Advertisement

Representing Human and Non-Human Stakeholders: On Speaking with Authority

Chapter
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 41)

Abstract

Information systems research is concerned with complex imbroglios of human and non-human components. As researchers, we need ways to represent the intricacies of the different stakeholders in such situations. Traditionally, it is assumed that representing the views of human stakeholders is relatively unproblematic, but that doing this for non-humans is far more complex. This paper addresses this assumption, drawing on the philosophy of science of Isabelle Stengers. It considers the case of the UK NHSnet project and focuses on two stakeholders in the project, one human (the patients) and one nonhuman (the encryption algorithm used to encode confidential patient data). As the case study shows, representing either stakeholder is equally problematic and the paper reflects on the implications of this for information systems research.

Keywords

Encryption Algorithm Trusted Third Party Information System Research British Medical Association Security Consultant 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P. G., Rivest, R. L., Schiller, J. I., and Schneier, B. The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption, 1998 (http://www.cdt.org/crypto/risks98; accessed October 17, 1999 ).Google Scholar
  2. Anderson, R. J. “Patient Confidentiality at Risk from NHS-wide Networking,” in Current Perspectives in Healthcare Computing Conference, B Richards (ed.). Harrogate: BJHC Limited, 1996, pp. 687–692.Google Scholar
  3. Barber, B. “Patient Data and Security: An Overview,” International Journal of Medical Informatics (40), 1998a, pp. 19–30.Google Scholar
  4. Barber, B. “Towards a Measure of Privacy,” British Journal of Healthcare Computing and Information Management (15: 1 ), 1998b, pp. 23–26.Google Scholar
  5. Barber, B., and Skerman, P. “What Are Your Security Standards?” British Journal of Healthcare Computing and Information Management (13:6), 1996, pp. 34–35.Google Scholar
  6. Barnes, B., Bloor, D., and Henry, J. Scientific Knowledge: A Sociological Analysis. London: Athlone, 1996.Google Scholar
  7. Beynon-Davies, P. “Information Systems failure”: The Case of the London Ambulance Service’s Computer Aided Despatch Project,“ European Journal of Information Systems (4: 3 ), 1995, pp. 171–184.Google Scholar
  8. Bijker, W. E., Hughes, T. P., and Pinch, T. (eds.). The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. Cambridge, MA: The MIT Press, 1987.Google Scholar
  9. Bloomfield, B. P., and Vurdubakis, T. “Boundary Disputes: Negotiating the Boundary between the Technical and the Social in the Development of IT Systems,” Information Technology & People (7:1), 1994, pp. 9–24.Google Scholar
  10. Bywater, M., and Wilkins, C. “Mystic Megabytes,” British Journal of Healthcare Computing and Information Management (13:2), 1996, pp. 10–11.Google Scholar
  11. Callon, M. (ed.). The Laws of the Markets. Oxford: Blackwell, 1998.Google Scholar
  12. Clark, L. “NAO Report: A Surgical Strike on NHS IT Projects,” Computer Weekly News, 6 May 1999.Google Scholar
  13. Collins, H., and Yearley, S. “Epistemological Chicken,” in Science as Practice and Culture, Andrew Pickering (ed.). Chicago: University of Chicago Press, 1992a, pp. 301–326.Google Scholar
  14. Collins, H., and Yearley, S. “Journeys into Space,” in Science as Practice and Culture, Andrew Pickering (ed.). Chicago: University of Chicago Press, 1992b, 369–389.Google Scholar
  15. Collins, H. M., and Pinch, T. The Golem: What Everyone Should Know About Science. Cambridge: Cambridge University Press, 1993.Google Scholar
  16. Computer Weekly News. “Executive Must Woo Doctors,” 18 March 1999a.Google Scholar
  17. Computer Weekly News. “Hospital Staff Boycott NHSnet Over Poor Performance,” 15 April 1999b.Google Scholar
  18. Computer Weekly News. “Opinion: NHSnet Scheme Suffered from Fatal Flaws,” 18 March 1999c. Davies, S. “Dystopia on the Health Superhighway,” The Information Society (12), 1996, pp. 8993.Google Scholar
  19. Grint, K., and Woolgar, S. The Machine at Work: Technology, Work and Organization. Cambridge, England: Polity Press, 1997.Google Scholar
  20. Hayes, N., and Walsham, G. “Safe Enclaves, Political Enclaves and Knowledge Working,” paperGoogle Scholar
  21. delivered at the conference on Critical Management Studies, Manchester, 1999.Google Scholar
  22. Introna, L., and Pouloudi, A. “Privacy in the Information Age: Stakeholders, Interests andGoogle Scholar
  23. Values,“ Journal of Business Ethics (22:1), 1999, pp. 27–38.Google Scholar
  24. Kaihara, S. “Realization of the Computerized Medical Record: Relevance and UnsolvedGoogle Scholar
  25. Problems,“ International Journal of Medical Informatics (49), 1998, pp. 1–8.Google Scholar
  26. Latour, B. “On Actor-network Theory: A Few Clarifications,” Centre for Social Theory andGoogle Scholar
  27. Technology, Keele University, United Kingdom, 1997.Google Scholar
  28. Latour, B. “On Recalling ANT,” in Actor Network and After, J. Law and J. Hassard (eds.). Oxford: Blackwell, 1998, pp. 15–25.Google Scholar
  29. Latour, B. Pandora’s Hope: Essays on the Reality of Science Studies. Cambridge, MA: Harvard University Press, 1999.Google Scholar
  30. Law, J. “After ANT: Complexity, Naming and Topology,” in Actor Network and After, J. Law and J. (eds.). Oxford: Blackwell, 1998, 1–14.Google Scholar
  31. MacKenzie, D., and Wajcman, J. “Introductory Essay and General Issues,” in The Social Shaping ofTechnology, D. Mackenzie and J. Wajcman (eds.). Buckingham, England: Open University Press, 1999a, 3–27.Google Scholar
  32. MacKenzie, D., and Wajcman, J. (eds.). The Social Shaping of Technology. Buckingham, England: Open University Press, 1999b.Google Scholar
  33. McCafferty, C. “Securing the NHSnet,”British Journal of Healthcare Computing and Information Management (13: 8 ), 1996, pp. 24–26.Google Scholar
  34. NHS Executive. A Strategy for NHS-wide Networking. No E5155, Information Management Group, 1994a.Google Scholar
  35. NHS Executive. This is the IMG: A Guide to the Information Management Group of the NHS Executive. No. B2126, Information Management Group, 1994b.Google Scholar
  36. NHS Executive. NHS-wide Networking: Application Requirements Specification. No. 148003, Information Management Group, 1995.Google Scholar
  37. NHS Executive. The Use of Encryption and Related Services with the the NHSnet: A Report for Google Scholar
  38. the NHS Executive by Zergo Limited. No. E5254, Information Management Group, 1996. NHS Executive. IMG: Programmes and Project Summaries. No. B2232, InformationGoogle Scholar
  39. Management Group, 1998a.Google Scholar
  40. NHS Executive. Information for Health-Executive Summary. No. A1104, Information Management Group, 1998b.Google Scholar
  41. Pouloudi, A., and Whitley, E. A. “Stakeholder Analysis as a Longitudinal Approach to Interorganizational Systems Analysis,” paper delivered at the Fourth European Conference on Information Systems, Lisbon, Portugal, 1996.Google Scholar
  42. Stengers, I. Power and Invention: Situating Science. Minneapolis: University of Minnesota Press, 1997.Google Scholar
  43. Turner, R. “The Caldicott Committee Reports,” British Journal of Healthcare Computing and Information Management (15:1), 1998, pp. 23–26.Google Scholar
  44. Walsham, G. “Actor-Network Theory and IS Research: Current Status and Future Prosjects,” in Information Systems and Qualitative Research, A. S. Lee, J. Liebenau, and J. I. DeGross (eds.). London: Chapman & Hall, 1997, pp. 466–480.CrossRefGoogle Scholar
  45. Whitley, E. A. “Understanding Participation in Entrepreneurial Organizations: Some Hermeneutic Readings,” Journal of Information Technology (14: 2 ), 1999, pp. 193–202.Google Scholar
  46. Willcox, D. “Health Scare,” Computing, October 19, 1995, pp. 28–29.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2000

Authors and Affiliations

  1. 1.Brunel UniversityUK
  2. 2.London School of Economics and Political ScienceUK

Personalised recommendations