Nov. 10, 1986.
Andrianopoulos, C. “Welcome to the telecom future,” Telephony Dec. 3, 1990.
Herman. “Let’s focus on content, not GUI’s,” Business Communications Review Aug. 1995, p. 52.
Myers, J., and VanderWall, J. “Lipstick on a bulldog,” Telephony Oct. 27, 1997, pp. 34–40.
Lee, B. H. “Embedded Internet systems: Poised for takeoff,” IEEE Internet Computing May/June 1998, pp. 24–29.
Krulwick, B. “Automating the Internet: Agents as user surrogates,” IEEE Internet Computing July/Aug. 1997, pp. 34–38.
Huhns, M. N., and Singh, M. P. “Workflow agents,” IEEE Internet Computing July/Aug. 1998, pp. 994–996.
Schneiderman, B., and Maes, P. “Direct manipulation vs interface agents,” Interactions Nov. Dec. 1997, pp. 42–61.
Amoroso, E., and Sharp, R. PCWEEK Intranet and Internet firewall strategies (Ziff-Davis Press, Macmillan Computer Publishing, Emeryville, CA, 1996).
Harmon, A. “‘Hacktivists’ of all persuasions take their struggle to the Web,” The New York Times Oct. 31, 1998, pp. A1, A6.
Cheswick, W. R., and Bellovin, S. M. Firewalls and Internet security: Repelling the wily hacker (Addison-Wesley, Reading, MA, 1994).
Levi, M. D., and Conrad, F. G. “A heuristic evaluation of a World Wide Web prototype,” Interactions: New Visions of Human-Computer Interaction 3:4, 50–61 (July/Aug. 1996).
Zuboff.
Maybury, M. T. “Intelligent multimedia interfaces for ‘each’ citizen,” More than screen deep (National Academy Press, Washington, DC, 1997), pp.246–251.
Terveen, L. “Computer-mediated collaboration,” More than screen deep (National Academy Press, Washington, DC, 1997), pp. 307–314.
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
(2002). Pillar—Human Factors. In: Basic Concepts for Managing Telecommunications Networks. Network and Systems Management. Springer, Boston, MA. https://doi.org/10.1007/0-306-46970-7_9
Download citation
DOI: https://doi.org/10.1007/0-306-46970-7_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-306-46237-5
Online ISBN: 978-0-306-46970-1
eBook Packages: Springer Book Archive