Privacy policies and practices: inside the organizational maze
Communications of the ACM
A finger on the pulse: temporal rhythms and information seeking in medical work
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Journal of Medical Systems
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Emergency department status boards: user-evolved artefacts for inter- and intra-group coordination
Cognition, Technology and Work
Network authentication using single sign-on: the challenge of aligning mental models
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Real life challenges in access-control management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
Journal of Management Information Systems
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Moving beyond untagging: photo privacy in a tagged world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
Computer Standards & Interfaces
Biometrics for Electronic Health Records
Journal of Medical Systems
Privacy preserving EHR system using attribute-based infrastructure
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
CoPE: Enabling collaborative privacy management in online social networks
Journal of the American Society for Information Science and Technology
The ConStratO model of handover: a tool to support technology design and evaluation
Behaviour & Information Technology - Medical Team Meetings: Utilising Technology to Enhance Communication, Collaboration and Decision-Making
Detecting Anomalous Insiders in Collaborative Information Systems
IEEE Transactions on Dependable and Secure Computing
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
A Review of 25 Years of CSCW Research in Healthcare: Contributions, Challenges and Future Agendas
Computer Supported Cooperative Work
Hi-index | 0.00 |
Privacy research has long focused on the individual. Yet most organizations are highly collaborative where teamwork is the norm. To examine privacy practices in collaborative settings, we conducted an ethnographic study of a highly collaborative and information-intensive setting -- an emergency Dept. (ED). We found that ED staff's work practices did not always align with the organization's privacy policies and procedures. We then discuss the use of workarounds when privacy policies interfere with work practices, the challenge of assigning accountability for enforcing privacy in collaborative environments, and implications for technical and policy design. We conclude with some thoughts on the future of privacy research in collaborative settings.