Skip to main content

Implications for CSCW

  • Chapter
  • First Online:
Coordinative Practices in the Building Process

Part of the book series: Computer Supported Cooperative Work ((CSCW))

  • 491 Accesses

Abstract

In this, the last chapter of the book, we shall consider the implications of our study for the field of CSCW.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See also Chap. 1.

  2. 2.

    RFID is an acronym for Radio Frequency Identification and denotes any identification system in which electronic devices occur that use radio waves or pulsating magnetic fields to communicate with identification units fastened to objects. In the 1970’s and 1980’s RFID was first introduced in the industrial sector to keep track of railway wagons, dairy cattle and auto chassis in production lines. Since then it has spread to other areas such as identification of animals, clothing in laundries, billeting systems, admittance control etc. From the beginning of this century there has been an increasing focus on the employment of RFID. This is, among other things, because of recommendations from the U.S. Department of Defence and the U.S. Food and Drug Administration about using the technology. Furthermore, since 2005 the world’s largest retail chain, the Wal-Mart Stores, Inc., has required its largest suppliers to use RFID on all their produce pallets and larger units. The most referenced components in RFID systems are tags, readers and middleware. Tags, also termed transponders, are identification units that are attached to the objects to be localised. The interrogator, the transceiver or the RFID reader, as they are often called, is that component which via the antenna is used for scanning the data contents of the tag. The middleware is the software component which ties the RFID reader together with the other software components in an IT system and, if necessary, also filters the data before it is relayed (Sørensen et al. 2008).

  3. 3.

    Furthermore, it is only fair to mention that Sørensen and associates (2008) never intended to support intrinsic coordination. They do not refer to or use this concept in any way. The case is used here, as an example of what computer support of intrinsic coordination cannot look like.

  4. 4.

    Keep in mind that to the extent representational artifacts such as CAD models constitute the field of work, they may be the locus of practices of intrinsic coordination, and consequently the locus of what is supported through computer technology such as shared feedback. Recall that for the architects the representational artifacts (e.g. sketches, CAD models, etc.) may constitute the field of work. They serve as objectifications of the building-in-the-making and are, as such, the immediate object of their work, they are what is looked upon, inspected, gestured at, discussed, modified, annotated, etc. (Schmidt and Wagner 2004, p.366).

  5. 5.

    According to Celko (1999), there are three fundamental ways that two activities can interfere with one another: (1) Dirty read: Activity 1 (A1) reads an entity from the system of record and then updates the system of record but does not commit the change (for example, the change hasn’t been finalized). Activity 2 (A2) reads the entity, unknowingly making a copy of the uncommitted version. A1 rolls back (aborts) the changes, restoring the entity to the original state that A1 found it in. A2 now has a version of the entity that was never committed and therefore is not considered to have actually existed. (2) Non-repeatable read: A1 reads an entity from the system of record, making a copy of it. A2 deletes the entity from the system of record. A1 now has a copy of an entity that does not officially exist. (3): Phantom read: A1 retrieves a collection of entities from the system of record, making copies of them, based on some sort of search criteria such as “all CAD files pertaining to the roof design”. A2 then creates new entities, which would have met the search criteria (for example, inserts a new file representing parts of the roof construction into the database), saving them to the system of record. If A1 reapplies the search criteria it gets a different result set.

  6. 6.

    We may say that it is hard to see the effects of other people’s actions on an artifact if others do not have ‘write and read’ access to that artifact.

References

  • Bødker, K., F. Kensing, J. Simonsen. 2004. Participatory IT Design: Designing for Business and Workplace Realities. MIT Press, Cambridge.

    Google Scholar 

  • Borning, A., M. Travers. 1991. Two approaches to causal interaction over computer and video networks Proc. ACM Conf. Human Factors in Computing Systems CHI’91 ACM, New York 13–19.

    Google Scholar 

  • Bowker, G., S. Star, W. Turner. 1997. Social Science, Technical Systems, and Cooperative Work. Erlbaum, Mahwah, N.J.

    Google Scholar 

  • Celko, J. 1999. Data and databases: concepts in practice. Morgan Kaufmann Publishers, San Francisco.

    Google Scholar 

  • Crabtree, A., T. Rodden, P. Tolmie, G. Button. 2009. Ethnography considered harmful Proceedings of the 27th international conference on Human factors in computing systems. ACM, Boston, MA, USA.

    Google Scholar 

  • Dourish, P. 2001. Where the Action Is: The Foundations of Embodied Interaction. MIT Press, Cambridge, MA.

    Google Scholar 

  • Dourish, P. 2006. Implications for Design. Proc. ACM Conf. Human Factors in Computing Systems CHI 2006 (Montreal, Canada). 541–550.

    Google Scholar 

  • Dourish, P., V. Bellotti. 1992. Awareness and Coordination in Shared Work Spaces ACM Conference: Computer Supported Cooperative Work, 107–114.

    Google Scholar 

  • Dourish, P., S. Bly. 1992. Portholes: Supporting awarness in a distributed work group. Proc. ACM Conf. Human Factors in Computing Systems CHI’92. ACM, New York.

    Google Scholar 

  • Dourish, P., G. Button. 1998. On “Technomethodology”: Foundational Relationships between Ethnomethodology and System Design. Human-Computer Interaction 13(4) 395–432.

    Article  Google Scholar 

  • Gajewska, H., M. Manasse, D. Redell. 1995. Argohalls: Adding support for group awarness to the argo telecollaboration system. Proc. ACM Conf. User Interface Software and Technology UIST’95. ACM, New York.

    Google Scholar 

  • Greenbaum, J., M. Kyng. 1991. Design at Work. Lawrence Erlbaum Associates, New Jersey.

    Google Scholar 

  • Greenberg, S. 1996. Peepholes: Low cost awarness of one’s community. Short paper presented at ACM Conf. Human Factors in Computing Systems CHI’96, Vancouver.

    Google Scholar 

  • Greenberg, S., C. Gutwin, A. Cockburn. 1996. Awarness through Fisheye Views in Relaxed- WYSIWIS Groupware. Proceedings of Graphic Interface. Morgan-Kaufmann, Toronto, Canada, May 21–24.

    Google Scholar 

  • Gutwin, C., S. Greenberg. 1998. The effects of awareness support on groupware usability Proc. ACM Conf. Human Factors in Computing Systems, CHI’98. ACM, New York, 511–518.

    Google Scholar 

  • Heath, C., P. Luff. 1992. Collaboration and control: Crisis mangement and multimedia technology in London Underground control rooms. Computer Supported Cooperative Work (CSCW) An International Journal 1(1–2) 69–94.

    Google Scholar 

  • Narine, T., M. Leganchuk, M. Mantei, W. Buxton. 1997. Collaboration awareness and its use to consolidate a disperse group. Proc. Interact ’97. Kluwer, Dordrecht, 397–404.

    Google Scholar 

  • Plowman, L., Y. Rogers, M. Ramage. 1995. What are workplace studies for? Proc. Fourth European Conf. Computer Supported Cooperative Work ECSCW’95. Dordrecht: Kluwer, 309–324.

    Google Scholar 

  • Randall, D., R. Harper, M. Rouncefield. 2007. Fieldwork for Design – Theory and Practice. Springer, London.

    Google Scholar 

  • Schmidt, K. 1999. The critical role of workplace studies in CSCW. C. Heath, J. Hindmarsh, P. Luff, eds. Workplace Studies: Recovering Work Practice and Informing Design. Cambridge University Press., Cambridge.

    Google Scholar 

  • Schmidt, K. 2011. Cooperative Work and Coordinative Practices: Contributions to the Conceptual Foundations Of Computer Supported Cooperative Work (CSCW). Springer, London.

    Google Scholar 

  • Schmidt, K., I. Wagner. 2004. Ordering systems: Coordinative practices and artifacts in architectural design and planning. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing 13(5–6) 349–408.

    Article  Google Scholar 

  • Sørensen, K.B., P. Christiansson, K. Svidt, K. Jacobsen, T. Simoni. 2008. Towards Linking Virtual Models with Physical Objects in Construction using RFID – Review of Ontologies. L. Rischmolle, ed. Proceedings of the CIB-W78 25th International Conference on Information Technology in Construction. Santiago de Chile, July 15–17 2008.

    Google Scholar 

  • Stefik, M., D.G. Bobrow, G. Foster, S. Lanning, D. Tatar. 1987. WYSIWIS Revised: Early Experiences with Multiuser Interfaces. ACM Transactions on Office Information Systems 5(2) 147–167.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Christensen, L.R. (2013). Implications for CSCW. In: Coordinative Practices in the Building Process. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-4471-4117-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4117-4_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4116-7

  • Online ISBN: 978-1-4471-4117-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics