Journal Article

Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support

Loading...
Thumbnail Image

Fulltext URI

Document type

Text/Journal Article

Additional Information

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Abstract

Boundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the practical achievement of safety by service engineers. Their resolution of repair requests was preserved in the organization’s memory via three compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually reinterpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.

Description

Lutters, Wayne G.; Ackerman, Mark S. (2007): Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support. Computer Supported Cooperative Work (CSCW): Vol. 16, No. 3. DOI: 10.1007/s10606-006-9036-x. Springer. PISSN: 1573-7551. pp. 341-372

Keywords

boundary objects, collaborative work, high reliability organizations, hotlines, information reuse, organizational memory, safety, service engineering, technical support

Citation

URI

Endorsement

Review

Supplemented By

Referenced By


Number of citations to item: 49

  • Ellen Nathues, Mark van Vuuren, Maaike D Endedijk, Matthias Wenzel (2024): Shape-shifting: How boundary objects affect meaning-making across visual, verbal, and embodied modes, In: Human Relations 3(78), doi:10.1177/00187267241236111
  • Mark S. Ackerman, Juri Dachtera, Volkmar Pipek, Volker Wulf (2013): Sharing Knowledge and Expertise: The CSCW View of Knowledge Management, In: Computer Supported Cooperative Work (CSCW) 4-6(22), doi:10.1007/s10606-013-9192-8
  • Deana D. Pennington (2010): The Dynamics of Material Artifacts in Collaborative Research Teams, In: Computer Supported Cooperative Work (CSCW) 2(19), doi:10.1007/s10606-010-9108-9
  • Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson (2010): Nimble cybersecurity incident management through visualization and defensible recommendations, In: Proceedings of the Seventh International Symposium on Visualization for Cyber Security, doi:10.1145/1850795.1850807
  • Nina Boulus-Rødje, Pernille Bjorn (2015): Design Challenges in Supporting Distributed Knowledge, In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, doi:10.1145/2702123.2702458
  • Lars Pareto, Peter Eriksson, Staffan Ehnebom (2010): Architectural Descriptions as Boundary Objects in System and Design Work, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-16129-2_29
  • John S Morabito, Joel Chan (2021): Managing Context during Scholarly Knowledge Synthesis: Process Patterns and System Mechanics, In: Creativity and Cognition, doi:10.1145/3450741.3465244
  • Rikke Aarhus, Stinne Aaløkke Ballegaard (2010): Negotiating boundaries, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753509
  • Andreas F. Phelps, Madhu Reddy (2009): The influence of boundary objects on group collaboration in construction project teams, In: Proceedings of the 2009 ACM International Conference on Supporting Group Work, doi:10.1145/1531674.1531693
  • Patricia Ruma Spence, Madhu Reddy (2012): Beyond practices: A field study of the contextual factors impacting collaborative information seeking, In: Proceedings of the American Society for Information Science and Technology 1(49), doi:10.1002/meet.14504901131
  • Xiaomu Zhou, Mark Ackerman, Kai Zheng (2011): CPOE workarounds, boundary objects, and assemblages, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979439
  • John R. Goodall, Wayne G. Lutters, Anita Komlodi (2009): Developing expertise for network intrusion detection, In: Information Technology & People 2(22), doi:10.1108/09593840910962186
  • EunJeong Cheon, Norman Makoto Su (2018): 'Staged for Living', In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274305
  • Steve Sawyer, Mohammad Jarrahi (2014): Sociotechnical Approaches to the Study of Information Systems, In: Computing Handbook, Third Edition, doi:10.1201/b16768-7
  • Bill Doolin, Laurie McLeod (2012): Sociomateriality and boundary objects in information systems development, In: European Journal of Information Systems 5(21), doi:10.1057/ejis.2012.20
  • Claus Bossen, Lotte Groth Jensen, Flemming Witt Udsen (2013): Boundary-Object Trimming: On the Invisibility of Medical Secretaries’ Care of Records in Healthcare Infrastructures, In: Computer Supported Cooperative Work (CSCW) 1(23), doi:10.1007/s10606-013-9195-5
  • Daniela Retelny, Pamela Hinds (2016): Embedding Intentions in Drawings, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2819932
  • Demosthenes Akoumianakis, Giannis Milolidakis, Dimitrios Stefanakis, Anargyros Akrivos, George Vellis, Dimitrios Kotsalis, Anargyros Plemenos, Nikolaos Vidakis (2009): Virtual Operations in Common Information Spaces: Boundary Objects and Practices, In: IFIP Advances in Information and Communication Technology, doi:10.1007/978-3-642-04568-4_22
  • Demosthenes Akoumianakis (2014): Boundary spanning tactics and “traceable” connections in cross-organizational virtual alliances, In: Journal of Enterprise Information Management 2(27), doi:10.1108/jeim-08-2012-0046
  • Christoph Kotthaus, Nico Vitt, Max Krüger, Volkmar Pipek, Volker Wulf (2022): Negotiating Priorities on the Shopfloor: A Design Case Study of Maintainers’ Practices, In: Computer Supported Cooperative Work (CSCW) 1(32), doi:10.1007/s10606-022-09444-5
  • Syavash Nobarany, Mona Haraty, Brian Fisher (2012): Facilitating the reuse process in distributed collaboration, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145388
  • Robin Brewer, Cheryl A. Kieliszewski (2014): Exploring Interaction Design for Advanced Analytics and Simulation, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-07293-7_1
  • Michael Tyworth, Nicklaus A. Giacobe, Vincent Mancuso, Christopher Dancy (2012): The distributed nature of cyber situation awareness, In: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, doi:10.1109/cogsima.2012.6188375
  • Demosthenes Akoumianakis (2015): Antecedents of Boundary Spanning E-Collaboration, In: International Journal of e-Collaboration 2(11), doi:10.4018/ijec.2015040104
  • Silvia Lindtner, Scott Mainwaring, Paul Dourish, Yang Wang (2009): Situating Productive Play: Online Gaming Practices and Guanxi in China, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-03655-2_37
  • Silvia Lindtner, Scott Mainwaring, Yang Wang (2008): New Frontier of Guanxi: Online Gaming Practices in China, In: SSRN Electronic Journal, doi:10.2139/ssrn.1317472
  • Beverley Hawkins, Annie Pye, Fernando Correia (2016): Boundary objects, power, and learning: The matter of developing sustainable practice in organizations, In: Management Learning 3(48), doi:10.1177/1350507616677199
  • Michael J. Lee, Amy J. Ko (2012): Representations of user feedback in an agile, collocated software team, In: 2012 5th International Workshop on Co-operative and Human Aspects of Software Engineering (CHASE), doi:10.1109/chase.2012.6223028
  • Frauke Mörike (2021): Inverted Hierarchies on the Shop Floor: The Organisational Layer of Workarounds for Collaboration in the Metal Industry, In: Computer Supported Cooperative Work (CSCW) 1(31), doi:10.1007/s10606-021-09415-2
  • Demosthenes Akoumianakis, George Ktistakis, Giannis Milolidakis, Konstantinos Michailidis (2013): Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services, In: IISA 2013, doi:10.1109/iisa.2013.6623696
  • Christopher Sadorge, Monika Nerland, Miria Grisot (2023): The Generative Role of Objects in Infrastructure Design: A Case of Designing a System for Continuity of Care, In: Computer Supported Cooperative Work (CSCW) 4(33), doi:10.1007/s10606-023-09485-4
  • Ylva Fernaeus, Jakob Tholander, Martin Jonsson (2008): Towards a new set of ideals, In: Proceedings of the 2nd international conference on Tangible and embedded interaction, doi:10.1145/1347390.1347441
  • Jan Hayes, Vanessa McDermott (2018): Working in the crowded underground: One call services as a boundary object, In: Safety Science, doi:10.1016/j.ssci.2017.09.019
  • Patricia Ruma Spence, Madhu Reddy (2011): Beyond Expertise Seeking: A Field Study of the Informal Knowledge Practices of Healthcare IT Teams, In: Computer Supported Cooperative Work (CSCW) 2-3(21), doi:10.1007/s10606-011-9135-1
  • Ilaria Redaelli, Antonella Carassa (2015): Coordination-Artifacts Suiting, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675136
  • Isto Huvila, Theresa Dirndorfer Anderson, Eva Hourihan Jansen, Pam McKenzie, Adam Worrall (2017): Boundary objects in information science, In: Journal of the Association for Information Science and Technology 8(68), doi:10.1002/asi.23817
  • Milagros Miceli, Tianling Yang, Adriana Alvarado Garcia, Julian Posada, Sonja Mei Wang, Marc Pohl, Alex Hanna (2022): Documenting Data Production Processes, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(6), doi:10.1145/3555623
  • Claus Bossen, Lotte Groth Jensen, Flemming Witt (2012): Medical secretaries' care of records, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145341
  • Sanne F. Akkerman, Arthur Bakker (2011): Boundary Crossing and Boundary Objects, In: Review of Educational Research 2(81), doi:10.3102/0034654311404435
  • 박재완, 조성희 (2010): Toward a framework of sociodrama through boundary objects: A language perspective, In: The Korean Journal of Psychodrama 2(13), doi:10.17962/kjp.2010.13.2.004
  • Matthias Betz (2010): The Secret Life of Machines – Boundary Objects in Maintenance, Repair and Overhaul, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-12654-3_11
  • Senem Güney, James R. Taylor (2014): Rethinking the role of roadmaps in strategic planning, In: Qualitative Research in Organizations and Management: An International Journal 4(9), doi:10.1108/qrom-08-2012-1090
  • Federico R. Waitoller, Elizabeth B. Kozleski (2013): Working in boundary practices: Identity development and learning in partnerships for inclusive education, In: Teaching and Teacher Education, doi:10.1016/j.tate.2012.11.006
  • Anita Komlodi, Wayne G. Lutters (2008): Collaborative use of individual search histories, In: Interacting with Computers 1(20), doi:10.1016/j.intcom.2007.10.003
  • Anna Dowrick, Moira Kelly, Gene Feder (2020): Boundary spanners: Negotiating connections across primary care and domestic violence and abuse services, In: Social Science & Medicine, doi:10.1016/j.socscimed.2019.112687
  • Alex Jiahong Lu, Tawanna R. Dillahunt, Gabriela Marcu, Mark S. Ackerman (2021): Data Work in Education: Enacting and Negotiating Care and Control in Teachers' Use of Data-Driven Classroom Surveillance Technology, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3479596
  • Isto Huvila, Theresa Dirndorfer Anderson, Eva Hourihan Jansen, Pam McKenzie, Lynn Westbrook, Adam Worrall (2014): Boundary objects in information science research: An approach for explicating connections between collections, cultures and communities, In: Proceedings of the American Society for Information Science and Technology 1(51), doi:10.1002/meet.2014.14505101003
  • D. Fox Harrell (2009): Computational and cognitive infrastructures of stigma, In: Proceedings of the seventh ACM conference on Creativity and cognition, doi:10.1145/1640233.1640244
  • Charlotte P. Lee, Drew Paine (2015): From The Matrix to a Model of Coordinated Action (MoCA), In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675161
Please note: Providing information about citations is only possible thanks to to the open metadata APIs provided by crossref.org and opencitations.net. These lists may be incomplete due to unavailable citation data.source: opencitations.net, crossref.org