A theoretical perspective of man-made system disasters: Social-technical analysis and design
暂无分享,去创建一个
[1] John W. Sutherland,et al. Assessing the Artificial Intelligence Contribution to Decision Technology , 1986, IEEE Transactions on Systems, Man, and Cybernetics.
[2] Anil Kumar,et al. Information requirements of a global EIS: An exploratory macro assessment , 1996, Decis. Support Syst..
[3] Conrad Smith,et al. Media and Apocalypse: News Coverage of the Yellowstone Forest Fires, Exxon Valdez Oil Spill, and Loma Prieta Earthquake , 1992 .
[4] Ching-Fang Lin,et al. Advanced Control Systems Design , 1993 .
[5] Sumit Ghosh,et al. Understanding complex, real-world systems through asynchronous, distributed decision-making algorithms , 2001, J. Syst. Softw..
[6] John W. Sutherland,et al. A prospective on macrocybernetic process management systems , 1997 .
[7] D. Norman,et al. New technology and human error , 1989 .
[8] Mohammad Jamshidi,et al. Recent Advances in Computer-Aided Control Systems Engineering , 1992 .
[9] Kevin Warwick,et al. Advanced Methods in Adaptive Control for Industrial Application , 1991 .
[10] C. J. Chesmond. Basic Control System Technology , 1990 .
[11] Samuel J. Biondo. Fundamentals of expert systems technology - principles and concepts , 1990 .
[12] John Durkin,et al. Expert systems - design and development , 1994 .
[13] H. Joseph Wen,et al. Managing manmade system disasters with advanced cybernetics , 1998 .
[14] Eric T. G. Wang,et al. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..
[15] Jan Marco Leimeister,et al. Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients , 2005, J. Manag. Inf. Syst..
[16] Craig W. Fisher,et al. Criticality of data quality as exemplified in two disasters , 2001, Inf. Manag..
[17] Sema E. Alptekin,et al. Artificial neural networks for robotics coordinate transformation , 1992 .
[18] Bart Kosko,et al. Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence , 1991 .
[19] Keith Fletcher,et al. The Role of Competitor Information Systems , 1993, Inf. Manag. Comput. Secur..
[20] Annick Carnino,et al. Man and risks : technological and human risk prevention , 1990 .
[21] Scott T. Moore. The study of disasters , 2001 .
[22] W. Rugh. Linear System Theory , 1992 .
[23] Eric N. Berkowitz. Keeping Tabs on the Competition , 2004 .
[24] André Brink,et al. States of Emergency , 1988 .
[25] P. Lagadec,et al. States of Emergency: Technological Failures and Social Destabilization , 1990 .
[26] InduShobha N. Chengalur-Smith,et al. Adopting a disaster-management-based contingency model to the problem of ad hoc forecasting: toward information technology-based strategies , 1999 .
[27] Grady W. Harris. Living with Murphy's Law , 1994 .
[28] Roland Helm,et al. The need for economic and pre‐economic marketing controlling , 1995 .
[29] H. Joseph Wen,et al. Computer-Based Monitoring in the American Workplace: Surveillance Technologies and Legal Challenges , 2005 .
[30] Shu-hsien Liao,et al. Case-based decision support system: Architecture for simulating military command and control , 2000, Eur. J. Oper. Res..
[31] A. Sherlock,et al. Biological analogies in manufacturing , 2000 .
[32] Donald E. Geis,et al. By Design: The Disaster Resistant and Quality-of-Life Community , 2000 .
[33] L. Comfort,et al. Reframing disaster policy: the global evolution of vulnerable communities , 1999 .
[34] Lisa D. Ordóñez,et al. Decisions under Time Pressure: How Time Constraint Affects Risky Decision Making , 1997 .
[35] Kaoru Hirota,et al. Industrial Applications of Fuzzy Technology , 1993, Springer Japan.
[36] Jack Fischel. The Road to September 11 , 2002 .
[37] G. E. Zorpette. Making intelligence smarter , 2002 .
[38] Jörn-Axel Meyer,et al. The acceptance of visual information in management , 1997, Inf. Manag..
[39] Lynne Masel Walters,et al. Bad tidings : communication and catastrophe , 1989 .
[40] Panos J. Antsaklis,et al. An introduction to intelligent and autonomous control , 1993 .
[41] Achim Ilchmann,et al. Non-Identifier-Based High-Gain Adaptive Control , 1993 .
[42] J P Herring. Senior management must champion business intelligence programs. , 1991, The Journal of business strategy.
[43] Lee Wilkins. Shared vulnerability : The media and American perceptions of the Bhopal disaster , 1987 .
[44] Reid G. Smith,et al. Fundamentals of expert systems , 1988 .
[45] Richard S. Lewis. Challenger: The Final Voyage , 1988 .
[46] Malcolm McConnell,et al. Challenger: A Major Malfunction , 1987 .
[47] David R. Marples. social impact of the Chernobyl disaster , 1989 .