Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

"I needed to solve their overwhelmness": How System Administration Work was Affected by COVID-19

Published: 11 November 2022 Publication History
  • Get Citation Alerts
  • Abstract

    The ongoing global COVID-19 pandemic made working from home -- wherever working remotely is possible -- the norm for what had previously been office-based jobs across the world. This change in how we work created a challenging situation for system administrators (sysadmins), as they are the ones building and maintaining the digital infrastructure our world relies on.
    In this paper, we examine how system administration work changed early in the pandemic from sysadmins' personal perspectives, through semi-structured interviews and thematic analysis. We find that sysadmins faced a two-sided crisis: While sysadmins' own work environment changed, they also had to react to the new situation and facilitate stable options to work online for themselves and their colleagues, supporting their users in adapting to the crisis. This finding embeds into earlier work on the connection between IT (security) work and the notion of 'care', where we substantiate these earlier findings with results from a repeatable method grounded in coordination theory.
    Furthermore, while we find that sysadmins perceived no major changes in the way they work, by consecutively probing our interviewees, we find that they did experience several counter-intuitive effects on their work. This includes that while day-to-day communication became inherently more difficult, other tasks were streamlined by the remote working format and were seen as having become easier. Finally, by structuring our results according to a model of coordination and communication, we identify changes in sysadmins' coordination patterns. From these we derive recommendations for how system administration work can be coordinated, ranging beyond the immediate pandemic response and the transition to any 'new normal' way of working.

    References

    [1]
    Anne Adams and Anna L Cox. 2008. Questionnaires, in-depth interviews and focus groups. Cambridge University Press.
    [2]
    Mats Alvesson and Stefan Sveningsson. 2003. Good visions, bad micro-management and ugly ambiguity: Contradictions of (non-) leadership in a knowledge-intensive organization. Organization studies 24, 6 (2003), 961--988.
    [3]
    Rob Barrett, Eser Kandogan, Paul P Maglio, Eben M Haber, Leila A Takayama, and Madhu Prabaker. 2004. Field studies of computer system administrators: analysis of system management tools and practices. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW). 388--395.
    [4]
    Betsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy. 2016. Site reliability engineering: How Google runs production systems. O'Reilly Media, Inc.
    [5]
    Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, and Katsiaryna Labunets. 2022. Security at the end of the tunnel: The anatomy of VPN mental models among experts and non-experts in a corporate context. In Proceedings of the 31st USENIX Security Symposium.
    [6]
    Pernille Bjørn, Morten Esbensen, Rasmus Eskild Jensen, and Stina Matthiesen. 2014. Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration. ACM Transactions on Computer-Human Interaction (TOCHI) 21, 5 (2014), 1--26.
    [7]
    Arjen Boin and Fredrik Bynander. 2015. Explaining success and failure in crisis coordination. Geografiska Annaler: Series A, Physical Geography 97, 1 (2015), 123--135.
    [8]
    Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77--101.
    [9]
    Virginia Braun and Victoria Clarke. 2020. One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative Research in Psychology (2020), 1--25.
    [10]
    Jonathan Bundy, Michael D Pfarrer, Cole E Short, and W Timothy Coombs. 2017. Crises and crisis management: Integration, interpretation, and research development. Journal of Management 43, 6 (2017), 1661--1692.
    [11]
    Renée Chow, Klaus Christoffersen, and David D Woods. 2000. A model of communication in support of distributed anomaly response and replanning. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 44:1. SAGE Publications Sage CA: Los Angeles, CA, 34--37.
    [12]
    Tom Christensen and Liang Ma. 2020. Coordination structures and mechanisms for crisis management in China: Challenges of complexity. Public Organization Review 20, 1 (2020), 19--36.
    [13]
    Rafael da Camara, Marcelo Marinho, Suzana Sampaio, and Saulo Cadete. 2020. How do Agile Software Startups deal with uncertainties by COVID-19 pandemic? arXiv preprint arXiv:2006.13715 (2020).
    [14]
    Jennifer Davis and Ryn Daniels. 2016. Effective DevOps: building a culture of collaboration, affinity, and tooling at scale. O'Reilly Media, Inc.
    [15]
    Cleidson RB de Souza, Claudio S Pinhanez, and Victor F Cavalcante. 2011. Information needs of system administrators in information technology service factories. In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology. 1--10.
    [16]
    Gianluca F Delfino and Berend van der Kolk. 2021. Remote working, management control changes and employee responses during the COVID-19 crisis. Accounting, Auditing and Accountability Journal (2021).
    [17]
    Dennis J Devine. 2002. A review and integration of classification systems relevant to teams in organizations. Group Dynamics: Theory, Research, and Practice 6, 4 (2002), 291.
    [18]
    Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, and Tobias Fiebig. 2018. Investigating system operators' perspective on security misconfigurations. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1272--1289.
    [19]
    J Alberto Espinosa, F Javier Lerch, and Robert E Kraut. 2004. Explicit versus implicit coordination mechanisms and task dependencies: One size does not fit all. American Psychological Association, 107--129.
    [20]
    Marisa R Grayson. 2020. Cognitive work of hypothesis exploration during anomaly response. Commun. ACM 63, 4 (2020), 97--103.
    [21]
    Eben M Haber and John Bailey. 2007. Design guidelines for system administration tools developed through ethnographic field studies. In Proceedings of the ACM Symposium on Computer Human Interaction for the Management of Information Technology (CHIMIT).
    [22]
    Eben M Haber and Eser Kandogan. 2007. Security administrators: A breed apart. Proceedings of the SOUPS Workshop on Usable IT Security Management (USM) (2007), 3--6.
    [23]
    Eben M Haber, Eser Kandogan, and Paul P Maglio. 2010. Collaboration in System Administration: For sysadmins, solving problems usually involves collaborating with others. How can we make it more effective? Queue 8, 12 (2010), 10--20.
    [24]
    Jim Hollan and Scott Stornetta. 1992. Beyond being there. In Proceedings of the SIGCHI conference on Human factors in computing systems. 119--125.
    [25]
    Ju Yeon Jung, Tom Steinberger, John L King, and Mark S Ackerman. 2021. Negotiating Repairedness: How Artifacts Under Repair Become Contingently Stabilized. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--29.
    [26]
    Mannat Kaur. 2017. Causes, identification and repair of loss of common ground in coordination in ATM (air traffic management), Master Thesis, TU Delft.
    [27]
    Mannat Kaur, Michel van Eeten, Marijn Janssen, Kevin Borgolte, and Tobias Fiebig. 2021. Human Factors in Security Research: Lessons Learned from 2008--2018. arXiv preprint arXiv:2103.13287 (2021).
    [28]
    Kevin M Kniffin, Jayanth Narayanan, Frederik Anseel, John Antonakis, Susan P Ashford, Arnold B Bakker, Peter Bamberger, Hari Bapuji, Devasheesh P Bhave, Virginia K Choi, et al. 2021. COVID-19 and the workplace: Implications, issues, and insights for future research and action. American Psychologist 76, 1 (2021), 63.
    [29]
    Laura Kocksch, Matthias Korn, Andreas Poller, and Susann Wagenknecht. 2018. Caring for IT security: Accountabilities, moralities, and oscillations in IT security practices. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--20.
    [30]
    Kat Krol, Jonathan M Spring, Simon Parkin, and M Angela Sasse. 2016. Towards robust experimental design for user studies in security and privacy. In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). 21--31.
    [31]
    Jess Kropczynski, Reza Ghaiumy Anaraky, Mamtaj Akter, Amy J Godfrey, Heather Lipford, and Pamela J Wisniewski. 2021. Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--23.
    [32]
    Harjinder Singh Lallie, Lynsay A Shepherd, Jason RC Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, and Xavier Bellekens. 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security 105 (2021), 102248.
    [33]
    Beng-Chong Lim and Katherine J Klein. 2006. Team mental models and team performance: A field study of the effects of team mental model similarity and accuracy. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior 27, 4 (2006), 403--418.
    [34]
    Thomas A Limoncelli. 2020. Five Nonobvious Remote Work Techniques: Emulating the efficiency of in-person conversations. Queue 18, 3 (2020), 29--38.
    [35]
    Thomas A Limoncelli, Strata R Chalup, and Christina J Hogan. 2014. The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems. Vol. 2. Pearson Education.
    [36]
    Thomas A Limoncelli, Christina J Hogan, and Strata R Chalup. 2016. The Practice of System and Network Administration: Volume 1: DevOps and other Best Practices for Enterprise IT. Vol. 1. Addison-Wesley Professional.
    [37]
    Leah Maestri and Ron Wakkary. 2011. Understanding repair as a creative process of everyday design. In Proceedings of the 8th ACM Conference on Creativity and Cognition. 81--90.
    [38]
    Paul P Maglio, Eser Kandogan, and Eben M Haber. 2008. Distributed Cognition and Joint Activity in Computer System Administration. In Resources, Co-Evolution and Artifacts. Springer, 145--166.
    [39]
    Laura MD Maguire. 2020. Managing the hidden costs of coordination. Commun. ACM 63, 4 (2020), 90--96.
    [40]
    Thomas W Malone and Kevin Crowston. 1990. What is coordination theory and how can it help design cooperative work systems?. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW). 357--370.
    [41]
    Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--23.
    [42]
    Tyler Moore, Scott Dynes, and Frederick R Chang. 2016. Identifying how firms manage cybersecurity investment. Workshop on the Economics of Information Security (WEIS) (2016).
    [43]
    Judith S Olson and Gary M Olson. 2014. Bridging Distance: Empirical studies of distributed teams. In Human-Computer Interaction and Management Information Systems: Applications. Advances in Management Information Systems. Routledge, 117--134.
    [44]
    Erika Shehan Poole, Marshini Chetty, Tom Morgan, Rebecca E Grinter, and W Keith Edwards. 2009. Computer help at home: methods and motivations for informal technical support. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 739--748.
    [45]
    Alberto Barbosa Raposo, Léo Pini Magalhães, Ivan Luiz Marques Ricarte, and Hugo Fuks. 2001. Coordination of collaborative activities: A framework for the definition of tasks interdependencies. In Proceedings of the Seventh IEEE International Workshop on Groupware (CRIWG). 170--179.
    [46]
    Lena Reinfelder, Robert Landwirth, and Zinaida Benenson. 2019. Security managers are not the enemy either. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, 1--7.
    [47]
    Thea Riebe, Marc-André Kaufhold, and Christian Reuter. 2021. The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--30.
    [48]
    Eduardo Salas, Carolyn Prince, David P Baker, and Lisa Shrestha. 1995. Situation awareness in team performance: Implications for measurement and training. Human Factors 37, 1 (1995), 123--136.
    [49]
    Christian Tiefenau, Maximilian Häring, Katharina Krombholz, and Emanuel von Zezschwitz. 2020. Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. In Symposium on Usable Privacy and Security (SOUPS). 239--258.
    [50]
    US National Institute of Standards and Technology (NIST). 2021. System administrator (SA). NIST Information Technology Laboratory: Computer Science Resource Center (CSRC) https://csrc.nist.gov/glossary/term/system_administrator. Accessed: 2021-07-08.
    [51]
    Nicole F Velasquez and Suzanne P Weisband. 2009. System administrators as broker technicians. In Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology. 1--8.
    [52]
    Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, and Konstantin Beznosov. 2010. Preparation, detection, and analysis: the diagnostic work of IT security incident response. Information Management & Computer Security (2010).
    [53]
    Richard D White Jr. 2010. The micromanagement disease: Symptoms, diagnosis, and cure. Public Personnel Management 39, 1 (2010), 71--76.
    [54]
    Jeroen Wolbers, Kees Boersma, and Peter Groenewegen. 2018. Introducing a fragmentation perspective on coordination in crisis management. Organization Studies 39, 11 (2018), 1521--1546.
    [55]
    World Health Organization (WHO). 2020. WHO Director-General's opening remarks at the media briefing on COVID-19. https://www.who.int/director-general/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19--11-march-2020. Accessed: 2022-04-05.

    Cited By

    View all
    • (2024)Burnout in Cybersecurity Incident Responders: Exploring the Factors that Light the FireProceedings of the ACM on Human-Computer Interaction10.1145/36373048:CSCW1(1-35)Online publication date: 26-Apr-2024
    • (2024)Not as easy as just update: Survey of System Administrators and Patching BehavioursProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642456(1-17)Online publication date: 11-May-2024
    • (2024)‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large universityJournal of Cybersecurity10.1093/cybsec/tyae00710:1Online publication date: 20-Jun-2024
    • Show More Cited By

    Index Terms

    1. "I needed to solve their overwhelmness": How System Administration Work was Affected by COVID-19

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
      CSCW
      November 2022
      8205 pages
      EISSN:2573-0142
      DOI:10.1145/3571154
      Issue’s Table of Contents
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 November 2022
      Published in PACMHCI Volume 6, Issue CSCW2

      Check for updates

      Author Tags

      1. COVID-19
      2. human factors
      3. interviews
      4. qualitative study
      5. sysadmin
      6. sysops
      7. system administration
      8. system operations

      Qualifiers

      • Research-article

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)252
      • Downloads (Last 6 weeks)21

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Burnout in Cybersecurity Incident Responders: Exploring the Factors that Light the FireProceedings of the ACM on Human-Computer Interaction10.1145/36373048:CSCW1(1-35)Online publication date: 26-Apr-2024
      • (2024)Not as easy as just update: Survey of System Administrators and Patching BehavioursProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642456(1-17)Online publication date: 11-May-2024
      • (2024)‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large universityJournal of Cybersecurity10.1093/cybsec/tyae00710:1Online publication date: 20-Jun-2024
      • (2024)The Role of Trust and Ethics in IT Administration and Its Impact on an OrganisationCybersecurity Challenges in the Age of AI, Space Communications and Cyborgs10.1007/978-3-031-47594-8_16(307-320)Online publication date: 20-Feb-2024
      • (2023)"Oh yes! over-preparing for meetings is my jam :)": The Gendered Experiences of System AdministratorsProceedings of the ACM on Human-Computer Interaction10.1145/35796177:CSCW1(1-38)Online publication date: 16-Apr-2023

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media