Karin HedströmÖrebro University | oru · School of Business
Karin Hedström
Doctor of Philosophy (PhD)
About
81
Publications
41,322
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,062
Citations
Introduction
Additional affiliations
January 2016 - present
January 2004 - December 2015
October 2011 - September 2014
Publications
Publications (81)
In e-government automated decision-making increases, forming part of a trend towards " smart " and self-regulating systems. This necessitates the introduction of new relationships and practices, challenging the division of responsibilities in public administration. Using a case study approach, this paper elaborates on implications of automated deci...
Information security standards are influential tools in society today. The validity claim of standards is based on what is considered “best practice.” We unveil the negotiations that take place when “best practice” is constructed during standard development. By using discourse analysis, we investigate how power operates in national and internationa...
Given that there are an increasing number of information security breaches, organizations are being driven to adopt best practice for coping with attacks. Information security standards are designed to embody best practice and the legitimacy of these standards is a core issue for standardizing organizations. This study uncovers how structures at pl...
BACKGROUND
Mobile health devices (MHDs), such as wearables and smartphones, have the potential to improve the monitoring of people with Parkinson’s disease (PD) and inform timely and individualized disease management decisions.
OBJECTIVE
This paper provides an overview of the technologies behind mobile health devices MHDs and investigate their pot...
This study investigates how education professionals
balance their private and professional lives when using
social technologies. Based on boundary theory and
interviews with 57 education professionals, we identify
which tactics they use to separate or integrate their
private and professional life. We identified twice as
many segmentation tactics co...
Background:
Parkinson disease (PD) is a complex, noncurable, and progressive neurological disease affecting different areas of the human nervous system. PD is associated with both motor and nonmotor symptoms, which negatively affect patients’ quality of life and may cause changes in socialization such as intentional social withdrawal. This may furt...
Användning av allt mindre mobiler och mer lättflyttade datorer gör att gränsen mellan vårt hem och vårt arbete gradvis suddas ut. Användandet av digital teknik möjliggör för skolor att finnas på flera platser, en utveckling som tydliggjorts under pandemin. Sociala medier har för många skolanställda blivit en naturlig del både i det pedagogiska arbe...
Persons with Parkinson’s disease (PwPs) may have difficulty participating in social activities due to motor and non-motor symptoms that may lead to social isolation and loneliness. This paper addresses how to manage social isolation and loneliness among PwPs using digital solutions. Information and Communication Technologies (ICT) have the potentia...
Digital government often addresses how, where, and by whom digital transformation is brought into the complex institutional framed practices of governments and governance of society. However, digital transformation also points at critical demands to address the basic underlying institutional design of governments. The ongoing digital transformation...
In today’s complex environments, safeguarding organizations’ information assets is difficult and requires more than solely technical skills. In order to meet the need for future information security specialists, in 2018 the Informatics department at Örebro University launched an International Master’s Program in Information Security Management. The...
BACKGROUND
Parkinson’s disease (PD) is a complex, non-curable and progressive neurological disease affecting different areas of the human nervous system. PD is associated with both motor and non-motor symptoms, which negatively affect patients’ quality of life and may cause changes in socialisation such as intentional social withdrawal. This may fu...
Misinterpretations and faulty use of Software Development Method (SDM) practices and principles are identified pitfalls in Software Development (SD). Previous research indicates cases with method adoption and use failures; one reason could be the SDM Cargo Cult (CC) behavior, where SD organizations claim to be agile but not doing agile. Previous re...
This study reports the findings from a research project about automated decision making in public sector focusing the changing role of the case worker in digitalized public administrations. The Swedish Transport Agency has fully automatized certain government public services and decisions, such as decisions about driver license learner’s permit. Th...
Public organisations are starting to show an interest in automated decision-making (ADM). So far, existing research focuses on the governmental perspective on this phenomenon. Less attention is paid to citizens’ views on ADM. The aim of this study is to provide empirical insights into citizen awareness of and beliefs about ADM in public-sector serv...
Background:
Advancements in science and various technologies have resulted in people having access to better health care, a good quality of life, and better economic situations, enabling humans to live longer than ever before. Research shows that the problems of loneliness and social isolation are common among older adults, affecting psychological...
BACKGROUND
The advancements in sciences and various technologies have resulted in people having access to better healthcare, a good quality of life and better economic situations enabling humans to live longer than ever before. Research shows that problems of loneliness and social isolation are common among older adults affecting psychological and...
Despite the importance of inter-organisational information sharing (IOIS) in the public sector, such endeavours often fail. Existing research has shown that the values held by collaborating organisations are one important factor affecting these kinds of initiatives. However, research has sought only to a limited extent to address how value conflict...
Sammanfattning Alltfler myndigheter inför automatiserat beslutsfattande, vilket innebär att en dator fattar beslut istället för handläggare och utredare. Detta kapitel undersöker med-borgarnas inställning till att öka det automatiserade beslutsfattandet i myndigheter. Kapitlets analyser visar att en majoritet (64 procent) anser att det är ett mycke...
Internet of Things (IoT) connects machines, devices, sensors and people. This technology is expected to connect billions of devices in the near future. Traditional methods make it very difficult to integrate and maintain so many devices. However, social networks manage to connect and maintain the communication of billions of people using social rel...
I allt större utsträckning införs automatiserat beslutsfattande i offentlig sektor. Det innebär att datorer ersätter handläggare som beslutsfattare. Flera av de ärenden som avgörs med automatiserat beslutsfattande berör medborgarna. Detta kapitel undersöker om medborgarna är medvetna om denna förändring och hur de tror att besluten
förändras när da...
Purpose
To identify factors that influence the acceptance of technology for ageing in place by seniors in the post-implementation stage. This review is among very few that focus on acceptance in post-implementation phase.
Methods
A literature review. We searched six databases (Cinahl, Medline, PsycINFO, PubMed, Science Direct, Scopus). Inclusion c...
Within an organization, it is critical that all employees possess a security awareness and thus play a part in the protection of said organization's information assets. Some employees will have key roles and responsibilities and require specific skills to support them. However, organizations can face challenges in regard to recognizing the required...
The concept of digital divides has been on the agenda in research and policy making for at least the last 20 years. But it is still, a challenge to grasp this concept that is so elusive and transforming. Inclusion, access and equality are still key values for democratic governance and must be addressed in particular when forming and contributing to...
This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019.
The 26 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers present novel research on theoretical and practica...
http://liu.diva-portal.org/smash/get/diva2:1223820/FULLTEXT01.pdf
Purpose
In this paper, using values of individuals in a Swedish healthcare organization, electronic identity management objectives related to security are defined.
Design/methodology/approach
By using value-focused thinking eliciting values from interviews of three groups of healthcare staff, objective hierarchies for three stakeholder groups ar...
summary of the paper presented at SWEG
To address the “insider” threat to information and information systems, an information security policy is frequently recommended as an organisational measure. However, having a policy in place does not necessarily guarantee information security. Employees’ poor compliance with information security policies is a perennial problem for many organisati...
There are hopes that e-government will bring
many benefits, including efficiency, democratization,
participation, and emancipation of citizens. However,
despite some evidence that supports these claims there
are also cases that digitalization can exclude citizens
and build new barriers. This is a special challenge for
already disadvantaged groups f...
Employees’ poor compliance with information security policies is a perennial problem. Current information security analysis methods do not allow information security managers to capture the rationalities behind employees’ compliance and non-compliance. To address this shortcoming, this design science research paper suggests: (a) a Value-Based Compl...
Purpose
The purpose of this paper is to examine the challenges that arise when introducing an electronic identification (eID) card for professional use in a health-care setting.
Design/methodology/approach
This is a case study of an eID implementation project in healthcare. Data were collected through interviews with key actors in a project team a...
Syftet med den här studien är att utvärdera svensk terminologi på informationssäkerhetsområdet med fokus på frågor om målgrupper och grundläggande begrepp. Denna rapport redovisar målgruppsstrategier för ett löpande terminologiarbete baserat på en fallstudie där experter från olika yrkeskategorier har fått definiera en uppsättning grundläggande beg...
Employees’ poor compliance with information security policies is a
perennial problem for many organizations. Existing research shows that about
half of all breaches caused by insiders are accidental, which means that one can
question the usefulness of information security policies. In order to support the
formulation of practical, from the employee...
Purpose – The purpose of the paper is to reveal how identities are constructed when electronic identification (eIDs) cards are introduced through information systems in public organisations. Design/methodology/approach – Through two case studies, the authors generate rich data on the construction of identities through use of eID within public organ...
Purpose – The aim of this paper is to describe a local government effort to realise an open government
agenda. This is done using a storytelling approach.
Design/methodology/approach – The empirical data are based on a case study. The authors
participated in, as well as followed, the process of realising an open government agenda on a local level,...
End user development has grown in strength during the last decades. The advantages and disadvantages of this phenomenon have been debated over the years, but not extensively from an information security culture point of view. We therefore investigate information security design decisions made by an end user during an end user development project. T...
Requirements engineering is a key activity in systems development. This paper
examines six systems development projects that have used end user development
(EUD) as a requirements engineering technique for communicating across social worlds.
For this purpose, we employed the theoretical lens of design boundary object in order
to focus on functional...
This paper presents results from an ongoing research project studying schools that have implemented oneto-
one-laptops (1:1). The research is interpretative and builds on interviews and survey-responses from
students and teachers in two public 1:1 schools in Sweden. We are focusing on the students’ security
awareness and compliance by researching i...
Purpose
– Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.
Design/methodology/approach
– This research was carried out as a longitudinal case study at...
Health is seen as a major key for development and many developing country governments invest in ICT-based Health Information Systems (HIS). The purpose of this paper is to explore physicians hopes and fears for implementing Electronic Health Record (EHR) systems in Bangladeshi hospitals. Data was collected through interviews and observations at two...
One of the problems highlighted within the area of information security is that international standards are implemented in organisations without adopting them to special organisational settings. In this chapter the authors analyse information security goals found in hospital settings. They found that the CIA-triad fails to cover organisational spec...
The purpose of this study is to increase the understanding of immature use of Enterprise Architectures (EAs). In this paper
we present results from an eGovernment initiative in a Swedish local government. This longitudinal case study illustrates
the problems of taking initial steps of moving towards an EA during the development and implementation a...
New technology means new ways of both developing, providing and consuming services. In the strive for government organizations
to build and maintain relationships with its citizens, e-presence is highly important. E-services are one way to go, and it
has been argued that user participation is an important part of developing said services. In this p...
This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually
addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however
argue that a computer hack is a result of different events in a heterogeneous network embodying hum...
Systems development methods (or methods) are often applied in tailored version to fit the actual situation. Method tailoring
is in most the existing literature viewed as either (a) a highly rational process with the method engineer as the driver where
the project members are passive information providers or (b) an unstructured process where the sys...
This research is situated within the field of Information and Communication Technologies for Development (ICT4D) and asks if ICT use can make learning practices change. While constructive learning practices are critical to both individual and societal development, repetitive learning practices are the norm in many developing countries. The study is...
Electronic Government (eGovernment) has attracted considerable investment over many years but there is little agreement on how to measure success. This is problematic as eGovernment has ambitions beyond project success – in particular in developing countries it is expected to yield development. There is also both an academic and a practitioner deba...
This chapter analyses the effects of introducing ICT as a support for the social record in elderly care. The effects of the electronic social record are assessed by analysing the different values the electronic social record supports. These values are discussed in terms of 'value areas' (values related to administration, integration, professional,...
The objective of this paper is to briefly describe the author's planned doctoral work. The purpose of the planned study is to gain an understanding about why local governments decide to purchase and implement computer systems, and what the effects are. The research builds on a number of cases on implementation of a computer system within elderly ca...
This chapter analyses the effects of introducing ICT as a support for the social record in elderly care. The effects of the electronic social record are assessed by analysing the different values the electronic social record supports. These values are discussed in terms of “value areas” (values related to administration, integration, professional,...
Purpose
The purpose of this paper is to analyze the values of IT in elderly care.
Design/methodology/approach
The paper is an empirical investigation based on four in‐depth case studies concerning IT in elderly care. The study draws on Actor‐Network Theory (ANT) and Social Construction of Technology (SCOT) with a focus on different actor groups' s...
Continuous developments in information and communication technologies (ICT) have resulted in an increasing use of these technologies in the practice of medicine and in the provision of medical care. This paper presents a series of perspectives from different areas of expertise on some of the ways in which ICT has changed the social picture in respe...
Many, if not most, developing countries today engage in electronic government (eGovernment) projects. There are big hopes,
not just for modernizing government and making it more effective and efficient; eGovernment is also expected to drive the
general development toward the information society, both by examples of good practice and by major invest...
Continuous developments in information and communication technologies (ICT) have resulted in an increasing use of these technologies in the practice of medicine and in the provision of medical care. This paper presents a series of perspectives from different areas of expertise on some of the ways in which ICT has changed the social picture in respe...
Not only in Sweden are governments designing and maintaining web sites, this to be able to improve interaction with their citizens. It is therefore important to choose the best suiting website design, communicating the intended values. In this paper two Swedish municipality front pages are compared with respect to mediated user roles, user groups,...
The purpose of this paper is to describe an analytical framework, which can be used for comparing how different groups experience the value of IT. As the actors' interests and values are uncovered the framework illuminates the socio-political process of computerization. In order to validate the framework the paper exemplifies how it has been used i...
The purpose of this paper is to describe an analytical framework, which can be used for comparing how different groups experience the value of IT. As the actors interests and values are uncovered the framework illuminates the socio-political process of computerization. In order to validate the framework the paper exemplifies how it has been used in...
The purpose of this paper is to describe an analytical tool that can be used for evaluating the value of IT by ac-knowledging the socio-political process of computerization. In order to validate the tool the paper exemplifies how the evaluation tool has been used in one case study. For pedagogical reasons, the analysis is limited to one actor group...
This paper deals with how divers different groups of people can view the effects of computerization. The introduction of an IT system in home help, CareSys, is used as an example. The main objective is to analyse the effects of computerization from the per- spective of different social groups where the actors are seen as carriers of the computeri-...
The objective of this paper is to present an analytical framework that will help us reconstruct and analyse the process of computerization and its effects. The result of the analysis can be used in order to evaluate effects of computerization. By drawing on empirical data from the purchase and implementation of a software package for elderly care,...
In this chapter, we discuss an evaluation of a computerized information system in an elderly care unit. The evaluation is based on the concept of actability, which is a combination of theories from Human-Computer Interaction and the Language Action Perspective. The reason for uniting different theories is to obtain a more holistic evaluation model....
In this paper, we discuss an evaluation of a computerized information system in an elderly care unit. The evaluation is based on the concept of actability, which is a combination of theories from Human-Computer Interaction and the Language Action Perspective. The reason for uniting different theories is to obtain a more holistic evaluation model. T...
This paper discusses how research-based knowledge in the form of an information systems development method (ISDM) is used in practice. The paper outlines a theoretical model for analyzng the uses of these methods as well as research results in general. The data are mainly based on research on a consultant’s use of a specific ISDM The use of ISDMs i...
In this chapter, we discuss an evaluation of a computerized information system in an elderly care unit. The evaluation is based on the concept of actability, which is a combination of theories from Human-Computer Interaction and the Language Action Perspective. The reason for uniting different theories is to obtain a more holistic evaluation model....
Working with a socio-technical view on information systems security is a challenge. Existing studies show that a great number of security incidents are caused by trusted personnel within organizations due to the tension between the design of information systems security policies, guidelines, rules and tools, and how they actually are used. This pap...
This paper presents findings of information systems security (ISS) goals found in policies, guidelines, and routines, i.e. in the formal system, at a Swedish hospital. The purpose of the paper is to analyze the ISS goals and relate them to confidentiality, integrity and availability (CIA) that are traditional objectives for managing ISS in organiza...
1. Inledning Äldreomsorgen står inför många utmaningar. Äldres andel av den svenska befolkningen har ökat tillsammans med mer sjukvårdsinriktade insatser (Svenska kommunförbundet 2001), vilket gör att behovet för utveckling av äldreomsorgen ökar. Sverige har den äldsta populatio-nen i världen, 17 procent av Sveriges befolkning är 65 år eller äldre...