You are on page 1of 3

“I donʼt necessarily trust my childcare”: Securing

Electronic & Physical Personal Information


Laurian Vega, Tom DeHart, Steve Harrison, Dennis Kafura
Center for Human Computer Interaction, Computer Science
2202 Kraft Drive
Virginia Tech, Blacksburg, VA
{Laurian, SRH, Kafura}@vt.edu, TDehart@gmail.com

There is a need in HCI to study how issues of trust and privacy There is prior work to understand how child and health care can
can and do affect the ad hoc negotiation of security rules and how be designed from a user perspective. The qualitative design work
they are managed by humans in actual practice. In this paper we of Kientz et al. [5] demonstrated the parent’s need to document a
present some initial studies, interviews and observations, to child’s milestones and relevant medical information. They found
examine the physical and electronic security practices of that design issues such as ‘providing a reliable information
childcares and medical offices. We show that the issues of human- source’ were central. Our work builds on this work in that we
mediated monitoring, information redundancy, and the creation of stress the collaborative nature of documenting information about
a community of trust all affect aspects of the human-side of children. In the broad realm of research on healthcare, the work of
security. Reddy and Dourish’s [9] demonstrates how practice can affect
information dissemination and communication in hospitals. In
1. PROBLEM & MOTIVATION their paper temporal rhythms are proposed to explain community
Traditionally, electronic and physical security was thought of as patterns in seeking, providing, and managing information. Our
rules, locks, and passwords. More recently, security research has work is in a similar information area and uses a similar method,
explored how security is part of a larger socio-technical system but our focus extends to how security is affected.
[7] that involves people working with technology and their
environments to create safe systems. When examining security as
3. METHOD
one part, or as a supporting mechanism, of a socio-technical Four studies were conducted using interviews and observations to
system, issues of trust, privacy, and negotiation start to appear. It explore security issues involved in the practice of collaborative
is our goal therefore to look at how these socio-technical factors sensitive information management. Basic dimensions of these
affect actual practice to provide insight into designing effective studies are in Table 1. The summer studies involved interviews
security measures. with the directors along with guided tours of their workplaces.
Four childcare directors were selected for the second study as the
We examine information rich environments that involve representatives of the strongest information practices (i.e. least
significant amounts of collaboration with sensitive information violations, clear information practices). These follow-up
documentation, access, and retrieval. The two domains that we interviews lasted approximately 45 minutes. Two to four
have explored are childcares, where both parents and childcares observation sessions lasting 2- 3 hours each were conducted
provide information about a child’s developmental and physical following the interviews. All interviews and observations were
progress, and small medical practices, where patients and medical transcribed.
staff provide information about the patient’s health. In this poster
we present the initial findings from interviews and observation All participants were from the southwest area of Virginia. This
studies in these domains. area is rural, yet technologically impacted by the proximity to the
University. Waitlists exist for the best childcares and medical
2. BACKGROUND practices. All directors were recruited through a comprehensive
A plethora of research is emerging to explore the human-side of Childcare Medical Parents
security. Bellotti and Sellen [1] created a design framework for Directors Personnel
looking at the security aspects of user feedback and control when
When 5/09 - 12/09 5/09 – 9/09 9/09 – 12/09
creating ubiquitous technologies. Similarly, the work of Flechais
et al. [4] demonstrated the difference between social and technical Number + Sum= 11F, 8W, 4M 18W, 3M
security measures. By their definitions, security measures are Gender 1M; Fall= 4W
progressive and adaptive yet are unreliable due to emotions and Method Interviews: 30 Interviews: 30 Interviews: 30
circumstances. Technical security, on the other hand, works well – 60 min; min min
on repetitive tasks, but is less flexible in unknown cases. In our Observation
studies we explore how security is affected by technical and social Location Place of work Place of work Place of
measures in order to provide insight to design. convenience
Dourish and Anderson [2] approach security from a social science
perspective to emphasize that security is a practical phenomenon Table 1. Dimensions of four studies by participant type,
and discursive practice. Dourish and Anderson’s work is similar when conducted, study, method, and location.
to ours in that it focuses on the idea of practice being central to
understanding how work really gets done securely [6].
list of all area businesses; the response rates were 55% for Community of Trust
childcares, and 26% for medical practices- not including the To balance the need for access to information with the need to
hospitals. Parents were recruited through listservs, flyers, and keep information secure, communities of trust were created within
company newsletters. The only incentives provided to participate the centers we studied. One aspect of security that we asked about
were offered to parents; parents were paid ten dollars. was the use of passwords. Computers, when used for accessing
Grounded theory was used for analysis. Grounded theory is a patient information, were generally in the director’s space, or the
method of evaluating ethnographic data through the use of codes doctor’s office. Of those medical centers that used electronic
by sorting findings into “themes”. Themes then inform the systems, only seven (29%) had individual passwords. When asked
research as data findings. (See [3] for a thorough explanation.) All why, a director said, “They can access anything. That’s their job.”
data from the studies were coded by at least two researchers. This statement emphasizes that to be able to do the work required
for the job, levels of security have to become normalized to
4. RESULTS function. Another example comes from the locking of physical
Human-Mediated Information Monitoring filing cabinets. It is the official policy that filing cabinets
The central nucleus of information being stored and managed containing files should be locked when the director is absent:
about a patient or a child is located in their file. The centers in our “[files are] all kept in here in a cabinet that's locked when I’m not
studies kept the files in expansive filing shelves, or in filing here and the door is locked as well.” The use of a key was,
cabinets. The location of the director’s office was either in the however, never observed.
same space as the files, or directly next to the files. Indeed, These examples are not work-around security practices. They are,
accessing, searching, and managing the files is a large part of the instead, examples of how communities establish and negotiate
role of the director. However, the role of director also extends to what needs to be made secure. It is a demonstration of contextual
mediating the access and use of the files by others in the center. integrity [8] playing its role in facilitating communities of people
In the case of childcares, there are instances when teachers or trusting one another in situ.
parents want to be able to look at a file. One director said, “When
a teacher comes in and wants access to a file they have to come
5. Discussion and Design Implications
through me first and they have to tell me their reason basically, Security and work practices are not in conflict with one another.
you know, why do you need to go in there?” This director is What our research has demonstrated is that practice is what is
explaining how she monitors access to the files in a method that is enacted after security rules are put in place. It is through creating
more than simply checking access rights to information. She is a community that values security, that the rules can be understood.
additionally checking the teacher’s goal, which extends into At this stage we are starting to develop the tentative design
managing information privacy. The director’s function is to implications for creating security solutions. The first involves
mediate the information seeker’s goal in a way that is flexible, understanding how a person-based and space-based hub of
negotiated, and determined in a case-by-case fashion to best information can still function as a secure place if and when files
balance the need for information for work with need to keep become electronic. Will people still work through the human-
information private. mediated monitoring of the files? It is our belief that one person
Information Redundancy as a Form of Security will still work close with the file system and allow people limited
temporary and decaying access. Access should be negotiated, as it
Beyond the physical file containing information about a child or is now, to still support community standards. The second design
patient, there is information kept in other locations. From a implication is that of reciprocity in knowing whom and when a
security perspective having only one instance to protect is the patient or child’s files are being accessed; if you can see my files,
simplest case. When information, however, becomes dispersed to I should at least be able to see your information. Additionally, as
better support individual practice, security becomes more difficult technology use grows electronic systems should not obfuscate the
to manage due to numerous access points. community standards so that the community of trust can continue
In both medical and child practices there were instances where to function.
information was outside the file. These include having a physical Overall, the major implication for our findings is that electronic
and an electronic file, having a file for billing and a file for and physical security should be flexible to represent the shifting
medical history, having files for one patient between two medical context of access and management of information.
centers, having information on hand in different spaces, and
having electronic copies stored in an off-site location. One 6. CONCLUSIONS & CONTRIBUTION
director explains duplicating information in multiple office Though our preliminary studies of child and health care practices
locations, “We fax patient information back and forth... That we have shown that there is a balance between needing to get
happens hundreds of times a day…. Always with the big work done with needing to keep information secure. Three themes
disclaimer this is medically protected information, and this is were explored to demonstrate how this balance is negotiated in
intended for so-and-so only.” She explains that someone then files practice to create functioning secure work places. We believe that
the appropriate information and the remainder is shredded. This our approach, while preliminary, offers valuable insight to
duplication of information functions to make sure that information furthering research on how understanding practice affects the
is ready at hand when necessary for work and ensures that if the design of secure systems.
information is lost it is reproducible. Understanding what
information is going to be kept in what space or form, and who 7. REFERENCES
has access to those instances is something that is determined by [1] Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous
the function of the information and also the context surrounding Computing Environments. in Proceedings of the Third
the information use. Conference on European Conference on Computer-
Supported Cooperative Work. 1993: Kluwer Academic Human factors in computing systems. 2007. San Jose,
Publishers. California, USA: ACM.
[2] Dourish, P. and K. Anderson, Collective Information [6] Lave, J. and E. Wenger, Situated Learning: Legitimate
Practice: Exploring Privacy and Security as Social and Peripheral Participation. 1991: Cambridge University Press.
Cultural Phenomena. Human-Computer Interaction, 2006. [7] Mamykina, L., E.D. Mynatt and D.R. Kaufman.
21(3): p. 319-342. Investigating health management practices of individuals
[3] Eisner, E.W., The Enlightened Eye: Qualitative Inquiry and with diabetes. in Proceedings of the SIGCHI conference on
the Enhancement of Educational Practice. 1997: Prentice Human Factors in computing systems. 2006. Montréal,
Hall. Québec, Canada: ACM.
[4] Flechais, I., J. Riegelsberger and M.A. Sasse. Divide and [8] Nissenbaum, H., Privacy as Contextual Integrity.
Conquer: The Role of Trust and Assurance in the Design of Washington Law Review, 2004. 79(1).
Secure Socio-Technical Systems. in Proceedings of the 2005 [9] Reddy, M. and P. Dourish. A Finger on the Pulse: Temporal
Workshop on New Security Paradigms. 2005. Lake Rhythms and Information Seeking in Medical Work. in
Arrowhead, California: ACM. Proceedings of the 2002 ACM Conference on Computer
[5] Kientz, J.A., R.I. Arriaga, M. Chetty, G.R. Hayes, J. Supported Cooperative Work. 2002. New Orleans,
Richardson, S.N. Patel, et al. Grow and know: understanding Louisiana, USA: ACM.
record-keeping needs for tracking the development of young [10]
children. in Proceedings of the SIGCHI conference on

You might also like