Challenges of introducing a professional eID card within health care

Purpose: The purpose of this paper is to examine the challenges that arise when introducing an electronic identification (eID) card for professional use in a health-care setting.Design/methodology/ ...

[1]  G. Bowker,et al.  The multiple bodies of the medical record : Toward a sociology of an artifact , 1996 .

[2]  Wiebe E. Bijker,et al.  Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change , 1995 .

[3]  Nicholas Gaunt,et al.  Practical approaches to creating a security culture , 2000, Int. J. Medical Informatics.

[4]  Karin Hedström,et al.  Evaluating End User Development as a Requirements Engineering Technique for Communicating Across Social Worlds During Systems Development , 2013, Scand. J. Inf. Syst..

[5]  Tina Blegind Jensen,et al.  Making sense of enterprise systems in institutions: a case study of the re-implementation of an accounting system , 2013, Scand. J. Inf. Syst..

[6]  Karin Axelsson,et al.  Managing The Development Of Secure Identification - Investigating A National e-ID Initiative Within A Public e-Service Context , 2013, ECIS.

[7]  Patricia Mommens,et al.  Ethical Issues of Health Care in the Information Society , 1999 .

[8]  Ulf Melin,et al.  The Emergence of a National eID Solution : an Actor-Network Perspective , 2012 .

[9]  C. N. M. Pounder Nine principles for assessing whether privacy is protected in a surveillance society , 2008 .

[10]  Susan Leigh Star,et al.  Institutional Ecology, `Translations' and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology, 1907-39 , 1989 .

[11]  Edgar A. Whitley,et al.  Global Challenges for Identity Policies , 2009, Technology, Work and Globalization.

[12]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[13]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[14]  Susan Leigh Star,et al.  The Structure of Ill-Structured Solutions: Boundary Objects and Heterogeneous Distributed Problem Solving , 1989, Distributed Artificial Intelligence.

[15]  Carolyn Penstein Rosé,et al.  Achieving Productive Multivocality in the Analysis of Group Interactions , 2013 .

[16]  Michel Avital,et al.  Designing interviews to generate rich data for information systems research , 2011, Inf. Organ..

[17]  Jonathan P. Allen,et al.  Value conflicts for information security management , 2011, J. Strateg. Inf. Syst..

[18]  S. L. Star,et al.  This is Not a Boundary Object: Reflections on the Origin of a Concept , 2010 .

[19]  A. Michael Huberman,et al.  An expanded sourcebook qualitative data analysis , 1994 .

[20]  R. Yin Case Study Research: Design and Methods , 1984 .

[21]  Izak Benbasat,et al.  The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..

[22]  M. Lynne Markus,et al.  Change Agentry - The Next IS Frontier , 1996, MIS Q..

[23]  T. Pinch,et al.  The Social Construction of Facts and Artefacts: or How the Sociology of Science and the Sociology of Technology might Benefit Each Other , 1984 .

[24]  R. Santos,et al.  Securing a Health Information System with a government issued digital identification card , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.

[25]  Cathy Urquhart,et al.  Using grounded theory method in information systems: the researcher as blank slate and other myths , 2013, J. Inf. Technol..

[26]  S. Woolgar,et al.  Mundane Governance: Ontology and Accountability , 2013 .

[27]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[28]  Theresa A. Pardo,et al.  E-government success factors: Mapping practical tools to theoretical foundations , 2005, Gov. Inf. Q..

[29]  Joe Peppard,et al.  Bridging the gap between the IS organization and the rest of the business: plotting a route , 2001, Inf. Syst. J..

[30]  Eileen M. Trauth,et al.  Critical Skills and Knowledge Requirements of IS Professionals: A Joint Academic/Industry Investigation , 1995, MIS Q..

[31]  B. A. Auber,et al.  Adoption of smart cards in the medical sector: the Canadian experience. , 2001, Social science & medicine.

[32]  Andrew Georgiou,et al.  The Value of Sociotechnical Theories for Implementation of Clinical Information Systems , 2012 .

[33]  Marc Berg,et al.  Patient care information systems and health care work: a sociotechnical approach , 1999, Int. J. Medical Informatics.

[34]  James Backhouse,et al.  A roadmap for research on identity in the information society , 2008 .

[35]  Manuel Eduardo Correia,et al.  Leveraging identity management interoperability in eHealth , 2011, 2011 Carnahan Conference on Security Technology.

[36]  P. Biernacki,et al.  Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .

[37]  Thomas Rössler,et al.  Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government , 2008, Comput. Law Secur. Rev..

[38]  Paul De Hert,et al.  Identity management of e-ID, privacy and security in Europe. A human rights view , 2008, Inf. Secur. Tech. Rep..

[39]  Kathleen M. Eisenhardt,et al.  Theory Building From Cases: Opportunities And Challenges , 2007 .

[40]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .

[41]  Geraint Price The benefits and drawbacks of using electronic identities , 2008, Inf. Secur. Tech. Rep..

[42]  Richard Baskerville,et al.  Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..

[43]  Kathryn Henderson,et al.  Flexible Sketches and Inflexible Data Bases: Visual Communication, Conscription Devices, and Boundary Objects in Design Engineering , 1991 .

[44]  Wiebe E. Bijker,et al.  Science in action : how to follow scientists and engineers through society , 1989 .

[45]  Stephen Goundrey-Smith,et al.  Information Technology in Pharmacy: An Integrated Approach , 2012 .

[46]  Allen S. Lee A Scientific Methodology for MIS Case Studies , 1989, MIS Q..