Springer Handbook of Automation 2009
DOI: 10.1007/978-3-540-78831-7_8
|View full text |Cite
|
Sign up to set email alerts
|

Trends in Automation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…First, the actual automation of the manufacturing systems in the factory (the physical process), replaces human muscle power and this is referred to as mechanization. Second, the application of computers or information technology to transform data and manage information to control physical processes substitutes or augments cognitive tasks, which is referred to as computerization (Terwiesch & Ganz, 2009). Depending on the level of automation, computerization is transferring control, regulating and decision-making from humans to technical systems (Frohm & Bellgran, 2005).…”
Section: Work Design and Technology In Industrial Productionmentioning
confidence: 99%
“…First, the actual automation of the manufacturing systems in the factory (the physical process), replaces human muscle power and this is referred to as mechanization. Second, the application of computers or information technology to transform data and manage information to control physical processes substitutes or augments cognitive tasks, which is referred to as computerization (Terwiesch & Ganz, 2009). Depending on the level of automation, computerization is transferring control, regulating and decision-making from humans to technical systems (Frohm & Bellgran, 2005).…”
Section: Work Design and Technology In Industrial Productionmentioning
confidence: 99%
“…With transformation to distributed and autonomous e-Systems supporting the aforementioned e-Activities, cyber-security of information, computer, and communication systems is now a crucial challenge for emerging e-Work, e-Business, and e-Service. For instance, denial-of-service attacks influencing the financial systems of a company or even a country's infrastructure through spyware or phishing attacks (Terwiesch and Ganz, 2009) impose significant damages and losses to the system. Another vital example is network security in wireless sensor networks, operating in hostile environments (e.g., battlefields).…”
mentioning
confidence: 99%