liu.seSearch for publications in DiVA
Change search
Refine search result
1 - 11 of 11
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Bernhard, Irene
    et al.
    University West, Trollhättan, Sweden.
    Gustafsson, Mariana
    Linköping University, Department of Management and Engineering, Political Science. Linköping University, Faculty of Arts and Sciences.
    Hedström, Karin
    Örebro University, Örebro, Sweden.
    Sefyrin, Johanna
    Linköping University, Department of Management and Engineering, Information Systems and Digitalization. Linköping University, Faculty of Arts and Sciences.
    Wihlborg, Elin
    Linköping University, Department of Management and Engineering, Political Science. Linköping University, Faculty of Arts and Sciences.
    A Digital Society for All? – Meanings, Practices and Policies for Digital Diversity2019In: Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019, p. 3067-3076Conference paper (Refereed)
    Abstract [en]

    The concept of digital divides has been on the agenda in research and policy making for at least the last 20 years. But it is still, a challenge to grasp this concept that is so elusive and transforming. Inclusion, access and equality are still key values for democratic governance and must be addressed in particular when forming and contributing to a digital government. This paper seeks to intervene in current debates on digital divides and digital inclusion by analyzing two cases of responses among street-level public administration in relation to e-government services in Sweden. The case studies are strategically chosen and conducted in national agencies and in local public libraries. Three lines of contributions are discussed, firstly the importance to care for equality secondly the need to see the non-users, and thirdly to discuss the potential of putting focus on digital diversity.

  • 2.
    Cronholm, Stefan
    et al.
    Linköping University, Department of Computer and Information Science, VITS - Development of Informations Systems and Work Context. Linköping University, The Institute of Technology.
    Goldkuhl, Göran
    Linköping University, Department of Computer and Information Science, VITS - Development of Informations Systems and Work Context. Linköping University, The Institute of Technology.
    Hedström, Karin
    Örebro universitet.
    Pilemalm, Marie-Louise
    Åkerbo Omsorg, Linköpings Kommun.
    Handlingsbart IT-system för kvalitetssäkring och individualisering av äldreomsorg2003Conference paper (Other academic)
  • 3.
    Hedström, Karin
    Linköping University, Department of Computer and Information Science, VITS - Development of Informations Systems and Work Context. Linköping University, Faculty of Arts and Sciences.
    Kunskapsanvändning och kunskapsutveckling hos verksamhetskonsulter: erfarenheter från ett FoU-samarbete2000Licentiate thesis, monograph (Other academic)
    Abstract [sv]

    Att förstå hur kunskap kan användas och utvecklas är viktigt för alla som arbetar med kunskapsutveckling. Detta gäller inte minst forskare som ofta hoppas och tror att deras forskningsresultat på något sätt kommer att bidraga till samhällets utveckling. Mitt arbete har fokuserat hur verksamhetskonsulter kan utveckla och anpassa yrkesinriktad praktisk kunskap genom att samarbeta med forskare och verksamhetskonsult från andra discipliner.

    Mycket av den kunskap som forskare inom informationssystemutveckling utvecklar är tänkt att i slutändan användas av praktiker som dagligen arbetar med de frågor vi behandlar i våra forskningsprojekt. Därför känns det både viktigt och naturligt att utveckla kunskap som gör att vi bättre kan förstå hur systemutvecklare och andra verksamhetskonsulter arbetar. Vi behöver utveckla kunskap om den praktik som verksamhetskonsulter tillhör – dvs vad systemutvecklare och andra verksamhetsutvecklare gör, hur de använder och anpassar olika typer av kunskap som stöd för sitt agerande. Vi måste förstå hur systemutvecklare arbetar och resonerar.

    Ett sätt att få bättre kunskap om den rationalitet som styr verksamhetskonsulters praktik är genom att arbeta med aktiva verksamhetsutvecklare som använder både forskningsbaserad och praktikbaserad kunskap som stöd i sin yrkesutövning. Under tre år har jag observerat och arbetat tillsammans med två verksamhetskonsulter, och har på så sätt utvecklat en ökad förståelse för hur kunskap kan översättas, utvecklas och användas av konsulter som på olika sätt arbetar med verksamhetsutveckling.

    Studiens resultat beskriver och relaterar omständigheter, handlingar och konsekvenser kring verksamhetskonsulters kunskapsutveckling. Kunskap i användning översätts och anpassas till den specifika situationen samt kunskapsanvändarens förförståelse och referensram, vilket också innebär att kunskapen utvecklas och förändras.

    Download full text (pdf)
    FULLTEXT01
  • 4.
    Hedström, Karin
    Linköping University, Department of Computer and Information Science, VITS - Development of Informations Systems and Work Context. Linköping University, Faculty of Arts and Sciences.
    Spår av datoriseringens värden: Effekter av IT i äldreomsorg2004Doctoral thesis, monograph (Other academic)
    Abstract [sv]

    Visioner om IT lovar många och positiva förändringar i samhället. Detta gäller inte minst inom svensk äldreomsorg där IT ses som ett verktyg för att utveckla och förbättra äldreomsorgen. Genom att datorisera äldreomsorgen finns förhoppningar om goda effekter som bättre tillgång till information i samband med möte med den äldre, förbättrad samverkan över organisationsgränser samt bättre uppföljning.

    Den här avhandlingen handlar om datorisering av äldreomsorg, de aktörer genom vars intressen och värden IT-system utvecklas, och de värden som IT-systemen skapar. Då värden styr handlande, prioriteringar, beslut samt hur vi värderar det vi upplever påverkar värden utveckling och utvärdering av IT-system. Därmed studeras effekter som spår av värden. Detta är en kvalitativ studie som illustrerar hur fyra administrativa och äldreomsorgsstödjande IT-system i tre svenska kommuner har utvecklats genom olika aktörsgruppers värden och vilka värden dessa IT-system uppfattas stödja. Avhandlingsarbetet har en stark empirisk bas som har utvecklats genom att jag har deltagit i upphandling samt utveckling av IT-system för äldreomsorg i Örebro samt Linköpings kommun. Dessutom har jag studerat upplevda effekter av att använda IT-system som stöd för arbete inom äldreomsorg i Göteborg stad och Linköpings kommun.

    Avhandlingens resultat visar att datorisering av äldreomsorg drivs av och värderas utifrån fyra värdeområden: förvaltningsvärden, integrationsvärden, omsorgsvärden och professionsvärden. Förutom ovanstående resultat presenteras datoriseringsprocessernas aktörs-grupper och deras värden samt en jämförelse av värden som drivkrafter eller konsekvenser. Sju sammanfattande resultat avslutar beskrivningen av avhandlingens kunskapsbidrag.

    Download full text (pdf)
    FULLTEXT01
  • 5.
    Hedström, Karin
    et al.
    Örebro universitet.
    Cronholm, Stefan
    Linköping University, Department of Computer and Information Science, VITS - Development of Informations Systems and Work Context. Linköping University, The Institute of Technology.
    Goldkuhl, Göran
    Linköping University, Department of Computer and Information Science, VITS - Development of Informations Systems and Work Context. Linköping University, The Institute of Technology.
    Pilemalm, Marie-Louise
    Åkerbo Omsorg, Linköpings Kommun.
    Utveckling av hemtjänst genom IT och verksamhetskunnande2003Conference paper (Other academic)
  • 6.
    Hedström, Karin
    et al.
    Örebro University, Sweden.
    Karlsson, Fredrik
    Örebro University, Sweden.
    Kolkowska, Ella
    Örebro University, Sweden.
    Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale2013In: Information Management & Computer Security, ISSN 0968-5227, E-ISSN 1758-5805, Vol. 21, no 4, p. 266-287Article in journal (Refereed)
    Abstract [en]

    Purpose – Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.

    Design/methodology/approach – This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a combination of interviews, information security documents, and observations. Data were analysed using a combination of a value-based compliance model and the taxonomy laid out in SAT to determine user rationality.

    Findings – The paper argues that management of information security and design of countermeasures should be based on an understanding of users' rationale covering both intentional and unintentional non-compliance. The findings are presented in propositions with practical and theoretical implications: P1. Employees' non-compliance is predominantly based on means-end calculations and based on a practical rationality, P2. An information security investigation of employees' rationality should not be based on an a priori assumption about user intent, P3. Information security management and choice of countermeasures should be based on an understanding of the use rationale, and P4. Countermeasures should target intentional as well as unintentional non-compliance.

    Originality/value – This work is an extension of Hedström et al. arguing for the importance of addressing user rationale for successful management of information security. The presented propositions can form a basis for information security management, making the objectives underlying the study presented in Hedström et al. more clear

  • 7.
    Hellquist, Fredrik
    et al.
    Örebro University, Sweden .
    Ibrahim, Samir
    Örebro University, Sweden .
    Jatko, Robin
    Örebro University, Sweden .
    Andersson, Annika
    Örebro University, Sweden .
    Hedström, Karin
    Linköping University, Department of Management and Engineering, Information Systems. Linköping University, Faculty of Arts and Sciences. Örebro University, Sweden .
    Getting their Hands Stuck in the Cookie Jar - Students’ Security Awareness in 1:1 Laptop Schools2013In: International Journal of Public Information Systems, ISSN 1653-4360, Vol. 9, no 1, p. 1-18Article in journal (Refereed)
    Abstract [en]

     This paper presents results from an ongoing research project studying schools that have implemented oneto- one-laptops (1:1). The research is interpretative and builds on interviews and survey-responses from students and teachers in two public 1:1 schools in Sweden. We are focusing on the students’ security awareness and compliance by researching into whether the students in 1:1 schools comply with the school’s information security policy (ISP). Theoretically, a security awareness perspective is drawn up based on three parts - formal, cognitive and behavioral awareness - that should be in parity with each other. This means that the students’ psychological perception and actual behavior should be in parity with the schools’ ISP. Our findings show that the schools have communicated their ISPs well and that the students’ security awareness in most areas is equivalent to the schools’ ISPs. However, we also found many instances where  it was not the case that the formal, cognitive and behavioral security awareness were in parity with each other. In the analysis of the students’ behavioral security awareness we found that despite the fact that they were aware of the rules they occasionally violated them –  most notably when file-sharing and th downloading of software were involved. We conclude by arguing that non-compliance can only be understood based on an understanding of the students’ underlying reason for following or not following the policies and regulations, and that in order to create a secure information environment, school manager must talk to the students to understand their reasoning. In a situation where 1:1 is spreading rapidly amon schools, studies regarding students’ security awareness and behavior are urgent, but so far the field is under-examined.

    Download full text (pdf)
    fulltext
  • 8.
    Karlsson, Fredrik
    et al.
    Örebro University, Sweden.
    Holgersson, Jesper
    University of Skövde, Sweden.
    Söderström, Eva
    University of Skövde, Sweden.
    Hedström, Karin
    Örebro University, Sweden.
    Exploring user participation approaches in public e-service development2012In: Government Information Quarterly, ISSN 0740-624X, E-ISSN 1872-9517, Vol. 29, no 2, p. 158-169Article in journal (Refereed)
    Abstract [en]

    It has been argued that user participation is important when public authorities develop e-services. At the same time there is limited research on the usefulness of existing user participation approaches in public e-service development. In this paper we, therefore, analyze how the three user participation approaches – participatory design, user-centered design, and user innovation – meet the strategic e-service goals of the EU and the US. In doing so, we identify three challenges that need to be considered when choosing among these approaches: 1) unclear user target segments can impede the fulfillment of usability and relevance goals, 2) the nature of participation can impede the fulfillment of democracy goals, and 3) lack of adequate skills can impede the fulfillment of efficiency goals.

  • 9.
    Khan, Sana Z
    et al.
    Örebro universitet .
    Shahid, Zahraa
    Örebro universitet .
    Hedström, Karin
    Linköping University, Department of Management and Engineering, VITS - Development of Informations Systems and Work Context. Linköping University, Faculty of Arts and Sciences.
    Andersson, Annika
    Örebro universitet.
    Hopes and fears in implementation of electronic health records in Bangladesh2012In: The Electronic Journal of Information Systems in Developing Countries, E-ISSN 1681-4835, Vol. 54, no 8, p. 1-18Article in journal (Refereed)
    Abstract [en]

    Health is seen as a major key for development and many developing country governments invest in ICT-based Health Information Systems (HIS). The purpose of this paper is to explore physicians’ hopes and fears for implementing Electronic Health Record (EHR) systems in Bangladeshi hospitals. Data was collected through interviews and observations at two Bangladeshi hospitals. We found very little use of EHR systems at the hospitals and many physicians were skeptical of using EHR systems. Whereas this skepticism could be seen as a symptom of backward thinking our analysis found much of this skepticism to be reasonable. In this way this research contributes to the ongoing debate on how to implement HIS in developing countries. We articulate and analyze users’ concerns beyond mere “attitudes” and “acceptance”. Our results show that the fears and concerns on the hospital floors are legitimate and should be taken into consideration when HIS projects are initiated. 

    Download full text (pdf)
    Khan et al 2012
  • 10.
    Kolkowska, Ella
    et al.
    Örebro University School of Business, Sweden.
    Hedström, Karin
    Örebro University School of Business, Sweden.
    Karlsson, Fredrik
    Örebro University School of Business, Sweden.
    Analyzing information security goals2012In: Threats, countermeasures and advances in applied information security / [ed] Manish Gupta, John Walp, Raj Sharman, IGI Global, 2012, 1, p. 91-110Chapter in book (Other academic)
    Abstract [en]

    "This book addresses the fact that managing information security program while effectively managing risks has never been so critical, discussing issues such as emerging threats and countermeasures for effective management of information security in organizations"--Provided by publisher.

  • 11.
    Wihlborg, Elin
    et al.
    Linköping University, Department of Management and Engineering, Political Science. Linköping University, Faculty of Arts and Sciences.
    Gustafsson, Mariana S
    Linköping University, Department of Management and Engineering, Political Science. Linköping University, Faculty of Arts and Sciences.
    Söderström, Fredrik
    Linköping University, Department of Management and Engineering, Information Systems. Linköping University, Faculty of Arts and Sciences.
    Hedström, Karin
    Linköping University, Department of Management and Engineering, Information Systems. Linköping University, Faculty of Arts and Sciences.
    Constructing identities: Professional use of eID in public organisations2015In: Transforming Government: People, Process and Policy, ISSN 1750-6166, E-ISSN 1750-6174, Vol. 9, no 2, p. 143-158Article in journal (Refereed)
    Abstract [en]

    Purpose– The purpose of the paper is to reveal how identities are constructed when electronic identification (eIDs) cards are introduced through information systems in public organisations. Design/methodology/approach– Through two case studies, the authors generate rich data on the construction of identities through use of eID within public organisations. The author’s analysis, based on actor network theory, focusses on the translation of eIDs in these two settings. Findings– ID can be viewed as an artefact where the public and private spheres meet. The authors found at least three mixed roles in employees’ use of eID: as a purely private person; as a private person in the work place; and as a professional in the work place. Research limitations/implications– There is a need for further research on how eID is translated into organisational contexts and how institutional settings define the openings for local translation processes. However, the results are based on two small cases, meaning that broad generalisations are difficult to make. Practical implications– EID is so much more than technology. The technical framing of the identification system appears to be subordinated to organisational arrangements and cultures, making it important to apply a socio-technical perspective when working with eID. Originality/value– The empirical cases have offered a unique chance to study implementation and use of eID in two very different public service organisations. The findings illustrate how eID translated into organisational contexts, and how identity management within an organisational setting is linked to the employees’ private and professional roles.

    Download full text (pdf)
    fulltext
1 - 11 of 11
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf