The integration of distributed knowledge in collaborative medical diagnosis
Intellectual teamwork
Looking at ourselves: an examination of the social organisation of two research laboratories
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Information technologies and the shifting balance between privacy and social control
Computerization and controversy (2nd ed.)
Re-place-ing space: the roles of place and space in collaborative systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
The coordination of work activities: cooperation and conflict in a hospital context
Computer Supported Cooperative Work
Beyond the mirror world: privacy and the representational practices of computing
Technology and privacy
Convergence revisited: toward a global policy for the protection of personal data?
Technology and privacy
The platform for privacy preferences
Communications of the ACM
Internet privacy concerns confirm the case for intervention
Communications of the ACM
Communications of the ACM
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Understanding the benefit and costs of communities of practice
Communications of the ACM - Supporting community and building social capital
A finger on the pulse: temporal rhythms and information seeking in medical work
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Users' perception of privacy in multimedia communication
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What You Don't Know Can Hurt You: Privacy in Collaborative Computing
HCI '96 Proceedings of HCI on People and Computers XI
Restating the Foundation of Information Security
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Web Privacy with P3p
Internet attitudes and internet use: some surprising findings from the HomeNetToo project
International Journal of Human-Computer Studies
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Social empowerment and exclusion: A case study on digital libraries
ACM Transactions on Computer-Human Interaction (TOCHI)
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Human-Computer Interaction
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
The Journal of Strategic Information Systems
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Medical record privacy: is it a facade?
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Healthcare and security: understanding and evaluating the risks
EHAWC'11 Proceedings of the 2011th international conference on Ergonomics and health aspects of work with computers
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
A reflexive analysis of 'context' in privacy research: Two case studies in HIV care
International Journal of Human-Computer Studies
Hi-index | 0.00 |
An understanding of 'communities of practice' can help to make sense of existing security and privacy issues within organizations; the same understanding can be used proactively to help bridge the gap between organizational and end-user perspectives on these matters. Findings from two studies within the health domain reveal contrasting perspectives on the 'enemy within' approach to organizational security. Ethnographic evaluations involving in-depth interviews, focus groups and observations with 93 participants (clinical staff, managers, library staff and IT department members) were conducted in two hospitals. All of the data was analysed using the social science methodology 'grounded theory'. In one hospital, a community and user-centred approach to the development of an organizational privacy and security application produced a new communication medium that improved corporate awareness across the organization. User involvement in the development of this application increased the perceived importance, for the designers, of application usability, quality and aesthetics. However, other initiatives within this organization produced clashes with informal working practices and communities of practice. Within the second hospital, poor communication from IT about security mechanisms resulted in their misuse by some employees, who viewed them as a socially controlling force. Authentication mechanisms were used to socially exclude users who were formally authorized to access systems but whose access was unacceptable within some local communities of practice. The importance of users' security awareness and control are reviewed within the context of communities of practice.