89 research outputs found

    A New Social Order: Mechanisms for Social Network Site Boundary Regulation

    Get PDF
    Social Network Site (SNS) use has become ubiquitous, with hundreds of millions of users sharing and interacting online. Yet,constant, unbounded sharing and interacting with others can cause social crowding and emotional harm (Altman 1975). Weexplore interpersonal boundary regulation on Social Network Sites to understand these tradeoffs and examine how toimprove the social experiences of users. In this paper, we present a taxonomy of five categories of interpersonal boundarymechanisms relevant to SNSs and the specific interface controls that sites provide for managing these boundaries. Wequalitatively research how SNS users employ these mechanisms and the boundary issues that arise while interacting onlinewith others. These results present a first step towards a model of SNS interpersonal boundary regulation

    Mission Impossible? Putting the Patient Back in Patient Care

    Get PDF
    The primary focus of this teaching case is the patient journey, as facilitated and influenced by an e-system or electronic health record (EHR) system. The goal of this case is to provide the learner with the knowledge and skills needed to effectively incorporate patient-centered e-health (PCEH) principles into existing and planned e-health systems such as EHRs. This case can be used to help students understand a hospital experience from the perspective of a patient and her family. It is loosely based on an experience one of the authors had with an actual patient. This case is intended for use with upper level undergraduate and graduate health informatics, information systems, and nursing students. Students assigned to this case should have a working knowledge of clinical terms and the general workings of a hospital. This teaching case is best suited to an advanced course in a health informatics curriculum. Possible applications of the case include, but are not limited to, describing the patient journey, modeling the process flow, diagramming the data flow, and applying the principles of patient-centered e-health

    Technology Overload: Gender-based Perceptions of Knowledge Worker Performance

    Get PDF
    Gender studies show numerous differences between genders in regard to technology, and emphasize that women areunderrepresented in IT-related academic programs and careers. Because technology is so prevalent in our workforce,it is important to study how technology usage affects white-collared working women. We explore the relationshipbetween three dimensions of technology overload and knowledge worker job performance (stratified by gender)through a quantitative analysis. Our results show that female knowledge workers perceive a more significant andnegative relationship than men between technology overload and job performance even when they do not relyheavily on technology in the workplace. Addressing technology overload may thus positively impact women’scareer development

    Algorithmic Robustness

    Full text link
    Algorithmic robustness refers to the sustained performance of a computational system in the face of change in the nature of the environment in which that system operates or in the task that the system is meant to perform. Below, we motivate the importance of algorithmic robustness, present a conceptual framework, and highlight the relevant areas of research for which algorithmic robustness is relevant. Why robustness? Robustness is an important enabler of other goals that are frequently cited in the context of public policy decisions about computational systems, including trustworthiness, accountability, fairness, and safety. Despite this dependence, it tends to be under-recognized compared to these other concepts. This is unfortunate, because robustness is often more immediately achievable than these other ultimate goals, which can be more subjective and exacting. Thus, we highlight robustness as an important goal for researchers, engineers, regulators, and policymakers when considering the design, implementation, and deployment of computational systems. We urge researchers and practitioners to elevate the attention paid to robustness when designing and evaluating computational systems. For many key systems, the immediate question after any demonstration of high performance should be: "How robust is that performance to realistic changes in the task or environment?" Greater robustness will set the stage for systems that are more trustworthy, accountable, fair, and safe. Toward that end, this document provides a brief roadmap to some of the concepts and existing research around the idea of algorithmic robustness

    Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach

    Get PDF
    Protecting adolescents from online safety risks is a major contemporary concern, and researching adolescent online safety is equally as challenging. Relatively few researchers have studied adolescent online safety, but the studies that do exist have documented threats from privacy breaches, cyberbullying, sexual predation, and other types of risk exposure. The grand challenge, however, is how we can approach these problems in a way that will protect adolescents while allowing them to engage socially online. We discuss two key challenges: operationalizing online safety; and defining online risks. We propose that Information Systems (IS) researchers should leverage family systems theory, a methodological approach grounded in developmental psychology, in order to address adolescent online safety issues

    It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones

    Full text link
    We conducted a user study with 19 parent-teen dyads to understand the perceived benefits and drawbacks of using a mobile app that allows them to co-manage mobile privacy, safety, and security within their families. While the primary goal of the study was to understand the use case as it pertained to parents and teens, an emerging finding from our study was that participants found value in extending app use to other family members (siblings, cousins, and grandparents). Participants felt that it would help bring the necessary expertise into their immediate family network and help protect the older adults and children of the family from privacy and security risks. However, participants expressed that co-monitoring by extended family members might cause tensions in their families, creating interpersonal conflicts. To alleviate these concerns, participants suggested more control over the privacy features to facilitate sharing their installed apps with only trusted family members
    • …
    corecore