Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Cybernetics | 5 |
Human Factors Engineering | 5 |
Action Research | 1 |
Benchmarking | 1 |
Case Studies | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
Computer Software | 1 |
Computer System Design | 1 |
Courseware | 1 |
Data Collection | 1 |
More ▼ |
Source
Chronicle of Higher Education | 2 |
Campus-Wide Information… | 1 |
International Association for… | 1 |
ProQuest LLC | 1 |
Author
Young, Jeffrey R. | 2 |
Ansari, Fazel | 1 |
Conradie, Pieter | 1 |
Mokhtar, Tarek Hassan Amin | 1 |
Seidenberg, Ulrich | 1 |
van Dyk, Liezl | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ansari, Fazel; Seidenberg, Ulrich – International Association for Development of the Information Society, 2016
This paper discusses the complementarity of human and cyber physical production systems (CPPS). The discourse of complementarity is elaborated by defining five criteria for comparing the characteristics of human and CPPS. Finally, a management portfolio matrix is proposed for examining the feasibility of optimal collaboration between them. The…
Descriptors: Problem Solving, Cybernetics, Feasibility Studies, Human Factors Engineering
Mokhtar, Tarek Hassan Amin – ProQuest LLC, 2011
Conventional monuments are concrete manifestations of memories without the capacity to reflect individual interpretations of history. In an increasingly digital society, however, there is a need for configurable monuments reflecting our contemporary, open and complex community. "Monumental-IT" reflects the dynamic and inclusive character of our…
Descriptors: Expertise, Quasiexperimental Design, Research Methodology, Interaction
Young, Jeffrey R. – Chronicle of Higher Education, 2008
User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…
Descriptors: Computer Software, Computer Security, Educational Technology, Social Networks
Young, Jeffrey R. – Chronicle of Higher Education, 2008
This article reports that last month at the NASA-Ames Research Center, a group of top scientists and business leaders gathered to plan a new university devoted to the idea that computers will soon become smarter than people. The details of Singularity University, as the new institution will be called, are still being worked out--and so far the…
Descriptors: Virtual Universities, Human Factors Engineering, Cybernetics, Computer Science Education
van Dyk, Liezl; Conradie, Pieter – Campus-Wide Information Systems, 2007
Purpose: This article seeks to address the interface between individual learning facilitators that use course management systems (CMS) data to support decision-making and course design and institutional infrastructure providers that are responsible for institutional business intelligence. Design/methodology/approach: The design of a data warehouse…
Descriptors: Management Systems, Action Research, Researchers, Knowledge Management