Computer Ergonomics (Ensuring Safe Computer Facilities)
Ergonomics is about configuring computer facilities (monitors, tables, mouse, etc.) to be safe and comfortable for users.
(Note these closely related topics in the library:
Computers, Internet & Web.
Risk Management: Guarding against theft, disasters, etc.
Ergonomics: Ensuring well designed and arranged resources
Facilities Management: Development and management of buildings, offices, computers, etc.
Safety in the Workplace About types of workplace injuries, programs to reduce accidents, etc.
Related Library Topics
For the Category of Information Technology:
To round out your knowledge of this Library topic, you may want to review some related topics, available from the link below. Each of the related topics includes free, online resources.
Also, scan the Recommended Books listed below. They have been selected for their relevance and highly practical nature.
General (For-Profit and Nonprofit)
The following books are recommended because of their highly practical nature and often because they include a wide range of information about this Library topic. To get more information about each book, just click on the image of the book. Also, a "bubble" of information might be displayed. You can click on the title of the book in that bubble to get more information, too.
- The Accidental Techie: Supporting, Managing, and Maximizing Your Nonprofit's Technology
- by Carter McNamara, published by Authenticity Consulting, LLC. This hands-on guide walks you through five projects that, when completed, will give you a comprehensive and usable support system, including for 1) conducting a technology inventory, 2) assessing and supporting staff, 3) assessing and buying technology, 4) protecting your organization from disasters and data loss, and 5) managing your role. Includes ready-to-use templates, worksheets and sample policies, and also 135 resources on topics such as funding, discussion groups, application service providers, web site development, donor management software, and a security policy checklist. Also explains steps for creating a database that gives you the reports you need. Includes a glossary of terms every techie should know.