Institutional Research Information Service
UCL Logo
Please report any queries concerning the funding data grouped in the sections named "Externally Awarded" or "Internally Disbursed" (shown on the profile page) to your Research Finance Administrator. Your can find your Research Finance Administrator at https://www.ucl.ac.uk/finance/research/rs-contacts.php by entering your department
Please report any queries concerning the student data shown on the profile page to:

Email: portico-services@ucl.ac.uk

Help Desk: http://www.ucl.ac.uk/ras/portico/helpdesk
Publication Detail
Appropriation of security technologies in the workplace
  • Publication Type:
  • Authors:
    Parkin S, Krol K
  • Publication date:
  • Status:
  • Name of conference:
    Experiences of Technology Appropriation: Unanticipated Users, Usage, Circumstances, and Design (ECSCW 2015)
  • Conference place:
    Oslo, Norway
  • Conference start date:
  • Conference finish date:
Using two case studies, we examine the appropriation of security technologies by employees in organisations. We find that employees adapt security technologies and procedures in many different ways, and that the implications of adaptation for employees’ productive tasks and the wider organisation are not considered in process. We want to understand how appropriation within technology use can be observed, so that organisations can reconcile unanticipated security adaptions with standard practices. Based on lessons learned from studies of security technologies in organisations, we identify areas of focus where appropriation activities could inform the design of organisational security: individual security context; interpersonal dynamics, and; training and support.
Publication data is maintained in RPS. Visit https://rps.ucl.ac.uk
 More search options
UCL Researchers
Dept of Computer Science
University College London - Gower Street - London - WC1E 6BT Tel:+44 (0)20 7679 2000

© UCL 1999–2011

Search by