<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wayne G Lutters</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Supported Cooperative Work: The Journal of Collaborative Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">boundary objects</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative work</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">high reliability organizations</style></keyword><keyword><style  face="normal" font="default" size="100%">hotlines</style></keyword><keyword><style  face="normal" font="default" size="100%">information reuse</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational memory</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">service engineering</style></keyword><keyword><style  face="normal" font="default" size="100%">technical support</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2007</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">341-372</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Boundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the practical achievement of safety by service engineers. Their resolution of repair requests was preserved in the organization’s memory via three compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually reinterpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wayne G Lutters</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Xiaomu Zhou</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Jones, William P.</style></author><author><style face="normal" font="default" size="100%">Jaime Teevan</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Group information management</style></title><secondary-title><style face="normal" font="default" size="100%">Personal Information Management</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">group information</style></keyword><keyword><style  face="normal" font="default" size="100%">personal information management</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">University of Washington Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Seattle, WA</style></pub-location><pages><style face="normal" font="default" size="100%">236–248</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Activities of PIM are often embedded in group or organizational contexts. To work effectively within a group, an individual must manage information not only for his or her personal use but also to share with other members of the group. Obviously, one would like to leverage the activities of others around. Being able to obtain telephone numbers, schedule group meetings, determine the availability of one’s peers, and obtain important collaborative information is invaluable. What are the issues, if any, in leveraging the work of others, in order to incorporate their calendar, contacts, and other information into one’s own PIM system? And what would be involved in sharing one’s own data for use by others?&amp;nbsp;&lt;/p&gt;&lt;p&gt;This chapter reviews the host of issues involved in the collaborative use of personal information. Topics covered include motivation, adoption patterns, interaction styles, control over personal information, privacy, and trust. The goal is to facilitate sharing personal information by considering these issues; fully considered, they can enable the cooperative adoption and use of tools to support group information management (GIM).&amp;nbsp;&lt;/p&gt;</style></abstract></record></records></xml>