-
Essay / Human Interaction Essay - 666
Apart from this, human interaction is also a question on the social problems of human factor for the use of information systems in an organization. Human interaction issues include recruitment and retention of organization personnel, user evaluation, motivation, social presence, leadership and also organizational champions. Human interaction, also known as human-machine interaction or human-machine interaction representing the human-machine interface. This is because computers or machines are completely worthless or useless unless they can be properly operated by humans. However, both parties play an important role in a successful interaction. On the machine side, computer graphics, operating system, programming languages are an important consideration. On the other hand, the question of psychology from the human side such as: user satisfaction, communication theory and linguistics are taken into account. Human interaction concerns how humans interact with information, technologies, and tasks in various contexts. In an organizational system, the system will focus on features and data requirements that meet organizational needs. However, the values of the system are only visible when it is used effectively by users. Therefore, it is very important to strike a balance between the functionality and usability of a system when choosing a system to achieve or accomplish user goals and tasks. The functionality of a system is defined by the actions and services it provides to the user. Systems are chosen based on user preferences. The usability of a system represents the percentage of the specific system's functions that can be used by users. Users will therefore choose systems adapted to their uses. However, ...... middle of paper ...... concerns unauthorized people or system. For example, a customer's credit card information or bank account number at a bank should not be exposed to unauthorized individuals. Data can be encrypted confidentially by hiding the data in plain text. Apart from this, data should be protected from deletion or modification by unauthorized users in an organization. Indeed, any change can cause undisclosed damage to the organization. Data integrity can only be achieved by a hashing mechanism. The availability of data accessibility in an organization must be guaranteed by a backup system or network hardening mechanisms. All systems, channels and mechanisms must work properly to ensure that the necessary information is always available. Highly available networks are designed to handle multiple network connections and handle potential issues such as a denial of service attack..