Academia.eduAcademia.edu

Outline

For Telling" the Present

2015, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems

https://doi.org/10.1145/2702123.2702523

Abstract

Researchers have been studying personal information management (PIM) for many years, but little exists by way of practical advice for how individuals should manage their own information. We employed the Delphi Method to engage PIM researchers with expertise in a variety of relevant areas in a five-round extended dialog about PIM practices. Participants identified key everyday choices of PIM, suggested alternatives, and identified pros and cons of each alternative. Our contributions include: 1) a set of 36 PIM practices, along with pros, cons, and recommendations for or against each practice, 2) directions of future research and development including "near-future" improvements in tool support and 3) a detailed description of how we applied the Delphi Method to study PIM and how it might be used more widely in HCI research as a complement to more established methods of inquiry.

References (29)

  1. Barreau, D. and Nardi, B.A. Finding and reminding: file organization from the desktop. SIGCHI Bull. 27, 3 (1995), 39-43.
  2. Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D.G., and Ducheneaut, N. What a to-do: Studies of task management towards the design of a personal task list manager. Proc. CHI 2004, 735-742.
  3. Bellotti, V., Ducheneaut, N., Howard, M., and Smith, I. Taking email to task: The design and evaluation of a task management centered email tool. Proc. CHI 2003, 345-352.
  4. Bergman, O., Beyth-Marom, R., and Nachmias, R. The project fragmentation problem in personal information management. Proc. CHI 2006, 271-274.
  5. Bergman, O., Beyth-Marom, R., Nachmias, Grado- vitch, N., and Whittaker, S. Improved search engines and navigation preference in personal information man- agement. ACM Trans. Inf. Syst. 26, 4 (2008), 1-24.
  6. Bergman, O., Gradovitch, N., Bar-Ilan, J., and Beyth- Marom, R. Folder versus tag preference in personal in- formation management. J. Am. Soc. Inf. Sci. Technol. 64, 10 (2013), 1995-2012.
  7. Bergman, O., Tucker, S., Beyth-Marom, R., Cutrell, E., and Whittaker, S. It's not that important: Demoting per- sonal information of low subjective importance using GrayArea. Proc. CHI 2009, 269-278.
  8. Bergman, O., Whittaker, S., Sanderson, M., Nachmias, R., and Ramamoorthy, A. The effect of folder structure on personal file navigation. J. Am. Soc. Inf. Sci. Technol. 61, 12 (2010), 2426-2441.
  9. Bergman, O., Whittaker, S., Sanderson, M., Nachmias, R., and Ramamoorthy, A. How do we find personal files? The effect of OS, presentation and depth on file navigation. Proc. CHI 2012, 2977-2980.
  10. Boardman, R. and Sasse, M.A. "Stuff goes into the computer and doesn't come out:" A cross-tool study of personal information management. Proc. CHI 2004, 583-590.
  11. Bruce, H., Jones, W., and Dumais, S. Information be- havior that keeps found things found. Information Re- search 10, 1 (2004).
  12. Civan, A., Jones, W., Klasnja, P., and Bruce, H. Better to organize personal information by folders or by Tags? The devil is in the details. Proc. ASIST 2008.
  13. Dalkey, N. and Helmer, O. An experimental application of the Delphi method to the use of experts. Management Science 9, 3 (1963), 458-467.
  14. Jones, W. Finders, keepers? The present and future per- fect in support of personal information management. First Monday 9, 3 (2004).
  15. Jones, W., Hou, D., Sethanandha, B.D., Bi, S., and Gemmell, J. Planz to put our digital information in its place. Proc. CHI 2010 Extended Abstract, 2803-2812.
  16. Jones, W. and Teevan, J. Personal Information Man- agement. Univ.Washington Press, Seattle, WA, 2007.
  17. Jones, W., Wenning, A., and Bruce, H. How do people re-find files, emails and web pages? Proc. iConference 2014.
  18. Kwasnik, B.H. How a personal document's intended use or purpose affects its classification in an office. Proc. SIGIR 1989, 207-210.
  19. Lansdale, M. The psychology of personal information management. Appl. Ergon. 19, 1 (1988), 55-66.
  20. Linstone, H.A. and Turoff, M. The Delphi method: Techniques and applications. Addison-Wesley Reading, MA, 1975.
  21. Linstone, H.A. and Turoff, M. Delphi: A brief look backward and forward. Technological Forecasting and Social Change 78, 9 (2011), 1712-1719.
  22. Mankoff, J., Rode, J.A., and Faste, H. Looking past yes- terday's tomorrow: Using futures studies methods to ex- tend the research horizon. Proc. CHI 2013, 1629-1638.
  23. Rowe, G. and Wright, G. The Delphi technique as a forecasting tool: Issues and analysis. Int. J. Forecasting 15, 4 (1999), 353-375.
  24. Teevan, J., Alvarado, C., Ackerman, M.S., and Karger, D.R. The perfect search engine is not enough: A study of orienteering behavior in directed search. Proc. CHI 2004, 415-422.
  25. Teevan, J., Liebling, D.J., and Lasecki, W.S. Selfsourc- ing personal tasks. Proc. CHI 2014 Extended Abstract, 2527-2532.
  26. Turoff, M. Delphi and its potential impact on infor- mation systems. Proc. Fall Joint Computer Conference (AFIPS 1971), 317-326.
  27. Whittaker, S., Matthews, T., Cerruti, J., Badenes, H., and Tang, J. Am I wasting my time organizing email? A study of email refinding. Proc. CHI 2011, 3449-3458.
  28. Whittaker, S. and Sidner, C. Email overload: Exploring personal information management of email. Proc. CHI 1996. 276-283.
  29. Woudenberg, F. An evaluation of Delphi. Technological Forecasting and Social Change 40, 2 (1991), 131- 150.approximately equal length. Remove these two lines from your final version.