Abstract
In this, the last chapter of the book, we shall consider the implications of our study for the field of CSCW.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See also Chap. 1.
- 2.
RFID is an acronym for Radio Frequency Identification and denotes any identification system in which electronic devices occur that use radio waves or pulsating magnetic fields to communicate with identification units fastened to objects. In the 1970’s and 1980’s RFID was first introduced in the industrial sector to keep track of railway wagons, dairy cattle and auto chassis in production lines. Since then it has spread to other areas such as identification of animals, clothing in laundries, billeting systems, admittance control etc. From the beginning of this century there has been an increasing focus on the employment of RFID. This is, among other things, because of recommendations from the U.S. Department of Defence and the U.S. Food and Drug Administration about using the technology. Furthermore, since 2005 the world’s largest retail chain, the Wal-Mart Stores, Inc., has required its largest suppliers to use RFID on all their produce pallets and larger units. The most referenced components in RFID systems are tags, readers and middleware. Tags, also termed transponders, are identification units that are attached to the objects to be localised. The interrogator, the transceiver or the RFID reader, as they are often called, is that component which via the antenna is used for scanning the data contents of the tag. The middleware is the software component which ties the RFID reader together with the other software components in an IT system and, if necessary, also filters the data before it is relayed (Sørensen et al. 2008).
- 3.
Furthermore, it is only fair to mention that Sørensen and associates (2008) never intended to support intrinsic coordination. They do not refer to or use this concept in any way. The case is used here, as an example of what computer support of intrinsic coordination cannot look like.
- 4.
Keep in mind that to the extent representational artifacts such as CAD models constitute the field of work, they may be the locus of practices of intrinsic coordination, and consequently the locus of what is supported through computer technology such as shared feedback. Recall that for the architects the representational artifacts (e.g. sketches, CAD models, etc.) may constitute the field of work. They serve as objectifications of the building-in-the-making and are, as such, the immediate object of their work, they are what is looked upon, inspected, gestured at, discussed, modified, annotated, etc. (Schmidt and Wagner 2004, p.366).
- 5.
According to Celko (1999), there are three fundamental ways that two activities can interfere with one another: (1) Dirty read: Activity 1 (A1) reads an entity from the system of record and then updates the system of record but does not commit the change (for example, the change hasn’t been finalized). Activity 2 (A2) reads the entity, unknowingly making a copy of the uncommitted version. A1 rolls back (aborts) the changes, restoring the entity to the original state that A1 found it in. A2 now has a version of the entity that was never committed and therefore is not considered to have actually existed. (2) Non-repeatable read: A1 reads an entity from the system of record, making a copy of it. A2 deletes the entity from the system of record. A1 now has a copy of an entity that does not officially exist. (3): Phantom read: A1 retrieves a collection of entities from the system of record, making copies of them, based on some sort of search criteria such as “all CAD files pertaining to the roof design”. A2 then creates new entities, which would have met the search criteria (for example, inserts a new file representing parts of the roof construction into the database), saving them to the system of record. If A1 reapplies the search criteria it gets a different result set.
- 6.
We may say that it is hard to see the effects of other people’s actions on an artifact if others do not have ‘write and read’ access to that artifact.
References
Bødker, K., F. Kensing, J. Simonsen. 2004. Participatory IT Design: Designing for Business and Workplace Realities. MIT Press, Cambridge.
Borning, A., M. Travers. 1991. Two approaches to causal interaction over computer and video networks Proc. ACM Conf. Human Factors in Computing Systems CHI’91 ACM, New York 13–19.
Bowker, G., S. Star, W. Turner. 1997. Social Science, Technical Systems, and Cooperative Work. Erlbaum, Mahwah, N.J.
Celko, J. 1999. Data and databases: concepts in practice. Morgan Kaufmann Publishers, San Francisco.
Crabtree, A., T. Rodden, P. Tolmie, G. Button. 2009. Ethnography considered harmful Proceedings of the 27th international conference on Human factors in computing systems. ACM, Boston, MA, USA.
Dourish, P. 2001. Where the Action Is: The Foundations of Embodied Interaction. MIT Press, Cambridge, MA.
Dourish, P. 2006. Implications for Design. Proc. ACM Conf. Human Factors in Computing Systems CHI 2006 (Montreal, Canada). 541–550.
Dourish, P., V. Bellotti. 1992. Awareness and Coordination in Shared Work Spaces ACM Conference: Computer Supported Cooperative Work, 107–114.
Dourish, P., S. Bly. 1992. Portholes: Supporting awarness in a distributed work group. Proc. ACM Conf. Human Factors in Computing Systems CHI’92. ACM, New York.
Dourish, P., G. Button. 1998. On “Technomethodology”: Foundational Relationships between Ethnomethodology and System Design. Human-Computer Interaction 13(4) 395–432.
Gajewska, H., M. Manasse, D. Redell. 1995. Argohalls: Adding support for group awarness to the argo telecollaboration system. Proc. ACM Conf. User Interface Software and Technology UIST’95. ACM, New York.
Greenbaum, J., M. Kyng. 1991. Design at Work. Lawrence Erlbaum Associates, New Jersey.
Greenberg, S. 1996. Peepholes: Low cost awarness of one’s community. Short paper presented at ACM Conf. Human Factors in Computing Systems CHI’96, Vancouver.
Greenberg, S., C. Gutwin, A. Cockburn. 1996. Awarness through Fisheye Views in Relaxed- WYSIWIS Groupware. Proceedings of Graphic Interface. Morgan-Kaufmann, Toronto, Canada, May 21–24.
Gutwin, C., S. Greenberg. 1998. The effects of awareness support on groupware usability Proc. ACM Conf. Human Factors in Computing Systems, CHI’98. ACM, New York, 511–518.
Heath, C., P. Luff. 1992. Collaboration and control: Crisis mangement and multimedia technology in London Underground control rooms. Computer Supported Cooperative Work (CSCW) An International Journal 1(1–2) 69–94.
Narine, T., M. Leganchuk, M. Mantei, W. Buxton. 1997. Collaboration awareness and its use to consolidate a disperse group. Proc. Interact ’97. Kluwer, Dordrecht, 397–404.
Plowman, L., Y. Rogers, M. Ramage. 1995. What are workplace studies for? Proc. Fourth European Conf. Computer Supported Cooperative Work ECSCW’95. Dordrecht: Kluwer, 309–324.
Randall, D., R. Harper, M. Rouncefield. 2007. Fieldwork for Design – Theory and Practice. Springer, London.
Schmidt, K. 1999. The critical role of workplace studies in CSCW. C. Heath, J. Hindmarsh, P. Luff, eds. Workplace Studies: Recovering Work Practice and Informing Design. Cambridge University Press., Cambridge.
Schmidt, K. 2011. Cooperative Work and Coordinative Practices: Contributions to the Conceptual Foundations Of Computer Supported Cooperative Work (CSCW). Springer, London.
Schmidt, K., I. Wagner. 2004. Ordering systems: Coordinative practices and artifacts in architectural design and planning. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing 13(5–6) 349–408.
Sørensen, K.B., P. Christiansson, K. Svidt, K. Jacobsen, T. Simoni. 2008. Towards Linking Virtual Models with Physical Objects in Construction using RFID – Review of Ontologies. L. Rischmolle, ed. Proceedings of the CIB-W78 25th International Conference on Information Technology in Construction. Santiago de Chile, July 15–17 2008.
Stefik, M., D.G. Bobrow, G. Foster, S. Lanning, D. Tatar. 1987. WYSIWIS Revised: Early Experiences with Multiuser Interfaces. ACM Transactions on Office Information Systems 5(2) 147–167.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Christensen, L.R. (2013). Implications for CSCW. In: Coordinative Practices in the Building Process. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-4471-4117-4_9
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4117-4_9
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4116-7
Online ISBN: 978-1-4471-4117-4
eBook Packages: Computer ScienceComputer Science (R0)