Skip to main content

Social Connectivity

  • Chapter
  • First Online:
Emerging Technological Risk

Abstract

Social accounts of technological artefacts and their adoptions by communities of practice highlight the mechanisms of shaping technology. On one hand, looking at classifications and information systems explain how communities of practice identify themselves with adopted technological artefacts. On the other hand, people shape technological artefacts and drive technology evolution , hence technology innovation . However, it is therefore necessary to unveil the mechanisms that make us behave not only just as individuals, but also as societies. Technology has a pivotal role in connecting individuals. It is necessary to move the analysis from the micro, i.e. understanding how individuals or social actors behave with respect to technology, to the macro, i.e. understanding how societies or social groups behave with respect to technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The SHEL model has been adopted in various domains though originally drawn from Avionics and Air Traffic Control (ATC) . The guidelines in [6], for instance, take it as a fundamental conceptual model of human factors . The SHEL model defines any (electronic mediated) productive process performed by a combination of hardware (e.g. any material tool used in the process execution), software (e.g. procedures, rules, practices) and liveware (e.g. end-users, managers) resources embedded in a given environment (e.g. socio-cultural, political). Hence, any productive process may be regarded as an instantiation of the SHEL model for a specific process execution. The SHEL model emphasises that any productive process relies on the different resources, distributed cognition and resource-based modelling. These different aspects of socio-technical systems can be linked together in a sound way [31] . Cognition models, moreover, allow the analysis of dangerous conditions or technology interactions [3] . For instance, simple models representing human understandings with respect to socio-technical systems have stimulated the use of mechanised verification methods in order to identify “automation surprises” [27] . The results encourage further investigations of the use of mechanised tools in order to identify inconsistencies into the design of technology interactions.

References

  1. Anderson R (2001) Why information security is hard—an economic perspective. In: Proceedings of the 17th annual computer security applications conference, ACSAC 2001. IEEE Computer Society, pp 358–365. doi:10.1109/ACSAC.2001.991552

  2. Anderson R, Moore T (2007) The economics of information security: A survey and open questions. In: Proceedings of the fourth bi-annual conference on the economics of the software and internet industries

    Google Scholar 

  3. Besnard D, Greathead D, Baxter G (2004) When mental models go wrong: co-occurrences in dynamic, critical systems. Int J Hum Comput Stud 60(1):117–128. doi:10.1016/j.ijhcs.2003.09.001

    Google Scholar 

  4. Bowker GC, Star SL (1998) Building information infrastructures for social worlds—the role of classifications and standards. In: Ishida T (ed) Community computing and support systems, no. 1519 in LNCS. Springer, Berlin, pp 231–248. doi:10.1007/3-540-49247-X_16

  5. Bowker GC, Star SL (1999) Sorting things out: classification and its consequences. The MIT Press, Cambridge

    Google Scholar 

  6. CAA (2002) CAP 719—Fundamental human factor concepts. Civil Aviation Authority

    Google Scholar 

  7. Churchill EF, Halverson CA (2005) Social networks and social networking: guest editors’ introduction. IEEE Internet Comput 9(5):14–19. doi:10.1109/MIC.2005.103

    Google Scholar 

  8. Douglas M, Wildavsky A (1982) Risk and culture: an essay on the selection of technological and environmental dangers. University of California Press, Berkeley

    Google Scholar 

  9. Gigerenzer G, Todd PM, TheABC Research Group (1999) Simple heuristics that make us smart. Oxford University Press, New York

    Google Scholar 

  10. Halverson CA (2002) Activity theory and distributed cognition: or what does CSCW need to DO with theories? Comput Support Coop Work 11(1–2):243–267. doi:10.1023/A:1015298005381

  11. Kaptelinin V, Nardi BA (2006) Acting with technology: activity theory and interaction design. The MIT Press, Cambridge

    Google Scholar 

  12. Klein HK, Kleinman DL (2002) The social construction of technology: structural considerations. Sci Technol Hum Values 27(1):28–52. doi:10.1177/016224390202700102

    Google Scholar 

  13. Küster Filipe J, Felici M, Anderson S (2003) Timed knowledge-based modelling and analysis: on the dependability of socio-technical systems. In: Proceedings of HAAMAHA 2003, 8th international conference on human aspects of advanced manufacturing: agility & hybrid automation, pp 321–328

    Google Scholar 

  14. Latour B (2003) Is re-modernization occurring—and if so, how to prove it? A commentary on Ulrich Beck. Theory Cult Soc 20(2):35–48. doi:10.1177/0263276403020002002

  15. Licoppe C, Smoreda Z (2005) Are social networks technologically embedded? How networks are changing today with changes in communication technology. Soc Netw 27(4):317–335. doi:10.1016/j.socnet.2004.11.001

    Google Scholar 

  16. MacKenzie D (2001) Physics and finance: S-terms and modern finance as a topic for science studies. Sci Technol Hum Values 26(2):115–144. doi:10.1177/016224390102600201

  17. MacKenzie D (2003) An equation and its worlds: bricolage, exemplars, disunity and performativity in financial economics. Soc Stud Sci 33(6):831–868. doi:10.1177/0306312703336002

    Google Scholar 

  18. MacKenzie D (2003) Long-term capital management and the sociology of arbitrage. Econ Soc 32(3):349–380. doi:10.1080/03085140303130

    Google Scholar 

  19. MacKenzie D (2004) The big, bad wolf and the rational market: portfolio insurance, the 1987 crash and the performativity of economics. Econ Soc 33(3):303–334. doi:10.1080/0308514042000225680

  20. MacKenzie D (2004) Social connectivities in global financial markets. Environ Plan D Soc Space 22(1):83–101. doi:10.1068/d317t

  21. MacKenzie D (2006) An engine, not a camera: how financial models shape markets inside technology. The MIT Press, Cambridge

    Google Scholar 

  22. MacKenzie, D, Wajcman, J (eds) (1999) The social shaping of technology. 2nd edn. Open University Press, Philadelphia

    Google Scholar 

  23. MacKenzie D, Millo Y (2003) Constructing a market, performing theory: the historical sociology of a financial derivatives exchange. Am J Sociol 109(1):107–145. doi:10.1086/374404

    Google Scholar 

  24. Nardi BA, Whittaker S, Schwarz H (2002) NetWORKers and their activity in intensional networks. Comput Support Coop Work 11(1–2):205–242. doi:10.1023/A:1015241914483

    Google Scholar 

  25. Neumann PG (1995) Computer related risks. The ACM Press, New York

    Google Scholar 

  26. Norman DA (1993) Things that make us smart: defining human attributes in the age of the machine. Perseus Books, Cambridge

    Google Scholar 

  27. Rushby J (2002) Using model checking to help discover mode confusions and other automation surprises. Reliab Eng Syst Saf 75(2):167–177. doi:10.1016/S0951-8320(01)00092-8

  28. Storey N (1996) Safety-critical computer systems. Addison-Wesley, Harlow

    Google Scholar 

  29. Strum S, Latour B (1987) The meanings of social: from baboons to humans. Inf Sci Soc 26:783–802

    Article  Google Scholar 

  30. Williams R, Stewart J, Slack R (2005) Social learning in technological innovation: experimenting with information and communication technologies. Edward Elgar, England

    Google Scholar 

  31. Wright PC, Fields RE, Harrison MD (2000) Analyzing human–computer interaction as distributed cognition: the resource model. Hum Comput Interact 15(1):1–41. doi:10.1207/S15327051HCI1501_01

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Felici .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Limited

About this chapter

Cite this chapter

Anderson, S., Felici, M. (2012). Social Connectivity . In: Emerging Technological Risk. Springer, London. https://doi.org/10.1007/978-1-4471-2143-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2143-5_4

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2142-8

  • Online ISBN: 978-1-4471-2143-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics