{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:09:39Z","timestamp":1648840179035},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1991,4,1]],"date-time":"1991-04-01T00:00:00Z","timestamp":670464000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[1991,4]]},"DOI":"10.1007\/bf01891718","type":"journal-article","created":{"date-parts":[[2005,7,5]],"date-time":"2005-07-05T06:54:56Z","timestamp":1120546496000},"page":"128-141","source":"Crossref","is-referenced-by-count":0,"title":["On a human-centred approach to database systems"],"prefix":"10.1007","volume":"5","author":[{"given":"Brian","family":"Lings","sequence":"first","affiliation":[]},{"given":"Nat","family":"Adablah","sequence":"additional","affiliation":[]},{"given":"Lou","family":"Foster","sequence":"additional","affiliation":[]},{"given":"Yuanping","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ajit","family":"Narayanan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF01891718_CR1","unstructured":"Ahituv, N. and Neumann, S. (1982).Principles of Information Systems for Management. William C. Brown Company Publishers."},{"key":"BF01891718_CR2","unstructured":"Bentley, T. (1982).Management Information Systems and Data Processing. Holt Rinehart and Winston."},{"key":"BF01891718_CR3","unstructured":"Boden, M. (1979). The computational metaphor in psychology. In Bolton, N. (ed.)Philosophical Problems in Psychology. Methuen."},{"key":"BF01891718_CR4","unstructured":"Cerri, S, and Pelagatti, G. (1984).Distributed Databases: Principles and Systems. McGraw Hill."},{"key":"BF01891718_CR5","unstructured":"Clifton, H. D. (1978).Business Data Systems. Prentice Hall."},{"key":"BF01891718_CR6","volume-title":"AI & Society. 1","author":"M. Cooley","year":"1987","unstructured":"Cooley, M. (1987a). Human-centred systems: an urgent problem for systems designers.AI & Society. 1 Springer-Verlag. London."},{"key":"BF01891718_CR7","volume-title":"Architect or bee?: the price of technology (revised)","author":"M. Cooley","year":"1987","unstructured":"Cooley, M. (1987b).Architect or bee?: the price of technology (revised). Langley Technical Services. Slough, UK."},{"key":"BF01891718_CR8","volume-title":"Knowledge, Skill and Artificial Intelligence","author":"M. Cooley","year":"1988","unstructured":"Cooley, M. (1988). Creativity, Skill and Human-Centred Systems. In K. S. Gill (ed.)Knowledge, Skill and Artificial Intelligence. Springer-Verlag. London."},{"key":"BF01891718_CR9","unstructured":"Date, C. J. (1981).An Introduction to Database Systems, 3rd Edition. Addison Wesley."},{"key":"BF01891718_CR10","doi-asserted-by":"crossref","unstructured":"Deen, S. M. (1985).Principles and Practice of Database Systems. MacMillan.","DOI":"10.1007\/978-1-349-17958-9"},{"key":"BF01891718_CR11","volume-title":"Knowledge, Skill and Artificial Intelligence","author":"R. Ennals","year":"1988","unstructured":"Ennals, R. (1988). Can skills be transferable? In Gill, K. S. (ed.)Knowledge, Skill and Artificial Intelligence. Springer-Verlag. London."},{"key":"BF01891718_CR12","unstructured":"Fernandez, E. B. Summers, R. C. and Wood, C. (1981).Database Security and Integrity. Addison Wesley."},{"key":"BF01891718_CR13","volume-title":"Knowledge, Skill and Artificial Intelligence","author":"K. S. Gill","year":"1988","unstructured":"Gill, K. S. (1988). Artificial intelligence and social action. In Gill, K. S. (ed.)Knowledge, Skill and Artificial Intelligence. Springer-Verlag. London."},{"key":"BF01891718_CR14","volume-title":"Knowledge, Skill and Artificial Intelligence","author":"A. Janik","year":"1988","unstructured":"Janik, A. (1988). Tacit knowledge, working life and scientific method. In Gill, K. S. (ed.)Knowledge, Skill and Artificial Intelligence. Springer-Verlag. London."},{"key":"BF01891718_CR15","unstructured":"Martin, J. (1975).Computer Data-Base Organisation. Prentice-Hall."},{"key":"BF01891718_CR16","unstructured":"Narayanan, A. (1986). Memory models of man and machine. In Yazdani, M. (ed.)Artificial Intelligence: Principles and Applications. Chapman and Hall."},{"key":"BF01891718_CR17","unstructured":"Norman, D. A. and Bobrow, D. J. (1976). On the role of active memory processes in perception and cognition. In Cofer, C. N. (ed.)The Structure of Human Memory. Freeman."},{"key":"BF01891718_CR18","unstructured":"Parkin, A. (1980).Systems Analysis. Edward Arnold."},{"key":"BF01891718_CR19","unstructured":"Polanyi, M. (1967).The Tacit Dimension. Routledge and Kegan Paul."},{"key":"BF01891718_CR20","doi-asserted-by":"crossref","unstructured":"Rauner, F. et al. (1988). The social shaping of technology and work: Human-centred CIM systems.AI & Society. 2.","DOI":"10.1007\/BF01891442"},{"key":"BF01891718_CR21","unstructured":"Robinson, H. (1981).Database Analysis and Design. Chartwell-Bratt."},{"key":"BF01891718_CR22","unstructured":"Shave, M. J. R. and Bhaskar, K. N. (1982).Computer Science Applied to Business Systems. Addison Wesley."},{"key":"BF01891718_CR23","volume-title":"Knowledge, Skill and Artificial Intelligence","author":"D. Schartum","year":"1988","unstructured":"Schartum, D. (1988). Delegation and decentralization \u2014 computer systems as tools for instruction and improved service to clients. In Goranzon, B. and Josefson, I. (eds.)Knowledge, Skill and Artificial Intelligence. Springer-Verlag. London."},{"key":"BF01891718_CR24","doi-asserted-by":"crossref","unstructured":"Shneiderman, B. (1987).Designing the User Interface: Strategies for Effective Human-Computer Interaction. Addison Wesley.","DOI":"10.1145\/25065.950626"},{"key":"BF01891718_CR25","doi-asserted-by":"crossref","unstructured":"Tsichritzis, D. and Klug, A. (1978). The ANSI\/X3\/SPARC DBMS framework report of the study group on database management systems.Information Systems, 3 (3).","DOI":"10.1016\/0306-4379(78)90001-7"},{"key":"BF01891718_CR26","unstructured":"Ullman, J. D. (1980).Principles of Database Systems. Computer Science Press."},{"key":"BF01891718_CR27","unstructured":"Vetter, M. and Maddison, R. N. (1981).Database Design Methodology. Prentice Hall International."},{"key":"BF01891718_CR28","unstructured":"Weizenbaum, J. (1976).Computer Power and Human Reason: From Judgement to Calculation. Penguin."},{"key":"BF01891718_CR29","unstructured":"Wiederhold, G. (1977).Database Design. McGraw Hill."},{"key":"BF01891718_CR30","unstructured":"Winograd, T. and Flores, F. (1986).Understanding Computers and Cognition. Addison Wesley."}],"container-title":["AI &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01891718.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01891718\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01891718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T04:19:03Z","timestamp":1586319543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01891718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,4]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1991,4]]}},"alternative-id":["BF01891718"],"URL":"https:\/\/doi.org\/10.1007\/bf01891718","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[1991,4]]}}}