skip to main content
10.1145/1940761.1940888acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiconferenceConference Proceedingsconference-collections
research-article

Cross analysis of keeping personal information in different forms

Published:08 February 2011Publication History

ABSTRACT

This paper examines keeping behavior of personal information in different forms by reviewing and analyzing previous empirical studies on keeping personal information. By adopting user-centered and cross-form perspectives, similar behaviors as well as unique behaviors in keeping different forms of personal information are reviewed and comparatively analyzed. The identification of similarities and differences of keeping behaviors among different forms of personal information widens our understanding of personal information management (PIM). The results of this study have practical implication for human computer interaction (HCI) studies in designing tools, devices and interfaces that are more effective in supporting individuals' PIM.

References

  1. Jones, W. 2007. Personal information management. Annu. Rev. Inform. Sci. 41, 453--504. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Jones, W. 2004. Finders, keepers? The present and future perfect in support of personal information management. First Monday, 9, 3.Google ScholarGoogle ScholarCross RefCross Ref
  3. Whittaker, S. and Hirschberg, J. 2001. The character, value and management of personal paper archives. ACM Transactions on Computer-Human Interaction, 8, 2, 150--170. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cross analysis of keeping personal information in different forms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        iConference '11: Proceedings of the 2011 iConference
        February 2011
        858 pages
        ISBN:9781450301213
        DOI:10.1145/1940761

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 February 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader