Skip to main content

Hardening Social Links

  • Chapter
  • First Online:
Book cover Emerging Technological Risk

Abstract

Technology innovation exposes organisations, like the ones in the healthcare domain, to complex socio-technical hazards . Our studies address a number of aspects of dependability in healthcare settings. The learning outcomes of the review of these studies with respect to the identified emerging technological hazards , i.e. Boundary Hazards , Evolutionary Hazards and Performativity Hazards , are twofold. On the one hand, socio-technical failures affect healthcare settings, which provide rich environments and samples of emerging technological risk . On the other hand, the revision of case studies drawn from the healthcare domain allows us to assess how emerging technological hazards characterise such complex settings. Hence, the analysis of healthcare studies driven by the emerging technological hazards enhances our understanding about the risk of technology innovation .

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ackerman MS, Halverson CA (2000) Reexamining organizational memory. Commun ACM 43(1):59–64. doi:10.1145/323830.323845

    Google Scholar 

  2. Ackerman MS, Halverson CA (2004) Organizational memory as objects, processes, and trajectories: an examination of organizational memory in use. Comput Support Coop Work 13(2):155–189. doi:10.1023/B:COSU.0000045805.77534.2a

    Google Scholar 

  3. Alberdi E, Povyakalo A, Strigini L, Ayton P (2004) Effects of incorrect computer-aided detection (CAD) output on human decision-making in mammography. Acad Radiol 11(8):909–918

    Article  Google Scholar 

  4. Alberdi E, Povyakalo AA, Strigini L, Ayton P, Hartswood M, Procter R, Slack R (2005) Use of computer-aided detection (CAD) tools in screening mammography: a multidisciplinary investigation. Br J Radiol 78:S31–40. doi:10.1259/bjr/37646417

    Google Scholar 

  5. Anderson S, Koornneef F, Voges U (2003) Risk management for medical devices. Phys Medica 19

    Google Scholar 

  6. Baxter GD, Küster Filipe J, Miguel A, Tan K (2005) The effects of timing and collaboration on dependability in the neonatal intensive care unit. In: Redmill F, Anderson T (eds) Constituents of modern system-safety thinking: proceedings of the 13th safety-critical systems symposium, Springer, pp 195–210. doi:10.1007/1-84628-130-X_13

  7. Baxter GD, Monk AF, Tan K, Dear PRF, Newell SJ (2005) Using cognitive tack analysis to facilitate the integration of decision support systems into the neonatal intensive care unit. Artif Intell Med 35(3):243–257. doi:10.1016/j.artmed.2005.01.004

    Google Scholar 

  8. Blythe M, Monk A (2005) Net neighbours: adapting HCI methods to cross the digital divide. Interact Comput 17(1):35–56. doi:10.1016/j.intcom.2004.10.002

    Google Scholar 

  9. Blythe MA, Monk AF, Doughty K (2005) Socially dependable design: the challenge of ageing population for HCI. Interact Comput 17(6):672–689. doi:10.1016/j.intcom.2005.09.005

  10. Bowker GC, Star SL (1999) Sorting things out: classification and its consequences. The MIT Press, Cambridge

    Google Scholar 

  11. Busse DK, Holland B (2002) Implementation of critical incident reporting in a neonatal intensive care unit. Cogn Technol Work 4(2):101–106. doi:10.1007/s101110200009

    Google Scholar 

  12. Cheverst K, Clarke K, Dewsbury G, Hemmings T, Kember S, Rodden T, Rouncefield M (2003) Designing assistive technologies for medication regimes in care settings. Univers Access Inf Soc 2(3):235–242. doi:10.1007/s10209-003-0055-9

    Google Scholar 

  13. Churchill EF, Halverson CA (2005) Social networks and social networking: guest editors’ introduction. IEEE Internet Comput 9(5):14–19. doi:10.1109/MIC.2005.103

    Google Scholar 

  14. Clarke K, Hartswood M, Procter R, Rouncefield M, Slack R (2003) Trusting the record. Methods Inf Med 42(4):345–352

    Google Scholar 

  15. Clarke K, Hartswood M, Procter R, Rouncefield M, Slack R, Williams R (2002) Improving ‘knife to skin time’: process modelling and new technology in medical work. Health Informatics J 8(1):39–42. doi:10.1177/146045820200800107

    Google Scholar 

  16. Clarke K, Hughes J, Martin D, Rouncefield M, Sommerville I, Voß A, Procter R, Slack R, Hartswood M (2006) Its about time: temporal features of dependability. In: Clarke K, Hardstone G, Rouncefield M, Sommerville I (eds) Trust in technology: a socio-technical perspective, Comput Supported Coop Work, vol 36, Springer, chap 4, pp 105–121. doi:10.1007/1-4020-4258-2_5

  17. Clarke K, Hughes J, Rouncefield M, Hemmings T (2006) When a bed is not a bed: calculation and calculability in complex organizational settings. In: Clarke K, Hardstone G, Rouncefield M, Sommerville I (eds) Trust in technology: a socio-technical perspective, Comput Supported Coop Work, vol 36, Springer, chap 2, pp 21–38. doi:10.1007/1-4020-4258-2_2

  18. Clarke KM, Hartswood MJ, Procter RN, Rouncefield M (2001) The electronic medical record and everyday medical work. Health Informatics J 7(3–4):168–170, doi:10.1177/146045820100700310

    Google Scholar 

  19. D’Adderio L (2003) Configuring software, reconfiguring memories: the influence of integrated systems on the reproduction of knowledge and routines. Ind Corp Chang 12(2):321–350

    Article  Google Scholar 

  20. Dewsbury G, Sommerville I, Clarke K, Rouncefield M (2003) A dependability model for domestic systems. In: Anderson S, Felici M, Littlewood B (eds) Proceedings of the 22nd international conference on computer safety, reliability, and security, SAFECOMP 2003, Springer, no. 2788 in LNCS, pp 103–115. doi:10.1007/978-3-540-39878-3_9

  21. Douglas M, Wildavsky A (1982) Risk and culture: an essay on the selection of technological and environmental dangers. University of California Press, US

    Google Scholar 

  22. Gigerenzer G (2002) Reckoning with risk: learning to live with uncertainty. Penguin Books, London

    Google Scholar 

  23. Gigerenzer G, Todd PM, TheABC Research Group (1999) Simple Heuristics that make us smart. Oxford University Press, New York

    Google Scholar 

  24. Halverson CA (2002) Activity Theory and Distributed Cognition: Or What Does CSCW Need to DO with Theories? Comput Supported Coop Work 11(1–2):243–267. doi:10.1023/A:1015298005381

  25. Hartswood M, Procter R, Rouncefield M, Slack R (2002) Performance management in breast screening: A case study of professional vision. Cogn Technol Work 4(2):91–100. doi:10.1007/s101110200008

    Google Scholar 

  26. Hartswood M, Procter R, Rouncefield M, Slack R (2003) Making a case in medical work: implications for the electronic medical record. Comput Supported Coop Work 12(3):241–266. doi:10.1023/A:1025055829026

    Google Scholar 

  27. Hartswood M, Procter R, Rouncefield M, Slack R, Soutter J, Voss A (2003) ‘Repairing’ the machine: a case study of evaluation of Computer-aided detection tools in breast screening. In: Dourish P, Fitzpatrick G (eds) Proceedings of the eighth European conference on computer supported cooperative work, pp 375–394

    Google Scholar 

  28. Hollnagel E (1993) Human reliability analysis: context and control. Academic Press, London

    Google Scholar 

  29. Jeffcott MA, Johnson CW (2002) The use of a formalised risk model in NHS information system development. Cogn Technol Work 4(2):120–136. doi:10.1007/s101110200011

  30. Johnson C (2002) The causes of human error in medicine. Cogn Technol Work 4(2):65–70. doi:10.1007/s101110200005

  31. Kaptelinin V, Nardi BA (2006) Acting with Technology: Activity Theory and Interaction Design. The MIT Press, Cambridge

    Google Scholar 

  32. Küster Filipe J, Felici M, Anderson S (2003) Timed knowledge-based modelling and analysis: on the dependability of socio-technical systems. In: Proceedings of HAAMAHA 2003, 8th international conference on human aspects of advanced manufacturing: agility and hybrid automation, pp 321–328

    Google Scholar 

  33. Leveson NG (1995) SAFEWARE: System Safety and Computers. Addison-Wesley, Reading

    Google Scholar 

  34. Licoppe C, Smoreda Z (2005) Are social networks technologically embedded? How networks are changing today with changes in communication technology. Soc Netw 27(4):317–335. doi:10.1016/j.socnet.2004.11.001

    Google Scholar 

  35. Littlewood B, Popov P, Strigini L (2001) Modeling software design diversity: a review. ACM Comput Surv 33(2):177–208. doi:10.1145/384192.384195

    Google Scholar 

  36. MacKenzie D (2004) Social connectivities in global financial markets. Environ Plan D: Soc Space 22(1):83–101. doi:10.1068/d317t

  37. MacKenzie, D, Wajcman, J (eds) (1999) The Social Shaping of Technology. 2nd edn. Open University Press, Buckingham

    Google Scholar 

  38. Martin D, Hartswood M, Slack R, Voss A (2006) Achieving dependability in the configuration, integration and testing of healthcare technologies. comput Supported Coop Work 15(5–6):467–499. doi:10.1007/s10606-006-9032-1

  39. Monk A, Hone K, Lines L, Dowdall A, Baxter G, Blythe M, Wright P (2006) Towards a practical framework for managing the risks of selecting technology to support independent living. Appl Ergonomics 37(5):599–606. doi:10.1016/j.apergo.2005.10.003

    Google Scholar 

  40. Nardi BA, Whittaker S, Schwarz H (2002) NetWORKers and their Activity in Intensional Networks. Comput Supported Coop Work 11(1–2):205–242. doi:10.1023/A:1015241914483

    Google Scholar 

  41. Procter R, Rouncefield M, Balka E, Berg M (2006) Special Issue: CSCW and dependable healthcare systems. Comput Supported Coop Work 15(5–6):413–418. doi:10.1007/s10606-006-9037-9

  42. Reason J (1997) Managing the risks of organizational accidents. Ashgate, Aldershot

    Google Scholar 

  43. Strigini L, Povyakalo A, Alberdi E (2003) Human-machine diversity in the use of computer advisory systems: a case study. In: Proceedings of the 2003 international conference on dependable systems and networks, DSN’03, IEEE Computer Society, pp 249–258. doi:10.1109/DSN.2003.1209935

  44. Strum S, Latour B (1987) The meanings of social: From baboons to humans. Inf Sci Soc 26:783–802

    Article  Google Scholar 

  45. Wears RL, Cook RI, Perry SJ (2006) Automation, interaction, complexity, and failure: a case study. Reliab Eng Syst Saf 91(12):1494–1501. doi:10.1016/j.ress.2006.01.009

    Google Scholar 

  46. Woods DD, Cook RI (2002) Nine steps to move forward from error. Cogn Technol Work 4(2):137–144. doi:10.1007/s101110200012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Felici .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Limited

About this chapter

Cite this chapter

Anderson, S., Felici, M. (2012). Hardening Social Links. In: Emerging Technological Risk. Springer, London. https://doi.org/10.1007/978-1-4471-2143-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2143-5_5

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2142-8

  • Online ISBN: 978-1-4471-2143-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics