13,184 results on '"Computer users"'
Search Results
152. Digital Healthy Lifestyle Application for UUM Computer User.
- Author
-
Othman, Azliza, Shaari, Nassiriah, and Yusoff, Yusrita Mohd.
- Subjects
COMPUTER users ,APPLICATION software ,REQUIREMENTS engineering ,ELECTRONIC paper ,OVERUSE injuries ,BASEBALL injuries - Abstract
A computer is a vital tool for UUM community in doing routine jobs and activities. Spending many hours using a computer without breaks can cause bad effect on users' health. Inappropriate computer use can cause muscle and joint pain, overuse injuries of the shoulder, arm, wrist or hand, and eyestrain. Fortunately, this pain and misery can be avoided with only a few simple routines. Therefore, a short break from using a computer is necessary. The break could be filled with a short and simple exercise. Physical exercise can provide many benefits to individual and organization. Besides improving the productivity of the organization, physical exercise also can help staff and students to be more focused, stay alert, feel motivated, energetic, and have less stress. In response to this, this paper introduces a digital health application to create health awareness among the UUM community. The methods employed in the study are a preliminary investigation, requirement gathering and analysis, prototype development, and prototype validation. From the requirement analysis phase, 11 criteria were gathered and applied in designing the Digital Healthy Lifestyle Application prototype. Then it was validated by the content and user interface experts. The experts responded positively towards the application. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
153. A User-friendly Model for Ransomware Analysis Using Sandboxing.
- Author
-
Kamal, Akhtar, Derbali, Morched, Jan, Sadeeq, Bangash, Javed Iqbal, Khan, Fazal Qudus, Jerbi, Houssem, Abbassi, Rabeh, and Ahmad, Gulzar
- Subjects
RANSOMWARE ,MALWARE ,COMPUTER users - Abstract
Ransomware is a type of malicious software that blocks access to a computer by encrypting user's files until a ransom is paid to the attacker. There have been several reported high-profile ransomware attacks including WannaCry, Petya, and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the world. The analysis of ransomware is often carried out via sandbox environments; however, the initial setup and configuration of such environments is a challenging task. Also, it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by such environments and analysis tools. In this research work, we aim to develop a user-friendly model to understand the taxonomy and analysis of ransomware attacks. Also, we aim to present the results of analysis in the form of summarized reports that can easily be understood by an ordinary computer user. Our model is built on top of the well-known Cuckoo sandbox environment for identification of the ransomware as well as generation of the summarized reports. In addition, for evaluating the usability and accessibility of our proposed model, we conduct a comprehensive user survey consisting of participants from various fields, e.g., professional developers from software houses, people from academia (professors, students). Our evaluation results demonstrate a positive feedback of approximately 92% on the usability of our proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
154. The impact of questionnaire length on the accuracy rate of online surveys.
- Author
-
Kato, Takumi and Miura, Taro
- Subjects
QUESTIONNAIRES ,INTERNET surveys ,SMARTPHONES ,PERSONAL computers ,COMPUTER users - Abstract
Online surveys have the advantages of affordability and speedy collection; however, there have been some concerns about their response quality. Previous studies have measured response quality using nonresponse rate and biased choice behavior. However, it is difficult to detect defective respondents who are randomly selected without careful consideration by using those indicators. Therefore, this study measured the accuracy rate as an index of response quality using a questionnaire with questions for which possible answers were provided. Questionnaire length was found to have a negative effect on response rate but no significant effect on the accuracy rate. In addition, considering the response device, surveys from smartphone users have a lower accuracy rate than surveys from personal computer users. Lastly, respondents who have a response rate faster than 10 seconds per question have a lower accuracy rate. It is important to understand the factors that affect response quality and to design surveys accordingly. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
155. Analyzing the Synergy between HCI and TRIZ in Product Innovation through a Systematic Review of the Literature.
- Author
-
Chen, Shaohan, Kamarudin, Khairul Manami, and Yan, Shihua
- Subjects
HUMAN-computer interaction ,COMPUTER systems ,ELECTRONIC textbooks ,ELECTRONIC publications ,COMPUTER users - Abstract
The boundary between tangible and digital products is getting more fused while rapidly evolving systems for interaction require novel processes that allow for rapidly developed designs, evaluations, and interaction strategies to facilitate efficient and unique user interactions with computer systems. Accordingly, the literature suggests combining creativity enhancement tools or methods with human-computer interaction (HCI) design. The TRIZ base of knowledge appears to be one of the viable options, as shown in the fragmental indications reported in well-acknowledged design textbooks. The goal of this paper is to present a systematic review of the literature to identify and analyze the published approaches and recommendations to support the synergy between HCI and TRIZ from the perspective of product innovation related to HCI, with the aim of providing a first comprehensive classification and discussing about observable differences and gaps. The method followed is the guidelines related to systematic literature review methods. As results, out of 444 initial results, only 17 studies reported the outcomes of the synergy between HCI and TRIZ. The 7 of these studies explored the feasibility of the combination of HCI and TRIZ. The 10 studies attempted to combine and derive approaches in these two fields, and the outcomes defined 3 different integration strategies between HCI and TRIZ. Some conclusions achieved are that the generic solutions to support the synergy between HCI and TRIZ are still rare in the literature. The extraction and combination of different tools caused the randomization of the evaluation criteria, and the performance of the proposals has not been comprehensively evaluated. However, the findings can help inform future developments and provide valuable information about the benefits and drawbacks of different approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
156. Network IDS alert classification with active learning techniques.
- Author
-
Vaarandi, Risto and Guerra-Manzanares, Alejandro
- Subjects
- *
INTRUSION detection systems (Computer security) , *ACTIVE learning , *MALWARE , *END users (Information technology) , *COMPUTER users - Abstract
A Network Intrusion Detection System (NIDS) is a widely used security monitoring technology for detecting attacks against network services, beaconing activity of infected end user nodes, malware propagation, and other types of malicious network traffic. Unfortunately, NIDS technologies are known to generate a large number of alerts, with a significant proportion of them having low importance. During the last two decades, many machine learning and data mining based approaches have been proposed for highlighting high-importance alerts that require human attention. However, NIDS alert classification systems based on active learning have received marginal attention in the specialized research literature. This neglects the potential benefits of active learning which involves a human expert in the machine learning model life cycle. The current paper fills this research gap and studies the use of active learning techniques for NIDS alert classification. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
157. Measurement of Fatigue Eye on Computer Users with Method of Eye Tracking.
- Author
-
Rasyad, Muhammad, Muslim, Erlinda, and Pradana, Andhika Arya
- Subjects
- *
EYE tracking , *COMPUTER users , *EYESTRAIN , *BLINKING (Physiology) , *FATIGUE (Physiology) - Abstract
Computer worker fatigue is one of the causes of lack of concentration at work. This study aimed to detect the fatigue while working at the computer for 1 hour, so it can be known at the time when will the computer worker should rest for a moment when it began to be detected as tired. The fatigue measurement methods were eye tracker and Samn-Perelli seven-point fatigue scale. The results showed that the computer worker fatigue began to be detected in minute 30-40, but for a condition that requires rest, namely the condition micro sleep (slightly asleep quickly) was found in minute 40-50. Additionally, the variable of blink was more sensitive for detecting fatigue compared to the variable of saccade on the time worked in front of a computer for 1 hour. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
158. A Case Study of Students’ Usage of a Platform for Digital Competence Certification in Schools.
- Author
-
Sobodić, Aleksandra, Balaban, Igor, and Filipović, Danijel
- Subjects
COMPUTER users ,ONLINE education ,CROSS-sectional method - Abstract
In this paper, the authors examine the correlations of variables across constructs – system use, satisfaction, and net impacts from the DeLone and McLean model in the scope of a platform for digital competence acquisition, evaluation and certification. A cross-sectional survey method was implemented online and used to collect 1725 students’ answers in six European countries. Descriptive and inferential statistics were used to report data analysis results. Findings indicated that it is possible to implement such platform within a formal curriculum in primary and secondary schools. Also, students’ decision on whether they will use the system in the future greatly depends on how the platform contributes to the success of their learning processes. Results also suggest that teachers are inevitable part of such process and are mandatory to achieve the full potential of the platform. [ABSTRACT FROM AUTHOR]
- Published
- 2020
159. Antecedents of User's Intention to Share Big Data The influence of User Type.
- Author
-
Kang Xie, Yangsong Hu, and Jinghua Xiao
- Subjects
BIG data ,DIGITAL footprint ,INNOVATIONS in business ,COMPUTER users ,USER-generated content - Abstract
In this in-progress paper, we theoretically analyzed the antecedents of the user's intention to share big data with firms. Specifically, apart from the existing influences from extrinsic incentives, enjoyment, community recognition and trust to platform, this study makes an argument of the moderating effects of user type, in which a lead user will be more likely to share the data with firms. A research model is proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2020
160. The Effect of Selected Corrective Exercises With Physioball on the Posture of Female Computer Users With Upper Crossed Syndrome
- Author
-
Fariba Javazi, Parisa Sedaghati, and Hasan Daneshmandi
- Subjects
corrective exercises ,upper crossed syndrome ,physioball ,computer users ,Sports medicine ,RC1200-1245 - Abstract
Objective Upper Crossed Syndrome (UCS) is a type of musculoskeletal system involvement that results in shortening of anterior muscles and weakening of posterior muscles. The aim of this study was to examine the effect of selected corrective exercises with physioball on the postural status of female computer users with UCS. Methods This quasi-experimental study was conducted on 24 female students with UCS who were selected using a purposive sampling method. The subjects were randomly divided into two groups of exercise (n=12) and control (n=12). The exercise group performed exercises for 6 weeks. Photogrammetry method was used to measure the angle of the forward head and round shoulder. A flexible ruler was used to measure the angle of kyphosis, and tape measure was used to measure the chest expansion. These measurements were performed before and after intervention. The collected data were analyzed using paired t-test and ANOVA at the significance level of P
- Published
- 2019
161. Prevalence of Carpal Tunnel Syndrome among Computer Users of in the Mosul University
- Author
-
Bashar J. Aljuwary, Isra N. Alkallak, Haifa H. Altaie, and Suha J. Abdullatif
- Subjects
computer users ,carpal tunnel syndrome ,Nursing ,RT1-120 - Abstract
Aim :To study the prevalence of carpal tunnel syndrome among over use of computer mouse in Mosul University employees. Method: A cross sectional design study was adopted in a purposive sample of (138) employees using computer in a daily working hours at Mosul University, the sample include both faculty members and administrators. Certain variables such as age, gender and the period of experience of computer work. The investigators use a clinical examination (a Phalen test, Pin Prick and Tournquit test) & nerve conduction test for diagnosis of problem among participants. Results: Female employees uses computer more than males (92:46). The highest prevalence of carpal tunnel syndrome was found among age group (31-35) with (31%), and among females more than males (2:1). Bachelor employee represent 55.07% of the study sample. The study also found that pregnancy was the most common risk factor among female participants while obesity was the major risk factor among male. The use of analgesia to relieve the symptoms was predominant measure among affected employees. Recommendation: avoidance of repetitive trauma for the wrist or any continuous pressure created by excessive use of computer's mouse, and weight reduction.
- Published
- 2019
- Full Text
- View/download PDF
162. A Fuzzy Approach to User-level Intrusion Detection.
- Author
-
Liu, Wei, Mao, Yu, Ci, Linlin, and Zhang, Fuquan
- Subjects
COMPUTER security ,COMPUTER users ,FUZZY logic ,INTRUSION detection systems (Computer security) ,MASQUERADERS (Computer users) - Abstract
Traditionally, researchers have focused on network level intrusion detection and program level intrusion detection to improve computer security. However, neither approach is foolproof. Typically, a successful attacker manifests in the form of the attacker becoming a user on the host either with elevated or normal user privileges. The reason for this situation is that current research and technology development have focused on external, not internal. At this point, user-level intrusion detection attempts to deter and curtail an attacker even after the system has been compromised. This paper proposed a novel method for anomaly detection of user behavior. Considering the complexity and fluctuation of user behavior, our method builds a finite automaton to profile the user's normal behavior with closeness of commands within patterns and timing sequence and frequency information between patterns. This allows discrete data used for training to have a holistic structure that allows for a more accurate expression of the normal behavior of the user. In the detection stage, our method builds a threat evaluation system using fuzzy logic. Experimental results on data sets of Purdue University, SEA and self-collected data show that an accurate, effective and efficient detection can be achieved using the proposed approach. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
163. ONE CLICK LIABILITY: SECTION 230 AND THE ONLINE MARKETPLACE.
- Author
-
Boyd, Christopher
- Subjects
COMMUNICATIONS Decency Act, 1996 (United States) ,ONLINE marketplaces ,COMPUTER users - Abstract
"No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.". [ABSTRACT FROM AUTHOR]
- Published
- 2021
164. CogTool+: Modeling Human Performance at Large Scale.
- Author
-
HAIYUE YUAN, SHUJUN LI, and RUSCONI, PATRICE
- Subjects
SOFTWARE frameworks ,COMPUTER interfaces ,MANUAL labor ,SOFTWARE development tools ,COMPUTER users ,USER interfaces - Abstract
Cognitive modeling tools have been widely used by researchers and practitioners to help design, evaluate, and study computer user interfaces (UIs). Despite their usefulness, large-scale modeling tasks can still be very challenging due to the amount of manual work needed. To address this scalability challenge, we propose CogTool+, a new cognitive modeling software framework developed on top of the well-known software tool CogTool. CogTool+ addresses the scalability problem by supporting the following key features: (1) a higher level of parameterization and automation; (2) algorithmic components; (3) interfaces for using external data; and (4) a clear separation of tasks, which allows programmers and psychologists to define reusable components (e.g., algorithmic modules and behavioral templates) that can be used by UI/UX researchers and designers without the need to understand the low-level implementation details of such components. Cog- Tool+ also supports mixed cognitive models required for many large-scale modeling tasks and provides an offline analyzer of simulation results. In order to show how CogTool+ can reduce the human effort required for large-scale modeling, we illustrate how it works using a pedagogical example, and demonstrate its actual performance by applying it to large-scale modeling tasks of two real-world user-authentication systems. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
165. Effects of using a document holder when typing on head excursion and neck muscle activity among computer users with and without neck pain.
- Author
-
Subramaniam, Ambusam and Singh, Devinder Kaur Ajit
- Subjects
NECK muscles ,NECK pain ,COMPUTER users ,TRAPEZIUS muscle ,TWO-way analysis of variance - Abstract
Purpose. The aim of this study was to examine the effects of using a document holder while typing on head excursion and neck muscle activity among computer users with and without neck pain. Method. An experimental study including 52 individuals with (n = 26) and without (n = 26) neck pain was conducted. Head excursion and neck muscle activity were measured using an accelerometer and surface electromyography, respectively. Two-way analysis of variance was conducted to examine the effects of using a document holder between computer users with and without neck pain. Results. The results demonstrated a decrease in head excursion (p < 0.001) and muscle activity of both the right and left upper trapezius and the left lower trapezius and right anterior deltoid (p < 0.05) with the use of a document holder. Computer users with neck pain had significantly (p < 0.001) higher right lower trapezius muscle activity compared to the group without neck pain. Conclusion. The results of the study supported the use of a document holder to assist in decreasing head excursion and neck muscle activity. The use of a document holder while typing may be beneficial in preventing repetitive strain injuries among computer users. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
166. Stress Detection in Computer Users From Keyboard and Mouse Dynamics.
- Author
-
Pepa, Lucia, Sabatelli, Antonio, Ciabattoni, Lucio, Monteriu, Andrea, Lamberti, Fabrizio, and Morra, Lia
- Subjects
- *
COMPUTER users , *KEYBOARDING , *WEB-based user interfaces , *RANDOM forest algorithms , *MICE - Abstract
Detecting stress in computer users, while technically challenging, is of the utmost importance in the workplace, especially now that remote working scenarios are becoming ubiquitous. In this context, cost-effective, subject-independent systems are needed that can be embedded in consumer devices and classify users’ stress in a reliable and unobtrusive fashion. Leveraging keyboard and mouse dynamics is particularly appealing in this context as it exploits readily available sensors. However, available studies are mostly performed in laboratory conditions, and there is a lack of on-field investigations in closer-to-real-world settings. In this study, keyboard and mouse data from 62 volunteers were experimentally collected in-the-wild using a purpose-built Web application, designed to induce stress by asking each subject to perform 8 computer tasks under different stressful conditions. The application of Multiple Instance Learning (MIL) to Random Forest (RF) classification allowed the devised system to successfully distinguish 3 stress-level classes from keyboard (76% accuracy) and mouse (63% accuracy) data. Classifiers were further evaluated via confusion matrix, precision, recall, and F1-score. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
167. How to turn on Windows' hidden PC performance overlay.
- Author
-
FREIST, ROLAND
- Subjects
- *
PERSONAL computer performance , *COMPUTER performance , *COMPUTER monitors , *XBOX video games , *CENTRAL processing units , *COMPUTER users - Abstract
This article from PCWorld provides instructions on how to access and use Windows 11's hidden performance overlay. The overlay allows users to monitor their computer's resources, which is useful for gamers and those working with performance-intensive programs. The article explains how to enable the overlay through the Windows Settings menu and the Xbox Game Bar. It also provides steps for customizing the display and keeping the overlay in the foreground. The article emphasizes the practicality of monitoring computer performance and offers a solution for those who desire constantly updated information on CPU, GPU, and memory utilization. [Extracted from the article]
- Published
- 2023
168. Cyberbullies, Cyberactivists, Cyberpredators : Film, TV, and Internet Stereotypes
- Author
-
Lauren Rosewarne and Lauren Rosewarne
- Subjects
- Stereotypes (Social psychology), Identity (Psychology), Internet users, Internet--Social aspects, Popular culture, Computer users
- Abstract
Written by an expert in media, popular culture, gender, and sexuality, this book surveys the common archetypes of Internet users—from geeks, nerds, and gamers to hackers, scammers, and predators—and assesses what these stereotypes reveal about our culture's attitudes regarding gender, technology, intimacy, and identity.The Internet has enabled an exponentially larger number of people—individuals who are members of numerous and vastly different subgroups—to be exposed to one other. As a result, instead of the simple'jocks versus geeks'paradigm of previous eras, our society now has more detailed stereotypes of the undesirable, the under-the-radar, and the ostracized: cyberpervs, neckbeards, goths, tech nerds, and anyone with a non-heterosexual identity. Each chapter of this book explores a different stereotype of the Internet user, with key themes—such as gender, technophobia, and sexuality—explored with regard to that specific characterization of online users.Author Lauren Rosewarne, PhD, supplies a highly interdisciplinary perspective that draws on research and theories from a range of fields—psychology, sociology, and communications studies as well as feminist theory, film theory, political science, and philosophy—to analyze what these stereotypes mean in the context of broader social and cultural issues. From cyberbullies to chronically masturbating porn addicts to desperate online-daters, readers will see the paradox in popular culture's message: that while Internet use is universal, actual Internet users are somehow subpar—less desirable, less cool, less friendly—than everybody else.
- Published
- 2016
169. Craniocervical flexion performance in computer users: An observational study.
- Author
-
Patrao, Ashmita Iora Davania, Correa, Stephanie M, Kerkar, Prachi Prakash, and Vishal, Kavitha
- Subjects
COMPUTER users ,PHYSICAL fitness ,NECK pain ,MUSCULOSKELETAL system diseases ,OCCUPATIONAL diseases - Abstract
Study aim: To compare the performance of deep cervical flexors (DCF) among computer users (CU) and non-users using the craniocervical flexion test (CCFT). Material and methods: Eighty nine computer users and 100 non-users were recruited for evaluation of their craniocervical muscle performance. The activation score and performance index were assessed using the CCFT. Comparison of craniocervical flexor performance between the two groups was evaluated using the Mann Whitney test. A Chi-Square test was used to test the association between age, years of work and craniocervical flexion. Significance was set at p ≤ 0.05. Results: The median activation score was lower among computer users (median pressure-24 mmHg as compared to non-users (median pressure-28 mmHg) (p < 0.01). The performance index among computer users was lower when compared to non-users. Also, age (p < 0.001) and the years of work experience (p = 0.006) were associated with the DCF performance. Conclusion: CU have lower activation and endurance of the DCF compared to non-users. The endurance of the DCF was associated with the age and years of computer usage. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
170. Compliance with security guidelines in teenagers: the conflicting role of peer influence and personal norms.
- Author
-
Mwagwabi, Florence and Jhee Hee Jiow
- Subjects
PEER pressure ,COMPUTER passwords ,TEENAGERS ,TELECOMMUTING ,COMPUTER users - Abstract
What drives teenagers to comply with computer password guidelines? Using an extended form of protection motivation theory (PMT) (Rogers, 1983), we found that even if teenage computer users believe they are susceptible to being hacked, or that being hacked would be detrimental, it has no bearing on their password choices. Other motives outside of PMT also drive teenage security behaviour. Personal norms fully mediate the relationship between the perceived severity of threat and compliance intentions such that perceived severity is not sufficient to encourage compliance. Teenagers must actually feel obligated to comply. While personal norms may encourage compliance, concerns about feeling embarrassed or ashamed if their social media accounts are hacked into actually encourages compliance. On the other hand, peer influence, such as the fear of being teased about someone hacking into their account, discourages compliance. Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies. For example, our findings suggest that password security guidelines alone will not suffice to ensure teenage compliance; they may need enforced password rules at the authentication level to eliminate any opportunity to violate password rules. Our study will benefit children and parents as well as organizations that have changed work practices to enable employees to work from home, but which places children in danger of clicking on malicious links on their parents' computers. To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
171. Home Computer User Security Behavioral Intention: A Replication Study from Guam.
- Author
-
Ho, Kevin K. W., Cheuk Hang (Allen) Au, and Chiu, Dickson K. W.
- Subjects
COMPUTER users ,BEHAVIORAL assessment ,INFORMATION & communication technologies ,SURVEYS ,DESCRIPTIVE statistics - Abstract
This replication study is a methodological replication of Study 1 of Anderson and Agarwal (2010) (A&A) using data collected from Guam to investigate information security (InfoSec) behavioral intention. This study also extended the A&A Model by examining the effect of gender on each construct of the model. Our findings are very similar to those reported by A&A, and indicate that the model is generalizable to the population on Guam. We also observed the effect of gender on several constructs of the model. As this study cannot confirm whether the slight differences between the result of A&A and this study are related to cultural differences, we suggest future replication studies be conducted to examine how culture would affect our security behavior intention. We also suggest practitioners consider gender as an important factor when designing mechanisms to encourage people to practice information security behavior. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
172. A grounded theory approach to security policy elicitation
- Author
-
Foley, Simon N. and Rooney, Vivien
- Published
- 2018
- Full Text
- View/download PDF
173. A study of social media users’ perceptional typologies and relationships to self-identity and personality
- Author
-
Kim, Jin-Young
- Published
- 2018
- Full Text
- View/download PDF
174. Dry Eye Disease Association with Computer Exposure Time Among Subjects with Computer Vision Syndrome.
- Author
-
Sánchez-Valerio, María del Rosario, Mohamed-Noriega, Karim, Zamora-Ginez, Irma, Duarte, Blanca Guadalupe Baez, and Vallejo-Ruiz, Verónica
- Subjects
- *
COMPUTER vision , *BLEPHARITIS , *DRY eye syndromes , *EYE diseases , *VIDEO display terminals , *COMPUTER users , *AVATARS (Virtual reality) - Abstract
Purpose: To assess the time of exposure to the computer and dry eye disease (DED) in subjects with computer vision syndrome (CVS). Methods: A cross-sectional study was conducted in office workers, computer users of both sexes, with an age range of 18– 45 years without comorbidities; we included 108 subjects divided into 3 groups according to the time of computer exposure in hours per day (H/D): < 4 (n = 23), 4 − 7.9 (n = 49), > 8 (n = 39). A specific questionnaire was applied to them on the exposure time and the type of visual display terminal (VDT) used, as well as the computer vision symptoms scale (CVSS17). DED was diagnosed with the Ocular Surface Disease Index (OSDI). Ocular surface damage and signs of DED were evaluated with the tear rupture time test (TBUT), the integrity of the ocular surface by ocular surface staining (OSS) and the production of the aqueous basal tear film using the Schirmer test. Results: Average computer exposure time, measured differently, was positively correlated with DED development. The computer exposure time measured in hours per year and TBUT showed a significant negative correlation (p < 0.001) (rho − 0.463). Years of computer exposure and staining of the ocular surface showed a significant positive correlation (p < 0 0.001; rho 0.404). The accumulated exposure time was negatively correlated with TBUT (p < 0.001; rho − 0.376) and positively with OSS (p < 0.001; rho 0.433). Schirmer test did not correlate with computer exposure time. Conclusion: The prolonged time of exposure to the computer in subjects with CVS was significantly correlated with the DED tests, in the different ways of measuring it; but not with the Schirmer test. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
175. Cervical Proprioception and Dynamic Balance in Computer Users: A Comparison between Male and Female Healthy Adults.
- Author
-
Sahu, Pramod Kumar, Alam, Sajjad, Kukreti, Pooja, Chauhan, Neha, Kumari, Mangalam, and Shahid, Nazia
- Subjects
DYNAMIC balance (Mechanics) ,COMPUTER users ,PROPRIOCEPTION ,BODY mass index ,STRETCH (Physiology) - Abstract
Background: Nowadays, individuals are utilizing a computer for different tasks daily and the use of computers has increased rapidly worldwide. The impact of prolonged computer usage may lead to balance problems and disturbed cervical proprioception due to faulty posture of the neck. The purpose of this was to compare the impact of prolonged computer usage on cervical proprioception and dynamic balancing ability in the male and female gender. Methods: 100 healthy adults’ computer users were recruited for the study. The subjects were classified into two groups: male computer users (n=50) and female computer users (n=50). Neck proprioceptions were assessed by Head Repositioning Accuracy (HRA) test and dynamic balances assessed by the Y Balance Test (YTB), 3 trials were performed and the mean values were calculated. Results: There were no statistically significant differences in age, weight, height, and body mass index between all subjects in the groups (p>0.05). There is significant differences between males and females participants as females had more decreased in their neck proprioception and dynamic balance ability than males (p<0.05). The male computer users showed better performance than the females. Conclusion: Prolonged usage of computers (more than four hours per day) could negatively affect cervical proprioception and dynamic balance ability in healthy adults. The results may be used to promote awareness about the normal duration of computer use and develop programs for good postural education and stretching exercises to prevent its negative effects on cervical proprioception and balance ability, especially for female computer users. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
176. PRACTICAL CONSIDERATIONS FOR A SAFE E-LEARNING PROCESS.
- Author
-
TĂBUŞCĂ, Alexandru, COCULESCU, Cristina, and PÎRNĂU, Mironela
- Subjects
COVID-19 pandemic ,WIRELESS Internet ,COMPUTER security ,COMPUTER users ,PANDEMICS - Abstract
Considering the current pandemic context of 2020, it is of utmost importance for both students and teachers to know that in the online environment there are a plethora of threats, risks and vulnerabilities, all specific to most informatic environments. Because the internet and the mobile technology represent the main element for a successful continuation of the educational process during the Covid-19 pandemic, all users of a computer or similar device are in dire need of information and awareness regarding the informatic security topic. [ABSTRACT FROM AUTHOR]
- Published
- 2020
177. Posture Related Musculoskeletal Disorders (MSDs) among Computer Users in Higher Education Sectors of Malaysia.
- Author
-
Khan, Sahar Husain, Mohan, Tharma Raj Chandra, Abed, Al Abed Ali Al, K. B., Swamy, and Bhumik, Amiya
- Subjects
- *
MUSCULOSKELETAL system diseases , *COMPUTER users , *POSTURE , *LUMBAR pain , *HIGHER education - Abstract
Introduction: Computer usage has become an indispensable tool in the official set up of all the workplaces in the current era. Predominance of musculoskeletal disorders (MSDs) in relation to habitual posture during work is the utmost problem of modern society. Teaching staff stand out amongst a group of workers exposed to occupational MSDs. The objective of this study was to identify the prevalence and risk factors of musculoskeletal disorders in relation to posture and computer ergonomics at workplace among the college and university staff in Petaling Jaya, Malaysia. Methods: This cross-sectional quantitative study was conducted from August 2019-October 2019, among 419 volunteers by using a self-administered survey questionnaire. Descriptive and bivariate statistics were used for the analyses of multiple variables. The association between demographic characteristics, computer ergonomics and prevalence of musculoskeletal pains were analyzed through Chi-square test. Results: 55.8% respondents (n=234) reported neck pain (NP), (n=196) 46.8% shoulder pain (SP) and (n=308) 73.5% low back pain (LBP) respectively. A significant relationship between desktop computer usage and musculoskeletal pains in LBP (P=0.036) and SP (P=0.023) was observed. Significant association of head posture was found with NP (P=0.002), SP (P=0.042) and LBP (P=0.001), correspondingly. Discussion: Habitual postures were significantly associated with musculoskeletal pains while using computer. Conclusion: This study proved with precession that higher prevalence rate of musculoskeletal disorders was undoubtedly influenced by prolonged sitting, awkward postures at workstation, and repetitive movements of shoulders and hands. Further synchronous studies are vital to limit the modern era of musculoskeletal disorders. [ABSTRACT FROM AUTHOR]
- Published
- 2020
178. EKRAN ÇÖZÜNÜRLÜĞÜNE DUYARLI BİR AKILLI ARAYÜZ YERLEŞTİRME YAKLAŞIMI.
- Author
-
Çelik, Barış and Genç, Burkay
- Subjects
PRODUCT design software ,DATA structures ,COMPUTER users ,USER interfaces ,COMPUTER software ,ALGORITHMS - Abstract
Copyright of SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi is the property of Journal of Engineering Sciences & Design and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
179. Technical Perspective: The Effectiveness of Security Measures.
- Author
-
Christin, Nicolas
- Subjects
- *
COMPUTER security , *INFORMATION technology security , *COMPUTER users , *HUMAN behavior , *DATA privacy , *ACQUISITION of data , *INTERVIEWING - Abstract
The article discusses various aspects of computer and information security practices, and it mentions computer user behavior in relation to information privacy and security-related problems. Computer user behavior-based data collection is examined, along with analyses of how individuals react to advice regarding security measures and procedures. Exposure to computer-based vulnerabilities is assessed, as well as user interviews and passive measurements of user behavior.
- Published
- 2022
- Full Text
- View/download PDF
180. The Drivers in the Use of Online Whistle-Blowing Reporting Systems.
- Author
-
Lowry, Paul Benjamin, Moody, Gregory D., Galletta, Dennis F., and Vance, Anthony
- Subjects
WHISTLEBLOWING ,ANONYMITY ,BUSINESS failures ,UNITED States. Sarbanes-Oxley Act of 2002 ,TRUST ,COMPUTER users ,BUSINESS ethics ,INFORMATION technology ,RISK perception ,CORRUPTION - Abstract
Online whistle-blowing reporting systems (WBRS) have become increasingly prevalent channels for reporting organizational failures. The Sarbanes-Oxley Act and similar international laws now require firms to establish whistle-blowing (WB) procedures and WBRSs, increasing the importance of WB research and applications. Although the literature has addressed conventional WB behavior, it has not explained or measured the use of WBRSs in online contexts that could significantly alter elements of anonymity, trust, and risk for those using such reporting tools. This study proposes the WBRS model (WBRS-M). Using actual working professionals in an online experiment of hypothetical scenarios, we empirically tested the WBRS-M for reporting computer abuse and find that anonymity, trust, and risk are highly salient in the WBRS context. Our findings suggest that we have an improved WB model with increased explanatory power. Organizations can make WB less of a professional taboo by enhancing WBRS users' perceptions of trust and anonymity. We also demonstrate that anonymity means more than the mere lack of identification, which is not as important in this context as other elements of anonymity. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
181. Determination of pain in musculoskeletal system reported by office workers and the pain risk factors
- Author
-
Sevim Celik, Kadir Celik, Elif Dirimese, Nurten Taşdemir, Tarik Arik, and İbrahim Büyükkara
- Subjects
pain ,computer users ,ergonomics ,work-related musculoskeletal complaints ,office worker ,work design ,Medicine - Abstract
Objectives This research was conducted as a cross-sectional descriptive study aimed at determining the existence of pain in the musculoskeletal system among office workers and the reasons for it. Material and Methods The sample consisted of 528 office workers. Collection of data was achieved using a questionnaire prepared by the researchers in line with information from the literature. Results The male and female office workers most frequently complained of pain in the lower back (55.1%), neck (52.5%) and back (53%). It was seen that out of the variables relating to the work environment, those which had the most significant effect on muscular-skeletal system pain were sitting at the desk for a long time without a break, working sitting on a chair that supported only the lumbar area and the arms, having the computer mouse at a distance from the keyboard, having the head inclined at 45° when working, working holding both forearms above the level of the desk, not taking exercise in daily life, and having a moderate or extremely stressful workplace (p < 0.05). Conclusions The conclusion has been reached in this study that in order for office workers not to suffer musculoskeletal system pain, it is very important that the working environment should be ergonomically arranged and that various measures should be taken to ensure healthy life behavior. Int J Occup Med Environ Health 2018;31(1):91–111
- Published
- 2018
- Full Text
- View/download PDF
182. Inducing Intrinsic Motivation to Explore the Enterprise System: The Supremacy of Organizational Levers.
- Author
-
Ke, Weiling, Tan, Chuan-Hoo, Sia, Choon-Ling, and Wei, Kwok-Kee
- Subjects
INTRINSIC motivation ,TECHNOLOGY information services use studies ,SELF-determination theory ,INDUSTRIAL management research ,COMPUTER users ,MANAGEMENT information systems - Abstract
The adoption of an organization-wide system, such as an enterprise system (ES), has often been mandated by organizational management, which may not necessarily motivate users to proactively explore the system's features and subsequently apply pertinent features that best support their job tasks. Anchoring on self-determination theory, this research investigates the antecedents and consequences of users' intrinsic motivation to explore ES features. We propose two organizational levers (i.e., autonomous job design and socialization tactics) that the management could exercise to trigger intrinsic motivation, thereby leading to improved ES feature exploration. Intrinsic motivation is manifested by hedonic motivation and normative motivation, whereas ES feature exploration is conceptualized as a dual-dimensional outcome reflected by cognitive behavior (exploratory usage) and positive affect (exploration satisfaction). Through a two-stage survey of 127 organizational users in China, we find general support for our research model. We further observe significant moderating effects of prevention focus on the association between organizational levers and intrinsic motivations. Beyond demonstrating how organizational users respond to different organizational levers, this research examines a broader, enduring challenge, which is to determine how organizational users can be induced to be intrinsically inspired to innovatively harness implemented information systems. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
183. "System And Method For Neurological Trigger, Activation Or Control Of A Computer User Interface Without External Stimulus" in Patent Application Approval Process (USPTO 20240053824).
- Subjects
PATENT applications ,COMPUTER interfaces ,AUTOMATION ,USER interfaces ,COMPUTER users - Abstract
A patent application has been filed for a new method and system that allows for the neurological control of a computer user interface without the need for external stimuli. Traditionally, brain-computer interfaces have relied on motor imagery, event-related potentials, or visual evoked potentials to generate triggers. However, these methods have limitations and require extensive setup and training. The new method proposed in the patent application utilizes neurological signals from the prefrontal cortex without external stimuli, offering a reliable and fast interaction with a computer user interface. The system has potential applications in controlling musical tracks, video playlists, communication, smart assistants or IoT devices, and computer games. [Extracted from the article]
- Published
- 2024
184. INTERACTING WITH 3D MODELS – 3D-CAD VS. HOLOGRAPHIC MODELS.
- Author
-
Navratil, G., Konturek, P., and Giannopoulos, I.
- Subjects
COMPUTER interfaces ,USER interfaces ,COMPUTER software ,AUGMENTED reality ,COMPUTER monitors ,COMPUTER users ,FRUSTRATION - Abstract
A problem with 3D models is that devices used to display them are typically two-dimensional, i.e., computer monitors or printed maps. User interfaces of computer software are based on mouse, touchscreen, keyboards, etc. and are optimized for this dimensionality. However, this causes problems when working with 3D models and the user must adapt her actions by interpreting the missing third dimension. While this might not necessarily pose a problem for frequent users, infrequent users may find this quite challenging. Holographic models, on the other hand, float in front of the user, providing a 3D perspective. Interaction with this kind of models may thus be more intuitive than traditional interaction. In the paper we present the results from a first user test. 15 participants tested interaction with a holographic model visualized using Augmented Reality (AR) technology. The results were compared to those of 15 participants using a traditional 3D-CAD. It was found that the holographic approach is more intuitive leading to a lower frustration level although it is still restricted by technical limitations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
185. ZX spectrum scene poetry: genre, platform, localness.
- Author
-
Marecki, Piotr and Yerzmyey
- Subjects
- *
DIGITAL media , *COMPUTER users , *INFLUENCE (Literary, artistic, etc.) , *POETRY (Literary form) , *GRAPHIC artists - Abstract
Digital media are used for creative purposes, however, in various geographical and cultural contexts, different platforms are used in various ways, and this affects the shape of the works and the popularity of particular forms of expression. Technical limitations of the platform are a challenge for digital artists, influencing the artistic shape of the work. In the article, we identify and discuss scene poetry, a genre of digital expression associated with the demoscene subculture. The demoscene brings together programmers and graphic artists who are affiliated with the platforms. Creators who identify themselves with the platforms aim to bypass limitations and push the boundaries as well as the capabilities of individual platforms. Demonstration programs (so-called demos) are used for this purpose, which is to present the graphic, music and coding effects achievable on a given piece of equipment. The ZX Spectrum is an 8-bit British computer, which is known for its many limitations compared to other 8-bit machines (Atari, Amstrad or Commodore 64). This computer was extensively cloned in countries behind the Iron Curtain in the 1980s and 1990s (especially in Russia, but also in Poland, Czechoslovakia, and others). Computer users not only created their own hardware models, but also a number of new forms of expression. One of them is the described scene poetry. The use of a large amount of text in demonstration programs on the ZX Spectrum computer is a phenomenon, and it is the result of its technical limitations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
186. Implementation of computer network user behavior forensic analysis system based on speech data system log.
- Author
-
Lian, Jin
- Subjects
DATABASES ,BEHAVIORAL assessment ,SPEECH processing systems ,DATA logging ,COMPUTER networks ,WEB search engines ,COMPUTER users ,BIG data - Abstract
With the rapid development of Internet technology and the popularization and application of various terminals, human beings live in the era of big data. In the process of people's daily use of the network, all kinds of data are produced at all times. At the same time, the problem of information security is increasingly prominent and the situation is more and more complex. As the increasing threat of information security has caused irreparable economic losses to human beings, which seriously hinders the further development of information technology, it is urgent to combat computer crime. When users use search engine to get information, the whole process is recorded, including the user's query log. Through the analysis of these query logs, we can indirectly get the real needs of users, so as to provide reference for the optimization and improvement of search engine. The analysis of the network user behavior requires the analysis of the data generated by the network user behavior. The traditional manual data analysis and the single computer data transmission mode have not been able to better analyze the increasing data information. Therefore, we should think of an effective technology, which can effectively analyze the huge and complex data and show the results. Based on the log analysis of voice data system, this paper constructs a user behavior analysis system under the network environment. Experimental results show that the method proposed in this paper can effectively reflect the behavior of network users, and timely feedback. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
187. RIZICI I SIGURNOST NA RADU KOD KORISNIKA RAČUNARA TOKOM UČENJA NA DALJINU U VREME COVID-19 KRIZE.
- Author
-
Jevtović, Jelena and Vraneš – Grujičić, Milenka
- Abstract
Copyright of Knowledge: International Journal is the property of Institute for Knowledge Management and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
188. Digital inclusion through mobile phones?: A comparison between mobile-only and computer users in internet access, skills and use.
- Author
-
Correa, Teresa, Pavez, Isabel, and Contreras, Javier
- Subjects
- *
DIGITAL inclusion , *CELL phones , *INTERNET users , *COMPUTER users , *INTERNET access , *ABILITY - Abstract
Given the rapid rise of mobile-only users, we investigated the digital inclusion process through smartphones. By using Chile as a case study, a country that has strongly promoted mobile connections to address internet access gaps, we compared mobile-only and computer users in different dimensions of the digital inclusion process, including digital skills and differentiated uses of the web. By relying on a face-to-face national representative survey, the results showed that smartphones represent an opportunity to access the internet for those who traditionally lag behind. However mobile-only use does not necessarily lead to a more complete digital inclusion process because it was related to lower levels of skills and less diverse types of uses of the web compared to those people who also use the computer. Also, skills partially mediated the association between access device and types of uses of the web, which suggests that the differences by access device partly occur because people have greater chances to develop skills when accessing the web through computers. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
189. A Cost Reduced Variant of Epi-Genotyping by Sequencing for Studying DNA Methylation in Non-model Organisms.
- Author
-
Werner, Olaf, Prudencio, Ángela S., de la Cruz-Martínez, Elena, Nieto-Lugilde, Marta, Martínez-Gómez, Pedro, and Ros, Rosa M.
- Subjects
DNA methylation ,ALMOND ,NUCLEOTIDE sequence ,NATURAL numbers ,GENETIC markers ,COMPUTER users ,DNA - Abstract
Reference-free reduced representation bisulfite sequencing uses enzymatic digestion for reducing genome complexity and allows detection of markers to study DNA methylation of a high number of individuals in natural populations of non-model organisms. Current methods like epiGBS enquire the use of a higher number of methylated DNA oligos with a significant cost (especially for small labs and first pilot studies). In this paper, we present a modification of this epiGBS protocol that requires the use of only one hemimethylated P2 (common) adapter, which is combined with unmethylated barcoded adapters. The unmethylated cytosines of one chain of the barcoded adapter are replaced by methylated cytosines using nick translation with methylated cytosines in dNTP solution. The basic version of our technique uses only one restriction enzyme, and as a result, genomic fragments are integrated into two orientations with respect to the adapter sequences. Comparing the sequences of two chain orientations makes it possible to reconstruct the original sequence before bisulfite treatment with the help of standard software and newly developed software written in C and described here. We provide a proof of concept via data obtained from almond (Prunus dulcis). Example data and a detailed description of the complete software pipeline starting from the raw reads up until the final differentially methylated cytosines are given in Supplementary Material making this technique accessible to non-expert computer users. The adapter design showed in this paper should allow the use of a two restriction enzyme approach with minor changes in software parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
190. Correlation of Two-point Discrimination and Finger Dexterity with the Hours of Computer Usage among Computer Users in South India.
- Author
-
L. V., Aysha and D., Smitha
- Subjects
COMPUTER users ,RANGE of motion of joints ,COMPUTERS ,MOTOR ability ,FINGERS - Abstract
Background: In this era of technology, computers have become an integral part of daily life. Repeated use of fingers and hands as in computer use may lead to sensory-motor abnormalities. Functional evaluation of hand is crucial, as physical evaluation does not measure patient’s inability to offset for the loss of range of motion, sensation, strength and disability. This study was undertaken to assess the Two Point Discrimination (TPD) and Finger Dexterity (FD) in computer users and find correlation of TPD and FD to the number of hours of computer usage. Materials and Method: This study is a cross-sectional study and 296 individuals who met the inclusion criteria were enrolled in this study and were grouped into three categories based on the hours of computer usage. TPD of all the participants were assessed using aesthesiometer and FD were assessed using Purdue pegboard Results: There was significant change in TPD between the three groups of computer users for both the dominant and non-dominant hand; however, there was no significant change in the FD among the three groups. There was a positive correlation between the hours of computer usage and TPD, while a negative correlation was observed for FD in the assembly score measured using the Purdue pegboard. Conclusion: Significant changes were observed in TPD of all the participants which suggests early sensory abnormalities among the computer users. [ABSTRACT FROM AUTHOR]
- Published
- 2020
191. „Computer Wizards” und Haecksen: Geschlechtsspezifi sche Rollenzuschreibungen in der privaten und subkulturellen Computernutzung in den USA und der Bundesrepublik.
- Author
-
ERDOGAN, JULIA GÜL
- Subjects
COMPUTER users ,COMPUTER hacking ,COMPUTER hackers ,SUBCULTURAL theory (Criminology) ,GENDER role - Abstract
Copyright of Technikgeschichte is the property of Nomos Verlagsgesellschaft mbH & Co. KG and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
192. АНАЛІЗ КОМПЛЕКСНОЇ МОДЕЛІ КРИПТОСИСТЕМИ ДЛЯ ЗАХИСТУ КОНФІДЕНЦІЙНИХ ДАНИХ В КОМП'ЮТЕР.
- Author
-
Ю. В., Борцова and В. М., Плотніков
- Subjects
PUBLIC key cryptography ,CYBERTERRORISM ,COMPUTER users ,DIGITAL signatures ,LOGARITHMS ,ALGORITHMS - Abstract
For the hijacking of confidential data from computer users who want to give me some information about the safety of their own information, the vicious hand, and the vicious news program. One of these concerns є realizing encryptionis more than necessary for the additional protection of digital signatures before atribute. For cryptosystem robots, encryption with a secure key requires three algorithms: the encryption algorithm, the encryption algorithm, and the key generation algorithm. One of the promising ways to develop encryption with advanced keys is to choose a model for a high degree of discrete logarithms for generating keys, so the Diffie-Hellman algorithm ranks. The spectrum of possible cyber attacks is analyzed, the specifics of their implementation, those are straightforward, the theoretical aspects of the protocol are exchanged with the exchange of Diffie-Hellman keys, the implementation of the protocol is tested, and the protocol is analyzed. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
193. An Activity Centered Approach to Nonvisual Computer Interaction.
- Author
-
BALDWIN, MARK S., MANKOFF, JENNIFER, NARDI, BONNIE, and HAYES, GILLIAN
- Subjects
COMPUTER users ,BLIND students ,COMPUTERS ,ASSISTIVE technology ,VISION disorders - Abstract
In this work, we apply an activity theory lens to analyze nonvisual computing for blind and low-vision computer users. Our analysis indicates major challenges for users in translating the activities they areworking towards into specific tasks to be completed in a system comprehensible manner. Specifically, blind and lowvision students learning to use accessible technologies struggled with organizing their activities, tracking the history and status of their operations, and understanding how the system was acting underneath these interactions. We discuss how activity-centered design can be applied to nonvisual interfaces to better match user behavior in a computational system. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
194. Correlation between Duration of Work and Hand Position Using Computer with Carpal Tunnel Syndrome (CTS) at the Registration Administration Officer in Dr. Soetomo General Hospital Surabaya.
- Author
-
Rahardjo, Joseph Ekowahono, Hamdan, Muhammad, Basuki, Mudjiani, Fidiana, Fadil, and Susetyo, Hari Budi
- Subjects
CARPAL tunnel syndrome ,RECORDING & registration ,COMPUTER users ,NEURAL conduction ,DATA entry - Abstract
Background: Carpal tunnel syndrome (CTS) is commonly reported among professional computer users. Repetitive work is a widely known risk factor for occupational CTS. Administrative staff for patient registration is one of the jobs in Dr. Soetomo General Hospital that deals with repetitive data entry work in terms of long-term use of computers. Objective: This study aims to determine the relationship between length of work and hand position of computer use with the incidence of carpal tunnel syndrome in administrative registration staff at Dr. Soetomo Hospital Surabaya. Method: Clinical examination and nerve conduction study (NCS) observes 60 hands of 30 registration officers with computer users at Dr. RSUD Dr. Soetomo Surabaya that fulfills the inclusion and exclusion criteria from period of the October-December 2012. Results: The average age of the study subjects was 37.80 + 10.841. The subjects of the study consisted of 54 women and 6 men. The average length of work in the year is 9.75 + 8.36. The average working hour / day is 6.02 + 1.367. The frequency of the most extension hand position with 68.3%, the incidence of 92.9% for the occurrence of CTS work duration> 3 years was significant with P = 0.005, RO 8,273 (95% CI 1,829- 37,410). The incident rate is 89.6%, for the occurrence of CTS at staff with working years> 4000 hours, gets result of P = 0.021, RO 6.143 (95% CI 1.406-26,842). The incident of 87.8% for the occurrence of CTS with extended hand position, gets insignificant result with P = 0.263, RO 2.571 (95% CI 0.644-10.270). Conclusion: There was a significant relationship between length of work and the incidence of CTS and there was no relationship between extension hand position and incidence of CTS. [ABSTRACT FROM AUTHOR]
- Published
- 2020
195. COMPARISON OF INTRAOCULAR PRESSURE CHANGES AFTER VIEWING LAPTOP COMPUTER AND TABLET COMPUTER: A PILOT STUDY.
- Author
-
Pattrawan Pattaranit, Tanapat Ratanapakorn, Rungthip Puntumetakul, Orawan Buranruk, and Wichai Eungpinichpong
- Subjects
LAPTOP computers ,INTRAOCULAR pressure ,COMPUTER vision ,COMPUTER users ,PILOT projects - Abstract
Prolonged computer use has been reported to be associated with elevated intraocular pressure (IOP) and an increased risk of Computer Vision Syndrome (CVS). However, this issue has been one of controversy. This study aimed to preliminarily investigate the effect of using a laptop computer and tablet computer in terms of changes to IOP in healthy adult participants. Ten healthy participants (aged 27.6 (6.4) years, ranging 21-39 years; male: female = 2:8) participated and were randomly assigned to either the laptop computer user or the tablet computer user group. Each subject was requested to work on either a laptop or tablet for 60 minutes. The IOP was subsequently measured via a non-contact tonometer in both eyes at 15, 30, 45, and 60-minute intervals. Pre-intervention IOP and IOP changes were compared within and between groups. The results showed that mean IOP at each interval was not significantly different when compared among pre-intervention at different time points in both eyes. Mean IOP in the laptop computer group was slightly higher than that of the tablet computer group, yet there was no significant difference. The results of this study demonstrate that laptop and tablet usage for 60 minutes may not affect IOP levels in healthy volunteers. Hence, further research involving a larger sample size and longer exposure time to computer screens is needed. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
196. Investigation of the effectiveness of common representational formats in online learner-paced software training materials.
- Author
-
Chen, Chun-Ying and Yang, Ying-Hsing
- Subjects
- *
DISTANCE education , *COMPUTER software , *COMPUTER users , *STUDENT engagement , *COGNITIVE learning theory - Abstract
The popularity of online learning has made web-based software training materials the primary learning resources adopted by computer users. Thus, this study aimed to investigate the effectiveness of various common representational formats of web-based instructions. The formats included static (textual manual with screenshots) and dynamic (animated demonstration, AD) instructions. The findings suggested that in learner-paced learning with sufficient learning time (a) both narrated and captioned AD formats tended to increase transfer performance; (b) the segmenting principle likely became less important for the static format; and (c) the modality principle likely became less important for the AD format. Implications for determining optimal AD segment length for student engagement and suggestions for possible factors to be included in future research are offered accordingly. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
197. Aspects of Continuous User Identification Based on Free Texts and Hidden Monitoring.
- Author
-
Kochegurova, E. A. and Martynova, Yu. A.
- Subjects
- *
COMPUTER user identification , *IDENTIFICATION , *APPLICATION software , *COMPUTER users - Abstract
This paper investigates some specific features of continuous user identification based on hidden monitoring of keystroke dynamics when creating a free text. Our analysis of static identification approaches does not reveal any significant limitations on their application to continuous identification. The main feature of continuous identification is the method for collecting dynamic information about key presses and the correction of templates of registered users. The effectiveness of including additional classification features in recognition algorithms, e.g., those associated with the frequency of letters in texts, is demonstrated. A software application is developed to collect and analyze keystroke rhythm samples of users. Research in the domain of users with good computer skills shows quite satisfactory user recognition accuracy (87% on average). Moreover, the accuracy does not depend on the metric distance selected for recognition and improves with the use of scaling factors for letter frequency. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
198. Assessment of Risk Factors Involved with Video Display Terminal Syndrome.
- Author
-
NIRAV, MODI and GADRE, GIRISH A.
- Subjects
- *
VIDEO display terminals , *SYMPTOMS , *EYESTRAIN , *HEADACHE , *COMPUTER users - Abstract
Among the computer users, symptoms are attributed to use of computer also but as the symptoms to user are not always visible, many users will not attribute computer for symptoms of VDTS. Dryness and headache were significantly less among them. 87 subjects were not using the terminal from below the eye levels. Eyestrain, dryness and watering were major problems for them. Eyestrain and dryness were major complaints among those who did not use Anti-glare screen. Frequent breaks during work can reduce itching while not taking breaks can cause eyestrain, dryness and headache. 116 subjects (79% females & 58% males) were NOT using 20-20-20 rule. Eyestrain, dryness, headache and watering were major problems for them. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
199. A Visualization Jump Lists tool for Digital Forensics of Windows.
- Author
-
Shiuh-Ku Weng and Jung-Yi Tu
- Subjects
VISUALIZATION ,FORENSIC sciences ,FORENSIC medicine ,COMPUTER users - Abstract
In this paper, a visualization digital forensics tool, called JumpList Analyzer, is implemented. The tool can analyze the complicated Jump Lists files, and then the results are demonstrated by visualization. To compare the proposed tool with the other Jump Lists tools, the proposed tool is the only one can display the analyzed results by visualization. The visualization will help the investigators more easily to find the evidence than the other tools showing the analyzed results by texts only. In the experiment, the proposed JumpList Analyzer is demonstrated its convenience at identifying artifacts for doing digital forensics in a financial fraud case. In addition, the proposed tool can also be used to reveal the computer user's behavior or background. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
200. Evaluation of the Relationship Between Ocular Surface Disease Index and Dry Eye Test Parameters in Computer Users.
- Author
-
Balyen, Lokman
- Subjects
- *
DRY eye syndromes , *EYE examination , *COMPUTER users , *TIME management - Abstract
Aim: The present study aims to evaluate the relationship between ocular surface disease index (OSDI) and dry eye test parameters in computer users. Material and Method: In this current study, 62 individuals between the ages of 20 and 40 years and who spent at least 6 hours of their daily life in front of a computer were included. In addition to the complete ophthalmologic examination, dry eye tests including Schirmer I test, Schirmer II test, tear breakup time (TBUT), ocular surface fluorescein and lissamine green staining were performed on each volunteer for both eyes after completion of the OSDI questionnaire. Results: Of 62 participants, 42 (67.7%) were female and 20 (32.3%) were male. The mean age of participants was 30.06±4.794 (21-39) years. The mean computer use time of the participants was 10.15 ± 3.040 (6-16) hours/day. The mean OSDI score was 31.0742 ± 15.05892 (8.3-75). There was a significant negative correlation between OSDI score and TBUT in the right eye (r=-0.718, p=0.000) and the left eye (r=-0.667, p=0.000). However, there was a slightly negative correlation between OSDI score and Schirmer I-II tests in the right eye (r = -0.273, p = 0.032; r = -0.295, p = 0.020, respectively) and the left eye (r = -0.308, p = 0.015; r = -0.296, p = 0.019, respectively). There was a significant difference between OSDI score and ocular surface staining scores in both eyes (p=0.000). There was a significant positive correlation between OSDI score and computer use time (r=0.642, p=0.000). However, there was no correlation between age, gender, smoking, wearing glasses and OSDI score (p> 0.05). Conclusion: Long-term computer use and longer duration of occupation may lead to ocular surface problems. The OSDI was found to be strongly associated with daily computer use time, TBUT, and ocular surface staining scores in computer users. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.