WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" of an office or on the hard drive of a computer. Instead, information may be controlling us - keeping us from doing the things we need to do, getting us to waste money and precious time. The growth of available information, plus the technologies for its creation, storage, retrieval, distribution and use, is astonishing and sometimes bewildering. Can there be a similar growth in our understanding for how best to manage information and informational tools This book provides a comprehensive overview of personal information management (PIM) as both a study and a practice of the activities people do and need to be doing so that information can work for them in their daily lives. Introductory chapters of Keeping Found Things Found: The Study and Practice of Personal Information Management provide an overview of PIM and a sense for its many facets. The next chapters look more closely at the essential challenges of PIM, including finding, keeping, organizing, maintaining, managing privacy, and managing information flow. The book also contains chapters on search, email, mobile PIM, web-based support, and other technologies relevant to PIM. * Focuses exclusively on one of the most interesting and challenging problems in today's world * Explores what good and better PIM looks like, and how to measure improvements * Presents key questions to consider when evaluating any new PIM informational tools or systems
- Abrams, D., Baecker, R., & Chignell, M. (1998, April). Information archiving with bookmarks: Personal web space construction and organization. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1998 (pp. 41-48), Los Angeles. Google Scholar
- Ackerman, M. S. (2000, April). Developing for privacy: Civility frameworks and technical design. Paper presented at the Conference on Computers, Freedom, and Privacy (pp. 19-23), Toronto, ONT, Canada. Google Scholar
- Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999, November 3-5). Privacy in e-commerce: Examining user scenarios and privacy preferences. Paper presented at the 1st ACM Conference on Electronic Commerce (pp. 1-8), Denver, CO. Google Scholar
- Adar, E., Karger, D., & Stein, L. A. (1999, November 2-6). Haystack: Per-user information environment. Paper presented at the 8th Conference on Information and Knowledge Management, CIKM 1999 , Kansas City, MO. Google Scholar
- Aftab, O., Cheung, P., Kim, A., Thakkar, S., & Yeddanapudi, N. (2001). Information Theory and the Digital Age (No. 6.933). Cambridge, MA: Massachusetts Institute of Technology.Google Scholar
- Allen, D. (2001). Getting Things Done: The Art of Stress-Free Productivity . New York: Penguin.Google Scholar
- Anderson, J. R. (1976). Language, Memory, and Thought . Hillsdale, NJ: Erlbaum.Google Scholar
- Arms, C. (2000). Keeping memory alive: Practices for preserving digital content at the National Digital Library Program of the Library of Congress. RLG DigiNews, 4 (3).Google Scholar
- Bälter, O. (1997). Strategies for organising email. In H. Thimbleby, B. O'Conaill & P. J. Thomas (Eds.), Proceedings of the 12th Conference of the British Computer Society Human Computer Interaction Specialist Group--People and Computers XII, Vol. 12 (pp. 21-38), Bristol, UK: Springer. Google Scholar
- Bälter, O. (2000, April). Keystroke level analysis of email message organization. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2000 (pp. 105-112), The Hague, The Netherlands. Google Scholar
- Bälter, O., & Sidner, C. L. (2002, October 19-23). Bifrost inbox organizer: Giving users control over the inbox. Paper presented at the 2nd Nordic Conference on Human-Computer Interaction (pp. 111-118), Aarhus, Denmark. Google Scholar
- Bao, X., Herlocker, J. L., & Dietterich, T. G. (2006). Fewer clicks and less frustration: Reducing the cost of reaching the right folder. In Proceedings of the 11th International Conference on Intelligent User Interfaces (pp. 178-185), Sydney, Australia (ACM Press). Google Scholar
- Barreau, D. K. (1995). Context as a factor in personal information management systems. Journal of the American Society for Information Science, 46 (5), 327-339. Google ScholarDigital Library
- Barreau, D. K., & Nardi, B. (1995). Finding and reminding: File organization from the desktop. SIGCHI Bulletin, 27 (3), 39-43. Google ScholarDigital Library
- Barrett, L. F., & Barrett, D. J. (2001). An introduction to computerized experience sampling in psychology. Social Science Computer Review, 19 (2), 175-185. Google ScholarDigital Library
- Barsalou, L. W. (1983). Ad hoc categories. Memory & Cognition, 11 (3), 211-227.Google Scholar
- Barsalou, L. W. (1991). Deriving categories to achieve goals. In G. H. Bower (Ed.), The Psychology of Learning and Motivation: Advances in Research and Theory (Vol. 27). New York: Academic Press.Google Scholar
- Bates, M. J. (1988). How to use controlled vocabularies more effectively in online searching. Online, 12 (6), 45-56. Google ScholarDigital Library
- Bates, M. J. (1989). The design of browsing and berrypicking techniques for the online search interface. Online, 13 (5), 407-424.Google ScholarCross Ref
- Bates, M. J. (2002). Speculations on browsing, directed searching, and linking in relation to the Bradford distribution. In H. Bruce, R. Fidel, P. Ingwersen & P. Vakkari (Eds.), Emerging Frameworks and Methods: Proceedings of the Fourth International Conference on Conceptions of Library and Information Science, CoLIS 4 (pp. 137-150), Seattle. Greenwood Village, CO: Libraries Unlimited.Google Scholar
- Belkin, N. J. (1993). Interaction with texts: Information retrieval as information-seeking behaviour. Paper presented at the Information Retrieval 1993: von der Modellierung zur Anwendung (First Conference of the Gesellschaft fur Informatik Fachgruppe Information Retrieval) (pp. 55-66), Konstanz, Germany.Google Scholar
- Belkin, N. J., & Croft, W. B. (1992). Information filtering and information retrieval: Two sides of the same coin? Communications of the ACM, 35 (12), 29-38. Google ScholarDigital Library
- Belkin, N. J., Oddy, R. N., & Brooks, H. M. (1982). ASK for information retrieval: Parts 1 & 2. Journal of Documentation, 38 (2/3), 61-71, 145-164.Google ScholarCross Ref
- Belkin, N. J., Seeger, T., & Wersig, G. (1983). Distributed expert problem treatment as a model for information system analysis and design. Journal of Information Science, 5 (5), 153-167.Google ScholarCross Ref
- Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D. G., & Ducheneaut, N. (2004, April 24-29). What a to-do: Studies of task management towards the design of a personal task list manager. Paper presented at the Conference on Human Factors in Computing Systems, CHI 2004 (pp. 735-742), Vienna, Austria. Google Scholar
- Bellotti, V., Ducheneaut, N., Howard, M., & Smith, I. (2003). Taking email to task: The design and evaluation of a task management centered email tool. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2003 (pp. 345-352), Fort Lauderdale, FL. Google Scholar
- Bellotti, V., Ducheneaut, N., Howard, M., Neuwirth, C., & Smith, I. (2002, June 25-28). Innovation in extremis: Evolving an application for the critical work of email and information management. Paper presented at the Conference on Designing Interactive Systems, DIS2002 (pp. 181-192), London. Google Scholar
- Bellotti, V., Ducheneaut, N., Howard, M., Smith, I., & Grinter, R. (2005). Quality vs. quantity: Email-centric task-management and its relation with overload. Human-Computer Interaction, 20 (1-2), 89-138. Google ScholarDigital Library
- Bellotti, V., & Sellen, A. (1993, September 13-17). Design for privacy in ubiquitous computing environments. Paper presented at the 3rd European Conference on Computer Supported Cooperative Work, ECSCW'93 (pp. 77-92), Milan, Italy. Google Scholar
- Bensaude-Vincent, B. (2001). Graphic representations of the periodic system of chemical elements. In U. Klein (Ed.), Tools and Modes of Representation in the Laboratory Sciences. Dordrecht, Germany: Kluwer Academic.Google Scholar
- Bergman, O., Beyth-Marom, R., and Nachmias, R. (2003). The user-subjective approach to personal information management systems. Journal of the American Society for Information Science and Technology, 54 (9), 872-878. Google ScholarDigital Library
- Berlin, L. M., Jeffries, R., O'Day, V. L., Paepcke, A., & Wharton, C. (1993, April 24-29). Where did you put it? Issues in the design and use of group memory. Paper presented at the Conference on Human Factors and Computing Systems, INTERACT 1993 and CHI 1993 (pp. 23-30), Amsterdam, The Netherlands. Google Scholar
- Berndt, E., & Morrison, J. (1981). Capacity utilization measures: Underlying economic theory and an alternative approach. American Economic Review, 71 (2), 48-52.Google Scholar
- Berners-Lee, T. (1998). Semantic Web roadmap: An attempt to give a high-level plan of the architecture of the Semantic Web--www.w3.org/DesignIssues/Semantic.html.Google Scholar
- Beyer, H., & Holtzblatt, K. (1998). Contextual Design: Defi ning Customer-Centered Systems . San Francisco: Morgan Kaufmann. Google Scholar
- Bianco, A. (2004, July 12). The vanishing mass market. BusinessWeek .Google Scholar
- Blair, A. (1961 [January 2003]). Reading strategies for coping with information overload ca.1550-1700. Journal of the History of Ideas, 64 (1), 11-28 (University of Pennsylvannia Press).Google Scholar
- Blair, D. C., & Maron, M. E. (1985). An evaluation of retrieval effectiveness for a full-text documentretrieval system. Communications of the ACM, 28 (3), 289-299. Google ScholarDigital Library
- Bliss, H. E. (1933). The Organization of Knowledge in Libraries . New York: H. W. Wilson.Google Scholar
- Boardman, R. (2004). Improving Tool Support for Personal Information Management. London: Imperial College.Google Scholar
- Boardman, R., & Sasse, M. A. (2004). "Stuff goes into the computer and doesn't come out": A cross-tool study of personal information management. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 583-590), Vienna, Austria. Google Scholar
- Bondarenko, O., & Janssen, R. (2005, April). Documents at hand: Learning from paper to improve digital technologies. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2005 (pp. 121-130), Portland, OR. Google Scholar
- Bower, G. H., Clark, M. C., Lesgold, A. M., & Winzenz, D. (1969). Hierarchical retrieval schemes in recall of categorized word lists. Journal of Verbal Learning and Verbal Behavior, 8 , 323-343.Google ScholarCross Ref
- Braman, S. (1989). Defi ning Information: An Approach for Policymakers. Telecommunications Policy, 13 , 233-242.Google ScholarCross Ref
- Breese, J. S., Heckermen, D., & Kadie, C. M. (1998). Empirical Analysis of Predictive Algorithms for Collaborative Filtering , No. MSR-TR-98-12, Microsoft Research.Google Scholar
- Briet, S. (1951). Qu'est-ce que la Documentation . Paris: EDIT.Google Scholar
- Broadbent, D. E. (1958). Perception and Communication . London: Pergamon Press.Google Scholar
- Brooke, J. (1998). Science and religion: Lessons from history? Science, 282 (5396), 1985-1986.Google ScholarCross Ref
- Bruce, H. (2005). Personal, anticipated information need. Information Research, 10 (3).Google Scholar
- Bruce, H., Jones, W., & Dumais, S. (2004). Information behavior that keeps found things found. Information Research, 10 (1).Google Scholar
- Brush, A.J.B., Bargeron, D., Gupta, A., & Cadiz, J. J. (2001). Robust annotation positioning in digital documents. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 285-292), Seattle (ACM Press). Google Scholar
- Buckland, M. K. (1991). Information as thing. Journal of the American Society for Information Science, 42 (5), 351-360.Google ScholarCross Ref
- Buckland, M. K. (1997). What is a "document"? Journal of the American Society of Information Science, 48 (9), 804-809. Google ScholarDigital Library
- Budzik, J., Hammond, K., & Birnbaum, L. (2001). Information access in context. Knowledge Based Systems, 14 (1-2), 37-53.Google ScholarDigital Library
- Bush, V. (1945, July). As we may think. The Atlantic Monthly, 176 , 641-649.Google Scholar
- Buzan, T., & Buzan, B. (2004). The Mind Map Book: How to Use Radiant Thinking to Maximize Your Brain's Untapped Potential . London: BBC.Google Scholar
- Capra, R., & Perez-Quiñones, M. A. (2005). Using Web search engines to fi nd and refi nd information. IEEE Computer, 38 (10), 36-42. Google ScholarDigital Library
- Capurro, R., & Hjorland, B. (2003). The concept of information. In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST) , 37 , 343-411.Google ScholarCross Ref
- Card, S. K., Moran, T. P., & Newell, A. (1983). The Psychology of Human-Computer Interaction . Hillsdale, NJ: Erlbaum. Google Scholar
- Carmody, S., Gross, W., Nelson, T., Rice, D., & Van Dam, A. (1969). A hypertext editing system for the /360. In M. Faiman & J. Nievergelt (Eds.), Pertinent Concepts in Computer Graphics (pp. 291-330). Urbana, IL: University of Illinois Press.Google Scholar
- Carstensen, P. H., & Nielsen, M. (2001, September 30-October 3). Characterizing modes of coordination: A comparison between oral and artifact based coordination. In Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work (pp. 81-90), Boulder, CO. Google Scholar
- Chowdhury, A., Frieder, O., Grossman, D., & McCabe, M. C. (2002). Collection statistics for fast duplicate document detection. ACM Transactions on Information Systems , 20 (2), 171-191. Google ScholarDigital Library
- Churchill, E. F., Trevor, J., Bly, S., Nelson, L., & Cubranic, D. (2000). Anchored conversations: Chatting in the context of a document. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 454-461), The Hague, The Netherlands (ACM Press). Google Scholar
- Claborne, G., & Jones, W. (2005). Linnaeus, Mendeleev, Dewey and Ranganathan: What can they tell us today about the organization of information? Technical Report No. IS-TR-2005-11-01. Seattle: University of Washington.Google Scholar
- Cockburn, A., & McKenzie, B. (2000, September 5-8). An evaluation of cone trees. In People and Computers XV, Proceedings of the 2000 British Computer Society Conference on Human-Computer Interaction (pp. 425-436), University of Sunderland (Springer-Verlag).Google Scholar
- Cole, I. (1982). Human aspects of office filing: Implications for the electronic office. Paper presented at the Human Factors Society 26th Annual Meeting, Seattle.Google Scholar
- Combs, B., & Slovic, P. (1979). Newspaper coverage of causes of death. Journalism Quarterly, 56 (4), 837-843.Google ScholarCross Ref
- Computer Research Association Conference on Grand Research Challenges in Information Security and Assurance (2003, November 16-19), Warrenton, VA--www.cra.org/ Activities/grand.challenges/security/.Google Scholar
- Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. (2005). Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 81-90), Portland, OR (ACM Press). Google Scholar
- Consolvo, S., & Walker, M. (2003). Using the experience sampling method to evaluate ubicomp applications. IEEE Pervasive Computing Mobile and Ubiquitous Systems, 2 (2), 24-31. Google ScholarDigital Library
- Cooper, J. W., Coden, A. R., & Brown, E. W. (2002). Detecting similar documents using salient terms. In Proceedings of the 11th International Conference on Information and Knowledge Management (pp. 245-251), McLean, VA (ACM Press). Google Scholar
- Cornelius, I. (2002). Theorizing information. Annual Review of Information Science and Technology, 36 , 393-425.Google Scholar
- Covey, S. R. (1989). The Seven Habits of Highly Effective People . New York: Simon and Schuster.Google Scholar
- Cranor, L. F. (2002). Web Privacy with P3P . Cambridge, MA: O'Reilly. Google Scholar
- Cranor, L. F. (2005). Privacy policies and privacy preferences. In L. F. Cranor & S. Garfi nkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use (pp. 447-471). Sebastopol, CA: O'Reilly Media.Google Scholar
- Craik, F.I.M., & Lockhart, R. S. (1972). Levels of processing: A framework for memory research. Journal of Verbal Learning and Verbal Behavior, 11 , 671-684.Google Scholar
- Csikszentmihalyi, M. (1991). Flow: The Psychology of Optimal Experience . New York: HarperCollins.Google Scholar
- Cutrell, E., & Dumais, S. T. (2006). Exploring personal information. Communications of the ACM, 49 (4), 50-51. Google ScholarDigital Library
- Cutrell, E., Dumais, S. T., & Teevan, J. (2006). Searching to eliminate personal information management. Communications of the ACM, 49 (1), 58-64. Google ScholarDigital Library
- Cutrell, E., Robbins, D., Dumais, S., & Sarin, R. (2006). Fast, fl exible filtering with phlat. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 261-270). Montreal, QUE, Canada (ACM Press). Google Scholar
- Czerwinski, M., Dumais, S., Robertson, G., Dziadosz, S., Tiernan, S., & van Dantzich, M. (1999). Visualizing implicit queries for information management and retrieval. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 560-567), Pittsburgh (ACM Press). Google Scholar
- Czerwinski, M., Gage, D., Gemmel, J., Marshall, C. C., Perez-Quinones, M., Skeels, M. M., et al. (2006). Digital memories in an era of ubiquitous computing and abundant storage. Communications of the ACM, Special Issue on Personal Information Management, 49 (1), 44-50. Google Scholar
- Czerwinski, M., Horvitz, E., & Wilhite, S. (2004, April 24-29). A diary study of task switching and interruptions. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 175-182), Vienna, Austria. Google Scholar
- Davies, G., & Thomson, D., Eds. (1988). Memory in Context: Context in Memory. Chichester, England: John Wiley & Sons.Google Scholar
- Deerwester, S., Dumais, S., Landauer, T. K., Furnas, G. W., & Harshman, R. A. (1990). Indexing by latent semantic analysis. Journal of the Society for Information Science, 41 (6), 391-407.Google ScholarCross Ref
- Dervin, B. (1992). From the mind's eye of the user: The sense-making qualitative-quantitative methodology. In J. Glazier & R. Powell (Eds.), Qualitative Research in Information Management (pp. 61-84). Englewood, CO: Libraries Unlimited.Google Scholar
- Dervin, B., and Frenette, M. (2003). Sense-making methodology: Communicating communicatively with campaign audiences. In B. Dervin and L. Foreman-Wernet (Eds.), Sense-Making Methodology Reader. Selected Writings of Brenda Dervin (pp. 233-249). Cresskill, NJ: Hampton Press.Google Scholar
- Dillon, A., & Vaughan, M. (1997). It's the journey and the destination: Shape and the emergent property of genre in evaluating digital documents. New Review of Multimedia and Hypermedia, 3 , 91-106.Google ScholarCross Ref
- Dong, X., & Halevy, A. Y. (2005, January 4-7). A platform for personal information management and integration. Paper presented at the 2nd Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, CA.Google Scholar
- Dourish, P., Edwards, W. K., LaMarca, A., & Salisbury, M. (1999, November 7-10). Using properties for uniform interaction in the Presto Document System. Paper presented at the 12th Annual ACM Symposium on User Interface Software and Technology, UIST 1999 (pp. 55-64), Asheville, NC. Google Scholar
- Dumais, S. T., Cutrell, E., Sarin, R., & Horvitz, R. (2004, July 25-29). Implicit queries (IQ) for contextualized search. In Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (p. 594), Sheffi eld, UK (ACM Press). Google Scholar
- Dumais, S., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R., & Robbins, D. (2003, July). Stuff I've seen: A system for personal information retrieval and re-use. Paper presented at the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2003 (pp. 72-79), Toronto, ONT, Canada. Google Scholar
- Durso, F. T., & Gronlund, S. (1999). Situation awareness. In F. T. Durso, R. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M. T. H. Chi (Eds.), The Handbook of Applied Cognition (pp. 284-314). Chichester, England: John Wiley & Sons.Google Scholar
- Eisenberg, M., Lowe, C. A., & Spitzer, K. L. (2004). Information Literacy: Essential Skills for the Information Age (2nd ed.). Westport, CT: Libraries Unlimited.Google Scholar
- Engelbart, D. C. (1961). Special considerations of the individual as a user, generator and retriever of information. American Documentation, 12 (2), 121-125.Google ScholarCross Ref
- Engelbart, D. C. (1963). A conceptual framework for the augmentation of man's intellect. In Vistas in Information Handling . London: VI Spartan Books.Google Scholar
- Engelbart, D., & English, W. (1994 [video made in 1968]). A Research Center for Augmenting Human Intellect. Reprinted in ACM SIGGRAPH Video Review, 106 .Google Scholar
- Feldman, S. (2004). The high cost of not fi nding information. KM World, 13 (3)--http://www. kmworld.com/Articles/ReadArticle.aspx?ArticleID=9534.Google Scholar
- Fertig, S., Freeman, E., & Gelernter, D. (1996, April 13-18). Lifestreams: An alternative to the desktop metaphor. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1996 (pp. 410-411), Vancouver, BC, Canada. Google Scholar
- Fidel, R., Bruce, H., Pejtersen, A., Dumais, S., Grudin, J., & Poltrock, S. (2000). Collaborative information retrieval. In L. Hoglund (Ed.), The New Review of Information Behavior Research: Studies of Information Seeking in Context . London: Taylor Graham.Google Scholar
- Fidel, R., & Pejtersen, A. M. (2004). From information behaviour research to the design of information systems: The Cognitive Work Analysis framework. Information Research, 10 (1).Google Scholar
- Fiske, S. T., & Taylor, S. E. (1991). Social Cognition (2nd ed.). New York: McGraw-Hill.Google Scholar
- Flanagan, J. C. (1954). The Critical Incident Technique. Psychological Bulletin, 51 (4), 327-358.Google Scholar
- Folk, C., & Gibson, B. (Eds.). (2001). Attraction, Distraction and Action: Multiple Perspectives on Attentional Capture (Vol. 133). Amsterdam: Elsevier Science BV.Google Scholar
- Foltz, P. W., & Dumais, S. T. (1992). Personalized information delivery: An analysis of information filtering methods. Communications of the ACM, 35 (12), 51-60. Google ScholarDigital Library
- Fonseca, F. T., & Martin, J. E. (2004). Toward an alternative notion of information systems ontologies: Information engineering as a hermeneutic enterprise. Journal of the American Society for Information Science and Technology, 56 (1), 46-57. Google ScholarCross Ref
- Franconeri, S. L., Hollingworth, A., & Simons, D. J. (2005). Do new objects capture attention? Psychological Science, 16 (4), 275-281.Google ScholarCross Ref
- Freeman, E., & Gelernter, D. (1996). Lifestreams: A storage model for personal data. ACM SIGMOD Record (ACM Special Interest Group on Management of Data), 25 (1), 80-86. Google ScholarDigital Library
- Freitas, A. L., & Higgins, E. T. (2002). Enjoying goal-directed action: The role of regulatory fi t. Psychological Science, 13 (1), 1-6.Google ScholarCross Ref
- Friedman, B., Kahn, P. H., Jr., Hagman, J., Severson, R. L., & Gill, B. (2006). The watcher and the watched: Social judgments about privacy in a public place. Human-Computer Interaction Journal, 21 (2), 235-272. Google ScholarDigital Library
- Furnas, G. W., Landauer, T. K., Gomez, L. M., & Dumais, S. T. (1987). The vocabulary problem in human-system communication. Communications of the ACM 30 (11), 964-971. Google ScholarDigital Library
- Furnas, G. W., & Russell, D. M. (2005). Making sense of sensemaking. In Extended Abstracts of CHI 2005, Conference on Human Factors in Computing Systems (pp. 2115-2116), Portland, OR (ACM Press). Google Scholar
- Garvin, D. (2000). Learning in Action. Boston: Harvard Business School Press.Google Scholar
- Gemmell, J., Bell, G., & Lueder, R. (2006). MyLifeBits: A personal database for everything. Communications of the ACM, 49 (1), 88-95. Google ScholarDigital Library
- Gemmell, J., Bell, G., Lueder, R., Drucker, S., & Wong, C. (2002). Mylifebits: Fulfilling the memex vision. Paper presented at the 2002 ACM Workshops on Multimedia (pp. 235-238), Juan-les-Pins, France. Google Scholar
- Gemmell, J., Lueder, R., & Bell, G. (2003, November 7). The MyLifeBits lifetime store. Paper presented at the ACM SIGMM 2003 Workshop on Experiential Telepresence, ETP 2003 (pp. 565-567), Berkeley, CA. Google Scholar
- Gemmell, J., Williams, L., Wood, K., Bell, G., & Lueder, R. (Oct. 15, 2004). Passive capture and ensuing issues for a personal lifetime store. Paper presented at the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences, CARPE 2004 (pp. 48-55), New York. Google Scholar
- Gershon, N. (1995, December). Human information interaction. Paper presented at the 4th International World Wide Web Conference, Boston.Google Scholar
- Gibson, J. J. (1977). The theory of affordances. In R. E. Shaw & J. Bransford (Eds.), Perceiving, Acting, and Knowing: Toward an Ecological Psychology (pp. 67-82). Hillsdale, NJ: Erlbaum.Google Scholar
- Gibson, J. J. (1979). The Ecological Approach to Visual Perception . Boston: Houghton Miffl in. Golder, S., & Huberman, B. A. (2006). The structure of collaborative tagging systems. Journal of Information Science 32 (2), 198-208. Google Scholar
- Gonzalez, V. M., & Mark, G. (2004). Constant, constant, multitasking craziness: Managing multiple working spheres. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 113-120), Vienna, Austria. Google Scholar
- Gordin, M. (2004). A Well-Ordered Thing: Dmitrii Mendeleev and the Shadow of the Periodic Table. New York: Basic Books.Google Scholar
- Greenbaum, J. M., & Kyng, M. (1991). Design at Work: Cooperative Design of Computer Systems . Hillsdale, NJ: Erlbaum. Google Scholar
- Grudin, J. (1988). Why CSCW applications fail: Problems in the design and evaluation of organizational interfaces. In Proceedings of the 1988 ACM Conference on Computer-Supported Cooperative Work (pp. 85-93), Portland, OR (ACM Press). Google Scholar
- Grudin, J. (1993). Interface: An evolving concept. Communications of the ACM, 36 (4), 110-119. Google ScholarDigital Library
- Grudin, J. (2001). Desituating action: Digital representation of context. Human-Computer Interaction, 16 (2-4), 269-286. Google ScholarDigital Library
- Gwizdka, J. (2002a, April 20-25). Reinventing the inbox: Supporting the management of pending tasks in email. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, Doctoral Consortium, CHI 2002 (pp. 550-551), Minneapolis. Google Scholar
- Gwizdka, J. (2002b, September 30-October 3). TaskView: Design and evaluation of a task-based email interface. Paper presented at the Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 2002 , Toronto, ONT, Canada. Google Scholar
- Gwizdka, J., & Chignell, M. (2007). Individual Differences. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google Scholar
- Hackos, J., & Redish, J. (1998). User and Task Analysis for Interface Design . New York: John Wiley & Sons. Google Scholar
- Hafner, K. (2004, November 10). Even digital memories can fade. New York Times .Google Scholar
- Hawkins, J., & Blakeslee, S. (2006). On Intelligence . New York: Owl Books.Google Scholar
- Henzinger, M. (2006). Finding near-duplicate web pages: A large-scale evaluation of algorithms. In Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 284-291), Seattle (ACM Press). Google Scholar
- Henzinger, M., Chang, B.-W., Milch, B., & Brin, S. (2003). Query-free news search. Paper presented at the 12th International World Wide Web Conference, Budapest, Hungary. Google Scholar
- Herrmann, D., Brubaker, B., Yoder, C., Sheets, V., & Tio, A. (1999). Devices that remind. In F. T. Durso, R. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M. T. H. Chi (Eds.), Handbook of Applied Cognition (pp. 377-407). Chichester, England: John Wiley & Sons.Google Scholar
- Holtzblatt, K., & Jones, S. (1993). Contextual Inquiry: Principles and Practice. In Participatory Design: Principles and Practices . New York: Erlbaum.Google Scholar
- Horvitz, E., & Apacible, J. (2003). Learning and reasoning about interruption. In Proceedings of the 5th International Conference on Multimodal Interfaces (pp. 20-27), Vancouver, BC, Canada (ACM Press). Google Scholar
- Horvitz, E., Apacible, J., & Koch, P. (2004, November). BusyBody: Creating and Fielding Personalized Models of the Cost of Interruption. Paper presented at the CSCW, Conference on Computer Supported Cooperative Work (pp. 507-510), Chicago. Google Scholar
- Hunter, J., and Choudhury, S. (2003). A semi-automated digital preservation system based on semantic web services. In Proceedings of JCDL '04 (pp. 269-278), Tucson, AZ (ACM Press). Google Scholar
- Hutchins, E. (1994). Cognition in the Wild . Cambridge, MA: MIT Press.Google Scholar
- Huynh, D., Karger, D., & Quan, D. (2002). Haystack: A platform for creating, organizing and visualizing information using RDF. Paper presented at the International Workshop for the Semantic Web, Honolulu.Google Scholar
- Hyde, T. S., & Jenkins, J. J. (1969). Differential effects of incidental tasks on the organization of recall of a list of highly associated words. Journal of Experimental Psychology, 82 , 472-481.Google ScholarCross Ref
- Jensen, C., & Potts, C. (2004, April 24-29). Privacy policies as decision-making tools: an evaluation of online privacy notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 471-478), Vienna, Austria. Google Scholar
- Jensen, C., Potts, C., & Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63 (1-2), 203-227. Google ScholarDigital Library
- Johnson, S. B. (2005, January 30). Tool for thought. New York Times .Google Scholar
- Jones, W. (1986). On the applied use of human memory models: The Memory Extender personal filing system. International Journal of Man Machine Studies, 25(2) , 191-228. Google ScholarDigital Library
- Jones, W. (2004). Finders, keepers? The present and future perfect in support of personal information management. First Monday --http://www.fi rstmonday.dk/issues/issue9_3/ jones/index.html.Google Scholar
- Jones, W. (2006). Personal information management. Annual Review of Information Science and Technology (ARIST), 41 , 453-504. Google ScholarCross Ref
- Jones, W., & Anderson, J. R. (1987). Short- vs. long-term memory retrieval: A comparison of the effects of information load and relatedness. Journal of Experimental Psychology: General, 116 , 137-153.Google ScholarCross Ref
- Jones, W., Bruce, H., & Dumais, S. (2001, November 5-10). Keeping founds things found on the Web. Paper presented at the 10th International Conference on Information and Knowledge Management, CIKM 2001 (pp. 119-134), Atlanta. Google Scholar
- Jones, W., Bruce, H., & Dumais, S. (2003, September). How do people get back to information on the Web? How can they do it better? Paper presented at the 9th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2003 (pp. 793-796), Zurich.Google Scholar
- Jones, W., Bruce, H., & Foxley, A. (2006). Project contexts to situate personal information. Paper presented at the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle. Google Scholar
- Jones, W., Bruce, H., Foxley, A., & Munat, C. (2006). Planning personal projects and organizing personal information. Paper presented at the 69th Annual Meeting of the American Society for Information Science and Technology, ASIST 2006 , Vol. 43, Austin, TX.Google Scholar
- Jones, W., & Dumais, S. (1986). The spatial metaphor for user interfaces--Experimental tests of reference by location versus name. ACM Transactions on Offi ce Information Systems, 4 (1), 42-63. Google Scholar
- Jones, W., Dumais, S., & Bruce, H. (2002). Once found, what then?: A study of "keeping" behaviors in the personal use of Web information. In Proceedings 65th Annual Meeting of the American Society for Information Science and Technology, ASIST 2002 , Vol. 39 (pp. 391-402), Philadelphia.Google Scholar
- Jones, W., & Furnas, G. W. (1987). Pictures of relevance: A geometric approach to the analysis of similarity measures. Journal of the American Society for Information Science, 38 (6), 420-442. Google ScholarDigital Library
- Jones, W., Munat, C., & Bruce, H. (2005). The Universal Labeler: Plan the project and let your information follow. In A. Grove (Ed.), Proceedings 68th Annual Meeting of the American Society for Information Science and Technology, ASIST 2005 , Vol. 42, Charlotte, NC.Google Scholar
- Jones, W., Phuwanartnurak, A. J., Gill, R., & Bruce, H. (2005, April 2-7). Don't take my folders away! Organizing personal information to get things done. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2005 (pp. 1505-1508), Portland, OR. Google Scholar
- Jones, W., & Ross, B. (2006). Human cognition and personal information management. In F. T. Durso, R. S. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M.T.H. Chi (Eds.), Handbook of Applied Cognition . New York: John Wiley & Sons.Google Scholar
- Kahneman, D., & Tversky, A. (1979). Prospect Theory: An analysis of decision under risk. Econometrica, XLVII , 263-292.Google ScholarCross Ref
- Kaptelinin, V. (1996, April 11-13). Creating computer-based work environments: An empirical study of Macintosh users. Presented at the SIGCPR/SIGMIS 1996 Annual Meetings of the Association for Computing Machinery Special Interest Group on Computer Personnel Research/ Special Interest Group on Management Information Systems (pp. 360-366), Denver, CO. Google Scholar
- Kaptelinin, V. (2003, April). Integrating tools and tasks: UMEA--Translating interaction histories into project contexts. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2003 , Ft. Lauderdale, FL. Google Scholar
- Karat, C.-M., Brodie, C., & Karat, J. (2005). Usability design and evaluation for privacy and security solutions. In L. F. Cranor & S. Garfi nkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use (pp. 47-74). Sebastopol, CA: O'Reilly Media.Google Scholar
- Karat, C.-M., Brodie, C., & Karat, J. (2006). Usable privacy and security for personal information management. Communications of the ACM, 49 (1), 56-57. Google ScholarDigital Library
- Karat, C.-M., Brodie, C., & Karat, J. (2007). Management of personal information disclosure: The Interdependence of Privacy, Security and Trust. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google Scholar
- Karat, J., Karat, C., Brodie, C., & Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human Computer Studies, 63 (1), 153-174. Google ScholarDigital Library
- Karat, J., Karat, C., Brodie, C., & Feng, J. (2006, April 22-27). Evaluating interfaces for privacy policy rule authoring. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 83-92), Montreal, QUE, Canada (ACM Press). Google Scholar
- Karger, D. R. (2007). Unify everything: It's all the same to me. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google Scholar
- Karger, D. R., Bakshi, K., Huynh, D., Quan, D., & Sinha, V. (2005, January 4-7). Haystack: A general-purpose information management tool for end users based on semistructured data. Paper presented at the Second Biennial Conference on Innovative Data Systems Research, CIDR 2005 , Asilomar, CA.Google Scholar
- Karger, D. R., & Quan, D. (2004). Collections: Flexible, essential tools for information management. In Extended Abstracts of CHI 2004, Conference on Human factors in Computing Systems (pp. 1159-1162), Vienna, Austria (ACM Press). Google Scholar
- Kaye, J. J., Vertesi, J., Avery, S., Dafoe, A., David, S., Onaga, L., et al. (2006). To have and to hold: Exploring the personal archive. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 275-284), Montreal, QUE (ACM Press). Google Scholar
- Kelly, D., & Teevan, J. (2007). Understanding what works: Evaluating PIM Tools. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Kidd, A. (1994, April 24-28). The marks are on the knowledge worker. Paper presented at the ACM SIGCHI Conference on Human factors in Computing Systems, CHI 1994 (pp. 186-191), Boston. Google Scholar
- Kim, K.-S., & Allen, B. (2002). Cognitive and task infl uences on web searching behavior. Journal of the American Society for Information Science and Technology, 53 (2), 109-119. Google ScholarDigital Library
- Kirsh, D. (2000). A few thoughts on cognitive overload. Intellectica, 30 (1), 19-51.Google Scholar
- Klein, G., Moon, B., & Hoffman, R. R. (2006). Making Sense of Sensemaking 1: Alternative Perspectives. IEEE Intelligent Systems, 21 (4), 70-73. Google ScholarDigital Library
- Knickerbocker, B. (2002, September 11). A corner still not turned in America's story. The Christian Science Monitor --http: //www.csmonitor.com/specials/oneyearlater/ livesChanged_corner.html.Google Scholar
- Koolstra, C. M., van Zanten, J., Lucassen, N., & Ishaak, N. (2004). The formal pace of Sesame Street over 26 years. Perceptual and Motor Skills, 99 (1), 354-360.Google ScholarCross Ref
- Kraft, R., Chang, C. C., Maghoul, F., & Kumar, R. (2006). Searching with context. In Proceedings of the 15th International Conference on World Wide Web (pp. 477-486), Edinburgh, Scotland (ACM Press). Google Scholar
- Kraft, R., Maghoul, F., & Chang, C. C. (2005). Y!Q: Contextual search at the point of inspiration. In Proceedings of the 14th ACM International Conference on Information and Knowledge Management (pp. 816-823). Bremen, Germany (ACM Press). Google Scholar
- Kuny, T. (1998). The digital dark ages? Challenges in the preservation of electronic information. International Preservation News , 17.Google Scholar
- Lang, A., Zhou, S., Shwartz, N., Bolls, P., & Potter, R. (2000, Winter). The effects of edits on arousal, attention, and memory for television messages: When an edit is an edit can an edit be too much? Journal of Broadcasting & Electronic Media , 44 (1), 94-109.Google ScholarCross Ref
- Lansdale, M. (1988). The psychology of personal information management. Applied Ergonomics, 19 (1), 55-66.Google ScholarCross Ref
- Lansdale, M. (1991). Remembering about documents: Memory for appearance, format, and location. Ergonomics, 34 (8), 1161-1178.Google ScholarCross Ref
- Lansdale, M., & Edmonds, E. (1992). Using memory for events in the design of personal filing systems. International Journal of Man-Machine Studies, 36 (1), 97-126. Google ScholarDigital Library
- Larkin, J. H., & Simon, H. A. (1987). Why a diagram is (sometimes) worth ten thousand words. Cognitive Science, 11 (1), 65-99.Google Scholar
- Lashley, K. S. (1950). In search of the engram. Symposia of the Society for Experimental Biology, 4 , 454-482.Google Scholar
- LeFurgy, W. G. (2003). PDF/A: Developing a file format for long-term preservation. RLG DigiNews, 7 (6).Google Scholar
- Levy, D. (2001). Scrolling Forward: Making Sense of Documents in the Digital Age . New York: Arcade Publishing.Google Scholar
- Licklider, J.C.R. (1960). Man-computer symbiosis. IRE Transactions on Human Factors in Electronics, HFE-1 , 4-11.Google ScholarCross Ref
- Lorie, R. (2002). A methodology and system for preserving digital data. In Proceedings of JCDL '02 (pp. 312-319), Portland, OR (ACM Press). Google Scholar
- Lucas, P. (2000, April 1-6). Pervasive information access and the rise of human-information interaction. In Extended Abstracts of CHI 2000, Conference on Human Factors in Computing Systems (p. 202), The Hague, The Netherlands (ACM Press). Google ScholarDigital Library
- Lutters, W. G., Ackerman, M. S., & Zhou, X. (2007). Group Information Management. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google Scholar
- Lynch, K. (1960). The Image of the City . Cambridge, MA: MIT Press.Google Scholar
- Machlup, F. (1983). Semantic Quirks in Studies of Information. In F. Machlup & U. Mansfi eld (Eds.), The Study of Information: Interdisciplinary Messages (pp. 641-671). New York: Wiley.Google Scholar
- Mackay, W. E. (1988, September 26-28). More than just a communication system: Diversity in the use of electronic mail. Paper presented at the Conference on Computer-Supported Cooperative Work, CCSW 1988 (pp. 344-353), Portland, OR. Google Scholar
- MacLachlan, J., & Logan, M. (1993). Camera shot length in TV commercials and their memorability and persuasiveness. Journal of Advertising Research 33 (2), 57-61.Google Scholar
- Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed network: Using trail re-identifi cation to evaluate and design anonymity protection systems. Journal of Biomedical Informatics, 37 (3), 179-192. Google ScholarDigital Library
- Malone, T. W. (1983). How do people organize their desks: Implications for the design of office information systems. ACM Transactions on Offi ce Information Systems, 1 (1), 99-112. Google Scholar
- Maltz, D., & Ehrlich, K. Pointing the way: Active collaborative filtering. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems, CHI 1995 , Denver, CO. Google Scholar
- Mander, R., Salomon, G., & Wong, Y. Y. (1992, May). A "pile" metaphor for supporting casual organization of information. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1992 (pp. 627-634), Monterey, CA. Google Scholar
- Manguel, A. (1996). A History of Reading . New York: Viking.Google Scholar
- Marchionini, G. (1995). Information Seeking in Electronic Environments . Cambridge: Cambridge University Press. Google Scholar
- Marchionini, G., & Komlodi, A. (1998). Design of interfaces for information seeking. Annual Review of Information Science and Technology, 33 , 89-130.Google Scholar
- Mark, G., Gonzalez, V. M., & Harris, J. (2005 ). No task left behind? Examining the nature of fragmented work. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2005 (pp. 321-330), Portland, OR. Google Scholar
- Marlow, C., Naaman, M., Boyd, D., & Davis, M. (2006). HT06, tagging paper, taxonomy, Flickr, academic article, ToRead. In Proceedings of the 17th Conference on Hypertext and Hypermedia (pp. 31-40), Odense, Denmark (ACM Press). Google Scholar
- Marshall, C. C. (2006). Reading and interactivity in the digital library: Creating an experience that transcends paper. In D. B. Marcum & G. George (Eds.), Digital Library Development: The View from Kanazawa . Westport, CT: Libraries Unlimited.Google Scholar
- Marshall, C. C. (2007). Maintaining personal information: Issues associated with long-term storage, preservation, and access. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Marshall, C. C., & Bly, S. (2005). Saving and using encountered information: Implications for electronic periodicals. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 111-120), Portland, OR (ACM Press). Google Scholar
- Marshall, C. C., Bly, S., & Brun-Cottan, F. (2006). The long-term fate of our personal digital belongings: Toward a service model for personal archives. In IS&T's Archiving 2006 Conference , Ottawa, ONT, Canada (Society for Imaging Science and Technology).Google Scholar
- Marshall, C. C., & Jones, W. (2006). Keeping encountered information. Communications of the ACM, 49 (1): 66-67. Google ScholarDigital Library
- Mitchell, J., & Shneiderman, B. (1989). Dynamic versus static menus: An exploratory comparison. ACM SIGCHI Bulletin, 20 (4), 33-37. Google ScholarDigital Library
- Moen, A. (2007). Personal health information management. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google Scholar
- Morris, R. (2003). The Last Sorcerers: The Path from Alchemy to the Periodic Table . Washington, DC: Joseph Henry Press.Google Scholar
- Morville, P. (2005). Ambient Findability . Sebastopol, CA: O'Reilly.Google Scholar
- Mumford, M. D., Schultz, R. A., & Van Doorn, J. R. (2001). Performance in planning: Processes, requirements and errors. Review of General Psychology, 5 (3), 213-240.Google ScholarCross Ref
- Murnane, K., Phelps, M., & Malmberg, K. (1999). Context-dependent recognition memory: The ICE theory. Journal of Experimental Psychology: General, 128 (4), 403-415.Google ScholarCross Ref
- Murthy, S., Maier, D., Delcambre, L., & Bowers, S. (2004). Putting integrated information in context: Superimposing conceptual models with SPARCE. In Proceedings of the First Asian-Pacific Conference on Conceptual modeling , Vol. 31 (pp. 71-80), Dunedin, New Zealand (Australian Computer Society, Inc.). Google Scholar
- Naumer, C. M., & Fisher, K. E. (2007). Naturalistic approaches for understanding PIM. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Negroponte, N. (1979). Books without pages. Paper presented at the International Conference on Communications IV, Boston.Google Scholar
- Neisser, U. (1967). Cognitive Psychology . New York: Appleton-Century Crofts.Google Scholar
- Nelson, T. H. (1965). File structure for the complex, the changing, and the indeterminate. In Proceedings of the 1965 20th ACM/CSC-ER National Conference (pp. 84-100), Cleveland, OH. Google Scholar
- Newell, A., Shaw, J. C., & Simon, H. A. (1958). Elements of a theory of human problem solving. Psychological Review, 65 , 151-166.Google Scholar
- Norman, D. A. (1988). The Psychology of Everyday Things . New York: Basic Books.Google Scholar
- Norman, D. A. (1990). The Design of Everyday Things . New York: Doubleday.Google Scholar
- Norman, D. A. (1992). Turn Signals Are the Facial Expressions of Automobiles . Cambridge, MA: Perseus Publishing.Google Scholar
- Norman, D. A. (1993). Things that Make Us Smart: Defending Human Attributes in the Age of the Machine . Reading, MA: Addison-Wesley. Google Scholar
- O'Conaill, B., & Frohlich, D. (1995, April). Timespace in the workplace: Dealing with interruptions. In Extended Abstracts of CHI 1995, Conference on Human Factors in Computing Systems (pp. 262-263), Denver, CO (ACM Press). Google Scholar
- O'Day, V., & Jeffries, R. (1993, April). Orienteering in an information landscape: How information seekers get from here to there. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1993 (pp. 438-445), Amsterdam, The Netherlands. Google Scholar
- Oddy, R. N. (1977). Information retrieval through man-machine dialogue. Journal of Documentation, 33 (1), 1-14.Google Scholar
- O'Dell, C., Jackson Grayson, C., & Essaides, N. (1998). If Only We Knew What We Know: The Transfer of Internal Knowledge and Best Practice . New York: Free Press. Google Scholar
- Olson, J. S., Grudin, J., & Horvitz, E. (2005). A study of preferences for sharing and privacy. In Extended Abstracts of CHI 2005, Conference on Human Factors in Computing Systems (pp. 1985-1988), Portland, OR (ACM Press). Google Scholar
- Otlet, P. (1934). Traité de Documentation . Brussels: Editiones Mundaneum.Google Scholar
- Palen, L. (1999). Social, individual and technological issues for groupware calendar systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: The CHI Is the Limit (pp. 17-24), Pittsburgh (ACM Press). Google Scholar
- Peterson, W. W., Birdsall, T. G., & Fox, W. C. (1954). The theory of signal detectability. Institute of Radio Engineers Transactions, PGIT-4 , 171-212.Google Scholar
- Pirolli, P. (2006). Cognitive models of human-information interaction. In F. T. Durso, R. S. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M.T.H. Chi (Eds.), Handbook of Applied Cognition (2nd ed.). New York: John Wiley & Sons.Google Scholar
- Pirolli, P., & Card, S. (1999). Information foraging. Psychological Review, 106 (4), 643-675.Google ScholarCross Ref
- Pratt, W., Unruh, K., Civan, A., & Skeels, M. (2006). Personal health information management. Communications of the ACM, 49 (1), 51-55. Google ScholarDigital Library
- Putnam, R. D. (1995). Bowling alone: America's declining social capital. Journal of Democracy, 6 , 65-78.Google ScholarCross Ref
- Qu, Y., & Furnas, G. W. (2005). Sources of structure in sensemaking. In Extended Abstracts of CHI 2005, Conference on Human Factors in Computing Systems (pp. 1989-1992), Portland, OR (ACM Press). Google Scholar
- Quan, D., Huynh, D., & Karger, D. R. (2003, October 20-23). Haystack: A platform for authoring end user Semantic Web applications. Paper presented at the 2nd International Semantic Web Conference, ISWC 2003 (pp. 738-753), Sanibel Island, FL.Google Scholar
- Quine, W. V. (1969). Ontological Relativity and Other Essays . New York: Columbia University Press.Google Scholar
- Radicati Group, Inc. (2005). Taming the growth of email: An ROI Analysis. White paper-- http://www.radicati.com/uploaded_files/publications/brochure/HP_Whitepaper.pdf.Google Scholar
- Ratneshwar, S., Barsalou, L. W., Pechmann, C., & Moore, M. (2001). Goal-derived categories: The role of personal and situational goals in category representations. Journal of Consumer Psychology, 10 (3), 147-157.Google ScholarCross Ref
- Ravasio, P., Schar, S. G., & Krueger, H. (2004). In pursuit of desktop evolution: User problems and practices with modern desktop systems. ACM Transactions on Computer-Human Interaction, 11 (2), 156-180. Google ScholarDigital Library
- Ries, A., & Trout, J. (1986). Positioning: The Battle for Your Mind . New York: Warner Books.Google Scholar
- Ringel, M., Cutrell, E., Dumais, S. T., & Horvitz, E. (2003). Milestones in time: The value of landmarks in retrieving information from personal stores. In M. Rauterberg et al. (Eds.), Human-Computer Interaction, INTERACT '03 (pp. 184-191), IOS Press.Google Scholar
- Rodden, K., & Wood, K. (2003). How do people manage their digital photographs? Paper presented at the SIGCHI ACM Conference on Human Factors in Computing Systems, CHI 2003 (pp. 409-416), Ft. Lauderdale, FL. Google Scholar
- Ross, B. H. (1999). Postclassification category use: The effects of learning to use categories after learning to classify. Journal of Experimental Psychology: Learning, Memory, & Cognition, 25 (3), 743-757.Google ScholarCross Ref
- Ross, B. H. (2000). The effects of category use on learned categories. Memory & Cognition, 28 (1), 51-63.Google Scholar
- Ross, B. H., & Murphy, G. L. (1999). Food for thought: Cross-classifi cation and category organization in a complex real-world domain. Cognitive Psychology, 38 (4), 495-553.Google ScholarCross Ref
- Ross, S. E., and Lin, C.-T. (2003). The effects of promoting patient access to medical records: A review. Journal of the American Medical Informatics Association, 10 (2), 129-138.Google ScholarCross Ref
- Rothenberg, J. (1999). Avoiding Technological Quicksand: Finding a Viable Technical Foundation for Digital Preservation . Washington, DC: Council on Library and Information Resources. Google Scholar
- Rouse, W. B., & Rouse, S. H. (1984). Human information seeking and design of information systems. Information Processing & Management, 20 , 129-138. Google Scholar
- Rowley, J. (1994). The controlled versus natural indexing languages debate revisited. Journal of Information Science, 20 (2), 108-119. Google ScholarDigital Library
- Rundus, D. (1971). Analysis of rehearsal processes in free recall. Journal of Experimental Psychology, 89 , 63-77.Google ScholarCross Ref
- Russell, D. M., & Lawrence, S. (2007). Search everything. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google Scholar
- Russell, D. M., Slaney, M., Qu, Y., & Houston, M. (2006). Being literate with large document collections: Observational studies and cost structure tradeoffs. Paper presented at the 39th Annual Hawaii International Conference on System Sciences, HICSS. Google Scholar
- Russell, D. M., Stefik, M. J., Pirolli, P., & Card, S. K. (1993). The cost structure of sensemaking. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 269-276), Amsterdam, The Netherlands (ACM Press). Google Scholar
- Salton, G., & Buckley, C. (1990). Improving retrieval performance by relevance feedback. Journal of the American Society for Information Science, 41 (4), 288-297.Google ScholarCross Ref
- Scerri, E. (2001). The Periodic Table: The ultimate paper tool in chemistry. In U. Klein (Ed.), Tools and Modes of Representation in the Laboratory Sciences . Dordrecht, Germany: Kluwer Academic.Google Scholar
- Schuler, D., & Namioka, A. (Eds.). (1993). Participatory Design: Principles and Practices . Hillsdale, NJ: Erlbaum. Google Scholar
- Schwartz, B. (2004). The Paradox of Choice . New York: HarperCollins.Google Scholar
- Segal, R. B., & Kephart, J. O. (1999, May 1-5). MailCat: An intelligent assistant for organizing e-mail. Paper presented at the 3rd Annual Conference on Autonomous Agents (pp. 276-282), Seattle. Google Scholar
- Seifert, C. M., & Patalano, A. L. (2001). Opportunism in memory: Preparing for chance encounters. Current Directions in Psychological Science, 10 (6), 198-201.Google ScholarCross Ref
- Selamat, M. H., & Choudrie, J. (2004). The diffusion of tacit knowledge and its implications on information systems: The role of meta-abilities. Journal of Knowledge Management, 8 (2), 128-139.Google ScholarCross Ref
- Sellen, A. J., & Harper, R.H.R. (2002). The Myth of the Paperless Offi ce . Cambridge, MA: MIT Press. Google Scholar
- Shamos, M. (2007). Privacy and public records. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27 , 379-423, 623-656.Google Scholar
- Shannon, C. E., & Weaver, W. (1949). The Mathematical Theory of Communication . Urbana, IL: University of Illinois Press.Google Scholar
- Shen, J., Li, L., Dietterich, T. G., & Herlocker, J. L. (2006). A hybrid learning system for recognizing user tasks from desktop activities and email messages. In Proceedings of the 11th International Conference on Intelligent User Interfaces (pp. 86-92), Sydney, Australia (ACM Press). Google Scholar
- Shen, R., Vemuri, N. S., Fan, W., Torres, R.D.S., & Fox, E. A. (2006, June 11-15). Exploring digital libraries: Integrating browsing, searching, and visualization. In Proceedings of the 6th ACM/ IEEE-CS Joint Conference on Digital Libraries (pp. 1-10), Chapel Hill, NC (ACM Press). Google Scholar
- Shipman, F. M. I., & Marshall, C. C. (1999). Formality considered harmful: Experiences, emerging themes, and directions on the use of formal representations in interactive systems. Computer Supported Cooperative Work (CSCW), 8 (4), 333-352. Google ScholarDigital Library
- Shneiderman, B. (1992). Tree visualization with tree-maps: 2-d space-filling approach. ACM Transactions in Graphics, 11 (1), 92-99. Google ScholarDigital Library
- Shneiderman, B., & Bederson, B. B. (2005). Maintaining concentration to achieve task completion. Paper presented at the Proceedings of Designing User Experience, DUX 2005 , San Francisco. Google Scholar
- Silverman, B. G. (1997). Computer reminders and alerts. Computer, 30 (1), 42-49. Google ScholarDigital Library
- Simon, H. A. (1957). Models of Man: Social and Rational; Mathematical Essays on Rational Human Behavior in Society Setting . New York: Wiley.Google Scholar
- Simon, H. A. (1969). The Sciences of the Artificial . Cambridge, MA: MIT Press.Google Scholar
- Simon, H. A. (1971). Designing organizations for an information-rich world. In M. Greenberger (Ed.), Computers, Communications and the Public Interest (pp. 40-41). Baltimore: The Johns Hopkins Press.Google Scholar
- Simon, H. A., & Newell, A. (1958). Heuristic problem solving: The next advance in operations research. Operations Research, 6 , 1-10.Google ScholarDigital Library
- Southwell, B. G., & Lee, M. (2004). A pitfall of new media? User controls exacerbate editing effects on memory. Journalism and Mass Communication Quarterly, 81 (3), 643-656.Google ScholarCross Ref
- Spiekermann, S., Grossklags, J., & Berendt, B. (2001, October 14-17). E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. In Proceedings 3rd ACM Conference on Electronic Commerce (pp. 38-47), Tampa, FL (ACM Press). Google Scholar
- Springer, P. (1999, January 26). Sun on Privacy: "Get Over It." Wired News --www.wired.com/ politics/law/news/1999/01/17538.Google Scholar
- Streitz, N., & Nixon, P. (2005). Special issue: The disappearing computer. Communications of the ACM, 48 (3), 32-35. Google ScholarDigital Library
- Suchman, L. (1983). Office procedure as practical action: Models of work and system design. ACM Transactions on Offi ce Information Systems, 1 (4), 320-328. Google Scholar
- Suchman, L. (1987). Plans and Situated Actions: The Problem of Human-Machine Communication . Cambridge: Cambridge University Press. Google Scholar
- Surowiecki, J. (2004). The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economies, Societies and Nations . Boston: Little, Brown. Google Scholar
- Sweeney, L. (2002). k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 557-570. Google ScholarDigital Library
- Swets, J. A. (1963). Information retrieval systems. Science, 141 (3577), 245-250.Google Scholar
- Swets, J. A. (1969). Effectiveness of information retrieval methods. American Documentation, 20 (1), 72-89.Google ScholarCross Ref
- Swire, P. P., & Litan, R. E. (1998). Avoiding a showdown over EU privacy laws. Policy brief. Washington, DC: The Brookings Institution.Google Scholar
- Tan, D., Berry, E., Czerwinski, M., Bell, G., Gemmell, J., Hodges, S., et al. (2007). Save everything: Supporting human memory with a personal digital lifetime store. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Tauscher, L. M., & Greenberg, S. (1997a). How people revisit web pages: Empirical findings and implications for the design of history systems. International Journal of Human-Computer Studies, 47 (1), 97-137. Google ScholarDigital Library
- Tauscher, L. M., & Greenberg, S. (1997b, April 18-23). Revisitation patterns in World Wide Web navigation. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1997 (pp. 399-406), Atlanta. Google Scholar
- Taylor, A. G. (2004). The Organization of Information (2nd ed.). Westport, CT: Libraries Unlimited.Google Scholar
- Taylor, H. (2003). Most people are "privacy pragmatists" who, while concerned about privacy, will sometimes trade it off for other benefi ts. Harris Interactive , Harris Poll #17.Google Scholar
- Taylor, R. S. (1968). Question negotiation and information seeking in libraries. College and Research Libraries, 29 , 178-194.Google ScholarCross Ref
- Teevan, J. (2006). Supporting fi nding and re-fi nding through personalization. Unpublished doctoral thesis, Massachusetts Institute of Technology, Cambridge, MA. Google Scholar
- Teevan, J. (2006, October). The Re: Search engine: Helping people return to information on the Web. Paper presented at the ACM Symposium on User Interface Software and Technology, UIST 2005 , Seattle.Google Scholar
- Teevan, J., Alvarado, C., Ackerman, M. S., & Karger, D. R. (2004, April 24-29). The perfect search engine is not enough: A study of orienteering behavior in directed search. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 415-422), Vienna, Austria. Google Scholar
- Teevan, J., Capra, R., & Pérez-Quinones, M. (2007). How people fi nd information. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Teevan, J., Dumais, S. T., & Horvitz, E. (2005, April 15-19). Personalizing search via automated analysis of interests and activities. Paper presented at the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 449-456), Salvador, Brazil. Google Scholar
- Teltzrow, M., & Kobsa, A. (2004). Impacts of user privacy preferences on personalized systems: A comparative study. In C.-M. Karat, J. O. Blom, & J. Karat (Eds.), Designing Personalized User Experiences in eCommerce (pp. 315-332). Norwell, MA: Kluwer. Google Scholar
- Thompson, L. L., Levine, J. M., & Messick, D. M. (Eds.). (1999). Shared Cognition in Organizations: The Management of Knowledge . Mahwah, NJ: Erlbaum. Google Scholar
- Tohidi, M., Buxton, W., Baecker, R., & Sellen, A. (2006). Getting the right design and the design right. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1243-1252), Montreal, QUE, Canada (ACM Press). Google Scholar
- Tulving, E. (1983). Elements of Episodic Memory . Oxford: Oxford University Press.Google Scholar
- Tulving, E., & Thomson, D. M. (1973). Encoding specifi city and retrieval processes in episodic memory. Psychological Review, 80 (5), 352-373.Google ScholarCross Ref
- Tversky, A., & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probability. Cognitive Psychology, 5 , 207-232.Google ScholarCross Ref
- Tversky, A., & Kahneman, D. (1974). Judgments under uncertainty: Heuristics and biases. Science, 185 , 1124-1131.Google ScholarCross Ref
- Tversky, A., & Kahneman, D. (1981). The framing of decisions and the psychology of choice. Science, 211 , 453-458.Google Scholar
- Udell, J. (2005). Collaborative filtering with del.icio.us--http://weblog.infoworld.com/ udell/2005/06/23.html.Google Scholar
- Van Meter, D., & Middleton, D. (1954). Modern statistical approaches to reception in communication theory. Institute of Radio Engineers Transactions, PGIT-4 , 119-141.Google Scholar
- Voida, A., Grinter, R. E., Ducheneaut, N., Edwards, W. K., & Newman, M. W. (2005). Listening in: Practices surrounding iTunes music sharing. CHI '05 (pp. 191-200). Google Scholar
- Wearden, G. (2002). U.S. tech protests EU privacy laws. ZDNet News --http://news.zdnet. com/2100-9595_22-960134.html.Google Scholar
- Westin, A. F. (1967). Privacy and Freedom . New York: Atheneum.Google Scholar
- White, R., Ruthven, I., & Jose, J. M. (2002). Finding relevant documents using top ranking sentences: An evaluation of two alternative schemes. In Proceedings of the 25th Annual ACM Conference on Research and Development in Information Retrieval (SIGIR 2002) (pp. 57-64), Tampere, Finland. Google Scholar
- Whittaker, S. (2005). Collaborative task management in email. Human-Computer Interaction, 20 (1-2), 49-88. Google ScholarDigital Library
- Whittaker, S., Bellotti, V., & Gwizdka, J. (2007). Email as PIM. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google Scholar
- Whittaker, S., Bellotti, V., & Moody, P. (2005). Introduction to this special issue on revisiting and reinventing e-mail. Human-Computer Interaction, 20 (1-2), 1-9. Google ScholarDigital Library
- Whittaker, S., & Hirschberg, J. (2001). The character, value and management of personal paper archives. ACM Transactions on Computer-Human Interaction, 8 (2), 150-170. Google ScholarDigital Library
- Whittaker, S., Jones, Q., & Terveen, L. (2002, Nov. 16-20). Managing communications: Contact management: Identifying contacts to support long-term communication. Presented at ACM 2002 Conference on Computer Supported Cooperative Work, New Orleans. Google Scholar
- Whittaker, S., & Sidner, C. (1996). Email overload: Exploring personal information management of email. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 276-283), Vancouver, BC, Canada (ACM Press). Google Scholar
- Whitten, A., & Tygar, J. D. (1999, August 23-26). Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium (pp. 169-184), Washington, DC. Google Scholar
- Williamson, A., & Bronte-Stewart, M. (1996). Moneypenny: Things to do on the desk. In A. Blandford & H. Thimbleby (Eds.), Proceedings of the 11th Conference of the British Computer Society Human Computer Interaction Specialist Group--People and Computers XI (pp. 197-200). London: Springer Verlag.Google Scholar
- Wilson, T. D. (1981). On user studies and information needs. Journal of Documentation, 37 (1), 3-15.Google ScholarCross Ref
- Wilson, T. D. (2000). Human information behavior. Informing Science, 3 (2), 49-55.Google Scholar
- Wilson, T. D. (2005). Evolution in information behavior modeling. Wilson's model. In K. E. Fisher, S. Erdelez, & L. McKechnie (Eds.), Theories of Information Behavior (pp. 31-36). Medford, NJ: Information Today.Google Scholar
- Wittgenstein, L. (1953). Philosophical Investigations . New York: Macmillan.Google Scholar
- Wolverton, M. (1999). Task-based information management. ACM Computing Surveys (CSUR) Archive, 31 (2). Google Scholar
- Wright, R. (2000). Nonzero: The Logic of Human Destiny . New York: Pantheon.Google Scholar
- Yates, F. A. (1966). The Art of Memory . Chicago: University of Chicago Press.Google Scholar
- Yates, J. (1989). Control through Communication: The Rise of Systems in American Management . Baltimore: Johns Hopkins University Press.Google Scholar
- Yiu, K. S. (1997). Time-based Management and Visualization of Personal Electronic Information. Unpublished MSc thesis, University of Toronto.Google Scholar
- Zhang, J. (1997). The nature of external representations in problem solving. Cognitive Science: A Multidisciplinary Journal, 21 (2), 179-217.Google ScholarCross Ref
Cited By
- Bergman O and Gradovitch N (2023). Collecting streaming music increases listening enjoyment, Personal and Ubiquitous Computing, 27:6, (2147-2159), Online publication date: 1-Dec-2023.
- Narayan B, Zijlema A and Reyes V (2023). Life and Times of Personal Information Management, Proceedings of the Association for Information Science and Technology, 60:1, (813-816), Online publication date: 22-Oct-2023.
- Whittaker S and Massey C (2020). Mood and personal information management: how we feel influences how we organize our information, Personal and Ubiquitous Computing, 24:5, (695-707), Online publication date: 1-Oct-2020.
- Dinneen J and Julien C (2019). The ubiquitous digital file, Journal of the Association for Information Science and Technology, 71:1, (E1-E32), Online publication date: 4-Dec-2019.
- Dodson S Interacting with Heterogeneous Information Ecologies Proceedings of the 2019 Conference on Human Information Interaction and Retrieval, (445-448)
- Brackenbury W, Liu R, Mondal M, Elmore A, Ur B, Chard K and Franklin M Draining the Data Swamp Proceedings of the Workshop on Human-In-the-Loop Data Analytics, (1-7)
- Jensen A, Jægerfelt C, Francis S, Larsen B and Bogers T I just scroll through my stuff until I find it or give up Proceedings of the 2018 Conference on Human Information Interaction & Retrieval, (140-149)
- Vermette L, Dembla S, Wang A, McGrenere J and Chilana P (2017). Social CheatSheet, Proceedings of the ACM on Human-Computer Interaction, 1:CSCW, (1-19), Online publication date: 6-Dec-2017.
- Jones W (2017). The Science of Managing our Digital Stuff. Ofer Bergman and Steve Whittaker. Cambridge, MA, Journal of the Association for Information Science and Technology, 68:12, (2834-2840), Online publication date: 8-Nov-2017.
- Hwang H, Herder E and Ronchetti M A Link Back to MemoryLane Proceedings of the 12th Biannual Conference on Italian SIGCHI Chapter, (1-10)
- Oh K (2017). Types of personal information categorization, Journal of the Association for Information Science and Technology, 68:6, (1491-1504), Online publication date: 1-Jun-2017.
- Kljun M, Mariani J and Dix A (2016). Toward understanding short-term personal information preservation, Journal of the Association for Information Science and Technology, 67:12, (2947-2963), Online publication date: 1-Dec-2016.
- Hinbarji Z, Hinbarji M, Albatal R and Gurrin C Personal Information Manager to Capture and Re-Access What We See on Computers Proceedings of the first Workshop on Lifelogging Tools and Applications, (13-17)
- Fransson J, Lagunas P, Kjellberg S and Toit M Developing integrated research data management support in close relation to doctoral students' research practices Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & Technology, (1-4)
- Dinneen J, Odoni F, Frissen I and Julien C Cardinal Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & Technology, (1-10)
- Jones W, Thorsteinson C, Thepvongsa B and Garrett T Making It Real Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, (571-582)
- Jones W, Bellotti V, Capra R, Dinneen J, Mark G, Marshall C, Moffatt K, Teevan J and Van Kleek M For Richer, for Poorer, in Sickness or in Health... Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, (3508-3515)
- Tran T, Schwarz S, Niederée C, Maus H and Kanhabua N The Forgotten Needle in My Collections Proceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval, (13-22)
- Diekema A and Olsen M (2014). Teacher Personal information management PIM practices, Journal of the Association for Information Science and Technology, 65:11, (2261-2277), Online publication date: 1-Nov-2014.
- Wiese J, Hong J and Zimmerman J Challenges and opportunities in data mining contact lists for inferring relationships Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (643-647)
- Trullemans S and Signer B From user needs to opportunities in personal information management Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries, (87-96)
- Webber S, Heffernan K, Yeganeh B, Estrada F and Augstkalns D Family room Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, (407-408)
- Snyder P and Kanich C CloudSweeper Proceedings of the 2013 ACM workshop on Cloud computing security workshop, (47-54)
- Narayan B and Olsson M Sense-making across space and time Proceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries, (1-9)
- Al-Omar M and Cox A Finders, keepers, losers, seekers Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction design - Volume Part I, (169-176)
- Zhao X, Salehi N, Naranjit S, Alwaalan S, Voida S and Cosley D The many faces of facebook Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1-10)
- Sawyer B, Quek F, Wong W, Motani M, Chu Yew Yee S and Perez-Quinones M Using physical-social interactions to support information re-finding CHI '12 Extended Abstracts on Human Factors in Computing Systems, (885-910)
- Jones W, Anderson K and Whittaker S Representing our information structures for research and for everyday use CHI '12 Extended Abstracts on Human Factors in Computing Systems, (151-160)
- Capra R and Teevan J Personal information management in a socially networked world Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion, (1-2)
- Oh K Exploring the process of organizing personal information Proceedings of the 2012 iConference, (433-434)
- Drăgan L, Handschuh S and Decker S The semantic desktop at work Proceedings of the 7th International Conference on Semantic Systems, (17-24)
- Jones W XooML Proceedings of the 2011 iConference, (478-488)
- Whittaker S (2011). Personal information management, Annual Review of Information Science and Technology, 45:1, (1-62), Online publication date: 1-Jan-2011.
- Evéquoz F, Thomet J and Lalanne D Gérer son information personnelle au moyen de la navigation par facettes Proceedings of the 22nd Conference on l'Interaction Homme-Machine, (41-48)
- Capra R, Marchionini G, Velasco-Martin J and Muller K Tools-at-hand and learning in multi-session, collaborative search Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (951-960)
- Jones W, Hou D, Sethanandha B, Bi S and Gemmell J Planz to put our digital information in its place CHI '10 Extended Abstracts on Human Factors in Computing Systems, (2803-2812)
- Efimova L Weblog as a personal thinking space Proceedings of the 20th ACM conference on Hypertext and hypermedia, (289-298)
- Jones W, Klasnja P, Civan A and Adcock M The personal project planner Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (681-684)
- Teevan J and Jones W The disappearing desktop CHI '08 Extended Abstracts on Human Factors in Computing Systems, (3917-3920)