57
References
Kavali, E., Kalloniatis, C., Gritzalis, S., 2005. Addressing privacy: matching user require-
ments to implementation techniques. In: 7th Hellenic European Research on Computer
Mathematics & its Applications Conference (HERCMA 2005), Athens, Greece, 22–24
September 2005.
Kirwan, B., Ainsworth, L.K., 1992. A Guide to Task Analysis. CRC Press, Taylor & Francis
Group, Boca Raton, FL.
Kleiner, B.M., 2006. Macroergonomics: analysis and design of work systems. Appl.
Ergonomics 37, 81–89.
Kraemer, S., Carayon, P., Sanquist, T.F., 2009. Human and organisational factors in security
screening and inspection systems: conceptual framework and key research needs. Cogn.
Technol. Work 11 (1), 29–41.
Lanfranchi, V., Ireson, N., 2009. User requirements for a collective intelligence emergency
response system. In: Proceedings of the 23rd British HCI Group Annual Conference on
People and Computers: Celebrating People and Technology. pp. 198–203.
Lawson, G., Sharples, S., Cobb, S., Clarke, D., 2009. Predicting the human response to an
emergency. In: Bust, P.D. (Ed.), Contemporary Ergonomics 2009. Taylor and Francis,
London, pp. 525–532.
Lawson, G., D’Cruz, M., 2011. Ergonomics methods and the digital factory. In: Canetta,
L., Redaelli, C., Flores, M. (Eds.), Intelligent Manufacturing System DiFac. Springer,
London.
Lohse, M., 2011. Bridging the gap between users’ expectations and system evaluations. In:
20th IEEE International Symposium on Robot and Human Interactive Communication, 31
July–3 August 2011, Atlanta, GA, USA. pp. 485–490.
Maguire, M., Bevan, N., 2002. User requirements analysis. A review of supporting meth-
ods. In: Proceedings of IFIP 17th World Computer Congress, 25–30 August, Montreal,
Canada, Kluwer Academic Publishers. pp. 133–148.
Maiden, N., 2008. User requirements and system requirements. IEEE Softw. 25 (2), 90–91.
McNeese, M.C., Zaff, B.S., Citera, M., Brown, C.E., Whitaker, R., 1995. AKADAM: elicit-
ing user knowledge to support participatory ergonomics. Int. J. Indust. Ergonomics 15,
345–363.
Mitchell, R.K., Agle, B., Wood, D.J., 1997. Toward a theory of stakeholder identification and
salience: defining the principle of who and what really counts. Acad. Manage. Rev. 22 (4),
853–886.
Nuseibeh, B., Easterbrook, S., 2000. Requirements engineering: a roadmap. In: Proceedings
of International Conference of Software Engineering (ICSE-2000), 4–11 July 2000. ACM
Press, Limerick, Ireland, pp. 37–46.
Pfitzmann, A., Hansen, M., 2005. Anonymity, unlinkability, unobservability, pseudonymity and
identify management: a consolidated proposal for terminology.
http://dud.inf.tu-dresden.
de/Anon_Terminology.shtml,versionv0.25,December6,2005
(accessed 11.11.13).
Preece, J., Rogers, Y., Sharp, H., 2007. Interaction Design: Beyond Human–Computer
Interaction, second ed. John Wiley & Sons Ltd, Hoboken, NJ.
Reiman, A., Väyrynen, S., 2011. Review of regional workplace development cases: a holistic
approach and proposals for evaluation and management. Int. J. Sociotech. Knowl. Dev. 3,
55–70.
Saikayasit, R., Stedmon, A., Lawson, G., in print. A macro-ergonomics perspective on secu-
rity: a rail case study. In: Stedmon, A.W., Lawson, G. (Eds.). Hostile Intent and Counter-
Terrorism: Human Factors Theory and Application. Ashgate, Aldershot.
Do'stlaringiz bilan baham: |