Abstract
Through this paper we make two contributions to social informatics: the interdisciplinary study of the design, development, uses and consequences of information and communication technologies that takes into account their interaction with institutional and cultural contexts. Our first contribution is to make a connection from social informatics to general principles of socio-technical theories. We do this to both connect social informatics scholarship more directly to the large and growing literature(s) that engage socio-technical theorizing and to advance these principles more directly through social informatics. Our second contribution to social informatics is to engage two contemporary theoretical approaches that draw on social informatics principles: socio-technical interaction networks and principles of social actors and apply them to current practice. We do so to demonstrate that these analytic approaches are the needed tools to help scholars and reflective professionals in practice engage social informatics analyses. By doing this we highlight the potential of social informatics while honouring Rob Kling’s legacy in helping to establish this transdiscipline.
Chapter PDF
References
Baird, Z., & Barksdale, J. (2003). Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force. Task Force on National Security in the Information Age Retrieved January 1, 2005, from http://www.markle.org/downloadable~assets/nstf~report2~fulI~report,pdf
Baskerville, R., & Myers, M. (2002). Information systems as a reference discipline. MIS Quarterly, 26(1), 1–23.
Bijker, W. E. (1995). Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change. Cambridge, MA: MIT Press.
Bureau of Justice Assistance. (2002). Mission Possible: Strong Governance Structures for the Integration of Justice Information Systems. Retrieved November 3, 2004. from http:Nwww.ncjrs.org/pdffiles1/bja~l92278.pdf.
Dunworth, T. (2000). Criminal Justice and the IT Revolution. Policies, Processes, and Decisions of the Criminal Justice System, 3, 371–426.
Dunworth, T. (2005). Information Technology and the Criminal Justice System: A Historical Review. In A. Pattavina (Ed.), Information Technology and the Criminal Justice System (pp. 1–28). Thousand Oaks, CA: Sage Publications, Inc.
Fleck, J. (1994). Learning by trying: the implementation of configurational technology. Research Policy, 23(6), 637–652.
General Accountability Office. (2003). Information Technology: FBI Needs an Enterprise Architecture to Guide Its Modernization Activities. Retrieved, from http:Nwww.gao.gov/new.items/dO3959.pdf.
Hoey, A. (1998). Techno-Cops: Information Technology and Law Enforcement, International Journal of Law and Information Technology, 6(1), 69–90.
Horton, K., Davenport, E., & Wood-Harper, T. (2005). Exploring sociotechnical interaction with Rob Kling: Five ‘big’ ideas. Information Technology & People, 18(1), 50–65.
Kitcher, P. (1982). Believing what we cannot prove. In P. Kitcher (Ed.), Abusing Science: The case against creationism (pp. 30–54). Cambridge, Mass.: MIT Press.
Kling, R. (1999). What is Social Informatics and Why Does it Matter? D-Lib Magazine Retrieved September 1, 2004, from http://www.dlib.orgldlib/january99/kling/01kling.html
Kling, R., McKim, G., & King, A. (2003). A Bit More to IT: Scholarly Communication Forums as Socio-Technical Interaction Networks. Journal of the American Society for Information Science and Technology, 54(1), 47–67.
Kling, R., Rosenbaum, H., & Sawyer, S. (2005a). Teaching Key Ideas of Social Informatics. In Understanding and Communicating Social Informatics: A Framework for Studying and Teaching the Human Contexts of Information and Communications Technologies (pp. 83–103). Medford, N.J.: Information Today Inc.
Kling, R., Rosenbaum, H., & Sawyer, S. (2005b). Understanding and Communicating Social Informatics: A Framework for Studying and Teaching the Human Contexts of Information and Communications Technologies. Medford, New Jersey: Information Today, Inc.
Lamb, R., & Kling, R. (2003). Reconceptualizing users as social actors in information systems research. MIS Quarterly, 27(2), 197–235.
Lamb, R., & Sawyer, S. (2005). On extending social informatics from a rich legacy of networks and conceptual resources. Information Technology & People, 18(1), 9–19.
Miles, M., & Huberman, A. (1984). Qualitative data analysis: a sourcebook of new methods. Newbury Park: Sage Publications.
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States: official government edition. Washington, D.C.: U.S. Government Printing Office.
Orlikowski, W. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations, Organization Science, 3(4), 380–398
Orlikowski, W., & Barley, S. (2001). Technology and institutions: What can research on information technology and research on organizations learn from each other? MIS Quarterly, 25(2), 145–164.
Orlikowski, W. J., & Baroudi, J. J. (1991). Studying Information Technology in Organizations: Research Approaches and Assumptions, Information Systems Research, 2(1), 1–19
Orlikowski, W. J., Yates, J., Okamura, K., & Fujimoto, M. (1995). Shaping electronic communication: The metastructuring of technology in the context of use. Organization Science, 6(4), 401–423.
Quintas, P. (1994). Programmed Innovation? Trajectories of Change in Software Development. Information Technology & People, 7, 25–47.
Sawyer, S., & Crowston, K. (2004). Information Systems in Organizations and Society: Speculating on the Next 25 Years of Research. In B. Kaplan, D. Truex, D. Wastell, A. Wood-Harper & J. DeGross (Eds.), lnformation systems research: relevant theory and informedpractice, (pp. 35–52) Boston: Kluwer Academic Publishers.
Sawyer, S., Tapia, A., Pesheck, L., & Davenport, J. (2004). Mobility and the First Responder. Communications of the ACM, 47(3), 62–66.
Scott, W. R. (2001). Institutions and organizations (2nd). Thousand Oaks, CA: Sage Publications.
Shelby, R. (2002). September I1 and the Imperative of Reform in the U.S. Intelligence Community: Additional Views ofSenator Richard C. Shelby Vice Chairman, Senate Select Committee on Intelligence. Retrieved November 1, 2004. from http://www.fas.org/irp/congress/2002_rpt/shelby.pdf.
Strickland, L. (2004). Analytic Myopia, Data Disintegration and Homeland Insecurity. Bulletin of the American Society for lnformation Science and Technology, 30(6), 7–21.
Suchman, L. (1987). Plans and situated actions: the problem of human-machine communication. Cambridge: Cambridge University Press.
Suchman, L. (2003). Figuring Service in Discourses of ICT: The Case of Software Agents. In E. Wynn, E. Whitley, M. Myers & J. DeGross (Eds.), Global and organizational discourse about information technology, (pp. 33–45). Boston: Kluwer Academic Publishers.
Winner, L. (1986). Do Artifacts Have Politics? In The Whale and the Reactor: A Search for Limits in an Age ofHigh Technology (pp. 19–39). Chicago: University of Chicago Press.
Wood-Harper, T., & Wood, B. (2005). Multiview as social informatics in action: past, present and future. Information Technology & People, 18(1), 21–26.
Ziman, J. M. (1968). What is Science? In J. M. Ziman (Ed.), Public Knowledge: An Essay Concerning the Social Dimension of Science (pp. 5–27). London: Cambridge University Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Sawyer, S., Tyworth, M. (2006). Social Informatics: Principles, Theory, and Practice. In: Berleur, J., Nurminen, M.I., Impagliazzo, J. (eds) Social Informatics: An Information Society for all? In Remembrance of Rob Kling. HCC 2006. IFIP International Federation for Information Processing, vol 223. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-37876-3_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-37876-3_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-37875-6
Online ISBN: 978-0-387-37876-3
eBook Packages: Computer ScienceComputer Science (R0)