Besides that, human interaction is also a question about social issues of human factor for using information systems in an organization. Human interaction issues include recruiting and retaining organizational staff, user assessment and evaluation, motivation, social presence, leadership, and even organizational champions. Human interaction, also known as human-computer interaction or human-machine interaction, representing the human-machine interface. This is because computers or machines are totally useless or useless unless they can be operated properly by humans. However, both parties play an important role in a successful interaction. On the machine side, computer graphics, operating system, programming languages are an important consideration. On the other hand, the psychological problem of the human side such as; user satisfaction, communication theory, linguistics are taken into consideration. Human interaction concerns how humans interact with information, technologies, and activities within various contexts. In an organizational system, the system will focus on features and data requirements that meet organizational needs. However, the system values are only visible when it is used efficiently by users. Therefore, balancing functionality and usability of a system when choosing a system is very important to achieve or realize goals and tasks from users. The functionality of a system is defined by the actions and services it provides to the user. Systems are chosen based on user preferences. The usability of a system represents the percentage of functions of the specific system that can be used by users. Therefore, users will choose systems that are suitable for their uses. However,......half of the paper......involves unauthorized people or systems. For example, a customer's credit card information or bank account number in a bank should not be exposed to unauthorized persons. Data can be confidentially encrypted by hiding plain text data. Beyond that, data should be protected from deletion or modification by unauthorized users in an organization. This is because any changes could cause undisclosed harm to the organization. Data integrity can only be achieved through the hashing mechanism. The availability of data accessibility in an organization should be ensured by a backup system or network hardening mechanisms. All systems, channels and mechanisms should function properly to ensure that the necessary information is always available. High availability networks are designed to handle multiple network connections and address potential issues such as denial of service attacks.
tags