Вы находитесь на странице: 1из 14

Security Practice: Design, Adoption, and Use of Technology

for Collaboratively Managing Sensitive Personal Information


Laurian C. Vega
Virginia Tech

Monday, November 8, 2010


Computer
Science &
Security

Monday, November 8, 2010


Computer
Science &
Security
Adams, A. and M.A.
Sasse, Users Are Not
the Enemy, in
Communications of
the ACM. 1999. p.
40-46.

Monday, November 8, 2010


Medical
Informatics &
Adoption of
Electronic
Records

Monday, November 8, 2010


Medical
Informatics &
Adoption of
Electronic
Records
Berner, E.S., D.E. Detmer &
D. Simborg, Will the Wave
Finally Break? A Brief View
of the Adoption of
Electronic Medical Records
in the United States. J Am
Med Inform Assoc, 2005.
12(1): p. 3-7.

Monday, November 8, 2010


Childcare Centers
Monday, November 8, 2010
Physician’s Offices
Monday, November 8, 2010
Research
Question
Ho w d o s o c i o - t e c h n i c a l
systems that use sensitive
personal information manage
work-practice breakdowns
surrounding the implicit and
explicit rules of process?

Monday, November 8, 2010


Data & Method
Location: Southwest-Virginia
•Rural
IRB Approved

51 Interviewed Participants:
• 13 Childcare Directors
• 18 Medical Directors
• 21 Parents
121 hours of observations
• 4 Childcares & 4 Physician’s
offices
•Notes, collected artifacts,
pictures

Monday, November 8, 2010


Dissertation Outcomes
A description and analysis of all
observed and discussed
breakdowns

A set of future scenarios


depicting abstractions of
breakdowns

Three themes discussed through


scenarios:
Community of security
Security embodiment
Zones of ambiguity

Monday, November 8, 2010


Discussion for AMIA

What are the novel ways that this research can be applied and
be useful for the AMIA community?

Security and privacy, from my observations, have completely


different meanings than how computer scientists think about
them. How can these differing constructs be useful for AMIA?

What alternative evaluation methods can be applied to my


data to triangulate and generalize my findings?

Monday, November 8, 2010


Thank you
Laurian Vega
Department of Computer
Science, Virginia Tech

A special thanks to my committee: Steve


Harrison, Deborha Tatar, Enid Montague,
Dennis Kafura, and Scott McCrickard;
and, Tom DeHart, Laura Agnich,
Edgardo Vega, Zalia Shams, Monika
Akbar, Stacy Branham, & Aubrey Baker
who helped run, code, and analyze the
data.

Monday, November 8, 2010


Photo Attribution
Slide 1

http://weblogs.jomc.unc.edu/ihc/wp-content/uploads/2010/04/
electronic_medical_records.jpg

SILK Information Systems: http://www.flickr.com/photos/36734051@N04/3385146885/

http://www.corbisimages.com/Images/spacer.gif

Slide 2

formalfallacy @ Dublin: http://www.flickr.com/photos/formalfallacy/2057169454/

Slide 11

.penny: http://www.flickr.com/photos/44124468595@N01/14370954/

Slide 17

Simon Lieschke: http://www.flickr.com/photos/slieschke/226873460/

Monday, November 8, 2010


Method
•Studying the world of the
participants as an active - observer
•The research findings are dependent
on the interpretations of the
researcher; researcher is the
instrument
•Research questions are open, and
adaptive to upon deeper
understanding of the research context
•Data is captured in notes & rich
descriptions, transcriptions, artifacts,
memos of interpretation, audio
recordings, etc
•Data collection is never complete

Monday, November 8, 2010

Вам также может понравиться