89 research outputs found
A New Social Order: Mechanisms for Social Network Site Boundary Regulation
Social Network Site (SNS) use has become ubiquitous, with hundreds of millions of users sharing and interacting online. Yet,constant, unbounded sharing and interacting with others can cause social crowding and emotional harm (Altman 1975). Weexplore interpersonal boundary regulation on Social Network Sites to understand these tradeoffs and examine how toimprove the social experiences of users. In this paper, we present a taxonomy of five categories of interpersonal boundarymechanisms relevant to SNSs and the specific interface controls that sites provide for managing these boundaries. Wequalitatively research how SNS users employ these mechanisms and the boundary issues that arise while interacting onlinewith others. These results present a first step towards a model of SNS interpersonal boundary regulation
Mission Impossible? Putting the Patient Back in Patient Care
The primary focus of this teaching case is the patient journey, as facilitated and influenced by an e-system or electronic health record (EHR) system. The goal of this case is to provide the learner with the knowledge and skills needed to effectively incorporate patient-centered e-health (PCEH) principles into existing and planned e-health systems such as EHRs. This case can be used to help students understand a hospital experience from the perspective of a patient and her family. It is loosely based on an experience one of the authors had with an actual patient. This case is intended for use with upper level undergraduate and graduate health informatics, information systems, and nursing students. Students assigned to this case should have a working knowledge of clinical terms and the general workings of a hospital. This teaching case is best suited to an advanced course in a health informatics curriculum. Possible applications of the case include, but are not limited to, describing the patient journey, modeling the process flow, diagramming the data flow, and applying the principles of patient-centered e-health
Technology Overload: Gender-based Perceptions of Knowledge Worker Performance
Gender studies show numerous differences between genders in regard to technology, and emphasize that women areunderrepresented in IT-related academic programs and careers. Because technology is so prevalent in our workforce,it is important to study how technology usage affects white-collared working women. We explore the relationshipbetween three dimensions of technology overload and knowledge worker job performance (stratified by gender)through a quantitative analysis. Our results show that female knowledge workers perceive a more significant andnegative relationship than men between technology overload and job performance even when they do not relyheavily on technology in the workplace. Addressing technology overload may thus positively impact women’scareer development
Algorithmic Robustness
Algorithmic robustness refers to the sustained performance of a computational
system in the face of change in the nature of the environment in which that
system operates or in the task that the system is meant to perform. Below, we
motivate the importance of algorithmic robustness, present a conceptual
framework, and highlight the relevant areas of research for which algorithmic
robustness is relevant. Why robustness? Robustness is an important enabler of
other goals that are frequently cited in the context of public policy decisions
about computational systems, including trustworthiness, accountability,
fairness, and safety. Despite this dependence, it tends to be under-recognized
compared to these other concepts. This is unfortunate, because robustness is
often more immediately achievable than these other ultimate goals, which can be
more subjective and exacting. Thus, we highlight robustness as an important
goal for researchers, engineers, regulators, and policymakers when considering
the design, implementation, and deployment of computational systems. We urge
researchers and practitioners to elevate the attention paid to robustness when
designing and evaluating computational systems. For many key systems, the
immediate question after any demonstration of high performance should be: "How
robust is that performance to realistic changes in the task or environment?"
Greater robustness will set the stage for systems that are more trustworthy,
accountable, fair, and safe. Toward that end, this document provides a brief
roadmap to some of the concepts and existing research around the idea of
algorithmic robustness
Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach
Protecting adolescents from online safety risks is a major contemporary concern, and researching adolescent online safety is equally as challenging. Relatively few researchers have studied adolescent online safety, but the studies that do exist have documented threats from privacy breaches, cyberbullying, sexual predation, and other types of risk exposure. The grand challenge, however, is how we can approach these problems in a way that will protect adolescents while allowing them to engage socially online. We discuss two key challenges: operationalizing online safety; and defining online risks. We propose that Information Systems (IS) researchers should leverage family systems theory, a methodological approach grounded in developmental psychology, in order to address adolescent online safety issues
It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones
We conducted a user study with 19 parent-teen dyads to understand the
perceived benefits and drawbacks of using a mobile app that allows them to
co-manage mobile privacy, safety, and security within their families. While the
primary goal of the study was to understand the use case as it pertained to
parents and teens, an emerging finding from our study was that participants
found value in extending app use to other family members (siblings, cousins,
and grandparents). Participants felt that it would help bring the necessary
expertise into their immediate family network and help protect the older adults
and children of the family from privacy and security risks. However,
participants expressed that co-monitoring by extended family members might
cause tensions in their families, creating interpersonal conflicts. To
alleviate these concerns, participants suggested more control over the privacy
features to facilitate sharing their installed apps with only trusted family
members
- …