Plans and situated actions: the problem of human-machine communication
Plans and situated actions: the problem of human-machine communication
Groupware: some issues and experiences
Communications of the ACM
Systems development in information systems research
Journal of Management Information Systems - Special issue on management support systems
Realizing a video environment: EuroPARC's RAVE system
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Computer support for distributed collaborative writing: defining parameters of interaction
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Scandinavian Journal of Information Systems
Towards an integrated organization and technology development
Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques
Policies and roles in collaborative applications
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Coordination mechanisms: towards a conceptual foundation of CSCW systems design
Computer Supported Cooperative Work - Special issue on the design of cooperative systems
Controlling access in multiuser interfaces
ACM Transactions on Computer-Human Interaction (TOCHI)
Flexible meta access-control for collaborative applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
Communications of the ACM
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
A Descriptive Framework of Workspace Awareness for Real-Time Groupware
Computer Supported Cooperative Work
Instant messaging in teen life
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
A new dimension in access control: studying maintenance engineering across organizational boundaries
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
CSCW '86 Proceedings of the 1986 ACM conference on Computer-supported cooperative work
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secure Communication in Non-uniform Trust Environments
ECOOP '98 Workshop ion on Object-Oriented Technology
The Ambivalence of Network Visibility in an Organizational Context
Proceedings of the IFIP WG9.1 Working Conference on NetWORKing
Handling Conflicts in Groupware: Concepts and Experiences made in the POLITeam-Project
INTERACT '97 Proceedings of the IFIP TC13 Interantional Conference on Human-Computer Interaction
ACM SIGOPS Operating Systems Review
End-user controlled group formation and access rights management in a shared workspace system
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Security and Usability
Work-Oriented Design of Computer Artifacts
Work-Oriented Design of Computer Artifacts
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Chatting with teenagers: Considering the place of chat technologies in teen life
ACM Transactions on Computer-Human Interaction (TOCHI)
Riding a tiger, or computer supported cooperative work
ECSCW'91 Proceedings of the second conference on European Conference on Computer-Supported Cooperative Work
ECSCW'91 Proceedings of the second conference on European Conference on Computer-Supported Cooperative Work
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Culture and control in a media space
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Fieldwork for Design: Theory and Practice (Computer Supported Cooperative Work)
Fieldwork for Design: Theory and Practice (Computer Supported Cooperative Work)
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Design science in information systems research
MIS Quarterly
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
Enhancing optimistic access controls with usage control
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Transferability of research findings: context-dependent or model-driven
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Discovering access-control misconfigurations: new approaches and evaluation methodologies
Proceedings of the second ACM conference on Data and Application Security and Privacy
Supporting improvisation work in inter-organizational crisis management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy as part of the app decision-making process
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Facilitating TV production using StoryCrate
Proceedings of the 9th ACM Conference on Creativity & Cognition
Hi-index | 0.00 |
Traditionally, access control is understood as a purely technical mechanism which rejects or accepts access attempts automatically according to a specific preconfiguration. However, such a perspective neglects the practices of access control and the embeddedness of technical mechanisms within situated action. In this article, we reconceptualize the issue of access control on a theoretical, methodological, and practical level. On a theoretical level, we develop a terminology to distinguish between access control practices and the technical support mechanisms. We coin the term Computer Supported Access Control (CSAC) to emphasize this perspective. On a methodological level, we discuss empirical investigations of access control behavior from a situated action perspective. We discovered a differentiated set of social practices around traditional access control systems. By applying these findings to a practical level, we enhance the design space of computer supported access control mechanisms by suggesting a matrix of technical mechanisms which go beyond an ex-ante configuration.