Just a Machine? Dehumanizing Strategies in Personal Computer Use

1997 ◽  
Vol 3 (2) ◽  
pp. 83-101 ◽  
Author(s):  
DEBORAH LUPTON ◽  
GREG NOBLE
1998 ◽  
Vol 86 (1) ◽  
pp. 162-162 ◽  
Author(s):  
Anthony Perrone ◽  
David Lester

Having negative attitudes toward personal computers was not associated with sex or external locus of control scores in a sample of 59 undergraduates.


2001 ◽  
Vol 40 (03) ◽  
pp. 221-224 ◽  
Author(s):  
J. Kern ◽  
I. Švab ◽  
M. Markota

Abstract:To examine attitudes about information system security among Croatian physicians a cross-sectional study was performed on a representative sample of 800 Croatian physicians. An anonymous questionnaire comprising 21 questions was distributed and statistical analysis was performed using a chi-square test. A 76.2% response rate was obtained. The majority of respondents (85.8%) believe that information system security is a new area in their work. In general, physicians are not informed about European directives, conventions, recommendations, etc. Only a small number of physicians use personal computers at work (29%). Those physicians who have a personal computer use it mainly for administrative reasons. Most health-care institutions (89%) do not have a security manual and the area of information system security is left to individual interest and initiative. Only 25% of physicians who have a personal computer use any type of password. A high percentage of physicians (22%) has never thought about the problem of personal data being used by organizations (e.g. police, banks) without legal background; a small, but still significant percentage of physicians (5.6%) has even agreed with such use. Results indicate that for the vast majority of physicians, information system security is a new area in their daily work, one which is left to individual interest and initiative. They are not familiar with the ethical, technical and legal backgrounds which have been defined for that area within the Council of Europe and the European Union. New aspects: This is the first study performed in Central and Eastern Europe dealing with information system security, performed on a representative nationwide sample of all the physicians.


2008 ◽  
Vol 39 (3) ◽  
pp. 267-284 ◽  
Author(s):  
Omar M. Khasawneh ◽  
Hamed M. Al-Awidi

The purpose of this study is to examine the effects of computer technology on Jordanian children from the perspectives of their parents. The sample of the study consisted of 127 participants. Each participant is a parent of a child or children who owned a personal computer. Our findings revealed some of the positive as well as negative changes that have been manifested as a result of using computers. The study showed that children's behavior changes as a result of computer use. For example, children became less active as they spend time on the computer and less time devoted to exercising and playing. The most essential finding of this study was that a large number of parents reported that their children familiarized themselves with computer functions and parts and technological and computer concepts, such as chatting, e-mail, and digital games.


2017 ◽  
Vol 6 (2) ◽  
pp. 273-278
Author(s):  
Natalia Borisovna Shcherbakova

The author of the paper pays attention to the problem of safe computer use by students. Schoolchildrens work with computers has such negative factors as: eye strain, mental stress, physical stress associated with prolonged static muscles tension of a personal computer user. That is why it is so important to train teachers for health-corrective activities with students who work with a computer. In this paper the author proposes to consider the algorithm of teachers health-corrective activity management in connection with students educational work with computers. The author notes the following components of teachers health-corrective activity: subject, object, means, process, result, environment, conditions. The author defines management of teachers health-corrective activity. The paper contains an algorithm of teachers health-supporting activity management; the stages of this activity are defined in accordance with the management functions: designing, organization, regulation, control and accounting.


Author(s):  
Gianluigi Botton ◽  
Gilles L'espérance

As interest for parallel EELS spectrum imaging grows in laboratories equipped with commercial spectrometers, different approaches were used in recent years by a few research groups in the development of the technique of spectrum imaging as reported in the literature. Either by controlling, with a personal computer both the microsope and the spectrometer or using more powerful workstations interfaced to conventional multichannel analysers with commercially available programs to control the microscope and the spectrometer, spectrum images can now be obtained. Work on the limits of the technique, in terms of the quantitative performance was reported, however, by the present author where a systematic study of artifacts detection limits, statistical errors as a function of desired spatial resolution and range of chemical elements to be studied in a map was carried out The aim of the present paper is to show an application of quantitative parallel EELS spectrum imaging where statistical analysis is performed at each pixel and interpretation is carried out using criteria established from the statistical analysis and variations in composition are analyzed with the help of information retreived from t/γ maps so that artifacts are avoided.


Sign in / Sign up

Export Citation Format

Share Document