Beruflich Dokumente
Kultur Dokumente
However, solutions like these can be accused of [5] Starks & Trinidad (2007). Choose your method: A
comparison of phenomenology, discourse analysis, and
throwing more technology at the problem without
grounded theory, Qual Health Res, 17(10).
accounting for the work that people do. A tenant of
[6] Berner, Detmer & Simborg (2005). Will the Wave
usable security literature states that people will find a
Finally Break? A Brief View of the Adoption of Electronic
way to circumvent a security measure when it comes in Medical Records in the United States, JAMIA, 12(1).
conflict with another task. We therefore have presented
[7] Satchell & Dourish (2009). Beyond the user: Use
the previous security issues that demonstrate security and non-use in HCI, OZCHI, ACM.
flaws in the everyday work of a physician’s office staff.