⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 organizational analysis in computer science.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 5 页
字号:
massively parallel computing in terms of the scale and unit costof computation (Kling, Scherson, and Allen 1992), and thediscussions of networking in terms of the wide data bandwidthsthat new technologies offer.If we ask how these technologies improve organizationalperformance, then we have to ask how they can be made usable todiverse groups. The most powerful modelling system may be oflimited utility if it requires sophisticated programming skillsto create and modify every data transformation. Alternatively,such a package can be made more widely useful by having themodelling efforts managed by a programming group whihc providesadded value for added cost.Few people are capable or interested in primarily using "rawcomputing" for their work. The diverse array of "productivitysoftware" -- such as text processing, presentation graphics,spreadsheets, databases and so on gain their value when they canbe provided and maintained in a way that matches the skills andavailable time of people who will use them. Both skill and timeare scarce resources in most organizations. Skilled time isespecially expensive.Similarly, the organizational value of digital libraries can't beadequately conceptualized in terms of simple data-centricmeasures, like the number of gigabytes of available files. Theease of people accessing useful documents is much more pertinent,although much less frequently discussed today.In each of these cases, the support systems for the focalcomputing system is integral to the effective operation of thetechnology. Infrastructure refers to the set of human andorganizational resources that help make it simpler and faster forskilled people to use computerized systems. Infrastructure shouldbe part of the conceptualization. Often the support systems for acomputing can involve several different organizations, includinghardware and software vendors, telecommunication support groups,divisional systems groups, and local experts (Kling, 1992). Itcan be organizationally very complex and unresponsive in somecases and organizationally simpler and more effective in others.In any case, the infrastructure for systems support can't beignored when one is interested in improving organizationalperformance.Repercussions for Systems DesignEven when computerized systems are used as media of intellectualexploration, Organizational Informatics researchers find thatsocial relationships influence the ways that people usecomputerized systems. Christine Bullen and John Bennett (1991)studied 25 organizations that used groupware with diversemodeules such as databases, group calendars, text annotatingfacilities and electronic mail. They found that the electronicmail modules were almost universally valued, while other systemfacilities were often unused.In a recent study, Sharyn Ladner and Hope Tillman examined theuse of the Internet by university and corporate librarians. Whilemany of them found data access through databases and filetransfer to be important services, they also reported thatelectronic mail was perhaps the most critical Internet featurefor them.     The participants in our study tell us something that we     may have forgotten in our infatuation with the new     forms of information made available through the     Internet.  And that is their need for community.  To be     sure, our respondents use the Internet to obtain     information not available in any other format, to     access databases ... that provide new efficiencies in     their work, new ways of working.  But their primary use     is for communication.  Special librarians tend to be     isolated in the workplace -- the only one in their     subject specialty (in the case of academe), or the only     librarian in their organization (in the case of a     corporate library).  Time and time again our     respondents expressed this need to talk to someone --     to learn what is going on in their profession, to     bounce ideas off others, to obtain information from     people, not machines.     There are tremendous implications from the Internet     technology in community formation -- the Internet may     indeed provide a way to increase community among     scholars, including librarians.  The danger we face at     this juncture in time, as we attach library resources     to the Internet, is to focus all of our energies on the     machine-based resources at the expense of our human-     based resources, i.e., ourselves (Ladner and Tillman,     1992).In these studies, Organizational Informatics researchers havedeveloped a socially rich view of work with and around computing,of computing within a social world.These studies have strong repercussions for the design ofsoftware. A good designer cannot assume that the majority ofeffort should go into the "computational centerpiece" of asystem, while devoting minor efforts to supporting communicationfacilities. One of my colleagues designed a modelling system formanagers in a major telephone company, after completing anextensive requirements analysis. However, as an afterthought, headded a simple mail system in a few days work. He was surprisedto find that the people who used these systems regularly used hiscrude electronic mail system, while they often ignoredinteresting modelling capabilities. Such balances of attentionalso have significant repercussions. Many people need good mailsystems, not just crude ones: systems which include facileeditors, ease in exporting and importing files, and effectivemail management (Kling and Covi, 1993).Assessing people's preferences for systems' designs is anexercise in social inquiry. While rapid prototyping may helpimprove designs for some systems, it is less readily applicableto systems which are used by diverse groups at numerouslocations. Computer scientists are beginning to develop morereliable methods of social inquiry to better understand whichsystems designs will be most useful (Bentley, et. al. 1992; Kyngand Greenbaum, 1991). It is particularly helpful to organizesystem designs that help minimize the complexity and cost of itsinfrastructure (Kling, 1992).Fish and his colleagues (1993) recently reported the way that theexplicit use of social theory helped them design more effectivegroup meeting systems. Unfortunately, these newer methods arerarely taught to CS students. When computer specialists build animbalanced system, it should not be a  surprise when theresulting organizational value of their efforts is verysuboptimal.System Security and ReliabilityIn a simplified engineering model of computing, the reliabilityof products is assured through extensive testing in a developmentlab. The social world of technology use not perceived as shapingthe reliability of systems, except through irascible humanfactors, such as "operator errors." An interesting and tragicillustration of the limitations of this view can be found in somerecent studies of the causes of death and maiming by an electronaccelerator which was designed to help cure cancer, the Therac-25(Jacky, 1991, Leveson and Turner, 1993).The Therac-25 was designed and marketed in the mid 1980s by aCanadian firm, Atomic Energy of Canada Limited (AECL), as anadvanced medical technology. It featured complete softwarecontrol over all major functions (supported by a DEC PDP-11),among other innovations. Previous machines included electro-mechanical interlocks to raise and lower radiation shields.Several thousand people were effectively treated with the Therac-25 each year. However, between 1985 and 1987 there were six knownaccidents in which several people died in the US. Other wereseriously maimed or injured [3].Both studies concur that there were subtle but important flaws inthe design of the Therac-25's software and hardware. AECL'sengineers tried to patch the existing hardware and (finally)software when they learned of some of the mishaps. But theytreated each fix as the final repair.Both studies show how the continuing series of mishaps wasexacerbated by diverse organizational arrangements. Jacky claimsthat pressures for speedy work by radiological technicianscoupled with an interface design that did not enhance importanterror messages was one of many causes of the accidents. Levesonand Turner differ in downplaying the working conditions of theTherac-25's operators and emphasize the flawed social system forcommunicating the seriousness of problems to Federal regulatorsand other hospitals. Both studies observe that it is unlikely forthe best of companies to develop perfect error-free systemswithout high quality feedback from users. Their recommendationsdiffer: Jacky discusses the licensing of system developers andthe regulation of computerized medical systems to improve minimalstandards of saftey. Leveson and Turner propose extensiveeducation and training of software engineers and more effectivecommunication between manufacturers and their customers.However, both studies indicate that an understanding of thesafety of computer systems must go beyond the laboratory andextend into the organizational settings where it is used. In thecase of the Therac-25, it required understanding a complex web ofinterorganizational relationships, as well as the technicaldesign and operation of the equipment. Nancy Leveson (1992)points out that most major disasters technological disasters inthe last 20 years "involved serious organizational and managementdeficiencies." Hughes, Randall and Shapiro (1992:119) observethat British no civil collision in UK air space has beenattributed to air traffic control failures. But their Mediatorcontrol system was failing regularly and had no backup during theperiod that they studied it. They observe that the reliability ofthe British air traffic control system resides in totality of therelevant social and technical systems, rather than in a singlecomponent.The need for this kind of organizational understanding isunfortunately slighted in the CS academic world today. CTFdiscusses only those aspects of computer system reliability whichare amenable to understanding through laboratory-like studies(Hartmanis and Lin, 1992:110-111). But cases of safety criticalsystems, like the Therac-25 and British Air Traffic Control,indicate why some Computer Scientists must be willing toundertake (and teach) organizational analysis.Worldviews and Surprises about ComputerizationThese few paragraphs barely sketch the highlights of a fertileand significant body of research about computer systems in use.Perhaps the most important simplification for traditionalcomputer scientists is to appreciate how people and theirorganizations are situated in a social world and consequentlycompute within a social world. People act in relationship toothers in various ways and concerns of belonging, status,resources, and power are often central. The web of people'srelationships extend beyond various formally defined group andorganizational boundaries (Kling and Scacchi, 1982; Kling, 1987;Kling, 1992). People construct their worlds, including themeanings and uses of information technologies, through theirsocial interactions.This view is, of course, not new to social scientists. On theother hand, there is no specific body of social theory which caneasily be specialized for "the case of computing," and swiftlyproduce good theories for Organizational Informatics as trivialdeductions. The best research in Organizational Informatics drawsupon diverse theoretical and methodological approaches within thesocial sciences with a strong effort to select those which bestexplain diverse aspects of computerization.       ORGANIZATIONAL INFORMATICS WITHIN COMPUTER SCIENCECTF places dual responsibilities on Computer Scientists. Oneresponsibility is to produce a significant body of applicableresearch. The other responsibility is to educate a significantfraction of CS students to be more effective in conceiving andimplementing systems that will enhance organizationalperformance. It may be possible to organize research andinstruction so as to decouple these responsibilities. Forexample, molecular biologists play only a small role in trainingdoctors. However, CS departments act like an integrated Medicalschool and Biology department. They are the primary academiclocations for training degreed computing specialists, and theyconduct a diverse array of less applicable and more applicableresearch. In practice, the research interests of CS faculty shapethe range of topics taught in CS departments, especially the 150PhD granting departments. CS curricula mirror major areas of CSresearch and the topics which CS faculty understand through theirown educations and subsequent research. As a consequence, CScourses are likely to avoid important CS topics which appear abit foreign to the instructor.An interesting example of this coupling can be illustrated byCTF, in a brief description of public-key encryption systems and

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -