Journal Article

Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support

Loading...
Thumbnail Image

Fulltext URI

Document type

Text/Journal Article

Additional Information

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Abstract

Boundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the practical achievement of safety by service engineers. Their resolution of repair requests was preserved in the organization’s memory via three compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually reinterpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.

Description

Lutters, Wayne G.; Ackerman, Mark S. (2007): Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support. Computer Supported Cooperative Work (CSCW): Vol. 16, No. 3. DOI: 10.1007/s10606-006-9036-x. Springer. PISSN: 1573-7551. pp. 341-372

Keywords

boundary objects, collaborative work, high reliability organizations, hotlines, information reuse, organizational memory, safety, service engineering, technical support

Citation

URI

Endorsement

Review

Supplemented By

Referenced By


Number of citations to item: 48

  • Senem Güney, James R. Taylor (2014): Rethinking the role of roadmaps in strategic planning, In: Qualitative Research in Organizations and Management: An International Journal 4(9), doi:10.1108/qrom-08-2012-1090
  • EunJeong Cheon, Norman Makoto Su (2018): 'Staged for Living', In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274305
  • Demosthenes Akoumianakis, George Ktistakis, Giannis Milolidakis, Konstantinos Michailidis (2013): Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services, In: IISA 2013, doi:10.1109/iisa.2013.6623696
  • Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson (2010): Nimble cybersecurity incident management through visualization and defensible recommendations, In: Proceedings of the Seventh International Symposium on Visualization for Cyber Security, doi:10.1145/1850795.1850807
  • Claus Bossen, Lotte Groth Jensen, Flemming Witt (2012): Medical secretaries' care of records, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145341
  • Syavash Nobarany, Mona Haraty, Brian Fisher (2012): Facilitating the reuse process in distributed collaboration, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145388
  • Frauke Mörike (2021): Inverted Hierarchies on the Shop Floor: The Organisational Layer of Workarounds for Collaboration in the Metal Industry, In: Computer Supported Cooperative Work (CSCW) 1(31), doi:10.1007/s10606-021-09415-2
  • Rikke Aarhus, Stinne Aaløkke Ballegaard (2010): Negotiating boundaries, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753509
  • Lars Pareto, Peter Eriksson, Staffan Ehnebom (2010): Architectural Descriptions as Boundary Objects in System and Design Work, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-16129-2_29
  • Ylva Fernaeus, Jakob Tholander, Martin Jonsson (2008): Towards a new set of ideals, In: Proceedings of the 2nd international conference on Tangible and embedded interaction, doi:10.1145/1347390.1347441
  • Mark S. Ackerman, Juri Dachtera, Volkmar Pipek, Volker Wulf (2013): Sharing Knowledge and Expertise: The CSCW View of Knowledge Management, In: Computer Supported Cooperative Work (CSCW) 4-6(22), doi:10.1007/s10606-013-9192-8
  • John R. Goodall, Wayne G. Lutters, Anita Komlodi (2009): Developing expertise for network intrusion detection, In: Information Technology & People 2(22), doi:10.1108/09593840910962186
  • Demosthenes Akoumianakis (2014): Boundary spanning tactics and “traceable” connections in cross-organizational virtual alliances, In: Journal of Enterprise Information Management 2(27), doi:10.1108/jeim-08-2012-0046
  • Patricia Ruma Spence, Madhu Reddy (2012): Beyond practices: A field study of the contextual factors impacting collaborative information seeking, In: Proceedings of the American Society for Information Science and Technology 1(49), doi:10.1002/meet.14504901131
  • Silvia Lindtner, Scott Mainwaring, Paul Dourish, Yang Wang (2009): Situating Productive Play: Online Gaming Practices and Guanxi in China, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-03655-2_37
  • D. Fox Harrell (2009): Computational and cognitive infrastructures of stigma, In: Proceedings of the seventh ACM conference on Creativity and cognition, doi:10.1145/1640233.1640244
  • Beverley Hawkins, Annie Pye, Fernando Correia (2016): Boundary objects, power, and learning: The matter of developing sustainable practice in organizations, In: Management Learning 3(48), doi:10.1177/1350507616677199
  • Charlotte P. Lee, Drew Paine (2015): From The Matrix to a Model of Coordinated Action (MoCA), In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675161
  • Andreas F. Phelps, Madhu Reddy (2009): The influence of boundary objects on group collaboration in construction project teams, In: Proceedings of the 2009 ACM International Conference on Supporting Group Work, doi:10.1145/1531674.1531693
  • Matthias Betz (2010): The Secret Life of Machines – Boundary Objects in Maintenance, Repair and Overhaul, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-12654-3_11
  • Claus Bossen, Lotte Groth Jensen, Flemming Witt Udsen (2013): Boundary-Object Trimming: On the Invisibility of Medical Secretaries’ Care of Records in Healthcare Infrastructures, In: Computer Supported Cooperative Work (CSCW) 1(23), doi:10.1007/s10606-013-9195-5
  • Xiaomu Zhou, Mark Ackerman, Kai Zheng (2011): CPOE workarounds, boundary objects, and assemblages, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979439
  • Isto Huvila, Theresa Dirndorfer Anderson, Eva Hourihan Jansen, Pam McKenzie, Adam Worrall (2017): Boundary objects in information science, In: Journal of the Association for Information Science and Technology 8(68), doi:10.1002/asi.23817
  • Sanne F. Akkerman, Arthur Bakker (2011): Boundary Crossing and Boundary Objects, In: Review of Educational Research 2(81), doi:10.3102/0034654311404435
  • Isto Huvila, Theresa Dirndorfer Anderson, Eva Hourihan Jansen, Pam McKenzie, Lynn Westbrook, Adam Worrall (2014): Boundary objects in information science research: An approach for explicating connections between collections, cultures and communities, In: Proceedings of the American Society for Information Science and Technology 1(51), doi:10.1002/meet.2014.14505101003
  • Demosthenes Akoumianakis (2015): Antecedents of Boundary Spanning E-Collaboration, In: International Journal of e-Collaboration 2(11), doi:10.4018/ijec.2015040104
  • Ellen Nathues, Mark van Vuuren, Maaike D Endedijk, Matthias Wenzel (2024): Shape-shifting: How boundary objects affect meaning-making across visual, verbal, and embodied modes, In: Human Relations 3(78), doi:10.1177/00187267241236111
  • Anna Dowrick, Moira Kelly, Gene Feder (2020): Boundary spanners: Negotiating connections across primary care and domestic violence and abuse services, In: Social Science & Medicine, doi:10.1016/j.socscimed.2019.112687
  • Christoph Kotthaus, Nico Vitt, Max Krüger, Volkmar Pipek, Volker Wulf (2022): Negotiating Priorities on the Shopfloor: A Design Case Study of Maintainers’ Practices, In: Computer Supported Cooperative Work (CSCW) 1(32), doi:10.1007/s10606-022-09444-5
  • John S Morabito, Joel Chan (2021): Managing Context during Scholarly Knowledge Synthesis: Process Patterns and System Mechanics, In: Creativity and Cognition, doi:10.1145/3450741.3465244
  • 박재완, 조성희 (2010): Toward a framework of sociodrama through boundary objects: A language perspective, In: The Korean Journal of Psychodrama 2(13), doi:10.17962/kjp.2010.13.2.004
  • Demosthenes Akoumianakis, Giannis Milolidakis, Dimitrios Stefanakis, Anargyros Akrivos, George Vellis, Dimitrios Kotsalis, Anargyros Plemenos, Nikolaos Vidakis (2009): Virtual Operations in Common Information Spaces: Boundary Objects and Practices, In: IFIP Advances in Information and Communication Technology, doi:10.1007/978-3-642-04568-4_22
  • Milagros Miceli, Tianling Yang, Adriana Alvarado Garcia, Julian Posada, Sonja Mei Wang, Marc Pohl, Alex Hanna (2022): Documenting Data Production Processes, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(6), doi:10.1145/3555623
  • Jan Hayes, Vanessa McDermott (2018): Working in the crowded underground: One call services as a boundary object, In: Safety Science, doi:10.1016/j.ssci.2017.09.019
  • Federico R. Waitoller, Elizabeth B. Kozleski (2013): Working in boundary practices: Identity development and learning in partnerships for inclusive education, In: Teaching and Teacher Education, doi:10.1016/j.tate.2012.11.006
  • Deana D. Pennington (2010): The Dynamics of Material Artifacts in Collaborative Research Teams, In: Computer Supported Cooperative Work (CSCW) 2(19), doi:10.1007/s10606-010-9108-9
  • Silvia Lindtner, Scott Mainwaring, Yang Wang (2008): New Frontier of Guanxi: Online Gaming Practices in China, In: SSRN Electronic Journal, doi:10.2139/ssrn.1317472
  • Patricia Ruma Spence, Madhu Reddy (2011): Beyond Expertise Seeking: A Field Study of the Informal Knowledge Practices of Healthcare IT Teams, In: Computer Supported Cooperative Work (CSCW) 2-3(21), doi:10.1007/s10606-011-9135-1
  • Michael J. Lee, Amy J. Ko (2012): Representations of user feedback in an agile, collocated software team, In: 2012 5th International Workshop on Co-operative and Human Aspects of Software Engineering (CHASE), doi:10.1109/chase.2012.6223028
  • Nina Boulus-Rødje, Pernille Bjorn (2015): Design Challenges in Supporting Distributed Knowledge, In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, doi:10.1145/2702123.2702458
  • Alex Jiahong Lu, Tawanna R. Dillahunt, Gabriela Marcu, Mark S. Ackerman (2021): Data Work in Education: Enacting and Negotiating Care and Control in Teachers' Use of Data-Driven Classroom Surveillance Technology, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3479596
  • Steve Sawyer, Mohammad Jarrahi (2014): Sociotechnical Approaches to the Study of Information Systems, In: Computing Handbook, Third Edition, doi:10.1201/b16768-7
  • Daniela Retelny, Pamela Hinds (2016): Embedding Intentions in Drawings, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2819932
  • Michael Tyworth, Nicklaus A. Giacobe, Vincent Mancuso, Christopher Dancy (2012): The distributed nature of cyber situation awareness, In: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, doi:10.1109/cogsima.2012.6188375
  • Anita Komlodi, Wayne G. Lutters (2008): Collaborative use of individual search histories, In: Interacting with Computers 1(20), doi:10.1016/j.intcom.2007.10.003
  • Ilaria Redaelli, Antonella Carassa (2015): Coordination-Artifacts Suiting, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675136
  • Robin Brewer, Cheryl A. Kieliszewski (2014): Exploring Interaction Design for Advanced Analytics and Simulation, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-07293-7_1
  • Bill Doolin, Laurie McLeod (2012): Sociomateriality and boundary objects in information systems development, In: European Journal of Information Systems 5(21), doi:10.1057/ejis.2012.20
Please note: Providing information about citations is only possible thanks to to the open metadata APIs provided by crossref.org and opencitations.net. These lists may be incomplete due to unavailable citation data.source: opencitations.net, crossref.org