Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Computers And Society (K.4)
>
Public Policy Issues (K.4.1)
> Human Safety (K.4.1...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 10 Reviews about "
Human Safety (K.4.1...)
":
Date Reviewed
Carebit: A Privacy-Preserving "Step" Toward Remote Informal Caregiving
Ghosh A., Ghosh A., Aljallad Z., Aljallad Z., Badillo-Urquiola K., Badillo-Urquiola K., Wisniewski P., Wisniewski P. Proceedings of the 2018 ACM International Conference on Supporting Group Work (Proceedings of the 2018 ACM Conference on Supporting Groupwork, Sanibel Island, Florida USA, Jan 7-10, 2018) ACM Special Interest Group on Computer-Human Interaction, 154-157, 2018. Type: Proceedings
Carebit is an application to help caregivers working with elderly people who are living independently. In practice, the person being monitored wears a Fitbit synced to the Internet. He or she initiates the check-in. The app shows the c...
Apr 13 2018
Design and safety assessment of critical systems
Bozzano M., Villafiorita A., Auerbach Publications, Boston, MA, 2011. 297 pp. Type: Book (978-1-439803-31-8)
I (still) wonder whether technical and nontechnical management form a strict dichotomy. I have been unable to appreciate or assimilate the classic work of Drucker [1], but have practically gobbled-up the works of Deming [2], Berg [3], ...
Feb 1 2013
Internet parenting styles and the impact on Internet use of primary school children
Valcke M., Bonte S., De Wever B., Rots I. Computers & Education 55(2): 454-464, 2010. Type: Article
Pornography and obscene materials are widespread due to unintended access to Web site addresses and spam emails. Parental involvement is central to guiding children with healthy Internet access habits to social and educational material...
Aug 24 2010
Guide to applying human factors methods
Cacciabue P., Cacciabue C., SpringerVerlag, 2004. Type: Book (9781852337056)
I have been looking for a book like this since I developed an interest in safety-critical systems, and in the practical issues related to human factors (HFs). If I had the opportunity to read a book like this years ago, I...
Mar 24 2005
The computer user’s survival guide
Stigliani J., O’Reilly & Associates, Inc., Sebastopol, CA, 1995. Type: Book (9781565920309)
Stigliani hopes to address the explosion of computer use in the home, schools, and workplace in this book. Stigliani offers a background on how the systems of the human body work, how computer systems affect these systems, and what the...
Jun 1 1996
Computing and accountability
Nissenbaum H. (ed) Communications of the ACM 37(1): 72-80, 1994. Type: Article
Nissenbaum’s thesis is that computerization is undermining accountability. Accountability provides value to society by motivating those most likely and able to prevent risk and harm to society to do so. Accountability, of cou...
Dec 1 1995
A train set as a case study for the requirements analysis of safety-critical systems
De Lemos R., Saeed A., Anderson T. (ed) The Computer Journal 35(1): 30-40, 1992. Type: Article
A safety-critical system is a system for which at least one possible failure can be adjudged to cause an unintended event or sequence of events that cause disaster, that is, death, injury, or environmental or material damage. ...
Jul 1 1993
Standards-Point/Counterpoint: Safety Standards for CRT Visual Display Units
Ashley J. Computer 25(9): 68-71, 1992. Type: Article
These two brief papers need to be taken together. Both deal with questions of the safety of video displays....
Jul 1 1993
Safety standards for CRT visual display units: counterpoint
Buckley F. Computer 25(9): 69-ff., 1992. Type: Article
These two brief papers need to be taken together. Both deal with questions of the safety of video displays....
Jul 1 1993
How to survive your computer workstation
Lacey J., CRT Services, Inc., Kerrville, TX, 1990. Type: Book
Lacey defines a computer workstation to be anything from a dumb computer terminal, through dataless workstations, to the full-blown, highly independent functional workstations of current modern client/server computer workstation networ...
Mar 1 1992
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy