Hardening Social Links

  • Stuart Anderson
  • Massimo Felici


Technology innovation exposes organisations, like the ones in the healthcare domain, to complex socio-technical hazards . Our studies address a number of aspects of dependability in healthcare settings. The learning outcomes of the review of these studies with respect to the identified emerging technological hazards , i.e. Boundary Hazards , Evolutionary Hazards and Performativity Hazards , are twofold. On the one hand, socio-technical failures affect healthcare settings, which provide rich environments and samples of emerging technological risk . On the other hand, the revision of case studies drawn from the healthcare domain allows us to assess how emerging technological hazards characterise such complex settings. Hence, the analysis of healthcare studies driven by the emerging technological hazards enhances our understanding about the risk of technology innovation .


Technology Innovation Work Practice Boundary Object Social Connectivity Organisational Knowledge 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Ackerman MS, Halverson CA (2000) Reexamining organizational memory. Commun ACM 43(1):59–64. doi: 10.1145/323830.323845 Google Scholar
  2. 2.
    Ackerman MS, Halverson CA (2004) Organizational memory as objects, processes, and trajectories: an examination of organizational memory in use. Comput Support Coop Work 13(2):155–189. doi: 10.1023/B:COSU.0000045805.77534.2a Google Scholar
  3. 3.
    Alberdi E, Povyakalo A, Strigini L, Ayton P (2004) Effects of incorrect computer-aided detection (CAD) output on human decision-making in mammography. Acad Radiol 11(8):909–918CrossRefGoogle Scholar
  4. 4.
    Alberdi E, Povyakalo AA, Strigini L, Ayton P, Hartswood M, Procter R, Slack R (2005) Use of computer-aided detection (CAD) tools in screening mammography: a multidisciplinary investigation. Br J Radiol 78:S31–40. doi: 10.1259/bjr/37646417 Google Scholar
  5. 5.
    Anderson S, Koornneef F, Voges U (2003) Risk management for medical devices. Phys Medica 19Google Scholar
  6. 6.
    Baxter GD, Küster Filipe J, Miguel A, Tan K (2005) The effects of timing and collaboration on dependability in the neonatal intensive care unit. In: Redmill F, Anderson T (eds) Constituents of modern system-safety thinking: proceedings of the 13th safety-critical systems symposium, Springer, pp 195–210. doi: 10.1007/1-84628-130-X_13
  7. 7.
    Baxter GD, Monk AF, Tan K, Dear PRF, Newell SJ (2005) Using cognitive tack analysis to facilitate the integration of decision support systems into the neonatal intensive care unit. Artif Intell Med 35(3):243–257. doi: 10.1016/j.artmed.2005.01.004 Google Scholar
  8. 8.
    Blythe M, Monk A (2005) Net neighbours: adapting HCI methods to cross the digital divide. Interact Comput 17(1):35–56. doi: 10.1016/j.intcom.2004.10.002 Google Scholar
  9. 9.
    Blythe MA, Monk AF, Doughty K (2005) Socially dependable design: the challenge of ageing population for HCI. Interact Comput 17(6):672–689. doi: 10.1016/j.intcom.2005.09.005
  10. 10.
    Bowker GC, Star SL (1999) Sorting things out: classification and its consequences. The MIT Press, CambridgeGoogle Scholar
  11. 11.
    Busse DK, Holland B (2002) Implementation of critical incident reporting in a neonatal intensive care unit. Cogn Technol Work 4(2):101–106. doi: 10.1007/s101110200009 Google Scholar
  12. 12.
    Cheverst K, Clarke K, Dewsbury G, Hemmings T, Kember S, Rodden T, Rouncefield M (2003) Designing assistive technologies for medication regimes in care settings. Univers Access Inf Soc 2(3):235–242. doi: 10.1007/s10209-003-0055-9 Google Scholar
  13. 13.
    Churchill EF, Halverson CA (2005) Social networks and social networking: guest editors’ introduction. IEEE Internet Comput 9(5):14–19. doi: 10.1109/MIC.2005.103 Google Scholar
  14. 14.
    Clarke K, Hartswood M, Procter R, Rouncefield M, Slack R (2003) Trusting the record. Methods Inf Med 42(4):345–352Google Scholar
  15. 15.
    Clarke K, Hartswood M, Procter R, Rouncefield M, Slack R, Williams R (2002) Improving ‘knife to skin time’: process modelling and new technology in medical work. Health Informatics J 8(1):39–42. doi: 10.1177/146045820200800107 Google Scholar
  16. 16.
    Clarke K, Hughes J, Martin D, Rouncefield M, Sommerville I, Voß A, Procter R, Slack R, Hartswood M (2006) Its about time: temporal features of dependability. In: Clarke K, Hardstone G, Rouncefield M, Sommerville I (eds) Trust in technology: a socio-technical perspective, Comput Supported Coop Work, vol 36, Springer, chap 4, pp 105–121. doi: 10.1007/1-4020-4258-2_5
  17. 17.
    Clarke K, Hughes J, Rouncefield M, Hemmings T (2006) When a bed is not a bed: calculation and calculability in complex organizational settings. In: Clarke K, Hardstone G, Rouncefield M, Sommerville I (eds) Trust in technology: a socio-technical perspective, Comput Supported Coop Work, vol 36, Springer, chap 2, pp 21–38. doi: 10.1007/1-4020-4258-2_2
  18. 18.
    Clarke KM, Hartswood MJ, Procter RN, Rouncefield M (2001) The electronic medical record and everyday medical work. Health Informatics J 7(3–4):168–170, doi: 10.1177/146045820100700310 Google Scholar
  19. 19.
    D’Adderio L (2003) Configuring software, reconfiguring memories: the influence of integrated systems on the reproduction of knowledge and routines. Ind Corp Chang 12(2):321–350CrossRefGoogle Scholar
  20. 20.
    Dewsbury G, Sommerville I, Clarke K, Rouncefield M (2003) A dependability model for domestic systems. In: Anderson S, Felici M, Littlewood B (eds) Proceedings of the 22nd international conference on computer safety, reliability, and security, SAFECOMP 2003, Springer, no. 2788 in LNCS, pp 103–115. doi: 10.1007/978-3-540-39878-3_9
  21. 21.
    Douglas M, Wildavsky A (1982) Risk and culture: an essay on the selection of technological and environmental dangers. University of California Press, USGoogle Scholar
  22. 22.
    Gigerenzer G (2002) Reckoning with risk: learning to live with uncertainty. Penguin Books, LondonGoogle Scholar
  23. 23.
    Gigerenzer G, Todd PM, TheABC Research Group (1999) Simple Heuristics that make us smart. Oxford University Press, New YorkGoogle Scholar
  24. 24.
    Halverson CA (2002) Activity Theory and Distributed Cognition: Or What Does CSCW Need to DO with Theories? Comput Supported Coop Work 11(1–2):243–267. doi: 10.1023/A:1015298005381
  25. 25.
    Hartswood M, Procter R, Rouncefield M, Slack R (2002) Performance management in breast screening: A case study of professional vision. Cogn Technol Work 4(2):91–100. doi: 10.1007/s101110200008 Google Scholar
  26. 26.
    Hartswood M, Procter R, Rouncefield M, Slack R (2003) Making a case in medical work: implications for the electronic medical record. Comput Supported Coop Work 12(3):241–266. doi: 10.1023/A:1025055829026 Google Scholar
  27. 27.
    Hartswood M, Procter R, Rouncefield M, Slack R, Soutter J, Voss A (2003) ‘Repairing’ the machine: a case study of evaluation of Computer-aided detection tools in breast screening. In: Dourish P, Fitzpatrick G (eds) Proceedings of the eighth European conference on computer supported cooperative work, pp 375–394Google Scholar
  28. 28.
    Hollnagel E (1993) Human reliability analysis: context and control. Academic Press, LondonGoogle Scholar
  29. 29.
    Jeffcott MA, Johnson CW (2002) The use of a formalised risk model in NHS information system development. Cogn Technol Work 4(2):120–136. doi: 10.1007/s101110200011
  30. 30.
    Johnson C (2002) The causes of human error in medicine. Cogn Technol Work 4(2):65–70. doi: 10.1007/s101110200005
  31. 31.
    Kaptelinin V, Nardi BA (2006) Acting with Technology: Activity Theory and Interaction Design. The MIT Press, CambridgeGoogle Scholar
  32. 32.
    Küster Filipe J, Felici M, Anderson S (2003) Timed knowledge-based modelling and analysis: on the dependability of socio-technical systems. In: Proceedings of HAAMAHA 2003, 8th international conference on human aspects of advanced manufacturing: agility and hybrid automation, pp 321–328Google Scholar
  33. 33.
    Leveson NG (1995) SAFEWARE: System Safety and Computers. Addison-Wesley, ReadingGoogle Scholar
  34. 34.
    Licoppe C, Smoreda Z (2005) Are social networks technologically embedded? How networks are changing today with changes in communication technology. Soc Netw 27(4):317–335. doi: 10.1016/j.socnet.2004.11.001 Google Scholar
  35. 35.
    Littlewood B, Popov P, Strigini L (2001) Modeling software design diversity: a review. ACM Comput Surv 33(2):177–208. doi: 10.1145/384192.384195 Google Scholar
  36. 36.
    MacKenzie D (2004) Social connectivities in global financial markets. Environ Plan D: Soc Space 22(1):83–101. doi: 10.1068/d317t
  37. 37.
    MacKenzie, D, Wajcman, J (eds) (1999) The Social Shaping of Technology. 2nd edn. Open University Press, BuckinghamGoogle Scholar
  38. 38.
    Martin D, Hartswood M, Slack R, Voss A (2006) Achieving dependability in the configuration, integration and testing of healthcare technologies. comput Supported Coop Work 15(5–6):467–499. doi: 10.1007/s10606-006-9032-1
  39. 39.
    Monk A, Hone K, Lines L, Dowdall A, Baxter G, Blythe M, Wright P (2006) Towards a practical framework for managing the risks of selecting technology to support independent living. Appl Ergonomics 37(5):599–606. doi: 10.1016/j.apergo.2005.10.003 Google Scholar
  40. 40.
    Nardi BA, Whittaker S, Schwarz H (2002) NetWORKers and their Activity in Intensional Networks. Comput Supported Coop Work 11(1–2):205–242. doi: 10.1023/A:1015241914483 Google Scholar
  41. 41.
    Procter R, Rouncefield M, Balka E, Berg M (2006) Special Issue: CSCW and dependable healthcare systems. Comput Supported Coop Work 15(5–6):413–418. doi: 10.1007/s10606-006-9037-9
  42. 42.
    Reason J (1997) Managing the risks of organizational accidents. Ashgate, AldershotGoogle Scholar
  43. 43.
    Strigini L, Povyakalo A, Alberdi E (2003) Human-machine diversity in the use of computer advisory systems: a case study. In: Proceedings of the 2003 international conference on dependable systems and networks, DSN’03, IEEE Computer Society, pp 249–258. doi: 10.1109/DSN.2003.1209935
  44. 44.
    Strum S, Latour B (1987) The meanings of social: From baboons to humans. Inf Sci Soc 26:783–802CrossRefGoogle Scholar
  45. 45.
    Wears RL, Cook RI, Perry SJ (2006) Automation, interaction, complexity, and failure: a case study. Reliab Eng Syst Saf 91(12):1494–1501. doi: 10.1016/j.ress.2006.01.009 Google Scholar
  46. 46.
    Woods DD, Cook RI (2002) Nine steps to move forward from error. Cogn Technol Work 4(2):137–144. doi: 10.1007/s101110200012 Google Scholar

Copyright information

© Springer-Verlag London Limited 2012

Authors and Affiliations

  1. 1.School of Informatics, The University of EdinburghEdinburghUK

Personalised recommendations