2021 ◽  
Vol 33 (4) ◽  
pp. 185-208
Author(s):  
Barbara Hewitt ◽  
Garry White

Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.


2019 ◽  
Vol 45 (3) ◽  
pp. 515-537
Author(s):  
Michael L. Black

It is often taken for granted that personal computers today are designed to hide technical information in order to make software seem easier. While “transparency of interaction” has influenced popular understandings of computer systems, it also shapes our engagement with software as critics. This essay examines the origins of transparent design in different models of usability proposed by IBM and Apple in response to popular concerns over the inaccessibility of personal computers in the early 1980s. By tracing how and why transparency emerged from this period of crisis, we can better interrogate its justifications and imagine alternative relationships to computing.


2021 ◽  
Vol 15 (1) ◽  
pp. 131-152
Author(s):  
Ignasi Meda-Calvet

Abstract The histories of personal computing have been focusing lately on groups of users who saw computing as an exciting new field in activities apparently as different as hardware tinkering, coding or even playing video games. What do we know, however, about the users who did not share these interests and yet ended up using personal computers in their everyday contexts? Based on the study of the Center for the Popularization of Informatics—a Catalan institution that promoted computer technologies among diverse audiences, often unemployed and youth—this article shows how a new and heterogeneous user profile needed to be created: the “non-professional computer users.” With the increasing use of computers in the 1990s, most people employed computer technologies as a means to carry out regular duties and labor tasks performed, in most cases, even before computerization. In addition, the article suggests that computer technologies strengthened more than improved or reshaped the traditional labor processes and working conditions.


Author(s):  
David C. Joy

Personal computers (PCs) are a powerful resource in the EM Laboratory, both as a means of automating the monitoring and control of microscopes, and as a tool for quantifying the interpretation of data. Not only is a PC more versatile than a piece of dedicated data logging equipment, but it is also substantially cheaper. In this tutorial the practical principles of using a PC for these types of activities will be discussed.The PC can form the basis of a system to measure, display, record and store the many parameters which characterize the operational conditions of the EM. In this mode it is operating as a data logger. The necessary first step is to find a suitable source from which to measure each of the items of interest. It is usually possible to do this without having to make permanent corrections or modifications to the EM.


IEE Review ◽  
2005 ◽  
Vol 51 (2) ◽  
pp. 44-48
Author(s):  
D. McAuley
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document