Computer-Augmented Environments: The Workplace
The advent of computer technology in our daily lives has created two worlds for humanity: the unreal world of virtual reality (VR), which through simulation lets people live a few minutes of a fantasy facilitated by computer-driven devices such as head-worn goggles and hand-fitting gloves, and a real computer technology-driven world, which augments our familiar environment and makes our daily activities easier and more enjoyable. Because we spend most of our lives either in our homes, work, or schools, these environments have been the focus of this computer-augmented environment technology. Although the workplace and schools have seen the greatest influx of computer technology in the last ten years, with advances in communication the home is also slowly turning into a hub of technology. The philosophy and aim of this technology has been and still is to make life easy for users wherever they are.
KeywordsElectronic Monitoring Monitor Group Home Office Repetitive Strain Injury Employee Morale
Unable to display preview. Download preview PDF.
- 1.Gottieb, C.C., and A. Borodin. Social Issues in Computing. New York: Academic Press, 1973.Google Scholar
- 4.Chattanooga Free Press, January 7, 1996, p. F2.Google Scholar
- 5.Kraut, Robert. “Predicting the Use of Technology: The Case of Telework.” In Chuck Huff and Thomas Finholt (eds.), Social Issues in Computing: Putting Computing in Its Place. New York: McGraw-Hill, 1994, pp. 312–334.Google Scholar
- 6.Porat, M. “The Information Economy: Definitions and Managements.” U.S. Department of Commerce, Office of Technology Report, U.S. Government Printing Office. Stock number 003–000–00512–7, Washington, DC.Google Scholar
- 8.Driscoll, J. “Office Automation: The Dynamics of a Technological Boondoge.” In Robert M. Landau, James H. Bair, and Jean H. Siegman (eds.), Emerging Office Systems. Norwood, NJ: Ablex, 1982.Google Scholar
- 9.Nussbaum, Karen. “Computer Monitoring: A Threat to the Right to Privacy.” In Ray Dejoie, Geroge Fowler, and David Paradice (eds.), Ethical Issues in Information Systems. Boston: Boyd & Fraser, 1991.Google Scholar
- 10.Adler P. A., L.K. Parsons, and S.B. Zolke. “Employee Privacy: Legal and Research Developments and Implications for Personal Administration.” In Chuck Huff and Thomas Finholt (eds.), Social Issues in Computing: Putting Computing in its Place. New York: McGraw-Hill, 1994, pp. 312–334.Google Scholar
- 11.Grant, Rebecca, Christopher Higgins, and Richard Irving. “Computerized Performance Monitors: Are They Costing You Customers?” In Chuck Huff and Thomas Finholt (eds.), Social Issues in Computing: Putting Computing in Its Place. New York: McGraw-Hill, 1994, pp. 312–334.Google Scholar
- 13.Shepard, John. Automation and Alienation. Cambridge, MA: MIT Press, 1971.Google Scholar
- 14.Leveson, Nancy. Safeware: System Safety and Computers. Reading, MA: Addison-Wesley, 1995.Google Scholar
- 15.Grandjean, Etienne. Ergonomics in Computerized Offices. London: Taylor & Francis, 1987.Google Scholar