(Stalker-Firth, R., July 2003)
Continue reading
| fascinated by how people use technology & vice-versa…
(Stalker-Firth, R., July 2003)
Continue readingLike every self-respecting human-computer interaction (HCI) lecturer, I introduce task analysis or the technique of analysing how people perform a
Continue readingPeople are the weakest link in all computer systems. We hear about the best cryptography money can buy: integrity checking,
Continue readingHumans are involved in 80-90% of IT security system breaches. We have the technological capacity to keep our software systems
Continue readingIn the above picture a newbie gamer has organised a telephone for his Sim so that it can order pizza.
Continue reading