Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support

dc.contributor.authorLutters, Wayne G.
dc.contributor.authorAckerman, Mark S.
dc.date.accessioned2020-06-06T13:07:46Z
dc.date.available2020-06-06T13:07:46Z
dc.date.issued2007
dc.date.issued2007
dc.description.abstractBoundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the practical achievement of safety by service engineers. Their resolution of repair requests was preserved in the organization’s memory via three compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually reinterpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.de
dc.identifier.doi10.1007/s10606-006-9036-x
dc.identifier.pissn1573-7551
dc.identifier.urihttp://dx.doi.org/10.1007/s10606-006-9036-x
dc.identifier.urihttps://dl.eusset.eu/handle/20.500.12015/4029
dc.publisherSpringer
dc.relation.ispartofComputer Supported Cooperative Work (CSCW): Vol. 16, No. 3
dc.relation.ispartofseriesComputer Supported Cooperative Work (CSCW)
dc.subjectboundary objects
dc.subjectcollaborative work
dc.subjecthigh reliability organizations
dc.subjecthotlines
dc.subjectinformation reuse
dc.subjectorganizational memory
dc.subjectsafety
dc.subjectservice engineering
dc.subjecttechnical support
dc.titleBeyond Boundary Objects: Collaborative Reuse in Aircraft Technical Supportde
dc.typeText/Journal Article
gi.citation.endPage372
gi.citation.startPage341
gi.citations.count49
gi.citations.elementEllen Nathues, Mark van Vuuren, Maaike D Endedijk, Matthias Wenzel (2024): Shape-shifting: How boundary objects affect meaning-making across visual, verbal, and embodied modes, In: Human Relations 3(78), doi:10.1177/00187267241236111
gi.citations.elementMark S. Ackerman, Juri Dachtera, Volkmar Pipek, Volker Wulf (2013): Sharing Knowledge and Expertise: The CSCW View of Knowledge Management, In: Computer Supported Cooperative Work (CSCW) 4-6(22), doi:10.1007/s10606-013-9192-8
gi.citations.elementDeana D. Pennington (2010): The Dynamics of Material Artifacts in Collaborative Research Teams, In: Computer Supported Cooperative Work (CSCW) 2(19), doi:10.1007/s10606-010-9108-9
gi.citations.elementJamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson (2010): Nimble cybersecurity incident management through visualization and defensible recommendations, In: Proceedings of the Seventh International Symposium on Visualization for Cyber Security, doi:10.1145/1850795.1850807
gi.citations.elementNina Boulus-Rødje, Pernille Bjorn (2015): Design Challenges in Supporting Distributed Knowledge, In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, doi:10.1145/2702123.2702458
gi.citations.elementLars Pareto, Peter Eriksson, Staffan Ehnebom (2010): Architectural Descriptions as Boundary Objects in System and Design Work, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-16129-2_29
gi.citations.elementJohn S Morabito, Joel Chan (2021): Managing Context during Scholarly Knowledge Synthesis: Process Patterns and System Mechanics, In: Creativity and Cognition, doi:10.1145/3450741.3465244
gi.citations.elementRikke Aarhus, Stinne Aaløkke Ballegaard (2010): Negotiating boundaries, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753509
gi.citations.elementAndreas F. Phelps, Madhu Reddy (2009): The influence of boundary objects on group collaboration in construction project teams, In: Proceedings of the 2009 ACM International Conference on Supporting Group Work, doi:10.1145/1531674.1531693
gi.citations.elementPatricia Ruma Spence, Madhu Reddy (2012): Beyond practices: A field study of the contextual factors impacting collaborative information seeking, In: Proceedings of the American Society for Information Science and Technology 1(49), doi:10.1002/meet.14504901131
gi.citations.elementXiaomu Zhou, Mark Ackerman, Kai Zheng (2011): CPOE workarounds, boundary objects, and assemblages, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979439
gi.citations.elementJohn R. Goodall, Wayne G. Lutters, Anita Komlodi (2009): Developing expertise for network intrusion detection, In: Information Technology & People 2(22), doi:10.1108/09593840910962186
gi.citations.elementEunJeong Cheon, Norman Makoto Su (2018): 'Staged for Living', In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274305
gi.citations.elementSteve Sawyer, Mohammad Jarrahi (2014): Sociotechnical Approaches to the Study of Information Systems, In: Computing Handbook, Third Edition, doi:10.1201/b16768-7
gi.citations.elementBill Doolin, Laurie McLeod (2012): Sociomateriality and boundary objects in information systems development, In: European Journal of Information Systems 5(21), doi:10.1057/ejis.2012.20
gi.citations.elementClaus Bossen, Lotte Groth Jensen, Flemming Witt Udsen (2013): Boundary-Object Trimming: On the Invisibility of Medical Secretaries’ Care of Records in Healthcare Infrastructures, In: Computer Supported Cooperative Work (CSCW) 1(23), doi:10.1007/s10606-013-9195-5
gi.citations.elementDaniela Retelny, Pamela Hinds (2016): Embedding Intentions in Drawings, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2819932
gi.citations.elementDemosthenes Akoumianakis, Giannis Milolidakis, Dimitrios Stefanakis, Anargyros Akrivos, George Vellis, Dimitrios Kotsalis, Anargyros Plemenos, Nikolaos Vidakis (2009): Virtual Operations in Common Information Spaces: Boundary Objects and Practices, In: IFIP Advances in Information and Communication Technology, doi:10.1007/978-3-642-04568-4_22
gi.citations.elementDemosthenes Akoumianakis (2014): Boundary spanning tactics and “traceable” connections in cross-organizational virtual alliances, In: Journal of Enterprise Information Management 2(27), doi:10.1108/jeim-08-2012-0046
gi.citations.elementChristoph Kotthaus, Nico Vitt, Max Krüger, Volkmar Pipek, Volker Wulf (2022): Negotiating Priorities on the Shopfloor: A Design Case Study of Maintainers’ Practices, In: Computer Supported Cooperative Work (CSCW) 1(32), doi:10.1007/s10606-022-09444-5
gi.citations.elementSyavash Nobarany, Mona Haraty, Brian Fisher (2012): Facilitating the reuse process in distributed collaboration, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145388
gi.citations.elementRobin Brewer, Cheryl A. Kieliszewski (2014): Exploring Interaction Design for Advanced Analytics and Simulation, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-07293-7_1
gi.citations.elementMichael Tyworth, Nicklaus A. Giacobe, Vincent Mancuso, Christopher Dancy (2012): The distributed nature of cyber situation awareness, In: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, doi:10.1109/cogsima.2012.6188375
gi.citations.elementDemosthenes Akoumianakis (2015): Antecedents of Boundary Spanning E-Collaboration, In: International Journal of e-Collaboration 2(11), doi:10.4018/ijec.2015040104
gi.citations.elementSilvia Lindtner, Scott Mainwaring, Paul Dourish, Yang Wang (2009): Situating Productive Play: Online Gaming Practices and Guanxi in China, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-03655-2_37
gi.citations.elementSilvia Lindtner, Scott Mainwaring, Yang Wang (2008): New Frontier of Guanxi: Online Gaming Practices in China, In: SSRN Electronic Journal, doi:10.2139/ssrn.1317472
gi.citations.elementBeverley Hawkins, Annie Pye, Fernando Correia (2016): Boundary objects, power, and learning: The matter of developing sustainable practice in organizations, In: Management Learning 3(48), doi:10.1177/1350507616677199
gi.citations.elementMichael J. Lee, Amy J. Ko (2012): Representations of user feedback in an agile, collocated software team, In: 2012 5th International Workshop on Co-operative and Human Aspects of Software Engineering (CHASE), doi:10.1109/chase.2012.6223028
gi.citations.elementFrauke Mörike (2021): Inverted Hierarchies on the Shop Floor: The Organisational Layer of Workarounds for Collaboration in the Metal Industry, In: Computer Supported Cooperative Work (CSCW) 1(31), doi:10.1007/s10606-021-09415-2
gi.citations.elementDemosthenes Akoumianakis, George Ktistakis, Giannis Milolidakis, Konstantinos Michailidis (2013): Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services, In: IISA 2013, doi:10.1109/iisa.2013.6623696
gi.citations.elementChristopher Sadorge, Monika Nerland, Miria Grisot (2023): The Generative Role of Objects in Infrastructure Design: A Case of Designing a System for Continuity of Care, In: Computer Supported Cooperative Work (CSCW) 4(33), doi:10.1007/s10606-023-09485-4
gi.citations.elementYlva Fernaeus, Jakob Tholander, Martin Jonsson (2008): Towards a new set of ideals, In: Proceedings of the 2nd international conference on Tangible and embedded interaction, doi:10.1145/1347390.1347441
gi.citations.elementJan Hayes, Vanessa McDermott (2018): Working in the crowded underground: One call services as a boundary object, In: Safety Science, doi:10.1016/j.ssci.2017.09.019
gi.citations.elementPatricia Ruma Spence, Madhu Reddy (2011): Beyond Expertise Seeking: A Field Study of the Informal Knowledge Practices of Healthcare IT Teams, In: Computer Supported Cooperative Work (CSCW) 2-3(21), doi:10.1007/s10606-011-9135-1
gi.citations.elementIlaria Redaelli, Antonella Carassa (2015): Coordination-Artifacts Suiting, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675136
gi.citations.elementIsto Huvila, Theresa Dirndorfer Anderson, Eva Hourihan Jansen, Pam McKenzie, Adam Worrall (2017): Boundary objects in information science, In: Journal of the Association for Information Science and Technology 8(68), doi:10.1002/asi.23817
gi.citations.elementMilagros Miceli, Tianling Yang, Adriana Alvarado Garcia, Julian Posada, Sonja Mei Wang, Marc Pohl, Alex Hanna (2022): Documenting Data Production Processes, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(6), doi:10.1145/3555623
gi.citations.elementClaus Bossen, Lotte Groth Jensen, Flemming Witt (2012): Medical secretaries' care of records, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145341
gi.citations.elementSanne F. Akkerman, Arthur Bakker (2011): Boundary Crossing and Boundary Objects, In: Review of Educational Research 2(81), doi:10.3102/0034654311404435
gi.citations.element박재완, 조성희 (2010): Toward a framework of sociodrama through boundary objects: A language perspective, In: The Korean Journal of Psychodrama 2(13), doi:10.17962/kjp.2010.13.2.004
gi.citations.elementMatthias Betz (2010): The Secret Life of Machines – Boundary Objects in Maintenance, Repair and Overhaul, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-12654-3_11
gi.citations.elementSenem Güney, James R. Taylor (2014): Rethinking the role of roadmaps in strategic planning, In: Qualitative Research in Organizations and Management: An International Journal 4(9), doi:10.1108/qrom-08-2012-1090
gi.citations.elementFederico R. Waitoller, Elizabeth B. Kozleski (2013): Working in boundary practices: Identity development and learning in partnerships for inclusive education, In: Teaching and Teacher Education, doi:10.1016/j.tate.2012.11.006
gi.citations.elementAnita Komlodi, Wayne G. Lutters (2008): Collaborative use of individual search histories, In: Interacting with Computers 1(20), doi:10.1016/j.intcom.2007.10.003
gi.citations.elementAnna Dowrick, Moira Kelly, Gene Feder (2020): Boundary spanners: Negotiating connections across primary care and domestic violence and abuse services, In: Social Science & Medicine, doi:10.1016/j.socscimed.2019.112687
gi.citations.elementAlex Jiahong Lu, Tawanna R. Dillahunt, Gabriela Marcu, Mark S. Ackerman (2021): Data Work in Education: Enacting and Negotiating Care and Control in Teachers' Use of Data-Driven Classroom Surveillance Technology, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3479596
gi.citations.elementIsto Huvila, Theresa Dirndorfer Anderson, Eva Hourihan Jansen, Pam McKenzie, Lynn Westbrook, Adam Worrall (2014): Boundary objects in information science research: An approach for explicating connections between collections, cultures and communities, In: Proceedings of the American Society for Information Science and Technology 1(51), doi:10.1002/meet.2014.14505101003
gi.citations.elementD. Fox Harrell (2009): Computational and cognitive infrastructures of stigma, In: Proceedings of the seventh ACM conference on Creativity and cognition, doi:10.1145/1640233.1640244
gi.citations.elementCharlotte P. Lee, Drew Paine (2015): From The Matrix to a Model of Coordinated Action (MoCA), In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675161

Files