Challenges of introducing a professional eID card within health care
暂无分享,去创建一个
Karin Hedström | Fredrik Karlsson | Fredrik Söderström | F. Karlsson | Karin Hedström | Fredrik Söderström
[1] G. Bowker,et al. The multiple bodies of the medical record : Toward a sociology of an artifact , 1996 .
[2] Wiebe E. Bijker,et al. Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change , 1995 .
[3] Nicholas Gaunt,et al. Practical approaches to creating a security culture , 2000, Int. J. Medical Informatics.
[4] Karin Hedström,et al. Evaluating End User Development as a Requirements Engineering Technique for Communicating Across Social Worlds During Systems Development , 2013, Scand. J. Inf. Syst..
[5] Tina Blegind Jensen,et al. Making sense of enterprise systems in institutions: a case study of the re-implementation of an accounting system , 2013, Scand. J. Inf. Syst..
[6] Karin Axelsson,et al. Managing The Development Of Secure Identification - Investigating A National e-ID Initiative Within A Public e-Service Context , 2013, ECIS.
[7] Patricia Mommens,et al. Ethical Issues of Health Care in the Information Society , 1999 .
[8] Ulf Melin,et al. The Emergence of a National eID Solution : an Actor-Network Perspective , 2012 .
[9] C. N. M. Pounder. Nine principles for assessing whether privacy is protected in a surveillance society , 2008 .
[10] Susan Leigh Star,et al. Institutional Ecology, `Translations' and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology, 1907-39 , 1989 .
[11] Edgar A. Whitley,et al. Global Challenges for Identity Policies , 2009, Technology, Work and Globalization.
[12] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[13] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[14] Susan Leigh Star,et al. The Structure of Ill-Structured Solutions: Boundary Objects and Heterogeneous Distributed Problem Solving , 1989, Distributed Artificial Intelligence.
[15] Carolyn Penstein Rosé,et al. Achieving Productive Multivocality in the Analysis of Group Interactions , 2013 .
[16] Michel Avital,et al. Designing interviews to generate rich data for information systems research , 2011, Inf. Organ..
[17] Jonathan P. Allen,et al. Value conflicts for information security management , 2011, J. Strateg. Inf. Syst..
[18] S. L. Star,et al. This is Not a Boundary Object: Reflections on the Origin of a Concept , 2010 .
[19] A. Michael Huberman,et al. An expanded sourcebook qualitative data analysis , 1994 .
[20] R. Yin. Case Study Research: Design and Methods , 1984 .
[21] Izak Benbasat,et al. The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..
[22] M. Lynne Markus,et al. Change Agentry - The Next IS Frontier , 1996, MIS Q..
[23] T. Pinch,et al. The Social Construction of Facts and Artefacts: or How the Sociology of Science and the Sociology of Technology might Benefit Each Other , 1984 .
[24] R. Santos,et al. Securing a Health Information System with a government issued digital identification card , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
[25] Cathy Urquhart,et al. Using grounded theory method in information systems: the researcher as blank slate and other myths , 2013, J. Inf. Technol..
[26] S. Woolgar,et al. Mundane Governance: Ontology and Accountability , 2013 .
[27] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[28] Theresa A. Pardo,et al. E-government success factors: Mapping practical tools to theoretical foundations , 2005, Gov. Inf. Q..
[29] Joe Peppard,et al. Bridging the gap between the IS organization and the rest of the business: plotting a route , 2001, Inf. Syst. J..
[30] Eileen M. Trauth,et al. Critical Skills and Knowledge Requirements of IS Professionals: A Joint Academic/Industry Investigation , 1995, MIS Q..
[31] B. A. Auber,et al. Adoption of smart cards in the medical sector: the Canadian experience. , 2001, Social science & medicine.
[32] Andrew Georgiou,et al. The Value of Sociotechnical Theories for Implementation of Clinical Information Systems , 2012 .
[33] Marc Berg,et al. Patient care information systems and health care work: a sociotechnical approach , 1999, Int. J. Medical Informatics.
[34] James Backhouse,et al. A roadmap for research on identity in the information society , 2008 .
[35] Manuel Eduardo Correia,et al. Leveraging identity management interoperability in eHealth , 2011, 2011 Carnahan Conference on Security Technology.
[36] P. Biernacki,et al. Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .
[37] Thomas Rössler,et al. Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government , 2008, Comput. Law Secur. Rev..
[38] Paul De Hert,et al. Identity management of e-ID, privacy and security in Europe. A human rights view , 2008, Inf. Secur. Tech. Rep..
[39] Kathleen M. Eisenhardt,et al. Theory Building From Cases: Opportunities And Challenges , 2007 .
[40] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[41] Geraint Price. The benefits and drawbacks of using electronic identities , 2008, Inf. Secur. Tech. Rep..
[42] Richard Baskerville,et al. Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..
[43] Kathryn Henderson,et al. Flexible Sketches and Inflexible Data Bases: Visual Communication, Conscription Devices, and Boundary Objects in Design Engineering , 1991 .
[44] Wiebe E. Bijker,et al. Science in action : how to follow scientists and engineers through society , 1989 .
[45] Stephen Goundrey-Smith,et al. Information Technology in Pharmacy: An Integrated Approach , 2012 .
[46] Allen S. Lee. A Scientific Methodology for MIS Case Studies , 1989, MIS Q..