<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kaziunas, Elizabeth</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark S.</style></author><author><style face="normal" font="default" size="100%">Lindtner, Silvia</style></author><author><style face="normal" font="default" size="100%">Lee, Joyce M.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Caring Through Data: Attending to the Social and Emotional Experiences of Health Datafication</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW&#039;17)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">caregiving</style></keyword><keyword><style  face="normal" font="default" size="100%">chronic illness management</style></keyword><keyword><style  face="normal" font="default" size="100%">data work</style></keyword><keyword><style  face="normal" font="default" size="100%">diabetes</style></keyword><keyword><style  face="normal" font="default" size="100%">diy health</style></keyword><keyword><style  face="normal" font="default" size="100%">emotion work</style></keyword><keyword><style  face="normal" font="default" size="100%">health</style></keyword><keyword><style  face="normal" font="default" size="100%">health and wellness</style></keyword><keyword><style  face="normal" font="default" size="100%">health informatics</style></keyword><keyword><style  face="normal" font="default" size="100%">healthcare technology</style></keyword><keyword><style  face="normal" font="default" size="100%">personal data</style></keyword><keyword><style  face="normal" font="default" size="100%">personal health informatics</style></keyword><keyword><style  face="normal" font="default" size="100%">remote monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">self-tracking</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">2260–2272</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Designing systems to support the social context of personal data is a topic of importance in CSCW, particularly in the area of health and wellness. The relational complexities and psychological consequences of living with health data, however, are still emerging. Drawing on a 12+ month ethnography and corroborating survey data, we detail the experiences of parents using Nightscout--an open source, DIY system for remotely monitoring blood glucose data-with their children who have type one diabetes. Managing diabetes with Nightscout is a deeply relational and (at times) contested activity for parent-caregivers, whose practices reveal the tensions and vulnerabilities of caregiving work enacted through data. As engagement with personal data becomes an increasingly powerful way people experience life, our findings call for alternative data narratives that reflect a multiplicity of emotional concerns and social arrangements. We propose the analytic lens of caring-through-data as a way forward.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Merritt, David</style></author><author><style face="normal" font="default" size="100%">Jones, Jasmine</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark S.</style></author><author><style face="normal" font="default" size="100%">Lasecki, Walter S.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Kurator: Using The Crowd to Help Families With Personal Curation Tasks</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crowdsourcing</style></keyword><keyword><style  face="normal" font="default" size="100%">curation</style></keyword><keyword><style  face="normal" font="default" size="100%">digital audio</style></keyword><keyword><style  face="normal" font="default" size="100%">digital curation</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed-expertise</style></keyword><keyword><style  face="normal" font="default" size="100%">personal curation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">1835–1849</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;People capture photos, audio recordings, video, and more on a daily basis, but organizing all these digital artifacts quickly becomes a daunting task. Automated solutions struggle to help us manage this data because they cannot understand its meaning. In this paper, we introduce Kurator, a hybrid intelligence system leveraging mixed-expertise crowds to help families curate their personal digital content. Kurator produces a refined set of content via a combination of automated systems able to scale to large data sets and human crowds able to understand the data. Our results with 5 families show that Kurator can reduce the amount of effort needed to find meaningful memories within a large collection. This work also suggests that crowdsourcing can be used effectively even in domains where personal preference is key to accurately solving the task.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Merritt, David</style></author><author><style face="normal" font="default" size="100%">Hung, Pei-Yao</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Treem, Jeffrey W.</style></author><author><style face="normal" font="default" size="100%">Leonardi, Paul M.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Expertise Finding: A Socio-Technical Design Space Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Expertise, Communication, and Organizing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">expertise finding</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">MISSING_URL_ABSTRACT</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Oxford University</style></publisher><pub-location><style face="normal" font="default" size="100%">New York</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael S. Bernstein</style></author><author><style face="normal" font="default" size="100%">Little, Greg</style></author><author><style face="normal" font="default" size="100%">Miller, Robert C.</style></author><author><style face="normal" font="default" size="100%">Hartmann, Björn</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">David R. Karger</style></author><author><style face="normal" font="default" size="100%">Crowell, David</style></author><author><style face="normal" font="default" size="100%">Panovich, Katrina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Soylent: A Word Processor with a Crowd Inside</style></title><secondary-title><style face="normal" font="default" size="100%">Commun. ACM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crowdsourcing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">58</style></volume><pages><style face="normal" font="default" size="100%">85–94</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper introduces architectural and interaction patterns for integrating crowdsourced human contributions directly into user interfaces. We focus on writing and editing, complex endeavors that span many levels of conceptual and pragmatic activity. Authoring tools offer help with pragmatics, but for higher-level help, writers commonly turn to other people. We thus present Soylent, a word processing interface that enables writers to call on Mechanical Turk workers to shorten, proofread, and otherwise edit parts of their documents on demand. To improve worker quality, we introduce the Find-Fix-Verify crowd programming pattern, which splits tasks into a series of generation and review stages. Evaluation studies demonstrate the feasibility of crowdsourced editing and investigate questions of reliability, cost, wait time, and work time for edits.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jiang Yang</style></author><author><style face="normal" font="default" size="100%">Lada A. Adamic</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Wen, Zhen</style></author><author><style face="normal" font="default" size="100%">Lin, Ching-Yung</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Way I Talk to You: Sentiment Expression in an Organizational Context</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Conference on Human Factors in Computing Systems (CHI’12)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CMC</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative help</style></keyword><keyword><style  face="normal" font="default" size="100%">online communities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">04/2012</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Sentiment is a rich and important dimension of social interaction. However, its presence in computer-mediated communication in corporate settings is not well understood. This paper provides a preliminary study of people’s expression of sentiment in email conversations in an organizational context. The study reveals that sentiment levels evolve over time during the process of newcomers’ socialization, that sentiment varies according to tie-strength with the recipient, and that sentiment patterns can be indicative of one’s position in the corporate social network as well as job performance. These findings shed light on the complex and dynamic nature of sentiment patterns, and would inspire further explorations and applications of sentiment analysis in organizations.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jiang Yang</style></author><author><style face="normal" font="default" size="100%">Wen, Zhen</style></author><author><style face="normal" font="default" size="100%">Lada A. Adamic</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Lin, Ching-Yung</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Collaborating Globally: Culture and Organizational Computer-Mediated Communications</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the International Conference on Information Systems (ICIS 2011)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">calendaring</style></keyword><keyword><style  face="normal" font="default" size="100%">computer-mediated communication (CMC)</style></keyword><keyword><style  face="normal" font="default" size="100%">cultural studies</style></keyword><keyword><style  face="normal" font="default" size="100%">Instant Messaging (IM)</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational communication</style></keyword><keyword><style  face="normal" font="default" size="100%">sentiment analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">social interaction</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">12/2011</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Culture shapes interpersonal communication. However, little is known about how culture interacts with computer-mediated communication (CMC) tools in a business context. We present a large-scale empirical study of cultural differences in computer mediated social interactions in a global company. Our dataset includes 9,000 volunteer users and more than 20 million records of their email and Instant Messaging conversations. We compared social network characteristics, preferences for CMC tools, and expression of sentiment across employees working in seven countries. Significant differences emerged and the patterns are consistent with the inherent cultural characteristics as suggested by cultural theories. In addition, we uncover the complex manner in which culture interacts with preference and use of different communication mediums. The existence of pervasive and complex cultural differences, points to the need to understand and account for such differences in designing cross-cultural collaborative systems.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lada A. Adamic</style></author><author><style face="normal" font="default" size="100%">Lauterbach, Debra</style></author><author><style face="normal" font="default" size="100%">Teng, CY</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Rating Friends Without Making Enemies</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">couch surfing</style></keyword><keyword><style  face="normal" font="default" size="100%">e-communities</style></keyword><keyword><style  face="normal" font="default" size="100%">friends</style></keyword><keyword><style  face="normal" font="default" size="100%">online communities</style></keyword><keyword><style  face="normal" font="default" size="100%">rating systems</style></keyword><keyword><style  face="normal" font="default" size="100%">trust</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2011</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;As online social networks expand their role beyond maintaining existing relationships, they may look to more faceted ratings to support the formation of new connections between their users. Our study focuses on one community employing faceted ratings, CouchSurfing.org, and combines data analysis of ratings, a large-scale survey, and in-depth interviews. In order to understand the ratings, we revisit the notions of friendship and trust and uncover an asymmetry: close friendship includes trust, but high levels of trust can be achieved without close friendship. To users, providing faceted ratings presents challenges, including differentiating and quantifying inherently subjective feelings such as friendship and trust, concern over a friend’s reaction to a rating, and knowledge of how ratings can affect others’ reputations. One consequence of these issues is the near absence of negative feedback, even though a small portion of actual experiences and privately held ratings are negative. We show how users take this into account when formulating and interpreting ratings, and discuss designs that could encourage more balanced feedback.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wayne G Lutters</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Supported Cooperative Work: The Journal of Collaborative Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">boundary objects</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative work</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">high reliability organizations</style></keyword><keyword><style  face="normal" font="default" size="100%">hotlines</style></keyword><keyword><style  face="normal" font="default" size="100%">information reuse</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational memory</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">service engineering</style></keyword><keyword><style  face="normal" font="default" size="100%">technical support</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2007</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">341-372</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Boundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the practical achievement of safety by service engineers. Their resolution of repair requests was preserved in the organization’s memory via three compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually reinterpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wayne G Lutters</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Xiaomu Zhou</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Jones, William P.</style></author><author><style face="normal" font="default" size="100%">Jaime Teevan</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Group information management</style></title><secondary-title><style face="normal" font="default" size="100%">Personal Information Management</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">group information</style></keyword><keyword><style  face="normal" font="default" size="100%">personal information management</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">University of Washington Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Seattle, WA</style></pub-location><pages><style face="normal" font="default" size="100%">236–248</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Activities of PIM are often embedded in group or organizational contexts. To work effectively within a group, an individual must manage information not only for his or her personal use but also to share with other members of the group. Obviously, one would like to leverage the activities of others around. Being able to obtain telephone numbers, schedule group meetings, determine the availability of one’s peers, and obtain important collaborative information is invaluable. What are the issues, if any, in leveraging the work of others, in order to incorporate their calendar, contacts, and other information into one’s own PIM system? And what would be involved in sharing one’s own data for use by others?&amp;nbsp;&lt;/p&gt;&lt;p&gt;This chapter reviews the host of issues involved in the collaborative use of personal information. Topics covered include motivation, adoption patterns, interaction styles, control over personal information, privacy, and trust. The goal is to facilitate sharing personal information by considering these issues; fully considered, they can enable the cooperative adoption and use of tools to support group information management (GIM).&amp;nbsp;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lutters, Wayne G</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark S</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Joining the backstage: locality and centrality in an online community</style></title><secondary-title><style face="normal" font="default" size="100%">Information Technology &amp; People</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">dialup</style></keyword><keyword><style  face="normal" font="default" size="100%">e-community</style></keyword><keyword><style  face="normal" font="default" size="100%">fan community</style></keyword><keyword><style  face="normal" font="default" size="100%">geographically co-located community</style></keyword><keyword><style  face="normal" font="default" size="100%">online community</style></keyword><keyword><style  face="normal" font="default" size="100%">virtual community</style></keyword><keyword><style  face="normal" font="default" size="100%">webboard</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">157–182</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The design of viable, small‐scale community spaces on the Net is often a hit‐or‐miss affair. To better understand promising approaches in this design space, it is necessary to go back in time to examine an earlier community technology. A field study is presented of The Castle, a dial‐up bulletin board system, that focuses on Disneyland. As a “gathering place for Disney enthusiasts”, The Castle is a fascinating, albeit eccentric, online community. The Castle&#039;s centrality in the fans’ interest network allows it to function as a collecting point. Here people find similar enthusiasts and even those with insider knowledge. Yet, because of the cost structure of dial‐up access (an accidental side‐effect of the technology), participants are overwhelmingly geographically local, which has useful consequences for social maintenance. It is argued that the geographical locality and centrality of interest allow The Castle to thrive. Most importantly, however, the combination of the two together creates a powerful social dynamic which has been lost in most contemporary online communities.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lutters, Wayne G.</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Achieving Safety: A Field Study of Boundary Objects in Aircraft Technical Support</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work (CSCW&#039;02)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">boundary objects</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative work</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">high reliability organizations</style></keyword><keyword><style  face="normal" font="default" size="100%">hotlines</style></keyword><keyword><style  face="normal" font="default" size="100%">information reuse</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational memory</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">service engineering</style></keyword><keyword><style  face="normal" font="default" size="100%">technical support</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">266–275</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Boundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the “achievement of safety” by service engineers. The resolution process of repair requests was captured in two compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually reinterpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.&lt;/p&gt;</style></abstract></record></records></xml>