Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Securing Sensitive Information in Work Practice

Laurian Vega, Stacy Branham, Steve Harrison, Dennis Kafura


Center for Human Computer Interaction, Computer Science2202 Kraft DriveVirginia Tech, Blacksburg, VA
{Laurian, SBranham, SRH, Kafura}@vt.edu

ABSTRACT down or are not clearly defined [24] and hence require mediation.
There is a need in HCI to study how issues of trust and privacy The work presented here not only addresses the need for more
can and do affect the ad hoc negotiation of security rules and how practice-based study, but also explores these three human-centric
they are managed by humans in actual practice. In this paper we themes of security practice.
present a field study of security and privacy through the use of This work looks at security-in-practice by engaging in
interviews and observations that examine the physical and environments that are rich in sensitive information that is
electronic security practices of childcares and medical offices. We managed through significant amounts of collaborative
show that the issues of human-mediated access management, documentation, access, and retrieval. The two domains we have
information duplications, and the creation of a community of trust explored are the childcare domain––where both parents and
all affect aspects of the human-side of security. childcare personnel document information about a child’s
developmental and physical progress––and the medical domain––
Categories and Subject Descriptors where patients and medical staff document information about the
K.4.3 [Computers and Society]: Organizational Impacts – patient’s health. The study of these is becoming ever more
Computer supported collaborative work; H.3.1 [Information necessary as we strive to design secure and usable systems for
Systems]: Information Storage and Retrieval; H.2.1 [Information childcares and medical practices that are increasingly adopting
Systems]: Human Factors. digital documentation systems [20].
General Terms In this paper we present an ethnographically-informed analysis of
Experimentation, Security, Human Factors social and technical mechanisms that are used to manage sensitive
personal information. Through the use of field studies that probe
Keywords issues of trust, privacy, and negotiation in security practice, we
Security, CSCW, Shared documentation, Privacy, Trust, Work present three factors that critically impact security mechanisms:
practice human-mediated access management, information duplication,
and a community of trust. These three factors are tightly coupled
1. INTRODUCTION and used to co-produce a holistic understanding of security in the
Traditionally, electronic and physical security has been concerned practice of managing sensitive personal information. A final
with creating rules, locks, and passwords. However, security contribution presented in this paper is a set of design implications
systems that neglect people as a significant part of the equation for the three factors.
“are seldom secure in practice” [8]. Practice is what happens in
the moment; it is the activity; it is what is actually done. It is often 2. BACKGROUND
in the human-centered moment, and not in the computer-centered Prior work has explored several different aspects of the usable
planning stages, when security policies or mechanisms break security problem. For example, there has been a large body of
down and the safety of sensitive information is compromised) [2, research and development of technologies that support educating
4, 14]. When a breakdown occurs in a social system (as opposed and informing the user. The work of Ackerman [1] has suggested
to a computational one), workers do not stop what they are doing. the use of privacy labels so that users can be notified of possible
Instead, they create special cases or methods that allow them to data capture, use, and reuse as they interact with web-based
continue by bending formal work policies, e.g. when users create technologies. Another example is the work of Cranor et al. called
write passwords on post-it notes, or shout them across the room, Privacy Bird [11]. Privacy Bird reads the P3P information in a
as observed in this work [2, 4, 14]. As a result, there exists a need website and then displays a visual indicator of how closely the
to study and understand the holistic practice of how security is privacy standards for that website match personal settings (e.g.,
managed in socio-technical systems [13]. green indicator means a good match). Our work examines the a
different aspect of usable security; we examine current practices
Prior research has examined how plans, work, and documentation as a method to inform future technology design.
are mediated by artifacts [5, 21], how models and frameworks can
be used to design for privacy [30], and the effects of deploying Bellotti and Sellen [8] present a design framework for
technology probes aimed at exploring security and privacy [10]. understanding privacy and security needs through the aspects of
However, the study of how current work practices maintain and user feedback and control when creating ubiquitous technologies.
secure sensitive information has been underrepresented in the Similarly, the work of Flechais et al. [16] demonstrated the
larger area of security [4]. When socio-technical concerns are difference between social and technical security measures. By
considered, human issues of trust [16], privacy [3, 8], and their definitions, human-based security measures are progressive
negotiation [13] emerge: trust, because people often share and adaptive yet are unreliable due to the effects of emotions and
sensitive information toward attaining mutual professional goals; circumstances. Technical security, on the other hand, works well
privacy, because people are working with sensitive information; on repetitive tasks, but is less capable of being flexible in
and, negotiation, because the rules or standards of practice break unanticipated situations. These studies emphasize the importance
of understanding the context of the user to provide adaptive instead of standardized surveys were used to generate rich
security needs. In our studies we explore how security is affected responses in regards to aspects of their work and practice that may
by both technical and social measures. We do this to provide a affect the security of information. Qualitative studies, such as
holistic conception of security in socio-technical systems that interviews and observations are critical as initial investigation
accounts for both trust, privacy, and negotiation with respect to mechanisms because they account for the reasons and motivations
social and technical security mechanisms. that may go unreported on surveys. Also, a study of practice is
There has been a dearth of research examining the day-to-day critical dependent on an undestanding of nuances in context-
practices of childcares and their relation to information security. dependent behavior. Qualitative methods are indispensable in
However, the work of Kientz et al. has explored how to design a capturing and properly analyzing such practice-oriented
technological solution for information that is stored and managed situations.
about children [22, 23]. This work started as a qualitative inquiry All directors were recruited through a comprehensive list of all
that examined how a network of caregivers managed the record- area providers; the response rates were 55% for childcares, and
keeping process. One important finding from the study was that 26% for medical practices- not including the local hospitals.
doctors were the most trusted source of information about a Parents were recruited through listservs, flyers, and company
child’s development. This is a key finding to understand the newsletters. The only incentives provided to participate were
conceptions that parents have about authoritative information, offered to parents; parents were paid ten dollars.
thus impacting what is shared and documented about their child. All participants were from the Southwest area of Virginia. This
The second related finding is that parents had concerns about the area is rural, yet technologically impacted by the proximity to the
privacy of information managed by secondary caregivers, like University. Waitlists exist for the best childcares and medical
childcares or nannies. While this work embodies some of the practices. The number of children being managed in the
same user needs as our own study (i.e., mass amounts of participating childcares was 26 to 200 (sd = 63.7) with children
information, data recording, etc.), it does not focus on the security ranging in age from six weeks to sixth grade. The staff size at
and privacy of practice. Additionally, Kientz’s work focuses on these facilities ranged from 9 to 45 (sd = 10.3). The average
how parents manage the documentation. Instead, we are focusing number of years of experience as a childcare director the
on how childcares co-manage documentation with parents and participants had was 12.6. The medical practices varied in size
other secondary care givers. from 2 to 50 individuals with the average staff size being 13,
There has been extensive research on security and privacy in including doctors and administrators. One participant was a
medical settings. Prior work has examined the security of private practicing chiropractor and owner of nine practices in Southwest
information [2], how documentation and articulation work Virginia; staff size (37) and patients served weekly (2000) reflects
supports collaboration in a medical setting [9], how to manage the the entire nine location as well as the staff of the corporate
mobility of medical collaboration [6], and the use and creation of location. Another participant was a doctor at a local surgical
multiple surfaces to help collaboration and management – with a center and also the chief doctor of the location with administrative
specific focus on supporting work practice [7]. The work of responsibilities. He reported personally seeing forty patients and
Reddy and Dourish [27] is representative of how practice and employing fifty individuals, but was unable to recall how many
context can affect information dissemination and communication patients were seen at the center. Apart from these two cases, the
in hospitals – specifically, intensive care units. In their paper approximate number of patients seen weekly ranged from 55 to
temporal rhythms are proposed to explain community patterns that 400, with an average of 121.8.
healthcare workers follow in seeking, providing, and managing
information. Our work, instead, focuses on the inextricable
relationship between social and technical mechanisms that are Childcare Medical Parents
used in the medical work practice to negotiate ad hoc security and Directors Office
privacy needs. Directors +
Doctors
3. METHOD When Summer + Summer 2009 Fall 2009
Four studies were conducted using interviews and observations to Fall 2009
triangulate findings and explore security issues involved in the
practice of collaborative sensitive information management. Basic Number + Summer = 11 9 women, 4 18 women, 3
dimensions of these studies can be seen in Table 1. In total, we Gender women, 1 men men
interviewed 46 participants, and conducted 14 observations. The man; Fall = 4
studies involved interviews with the directors from childcares and women
medical practices within their work place with guided tours. Four Method Interviews: Interviews: Interviews: 30
childcare directors were then selected for the second set of studies 30 – 60 30 minutes minutes
as the representatives of the strongest information practices (i.e. minutes;
least Department of Social Services violations, clear practices on Observation
how information is managed and regulated). Childcare directors
participated in interviews that lasted approximately 45 minutes. Location Place of Place of work Place of
Two to four observation sessions lasting 2- 3 hours each were work convenience
then conducted following the interviews. Twenty-one parents (eg, coffee
participated in 30-minute interviews in regard to their beliefs shop)
about sensitive private information management. All interviews Table 1. Dimensions of four studies by participant type.
and observations were audio recorded and transcribed. Interviews
Grounded theory was used to analyze the body of data. Grounded In probing this topic we asked both directors and parents about
theory is a method of evaluating ethnographic data through the who they believed to be the owner of the information. The
use of codes by sorting groups of findings into “themes.” These responses indicate a range of beliefs. For example, one medical
themes then inform the research as a type of data finding. (See director explained how both parties have ownership, “the
[15] for a thorough explanation.) All data from the studies were information in a file belongs to a patient, but the file itself belongs
coded by at least two researchers for an agreed set of codes. The to the doctor… So people think when they get an Xray they’ve
codes from the first study were co-created prior to coding, and bought an X-ray but no, the information on the X-ray belongs to
then individual coders evaluated all materials. Future studies built the patient but the actual film itself belongs to the doctor.”
upon the prior set of codes with phases of training, establishing Alternatively, other medical directors emphasized that they would
new agreed upon codes, and then coding the new body of data. not provide the patient access to their file. Instead, they will make
(See [29] for more detail on the coding process.) copies of anything for which the patient knows to ask. One
medical center director explains “... but if they want a copy I’d
4. ASPECTS OF SECURITY IN PRACTICE give them a copy. Whatever they want. It’s their records.” The
In this section we discuss themes that provide insight into how idea of only copying part of the file was reflected in the comments
security is managed in real practice within information rich of another medical director who said, “No, we don’t give them the
environments. All themes highlight the overarching tension whole file. There’s a limit to a one page thing, but it’s basically
between needing to keep information secure and private with the treatment that we’ve done.” These quotes reflect individual
need to access information to work in an effective manner. conflicting concepts of ownership beliefs then affecting access to
In this paper we use the term ‘director’ to refer to both childcare personal sensitive information.
and medical directors and ‘center’ to refer to both childcare Childcares had similar issues of ownership in regards to the
centers and medical practices. We also use the term ‘client’ to child’s file. A primary difference is that most childcare centers
refer to parents, children, and patients. would talk about parents entering the directors office, reading the
file, and making copies of pertinent information (11/12
4.1 Human-Mediated Access Management participants). This type of open discussion may be more common
The central nucleus of information being stored and managed in childcares where open discussion about a child’s progress can
about a patient or a child is located in their file. The centers in our be encouraged. However, while this practice appears to be one of
studies kept the files in expansive filing shelves, like those in open access to the child’s own personal information, the fact that
medical practice shown in Figure 1, or in filing cabinets. The the director is present while the parent examines the file and its
location of these files is of particular importance. The files can contents emphasizes that access to one’s own information is still a
appear to be the central part of the director’s workspace. Indeed, mediated process.
accessing, searching, and managing the files is a larger part of the
role of the director. However, the role of director also extends to When asking about what information a client might not be able to
mediating the access and use of the files by others in the center. see in the file, directors generally said that the patient could see
We found three factors that affected how access to a file was anything. However, there were three medical directors and one
mediated: (1) ownership, (2) place-based norms, and (3) role- childcare director who said that the patient or parent could not
based monitoring. have access to the file. The reason cited by one of the participants
was that the patient would not understand the annotations. The
4.1.1 Ownership three remaining participants reported that the centers keep
One theme that impacted access and monitoring of the information about the client that they would not want them to see.
information in a file was the director’s mental schemas about the For example, one director said, “We have a website they can look
ownership of the information in the file. The information in the at. We don't usually let them see the files because it has notes
file is intrinsically personal and sensitive; it is information about possibly even about them and things like that.” Two additional
the patient or the child. At the same time the information is
produced by the center: documented on the center’s forms,
annotated by staff, and used regularly by the center. Individual
conceptions of who owns the file or other instantiations of the
personal information could hypothetically affect the management
of its privacy. This is especially true given the lack of an over-
arching US government regulation specifying rules about who
owns this information. Even the HIPAA Privacy Rule, which is a
U.S. Government regulation that enforces certain privacy and
security laws, does not explicitly cover ownership of the
information. The concept of ownership can impact the practice of
sensitive information management. For instance, if the director
believes that their job is to steward the personal information that
belongs to the client, the director is more likely to enforce stricter
security policies. In contrast, if the director believes that the
personal information is their property, they are more likely to be
liberal with sharing that information (regardless of what the client
desires) as long as the behavior is compliant with government
Figure 1. The office of a medical director with one wall of
regulations and professional norms.
patients’ files. Files are color coded by name and by date of
last session.
participants mentioned that they might take notes on sticky pads The director is expressing the fact that HIPAA regulations are not
and temporarily attach sensitive information to a file and remove only restrictive, in some cases, but that external policies are
it later. One participant said that she keeps a separate file of affecting how he manages the disclosure of personal information
highly sensitive information that she would not allow access to in different locations; he is respecting the contextual integrity of
about particular children (i.e., detailing abuse information): “it's the place [25]. The implication for what he is explaining is that
not that we're hiding it necessarily, but we're just not making it different locations afford different disclosure policies. Expanding
100% visible, if that makes sense.” These four directors represent the participant’s example, when talking to a room full of patients
the side of the ownership spectrum where they have a sense of he feels it is appropriate to say the client’s name, but not her
owning the information; the file is a collection of their annotations diagnosis. This is important when considering the impact of the
and notes about the patient, not the client’s information. physical context and privacy policy management.
Parents also displayed shifting ideas about the ownership of a In both childcares and medical practices we found that the office
child’s files. One third of the participants believed that they were of the director functioned as a highly distinctive place with
owners of the files, where as another one third believed that the particular implications for privacy and security. The client’s
childcare was the owner of the file. The remaining participants physical files were usually located surrounding the desk of the
had complex ideas about ownership. For example, two parents director, as shown in Figure 1, or were directly behind the desk of
believed that they owned the information, but that the childcare the director. The director in the office then worked to mediated
owned the physical file. Another two participants initially access to the files. There were subtle cues that indicated the
responded that the childcare owned the file, but then after a couple importance of the placement of these files. For example, the
of minutes retuned to the topic and said that they were the owners location of the furniture and computers was used to indicate that
of the files. Perhaps most relevant in the parents responses is that access was inhibited – similar to what was described in [12].
all (21/21) participants reflected that they had not spent time Other workers, when needing information or wanting to ask the
thinking about this question. Unlike the director, who had explicit director a question would stand in the doorway to pass on their
policies regulating access, parents expressed a lack of knowledge request. After explaining their purpose the director would then
about even what was in their child’s file. After discussion of this encourage them into the room. For example, in just one observed
question all participants reflected that the process of their child’s three-hour session this behavior was noted four separate times.
information management was not transparent. One medical director also explained that she used a screen saver
to hide sensitive personal information when she was away from
4.1.2 Place-based Norms her desk to protect against accidental disclosure through passing
The physical environment of the workplaces in the centers personnel.
impacted the security practices. As Harrison and Dourish explain
in their work on place and space [18], the meaning that is ascribed During our observations of the childcare centers, we were able to
to a physical location, or space, denotes communal norms and examine more nuanced forms of place-based norms that impacted
understanding, or place. We found that where sensitive personal the management of sensitive personal information embedded in
information was physically located impacted how it was access the environment. For example, one medical director tucked highly
and managed by the centers. Specifically, we found information sensitive personal information towards the back of a file so that it
was mindfully placed in different forms and in different spaces to was less likely to be seen unless explicitly the target of a search
restrict access and enforce privacy policies. by someone who knew to look for it. This is a place-based
instantiation of security through obscurity. Another childcare
In medical practices, many of the rules related to privacy concerns director used the corner of her desk as a place where semi-
are stipulated by and enforced through the HIPAA Act. However, sensitive information was kept. This location denoted that the
how particular medical practices put the HIPAA Act’s policies place was one of communicating information with particular
into practice varied by office. One example of this variation is in people and about particular types of information. For example, a
the form taken by the physical files would take. For instance, one black box of emergency contact information about children was
medical practice kept a physical file of the patient’s health stored there. These instances of the use of place to demark privacy
information separate from both the electronic and physical policies are ones of social norm negotiation and management.
versions of the billing information. The director believed that
keeping health and billing information in different physical 4.1.3 Role-based Monitoring
locations helped keep the patient’s information private (“Due to The role of the director was found to mediate the information
the HIPAA thing, you know, you’re not allowed to keep patient’s seeker’s goal in a way that is flexible, negotiated, and determined
financial information there in their chart.”) in a case-by-case fashion. This allowed the director to best
Another medical director talked about how he discloses sensitive balance the need for information to conduct work with the need to
personal information to a patient in different physical locations, preserve privacy. The role of the director made her a central judge
but how the application of HIPAA appears to be overly restrictive: for not only information access, but also a mediator for
establishing and adjusting the explicit and implicit social norms of
HIPAA as I understand it was developed to protect information that is how the center manages sensitive private information. This is
sent over the internet… Now HIPAA in my opinion, and I don’t mind if
similar to the concepts addressed in the work of Harper et al. that
this is recorded, I think it’s a stupid thing… I wouldn’t go out in the
waiting room and say, you know, “hey Ms. Jones your syphilis test is addressed workplace concerns regarding the collection of
negative,” so to me it’s an ethical thing and not a legal issue… now my location-based information [17].
understanding of HIPAA interpretations, you’re not even allowed to In medical practices, participants made specific references to how
say the patient’s name in the office. But what a load of crap, all that. If it was their job to modify or limit the amount of sensitive
I got an 80-year-old lady, she wants a hug. I’m not gonna ignore her,
you know, “205, you’re up!” That’s just, that’s a little ridiculous.
information that was to be shared with the following people and
secondary parties (7 out of 13 participants): patients and their
family members, insurance companies, pharmacies, other staff 4.2 Information Duplication
members, referring doctors, other doctors in the practice, and Information was duplicated in the working environments of
hospitals. When information needed to be shared, the directors childcares and medical practices. From a security perspective
made reference to having their patient’s sign medical waivers to having only one instance to protect is the simplest case. When
protect their practice. In probing this issue further, we found that information, however, becomes dispersed to better support
medical directors did not want to “usually get involved in that.” individual practice, security is traditionally conceived as
They liked the information on their forms for their purposes. becoming more difficult to manage due to numerous access
Passing information on was considered to be “their problem” – as points. Given the large amount of duplication of sensitive personal
one childcare director said. information, we investigated the purposes and methods of
Directing and managing sensitive information flow was only one managing multiple copies. We found that duplication of
part of the role of director. Directors also spent time auditing information was supported through different privacy and security
sensitive information management. One medical director mechanisms in two senses: (1) information was redundantly
mentioned that she even had a method of validating any duplicated so that if it went missing in one location is would still
information that was placed in the electronic filing system to be available to the workplace as a whole, and (2) information was
monitor and verify that it was correct. She validated because she replicated so that it would be on hand for impromptu activity.
wanted to make sure that the information was correct given that it
was associated with her login information: “most of the time I’m
4.2.1 Information Redundancy
Eleven out of thirteen of the medical centers used electronic
logged-in in the front because I’m the only one up there, but
record systems; only one childcare center used an electronic
occasionally someone else will come up and they’ll just do it, and
record system. All participants used computers in some fashion
I usually check to make sure just because it is on my login.” This
(i.e. submitting for insurance payments or word processing tasks)
statement emphasizes that not only does she see her job
All directors also keep paper copies of client files, even if all the
responsibility as managing the electronic patient files, but that she
information was replicated in an electronic form. (See [28] for
monitors access and updates made by others in the system. This is
more on the myth of the paperless workplace.) Not only were
due, in part, to the fact that current electronic system is incapable
there electronic and physical copies of sensitive personal
of distinguishing between the current user of the system outside
information, but there were also multiple copies of files for
the application of logging and passwords. Requiring separate log-
different purposes. Not all information was kept in one central
ins for different people undoubtedly conflicts with the fluid
file, but instead some information was in certain files for a
demands of practice.
specific purpose. For example, patient history could be kept in the
Childcare directors mentioned similar issues of monitoring, large manila file, but “recent-visit” information may be kept at the
accessing, and distributing information to the workplace. In front of a travel file. The three reasons participants gave for
reference to their responsibility to monitor access to the child’s keeping redundant information were (1) to use appropriate
file one director said, “When a teacher comes in and wants access information based on contextual needs, (2) to serve a community
to a file they have to come through me first and they have to tell purpose, and (3) to protect information from being lost. These
me their reason basically, you know, why do you need to go in three factors are critical to understanding the use and motivations
there?” This director is explaining how she monitors access to the for duplication, which then impacts the security practices of what
files in a method that is more than simply checking access rights might traditionally be valued as redundant information.
to information. She is additionally checking the teacher’s work-
The first, and perhaps the most compelling, reason for keeping
related purpose, which extends into managing information
redundant information is that information can be repurposed for
privacy. In our observations, we were able to watch a teacher
multiple needs and within different settings. The same
attempt to access a child’s files. The following is an excerpt from
demographic information is kept in the patient’s manila file, but it
one observer’s field notes:
is also stored on their electronic record for billing, and possibly an
A teacher… approaches the corner of Director’s desk: “Hey” "If I electronic health record. In childcares, the parent’s contact
want my kids' middle names, are they gonna be in here or in the file?" information and child’s name is kept in the various electronic and
<points to black box> … The teacher then says, in a much softer voice,
“can I dig?” The informality of this word, the tone of her voice makes
physical files, but they are also going to be kept in the classroom
this seem like a common practice. The Director responds with a to function for emergency purposes, on the bus to make sure that
carefully-laid sentence and a slight sternness in her voice--her the appropriate children are on board, in the billing ledger, on old
eyebrows raised, eyes widened, and a scolding manner in the slow, waitlists, in rolodex’s for administrative assistants, and many
undulating movements of her head and voice as she speaks: “I’ll have more. Information in these settings is retooled and repurposed
to dig for you.” I can only see the side of the teacher’s face, but she based on the need. One medical director explains:
looks shocked in that her face pauses, gaze held with the Director’s,
and there’s a space created that seems to beg of a verbal response. The “We have an electronic medical record here – so it’s all eventually
Director fills the silence with a soft, earnest “I’m sorry.” entered in. The information is taken down by a nurse interviewer
preoperatively on a pre-op visit.... And then eventually that all gets put
This interaction excerpt highlights that the director enforces into the electronic medical record... but of course we transfer a lot of
access policies in a way that establishes her has a point of that information onto the anesthesia record which is entered in real
authority. Other methods of monitoring that were observed time into the electronic medical record”
included the use of one-way mirrors, an internal system of web- In this simple example, the information is transferred from the
cameras that only the director and administrative staff could see, patient, to the nurse. The nurse transfers the information to a pre-
and one participant having a link on her computer to let her see op visit form, which is then translated into an electronic medical
the contents and use of the other computer in the center. record. The information in the electronic record is repurposed for
the anesthesia record, which is then entered back into the
electronic medical record. In another example, a medical director
explains that she may communicate with patients through email. such as licensing. While these situations cannot be entirely
The emails, though, are then printed out and kept in the patient’s planned for, medical centers and childcares attempt to be ready
file. This allows her to take advantage of electronic for any situation by having information on hand. For example,
communication, but still keep that information for understanding childcares have emergency contact sheets in their classroom that
the patient’s medical history (“Usually she’ll write back have allergy information visible for substitute teachers. Chefs
something and then she’ll print it out and put it in the chart.”) additionally have a child’s allergy information visible in the
The second reason for keeping redundant information is that the kitchen. Teachers also keep communication logs in the classrooms
centers serve a community purpose through the work. In of relevant activities for when teachers are switched out of rooms.
particular, we observed that participants kept files for an Additionally, teachers will display logs of the day’s activities on
extraneous period of time and in multiple forms because of the the outside of the classrooms so that as parents enter they can
individual and community based value that is embodied in the become knowledgeable about their child’s daily activities.
information. In this sense, redundant means keeping information There is a tension that exists between needing to keep information
well past when the client is involved in the center, i.e., past seven private and secure while also needing it to work. In our
years. When asking about how long the participants kept their observations of childcares we were able to witness an inspection
files, all directors said that they’ve kept some files indefinitely. by a Department of Social Services licensor. The licensor explains
One participant said that he is the third generation of his medical this tension to the observer:
practice and had inherited financial and patient files from the early “… things have to be kept confidential and locked, per se, but the staff
1930s. These files are kept because they serve as a representation still need to be able to have access to it even if [the director is] not
of their job (“this is my life work, I don’t want to throw too much here and for emergency contact information. So, sometimes they will
of it away"), but also because the centers never know when they produce their own emergency contact form for their classroom… and
will be required to provide that information again in the future. that way [the manila folder] can remain locked but people still have
For example, one medical director explained how she had to find access to the information needed"
old records to identify bodies: “The problem is, and someone The licensor is explaining how the central collection of the
wouldn’t think about why it’s so important, but it’s like the sensitive information is kept in a locked filing cabinet. However,
Virginia Tech massacre we had 3 patients who we had to identify relevant sensitive information that is stored in the manila folder
the bodies.” The fact that these records server a purpose outside of needs to be in the environment to protect the privacy of the
the office means that the value that is attributed to their use and children. To balance this need, the childcare keeps a separate form
their security reflects a community need to have prolonged access. in the classroom with the child’s information.
The centers in our study kept redundant information to protect There are two other reasons why sensitive information may be
information from being lost. This is because medical centers and kept on hand. The first reason is anticipating extreme
childcares do more than serve a community purpose to heal and circumstances. For example, one medical director keeps hard
care. They also function as a business. The information about copies of files for the next day home with her “just in case
patients and children are what allows them to operate, e.g., anything were to happen.” Another childcare director keeps a
schedules, patient histories, emergency contact information, etc. copy of all of the children’s emergency health insurance
Keeping that information safe and well managed can be translated information in a separate folder in case of a medical emergency.
into keeping a prosperous business. For example, all fourteen The second reason is that some files may become too large. One
participants who used an electronic system kept a back up of their medical director said that after a patient’s file becomes too large,
files in multiple locations. One medical director explains: she starts a new file and rubber bands the old one to the new one
“…we actually have a series of backups. We have a local tape backup in storage. When a file becomes this large, a doctor may need only
and we have an off site backup which actually backs up over the part of the medical record for certain purposes. For example, one
internet at my house at night... And then at my home we actually have medical director explained that she creates a separate packet of
two hard drives and my wife goes to the safety deposit box and swaps information for surgeries (“I think she does just take certain
them out regularly. So if somebody’s mad enough to burn this office information, because we have a packet that we make up with all
down and my home down, we’ll still have a record in a safe deposit the information.”) Understanding what information is going to be
box.”
kept in what space or form, and who has access to those instances
In this setting, security has moved beyond the conception of is something that is determined by the function of the information
keeping sensitive personal information secure for the purposes and also the context surrounding the information use.
patient care, but to also encompass the idea that security keeps the
business safe. This practice is managed through keeping 4.3 Community of Trust
redundant copies in ‘safe’ locations to protect information from To manage security while still functioning as a workplace, our
being lost. What is interesting though, are the different study findings demonstrate that the childcares and medical centers
mechanisms and people involved in security procedures for establish communities of trust. The other themes presented in this
keeping the information safe. For instance, the participant in the work reflect a need to restrict access to information present in
quote above talks about his wife having access to client’s diverse locations and used in various contexts. If the focus of
information. Her relationship to the object in need of securing is work is always on keeping sensitive personal information safe,
through the practice of security, and not necessarily to privacy. then it will be hard to progress past assessing access policies.
Prior research has demonstrated that trust is a factor that decreases
4.2.2 Information On Hand expenditures (i.e., time on security concerns) by mitigating needs
Medical practices and childcares are places that are regularly for countermeasures, but also by creating feelings of shared
reacting to circumstances that arise in the moment. The personnel responsibility thus decreasing selfishness and carelessness [16].
in these places are responding to sick children, different patient’s These benefits explain why the centers in our study create
needs, new customers, and other information intensive activities
communities of heightened trust to decrease expenditures of time In this example the
and money to enforce security mechanisms. staff of the childcare
We found different representations of communities of trust in our are sharing communal
studies. Some examples of a community of trust in the medical responsibilities. One
setting is a literal mom-and-pop practice that worked together to method to manage the
create a sense that their patients were part of the family. Similarly, responsibilities is
the childcares in our study focused on creating an away-from- through keeping track
home feel by displaying children’s artwork, teacher pictures with of work that needs to
likes and dislikes (shown in Figure 1), window-box flower be done – such as
arrangements, and other homey features. The feelings from these through the use of
spaces are that they are places of sharing and caring. This sense of notebooks. Even
community influenced the practice of security. For example, though these artifacts
seeing that a teacher will posts so much of her own personal contain sensitive
information elicits a reciprocal feeling of “now I can share my personal information
information as well.” One childcare director explains her feelings (e.g., late payment),
on balancing trust and privacy: they are left open to
the staff so that they
“… teachers are bound by confidentiality, it's in their agreement, it's in can work as a
our handbook, any violation of confidentiality is immediate grounds of
coherent team.
termination. We try to use a lot of trust… more often than not there's
not anything that they can't see. Um, there are cases of children that Another example Figure 2. An example of the type of
you know we've had suspicions of abuse or different information, but comes from the information placed in the
we kinda want at the same time for [the staff] to be privy.” locking of physical environment to elicit reciprocal
filing cabinets. It is feelings of sharing. Identifying
While there are explicit policies about who can access what
the official policy that information has been blurred.
information, there is also a need to trust co-workers, especially in
filing cabinets
situations of abuse or neglect, to be discrete and manage privacy
containing files should be locked when the director is absent:
issues socially. One medical director specifically mentioned that
“[files are] all kept in here in a cabinet that's locked when I’m not
her co-workers were trained on HIPAA regulations, and this
here and the door is locked as well.” The use of a key was,
allows her to trust their actions.
however, never observed.
One aspect of security that we asked about was the use of
These examples are not work-around security practices. They are,
passwords. Computers, when used for accessing patient
instead, examples of how communities establish and negotiate
information, were generally in the director’s space, or the in
what needs to be made secure. It is a demonstration of contextual
doctor’s office. Of those medical centers that used electronic
integrity [25] playing its role in facilitating communities of people
systems, only seven (29%) had individual passwords. This finding
trusting one another in situ.
is similar to the work of Heckle & Lutters who found that people
who shared workstations shared passwords [19]. However, Heckle 5. DISCUSSION & IMPLICATONS
& Lutters approached the reasons why people shared passwords The three factors outlined above provide insight into the types of
as a need to share workstations. In our study, when asked why, a tensions existing between work practice and security. We have
director said, “They can access anything. That’s their job.” This shown how security and work practices––socially-constructed and
statement emphasizes that to be able to do the work required for uncertain though they may be––are not in direct conflict with one
the job, levels of security have to become normalized to function. another. Our findings have demonstrated that practice is what is
In our study, the lack of a password to protect files is to enable enacted after security rules are put in place. The practice of
people to get work done as a community. Why would they need a security is the ongoing “boundary regulation” [26] that resolves
password since it is their job? This finding is perhaps, in direct the tension between the disclosure required for work and the
conflict with the prior finding of the director auditing who had restriction consistent with the obligation to preserve the privacy of
changed information in the system while logged on with her personal information. It is through creating a community that
password. The balance between these two findings reflects a values security that the rules and roles of work can be understood.
tension that exists between information access and information In this section we outline four design considerations for the
entry, or that provenance of information is critical but sharing practice of security and privacy.
information is communal.
Recognizing situations where technology should not intervene.
In one observation of a childcare, we observed someone One of the central factors we presented in our work was that
examining a notebook that an assistant director keeps at the front directors are mediating the security of information in their centers.
desk. This notebook keeps track of on going work, sometimes the This means that access is a negotiation between the explicit and
need to update children’s sensitive information, but also the implicit norms that regulate practice and the contextual needs of
comings and goings of activities in the childcare: the situation. In particular, the issue of ownership of the sensitive
The notebooks I saw open earlier that [the administrative assistant] personal information created confusion about who could access
was working on are still open. This teacher is looking at the notebooks the information. This lack of common understanding about who
and other files. She is not brushing through the data, she has her full owns the information created space for negotiation to occur. This
concentration. She is an older woman, in her 50s, with an apron which
makes me think that she might also work as a kitchen staff. She is
gray area does not imply that a computer system should concretize
reading the files without any kind of hesitation. It looks like she doesn’t ideas of ownership. Ideally, the lack of firm ideas of ownership
care if someone sees her reading those files. reflects a shared notion that this is a complex area that can defy
explicit rules. Designers of technologies for the collaborative duplication in this same way. Instead, technology encourages
management of sensitive personal information should recognize multiple visualizations of data that is collected in a single
that there are places in the design space where social mechanisms database. The technology-based model allows for a central
should be allowed to dictate practice. At a basic level this suggests repository of information so that nothing is lost and everything is
technological solutions such as temporary access or decaying aggregated. However, our study has demonstrated that
access rights to information could be implemented to allow for information is kept in multiple locations to allow for secrecy,
flexible and negotiated privacy management. multiple purposes, and to prevent work breakdowns. To support
Designing social mechanisms into layers of security. The other the current work practices of the centers in our study, numerous
two sub-themes of human-mediated access management versions of a database should be stored on different computers.
demonstrated how the physical spaces and the director’s roles Alternatively, different views of the information could be
were used to convey community-held social norms. As electronic accessible from different locations by different purposes. A
systems are integrated into practice, respecting the current different solution is to allow for systems to know that information
socially-mediated function that place and roles play in managing is being stored in a different database, but not have knowledge of
sensitive personal information will be a responsibility of the what explicit information is stored there. This would support
designer. For instance, how will the placement of the technologies current practices while still maintaining the need for secrecy.
in particular physical locations impact coordination of the client’s Mimicking, in a sense, the fact that staff know that highly
privacy? Should there be one computer that all staff can access sensitive information is stored at the back of a client’s file, but not
that is within the same space as the director? These questions lend exactly what information is stored there. This design implication,
themselves to further considerations of when designing social in a sense, is asserting that not all information should be
mechanisms into security policies. It is our suggestion that ubiquitous.
technology be designed to create the feeling of social presence Balancing transparency and reciprocity to reflect a community of
similar to those currently utilized when a director physically trust. The last theme that was examined demonstrated that there
regulates access to files; the technology must thus embody notions was a community of trust to allow for workers to balance the need
of human-mediated monitoring based on place and role. for security with getting work done. One design implication for
As one example, it could be possible for staff to have handheld this research is the increased use of reciprocity in knowing whom
devices that only allow access to information in particular and when a patient or child’s files are being accessed; if you can
physical locations based on the role of the user. This would see my files, I should at least be able to see your pertinent
support information being available for the context of the information. If you use my log-in to modify information, I should
situation. For instance, it is perfectly acceptable to be looking up be able to see what you changed. For example, if a nurse from a
medical information in the infirmary, but not in the playground. medical center accessed Susan’s files, Susan and the surrounding
Another design implication is that, that technology could be relevant stakeholders could be notified. Additionally, as
designed so that when people are co-present only specified layers technology use grows, electronic systems should not obfuscate the
of sensitive personal information are unveiled to allow access. For community standards that enable a community of trust to function.
instance, if the director was ever co-present in a particular These should be flexible and adaptive to particular work settings.
location, such as the waiting room, with another staff member, Overall, the major implication for our findings is that security
layers of privacy policy on hand held devices could be removed to should be flexible to represent the shifting context of access and
allow for social security mechanisms to take over. Alternatively, management of information.
when people are in particular physical locations, like an
emergency room, all layers of privacy policy are removed to 6. CONCLUSIONS
support full access to sensitive information. Though our preliminary studies of child and health care practices
we have explored how issues of security and privacy are
Taking the idea further to appeal to both place and social-
instantiated within information rich environments. We have
mediation of security, we might design a technology such that the
shown that there is a balance between needing to get work done
physical exterior and spatial location of the technology indicate
with needing to keep information secure. Three themes were
the type of information that can be accessed through it. For
explored to demonstrate how this balance is negotiated in practice
example, a wall-mounted touch screen might contain access to
to create functioning secure and privacy-respecting work places.
emergency information only, whereas an iPad-like tablet filed
First, the use of human-mediated monitoring demonstrated how
away on the outside of the director’s door might contain bus rider
one person and place within a work center acts not only as a hub
information and allow for mobility. When devices move
of information access and retrieval, but also as the central location
sufficiently far away from the “place” that they belong,
of case-by-case negotiated security. Second, the duplication of
information access can be restricted. By coupling information
information across physical spaces and electronic forms
access to a physical device in its place, a community member
demonstrated how information redundancy works as a form of
from across the room might see an individual using the device and
security. Last, a community of trust is established in these work
know at an instant if they have legitimate access. When the
places to create an environment whose security standards and
physical device is removed from its “place,” it could serve as a
respect contextual integrity. We believe that our approach, while
visual signal of security breach while also supporting physical
preliminary, offers valuable insight to furthering research on how
information distribution.
understanding practice affects the design of secure systems.
Understanding the purpose in information duplication. We found
that information was duplicated in numerous locations and in 7. ACKNOWLEDGEMENTS
different forms to create redundancy and to allow information to We would like to thank and acknowledge the hard work of Laura
be on hand. The current use of technology-based solutions to Agnich, Monika Akbar, Tom DeHart, Zalia Shams, and Edgardo
information duplication does not embody the concept of Vega who helped run, collect, and analyze the large amount of
data. We would also like to thank the Virginia Tech Usable [14] Dourish, P., E. Grinter, J.D.d.l. Flor and M. Joseph, Security
Security Team for their feedback and guidance on this work. in the Wild: User Strategies for Managing Security as an
Specifically, Denis Gracanin and Francis Quek were invaluable. Everyday, Practical Problem. Personal Ubiquitous
This work was funded, in part by NSF Grant #0851774. Computing, 2004. 8(6): p. 391-401.
[15] Eisner, E.W., The Enlightened Eye: Qualitative Inquiry and
8. REFERENCES the Enhancement of Educational Practice. 1997: Prentice
[1] Ackerman, M.S., Privacy in pervasive environments: next
Hall.
generation labeling protocols. Personal Ubiquitous Comput.,
2004. 8(6): p. 430-439. [16] Flechais, I., J. Riegelsberger and M.A. Sasse. Divide and
Conquer: The Role of Trust and Assurance in the Design of
[2] Adams, A. and A. Blandford, Bridging the Gap Between
Secure Socio-Technical Systems. in Proceedings of the 2005
Organizational and User Perspectives of Security in the
Workshop on New Security Paradigms. 2005. Lake
Clinical Domain. International Journal of Human-Computer
Arrowhead, California: ACM.
Studies, 2005. 63(1-2): p. 175-202.
[17] Harper, R.H.R., M.G. Lamming and W.M. Newman,
[3] Adams, A., A. Blandford, D. Budd and N. Bailey,
Locating systems at work: implications for the development
Organizational communication and awareness: a novel
of active badge applications. Interacting with Computers,
solution for health informatics. Health Informatics Journal,
1992. 4(3): p. 343-363.
2005. 11(3): p. 163-178.
[18] Harrison, S. and P. Dourish, Re-place-ing space: the roles of
[4] Adams, A. and M.A. Sasse, Users Are Not the Enemy, in
place and space in collaborative systems, in Proceedings of
Communications of the ACM. 1999. p. 40-46.
the 1996 ACM conference on Computer supported
[5] Bardram, J.E. Plans as Situated Action: An Activity Theory cooperative work. 1996, ACM: Boston, Massachusetts,
Approach to Workflow Systems. in ECSCW '97. 1997. United States.
Copenhagen, Denmark: Kluwer Academic Publishers.
[19] Heckle, R.R. and W.G. Lutters, Privacy implications for
[6] Bardram, J.E. and C. Bossen, Mobility Work: The Spatial single sign-on authentication in a hospital environment, in
Dimension of Collaboration at a Hospital. Computer Proceedings of the 3rd symposium on Usable privacy and
Supported Cooperative Work (CSCW), 2005. 14(2): p. 131- security. 2007, ACM: Pittsburgh, Pennsylvania. p. 173-174.
160.
[20] Jha, A.K., T.G. Ferris, K. Donelan, C. DesRoches, A.
[7] Bardram, J.E., J. Bunde-Pedersen, A. Doryab and S. Shields, S. Rosenbaum, et al., How common are electronic
Sørensen. CLINICAL SURFACES --- Activity-Based health records in the United States? A summary of the
Computing for Distributed Multi-Display Environments in evidence. Health Affairs, 2006. 25(6): p. w496-w496.
Hospitals. in Proceedings of the 12th IFIP TC 13
[21] Kientz, J.A. and G.D. Abowd. KidCam: Toward an Effective
International Conference on Human-Computer Interaction:
Technology for the Capture of Children's Moments of
Part II. 2009. Uppsala, Sweden: Springer-Verlag.
Interest. in Proceedings of the 7th International Conference
[8] Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous on Pervasive Computing. 2009. Nara, Japan: Springer-
Computing Environments. in Proceedings of the Third Verlag.
Conference on European Conference on Computer-
[22] Kientz, J.A., R.I. Arriaga and G.D. Abowd. Baby steps:
Supported Cooperative Work. 1993: Kluwer Academic
evaluation of a system to support record-keeping for parents
Publishers.
of young children. in Proceedings of the 27th international
[9] Bossen, C. The parameters of common information spaces:: conference on Human factors in computing systems. 2009.
the heterogeneity of cooperative work at a hospital ward. in Boston, MA, USA: ACM.
Proceedings of the 2002 ACM conference on Computer
[23] Kientz, J.A., R.I. Arriaga, M. Chetty, G.R. Hayes, J.
supported cooperative work. 2002. New Orleans, Louisiana,
Richardson, S.N. Patel, et al. Grow and know: understanding
USA: ACM.
record-keeping needs for tracking the development of young
[10] Bylund, M., K. Höök and A. Pommeranz. Pieces of Identity. children. in Proceedings of the SIGCHI conference on
in Proceedings of the 5th Nordic Conference on Human- Human factors in computing systems. 2007. San Jose,
Computer Interaction: Building Bridges. 2008. Lund, California, USA: ACM.
Sweden: ACM.
[24] Kobayashi, M., S.R. Fussell, Y. Xiao and F.J. Seagull. Work
[11] Cranor, L.F., M. Arjula and P. Guduru, Use of a P3P user coordination, workflow, and workarounds in a medical
agent by early adopters, in Proceedings of the 2002 ACM context. in Conference on Human Factors in Computing
workshop on Privacy in the Electronic Society. 2002, ACM: Systems (CHI'07). 2005. Portland, OR, USA: ACM Press,
Washington, DC. New York, New York.
[12] Dourish, P., What we talk about when we talk about context. [25] Nissenbaum, H., Privacy as Contextual Integrity.
Personal Ubiquitous Comput., 2004. 8(1): p. 19-30. Washington Law Review, 2004. 79(1).
[13] Dourish, P. and K. Anderson, Collective Information [26] Palen, L. and P. Dourish. Unpacking "privacy" for a
Practice: Exploring Privacy and Security as Social and networked world. in Proceedings of the SIGCHI conference
Cultural Phenomena. Human-Computer Interaction, 2006. on Human factors in computing systems. 2003. Ft.
21(3): p. 319-342. Lauderdale, Florida, USA: ACM.
[27] Reddy, M. and P. Dourish. A Finger on the Pulse: Temporal [29] Vega, L., Security in Practice: Examining the Collaborative
Rhythms and Information Seeking in Medical Work. in Management of Personal Sensitive Information in Childcares
Proceedings of the 2002 ACM Conference on Computer and Medical Centers, in Computer Science. 2010, Virginia
Supported Cooperative Work. 2002. New Orleans, Louisiana, Tech: Blacksburg. p. 104.
USA: ACM. [30] Whitten, A. and J.D. Tygar. Why Johnny Can’t Encrypt: A
[28] Sellen, A.J. and R.H.R. Harper, The Myth of the Paperless Usability Evaluation of PGP 5.0. in Proceedings of the 8th
Office. 2001: The MIT Press. USENIX Security Symposium. 1999.

You might also like