[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information ManagementNovember 2007
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-0-08-055415-0
Published:01 November 2007
Pages:
448
Skip Bibliometrics Section
Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" of an office or on the hard drive of a computer. Instead, information may be controlling us - keeping us from doing the things we need to do, getting us to waste money and precious time. The growth of available information, plus the technologies for its creation, storage, retrieval, distribution and use, is astonishing and sometimes bewildering. Can there be a similar growth in our understanding for how best to manage information and informational tools This book provides a comprehensive overview of personal information management (PIM) as both a study and a practice of the activities people do and need to be doing so that information can work for them in their daily lives. Introductory chapters of Keeping Found Things Found: The Study and Practice of Personal Information Management provide an overview of PIM and a sense for its many facets. The next chapters look more closely at the essential challenges of PIM, including finding, keeping, organizing, maintaining, managing privacy, and managing information flow. The book also contains chapters on search, email, mobile PIM, web-based support, and other technologies relevant to PIM. * Focuses exclusively on one of the most interesting and challenging problems in today's world * Explores what good and better PIM looks like, and how to measure improvements * Presents key questions to consider when evaluating any new PIM informational tools or systems

References

  1. Abrams, D., Baecker, R., & Chignell, M. (1998, April). Information archiving with bookmarks: Personal web space construction and organization. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1998 (pp. 41-48), Los Angeles. Google ScholarGoogle Scholar
  2. Ackerman, M. S. (2000, April). Developing for privacy: Civility frameworks and technical design. Paper presented at the Conference on Computers, Freedom, and Privacy (pp. 19-23), Toronto, ONT, Canada. Google ScholarGoogle Scholar
  3. Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999, November 3-5). Privacy in e-commerce: Examining user scenarios and privacy preferences. Paper presented at the 1st ACM Conference on Electronic Commerce (pp. 1-8), Denver, CO. Google ScholarGoogle Scholar
  4. Adar, E., Karger, D., & Stein, L. A. (1999, November 2-6). Haystack: Per-user information environment. Paper presented at the 8th Conference on Information and Knowledge Management, CIKM 1999 , Kansas City, MO. Google ScholarGoogle Scholar
  5. Aftab, O., Cheung, P., Kim, A., Thakkar, S., & Yeddanapudi, N. (2001). Information Theory and the Digital Age (No. 6.933). Cambridge, MA: Massachusetts Institute of Technology.Google ScholarGoogle Scholar
  6. Allen, D. (2001). Getting Things Done: The Art of Stress-Free Productivity . New York: Penguin.Google ScholarGoogle Scholar
  7. Anderson, J. R. (1976). Language, Memory, and Thought . Hillsdale, NJ: Erlbaum.Google ScholarGoogle Scholar
  8. Arms, C. (2000). Keeping memory alive: Practices for preserving digital content at the National Digital Library Program of the Library of Congress. RLG DigiNews, 4 (3).Google ScholarGoogle Scholar
  9. Bälter, O. (1997). Strategies for organising email. In H. Thimbleby, B. O'Conaill & P. J. Thomas (Eds.), Proceedings of the 12th Conference of the British Computer Society Human Computer Interaction Specialist Group--People and Computers XII, Vol. 12 (pp. 21-38), Bristol, UK: Springer. Google ScholarGoogle Scholar
  10. Bälter, O. (2000, April). Keystroke level analysis of email message organization. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2000 (pp. 105-112), The Hague, The Netherlands. Google ScholarGoogle Scholar
  11. Bälter, O., & Sidner, C. L. (2002, October 19-23). Bifrost inbox organizer: Giving users control over the inbox. Paper presented at the 2nd Nordic Conference on Human-Computer Interaction (pp. 111-118), Aarhus, Denmark. Google ScholarGoogle Scholar
  12. Bao, X., Herlocker, J. L., & Dietterich, T. G. (2006). Fewer clicks and less frustration: Reducing the cost of reaching the right folder. In Proceedings of the 11th International Conference on Intelligent User Interfaces (pp. 178-185), Sydney, Australia (ACM Press). Google ScholarGoogle Scholar
  13. Barreau, D. K. (1995). Context as a factor in personal information management systems. Journal of the American Society for Information Science, 46 (5), 327-339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Barreau, D. K., & Nardi, B. (1995). Finding and reminding: File organization from the desktop. SIGCHI Bulletin, 27 (3), 39-43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Barrett, L. F., & Barrett, D. J. (2001). An introduction to computerized experience sampling in psychology. Social Science Computer Review, 19 (2), 175-185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Barsalou, L. W. (1983). Ad hoc categories. Memory & Cognition, 11 (3), 211-227.Google ScholarGoogle Scholar
  17. Barsalou, L. W. (1991). Deriving categories to achieve goals. In G. H. Bower (Ed.), The Psychology of Learning and Motivation: Advances in Research and Theory (Vol. 27). New York: Academic Press.Google ScholarGoogle Scholar
  18. Bates, M. J. (1988). How to use controlled vocabularies more effectively in online searching. Online, 12 (6), 45-56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bates, M. J. (1989). The design of browsing and berrypicking techniques for the online search interface. Online, 13 (5), 407-424.Google ScholarGoogle ScholarCross RefCross Ref
  20. Bates, M. J. (2002). Speculations on browsing, directed searching, and linking in relation to the Bradford distribution. In H. Bruce, R. Fidel, P. Ingwersen & P. Vakkari (Eds.), Emerging Frameworks and Methods: Proceedings of the Fourth International Conference on Conceptions of Library and Information Science, CoLIS 4 (pp. 137-150), Seattle. Greenwood Village, CO: Libraries Unlimited.Google ScholarGoogle Scholar
  21. Belkin, N. J. (1993). Interaction with texts: Information retrieval as information-seeking behaviour. Paper presented at the Information Retrieval 1993: von der Modellierung zur Anwendung (First Conference of the Gesellschaft fur Informatik Fachgruppe Information Retrieval) (pp. 55-66), Konstanz, Germany.Google ScholarGoogle Scholar
  22. Belkin, N. J., & Croft, W. B. (1992). Information filtering and information retrieval: Two sides of the same coin? Communications of the ACM, 35 (12), 29-38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Belkin, N. J., Oddy, R. N., & Brooks, H. M. (1982). ASK for information retrieval: Parts 1 & 2. Journal of Documentation, 38 (2/3), 61-71, 145-164.Google ScholarGoogle ScholarCross RefCross Ref
  24. Belkin, N. J., Seeger, T., & Wersig, G. (1983). Distributed expert problem treatment as a model for information system analysis and design. Journal of Information Science, 5 (5), 153-167.Google ScholarGoogle ScholarCross RefCross Ref
  25. Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D. G., & Ducheneaut, N. (2004, April 24-29). What a to-do: Studies of task management towards the design of a personal task list manager. Paper presented at the Conference on Human Factors in Computing Systems, CHI 2004 (pp. 735-742), Vienna, Austria. Google ScholarGoogle Scholar
  26. Bellotti, V., Ducheneaut, N., Howard, M., & Smith, I. (2003). Taking email to task: The design and evaluation of a task management centered email tool. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2003 (pp. 345-352), Fort Lauderdale, FL. Google ScholarGoogle Scholar
  27. Bellotti, V., Ducheneaut, N., Howard, M., Neuwirth, C., & Smith, I. (2002, June 25-28). Innovation in extremis: Evolving an application for the critical work of email and information management. Paper presented at the Conference on Designing Interactive Systems, DIS2002 (pp. 181-192), London. Google ScholarGoogle Scholar
  28. Bellotti, V., Ducheneaut, N., Howard, M., Smith, I., & Grinter, R. (2005). Quality vs. quantity: Email-centric task-management and its relation with overload. Human-Computer Interaction, 20 (1-2), 89-138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Bellotti, V., & Sellen, A. (1993, September 13-17). Design for privacy in ubiquitous computing environments. Paper presented at the 3rd European Conference on Computer Supported Cooperative Work, ECSCW'93 (pp. 77-92), Milan, Italy. Google ScholarGoogle Scholar
  30. Bensaude-Vincent, B. (2001). Graphic representations of the periodic system of chemical elements. In U. Klein (Ed.), Tools and Modes of Representation in the Laboratory Sciences. Dordrecht, Germany: Kluwer Academic.Google ScholarGoogle Scholar
  31. Bergman, O., Beyth-Marom, R., and Nachmias, R. (2003). The user-subjective approach to personal information management systems. Journal of the American Society for Information Science and Technology, 54 (9), 872-878. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Berlin, L. M., Jeffries, R., O'Day, V. L., Paepcke, A., & Wharton, C. (1993, April 24-29). Where did you put it? Issues in the design and use of group memory. Paper presented at the Conference on Human Factors and Computing Systems, INTERACT 1993 and CHI 1993 (pp. 23-30), Amsterdam, The Netherlands. Google ScholarGoogle Scholar
  33. Berndt, E., & Morrison, J. (1981). Capacity utilization measures: Underlying economic theory and an alternative approach. American Economic Review, 71 (2), 48-52.Google ScholarGoogle Scholar
  34. Berners-Lee, T. (1998). Semantic Web roadmap: An attempt to give a high-level plan of the architecture of the Semantic Web--www.w3.org/DesignIssues/Semantic.html.Google ScholarGoogle Scholar
  35. Beyer, H., & Holtzblatt, K. (1998). Contextual Design: Defi ning Customer-Centered Systems . San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  36. Bianco, A. (2004, July 12). The vanishing mass market. BusinessWeek .Google ScholarGoogle Scholar
  37. Blair, A. (1961 [January 2003]). Reading strategies for coping with information overload ca.1550-1700. Journal of the History of Ideas, 64 (1), 11-28 (University of Pennsylvannia Press).Google ScholarGoogle Scholar
  38. Blair, D. C., & Maron, M. E. (1985). An evaluation of retrieval effectiveness for a full-text documentretrieval system. Communications of the ACM, 28 (3), 289-299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Bliss, H. E. (1933). The Organization of Knowledge in Libraries . New York: H. W. Wilson.Google ScholarGoogle Scholar
  40. Boardman, R. (2004). Improving Tool Support for Personal Information Management. London: Imperial College.Google ScholarGoogle Scholar
  41. Boardman, R., & Sasse, M. A. (2004). "Stuff goes into the computer and doesn't come out": A cross-tool study of personal information management. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 583-590), Vienna, Austria. Google ScholarGoogle Scholar
  42. Bondarenko, O., & Janssen, R. (2005, April). Documents at hand: Learning from paper to improve digital technologies. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2005 (pp. 121-130), Portland, OR. Google ScholarGoogle Scholar
  43. Bower, G. H., Clark, M. C., Lesgold, A. M., & Winzenz, D. (1969). Hierarchical retrieval schemes in recall of categorized word lists. Journal of Verbal Learning and Verbal Behavior, 8 , 323-343.Google ScholarGoogle ScholarCross RefCross Ref
  44. Braman, S. (1989). Defi ning Information: An Approach for Policymakers. Telecommunications Policy, 13 , 233-242.Google ScholarGoogle ScholarCross RefCross Ref
  45. Breese, J. S., Heckermen, D., & Kadie, C. M. (1998). Empirical Analysis of Predictive Algorithms for Collaborative Filtering , No. MSR-TR-98-12, Microsoft Research.Google ScholarGoogle Scholar
  46. Briet, S. (1951). Qu'est-ce que la Documentation . Paris: EDIT.Google ScholarGoogle Scholar
  47. Broadbent, D. E. (1958). Perception and Communication . London: Pergamon Press.Google ScholarGoogle Scholar
  48. Brooke, J. (1998). Science and religion: Lessons from history? Science, 282 (5396), 1985-1986.Google ScholarGoogle ScholarCross RefCross Ref
  49. Bruce, H. (2005). Personal, anticipated information need. Information Research, 10 (3).Google ScholarGoogle Scholar
  50. Bruce, H., Jones, W., & Dumais, S. (2004). Information behavior that keeps found things found. Information Research, 10 (1).Google ScholarGoogle Scholar
  51. Brush, A.J.B., Bargeron, D., Gupta, A., & Cadiz, J. J. (2001). Robust annotation positioning in digital documents. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 285-292), Seattle (ACM Press). Google ScholarGoogle Scholar
  52. Buckland, M. K. (1991). Information as thing. Journal of the American Society for Information Science, 42 (5), 351-360.Google ScholarGoogle ScholarCross RefCross Ref
  53. Buckland, M. K. (1997). What is a "document"? Journal of the American Society of Information Science, 48 (9), 804-809. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Budzik, J., Hammond, K., & Birnbaum, L. (2001). Information access in context. Knowledge Based Systems, 14 (1-2), 37-53.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Bush, V. (1945, July). As we may think. The Atlantic Monthly, 176 , 641-649.Google ScholarGoogle Scholar
  56. Buzan, T., & Buzan, B. (2004). The Mind Map Book: How to Use Radiant Thinking to Maximize Your Brain's Untapped Potential . London: BBC.Google ScholarGoogle Scholar
  57. Capra, R., & Perez-Quiñones, M. A. (2005). Using Web search engines to fi nd and refi nd information. IEEE Computer, 38 (10), 36-42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Capurro, R., & Hjorland, B. (2003). The concept of information. In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST) , 37 , 343-411.Google ScholarGoogle ScholarCross RefCross Ref
  59. Card, S. K., Moran, T. P., & Newell, A. (1983). The Psychology of Human-Computer Interaction . Hillsdale, NJ: Erlbaum. Google ScholarGoogle Scholar
  60. Carmody, S., Gross, W., Nelson, T., Rice, D., & Van Dam, A. (1969). A hypertext editing system for the /360. In M. Faiman & J. Nievergelt (Eds.), Pertinent Concepts in Computer Graphics (pp. 291-330). Urbana, IL: University of Illinois Press.Google ScholarGoogle Scholar
  61. Carstensen, P. H., & Nielsen, M. (2001, September 30-October 3). Characterizing modes of coordination: A comparison between oral and artifact based coordination. In Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work (pp. 81-90), Boulder, CO. Google ScholarGoogle Scholar
  62. Chowdhury, A., Frieder, O., Grossman, D., & McCabe, M. C. (2002). Collection statistics for fast duplicate document detection. ACM Transactions on Information Systems , 20 (2), 171-191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Churchill, E. F., Trevor, J., Bly, S., Nelson, L., & Cubranic, D. (2000). Anchored conversations: Chatting in the context of a document. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 454-461), The Hague, The Netherlands (ACM Press). Google ScholarGoogle Scholar
  64. Claborne, G., & Jones, W. (2005). Linnaeus, Mendeleev, Dewey and Ranganathan: What can they tell us today about the organization of information? Technical Report No. IS-TR-2005-11-01. Seattle: University of Washington.Google ScholarGoogle Scholar
  65. Cockburn, A., & McKenzie, B. (2000, September 5-8). An evaluation of cone trees. In People and Computers XV, Proceedings of the 2000 British Computer Society Conference on Human-Computer Interaction (pp. 425-436), University of Sunderland (Springer-Verlag).Google ScholarGoogle Scholar
  66. Cole, I. (1982). Human aspects of office filing: Implications for the electronic office. Paper presented at the Human Factors Society 26th Annual Meeting, Seattle.Google ScholarGoogle Scholar
  67. Combs, B., & Slovic, P. (1979). Newspaper coverage of causes of death. Journalism Quarterly, 56 (4), 837-843.Google ScholarGoogle ScholarCross RefCross Ref
  68. Computer Research Association Conference on Grand Research Challenges in Information Security and Assurance (2003, November 16-19), Warrenton, VA--www.cra.org/ Activities/grand.challenges/security/.Google ScholarGoogle Scholar
  69. Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. (2005). Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 81-90), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  70. Consolvo, S., & Walker, M. (2003). Using the experience sampling method to evaluate ubicomp applications. IEEE Pervasive Computing Mobile and Ubiquitous Systems, 2 (2), 24-31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Cooper, J. W., Coden, A. R., & Brown, E. W. (2002). Detecting similar documents using salient terms. In Proceedings of the 11th International Conference on Information and Knowledge Management (pp. 245-251), McLean, VA (ACM Press). Google ScholarGoogle Scholar
  72. Cornelius, I. (2002). Theorizing information. Annual Review of Information Science and Technology, 36 , 393-425.Google ScholarGoogle Scholar
  73. Covey, S. R. (1989). The Seven Habits of Highly Effective People . New York: Simon and Schuster.Google ScholarGoogle Scholar
  74. Cranor, L. F. (2002). Web Privacy with P3P . Cambridge, MA: O'Reilly. Google ScholarGoogle Scholar
  75. Cranor, L. F. (2005). Privacy policies and privacy preferences. In L. F. Cranor & S. Garfi nkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use (pp. 447-471). Sebastopol, CA: O'Reilly Media.Google ScholarGoogle Scholar
  76. Craik, F.I.M., & Lockhart, R. S. (1972). Levels of processing: A framework for memory research. Journal of Verbal Learning and Verbal Behavior, 11 , 671-684.Google ScholarGoogle Scholar
  77. Csikszentmihalyi, M. (1991). Flow: The Psychology of Optimal Experience . New York: HarperCollins.Google ScholarGoogle Scholar
  78. Cutrell, E., & Dumais, S. T. (2006). Exploring personal information. Communications of the ACM, 49 (4), 50-51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Cutrell, E., Dumais, S. T., & Teevan, J. (2006). Searching to eliminate personal information management. Communications of the ACM, 49 (1), 58-64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Cutrell, E., Robbins, D., Dumais, S., & Sarin, R. (2006). Fast, fl exible filtering with phlat. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 261-270). Montreal, QUE, Canada (ACM Press). Google ScholarGoogle Scholar
  81. Czerwinski, M., Dumais, S., Robertson, G., Dziadosz, S., Tiernan, S., & van Dantzich, M. (1999). Visualizing implicit queries for information management and retrieval. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 560-567), Pittsburgh (ACM Press). Google ScholarGoogle Scholar
  82. Czerwinski, M., Gage, D., Gemmel, J., Marshall, C. C., Perez-Quinones, M., Skeels, M. M., et al. (2006). Digital memories in an era of ubiquitous computing and abundant storage. Communications of the ACM, Special Issue on Personal Information Management, 49 (1), 44-50. Google ScholarGoogle Scholar
  83. Czerwinski, M., Horvitz, E., & Wilhite, S. (2004, April 24-29). A diary study of task switching and interruptions. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 175-182), Vienna, Austria. Google ScholarGoogle Scholar
  84. Davies, G., & Thomson, D., Eds. (1988). Memory in Context: Context in Memory. Chichester, England: John Wiley & Sons.Google ScholarGoogle Scholar
  85. Deerwester, S., Dumais, S., Landauer, T. K., Furnas, G. W., & Harshman, R. A. (1990). Indexing by latent semantic analysis. Journal of the Society for Information Science, 41 (6), 391-407.Google ScholarGoogle ScholarCross RefCross Ref
  86. Dervin, B. (1992). From the mind's eye of the user: The sense-making qualitative-quantitative methodology. In J. Glazier & R. Powell (Eds.), Qualitative Research in Information Management (pp. 61-84). Englewood, CO: Libraries Unlimited.Google ScholarGoogle Scholar
  87. Dervin, B., and Frenette, M. (2003). Sense-making methodology: Communicating communicatively with campaign audiences. In B. Dervin and L. Foreman-Wernet (Eds.), Sense-Making Methodology Reader. Selected Writings of Brenda Dervin (pp. 233-249). Cresskill, NJ: Hampton Press.Google ScholarGoogle Scholar
  88. Dillon, A., & Vaughan, M. (1997). It's the journey and the destination: Shape and the emergent property of genre in evaluating digital documents. New Review of Multimedia and Hypermedia, 3 , 91-106.Google ScholarGoogle ScholarCross RefCross Ref
  89. Dong, X., & Halevy, A. Y. (2005, January 4-7). A platform for personal information management and integration. Paper presented at the 2nd Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, CA.Google ScholarGoogle Scholar
  90. Dourish, P., Edwards, W. K., LaMarca, A., & Salisbury, M. (1999, November 7-10). Using properties for uniform interaction in the Presto Document System. Paper presented at the 12th Annual ACM Symposium on User Interface Software and Technology, UIST 1999 (pp. 55-64), Asheville, NC. Google ScholarGoogle Scholar
  91. Dumais, S. T., Cutrell, E., Sarin, R., & Horvitz, R. (2004, July 25-29). Implicit queries (IQ) for contextualized search. In Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (p. 594), Sheffi eld, UK (ACM Press). Google ScholarGoogle Scholar
  92. Dumais, S., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R., & Robbins, D. (2003, July). Stuff I've seen: A system for personal information retrieval and re-use. Paper presented at the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2003 (pp. 72-79), Toronto, ONT, Canada. Google ScholarGoogle Scholar
  93. Durso, F. T., & Gronlund, S. (1999). Situation awareness. In F. T. Durso, R. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M. T. H. Chi (Eds.), The Handbook of Applied Cognition (pp. 284-314). Chichester, England: John Wiley & Sons.Google ScholarGoogle Scholar
  94. Eisenberg, M., Lowe, C. A., & Spitzer, K. L. (2004). Information Literacy: Essential Skills for the Information Age (2nd ed.). Westport, CT: Libraries Unlimited.Google ScholarGoogle Scholar
  95. Engelbart, D. C. (1961). Special considerations of the individual as a user, generator and retriever of information. American Documentation, 12 (2), 121-125.Google ScholarGoogle ScholarCross RefCross Ref
  96. Engelbart, D. C. (1963). A conceptual framework for the augmentation of man's intellect. In Vistas in Information Handling . London: VI Spartan Books.Google ScholarGoogle Scholar
  97. Engelbart, D., & English, W. (1994 [video made in 1968]). A Research Center for Augmenting Human Intellect. Reprinted in ACM SIGGRAPH Video Review, 106 .Google ScholarGoogle Scholar
  98. Feldman, S. (2004). The high cost of not fi nding information. KM World, 13 (3)--http://www. kmworld.com/Articles/ReadArticle.aspx?ArticleID=9534.Google ScholarGoogle Scholar
  99. Fertig, S., Freeman, E., & Gelernter, D. (1996, April 13-18). Lifestreams: An alternative to the desktop metaphor. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1996 (pp. 410-411), Vancouver, BC, Canada. Google ScholarGoogle Scholar
  100. Fidel, R., Bruce, H., Pejtersen, A., Dumais, S., Grudin, J., & Poltrock, S. (2000). Collaborative information retrieval. In L. Hoglund (Ed.), The New Review of Information Behavior Research: Studies of Information Seeking in Context . London: Taylor Graham.Google ScholarGoogle Scholar
  101. Fidel, R., & Pejtersen, A. M. (2004). From information behaviour research to the design of information systems: The Cognitive Work Analysis framework. Information Research, 10 (1).Google ScholarGoogle Scholar
  102. Fiske, S. T., & Taylor, S. E. (1991). Social Cognition (2nd ed.). New York: McGraw-Hill.Google ScholarGoogle Scholar
  103. Flanagan, J. C. (1954). The Critical Incident Technique. Psychological Bulletin, 51 (4), 327-358.Google ScholarGoogle Scholar
  104. Folk, C., & Gibson, B. (Eds.). (2001). Attraction, Distraction and Action: Multiple Perspectives on Attentional Capture (Vol. 133). Amsterdam: Elsevier Science BV.Google ScholarGoogle Scholar
  105. Foltz, P. W., & Dumais, S. T. (1992). Personalized information delivery: An analysis of information filtering methods. Communications of the ACM, 35 (12), 51-60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Fonseca, F. T., & Martin, J. E. (2004). Toward an alternative notion of information systems ontologies: Information engineering as a hermeneutic enterprise. Journal of the American Society for Information Science and Technology, 56 (1), 46-57. Google ScholarGoogle ScholarCross RefCross Ref
  107. Franconeri, S. L., Hollingworth, A., & Simons, D. J. (2005). Do new objects capture attention? Psychological Science, 16 (4), 275-281.Google ScholarGoogle ScholarCross RefCross Ref
  108. Freeman, E., & Gelernter, D. (1996). Lifestreams: A storage model for personal data. ACM SIGMOD Record (ACM Special Interest Group on Management of Data), 25 (1), 80-86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Freitas, A. L., & Higgins, E. T. (2002). Enjoying goal-directed action: The role of regulatory fi t. Psychological Science, 13 (1), 1-6.Google ScholarGoogle ScholarCross RefCross Ref
  110. Friedman, B., Kahn, P. H., Jr., Hagman, J., Severson, R. L., & Gill, B. (2006). The watcher and the watched: Social judgments about privacy in a public place. Human-Computer Interaction Journal, 21 (2), 235-272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Furnas, G. W., Landauer, T. K., Gomez, L. M., & Dumais, S. T. (1987). The vocabulary problem in human-system communication. Communications of the ACM 30 (11), 964-971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Furnas, G. W., & Russell, D. M. (2005). Making sense of sensemaking. In Extended Abstracts of CHI 2005, Conference on Human Factors in Computing Systems (pp. 2115-2116), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  113. Garvin, D. (2000). Learning in Action. Boston: Harvard Business School Press.Google ScholarGoogle Scholar
  114. Gemmell, J., Bell, G., & Lueder, R. (2006). MyLifeBits: A personal database for everything. Communications of the ACM, 49 (1), 88-95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Gemmell, J., Bell, G., Lueder, R., Drucker, S., & Wong, C. (2002). Mylifebits: Fulfilling the memex vision. Paper presented at the 2002 ACM Workshops on Multimedia (pp. 235-238), Juan-les-Pins, France. Google ScholarGoogle Scholar
  116. Gemmell, J., Lueder, R., & Bell, G. (2003, November 7). The MyLifeBits lifetime store. Paper presented at the ACM SIGMM 2003 Workshop on Experiential Telepresence, ETP 2003 (pp. 565-567), Berkeley, CA. Google ScholarGoogle Scholar
  117. Gemmell, J., Williams, L., Wood, K., Bell, G., & Lueder, R. (Oct. 15, 2004). Passive capture and ensuing issues for a personal lifetime store. Paper presented at the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences, CARPE 2004 (pp. 48-55), New York. Google ScholarGoogle Scholar
  118. Gershon, N. (1995, December). Human information interaction. Paper presented at the 4th International World Wide Web Conference, Boston.Google ScholarGoogle Scholar
  119. Gibson, J. J. (1977). The theory of affordances. In R. E. Shaw & J. Bransford (Eds.), Perceiving, Acting, and Knowing: Toward an Ecological Psychology (pp. 67-82). Hillsdale, NJ: Erlbaum.Google ScholarGoogle Scholar
  120. Gibson, J. J. (1979). The Ecological Approach to Visual Perception . Boston: Houghton Miffl in. Golder, S., & Huberman, B. A. (2006). The structure of collaborative tagging systems. Journal of Information Science 32 (2), 198-208. Google ScholarGoogle Scholar
  121. Gonzalez, V. M., & Mark, G. (2004). Constant, constant, multitasking craziness: Managing multiple working spheres. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 113-120), Vienna, Austria. Google ScholarGoogle Scholar
  122. Gordin, M. (2004). A Well-Ordered Thing: Dmitrii Mendeleev and the Shadow of the Periodic Table. New York: Basic Books.Google ScholarGoogle Scholar
  123. Greenbaum, J. M., & Kyng, M. (1991). Design at Work: Cooperative Design of Computer Systems . Hillsdale, NJ: Erlbaum. Google ScholarGoogle Scholar
  124. Grudin, J. (1988). Why CSCW applications fail: Problems in the design and evaluation of organizational interfaces. In Proceedings of the 1988 ACM Conference on Computer-Supported Cooperative Work (pp. 85-93), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  125. Grudin, J. (1993). Interface: An evolving concept. Communications of the ACM, 36 (4), 110-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Grudin, J. (2001). Desituating action: Digital representation of context. Human-Computer Interaction, 16 (2-4), 269-286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. Gwizdka, J. (2002a, April 20-25). Reinventing the inbox: Supporting the management of pending tasks in email. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, Doctoral Consortium, CHI 2002 (pp. 550-551), Minneapolis. Google ScholarGoogle Scholar
  128. Gwizdka, J. (2002b, September 30-October 3). TaskView: Design and evaluation of a task-based email interface. Paper presented at the Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 2002 , Toronto, ONT, Canada. Google ScholarGoogle Scholar
  129. Gwizdka, J., & Chignell, M. (2007). Individual Differences. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google ScholarGoogle Scholar
  130. Hackos, J., & Redish, J. (1998). User and Task Analysis for Interface Design . New York: John Wiley & Sons. Google ScholarGoogle Scholar
  131. Hafner, K. (2004, November 10). Even digital memories can fade. New York Times .Google ScholarGoogle Scholar
  132. Hawkins, J., & Blakeslee, S. (2006). On Intelligence . New York: Owl Books.Google ScholarGoogle Scholar
  133. Henzinger, M. (2006). Finding near-duplicate web pages: A large-scale evaluation of algorithms. In Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 284-291), Seattle (ACM Press). Google ScholarGoogle Scholar
  134. Henzinger, M., Chang, B.-W., Milch, B., & Brin, S. (2003). Query-free news search. Paper presented at the 12th International World Wide Web Conference, Budapest, Hungary. Google ScholarGoogle Scholar
  135. Herrmann, D., Brubaker, B., Yoder, C., Sheets, V., & Tio, A. (1999). Devices that remind. In F. T. Durso, R. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M. T. H. Chi (Eds.), Handbook of Applied Cognition (pp. 377-407). Chichester, England: John Wiley & Sons.Google ScholarGoogle Scholar
  136. Holtzblatt, K., & Jones, S. (1993). Contextual Inquiry: Principles and Practice. In Participatory Design: Principles and Practices . New York: Erlbaum.Google ScholarGoogle Scholar
  137. Horvitz, E., & Apacible, J. (2003). Learning and reasoning about interruption. In Proceedings of the 5th International Conference on Multimodal Interfaces (pp. 20-27), Vancouver, BC, Canada (ACM Press). Google ScholarGoogle Scholar
  138. Horvitz, E., Apacible, J., & Koch, P. (2004, November). BusyBody: Creating and Fielding Personalized Models of the Cost of Interruption. Paper presented at the CSCW, Conference on Computer Supported Cooperative Work (pp. 507-510), Chicago. Google ScholarGoogle Scholar
  139. Hunter, J., and Choudhury, S. (2003). A semi-automated digital preservation system based on semantic web services. In Proceedings of JCDL '04 (pp. 269-278), Tucson, AZ (ACM Press). Google ScholarGoogle Scholar
  140. Hutchins, E. (1994). Cognition in the Wild . Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  141. Huynh, D., Karger, D., & Quan, D. (2002). Haystack: A platform for creating, organizing and visualizing information using RDF. Paper presented at the International Workshop for the Semantic Web, Honolulu.Google ScholarGoogle Scholar
  142. Hyde, T. S., & Jenkins, J. J. (1969). Differential effects of incidental tasks on the organization of recall of a list of highly associated words. Journal of Experimental Psychology, 82 , 472-481.Google ScholarGoogle ScholarCross RefCross Ref
  143. Jensen, C., & Potts, C. (2004, April 24-29). Privacy policies as decision-making tools: an evaluation of online privacy notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 471-478), Vienna, Austria. Google ScholarGoogle Scholar
  144. Jensen, C., Potts, C., & Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63 (1-2), 203-227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. Johnson, S. B. (2005, January 30). Tool for thought. New York Times .Google ScholarGoogle Scholar
  146. Jones, W. (1986). On the applied use of human memory models: The Memory Extender personal filing system. International Journal of Man Machine Studies, 25(2) , 191-228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Jones, W. (2004). Finders, keepers? The present and future perfect in support of personal information management. First Monday --http://www.fi rstmonday.dk/issues/issue9_3/ jones/index.html.Google ScholarGoogle Scholar
  148. Jones, W. (2006). Personal information management. Annual Review of Information Science and Technology (ARIST), 41 , 453-504. Google ScholarGoogle ScholarCross RefCross Ref
  149. Jones, W., & Anderson, J. R. (1987). Short- vs. long-term memory retrieval: A comparison of the effects of information load and relatedness. Journal of Experimental Psychology: General, 116 , 137-153.Google ScholarGoogle ScholarCross RefCross Ref
  150. Jones, W., Bruce, H., & Dumais, S. (2001, November 5-10). Keeping founds things found on the Web. Paper presented at the 10th International Conference on Information and Knowledge Management, CIKM 2001 (pp. 119-134), Atlanta. Google ScholarGoogle Scholar
  151. Jones, W., Bruce, H., & Dumais, S. (2003, September). How do people get back to information on the Web? How can they do it better? Paper presented at the 9th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2003 (pp. 793-796), Zurich.Google ScholarGoogle Scholar
  152. Jones, W., Bruce, H., & Foxley, A. (2006). Project contexts to situate personal information. Paper presented at the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle. Google ScholarGoogle Scholar
  153. Jones, W., Bruce, H., Foxley, A., & Munat, C. (2006). Planning personal projects and organizing personal information. Paper presented at the 69th Annual Meeting of the American Society for Information Science and Technology, ASIST 2006 , Vol. 43, Austin, TX.Google ScholarGoogle Scholar
  154. Jones, W., & Dumais, S. (1986). The spatial metaphor for user interfaces--Experimental tests of reference by location versus name. ACM Transactions on Offi ce Information Systems, 4 (1), 42-63. Google ScholarGoogle Scholar
  155. Jones, W., Dumais, S., & Bruce, H. (2002). Once found, what then?: A study of "keeping" behaviors in the personal use of Web information. In Proceedings 65th Annual Meeting of the American Society for Information Science and Technology, ASIST 2002 , Vol. 39 (pp. 391-402), Philadelphia.Google ScholarGoogle Scholar
  156. Jones, W., & Furnas, G. W. (1987). Pictures of relevance: A geometric approach to the analysis of similarity measures. Journal of the American Society for Information Science, 38 (6), 420-442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Jones, W., Munat, C., & Bruce, H. (2005). The Universal Labeler: Plan the project and let your information follow. In A. Grove (Ed.), Proceedings 68th Annual Meeting of the American Society for Information Science and Technology, ASIST 2005 , Vol. 42, Charlotte, NC.Google ScholarGoogle Scholar
  158. Jones, W., Phuwanartnurak, A. J., Gill, R., & Bruce, H. (2005, April 2-7). Don't take my folders away! Organizing personal information to get things done. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2005 (pp. 1505-1508), Portland, OR. Google ScholarGoogle Scholar
  159. Jones, W., & Ross, B. (2006). Human cognition and personal information management. In F. T. Durso, R. S. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M.T.H. Chi (Eds.), Handbook of Applied Cognition . New York: John Wiley & Sons.Google ScholarGoogle Scholar
  160. Kahneman, D., & Tversky, A. (1979). Prospect Theory: An analysis of decision under risk. Econometrica, XLVII , 263-292.Google ScholarGoogle ScholarCross RefCross Ref
  161. Kaptelinin, V. (1996, April 11-13). Creating computer-based work environments: An empirical study of Macintosh users. Presented at the SIGCPR/SIGMIS 1996 Annual Meetings of the Association for Computing Machinery Special Interest Group on Computer Personnel Research/ Special Interest Group on Management Information Systems (pp. 360-366), Denver, CO. Google ScholarGoogle Scholar
  162. Kaptelinin, V. (2003, April). Integrating tools and tasks: UMEA--Translating interaction histories into project contexts. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2003 , Ft. Lauderdale, FL. Google ScholarGoogle Scholar
  163. Karat, C.-M., Brodie, C., & Karat, J. (2005). Usability design and evaluation for privacy and security solutions. In L. F. Cranor & S. Garfi nkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use (pp. 47-74). Sebastopol, CA: O'Reilly Media.Google ScholarGoogle Scholar
  164. Karat, C.-M., Brodie, C., & Karat, J. (2006). Usable privacy and security for personal information management. Communications of the ACM, 49 (1), 56-57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. Karat, C.-M., Brodie, C., & Karat, J. (2007). Management of personal information disclosure: The Interdependence of Privacy, Security and Trust. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google ScholarGoogle Scholar
  166. Karat, J., Karat, C., Brodie, C., & Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human Computer Studies, 63 (1), 153-174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. Karat, J., Karat, C., Brodie, C., & Feng, J. (2006, April 22-27). Evaluating interfaces for privacy policy rule authoring. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 83-92), Montreal, QUE, Canada (ACM Press). Google ScholarGoogle Scholar
  168. Karger, D. R. (2007). Unify everything: It's all the same to me. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google ScholarGoogle Scholar
  169. Karger, D. R., Bakshi, K., Huynh, D., Quan, D., & Sinha, V. (2005, January 4-7). Haystack: A general-purpose information management tool for end users based on semistructured data. Paper presented at the Second Biennial Conference on Innovative Data Systems Research, CIDR 2005 , Asilomar, CA.Google ScholarGoogle Scholar
  170. Karger, D. R., & Quan, D. (2004). Collections: Flexible, essential tools for information management. In Extended Abstracts of CHI 2004, Conference on Human factors in Computing Systems (pp. 1159-1162), Vienna, Austria (ACM Press). Google ScholarGoogle Scholar
  171. Kaye, J. J., Vertesi, J., Avery, S., Dafoe, A., David, S., Onaga, L., et al. (2006). To have and to hold: Exploring the personal archive. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 275-284), Montreal, QUE (ACM Press). Google ScholarGoogle Scholar
  172. Kelly, D., & Teevan, J. (2007). Understanding what works: Evaluating PIM Tools. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  173. Kidd, A. (1994, April 24-28). The marks are on the knowledge worker. Paper presented at the ACM SIGCHI Conference on Human factors in Computing Systems, CHI 1994 (pp. 186-191), Boston. Google ScholarGoogle Scholar
  174. Kim, K.-S., & Allen, B. (2002). Cognitive and task infl uences on web searching behavior. Journal of the American Society for Information Science and Technology, 53 (2), 109-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  175. Kirsh, D. (2000). A few thoughts on cognitive overload. Intellectica, 30 (1), 19-51.Google ScholarGoogle Scholar
  176. Klein, G., Moon, B., & Hoffman, R. R. (2006). Making Sense of Sensemaking 1: Alternative Perspectives. IEEE Intelligent Systems, 21 (4), 70-73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. Knickerbocker, B. (2002, September 11). A corner still not turned in America's story. The Christian Science Monitor --http: //www.csmonitor.com/specials/oneyearlater/ livesChanged_corner.html.Google ScholarGoogle Scholar
  178. Koolstra, C. M., van Zanten, J., Lucassen, N., & Ishaak, N. (2004). The formal pace of Sesame Street over 26 years. Perceptual and Motor Skills, 99 (1), 354-360.Google ScholarGoogle ScholarCross RefCross Ref
  179. Kraft, R., Chang, C. C., Maghoul, F., & Kumar, R. (2006). Searching with context. In Proceedings of the 15th International Conference on World Wide Web (pp. 477-486), Edinburgh, Scotland (ACM Press). Google ScholarGoogle Scholar
  180. Kraft, R., Maghoul, F., & Chang, C. C. (2005). Y!Q: Contextual search at the point of inspiration. In Proceedings of the 14th ACM International Conference on Information and Knowledge Management (pp. 816-823). Bremen, Germany (ACM Press). Google ScholarGoogle Scholar
  181. Kuny, T. (1998). The digital dark ages? Challenges in the preservation of electronic information. International Preservation News , 17.Google ScholarGoogle Scholar
  182. Lang, A., Zhou, S., Shwartz, N., Bolls, P., & Potter, R. (2000, Winter). The effects of edits on arousal, attention, and memory for television messages: When an edit is an edit can an edit be too much? Journal of Broadcasting & Electronic Media , 44 (1), 94-109.Google ScholarGoogle ScholarCross RefCross Ref
  183. Lansdale, M. (1988). The psychology of personal information management. Applied Ergonomics, 19 (1), 55-66.Google ScholarGoogle ScholarCross RefCross Ref
  184. Lansdale, M. (1991). Remembering about documents: Memory for appearance, format, and location. Ergonomics, 34 (8), 1161-1178.Google ScholarGoogle ScholarCross RefCross Ref
  185. Lansdale, M., & Edmonds, E. (1992). Using memory for events in the design of personal filing systems. International Journal of Man-Machine Studies, 36 (1), 97-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. Larkin, J. H., & Simon, H. A. (1987). Why a diagram is (sometimes) worth ten thousand words. Cognitive Science, 11 (1), 65-99.Google ScholarGoogle Scholar
  187. Lashley, K. S. (1950). In search of the engram. Symposia of the Society for Experimental Biology, 4 , 454-482.Google ScholarGoogle Scholar
  188. LeFurgy, W. G. (2003). PDF/A: Developing a file format for long-term preservation. RLG DigiNews, 7 (6).Google ScholarGoogle Scholar
  189. Levy, D. (2001). Scrolling Forward: Making Sense of Documents in the Digital Age . New York: Arcade Publishing.Google ScholarGoogle Scholar
  190. Licklider, J.C.R. (1960). Man-computer symbiosis. IRE Transactions on Human Factors in Electronics, HFE-1 , 4-11.Google ScholarGoogle ScholarCross RefCross Ref
  191. Lorie, R. (2002). A methodology and system for preserving digital data. In Proceedings of JCDL '02 (pp. 312-319), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  192. Lucas, P. (2000, April 1-6). Pervasive information access and the rise of human-information interaction. In Extended Abstracts of CHI 2000, Conference on Human Factors in Computing Systems (p. 202), The Hague, The Netherlands (ACM Press). Google ScholarGoogle ScholarDigital LibraryDigital Library
  193. Lutters, W. G., Ackerman, M. S., & Zhou, X. (2007). Group Information Management. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google ScholarGoogle Scholar
  194. Lynch, K. (1960). The Image of the City . Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  195. Machlup, F. (1983). Semantic Quirks in Studies of Information. In F. Machlup & U. Mansfi eld (Eds.), The Study of Information: Interdisciplinary Messages (pp. 641-671). New York: Wiley.Google ScholarGoogle Scholar
  196. Mackay, W. E. (1988, September 26-28). More than just a communication system: Diversity in the use of electronic mail. Paper presented at the Conference on Computer-Supported Cooperative Work, CCSW 1988 (pp. 344-353), Portland, OR. Google ScholarGoogle Scholar
  197. MacLachlan, J., & Logan, M. (1993). Camera shot length in TV commercials and their memorability and persuasiveness. Journal of Advertising Research 33 (2), 57-61.Google ScholarGoogle Scholar
  198. Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed network: Using trail re-identifi cation to evaluate and design anonymity protection systems. Journal of Biomedical Informatics, 37 (3), 179-192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  199. Malone, T. W. (1983). How do people organize their desks: Implications for the design of office information systems. ACM Transactions on Offi ce Information Systems, 1 (1), 99-112. Google ScholarGoogle Scholar
  200. Maltz, D., & Ehrlich, K. Pointing the way: Active collaborative filtering. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems, CHI 1995 , Denver, CO. Google ScholarGoogle Scholar
  201. Mander, R., Salomon, G., & Wong, Y. Y. (1992, May). A "pile" metaphor for supporting casual organization of information. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1992 (pp. 627-634), Monterey, CA. Google ScholarGoogle Scholar
  202. Manguel, A. (1996). A History of Reading . New York: Viking.Google ScholarGoogle Scholar
  203. Marchionini, G. (1995). Information Seeking in Electronic Environments . Cambridge: Cambridge University Press. Google ScholarGoogle Scholar
  204. Marchionini, G., & Komlodi, A. (1998). Design of interfaces for information seeking. Annual Review of Information Science and Technology, 33 , 89-130.Google ScholarGoogle Scholar
  205. Mark, G., Gonzalez, V. M., & Harris, J. (2005 ). No task left behind? Examining the nature of fragmented work. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2005 (pp. 321-330), Portland, OR. Google ScholarGoogle Scholar
  206. Marlow, C., Naaman, M., Boyd, D., & Davis, M. (2006). HT06, tagging paper, taxonomy, Flickr, academic article, ToRead. In Proceedings of the 17th Conference on Hypertext and Hypermedia (pp. 31-40), Odense, Denmark (ACM Press). Google ScholarGoogle Scholar
  207. Marshall, C. C. (2006). Reading and interactivity in the digital library: Creating an experience that transcends paper. In D. B. Marcum & G. George (Eds.), Digital Library Development: The View from Kanazawa . Westport, CT: Libraries Unlimited.Google ScholarGoogle Scholar
  208. Marshall, C. C. (2007). Maintaining personal information: Issues associated with long-term storage, preservation, and access. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  209. Marshall, C. C., & Bly, S. (2005). Saving and using encountered information: Implications for electronic periodicals. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 111-120), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  210. Marshall, C. C., Bly, S., & Brun-Cottan, F. (2006). The long-term fate of our personal digital belongings: Toward a service model for personal archives. In IS&T's Archiving 2006 Conference , Ottawa, ONT, Canada (Society for Imaging Science and Technology).Google ScholarGoogle Scholar
  211. Marshall, C. C., & Jones, W. (2006). Keeping encountered information. Communications of the ACM, 49 (1): 66-67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  212. Mitchell, J., & Shneiderman, B. (1989). Dynamic versus static menus: An exploratory comparison. ACM SIGCHI Bulletin, 20 (4), 33-37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  213. Moen, A. (2007). Personal health information management. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google ScholarGoogle Scholar
  214. Morris, R. (2003). The Last Sorcerers: The Path from Alchemy to the Periodic Table . Washington, DC: Joseph Henry Press.Google ScholarGoogle Scholar
  215. Morville, P. (2005). Ambient Findability . Sebastopol, CA: O'Reilly.Google ScholarGoogle Scholar
  216. Mumford, M. D., Schultz, R. A., & Van Doorn, J. R. (2001). Performance in planning: Processes, requirements and errors. Review of General Psychology, 5 (3), 213-240.Google ScholarGoogle ScholarCross RefCross Ref
  217. Murnane, K., Phelps, M., & Malmberg, K. (1999). Context-dependent recognition memory: The ICE theory. Journal of Experimental Psychology: General, 128 (4), 403-415.Google ScholarGoogle ScholarCross RefCross Ref
  218. Murthy, S., Maier, D., Delcambre, L., & Bowers, S. (2004). Putting integrated information in context: Superimposing conceptual models with SPARCE. In Proceedings of the First Asian-Pacific Conference on Conceptual modeling , Vol. 31 (pp. 71-80), Dunedin, New Zealand (Australian Computer Society, Inc.). Google ScholarGoogle Scholar
  219. Naumer, C. M., & Fisher, K. E. (2007). Naturalistic approaches for understanding PIM. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  220. Negroponte, N. (1979). Books without pages. Paper presented at the International Conference on Communications IV, Boston.Google ScholarGoogle Scholar
  221. Neisser, U. (1967). Cognitive Psychology . New York: Appleton-Century Crofts.Google ScholarGoogle Scholar
  222. Nelson, T. H. (1965). File structure for the complex, the changing, and the indeterminate. In Proceedings of the 1965 20th ACM/CSC-ER National Conference (pp. 84-100), Cleveland, OH. Google ScholarGoogle Scholar
  223. Newell, A., Shaw, J. C., & Simon, H. A. (1958). Elements of a theory of human problem solving. Psychological Review, 65 , 151-166.Google ScholarGoogle Scholar
  224. Norman, D. A. (1988). The Psychology of Everyday Things . New York: Basic Books.Google ScholarGoogle Scholar
  225. Norman, D. A. (1990). The Design of Everyday Things . New York: Doubleday.Google ScholarGoogle Scholar
  226. Norman, D. A. (1992). Turn Signals Are the Facial Expressions of Automobiles . Cambridge, MA: Perseus Publishing.Google ScholarGoogle Scholar
  227. Norman, D. A. (1993). Things that Make Us Smart: Defending Human Attributes in the Age of the Machine . Reading, MA: Addison-Wesley. Google ScholarGoogle Scholar
  228. O'Conaill, B., & Frohlich, D. (1995, April). Timespace in the workplace: Dealing with interruptions. In Extended Abstracts of CHI 1995, Conference on Human Factors in Computing Systems (pp. 262-263), Denver, CO (ACM Press). Google ScholarGoogle Scholar
  229. O'Day, V., & Jeffries, R. (1993, April). Orienteering in an information landscape: How information seekers get from here to there. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1993 (pp. 438-445), Amsterdam, The Netherlands. Google ScholarGoogle Scholar
  230. Oddy, R. N. (1977). Information retrieval through man-machine dialogue. Journal of Documentation, 33 (1), 1-14.Google ScholarGoogle Scholar
  231. O'Dell, C., Jackson Grayson, C., & Essaides, N. (1998). If Only We Knew What We Know: The Transfer of Internal Knowledge and Best Practice . New York: Free Press. Google ScholarGoogle Scholar
  232. Olson, J. S., Grudin, J., & Horvitz, E. (2005). A study of preferences for sharing and privacy. In Extended Abstracts of CHI 2005, Conference on Human Factors in Computing Systems (pp. 1985-1988), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  233. Otlet, P. (1934). Traité de Documentation . Brussels: Editiones Mundaneum.Google ScholarGoogle Scholar
  234. Palen, L. (1999). Social, individual and technological issues for groupware calendar systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: The CHI Is the Limit (pp. 17-24), Pittsburgh (ACM Press). Google ScholarGoogle Scholar
  235. Peterson, W. W., Birdsall, T. G., & Fox, W. C. (1954). The theory of signal detectability. Institute of Radio Engineers Transactions, PGIT-4 , 171-212.Google ScholarGoogle Scholar
  236. Pirolli, P. (2006). Cognitive models of human-information interaction. In F. T. Durso, R. S. Nickerson, R. W. Schvaneveldt, S. T. Dumais, D. S. Lindsay, & M.T.H. Chi (Eds.), Handbook of Applied Cognition (2nd ed.). New York: John Wiley & Sons.Google ScholarGoogle Scholar
  237. Pirolli, P., & Card, S. (1999). Information foraging. Psychological Review, 106 (4), 643-675.Google ScholarGoogle ScholarCross RefCross Ref
  238. Pratt, W., Unruh, K., Civan, A., & Skeels, M. (2006). Personal health information management. Communications of the ACM, 49 (1), 51-55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  239. Putnam, R. D. (1995). Bowling alone: America's declining social capital. Journal of Democracy, 6 , 65-78.Google ScholarGoogle ScholarCross RefCross Ref
  240. Qu, Y., & Furnas, G. W. (2005). Sources of structure in sensemaking. In Extended Abstracts of CHI 2005, Conference on Human Factors in Computing Systems (pp. 1989-1992), Portland, OR (ACM Press). Google ScholarGoogle Scholar
  241. Quan, D., Huynh, D., & Karger, D. R. (2003, October 20-23). Haystack: A platform for authoring end user Semantic Web applications. Paper presented at the 2nd International Semantic Web Conference, ISWC 2003 (pp. 738-753), Sanibel Island, FL.Google ScholarGoogle Scholar
  242. Quine, W. V. (1969). Ontological Relativity and Other Essays . New York: Columbia University Press.Google ScholarGoogle Scholar
  243. Radicati Group, Inc. (2005). Taming the growth of email: An ROI Analysis. White paper-- http://www.radicati.com/uploaded_files/publications/brochure/HP_Whitepaper.pdf.Google ScholarGoogle Scholar
  244. Ratneshwar, S., Barsalou, L. W., Pechmann, C., & Moore, M. (2001). Goal-derived categories: The role of personal and situational goals in category representations. Journal of Consumer Psychology, 10 (3), 147-157.Google ScholarGoogle ScholarCross RefCross Ref
  245. Ravasio, P., Schar, S. G., & Krueger, H. (2004). In pursuit of desktop evolution: User problems and practices with modern desktop systems. ACM Transactions on Computer-Human Interaction, 11 (2), 156-180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  246. Ries, A., & Trout, J. (1986). Positioning: The Battle for Your Mind . New York: Warner Books.Google ScholarGoogle Scholar
  247. Ringel, M., Cutrell, E., Dumais, S. T., & Horvitz, E. (2003). Milestones in time: The value of landmarks in retrieving information from personal stores. In M. Rauterberg et al. (Eds.), Human-Computer Interaction, INTERACT '03 (pp. 184-191), IOS Press.Google ScholarGoogle Scholar
  248. Rodden, K., & Wood, K. (2003). How do people manage their digital photographs? Paper presented at the SIGCHI ACM Conference on Human Factors in Computing Systems, CHI 2003 (pp. 409-416), Ft. Lauderdale, FL. Google ScholarGoogle Scholar
  249. Ross, B. H. (1999). Postclassification category use: The effects of learning to use categories after learning to classify. Journal of Experimental Psychology: Learning, Memory, & Cognition, 25 (3), 743-757.Google ScholarGoogle ScholarCross RefCross Ref
  250. Ross, B. H. (2000). The effects of category use on learned categories. Memory & Cognition, 28 (1), 51-63.Google ScholarGoogle Scholar
  251. Ross, B. H., & Murphy, G. L. (1999). Food for thought: Cross-classifi cation and category organization in a complex real-world domain. Cognitive Psychology, 38 (4), 495-553.Google ScholarGoogle ScholarCross RefCross Ref
  252. Ross, S. E., and Lin, C.-T. (2003). The effects of promoting patient access to medical records: A review. Journal of the American Medical Informatics Association, 10 (2), 129-138.Google ScholarGoogle ScholarCross RefCross Ref
  253. Rothenberg, J. (1999). Avoiding Technological Quicksand: Finding a Viable Technical Foundation for Digital Preservation . Washington, DC: Council on Library and Information Resources. Google ScholarGoogle Scholar
  254. Rouse, W. B., & Rouse, S. H. (1984). Human information seeking and design of information systems. Information Processing & Management, 20 , 129-138. Google ScholarGoogle Scholar
  255. Rowley, J. (1994). The controlled versus natural indexing languages debate revisited. Journal of Information Science, 20 (2), 108-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  256. Rundus, D. (1971). Analysis of rehearsal processes in free recall. Journal of Experimental Psychology, 89 , 63-77.Google ScholarGoogle ScholarCross RefCross Ref
  257. Russell, D. M., & Lawrence, S. (2007). Search everything. In W. Jones & J. Teevan (Eds.), Personal Information Management. Seattle: University of Washington Press.Google ScholarGoogle Scholar
  258. Russell, D. M., Slaney, M., Qu, Y., & Houston, M. (2006). Being literate with large document collections: Observational studies and cost structure tradeoffs. Paper presented at the 39th Annual Hawaii International Conference on System Sciences, HICSS. Google ScholarGoogle Scholar
  259. Russell, D. M., Stefik, M. J., Pirolli, P., & Card, S. K. (1993). The cost structure of sensemaking. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 269-276), Amsterdam, The Netherlands (ACM Press). Google ScholarGoogle Scholar
  260. Salton, G., & Buckley, C. (1990). Improving retrieval performance by relevance feedback. Journal of the American Society for Information Science, 41 (4), 288-297.Google ScholarGoogle ScholarCross RefCross Ref
  261. Scerri, E. (2001). The Periodic Table: The ultimate paper tool in chemistry. In U. Klein (Ed.), Tools and Modes of Representation in the Laboratory Sciences . Dordrecht, Germany: Kluwer Academic.Google ScholarGoogle Scholar
  262. Schuler, D., & Namioka, A. (Eds.). (1993). Participatory Design: Principles and Practices . Hillsdale, NJ: Erlbaum. Google ScholarGoogle Scholar
  263. Schwartz, B. (2004). The Paradox of Choice . New York: HarperCollins.Google ScholarGoogle Scholar
  264. Segal, R. B., & Kephart, J. O. (1999, May 1-5). MailCat: An intelligent assistant for organizing e-mail. Paper presented at the 3rd Annual Conference on Autonomous Agents (pp. 276-282), Seattle. Google ScholarGoogle Scholar
  265. Seifert, C. M., & Patalano, A. L. (2001). Opportunism in memory: Preparing for chance encounters. Current Directions in Psychological Science, 10 (6), 198-201.Google ScholarGoogle ScholarCross RefCross Ref
  266. Selamat, M. H., & Choudrie, J. (2004). The diffusion of tacit knowledge and its implications on information systems: The role of meta-abilities. Journal of Knowledge Management, 8 (2), 128-139.Google ScholarGoogle ScholarCross RefCross Ref
  267. Sellen, A. J., & Harper, R.H.R. (2002). The Myth of the Paperless Offi ce . Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  268. Shamos, M. (2007). Privacy and public records. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  269. Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27 , 379-423, 623-656.Google ScholarGoogle Scholar
  270. Shannon, C. E., & Weaver, W. (1949). The Mathematical Theory of Communication . Urbana, IL: University of Illinois Press.Google ScholarGoogle Scholar
  271. Shen, J., Li, L., Dietterich, T. G., & Herlocker, J. L. (2006). A hybrid learning system for recognizing user tasks from desktop activities and email messages. In Proceedings of the 11th International Conference on Intelligent User Interfaces (pp. 86-92), Sydney, Australia (ACM Press). Google ScholarGoogle Scholar
  272. Shen, R., Vemuri, N. S., Fan, W., Torres, R.D.S., & Fox, E. A. (2006, June 11-15). Exploring digital libraries: Integrating browsing, searching, and visualization. In Proceedings of the 6th ACM/ IEEE-CS Joint Conference on Digital Libraries (pp. 1-10), Chapel Hill, NC (ACM Press). Google ScholarGoogle Scholar
  273. Shipman, F. M. I., & Marshall, C. C. (1999). Formality considered harmful: Experiences, emerging themes, and directions on the use of formal representations in interactive systems. Computer Supported Cooperative Work (CSCW), 8 (4), 333-352. Google ScholarGoogle ScholarDigital LibraryDigital Library
  274. Shneiderman, B. (1992). Tree visualization with tree-maps: 2-d space-filling approach. ACM Transactions in Graphics, 11 (1), 92-99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  275. Shneiderman, B., & Bederson, B. B. (2005). Maintaining concentration to achieve task completion. Paper presented at the Proceedings of Designing User Experience, DUX 2005 , San Francisco. Google ScholarGoogle Scholar
  276. Silverman, B. G. (1997). Computer reminders and alerts. Computer, 30 (1), 42-49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  277. Simon, H. A. (1957). Models of Man: Social and Rational; Mathematical Essays on Rational Human Behavior in Society Setting . New York: Wiley.Google ScholarGoogle Scholar
  278. Simon, H. A. (1969). The Sciences of the Artificial . Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  279. Simon, H. A. (1971). Designing organizations for an information-rich world. In M. Greenberger (Ed.), Computers, Communications and the Public Interest (pp. 40-41). Baltimore: The Johns Hopkins Press.Google ScholarGoogle Scholar
  280. Simon, H. A., & Newell, A. (1958). Heuristic problem solving: The next advance in operations research. Operations Research, 6 , 1-10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  281. Southwell, B. G., & Lee, M. (2004). A pitfall of new media? User controls exacerbate editing effects on memory. Journalism and Mass Communication Quarterly, 81 (3), 643-656.Google ScholarGoogle ScholarCross RefCross Ref
  282. Spiekermann, S., Grossklags, J., & Berendt, B. (2001, October 14-17). E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. In Proceedings 3rd ACM Conference on Electronic Commerce (pp. 38-47), Tampa, FL (ACM Press). Google ScholarGoogle Scholar
  283. Springer, P. (1999, January 26). Sun on Privacy: "Get Over It." Wired News --www.wired.com/ politics/law/news/1999/01/17538.Google ScholarGoogle Scholar
  284. Streitz, N., & Nixon, P. (2005). Special issue: The disappearing computer. Communications of the ACM, 48 (3), 32-35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  285. Suchman, L. (1983). Office procedure as practical action: Models of work and system design. ACM Transactions on Offi ce Information Systems, 1 (4), 320-328. Google ScholarGoogle Scholar
  286. Suchman, L. (1987). Plans and Situated Actions: The Problem of Human-Machine Communication . Cambridge: Cambridge University Press. Google ScholarGoogle Scholar
  287. Surowiecki, J. (2004). The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economies, Societies and Nations . Boston: Little, Brown. Google ScholarGoogle Scholar
  288. Sweeney, L. (2002). k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 557-570. Google ScholarGoogle ScholarDigital LibraryDigital Library
  289. Swets, J. A. (1963). Information retrieval systems. Science, 141 (3577), 245-250.Google ScholarGoogle Scholar
  290. Swets, J. A. (1969). Effectiveness of information retrieval methods. American Documentation, 20 (1), 72-89.Google ScholarGoogle ScholarCross RefCross Ref
  291. Swire, P. P., & Litan, R. E. (1998). Avoiding a showdown over EU privacy laws. Policy brief. Washington, DC: The Brookings Institution.Google ScholarGoogle Scholar
  292. Tan, D., Berry, E., Czerwinski, M., Bell, G., Gemmell, J., Hodges, S., et al. (2007). Save everything: Supporting human memory with a personal digital lifetime store. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  293. Tauscher, L. M., & Greenberg, S. (1997a). How people revisit web pages: Empirical findings and implications for the design of history systems. International Journal of Human-Computer Studies, 47 (1), 97-137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  294. Tauscher, L. M., & Greenberg, S. (1997b, April 18-23). Revisitation patterns in World Wide Web navigation. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 1997 (pp. 399-406), Atlanta. Google ScholarGoogle Scholar
  295. Taylor, A. G. (2004). The Organization of Information (2nd ed.). Westport, CT: Libraries Unlimited.Google ScholarGoogle Scholar
  296. Taylor, H. (2003). Most people are "privacy pragmatists" who, while concerned about privacy, will sometimes trade it off for other benefi ts. Harris Interactive , Harris Poll #17.Google ScholarGoogle Scholar
  297. Taylor, R. S. (1968). Question negotiation and information seeking in libraries. College and Research Libraries, 29 , 178-194.Google ScholarGoogle ScholarCross RefCross Ref
  298. Teevan, J. (2006). Supporting fi nding and re-fi nding through personalization. Unpublished doctoral thesis, Massachusetts Institute of Technology, Cambridge, MA. Google ScholarGoogle Scholar
  299. Teevan, J. (2006, October). The Re: Search engine: Helping people return to information on the Web. Paper presented at the ACM Symposium on User Interface Software and Technology, UIST 2005 , Seattle.Google ScholarGoogle Scholar
  300. Teevan, J., Alvarado, C., Ackerman, M. S., & Karger, D. R. (2004, April 24-29). The perfect search engine is not enough: A study of orienteering behavior in directed search. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI 2004 (pp. 415-422), Vienna, Austria. Google ScholarGoogle Scholar
  301. Teevan, J., Capra, R., & Pérez-Quinones, M. (2007). How people fi nd information. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  302. Teevan, J., Dumais, S. T., & Horvitz, E. (2005, April 15-19). Personalizing search via automated analysis of interests and activities. Paper presented at the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 449-456), Salvador, Brazil. Google ScholarGoogle Scholar
  303. Teltzrow, M., & Kobsa, A. (2004). Impacts of user privacy preferences on personalized systems: A comparative study. In C.-M. Karat, J. O. Blom, & J. Karat (Eds.), Designing Personalized User Experiences in eCommerce (pp. 315-332). Norwell, MA: Kluwer. Google ScholarGoogle Scholar
  304. Thompson, L. L., Levine, J. M., & Messick, D. M. (Eds.). (1999). Shared Cognition in Organizations: The Management of Knowledge . Mahwah, NJ: Erlbaum. Google ScholarGoogle Scholar
  305. Tohidi, M., Buxton, W., Baecker, R., & Sellen, A. (2006). Getting the right design and the design right. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1243-1252), Montreal, QUE, Canada (ACM Press). Google ScholarGoogle Scholar
  306. Tulving, E. (1983). Elements of Episodic Memory . Oxford: Oxford University Press.Google ScholarGoogle Scholar
  307. Tulving, E., & Thomson, D. M. (1973). Encoding specifi city and retrieval processes in episodic memory. Psychological Review, 80 (5), 352-373.Google ScholarGoogle ScholarCross RefCross Ref
  308. Tversky, A., & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probability. Cognitive Psychology, 5 , 207-232.Google ScholarGoogle ScholarCross RefCross Ref
  309. Tversky, A., & Kahneman, D. (1974). Judgments under uncertainty: Heuristics and biases. Science, 185 , 1124-1131.Google ScholarGoogle ScholarCross RefCross Ref
  310. Tversky, A., & Kahneman, D. (1981). The framing of decisions and the psychology of choice. Science, 211 , 453-458.Google ScholarGoogle Scholar
  311. Udell, J. (2005). Collaborative filtering with del.icio.us--http://weblog.infoworld.com/ udell/2005/06/23.html.Google ScholarGoogle Scholar
  312. Van Meter, D., & Middleton, D. (1954). Modern statistical approaches to reception in communication theory. Institute of Radio Engineers Transactions, PGIT-4 , 119-141.Google ScholarGoogle Scholar
  313. Voida, A., Grinter, R. E., Ducheneaut, N., Edwards, W. K., & Newman, M. W. (2005). Listening in: Practices surrounding iTunes music sharing. CHI '05 (pp. 191-200). Google ScholarGoogle Scholar
  314. Wearden, G. (2002). U.S. tech protests EU privacy laws. ZDNet News --http://news.zdnet. com/2100-9595_22-960134.html.Google ScholarGoogle Scholar
  315. Westin, A. F. (1967). Privacy and Freedom . New York: Atheneum.Google ScholarGoogle Scholar
  316. White, R., Ruthven, I., & Jose, J. M. (2002). Finding relevant documents using top ranking sentences: An evaluation of two alternative schemes. In Proceedings of the 25th Annual ACM Conference on Research and Development in Information Retrieval (SIGIR 2002) (pp. 57-64), Tampere, Finland. Google ScholarGoogle Scholar
  317. Whittaker, S. (2005). Collaborative task management in email. Human-Computer Interaction, 20 (1-2), 49-88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  318. Whittaker, S., Bellotti, V., & Gwizdka, J. (2007). Email as PIM. In W. Jones & J. Teevan (Eds.), Personal Information Management . Seattle: University of Washington Press.Google ScholarGoogle Scholar
  319. Whittaker, S., Bellotti, V., & Moody, P. (2005). Introduction to this special issue on revisiting and reinventing e-mail. Human-Computer Interaction, 20 (1-2), 1-9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  320. Whittaker, S., & Hirschberg, J. (2001). The character, value and management of personal paper archives. ACM Transactions on Computer-Human Interaction, 8 (2), 150-170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  321. Whittaker, S., Jones, Q., & Terveen, L. (2002, Nov. 16-20). Managing communications: Contact management: Identifying contacts to support long-term communication. Presented at ACM 2002 Conference on Computer Supported Cooperative Work, New Orleans. Google ScholarGoogle Scholar
  322. Whittaker, S., & Sidner, C. (1996). Email overload: Exploring personal information management of email. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 276-283), Vancouver, BC, Canada (ACM Press). Google ScholarGoogle Scholar
  323. Whitten, A., & Tygar, J. D. (1999, August 23-26). Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium (pp. 169-184), Washington, DC. Google ScholarGoogle Scholar
  324. Williamson, A., & Bronte-Stewart, M. (1996). Moneypenny: Things to do on the desk. In A. Blandford & H. Thimbleby (Eds.), Proceedings of the 11th Conference of the British Computer Society Human Computer Interaction Specialist Group--People and Computers XI (pp. 197-200). London: Springer Verlag.Google ScholarGoogle Scholar
  325. Wilson, T. D. (1981). On user studies and information needs. Journal of Documentation, 37 (1), 3-15.Google ScholarGoogle ScholarCross RefCross Ref
  326. Wilson, T. D. (2000). Human information behavior. Informing Science, 3 (2), 49-55.Google ScholarGoogle Scholar
  327. Wilson, T. D. (2005). Evolution in information behavior modeling. Wilson's model. In K. E. Fisher, S. Erdelez, & L. McKechnie (Eds.), Theories of Information Behavior (pp. 31-36). Medford, NJ: Information Today.Google ScholarGoogle Scholar
  328. Wittgenstein, L. (1953). Philosophical Investigations . New York: Macmillan.Google ScholarGoogle Scholar
  329. Wolverton, M. (1999). Task-based information management. ACM Computing Surveys (CSUR) Archive, 31 (2). Google ScholarGoogle Scholar
  330. Wright, R. (2000). Nonzero: The Logic of Human Destiny . New York: Pantheon.Google ScholarGoogle Scholar
  331. Yates, F. A. (1966). The Art of Memory . Chicago: University of Chicago Press.Google ScholarGoogle Scholar
  332. Yates, J. (1989). Control through Communication: The Rise of Systems in American Management . Baltimore: Johns Hopkins University Press.Google ScholarGoogle Scholar
  333. Yiu, K. S. (1997). Time-based Management and Visualization of Personal Electronic Information. Unpublished MSc thesis, University of Toronto.Google ScholarGoogle Scholar
  334. Zhang, J. (1997). The nature of external representations in problem solving. Cognitive Science: A Multidisciplinary Journal, 21 (2), 179-217.Google ScholarGoogle ScholarCross RefCross Ref

Cited By

  1. Bergman O and Gradovitch N (2023). Collecting streaming music increases listening enjoyment, Personal and Ubiquitous Computing, 27:6, (2147-2159), Online publication date: 1-Dec-2023.
  2. Narayan B, Zijlema A and Reyes V (2023). Life and Times of Personal Information Management, Proceedings of the Association for Information Science and Technology, 60:1, (813-816), Online publication date: 22-Oct-2023.
  3. Whittaker S and Massey C (2020). Mood and personal information management: how we feel influences how we organize our information, Personal and Ubiquitous Computing, 24:5, (695-707), Online publication date: 1-Oct-2020.
  4. Dinneen J and Julien C (2019). The ubiquitous digital file, Journal of the Association for Information Science and Technology, 71:1, (E1-E32), Online publication date: 4-Dec-2019.
  5. ACM
    Dodson S Interacting with Heterogeneous Information Ecologies Proceedings of the 2019 Conference on Human Information Interaction and Retrieval, (445-448)
  6. ACM
    Brackenbury W, Liu R, Mondal M, Elmore A, Ur B, Chard K and Franklin M Draining the Data Swamp Proceedings of the Workshop on Human-In-the-Loop Data Analytics, (1-7)
  7. ACM
    Jensen A, Jægerfelt C, Francis S, Larsen B and Bogers T I just scroll through my stuff until I find it or give up Proceedings of the 2018 Conference on Human Information Interaction & Retrieval, (140-149)
  8. ACM
    Vermette L, Dembla S, Wang A, McGrenere J and Chilana P (2017). Social CheatSheet, Proceedings of the ACM on Human-Computer Interaction, 1:CSCW, (1-19), Online publication date: 6-Dec-2017.
  9. Jones W (2017). The Science of Managing our Digital Stuff. Ofer Bergman and Steve Whittaker. Cambridge, MA, Journal of the Association for Information Science and Technology, 68:12, (2834-2840), Online publication date: 8-Nov-2017.
  10. ACM
    Hwang H, Herder E and Ronchetti M A Link Back to MemoryLane Proceedings of the 12th Biannual Conference on Italian SIGCHI Chapter, (1-10)
  11. Oh K (2017). Types of personal information categorization, Journal of the Association for Information Science and Technology, 68:6, (1491-1504), Online publication date: 1-Jun-2017.
  12. Kljun M, Mariani J and Dix A (2016). Toward understanding short-term personal information preservation, Journal of the Association for Information Science and Technology, 67:12, (2947-2963), Online publication date: 1-Dec-2016.
  13. ACM
    Hinbarji Z, Hinbarji M, Albatal R and Gurrin C Personal Information Manager to Capture and Re-Access What We See on Computers Proceedings of the first Workshop on Lifelogging Tools and Applications, (13-17)
  14. Fransson J, Lagunas P, Kjellberg S and Toit M Developing integrated research data management support in close relation to doctoral students' research practices Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & Technology, (1-4)
  15. Dinneen J, Odoni F, Frissen I and Julien C Cardinal Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & Technology, (1-10)
  16. ACM
    Jones W, Thorsteinson C, Thepvongsa B and Garrett T Making It Real Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, (571-582)
  17. ACM
    Jones W, Bellotti V, Capra R, Dinneen J, Mark G, Marshall C, Moffatt K, Teevan J and Van Kleek M For Richer, for Poorer, in Sickness or in Health... Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, (3508-3515)
  18. ACM
    Tran T, Schwarz S, Niederée C, Maus H and Kanhabua N The Forgotten Needle in My Collections Proceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval, (13-22)
  19. Diekema A and Olsen M (2014). Teacher Personal information management PIM practices, Journal of the Association for Information Science and Technology, 65:11, (2261-2277), Online publication date: 1-Nov-2014.
  20. ACM
    Wiese J, Hong J and Zimmerman J Challenges and opportunities in data mining contact lists for inferring relationships Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (643-647)
  21. Trullemans S and Signer B From user needs to opportunities in personal information management Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries, (87-96)
  22. ACM
    Webber S, Heffernan K, Yeganeh B, Estrada F and Augstkalns D Family room Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, (407-408)
  23. ACM
    Snyder P and Kanich C CloudSweeper Proceedings of the 2013 ACM workshop on Cloud computing security workshop, (47-54)
  24. Narayan B and Olsson M Sense-making across space and time Proceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries, (1-9)
  25. Al-Omar M and Cox A Finders, keepers, losers, seekers Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction design - Volume Part I, (169-176)
  26. ACM
    Zhao X, Salehi N, Naranjit S, Alwaalan S, Voida S and Cosley D The many faces of facebook Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1-10)
  27. ACM
    Sawyer B, Quek F, Wong W, Motani M, Chu Yew Yee S and Perez-Quinones M Using physical-social interactions to support information re-finding CHI '12 Extended Abstracts on Human Factors in Computing Systems, (885-910)
  28. ACM
    Jones W, Anderson K and Whittaker S Representing our information structures for research and for everyday use CHI '12 Extended Abstracts on Human Factors in Computing Systems, (151-160)
  29. ACM
    Capra R and Teevan J Personal information management in a socially networked world Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion, (1-2)
  30. ACM
    Oh K Exploring the process of organizing personal information Proceedings of the 2012 iConference, (433-434)
  31. ACM
    Drăgan L, Handschuh S and Decker S The semantic desktop at work Proceedings of the 7th International Conference on Semantic Systems, (17-24)
  32. ACM
    Jones W XooML Proceedings of the 2011 iConference, (478-488)
  33. Whittaker S (2011). Personal information management, Annual Review of Information Science and Technology, 45:1, (1-62), Online publication date: 1-Jan-2011.
  34. ACM
    Evéquoz F, Thomet J and Lalanne D Gérer son information personnelle au moyen de la navigation par facettes Proceedings of the 22nd Conference on l'Interaction Homme-Machine, (41-48)
  35. ACM
    Capra R, Marchionini G, Velasco-Martin J and Muller K Tools-at-hand and learning in multi-session, collaborative search Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (951-960)
  36. ACM
    Jones W, Hou D, Sethanandha B, Bi S and Gemmell J Planz to put our digital information in its place CHI '10 Extended Abstracts on Human Factors in Computing Systems, (2803-2812)
  37. ACM
    Efimova L Weblog as a personal thinking space Proceedings of the 20th ACM conference on Hypertext and hypermedia, (289-298)
  38. ACM
    Jones W, Klasnja P, Civan A and Adcock M The personal project planner Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (681-684)
  39. ACM
    Teevan J and Jones W The disappearing desktop CHI '08 Extended Abstracts on Human Factors in Computing Systems, (3917-3920)
Contributors
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations