Knowledge (XXG)

Personal information management

Source đź“ť

1101:. The user-subjective approach advances three design principles. In brief, the design should allow the following: 1) all project-related items no matter their form (or format) are to be organized together (the subjective project classification principle); 2) the importance of information (to the user) should determine its visual salience and accessibility (the subjective importance principle); and 3) information should be retrieved and used by the user in the same context as it was previously used in (the subjective context principle). The approach may suggest design principles that serve not only in evaluating and improving existing systems but also in creating new implementations. For example, according to the demotion principle, information items of lower subjective importance should be demoted (i.e., by making them less visible) so as not to distract the user but be kept within their original context just in case they are needed. The principle has been applied in the creation of several interesting prototypes. 762:
prototypes for PIM have been developed over the years. A tagging approach has also been pursued in commercial systems, most notably Gmail (as "labels"), but the success of tags so far is mixed. Bergman et al. found that users, when provided with options to use folders or tags, preferred folders to tags and, even when using tags, they typically refrained from adding more than a single tag per information item. Civan et al., through an engagement of participants in critical, comparative observation of both tagging and the use of folders were able to elicit some limitations of tagging not previously discussed openly such as, for example, that once a person decides to use multiple tags, it is usually important to continue doing so (else the tag not applied consistently becomes ineffective as a means of retrieving a complete set of items).
622:
Malone characterized personal organization strategies as 'neat' or 'messy' and described 'filing' and 'piling' approaches to the organization of information. Other studies showed that people vary their methods for keeping information according to anticipated uses of that information in the future. Studies explored the practical implications that human memory research might carry in the design of, for example, personal filing systems, and information retrieval systems. Studies demonstrated a preference for navigation (browsing, "location-based finding) in the return to personal files, a preference that endures today notwithstanding significant improvements in search support. and an increasing use of search as the preferred method of return to e-mails.
890:
to work best for us?", "Which retirement plan to choose?", "What should we pack for our trip?". These and many other decisions are generally based not on a single information item but on a collection of information items – documents, emails (e.g., with advice or impressions from friends and colleagues), web references, etc. Making sense of information is "meta" not only for its broader focus on information collections but also because it permeates most PIM activity even when the primary purpose may ostensibly be something else. For example, as people organize information into folders, ostensibly to ensure its subsequent retrieval, people may also be making sense and coming to a deeper understanding of this information.
868:. By some estimates, 30% or more of the computers in the United States are infected. However, the exchange of information, incoming and outgoing, is an essential part of living in the modern world. To order goods and services online, people must be prepared to "let out" their credit card information. To try out a potentially useful, new information tool, people may need to "let in" a download that could potentially make unwelcome changes to the web browser or the desktop. Providing for adequate control over the information, coming into and out of a PSI, is a major challenge. Even more challenging is the user interface to make clear the implications for various privacy choices particularly regarding 671:
in the current query, evolves. People may favor stepwise approach to finding needed information to preserve a greater sense of control and context over the finding process and smaller steps may also reduce the cognitive burden associated with query formulation. In some cases, there simply isn't a "direct" way to access the information. For example, a person's remembrance for a needed Web site may only be through an email message sent by a colleague i.e., a person may not recall a Web address nor even keywords that might get be used in a Web search but the person does recall that the Web site was mentioned recently in an email from a colleague).
881:
day go? Where has the time gone? What did I accomplish?". These last questions may often be voiced in reflection, perhaps on the commute home from work at the end of the workday. But there is increasing reason to expect that answers will be based on more than remembrance and reflection. Increasingly data incidentally, automatically captured over the course of a person's day and the person's interactions with various information tools to work with various forms of information (files, emails, texts, pictures, etc.) can be brought to bear in evaluations of a person's PIM practice and the identification of possible ways to improve.
1214:(from our previous writings) rather than a product of original writing. Certainly, management of text pieces pasted for re-use is a PIM activity, and this raises several interesting questions. How do we go about deciding when to re-use and when to write from scratch? We may sometimes spend more time chasing down a paragraph we have previously written than it would have taken to simply write a new paragraph expressing the same thoughts. Beyond this, we can wonder at what point a reliance on an increasing (and increasingly available) supply of previously written material begins to impact our creativity. 270:, a person might need to remember the top-level folder in which a document is located, and then browse through the folder contents to navigate to the desired document. Email systems often support additional methods for re-finding such as fielded search (e.g., search by sender, subject, date). The characteristics of the document types, the data that can be used to describe them (meta-data), and features of the systems used to store and organize them (e.g. fielded search) are all components that may influence how users accomplish personal information management. 959:, people are able to access new types of personal health data (e.g., physical activity, heart rate) outside healthcare institutions. PIM behavior also changes. Much of the effort to keep information is automated. But people may experience difficulties making sense of a using the information later, e.g., to plan future physical activities based on activity tracker data. People are also frequently engaged in other meta-level activities, such as maintaining and organizing (e.g., syncing data across different health-related mobile apps). 912:(e.g., "conscientiousness" or "neuroticism") have, in certain circumstances, been shown to correlate with the extent to which a person keeps and organizes information into a personal archive such as a personal filing system. However, another recent study found personality traits were not correlated with any aspects of personal filing systems, suggesting that PIM practices are influenced less by personality than by external factors such as the operating system used (i.e. Mac OS or Windows), which were seen to be much more predictive. 758:
may opt to put information in "piles" instead. (Digital counterparts to physical piling include leaving information in the email inbox or placing digital documents and web links into a holding folder such as "stuff to look at later".) But information kept in a pile, physical or virtual, is easily forgotten as the pile fades into a background of clutter and research indicates that a typical person's ability to keep track of different piles, by location alone, is limited.
1112:"). A tool that is good with respect to one kind of personal information or one PIM activity, may be bad with respect to another. For example, a new smartphone app that promises to deliver information potentially "relevant to me" (the "6th sense" in which information is personal) may do so only at the cost of a distracting increase in the information "directed to me" and by keeping too much personal information "about me" in a place not under the person's control. 1277:(PKM). However, knowledge is not a "thing" to be managed directly but rather indirectly e.g., through items of information such as Web pages, emails and paper documents. PKM is best regarded as a useful subset of PIM with special focus on important issues that might otherwise be overlooked such as self-directed efforts of knowledge elicitation ("What do I know? What have I learned?") and knowledge instillation ("how better to learn what it is I want to know?") 526:
upon its underlying form. Items can be created but not always deleted (completely). Most items can be copied, sent and transformed as in, for example, when a digital photo is taken of a paper document (transforming from paper to digital) and then possibly further transformed as when optical character recognition is used to extract text from the digital photo, and then transformed yet again when this information is sent to others via a text message.
364:, which learn a person's preferences either from explicit ratings or, implicitly, from a person's past selections, have the potential to make a person aware of information the person might not otherwise know about or think to search for. More conventionally, a person's network of friends, family and colleagues can provide a means for the person to incidentally encounter information of relevance. 25: 1253:(CSCW). GIM is to CSCW as PIM is to HCI. Just as concerns of PIM substantially overlap with but are not fully subsumed by concerns of HCI (nor vice versa), concerns of GIM overlap with but are not subsumed by concerns of CSCW. Information in support of GIM activities can be in non-digital forms such as paper calendars and bulletin boards that don't involve computers. 1007:, in which the participant is asked to give an interviewer a "tour" of the participant's various information collections (e.g., files, emails, Web bookmarks, digital photographs, paper documents, etc.), has proven a very useful, but expensive method of study with results bound by caveats reflecting the typically small number and narrow sampling of participants. 1000:"). Exploratory methods are demanding in the time of both observer and participant and can also be intrusive for the participants. Consequently, the number and nature of participants is likely to be limited i.e., participants may often be people "close at hand" to the observer as family, friends, colleagues or other members of the observer's community. 124: 66: 642:) or, alternatively, keeping, managing, and exploiting. Important research is also being done under the special topics: Personality, mood, and emotion both as impacting and impacted by a person's practice of PIM, the management of personal health information and the management of personal information over the long run and for legacy. 618:
manage information. The 1980s also saw the advent of so-called "PIM tools" that provided limited support for the management of such things as appointments and scheduling, to-do lists, phone numbers, and addresses. A community dedicated to the study and improvement of human–computer interaction also emerged in the 1980s.
889:
Efforts to make sense of information represent another set of meta-level activity that operate on personal information and the mapping between information and need. People must often assemble and analyze a larger collection of information to decide what to do next. "Which job applicant is most likely
880:
People seek to understand how they might improve various aspects of their PIM practices with questions such as "Do I really need to keep all this information?"; "Is this tool (application, applet, device) worth the troubles (time, frustration) of its use?" and, perhaps most persistent, "Where did the
842:
applies the demotion principle of the user-subjective approach to allow people to move less frequently used files in any given folder to a gray area at the bottom end of the listing of this folder. These files can still be accessed but are less visible and so less distracting of a person's attention.
757:
Keeping can be a difficult and error prone effort. Filing i.e., placing information items such as paper documents, digital documents and emails, into folders, can be especially so. To avoid, or delay filing information (e.g., until more is known concerning where the information might be used), people
711:
However, a preference persists for navigation as the primary means of re-finding personal files (e.g., stepwise folder traversal; scanning a list of files within a folder for the desired file), notwithstanding ongoing improvements in search support. The enduring preference for navigation as a primary
670:
A person's efforts to find useful information are often a sequence of interactions rather than a single transaction. Under a "berry picking" model of finding, information is gathered in bits and pieces through a series of interactions, and during this time, a person's expression of need, as reflected
666:
relates and especially to efforts to find information in public spaces such as the Web or a traditional library. There is a strong personal component even in efforts to find new information, never before experienced, from a public store such as the Web. For example, efforts to find information may be
229:
One ideal of PIM is that people should always have the right information in the right place, in the right form, and of sufficient completeness and quality to meet their current need. Technologies and tools can help so that people spend less time with time-consuming and error-prone clerical activities
915:
Aside from the correlation between practices of PIM and more enduring personality traits, there is evidence to indicate that a person's (more changeable) mood impacts activities of PIM so that, for example, a person experiencing negative moods, when organizing personal information, is more likely to
802:
Activities of keeping correlate with activities of organizing so that, for example, people with more elaborate folder structures tend to file information more often and sooner. However, people may be selective in the information forms for which they invest efforts to organize. The schoolteachers who
744:
Keeping activities are also triggered when people are interrupted during a current task and look for ways of preserving the current state so that work can be quickly resumed later. People keep appointments by entering reminders into a calendar and keep good ideas or "things to pick up at the grocery
674:
People may find (rather than re-find) information even when this information is ostensibly under their control. For example, items may be "pushed" into the PSI (e.g., via the inbox, podcast subscriptions, downloads). If these items are discovered later, it is through an act of finding not re-finding
621:
As befits the "information" focus of PIM, PIM-relevant research of the 1980s and 1990s extended beyond the study of a particular device or application towards larger ecosystems of information management to include, for example, the organization of the physical office and the management of paperwork.
525:
People work with information items as packages of information with properties that vary depending upon the information form involved. Files, emails, "tweets", Facebook updates, blog posts, etc. are each examples of the information item. The ways in which an information item can be manipulated depend
463:
Activities to make sense of and use information focus on the decisions to make and the actions to take for a collection of information, once gathered. For example, among the choices available in new automobiles (new laptops, new employees, etc.), which will best meet a person's needs? Or what is the
444:
Activities to maintain & organize focus on personal information collections such as a person's inbox, photo collection, or the digital documents in a personal file system. Included are efforts to delete or archive information that is out-of-date or no longer used, efforts to update file formats,
1260:
In larger organizational settings, the GIM goals of the organization may conflict with the PIM goals of individuals working within the organization, where the goals of different individuals may also conflict. Individuals may, for example, keep copies of secure documents on their private laptops for
1256:
Group and social considerations frequently enter into a person's PIM strategy. For example, one member of a household may agree to manage medical information for everyone in the household (e.g., shot records) while another member of the household manages financial information for the household. But
818:
Studies of people's folder organizations for digital information indicate that these have uses going far beyond the organization of files for later retrieval. Folders are information in their own right – representing, for example, a person's evolving understanding of a project and its components. A
727:
There have been some prototyping efforts to explore an in-context creation e.g., creation in the context of a project the person is working on, of not only files, but also other forms of information such as web references and email. Prototyping efforts have also explored ways to improve support for
617:
of a decade ago can now be found in devices that fit into the palm of a hand. The phrase "Personal Information Management" was itself apparently first used in the 1980s in the midst of general excitement over the potential of the personal computer to greatly enhance the human ability to process and
1302:
Much of the useful information a person receives comes, often unprompted, through a person's network of family, friends and colleagues. People reciprocate and much of the information a person sends to others reflects an attempt to build relationships and influence the behavior of others. As such,
1237:
The study of PIM is also related to the field of human–computer interaction (HCI). Some of the more influential papers on PIM over the years have been published in HCI journals and conference proceedings. However, the "I" in PIM is for information – in various forms, paper-based and digital (e.g.,
927:
Beyond the negative feelings induced by information associated with a failed relationship, people experience negative feelings about their PIM practices, per se. People are shown in general to experience anxiety and dissatisfaction with respect to their personal information archives including both
850:
prototype supports an in-context creation and integration of project-related files, emails, web references, informal notes and other forms of information into a simplified, document-like interface meant to represent the project with headings corresponding to folders in the personal file system and
798:
Differences between people are especially apparent in their approaches to the maintenance and organization of information. Malone distinguished between "neat" and "messy" organizations of paper documents. "Messy" people had more piles in their offices and appeared to invest less effort than "neat"
707:
Support for searching personal information has improved dramatically over the years most notably in the provision for full-text indexing to improve search speed. With these improvements, preference may be shifting to search as a primary means for locating email messages (e.g., search on subject or
995:
At the same time, PIM research, at least in initial exploratory phases, must often be done in situ (e.g., in a person's workplace or office or at least where people have access to their laptops, smartphones and other devices of information management) so that people can be observed as they manage
991:
For research results to generalize, or else to be properly qualified, PIM research, at least in aggregate, should include the study of people, with a diversity of backgrounds and needs, over time as they work in many different situations, with different forms of information and different tools of
822:
However, people generally struggle to keep their information organized and often do not have reliable backup routines. People have trouble maintaining and organizing many distinct forms of information (e.g., digital documents, emails, and web references) and are sometimes observed to make special
794:
Activities of finding and, especially, keeping can segue into activities to maintain and organize as when, for example, efforts to keep a document in the file system prompt the creation of a new folder or efforts to re-find a document highlight the need to consolidate two folders with overlapping
769:
A person's ongoing use of a smartphone through the day can create a time-stamped record of events as a kind of automated keeping and especially of information "experienced by me" (see section, "The senses in which information is personal") with potential use in a person's efforts to journal or to
237:
A special focus of PIM concerns how people organize and maintain personal information collections, and methods that can help people in doing so. People may manage information in a variety of settings, for a variety of reasons, and with a variety of types of information. For example, a traditional
1293:
on a personal level make heavy use of information tools and external forms of information such as to-do lists, calendars, timelines, and email exchange. These are another form of information to be managed. Over the years, email, in particular, has been used in an ad hoc manner in support of task
468:
PIM activities overlap with one another. For example, the effort to keep an email attachment as a document in a personal file system may prompt an activity to organize the file system e.g., by creating a new folder for the document. Similarly, activities to organize may be prompted by a person's
1022:
A challenge is to combine, within or across studies, time-consuming (and often demographically biased) methods of exploratory observation with other methods that have broader, more economical reach. The exploratory methods bring out interesting patterns; the follow-on methods add in numbers and
967:
The purpose of PIM study is both descriptive and prescriptive. PIM research seeks to understand what people do now and the problems they encounter i.e., in the management of information and the use of information tools. This understanding is useful on its own but should also have application to
765:
Technologies may help to reduce the costs, in personal time and effort, of keeping and the likelihood of error. For example, the ability to take a digital photo of a sign, billboard announcement or the page of a paper document can obviate the task of otherwise transcribing (or photocopying) the
753:
The keeping decision can be characterized as a signal detection task subject to errors of two kinds: 1) an incorrect rejection ("miss") when information is ignored that later is needed and should have been kept (e.g., proof of charitable donations needed now to file a tax return) and 2) a false
740:
The ability to effectively handle information that is encountered by happenstance is essential to a person's ability to discover new material and make new connections. People also keep information that they have actively sought but do not have time to process currently. A search on the web, for
736:
Many events of daily life are roughly the converse of finding events: People encounter information and try to determine what, if anything, they should do with this information, i.e., people must match the information encountered to current or anticipated needs. Decisions and actions relating to
533:
Information fragmentation creates problems for each kind of PIM activity. Where to keep new information? Where to look for (re-find) information already kept? Meta-level activities, such as maintaining and organizing, are also more difficult and time-consuming when different stores on different
761:
Tagging provides another alternative to filing information items into folders. A strict folder hierarchy does not readily allow for the flexible classification of information even though, in a person's mind, an information item might fit in several different categories. A number of tag-related
472:
Meta-level activities overlap not only with finding and keeping activities but, even more so, with each other. For example, efforts to re-organize a personal file system can be motivated by the evaluation that the current file organization is too time-consuming to maintain and doesn't properly
481:
Information sent and received takes many different information forms in accordance with a growing list of communication modes, supporting tools, and people's customs, habits, and expectations. People still send paper-based letters, birthday cards, and thank you notes. But increasingly, people
1269:
Concerns of data management relate to PIM especially with respect to the safe, secure, long-term preservation of personal information in digital form. The study of information management and knowledge management in organizations also relates to the study of PIM and issues seen first at an
1261:
the sake of convenience even though doing so violates group (organizational) security. Given drawbacks—real or perceived—in the use of web services that support a shared use of folders, people working in a group may opt to share information instead through the use of e-mail attachments.
577:
After the 1950s research showed that the computer, as a symbol processor, could "think" (to varying degrees of fidelity) like people do, the 1960s saw an increasing interest in the use of the computer to help people to think better and to process information more effectively. Working with
686:. The steps of recall and recognition can iterate to progressively narrow the efforts to find the desired information. This interplay happens, for example, when people move through a folder hierarchy to a desired file or e-mail message or navigate through a website to a desired page. 529:
Information fragmentation is a key problem of PIM often made worse by the many information forms a person must work with. Information is scattered widely across information forms on different devices, in different formats, in different organizations, with different supporting tools.
1238:
books, digital documents, emails and, even, the letter magnets on a refrigerator in the kitchen). The "I" in HCI stands for "interaction" as this relates to the "C" – computers. (An argument has been advanced that HCI should be focused more on information rather than computers.)
723:
hypothesis, if a person's initial experience with a file included its placement in a folder, where the folder itself was reached by navigating through a hierarchy of containing folders, then the person will prefer a similar method – navigation – for return to the file later.
637:
Much PIM research can be grouped according to the PIM activity that is the primary focus of the research. These activities are reflected in the two main models of PIM, i.e., that primary PIM activities are finding/re-finding, keeping and meta-level activities (see section
1075:
With respect to methods for the evaluation of alternatives in PIM tools design, PIM researchers again face an "in situ" challenge. How to evaluate an alternative, as nearly as possible, in the working context of a person's PSI? One "let it lie" approach would provide for
431:
Activities to find (and re-find) move from a current need toward information to meet this need. If a person is asked by a colleague "When is the staff meeting?", for example, the person may meet the need (to answer accurately) by checking in a calendar of scheduled
979:
are also shown to impact PIM practices especially in the management of files. A person's practice is also observed to vary in significant ways with gender, age and current life circumstances. Certainly, differences among people on different sides of the so-called
546:
rather than the written word dominated, human memory was the primary means for information preservation. As information was increasingly rendered in paper form, tools were developed over time to meet the growing challenges of management. For example, the vertical
749:
failure. In order to avoid such a failure, people may, for example, self-e-mail a web page reference in addition to or instead of making a bookmark because the e-mail message with the reference appears in the inbox where it is more likely to be noticed and used.
238:
office worker might manage physical documents in a filing cabinet by placing them in hanging folders organized alphabetically by project name. More recently, this office worker might organize digital documents into the virtual folders of a local, computer-based
745:
store" by writing down a few cryptic lines on a loose piece of paper. People keep not only to ensure they have the information later, but also to build reminders to look for and use this information. Failure to remember to use information later is one kind of
291:
Owned by "me", e.g., paper documents in a home office, emails on a personal account, files on a personal computer or in the personal store of a Web cloud service. Preservation of this information especially for the longer-term and for legacy raises issues of
650:
Throughout a typical day, people repeatedly experience the need for information in large amounts and small (e.g., "When is my next meeting?"; "What's the status of the budget forecast?" "What's in the news today?") prompting activities to find and re-find.
1198:
has long been used to frame and explain human behavior and has recently been used as a basis for analyzing our choices concerning what information to keep and how – a key activity of PIM. Similarly, there is interplay between the psychological study of
819:
folder hierarchy can sometimes represent an informal problem decomposition with a parent folder representing a project and subfolders representing major components of the project (e.g., "wedding reception" and "church service" for a "wedding" project).
435:
Activities to keep move from encountered information toward anticipated need. A person may, for example, receive an email (information encountered) and flag (an act of keeping) as "high priority" or "read later" depending upon the message's assessed
1093:
even as an installed applet works to seamlessly synchronize the users files and folders with a Web store for the added benefits of a backup and options to synchronize this information with other devices and share this information with other users.
919:
Conversely, the information a person keeps or routinely encounters (e.g., via social media), can profoundly impact a person's mood. Even as explorations continue into the potential for the automatic, incidental capture of information (see section
948:, this type of personal health information usually requires people (i.e., patients) to engage in additional PIM finding activities to locate and gain access to health information and then to generate a comprehensible summary for their own use. 924:) there is growing awareness for the need to design for forgetting as well as for remembrance as, for example, when a person realizes the need to dispose of digital belongings in the aftermath of a romantic breakup or the death of a loved one. 700:
the finding sequence several times. A challenge in tool support is to provide people with ways to group or interrelate information items so that their chances improve of retrieving a complete set of the information needed to complete a task.
851:
subheadings (for tasks, sub-projects, or other project components) corresponding to subfolders. The intention is that a single, useful organization should emerge incidentally as people focus on the planning and completion of their projects.
859:
People face a continual evaluation of tradeoffs in deciding what information "flows" into and out of their PSI. Each interaction poses some degree of risk to privacy and security. Letting out information to the wrong recipients can lead to
314:
Directed toward "me", e.g., e-mails, phone calls, drop-ins, TV ads, web ads, pop-ups and including, even, self-interruptions (e.g., interrupting a work task to check a sports score). The management of incoming information raises issues of
265:
from their collections for re-use. For example, the office worker might re-locate a physical document by remembering the name of the project and then finding the appropriate folder by an alphabetical search. On a computer system with a
423:
Activities of PIM i.e., the actions people take to manage information that is personal to them in one or more of the ways listed above, can be seen as an effort to establish, use, and maintain a mapping between information and need.
534:
devices must be separately maintained. Problems of information fragmentation are especially manifest when a person must look across multiple devices and applications to gather together the information needed to complete a project.
806:
Activities of organization (e.g., creating and naming folders) segue into activities of maintenance such as consolidating redundant folders, archiving information no longer in active use, and ensuring that information is properly
1080:
between the tool under evaluation and a participant's PSI so that the tool can work with a participant's other tools and the participant's personal information (as opposed to working in a separate environment with "test" data).
3986: 574:," generally thought to be the first running artificial intelligence (AI) program. The computer of the 1950s was also an inspiration for the development of an information processing approach to human behavior and performance. 323:
have the potential to increase the relevance to the person of incoming information but at the potential cost of reinforcing a person's prejudices and preconceived notions or of filtering out information that the person should
373:
An encyclopaedic review of PIM literature suggests that all six senses of personal information listed above and the tools and technologies used to work with such information (from email applications and word processors to
278:
The purview of PIM is broad. A person's perception of and ability to effect change in the world is determined, constrained, and sometimes greatly extended, by an ability to receive, send and otherwise manage information.
837:
Empirical observations of PIM studies motivate prototyping efforts towards information tools to provide better support for the maintenance, organization and, going further, curation of personal information. For example,
1036:
The increasing use of activity tracking technology and the nearly round-the-clock use of smartphones creates new opportunities to gather PIM-relevant data with minimal time and trouble (but, of course, with participant
1010:
The guided tour method is one of several methods that are excellent for exploratory work but expensive and impractical to do with a larger, more diverse sampling of people. Other exploratory methods include the use of
774:
technology can further enrich the record of a person's daily activity with tremendous potential use for people to enrich their understanding of their daily lives and the healthiness of their diet and their activities.
4279:
Jones, W.; Capra, R.; Diekema, A.; Teevan, J.; Pérez-Quiñones, M.; Dinneen, J. D.; Hemminger, B. (2015). ""For Telling" the Present: Using the Delphi Method to Understand Personal Information Management Practices".
258:). People manage information in many more private, personal contexts as well. A parent may, for example, collect and organize photographs of their children into a photo album which might be paper-based or digital. 1257:
the collaborative organization and sharing of information is often difficult because, for example, the people working together in a group may have many different perspectives on how best to organize information.
754:
positive when information kept as useful (incorrectly judged as "signal") turns out not to be used later. Information kept and never used only adds to the clutter – digital and physical – in a person's life.
667:
directed by a personally created outline, self-addressed email reminder or a to-do list. In addition, information inside a person's PSI can be used to support a more targeted, personalized search of the web.
459:
Activities to measure and evaluate include efforts to assess the time effectiveness of a practice of PIM e.g., "Am I spending too much time in email?"; "Is this folder structure worth the trouble it takes to
944:. People often have difficulty managing or even navigating a variety of paper or electronic medical records across multiple health services in different specializations and institutions. Also referred to as 307:) kept by others such as credit records, health records, search history, etc. Such information can greatly impact a person's reputation, treatment and ability to get things done and raises major issues of 1175:, in its efforts to apply these questions more broadly to the study and simulation of intelligent behavior, is also related to PIM. (Cognitive science, in turn, has significant overlap with the field of 598:'s book Cognitive Psychology, the 1960s also saw the emergence of cognitive psychology as a discipline that focused primarily on a better understanding of the human ability to think, learn, and remember. 1104:
Finally, a simple "checklist" methodology of tool design", follows from an assessment of a proposed tool design with respect to each of the six senses in which information can be personal (see section "
625:
PIM, as a contemporary field of inquiry with a self-identified community of researchers, traces its origins to a Special Interest Group (SIG) session on PIM at the CHI 2004 conference and to a special
693:
to look in the first place. People may take the trouble to create Web bookmarks or to file away documents and then forget about this information so that, in worst case, the original effort is wasted.
594:
also completed work on a hypertext system called NLS (oN-Line System). Engelbart advanced the notion that the computer could be used to augment the human intellect. As heralded by the publication of
3759:
Mac Users Do It Differently: the Role of Operating System and Individual Differences in File Management book-title=Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems
1171:, as the study of how people learn and remember, problem solve, and make decisions, necessarily also includes the study of how people make smart use of available information. The related field of 704:
Over the years, PIM studies have determined that people prefer to return to personal information, most notably the information kept in personal digital files, by navigating rather than searching.
971:
The nature of PIM makes its study challenging. The techniques and preferred methods of a person's PIM practice can vary considerably with information form (e.g., files vs. emails) and over time.
741:
example, often produces much more information than can be consumed in the current session. Both the decision to keep this information for later use and the steps to do so are keeping activities.
335:, social media posts, published reports and articles. Information provided by a person – deliberately and inadvertently – can prove decisive in the impressions that others form of this person. 803:
participated in one study, for example, reported having regular "spring cleaning" habits for organization and maintenance of paper documents but no comparable habits for digital information.
1045:
for achieving consensus has been used to leverage the expertise and experience of PIM researchers as means of extending, indirectly, the number and diversity of PIM practices represented.
3665:
Bergman, O.; Tucker, S.; Beyth-Marom, R.; Cutrell, E.; Whittaker, S. (2009). "It's not that important: Demoting personal information of low subjective importance using GrayArea".
1436:
Jones, William; Dinneen, Jesse David; Capra, Robert; Diekema, Anne R; Pérez-Quiñones, Manuel A (2017). "Personal Information Management (PIM)". In Clark, M.; McDonald, J. (eds.).
554:
With the increasing availability of computers in the 1950s came an interest in the computer as a source of metaphors and a test bed for efforts to understand the human ability to
712:
means of return to files may have a neurological basis i.e., navigation to files appears to use mental facilities similar to those people use to navigate in the physical world.
287:
Research in the field of personal information management has considered six senses in which information can be personal (to “me”) and so an object of person’s PIM activities:
1922: 5016: 1056:
for paper-based information to a wide range of computer-based applications for the management of digital information, ranging from applications people use every day such as
5174: 338:
Experienced by "me", e.g., Web history, photos (taken by others as well as by "me"), journal entries, full-motion videos from head-mounted cameras and other efforts to
218:
messages for everyday use to complete tasks (work-related or not) and fulfill a person's various roles (as parent, employee, friend, member of community, etc.); it is
38: 445:
and efforts to create backups of information to secure against loss. Also included are efforts to create an organizing structure in support of keeping and re-finding.
5090:
For Richer, for Poorer, in Sickness or in Health...: The Long-Term Management of Personal Information. PIM 2016 Workshop, in conjunction with the 2016 CHI Conference
2110:
O. Bergman; R. Beyth-Marom; R. Nachmias; N. Gradovitch; S. Whittaker (2008). "Improved search engines and navigation preference in personal information management".
1033:
The automated gathering of data on collections in a PSI e.g., for a personal file system to measure number of folders, depth, and average number of files per folder.
1307:(PNM) is a crucial aspect of PIM and can be understood as the practice of managing the links and connections to other people for social and professional benefits. 1249:(GIM, usually pronounced with a soft "G") has been written about elsewhere in the context of PIM. The study of GIM, in turn, has clear relevance to the study of 1182:
There is great potential for a mutually beneficial interplay between cognitive science and PIM. Sub-areas of cognitive science of clear relevance to PIM include
360:
to "me"—a catch-all category that includes information of potential relevance to a person e.g., information a person doesn't know about but ought to know about.
2478:
Teevan, J.; Alvarado, C.; Ackerman, M.S.; Karger, D.R. (2004). "The perfect search engine Is not enough: A study of orienteering behavior in directed search".
1217:
As people do PIM they work in an external environment that includes other people, available technology, and, often, an organizational setting. This means that
2149: 928:
concerns of possible loss of the information and also express concerns about their ability and effectiveness in managing and organizing their information.
872:. What, for example, are the personal information privacy implications of clicking the "Sign Up" button for use of social media services such as Facebook. 728:
navigation e.g., by highlighting and otherwise making it easier to follow, the paths people are more likely to take in their navigation back to a file.
4646:
Hicks, B.J.; Dong, A.; Palmer, R.; Mcalpine, H. C. (2008). "Organizing and managing personal electronic files: A mechanical engineer's perspective".
3822:
Alon, L.; Nachmias, R. (2020). "Anxious and frustrated but still competent: Affective aspects of interactions with personal information management".
1910:. 12th Annual ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 1989). Vol. 23. Cambridge, MA. pp. 207–210. 202:) is the study and implementation of the activities that people perform in order to acquire or create, store, organize, maintain, retrieve, and use 5380: 799:
people in filing information. Comparable differences have been observed in the ways people organize digital documents, emails, and web references.
230:
of PIM (such as looking for and organising information). But tools and technologies can also overwhelm people with too much information leading to
830:
for which they are not prepared. At the same time, these stores offer their owners the opportunity, with the right training and tool support, for
3988:
From user needs to opportunities in personal information management: A case study on organisational strategies in cross-media information spaces
5375: 5167: 4031:
Dinneen, J. D.; Frissen, I. (2020). "Mac Users Do It Differently: The Role of Operating System and Individual Differences in File Management".
4244:
Feng, Y.; Agosto, D. E. (2019). "Revisiting personal information management through information practices with activity tracking technology".
3417:
Diekema, A. R.; Olsen, M. W. (2014). "Teacher Personal information management (PIM) practices: Finding, keeping, and Re-Finding information".
3296:
Feng, Y.; Agosto, D. E. (2019). "Revisiting personal information management through information practices with activity tracking technology".
3163:
Dourish, P.; Edwards, W. K.; LaMarca, A.; Salisbury, M. (1999). "Presto: An experimental architecture for fluid interactive document spaces".
2624:
Whittaker, S.; Matthews, T.; Cerruti, J.; Badenes, H.; Tang, J. (2011). "Am I Wasting My Time Organizing Email?: A Study of Email Refinding".
864:. Letting in the wrong kind of information can mean that a person's devices are "infected" and the person's data is corrupted or "locked" for 696:
Also, finding/re-finding often means not just assembling a single item of information but rather a set of information. The person may need to
411:
paper documents relating to personal finances and possessions, as organized into the hanging folders of a traditional vertical filing cabinet.
5026: 4782: 4737: 4630: 4519: 4432: 4220: 4160: 4058: 4007: 3488: 2829: 2784: 2687: 2373: 2259: 1415: 1381: 1347: 1019:
wherein participants report on their PIM actions and experiences over time possibly as prompted (e.g., by a beep or a text on a smartphone).
3681: 1823:
D. O. Case (1986). "Collection and organization of written information by social scientists and humanists: a review and exploratory study".
146: 76: 44: 469:
efforts to find a document as when, for example, a person discovers that two folders have overlapping content and should be consolidated.
87: 4411:
Jones, William; Pirolli, Peter; Card, Stuart K.; Fidel, Raya; Gershon, Nahum; Morville, Peter; Nardi, Bonnie; Russell, Daniel M. (2006).
3742:
Massey, C.; TenBrook, S.; Tatum, C.; Whittaker, S. (April 2014). "PIM and personality: What do our personal file systems say about us?".
2509:
Abrams, D.; Baecker, R.; Chignell, M. (1998). "Information archiving with bookmarks: Personal web space construction and organization".
1250: 555: 2511:
CHI '98: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Eds KaratCMLundACoutazJ, et Al.), Los Angeles, USA
1097:
As what is better described as a methodology of tool design rather than a method, Bergman reports good success in the application of a
3772:
Whittaker, S.; Massey, C. (2020). "Mood and personal information management: how we feel influences how we organize our information".
3213:
Bergman, O.; Gradovitch, N.; Bar-Ilan, J.; Beyth-Marom, R. (2013). "Folder versus tag preference in personal information management".
1317: 782:
movement, life logging, in the extreme, a 'total capture" of information. Tracking technologies raise serious issues of privacy (see "
5064:
The PIM Workshop: An NSF-Sponsored Invitational Workshop on Personal Information Management, January 27-29, 2005, Seattle, Washington
4613:
Grudin, J. (1988). "Why CSCW applications fail: problems in the design and evaluation of organization of organizational interfaces".
2018: 5160: 4554: 1501: 182: 164: 105: 52: 3616:
Marshall, C.C. (2008). "Rethinking personal digital archiving, part 2: Implications for services, applications, and institutions".
5080:
Personal Information Management: PIM 2009 Workshop, in conjunction with ASIS&T 2009. November 7-8, 2009, Vancouver, BC, Canada
2613:. SIGIR 2003: 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. pp. 72–79. 342:. The increasing use of tools that keep a time-stamped record of a person's activities and bodily states either explicitly (e.g., 319:: It can sometimes have critical importance but at other times, it can distract and derail a person's efforts to get things done. 1191: 1452: 1137: 1098: 456:
and efforts to manage email subscriptions and efforts to filter incoming email (e.g., by marking some as "junk" or "spam").
5289: 2428:
Teevan, J.; Dumais, S.T.; Horvitz, E. (2005). "Personalizing search via automated analysis of interests and activities.".
2306:. Personal Information Management 2005: A Special Workshop Sponsored by the National Science Foundation. Seattle, WA, USA. 1274: 1133: 968:
understand what might be done in techniques, training and, especially, tool design to improve a person's practice of PIM.
223: 905:
can impact a person's practice of PIM and, in turn, a person's emotions can be impacted by the person's practice of PIM.
719:
repeatedly observed in psychological research such that preferred method of return aligns with initial exposure. Under a
5385: 5327: 3950:
Jones, W (2015). "Building a Better World with our Information: The Future of Personal Information Management, Part 3".
1342: 1246: 1190:. For example, folders created to hold information for a big project such as "plan my wedding" may sometimes resemble a 1089:
exemplify this approach: Users can continue to work with their files and folders locally on their computers through the
1069: 770:
return to information previously experienced ("I think I read the email while in the taxi on the way to the airport…").
375: 320: 3122:
Dourish, P.; Edwards, W. K.; LaMarca, A.; Lamping, J.; Petersen, K.; Salisbury, M.; Terry, D. B.; Thornton, J. (2000).
142: 138: 5102: 4912:
In B. Cronin (Ed.), "Annual Review of Information Science and Technology (ARIST), 45". Medford, NJ: Information Today.
1698:
D. C. Engelbart (1961). "Special considerations of the individual as a user, generator and retriever of information".
1273:
Concerns of knowledge management on a personal (vs. organizational) level have given rise to arguments for a field of
626: 4084:"Anxious and frustrated but still competent: Affective aspects of interactions with personal information management" 2559:
Bergman, O; Whittaker, S.; Schooler, J. (2020). "Out of sight and out of mind: Bookmarks are created but not used".
2005:
D. O. Case (1991). "Conceptual organization and retrieval of text by historians - the role of memory and metaphor".
482:
communicate using digital forms of information including emails, digital documents shared (as attachments or via a
1129: 1016: 1048:
The purview of PIM tool design applies to virtually any tool people use to work with their information including "
2180: 678:
Lansdale characterized the retrieval of information as a two-step process involving interplay between actions to
261:
PIM considers not only the methods used to store and organize information, but also is concerned with how people
4578:
Dinneen, Jesse David; Krtalić, Maja (2020). "E-mail as legacy: managing and preserving e-mail as a collection".
3285:. 68th Annual Meeting of the American Society for Information Science and Technology (ASIST 2008). Columbus, OH. 4512:
Building a Better World with our Information: The Future of Personal Information Management, Part 3, Chapter 10
3571: 3513: 3068:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Vancouver, British Columbia, Canada
839: 786:"). Additional questions arise concerning the utility and even the practical accessibility of "total capture". 267: 4332:"The user-subjective approach to personal information management systems design: Evidence and implementations" 1905: 3335:. First ACM Workshop on Continuous Archival and Retrieval of Personal Experiences (CARPE '04). pp. 1–21. 605:
in a refrigerated room, gained further validity from work in the late 1970s and through the 1980s to produce
3913:"Revisiting personal information management through information practices with activity tracking technology" 1176: 1141: 1108:") and each of the six activities of PIM (finding, keeping and the four meta-level activities, see section " 427:
Two activities of PIM occur repeatedly throughout a person's day and are often prompted by external events.
4999: 4982: 4916: 4909: 2443:
Bates, M. J. (1989). "The design of browsing and berrypicking techniques for the online search interface".
2390: 5001:
Transforming Technologies to Manage Our Information: The Future of Personal Information Management, Part 2
4874: 3807:
Sas, C.; Whittaker, S. (2013). "Design for forgetting: Disposing of digital possessions after a breakup".
1153: 945: 716: 219: 4938: 3597:
Marshall, C. C. (2008). "Rethinking personal digital archiving, Part 1: Four challenges from the field".
3388:"Stuff goes into the computer and doesn't come out" A cross-tool study of personal information management 2223:
Jones, William; Wenning, Abe; Bruce, Harry (2014). "How Do People Re-find Files, Emails and Web Pages?".
3559:. HCI International 2003: 10th International Conference on Human-Computer Interaction. pp. 616–620. 3066:
Whittaker, S.; Sidner, C. (1996). "Email overload: Exploring personal information management of email".
2996:
Whittaker, S.; Hirschberg, J. (2001). "The character, value and management of personal paper archives".
2887:
Ellis, J.; Kvavilashvili, L. (2000). "Prospective memory in 2000: Past, present and future directions".
2574:
Whittaker, S.; Hirschberg, J. (2001). "The character, value and management of personal paper archives".
2480:
Human Factors in Computing Systems. Proceedings of the ACM SIGCHI Conference (CHI 2004), Vienna, Austria
1644:
S. Carmody; W. Gross; T. Nelson; D. Rice; A. Van Dam (1969). "A hypertext editing system for the /360".
1327: 1222: 1145: 663: 590:", developed one of the first hypertext systems, The Hypertext Editing System, in 1968. That same year, 262: 80:
that states a Knowledge (XXG) editor's personal feelings or presents an original argument about a topic.
4965: 4282:
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (New York, NY, USA)
551:, now such a standard feature of home and workplace offices, was first commercially available in 1893. 4810: 2872:
Czerwinski, M.; Horvitz, E.; Wilhite, S. (2004). "A Diary Study of Task Switching and Interruptions".
2036: 1944: 5354: 5335: 4413:""It's About the Information Stupid!": Why We Need a Separate Field of Human-information Interaction" 3346:
Sellen, A. J.; Whittaker, S. (2010). "Beyond total capture: A constructive critique of lifelogging".
2716: 1211: 1168: 1149: 1121: 1086: 1012: 812: 659: 483: 316: 297: 243: 231: 4956: 448:
Activities to manage privacy and the flow of information include, for example, decisions concerning
5350: 5053: 4967:
Building a Better World with our Information: The Future of Personal Information Management, Part 3
4121: 3635:
Whittaker, S. (2011). "Personal information management: From information consumption to curation".
2284: 1157: 778:
Technologies to automate the keeping of personal information segue to personal informatics and the
655: 610: 361: 350:) or implicitly (e.g., through Web page browsing, emails and texts) has given rise to notions of a 3698:
Ackerman, M. S.; Cranor, L. (1999). "Privacy critics: UI components to safeguard users' privacy".
3083:"The spatial metaphor for user interfaces—Experimental tests of reference by location versus name" 2703:
Benn, Y.; Bergman, O.; Glazer, L.; Arent, P.; Wilkinson, I. D.; Varley, R.; Whittaker, S. (2015).
4855: 4788: 4743: 4698: 4663: 4595: 4560: 4477: 4438: 4312: 4261: 4226: 4166: 4103: 4064: 4036: 4013: 3967: 3932: 3893: 3839: 3789: 3577: 3537: 3519: 3494: 3434: 3399: 3363: 3313: 3263: 3180: 3145: 3104: 3013: 2942: 2835: 2790: 2637: 2591: 2522: 2491: 2460: 2326: 2265: 2172: 2127: 2056: 1886: 1840: 1507: 1332: 1218: 1207:
and the PIM study of how people use tags and folders to describe and organize their information.
1027: 940:
in healthcare institutions (e.g., clinics, hospitals, insurance providers), often in the form of
937: 909: 746: 293: 251: 2965:"Finders, keepers? The present and future perfect in support of personal information management" 2660:
Jones, W.; Wenning, A.; Bruce, H. (2014). "How Do People Re-find Files, Emails and Web Pages?".
2206:"How do we find personal files?: the effect of OS, presentation, & depth on file navigation" 133:
may contain an excessive amount of intricate detail that may interest only a particular audience
5128: 4541:. Conference on Human Factors and Computing Systems, INTERACT '93 AND CHI '93. pp. 23–30. 4301:
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems
3198:
Cutrell, E.; Robbins, D.; Dumais, S.; Sarin, R. (2006). "Fast, Flexible Filtering with Phlat".
2540:
Bruce, H.; Jones, W.; Dumais, S. (2004). "Information behavior that keeps found things found".
1865:"How do people organize their desks: implications for the design of office information-systems" 5238: 5220: 5152: 5030: 5022: 4778: 4733: 4681:
Bergman, Ofer; Whittaker, Steve; Falk, Noa (2014). "Shared files: The retrieval perspective".
4626: 4550: 4515: 4428: 4216: 4156: 4054: 4003: 3484: 3048: 2921:"Once found, what then? A study of "keeping" behaviors in the personal use of Web information" 2825: 2780: 2742: 2683: 2410: 2369: 2255: 1907:
How a personal document's intended use or purpose affects its classification in an office]
1760: 1497: 1453:"A Report on the NSF-Sponsored Workshop on Personal Information Management, Seattle, WA, 2005" 1411: 1377: 1204: 1172: 1125: 1082: 952: 902: 606: 591: 487: 379: 328: 247: 4364: 3533: 3456:. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2005). pp. 1505–1508. 5304: 5279: 5264: 5195: 5005: 4988: 4971: 4847: 4846:. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2003). pp. 345–352. 4822: 4770: 4725: 4690: 4655: 4618: 4587: 4542: 4469: 4420: 4393: 4343: 4304: 4253: 4208: 4148: 4095: 4046: 3995: 3959: 3924: 3885: 3831: 3781: 3703: 3644: 3529: 3476: 3473:
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
3426: 3391: 3355: 3305: 3253: 3222: 3172: 3135: 3094: 3040: 3005: 2976: 2932: 2896: 2817: 2772: 2732: 2724: 2705:"Navigating through digital folders uses the same brain structures as real world navigation" 2675: 2665: 2629: 2583: 2514: 2483: 2452: 2402: 2344: 2336: 2304:
A Report on the NSF-Sponsored Workshop on Personal Information Management, Seattle, WA, 2005
2247: 2164: 2119: 2087: 2075: 2048: 2014: 1987: 1956: 1876: 1832: 1752: 1707: 1589: 1577: 1489: 1352: 1304: 1226: 1195: 972: 869: 827: 771: 614: 567: 449: 4495:
Lutters, Wayne G.; Ackerman, Mark S.; Zhou, Xiaomu (2007). "Group Information Management".
3283:
Better to organize personal information by folders or by tags?: The devil is in the details
5345: 5070:
PIM 2006 Workshop, in conjunction with SIGIR 2006. August 10-11, 2006, Seattle, Washington
4984:
The Future of Personal Information Management, Part 1: Our Information, Always and Forever
3515:
The long term fate of our digital belongings: Toward a service model for personal archives
2287:; W. Jones (2004). "A special interest group session on personal information management". 1290: 1286: 1187: 1183: 779: 602: 579: 559: 351: 4897:
Jones, W, Dinneen, J. D., Capra, R., Diekema, A. R., & Pérez-Quiñones, M. A. (2017).
4844:
Taking email to task: The design and evaluation of a task management centered email tool
4536: 2853:
Erdelez, S.; Rioux, K. (2000). "Sharing information encountered for others on the Web".
2720: 4615:
CSCW '88: Proceedings of the 1988 ACM conference on Computer-supported cooperative work
4369:. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2005). Portland, OR. 2737: 1945:"On the applied use of human memory models: the memory extender personal filing system" 1200: 1065: 981: 941: 861: 826:
With ever increasing stores of personal digital information, people face challenges of
571: 548: 543: 503: 402:
photos, digital or paper-based, possibly as organized into albums, virtual or physical;
5109: 5009: 4992: 4975: 4297:"Making It Real: Towards Practical Progress in the Management of Personal Information" 3963: 3667:
Proceedings of the 27th International Conference on Human Factors in Computing Systems
2238:
Whittaker, Steve; Mathews, Tara; Cerruti, Julian; Badenes, Hernan; Tang, John (2011).
1975: 1960: 1015:
collected, for example, as a participant completes a keeping or finding task, and the
5369: 5074: 5018:
Keeping found things found: the study and practice of personal information management
4599: 4265: 4230: 4107: 4068: 3936: 3843: 3793: 3725:"Understanding my data, myself: Supporting self-reflection with ubicomp technologies" 3317: 3044: 3017: 2595: 2205: 2060: 1991: 1864: 1756: 1337: 1042: 916:
create a structure with more folders where folders, on average, contain fewer files.
595: 304: 5069: 4667: 4481: 4442: 4316: 4170: 3971: 3897: 3857:
Bruce, Harry; Wenning, Abe; Jones, Elisabeth; Vinson, Julia; Jones, William (2010).
3541: 3438: 3403: 3267: 3184: 3108: 2946: 2641: 2464: 2269: 2176: 2131: 1844: 1660: 1511: 5274: 5063: 4792: 4747: 4702: 4564: 4124:; Chignell, M (2007). "Individual Differences In Personal Information Management". 4033:
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems
4017: 3498: 3367: 3149: 2839: 2794: 2495: 2210:
Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems
1890: 1322: 1090: 1049: 976: 563: 495: 464:
overall picture of health that emerges from all the data kept by a fitness tracker?
387: 255: 4859: 4761:
Capra, Robert; Marchionini, Gary; Velasco-Martin, Javier; Muller, Katrina (2010).
2526: 2076:"The persistence of behavior and form in the organization of personal information" 1682: 570:
pioneered the computer's use as a tool to model human thought. They produced "The
5089: 5075:
PIM 2008 Workshop in conjunction with SIGCHI 2008, April 2008, in Florence, Italy
3648: 2406: 2340: 4099: 3835: 1057: 1053: 988:", personality traits and even a person's current mood can impact PIM behavior. 956: 898: 408:
emails, organized into email folders or, possibly, left in an ever larger inbox;
347: 239: 203: 5057: 4381: 3859:
Seeking an ideal solution to the management of personal information collections
3785: 2609:
Dumais, S.; Cutrell, E.; Cadiz, J.; Jancke, G.; Sarin, R.; Robbins, D. (2003).
1836: 823:
efforts to consolidate different information forms into a single organization.
5299: 5269: 5259: 5205: 5134: 5060:. CHI '04 Extended Abstracts on Human Factors in Computing Systems, 1598–1599. 4366:
Don't take my folders away! Organizing personal information to get things done
4083: 3999: 3454:
Don't take my folders away! Organizing personal information to get things done
1668:
Proceedings of the December 9–11, 1968, Fall Joint Computer Conference, Part I
583: 4762: 4717: 4457: 4412: 4397: 3258: 3241: 2414: 2239: 5294: 4774: 4729: 4659: 4535:
Berlin, L. M.; Jeffries, R.; O'Day, V. L.; Paepcke, A.; Wharton, C. (1993).
4473: 4424: 4308: 4212: 4205:
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
4152: 4050: 3889: 3724: 3480: 3359: 3124:"Extending document management systems with user-specific active properties" 2937: 2920: 2821: 2776: 2633: 2251: 2204:
O. Bergman; S. Whittaker; M. Sanderson; R. Nachmias; A. Ramamoorthy (2012).
2148:
O. Bergman; S. Whittaker; M. Sanderson; R. Nachmias; A. Ramamoorthy (2010).
2123: 1623: 1493: 1481: 737:
encountered information are collectively referred to as keeping activities.
587: 519: 440:
Meta-level activities focus more broadly on aspects of the mapping itself.
357: 303:
About "me". This refers especially to information (sometimes referred to as
145:
any relevant information, and removing excessive detail that may be against
3052: 2746: 2391:"Personal information management: From information consumption to curation" 1764: 1711: 5034: 4851: 4827: 4767:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
4591: 4546: 4296: 4200: 4145:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
4140: 3873: 3809:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
3744:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
3708: 3468: 3395: 3246:
Proceedings of the American Society for Information Science and Technology
3200:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
3176: 3140: 3123: 3031:
Lansdale, M. (1988). "The psychology of personal information management".
3009: 2925:
Proceedings of the American Society for Information Science and Technology
2874:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
2814:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
2809: 2764: 2626:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
2587: 2518: 2487: 2244:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
2052: 1930:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
1881: 1486:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
5317: 4363:
Jones, W.; Phuwanartnurak, A. J.; Gill, R.; Bruce, H. (April 2–7, 2005).
3242:"Tagging personal information: A contrast between attitudes and behavior" 2981: 2964: 1812:. Human Factors Society 26th Annual Meeting. Seattle, WA. pp. 59–63. 1743:
M. Lansdale (1988). "The psychology of personal information management".
511: 499: 453: 211: 207: 5079: 4927: 4879:. CHI 1996: ACM SIGCHI Conference on Human Factors in Computing Systems. 4622: 3861:. Information Seeking in Context Conference -(ISIC) 2010. Murcia, Spain. 3729:
Proceedings of the 13th International Conference on Ubiquitous Computing
2019:
10.1002/(SICI)1097-4571(199110)42:9<657::AID-ASI4>3.0.CO;2-7
1548:
Control through communication: The rise of system in American management
984:" will have profound impact on PIM practices. And, as noted in section " 5340: 5210: 3573:
Evaluating personal archiving strategies for Internet-based information
2611:
Stuff I've seen: A system for personal information retrieval and re-use
1593: 507: 339: 308: 296:. The increasing digitization of personal information raises issues of 4694: 4348: 4336:
Journal of the American Society for Information Science and Technology
4331: 4257: 3928: 3557:
Too many hierarchies?: The daily struggle for control of the workspace
3430: 3309: 3226: 3215:
Journal of the American Society for Information Science and Technology
3099: 3082: 2728: 2679: 2168: 2091: 2080:
Journal of the American Society for Information Science and Technology
1810:
Human aspects of office filing: implications for the electronic office
1482:"The project fragmentation problem in personal information management" 815:. (See also section, "Managing privacy and the flow of information"). 5243: 5233: 5200: 2456: 2349: 1624:"File structure for the complex, the changing, and the indeterminate" 865: 808: 515: 343: 5085:
PIM 2013 Workshop in conjunction with ASIST 2013 in Montreal, Canada
4804: 4802: 4458:"From PIM to GIM: Personal Information Management in Group Contexts" 3912: 2900: 2763:
Jones, W.; Hou, D.; Sethanandha, B. D.; Bi, S.; Gemmell, J. (2010).
2704: 2240:"Am I Wasting My Time Organizing Email?: A Study of Email Refinding" 1578:"Heuristic problem solving: The next advance in operations research" 369:
A personal space of information and personal information collections
4898: 4763:"Tools-at-hand and learning in multi-session, collaborative search" 4538:
Where did you put it?: issues in the design and use of group memory
4041: 3952:
Synthesis Lectures on Information Concepts, Retrieval, and Services
3240:
Bergman, O.; Gradovitch, N.; Bar-Ilan, J.; Beyth-Marom, R. (2013).
2331: 5284: 5215: 4876:
Email overload: exploring personal information management of email
4141:"Homeless Young People and Living with Personal Digital Artifacts" 3994:. IEEE/ACM Joint Conference on Digital Libraries. pp. 87–96. 3582: 3524: 2670: 1976:"Using memory for events in the design of personal filing systems" 1061: 847: 215: 5105:
Authored by Richard Boardman, Imperial College London (July 2003)
4683:
Journal of the Association for Information Science and Technology
4295:
Jones, W.; Thorsteinson, C.; Thepvongsa, B.; Garrett, T. (2016).
4246:
Journal of the Association for Information Science and Technology
3917:
Journal of the Association for Information Science and Technology
3419:
Journal of the Association for Information Science and Technology
3298:
Journal of the Association for Information Science and Technology
1120:
PIM is a practical meeting ground for many disciplines including
783: 5309: 5225: 4417:
CHI '06 Extended Abstracts on Human Factors in Computing Systems
4386:
Transactions of the IRE Professional Group on Information Theory
3700:
CHI '99 Extended Abstracts on Human Factors in Computing Systems
2769:
CHI '10 Extended Abstracts on Human Factors in Computing Systems
2289:
CHI '04 extended abstracts on Human factors in computing systems
1105: 997: 506:
and links, text, photos, and videos shared via services such as
491: 394:) that is unique for each individual. Within a person's PSI are 332: 5156: 5084: 4921:
Annual Review of Information Science and Technology (ARIST), 41
3390:. ACM SIGCHI Conference on Human Factors in Computing Systems. 3333:
Continuous lifelong capture of personal experience using eyetap
4910:
Personal information management: From Consumption to Curation.
3452:
Jones, W.; Phuwanartnurak, A. J.; Gill, R.; Bruce, H. (2005).
1077: 414:
digital songs as organized through application such as iTunes.
117: 59: 18: 4718:"That Syncing Feeling: Early User Experiences with the Cloud" 4497:
Personal Information Management: Challenges and Opportunities
1648:. Urbana, IL: University of Illinois Press. pp. 291–330. 4842:
Bellotti, V.; Ducheneaut, N.; Howard, M.; Smith, I. (2003).
2150:"The effect of folder structure on personal file navigation" 936:
Traditional, personal health information resides in various
609:
of increasing power and portability. These trends continue:
4722:
Proceedings of the Designing Interactive Systems Conference
2037:"Finding and reminding: file organization from the desktop" 1631:
Proceedings of the 1965 20th ACM/CSC-ER national conference
951:
With the rise of consumer-facing health products including
675:(since the person has no remembrance for the information). 77:
personal reflection, personal essay, or argumentative essay
3576:. Archiving Conference. Vol. 2007. pp. 151–156. 3381: 3379: 3377: 2317:
Jones, William (2007). "Personal Information Management".
1376:. Seattle, WA: University of Washington Press. p. 3. 601:
The computer as aid to the individual, rather than remote
5139:
A list of Personal Information Management prototype tools
4903:
Encyclopedia of Library and Information Science (4th ed.)
3469:"Lost in Email: Pulling Users Down a Path of Interaction" 1480:
Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi (2006).
5004:. San Rafael, Calif.: Morgan & Claypool Publishers. 4987:. San Rafael, Calif.: Morgan & Claypool Publishers. 4970:. San Rafael, Calif.: Morgan & Claypool Publishers. 4514:. San Rafael, Calif.: Morgan & Claypool Publishers. 3518:. Archiving Conference. Vol. 2006. pp. 25–30. 1030:
that can potentially reach a large and diverse audience.
3872:
Pratt, W.; Unruh, K.; Civan, A.; Skeels, M. M. (2006).
1210:
Now large portions of a document may be the product of
405:
digital documents organized into folders and subfolders
83: 4201:"The Scale and Structure of Personal File Collections" 3660: 3658: 1270:
organizational level often migrate to the PIM domain.
963:
Methods and methodologies of PIM study and tool design
4380:
Peterson, W. W.; Birdsall, T. G.; Fox, W. C. (1954).
3281:
Civan, A.; Jones, W.; Klasnja, P.; Bruce, H. (2008).
2364:
Bergman, Ofer; Whittaker, Steve (November 11, 2016).
996:
information that is "personal" to them (see section "
473:
highlight the information most in need of attention.
2914: 2912: 2910: 2758: 2756: 2655: 2653: 2651: 1023:
diversity of participants. Among these methods are:
5326: 5252: 5188: 4330:Bergman, O.; Beyth-Marom, R.; Nachmias, R. (2008). 4199:Dinneen, J. D.; Julien, C.-A.; Frissen, I. (2019). 3637:
Annual Review of Information Science and Technology
2765:"Planz to Put Our Digital Information in Its Place" 2395:
Annual Review of Information Science and Technology
2319:
Annual Review of Information Science and Technology
1431: 1429: 1427: 985: 5021:. Amsterdam / Boston: Morgan Kaufmann Publishers. 3570:Marshall, C. C; McCown, F.; Nelson, M. L. (2007). 3512:Marshall, C. C.; Bly, S.; Brun-Cottan, F. (2006). 2958: 2956: 1684:Augmenting human intellect: A conceptual framework 1661:"A Research Center for Augmenting Human Intellect" 629:(NSF)-sponsored workshop held in Seattle in 2005. 398:(PICs) or, simply, collections. Examples include: 5103:Who's working on Personal Information Management? 4939:The psychology of personal information management 3682:"Malware infects 30 percent of computers in U.S." 1440:(4 ed.). Taylor & Francis. p. 3590. 715:Preference for navigation is also in line with a 4926:Teevan, J., Jones, W. & Bederson, B. (2006) 2561:Journal of Librarianship and Information Science 1550:. Baltimore, MD: Johns Hopkins University Press. 1233:Human–computer and human–information interaction 542:PIM is a new field with ancient roots. When the 5129:A list of personal document management software 4088:International Journal of Human-Computer Studies 3824:International Journal of Human-Computer Studies 3555:Boardman, R.; Spence, R.; Sasse, M. A. (2003). 2808:Fitchett, S.; Cockburn, A.; Gutwin, C. (2013). 2430:Proceedings of the SIGIR 2005, Salvador, Brazil 1738: 1736: 1438:Encyclopedia of Library and Information Science 689:But re-finding begins first with another step: 4928:SPECIAL ISSUE: Personal information management 3165:ACM Transactions on Computer-Human Interaction 3087:ACM Transactions on Office Information Systems 2998:ACM Transactions on Computer-Human Interaction 2576:ACM Transactions on Computer-Human Interaction 2199: 2197: 2195: 2193: 2143: 2141: 2105: 2103: 2101: 2030: 2028: 1869:ACM Transactions on Office Information Systems 5168: 4901:. In M. Levine-Clark and J. McDonald (Eds.), 2662:IConference 2014 Proceedings, Berlin, Germany 1858: 1856: 1854: 1782:. Hillsdale, NJ: Lawrence Erlbaum Associates. 932:The management of personal health information 16:Tools and systems for managing one's own data 8: 2855:New Review of Information Behaviour Research 1923:"The Memory Extender Personal Filing System" 1780:The psychology of human-computer interaction 855:Managing privacy and the flow of information 784:Managing privacy and the flow of information 5183:Free and open-source collaborative software 4186:Information, Knowledge and Successful Aging 2810:"Improving Navigation-based File Retrieval" 1778:S. K. Card; T. P. Moran; A. Newell (1983). 1265:Data, information, and knowledge management 1106:The senses in which information is personal 998:The senses in which information is personal 477:Information items, forms, and fragmentation 283:The senses in which information is personal 53:Learn how and when to remove these messages 5175: 5161: 5153: 5058:Personal Information Management: A CHI SIG 3757:Dinneen, J. D.; Frissen, I. (April 2020). 1164:Cognitive psychology and cognitive science 834:of their information in new, useful ways. 4958:The Science of Managing Our Digital Stuff 4826: 4347: 4040: 3723:Li, I.; Dey, A. K.; Forlizzi, J. (2011). 3707: 3581: 3523: 3467:Hanrahan, W.; PĂ©rez-Quiñones, M. (2015). 3257: 3139: 3098: 2980: 2936: 2919:Jones, W.; Dumais, S.; Bruce, H. (2002). 2736: 2669: 2366:The Science of Managing Our Digital Stuff 2348: 2330: 1880: 327:Sent/Posted by "me", e.g., sent e-mails, 183:Learn how and when to remove this message 165:Learn how and when to remove this message 106:Learn how and when to remove this message 4955:Bergman, O. & Whittaker, S. (2016). 3874:"Personal health information management" 3534:10.2352/issn.2168-3204.2006.3.1.art00007 2212:. New York, NY, USA. pp. 2977–2980. 4716:Marshall, Cathy; Tang, John C. (2012). 3331:Mann, S.; Sehgal, A.; Fung, J. (2004). 3128:ACM Transactions on Information Systems 1659:D. C. Engelbart; W. K. English (1968). 1646:Pertinent concepts in computer graphics 1535:. Chicago: University of Chicago Press. 1401: 1399: 1397: 1395: 1393: 1364: 498:updates (e.g., using a service such as 4811:"No knowledge but through information" 4139:Woelfer, J. P.; Hendry, D. G. (2011). 1932:. New York, NY, USA. pp. 298–305. 1670:. New York, NY, USA. pp. 395–410. 1565:. Englewood Cliffs, NJ: Prentice-Hall. 1372:Jones, William; Teevan, Jaime (2007). 1109: 639: 452:in a social media application such as 1348:List of personal information managers 885:Making sense of and using information 7: 4382:"The theory of signal detectability" 2389:Whittaker, Steve (January 1, 2011). 1729:. New York: Appleton-Century Crofts. 242:or into a cloud-based store using a 226:is by some definitions a subdomain. 3985:Trullemans, S.; Signer, B. (2014). 3386:Boardman, R.; Sasse, M. A. (2004). 1251:computer-supported cooperative work 708:sender, for messages not in view). 5110:"Publications & Presentations" 4873:Whittaker, S.; Sidner, C. (1996). 3070:. New York: ACM. pp. 276–283. 2771:. Chi Ea '10. pp. 2803–2812. 1488:. Chi '06. ACM. pp. 271–274. 1318:Comparison of note-taking software 147:Knowledge (XXG)'s inclusion policy 14: 5010:10.2200/S00532ED1V01Y201308ICR028 4993:10.2200/S00411ED1V01Y201203ICR021 4976:10.2200/S00653ED1V01Y201506ICR042 4923:. Medford, NJ: Information Today. 4128:. University of Washington Press. 3964:10.2200/S00653ED1V01Y201506ICR042 3774:Personal and Ubiquitous Computing 1795:The psychology of everyday things 1633:. Cleveland, OH. pp. 84–100. 34:This article has multiple issues. 3911:Feng, Y.; Agosto, D. E. (2019). 2368:. Cambridge, MA: The MIT Press. 2035:D. Barreau; B. A. Nardi (1995). 1974:M. Lansdale; E. Edmonds (1992). 1229:all relate to the study of PIM. 613:roughly equivalent to that of a 396:personal information collections 122: 64: 23: 4917:Personal information management 4899:Personal Information Management 4126:Personal Information Management 4082:Alon, L.; Nachmias, R. (2020). 3475:. Chi '15. pp. 3981–3984. 2816:. Chi '13. pp. 2329–2338. 1611:. London, U.K.: Pergamon Press. 1576:H. A. Simon; A. Newell (1958). 1561:A. Newell; H. A. Simon (1972). 1374:Personal Information Management 1194:. To take another example, the 1138:library and information science 390:, alternately referred to as a 196:Personal information management 42:or discuss these issues on the 3081:Jones, W.; Dumais, S. (1986). 1451:Jones, William; Bruce, Harry. 1410:. Morgan Kaufmann Publishers. 894:Personality, mood, and emotion 1: 5376:Personal information managers 5328:Personal information managers 5290:Feng Office Community Edition 3680:Samson, T. (August 8, 2012). 2291:. Vienna, Austria: ACM Press. 1961:10.1016/S0020-7373(86)80076-1 1275:personal knowledge management 1134:human information interaction 1070:personal information managers 384:personal space of information 376:personal information managers 321:Information filtering systems 224:Personal knowledge management 5135:"what has been built so far" 3649:10.1002/aris.2011.1440450108 3045:10.1016/0003-6870(88)90199-8 2889:Applied Cognitive Psychology 2407:10.1002/aris.2011.1440450108 2341:10.1002/aris.2007.1440410117 2225:IConference 2014 Proceedings 1992:10.1016/0020-7373(92)90054-O 1757:10.1016/0003-6870(88)90199-8 1687:(Technical report). SRI Rep. 1609:Perception and communication 1343:Personal information manager 1247:Group information management 1242:Group information management 1116:Related activities and areas 921: 654:A large body of research in 5052:Bergman, O., Boardman, R., 4961:. Cambridge, MA: MIT Press. 4100:10.1016/j.ijhcs.2020.102503 3836:10.1016/j.ijhcs.2020.102503 2302:W. Jones; H. Bruce (2005). 1943:W. P. Jones (August 1986). 1305:personal network management 1298:Personal network management 1212:"copy-and-paste" operations 627:National Science Foundation 386:(PSI, pronounced as in the 210:(paper-based and digital), 5402: 5381:Human–computer interaction 5114:Keeping Found Things Found 5056:, & Jones, W. (2004). 3786:10.1007/s00779-020-01412-4 1837:10.1177/016555158601200302 1408:Keeping Found Things Found 1130:human-computer interaction 1017:experience sampling method 790:Maintaining and organizing 392:personal information space 222:with intrapersonal scope. 4580:Libraries and the Academy 4456:Erickson, Thomas (2006). 4000:10.1109/JCDL.2014.6970154 3878:Communications of the ACM 2283:O. Bergman; R. Boardman; 2074:Barreau, Deborah (2008). 1041:Another method using the 4398:10.1109/TIT.1954.1057460 3259:10.1002/meet.14505001029 2157:J Am Soc Inf Sci Technol 1797:. New York: Basic Books. 1607:D. E. Broadbent (1958). 1281:Time and task management 1099:user-subjective approach 992:information management. 876:Measuring and evaluating 268:hierarchical file system 4937:Lansdale, M.W. (1988). 4905:. Taylor & Francis. 4809:Jones, William (2010). 4775:10.1145/1753326.1753468 4730:10.1145/2317956.2318038 4660:10.1145/1402256.1402262 4510:Jones, William (2015). 4474:10.1145/1107458.1107495 4425:10.1145/1125451.1125469 4309:10.1145/2851581.2892590 4213:10.1145/3290605.3300557 4153:10.1145/1978942.1979190 4051:10.1145/3334480.3382944 3890:10.1145/1107458.1107490 3481:10.1145/2702123.2702351 3360:10.1145/1735223.1735243 2938:10.1002/meet.1450390143 2822:10.1145/2470654.2481323 2777:10.1145/1753846.1753866 2634:10.1145/1978942.1979457 2252:10.1145/1978942.1979457 2124:10.1145/1402256.1402259 1494:10.1145/1124772.1124813 1406:Jones, William (2007). 1177:artificial intelligence 1142:artificial intelligence 946:personal health records 586:, who coined the word " 5047:Selected PIM workshops 4943:Applied Ergonomics, 19 4919:. In B. Cronin (Ed.), 4908:Whittaker, S. (2011). 4184:Jones, W. (in press). 4147:. pp. 1697–1706. 2628:. pp. 3449–3458. 2246:. pp. 3449–3458. 1980:Int. J. Man-Mach. Stud 1949:Int. J. Man-Mach. Stud 1904:B. H. Kwasnik (1989). 1863:Malone, T. W. (1983). 1712:10.1002/asi.5090120207 1154:information management 538:History and background 220:information management 86:by rewriting it in an 4852:10.1145/642611.642672 4828:10.5210/fm.v15i9.3062 4592:10.1353/pla.2020.0022 4547:10.1145/169059.169063 4284:. pp. 3513–3522. 4207:. pp. 327:1–12. 3811:. pp. 1823–1832. 3746:. pp. 3695–3704. 3709:10.1145/632716.632875 3396:10.1145/985692.985766 3177:10.1145/319091.319099 3141:10.1145/348751.348758 3010:10.1145/376929.376932 2588:10.1145/376929.376932 2519:10.1145/274644.274651 2488:10.1145/985692.985745 2053:10.1145/221296.221307 1882:10.1145/357423.357430 1793:D. A. Norman (1988). 1681:D. Engelbart (1962). 1622:T. H. Nelson (1965). 1563:Human problem solving 1460:UW Information School 1328:Personal data manager 1223:distributed cognition 1196:signal detection task 1192:problem-decomposition 1146:information retrieval 1087:file hosting services 1013:think aloud protocols 795:content and purpose. 664:information retrieval 5116:. September 10, 2010 4945:(1), pp. 55–66. 4769:. pp. 951–960. 4724:. pp. 544–553. 4648:ACM Trans. Inf. Syst 4303:. pp. 571–582. 3702:. pp. 258–259. 2982:10.5210/fm.v9i3.1123 2542:Information Research 2482:. pp. 415–422. 1921:W. P. Jones (1986). 1727:Cognitive psychology 1531:F. A. Yates (1966). 1169:Cognitive psychology 1150:information behavior 1122:cognitive psychology 1066:texting applications 986:Personality and mood 973:The operating system 660:information behavior 484:file hosting service 382:) combine to form a 317:attention management 298:digital preservation 263:retrieve information 244:file hosting service 232:information overload 5386:Information science 5351:Mozilla Thunderbird 5313:(OpenGroupware.org) 5229:(OpenGroupware.org) 4623:10.1145/62266.62273 3731:. pp. 405–414. 3669:. pp. 269–278. 3202:. pp. 261–270. 2876:. pp. 175–182. 2721:2015NatSR...514719B 2432:. pp. 449–456. 2186:on August 19, 2018. 2041:ACM SIGCHI Bulletin 1725:U. Neisser (1967). 1158:information science 955:and health-related 938:information systems 656:information seeking 611:computational power 556:process information 362:Recommender systems 5015:Jones, W. (2008). 4998:Jones, W. (2013). 4981:Jones, W. (2012). 4964:Jones, W. (2015). 4915:Jones, W. (2007). 4419:. pp. 65–68. 4094:(102503): 102503. 3830:(102503): 102503. 2963:Jones, W. (2004). 2709:Scientific Reports 2513:. pp. 41–48. 2112:ACM Trans Inf Syst 1594:10.1287/opre.6.1.1 1333:Personal organizer 1219:situated cognition 1062:email applications 910:personality traits 747:prospective memory 646:Finding/re-finding 607:personal computers 380:virtual assistants 294:personal archiving 252:Microsoft OneDrive 88:encyclopedic style 75:is written like a 5363: 5362: 5314: 5230: 5027:978-0-12-370866-3 4784:978-1-60558-929-9 4739:978-1-4503-1210-3 4695:10.1002/asi.23147 4689:(10): 1949–1963. 4632:978-0-89791-282-2 4521:978-1-62705-341-9 4434:978-1-59593-298-3 4349:10.1002/asi.20738 4258:10.1002/asi.24253 4252:(12): 1352–1367. 4222:978-1-4503-5970-2 4162:978-1-4503-0228-9 4060:978-1-4503-6819-3 4009:978-1-4799-5569-5 3929:10.1002/asi.24253 3923:(12): 1352–1367. 3490:978-1-4503-3145-6 3431:10.1002/asi.23117 3425:(11): 2261–2277. 3310:10.1002/asi.24253 3304:(12): 1352–1367. 3227:10.1002/asi.22906 3221:(10): 1995–2012. 3100:10.1145/5401.5405 2831:978-1-4503-1899-0 2786:978-1-60558-930-5 2729:10.1038/srep14719 2689:978-0-9884900-1-7 2375:978-0-262-03517-0 2261:978-1-4503-0228-9 2169:10.1002/asi.21415 2163:(12): 2426–2441. 2092:10.1002/asi.20752 1546:J. Yates (1989). 1533:The art of memory 1417:978-0-12-370866-3 1383:978-0-295-98737-8 1205:concept formation 1173:cognitive science 1152:, organizational 1126:cognitive science 1110:Activities of PIM 1003:For example, the 953:activity trackers 772:Activity tracking 721:first impressions 640:Activities of PIM 592:Douglas Engelbart 419:Activities of PIM 329:personal websites 193: 192: 185: 175: 174: 167: 116: 115: 108: 57: 5393: 5312: 5305:Simple Groupware 5265:Collabora Online 5228: 5177: 5170: 5163: 5154: 5149: 5147: 5145: 5125: 5123: 5121: 4881: 4880: 4870: 4864: 4863: 4839: 4833: 4832: 4830: 4806: 4797: 4796: 4758: 4752: 4751: 4713: 4707: 4706: 4678: 4672: 4671: 4643: 4637: 4636: 4610: 4604: 4603: 4575: 4569: 4568: 4532: 4526: 4525: 4507: 4501: 4500: 4492: 4486: 4485: 4453: 4447: 4446: 4408: 4402: 4401: 4377: 4371: 4370: 4360: 4354: 4353: 4351: 4327: 4321: 4320: 4292: 4286: 4285: 4276: 4270: 4269: 4241: 4235: 4234: 4196: 4190: 4189: 4181: 4175: 4174: 4136: 4130: 4129: 4118: 4112: 4111: 4079: 4073: 4072: 4044: 4035:. pp. 1–8. 4028: 4022: 4021: 3993: 3982: 3976: 3975: 3947: 3941: 3940: 3908: 3902: 3901: 3869: 3863: 3862: 3854: 3848: 3847: 3819: 3813: 3812: 3804: 3798: 3797: 3769: 3763: 3762: 3754: 3748: 3747: 3739: 3733: 3732: 3720: 3714: 3713: 3711: 3695: 3689: 3688: 3677: 3671: 3670: 3662: 3653: 3652: 3632: 3626: 3625: 3613: 3607: 3606: 3594: 3588: 3587: 3585: 3567: 3561: 3560: 3552: 3546: 3545: 3527: 3509: 3503: 3502: 3464: 3458: 3457: 3449: 3443: 3442: 3414: 3408: 3407: 3383: 3372: 3371: 3343: 3337: 3336: 3328: 3322: 3321: 3293: 3287: 3286: 3278: 3272: 3271: 3261: 3237: 3231: 3230: 3210: 3204: 3203: 3195: 3189: 3188: 3160: 3154: 3153: 3143: 3119: 3113: 3112: 3102: 3078: 3072: 3071: 3063: 3057: 3056: 3028: 3022: 3021: 2993: 2987: 2986: 2984: 2960: 2951: 2950: 2940: 2916: 2905: 2904: 2884: 2878: 2877: 2869: 2863: 2862: 2850: 2844: 2843: 2805: 2799: 2798: 2760: 2751: 2750: 2740: 2700: 2694: 2693: 2673: 2657: 2646: 2645: 2621: 2615: 2614: 2606: 2600: 2599: 2571: 2565: 2564: 2556: 2550: 2549: 2537: 2531: 2530: 2506: 2500: 2499: 2475: 2469: 2468: 2457:10.1108/eb024320 2440: 2434: 2433: 2425: 2419: 2418: 2386: 2380: 2379: 2361: 2355: 2354: 2352: 2334: 2314: 2308: 2307: 2299: 2293: 2292: 2280: 2274: 2273: 2235: 2229: 2228: 2220: 2214: 2213: 2201: 2188: 2187: 2185: 2179:. Archived from 2154: 2145: 2136: 2135: 2107: 2096: 2095: 2071: 2065: 2064: 2032: 2023: 2022: 2007:J Am Soc Inf Sci 2002: 1996: 1995: 1971: 1965: 1964: 1940: 1934: 1933: 1927: 1918: 1912: 1911: 1901: 1895: 1894: 1884: 1860: 1849: 1848: 1820: 1814: 1813: 1805: 1799: 1798: 1790: 1784: 1783: 1775: 1769: 1768: 1740: 1731: 1730: 1722: 1716: 1715: 1695: 1689: 1688: 1678: 1672: 1671: 1665: 1656: 1650: 1649: 1641: 1635: 1634: 1628: 1619: 1613: 1612: 1604: 1598: 1597: 1573: 1567: 1566: 1558: 1552: 1551: 1543: 1537: 1536: 1528: 1522: 1521: 1519: 1518: 1477: 1471: 1470: 1468: 1466: 1457: 1448: 1442: 1441: 1433: 1422: 1421: 1403: 1388: 1387: 1369: 1353:Semantic desktop 1227:social cognition 1043:Delphi technique 975:and the default 870:Internet privacy 828:digital curation 615:desktop computer 450:privacy settings 188: 181: 170: 163: 159: 156: 150: 126: 125: 118: 111: 104: 100: 97: 91: 68: 67: 60: 49: 27: 26: 19: 5401: 5400: 5396: 5395: 5394: 5392: 5391: 5390: 5366: 5365: 5364: 5359: 5346:Mozilla Sunbird 5322: 5248: 5184: 5181: 5143: 5141: 5133: 5119: 5117: 5108: 5099: 5097:Other resources 5049: 5044: 4952: 4932:Commun. ACM, 49 4894: 4889: 4887:Further reading 4884: 4872: 4871: 4867: 4841: 4840: 4836: 4808: 4807: 4800: 4785: 4760: 4759: 4755: 4740: 4715: 4714: 4710: 4680: 4679: 4675: 4645: 4644: 4640: 4633: 4612: 4611: 4607: 4577: 4576: 4572: 4557: 4534: 4533: 4529: 4522: 4509: 4508: 4504: 4494: 4493: 4489: 4455: 4454: 4450: 4435: 4410: 4409: 4405: 4379: 4378: 4374: 4362: 4361: 4357: 4329: 4328: 4324: 4294: 4293: 4289: 4278: 4277: 4273: 4243: 4242: 4238: 4223: 4198: 4197: 4193: 4183: 4182: 4178: 4163: 4138: 4137: 4133: 4120: 4119: 4115: 4081: 4080: 4076: 4061: 4030: 4029: 4025: 4010: 3991: 3984: 3983: 3979: 3949: 3948: 3944: 3910: 3909: 3905: 3871: 3870: 3866: 3856: 3855: 3851: 3821: 3820: 3816: 3806: 3805: 3801: 3771: 3770: 3766: 3761:. pp. 1–8. 3756: 3755: 3751: 3741: 3740: 3736: 3722: 3721: 3717: 3697: 3696: 3692: 3679: 3678: 3674: 3664: 3663: 3656: 3634: 3633: 3629: 3615: 3614: 3610: 3596: 3595: 3591: 3569: 3568: 3564: 3554: 3553: 3549: 3511: 3510: 3506: 3491: 3466: 3465: 3461: 3451: 3450: 3446: 3416: 3415: 3411: 3385: 3384: 3375: 3345: 3344: 3340: 3330: 3329: 3325: 3295: 3294: 3290: 3280: 3279: 3275: 3239: 3238: 3234: 3212: 3211: 3207: 3197: 3196: 3192: 3162: 3161: 3157: 3121: 3120: 3116: 3080: 3079: 3075: 3065: 3064: 3060: 3030: 3029: 3025: 2995: 2994: 2990: 2962: 2961: 2954: 2918: 2917: 2908: 2901:10.1002/acp.767 2886: 2885: 2881: 2871: 2870: 2866: 2852: 2851: 2847: 2832: 2807: 2806: 2802: 2787: 2762: 2761: 2754: 2702: 2701: 2697: 2690: 2659: 2658: 2649: 2623: 2622: 2618: 2608: 2607: 2603: 2573: 2572: 2568: 2558: 2557: 2553: 2539: 2538: 2534: 2508: 2507: 2503: 2477: 2476: 2472: 2442: 2441: 2437: 2427: 2426: 2422: 2388: 2387: 2383: 2376: 2363: 2362: 2358: 2316: 2315: 2311: 2301: 2300: 2296: 2282: 2281: 2277: 2262: 2237: 2236: 2232: 2222: 2221: 2217: 2203: 2202: 2191: 2183: 2152: 2147: 2146: 2139: 2109: 2108: 2099: 2073: 2072: 2068: 2034: 2033: 2026: 2004: 2003: 1999: 1973: 1972: 1968: 1942: 1941: 1937: 1925: 1920: 1919: 1915: 1903: 1902: 1898: 1862: 1861: 1852: 1822: 1821: 1817: 1807: 1806: 1802: 1792: 1791: 1787: 1777: 1776: 1772: 1742: 1741: 1734: 1724: 1723: 1719: 1697: 1696: 1692: 1680: 1679: 1675: 1663: 1658: 1657: 1653: 1643: 1642: 1638: 1626: 1621: 1620: 1616: 1606: 1605: 1601: 1575: 1574: 1570: 1560: 1559: 1555: 1545: 1544: 1540: 1530: 1529: 1525: 1516: 1514: 1504: 1479: 1478: 1474: 1464: 1462: 1455: 1450: 1449: 1445: 1435: 1434: 1425: 1418: 1405: 1404: 1391: 1384: 1371: 1370: 1366: 1362: 1357: 1313: 1300: 1291:task management 1287:time management 1283: 1267: 1244: 1235: 1188:decision making 1184:problem solving 1166: 1118: 1054:hanging folders 965: 942:medical records 934: 908:In particular, 896: 887: 878: 857: 792: 780:quantified self 734: 648: 635: 603:number cruncher 580:Andries van Dam 540: 479: 421: 371: 352:quantified self 285: 276: 189: 178: 177: 176: 171: 160: 154: 151: 137:Please help by 136: 127: 123: 112: 101: 95: 92: 84:help improve it 81: 69: 65: 28: 24: 17: 12: 11: 5: 5399: 5397: 5389: 5388: 5383: 5378: 5368: 5367: 5361: 5360: 5358: 5357: 5348: 5343: 5338: 5332: 5330: 5324: 5323: 5321: 5320: 5315: 5307: 5302: 5297: 5292: 5287: 5282: 5277: 5272: 5267: 5262: 5256: 5254: 5250: 5249: 5247: 5246: 5241: 5236: 5231: 5223: 5218: 5213: 5208: 5203: 5198: 5192: 5190: 5186: 5185: 5182: 5180: 5179: 5172: 5165: 5157: 5151: 5150: 5131: 5126: 5106: 5098: 5095: 5094: 5093: 5087: 5082: 5077: 5072: 5067: 5061: 5048: 5045: 5043: 5042:External links 5040: 5039: 5038: 5013: 4996: 4979: 4962: 4951: 4948: 4947: 4946: 4935: 4924: 4913: 4906: 4893: 4892:Reviews of PIM 4890: 4888: 4885: 4883: 4882: 4865: 4834: 4798: 4783: 4753: 4738: 4708: 4673: 4638: 4631: 4605: 4586:(3): 413–424. 4570: 4555: 4527: 4520: 4502: 4487: 4448: 4433: 4403: 4392:(4): 171–212. 4372: 4355: 4342:(2): 235–246. 4322: 4287: 4271: 4236: 4221: 4191: 4176: 4161: 4131: 4113: 4074: 4059: 4023: 4008: 3977: 3942: 3903: 3864: 3849: 3814: 3799: 3780:(5): 695–707. 3764: 3749: 3734: 3715: 3690: 3672: 3654: 3627: 3618:D-Lib Magazine 3608: 3599:D-Lib Magazine 3589: 3562: 3547: 3504: 3489: 3459: 3444: 3409: 3373: 3338: 3323: 3288: 3273: 3232: 3205: 3190: 3171:(2): 133–161. 3155: 3134:(2): 140–170. 3114: 3073: 3058: 3023: 3004:(2): 150–170. 2988: 2952: 2931:(1): 391–402. 2906: 2879: 2864: 2845: 2830: 2800: 2785: 2752: 2695: 2688: 2647: 2616: 2601: 2582:(2): 150–170. 2566: 2551: 2532: 2501: 2470: 2451:(5): 407–424. 2435: 2420: 2381: 2374: 2356: 2309: 2294: 2275: 2260: 2230: 2215: 2189: 2137: 2097: 2086:(2): 307–317. 2066: 2024: 2013:(9): 657–668. 1997: 1966: 1955:(2): 191–228. 1935: 1913: 1896: 1850: 1815: 1800: 1785: 1770: 1732: 1717: 1706:(2): 121–125. 1690: 1673: 1651: 1636: 1614: 1599: 1568: 1553: 1538: 1523: 1502: 1472: 1443: 1423: 1416: 1389: 1382: 1363: 1361: 1358: 1356: 1355: 1350: 1345: 1340: 1335: 1330: 1325: 1320: 1314: 1312: 1309: 1299: 1296: 1282: 1279: 1266: 1263: 1243: 1240: 1234: 1231: 1201:categorization 1165: 1162: 1117: 1114: 1039: 1038: 1034: 1031: 982:digital divide 964: 961: 933: 930: 895: 892: 886: 883: 877: 874: 862:identity theft 856: 853: 811:and otherwise 791: 788: 733: 730: 717:primacy effect 647: 644: 634: 631: 572:Logic Theorist 560:solve problems 549:filing cabinet 539: 536: 478: 475: 466: 465: 461: 457: 446: 438: 437: 433: 420: 417: 416: 415: 412: 409: 406: 403: 370: 367: 366: 365: 355: 336: 325: 312: 301: 284: 281: 275: 272: 206:items such as 191: 190: 173: 172: 155:September 2023 130: 128: 121: 114: 113: 96:September 2023 72: 70: 63: 58: 32: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 5398: 5387: 5384: 5382: 5379: 5377: 5374: 5373: 5371: 5356: 5352: 5349: 5347: 5344: 5342: 5339: 5337: 5334: 5333: 5331: 5329: 5325: 5319: 5316: 5311: 5308: 5306: 5303: 5301: 5298: 5296: 5293: 5291: 5288: 5286: 5283: 5281: 5278: 5276: 5273: 5271: 5268: 5266: 5263: 5261: 5258: 5257: 5255: 5251: 5245: 5242: 5240: 5237: 5235: 5232: 5227: 5224: 5222: 5219: 5217: 5214: 5212: 5209: 5207: 5204: 5202: 5199: 5197: 5194: 5193: 5191: 5189:Client-Server 5187: 5178: 5173: 5171: 5166: 5164: 5159: 5158: 5155: 5140: 5136: 5132: 5130: 5127: 5115: 5111: 5107: 5104: 5101: 5100: 5096: 5091: 5088: 5086: 5083: 5081: 5078: 5076: 5073: 5071: 5068: 5065: 5062: 5059: 5055: 5051: 5050: 5046: 5041: 5036: 5032: 5028: 5024: 5020: 5019: 5014: 5011: 5007: 5003: 5002: 4997: 4994: 4990: 4986: 4985: 4980: 4977: 4973: 4969: 4968: 4963: 4960: 4959: 4954: 4953: 4949: 4944: 4940: 4936: 4933: 4929: 4925: 4922: 4918: 4914: 4911: 4907: 4904: 4900: 4896: 4895: 4891: 4886: 4878: 4877: 4869: 4866: 4861: 4857: 4853: 4849: 4845: 4838: 4835: 4829: 4824: 4820: 4816: 4812: 4805: 4803: 4799: 4794: 4790: 4786: 4780: 4776: 4772: 4768: 4764: 4757: 4754: 4749: 4745: 4741: 4735: 4731: 4727: 4723: 4719: 4712: 4709: 4704: 4700: 4696: 4692: 4688: 4684: 4677: 4674: 4669: 4665: 4661: 4657: 4653: 4649: 4642: 4639: 4634: 4628: 4624: 4620: 4616: 4609: 4606: 4601: 4597: 4593: 4589: 4585: 4581: 4574: 4571: 4566: 4562: 4558: 4556:0-89791-575-5 4552: 4548: 4544: 4540: 4539: 4531: 4528: 4523: 4517: 4513: 4506: 4503: 4498: 4491: 4488: 4483: 4479: 4475: 4471: 4467: 4463: 4459: 4452: 4449: 4444: 4440: 4436: 4430: 4426: 4422: 4418: 4414: 4407: 4404: 4399: 4395: 4391: 4387: 4383: 4376: 4373: 4368: 4367: 4359: 4356: 4350: 4345: 4341: 4337: 4333: 4326: 4323: 4318: 4314: 4310: 4306: 4302: 4298: 4291: 4288: 4283: 4275: 4272: 4267: 4263: 4259: 4255: 4251: 4247: 4240: 4237: 4232: 4228: 4224: 4218: 4214: 4210: 4206: 4202: 4195: 4192: 4187: 4180: 4177: 4172: 4168: 4164: 4158: 4154: 4150: 4146: 4142: 4135: 4132: 4127: 4123: 4117: 4114: 4109: 4105: 4101: 4097: 4093: 4089: 4085: 4078: 4075: 4070: 4066: 4062: 4056: 4052: 4048: 4043: 4038: 4034: 4027: 4024: 4019: 4015: 4011: 4005: 4001: 3997: 3990: 3989: 3981: 3978: 3973: 3969: 3965: 3961: 3957: 3953: 3946: 3943: 3938: 3934: 3930: 3926: 3922: 3918: 3914: 3907: 3904: 3899: 3895: 3891: 3887: 3883: 3879: 3875: 3868: 3865: 3860: 3853: 3850: 3845: 3841: 3837: 3833: 3829: 3825: 3818: 3815: 3810: 3803: 3800: 3795: 3791: 3787: 3783: 3779: 3775: 3768: 3765: 3760: 3753: 3750: 3745: 3738: 3735: 3730: 3726: 3719: 3716: 3710: 3705: 3701: 3694: 3691: 3686: 3683: 3676: 3673: 3668: 3661: 3659: 3655: 3650: 3646: 3642: 3638: 3631: 3628: 3623: 3619: 3612: 3609: 3604: 3600: 3593: 3590: 3584: 3579: 3575: 3574: 3566: 3563: 3558: 3551: 3548: 3543: 3539: 3535: 3531: 3526: 3521: 3517: 3516: 3508: 3505: 3500: 3496: 3492: 3486: 3482: 3478: 3474: 3470: 3463: 3460: 3455: 3448: 3445: 3440: 3436: 3432: 3428: 3424: 3420: 3413: 3410: 3405: 3401: 3397: 3393: 3389: 3382: 3380: 3378: 3374: 3369: 3365: 3361: 3357: 3353: 3349: 3342: 3339: 3334: 3327: 3324: 3319: 3315: 3311: 3307: 3303: 3299: 3292: 3289: 3284: 3277: 3274: 3269: 3265: 3260: 3255: 3251: 3247: 3243: 3236: 3233: 3228: 3224: 3220: 3216: 3209: 3206: 3201: 3194: 3191: 3186: 3182: 3178: 3174: 3170: 3166: 3159: 3156: 3151: 3147: 3142: 3137: 3133: 3129: 3125: 3118: 3115: 3110: 3106: 3101: 3096: 3092: 3088: 3084: 3077: 3074: 3069: 3062: 3059: 3054: 3050: 3046: 3042: 3038: 3034: 3027: 3024: 3019: 3015: 3011: 3007: 3003: 2999: 2992: 2989: 2983: 2978: 2974: 2970: 2966: 2959: 2957: 2953: 2948: 2944: 2939: 2934: 2930: 2926: 2922: 2915: 2913: 2911: 2907: 2902: 2898: 2894: 2890: 2883: 2880: 2875: 2868: 2865: 2860: 2856: 2849: 2846: 2841: 2837: 2833: 2827: 2823: 2819: 2815: 2811: 2804: 2801: 2796: 2792: 2788: 2782: 2778: 2774: 2770: 2766: 2759: 2757: 2753: 2748: 2744: 2739: 2734: 2730: 2726: 2722: 2718: 2714: 2710: 2706: 2699: 2696: 2691: 2685: 2681: 2677: 2672: 2671:10.9776/14136 2667: 2663: 2656: 2654: 2652: 2648: 2643: 2639: 2635: 2631: 2627: 2620: 2617: 2612: 2605: 2602: 2597: 2593: 2589: 2585: 2581: 2577: 2570: 2567: 2562: 2555: 2552: 2547: 2543: 2536: 2533: 2528: 2524: 2520: 2516: 2512: 2505: 2502: 2497: 2493: 2489: 2485: 2481: 2474: 2471: 2466: 2462: 2458: 2454: 2450: 2446: 2445:Online Review 2439: 2436: 2431: 2424: 2421: 2416: 2412: 2408: 2404: 2400: 2396: 2392: 2385: 2382: 2377: 2371: 2367: 2360: 2357: 2351: 2346: 2342: 2338: 2333: 2328: 2324: 2320: 2313: 2310: 2305: 2298: 2295: 2290: 2286: 2279: 2276: 2271: 2267: 2263: 2257: 2253: 2249: 2245: 2241: 2234: 2231: 2226: 2219: 2216: 2211: 2207: 2200: 2198: 2196: 2194: 2190: 2182: 2178: 2174: 2170: 2166: 2162: 2158: 2151: 2144: 2142: 2138: 2133: 2129: 2125: 2121: 2117: 2113: 2106: 2104: 2102: 2098: 2093: 2089: 2085: 2081: 2077: 2070: 2067: 2062: 2058: 2054: 2050: 2046: 2042: 2038: 2031: 2029: 2025: 2020: 2016: 2012: 2008: 2001: 1998: 1993: 1989: 1985: 1981: 1977: 1970: 1967: 1962: 1958: 1954: 1950: 1946: 1939: 1936: 1931: 1924: 1917: 1914: 1909: 1908: 1900: 1897: 1892: 1888: 1883: 1878: 1875:(1): 99–112. 1874: 1870: 1866: 1859: 1857: 1855: 1851: 1846: 1842: 1838: 1834: 1831:(3): 97–104. 1830: 1826: 1819: 1816: 1811: 1808:Cole (1982). 1804: 1801: 1796: 1789: 1786: 1781: 1774: 1771: 1766: 1762: 1758: 1754: 1750: 1746: 1739: 1737: 1733: 1728: 1721: 1718: 1713: 1709: 1705: 1701: 1694: 1691: 1686: 1685: 1677: 1674: 1669: 1662: 1655: 1652: 1647: 1640: 1637: 1632: 1625: 1618: 1615: 1610: 1603: 1600: 1595: 1591: 1587: 1583: 1579: 1572: 1569: 1564: 1557: 1554: 1549: 1542: 1539: 1534: 1527: 1524: 1513: 1509: 1505: 1503:1-59593-372-7 1499: 1495: 1491: 1487: 1483: 1476: 1473: 1461: 1454: 1447: 1444: 1439: 1432: 1430: 1428: 1424: 1419: 1413: 1409: 1402: 1400: 1398: 1396: 1394: 1390: 1385: 1379: 1375: 1368: 1365: 1359: 1354: 1351: 1349: 1346: 1344: 1341: 1339: 1338:Personal wiki 1336: 1334: 1331: 1329: 1326: 1324: 1321: 1319: 1316: 1315: 1310: 1308: 1306: 1297: 1295: 1292: 1288: 1280: 1278: 1276: 1271: 1264: 1262: 1258: 1254: 1252: 1248: 1241: 1239: 1232: 1230: 1228: 1224: 1220: 1215: 1213: 1208: 1206: 1202: 1197: 1193: 1189: 1185: 1180: 1178: 1174: 1170: 1163: 1161: 1159: 1155: 1151: 1147: 1143: 1139: 1135: 1131: 1127: 1123: 1115: 1113: 1111: 1107: 1102: 1100: 1095: 1092: 1088: 1084: 1079: 1073: 1071: 1067: 1063: 1059: 1055: 1051: 1046: 1044: 1035: 1032: 1029: 1026: 1025: 1024: 1020: 1018: 1014: 1008: 1006: 1001: 999: 993: 989: 987: 983: 978: 974: 969: 962: 960: 958: 954: 949: 947: 943: 939: 931: 929: 925: 923: 917: 913: 911: 906: 904: 900: 893: 891: 884: 882: 875: 873: 871: 867: 863: 854: 852: 849: 844: 841: 835: 833: 829: 824: 820: 816: 814: 810: 804: 800: 796: 789: 787: 785: 781: 776: 773: 767: 766:information. 763: 759: 755: 751: 748: 742: 738: 731: 729: 725: 722: 718: 713: 709: 705: 702: 699: 694: 692: 687: 685: 681: 676: 672: 668: 665: 661: 657: 652: 645: 643: 641: 632: 630: 628: 623: 619: 616: 612: 608: 604: 599: 597: 596:Ulric Neisser 593: 589: 585: 581: 575: 573: 569: 565: 561: 557: 552: 550: 545: 537: 535: 531: 527: 523: 521: 517: 513: 509: 505: 504:text messages 501: 497: 493: 489: 485: 476: 474: 470: 462: 458: 455: 451: 447: 443: 442: 441: 434: 430: 429: 428: 425: 418: 413: 410: 407: 404: 401: 400: 399: 397: 393: 389: 385: 381: 377: 368: 363: 359: 356: 353: 349: 345: 341: 337: 334: 330: 326: 322: 318: 313: 310: 306: 305:personal data 302: 299: 295: 290: 289: 288: 282: 280: 273: 271: 269: 264: 259: 257: 253: 249: 245: 241: 235: 233: 227: 225: 221: 217: 213: 209: 205: 204:informational 201: 197: 187: 184: 169: 166: 158: 148: 144: 140: 134: 131:This article 129: 120: 119: 110: 107: 99: 89: 85: 79: 78: 73:This article 71: 62: 61: 56: 54: 47: 46: 41: 40: 35: 30: 21: 20: 5275:Group-Office 5142:. Retrieved 5138: 5118:. Retrieved 5113: 5017: 5000: 4983: 4966: 4957: 4950:Books on PIM 4942: 4931: 4920: 4902: 4875: 4868: 4843: 4837: 4818: 4815:First Monday 4814: 4766: 4756: 4721: 4711: 4686: 4682: 4676: 4651: 4647: 4641: 4614: 4608: 4583: 4579: 4573: 4537: 4530: 4511: 4505: 4496: 4490: 4468:(1): 74–75. 4465: 4461: 4451: 4416: 4406: 4389: 4385: 4375: 4365: 4358: 4339: 4335: 4325: 4300: 4290: 4281: 4274: 4249: 4245: 4239: 4204: 4194: 4185: 4179: 4144: 4134: 4125: 4116: 4091: 4087: 4077: 4032: 4026: 3987: 3980: 3958:(4): 1–203. 3955: 3951: 3945: 3920: 3916: 3906: 3884:(1): 51–55. 3881: 3877: 3867: 3858: 3852: 3827: 3823: 3817: 3808: 3802: 3777: 3773: 3767: 3758: 3752: 3743: 3737: 3728: 3718: 3699: 3693: 3684: 3675: 3666: 3640: 3636: 3630: 3621: 3617: 3611: 3602: 3598: 3592: 3572: 3565: 3556: 3550: 3514: 3507: 3472: 3462: 3453: 3447: 3422: 3418: 3412: 3387: 3354:(5): 70–77. 3351: 3347: 3341: 3332: 3326: 3301: 3297: 3291: 3282: 3276: 3249: 3245: 3235: 3218: 3214: 3208: 3199: 3193: 3168: 3164: 3158: 3131: 3127: 3117: 3093:(1): 42–63. 3090: 3086: 3076: 3067: 3061: 3039:(1): 55–66. 3036: 3032: 3026: 3001: 2997: 2991: 2972: 2969:First Monday 2968: 2928: 2924: 2895:(7): S1–S9. 2892: 2888: 2882: 2873: 2867: 2858: 2854: 2848: 2813: 2803: 2768: 2715:(5): 14719. 2712: 2708: 2698: 2661: 2625: 2619: 2610: 2604: 2579: 2575: 2569: 2560: 2554: 2545: 2541: 2535: 2510: 2504: 2479: 2473: 2448: 2444: 2438: 2429: 2423: 2398: 2394: 2384: 2365: 2359: 2322: 2318: 2312: 2303: 2297: 2288: 2278: 2243: 2233: 2224: 2218: 2209: 2181:the original 2160: 2156: 2115: 2111: 2083: 2079: 2069: 2047:(3): 39–43. 2044: 2040: 2010: 2006: 2000: 1983: 1979: 1969: 1952: 1948: 1938: 1929: 1916: 1906: 1899: 1872: 1868: 1828: 1824: 1818: 1809: 1803: 1794: 1788: 1779: 1773: 1751:(1): 55–66. 1748: 1744: 1726: 1720: 1703: 1699: 1693: 1683: 1676: 1667: 1654: 1645: 1639: 1630: 1617: 1608: 1602: 1585: 1581: 1571: 1562: 1556: 1547: 1541: 1532: 1526: 1515:. Retrieved 1485: 1475: 1463:. Retrieved 1459: 1446: 1437: 1407: 1373: 1367: 1323:Desktop wiki 1301: 1294:management. 1284: 1272: 1268: 1259: 1255: 1245: 1236: 1216: 1209: 1181: 1167: 1119: 1103: 1096: 1091:file manager 1074: 1058:Web browsers 1050:sticky notes 1047: 1040: 1037:permission). 1021: 1009: 1004: 1002: 994: 990: 977:file manager 970: 966: 950: 935: 926: 918: 914: 907: 897: 888: 879: 858: 845: 836: 832:exploitation 831: 825: 821: 817: 805: 801: 797: 793: 777: 768: 764: 760: 756: 752: 743: 739: 735: 726: 720: 714: 710: 706: 703: 697: 695: 690: 688: 683: 679: 677: 673: 669: 653: 649: 636: 624: 620: 600: 582:and others, 576: 553: 541: 532: 528: 524: 496:social media 480: 471: 467: 439: 426: 422: 395: 391: 388:Greek letter 383: 372: 286: 277: 260: 256:Google Drive 236: 228: 199: 195: 194: 179: 161: 152: 139:spinning off 132: 102: 93: 74: 50: 43: 37: 36:Please help 33: 5054:Gwizdka, J. 4821:(9): 1–19. 4654:(4): 1–40. 4462:Commun. ACM 4122:Gwizdka, J. 3643:(1): 1–62. 3348:Commun. ACM 2401:(1): 1–62. 2325:: 453–504. 2118:(4): 1–24. 1005:guided tour 957:mobile apps 899:Personality 436:importance. 348:Apple Watch 324:experience. 240:file system 5370:Categories 5300:OnlyOffice 5270:eGroupWare 4042:2109.15272 3252:(1): 1–8. 3033:Appl Ergon 2861:: 219–233. 2680:2142/47300 2332:2107.03291 2285:J. Gwizdka 1986:: 97–126. 1745:Appl Ergon 1517:2016-02-15 1360:References 1085:and other 1078:interfaces 584:Ted Nelson 492:blog posts 460:maintain?" 333:blog posts 143:relocating 39:improve it 5355:Lightning 5336:Evolution 5295:Nextcloud 5253:Web-based 5035:228148374 4600:225784398 4266:182222576 4231:140321772 4108:224941989 4069:218482929 3937:182222576 3844:224941989 3794:254085306 3685:InfoWorld 3583:0704.3647 3525:0704.3653 3318:182222576 3018:207599970 2596:207599970 2415:1550-8382 2350:1773/2155 2061:195708386 1825:J Inf Sci 1582:Oper. Res 809:backed up 684:recognize 588:hypertext 520:Instagram 212:web pages 208:documents 45:talk page 5318:Tine 2.0 4668:18610395 4482:42742830 4443:26469813 4317:20620726 4171:19476168 3972:37905858 3898:23102409 3542:26208156 3439:27489742 3404:14941411 3268:12351089 3185:14404241 3109:16201222 3053:15676648 2947:13065914 2747:26423226 2642:17397970 2465:59771305 2270:17397970 2177:10335290 2132:18059074 1845:34872997 1765:15676648 1588:: 1–10. 1512:15957066 1311:See also 840:GrayArea 691:Remember 633:Research 512:Snapchat 500:Facebook 486:such as 454:Facebook 358:Relevant 274:Overview 5341:Kontact 5260:Citadel 5211:DAViCal 5206:Citadel 5144:May 11, 5120:May 11, 4793:8949187 4748:7455033 4703:8424781 4565:8800247 4018:5737503 3624:(3): 3. 3605:(3): 2. 3499:5151553 3368:6479245 3150:1147594 2840:8362131 2795:1724894 2738:4589681 2717:Bibcode 2496:1180143 1891:1486850 1700:Am. Doc 1140:(LIS), 1136:(HII), 1132:(HCI), 1083:Dropbox 1028:Surveys 922:Keeping 813:secured 732:Keeping 558:and to 508:Twitter 488:Dropbox 432:events. 346:or the 340:lifelog 309:privacy 248:Dropbox 246:(e.g., 82:Please 5244:Zimbra 5239:Zarafa 5234:Scalix 5221:Kopano 5201:Bynari 5033:  5025:  4860:537625 4858:  4791:  4781:  4746:  4736:  4701:  4666:  4629:  4598:  4563:  4553:  4518:  4480:  4441:  4431:  4315:  4264:  4229:  4219:  4169:  4159:  4106:  4067:  4057:  4016:  4006:  3970:  3935:  3896:  3842:  3792:  3540:  3497:  3487:  3437:  3402:  3366:  3316:  3266:  3183:  3148:  3107:  3051:  3016:  2945:  2838:  2828:  2793:  2783:  2745:  2735:  2686:  2640:  2594:  2527:512268 2525:  2494:  2463:  2413:  2372:  2268:  2258:  2175:  2130:  2059:  1889:  1843:  1763:  1510:  1500:  1465:17 May 1414:  1380:  1225:, and 1156:, and 1144:(AI), 1052:" and 866:ransom 698:repeat 680:recall 662:, and 564:Newell 518:, and 516:Reddit 344:Fitbit 214:, and 5285:Kolab 5280:Horde 5216:Kolab 5196:Bongo 4930:. In 4856:S2CID 4789:S2CID 4744:S2CID 4699:S2CID 4664:S2CID 4596:S2CID 4561:S2CID 4478:S2CID 4439:S2CID 4313:S2CID 4262:S2CID 4227:S2CID 4167:S2CID 4104:S2CID 4065:S2CID 4037:arXiv 4014:S2CID 3992:(PDF) 3968:S2CID 3933:S2CID 3894:S2CID 3840:S2CID 3790:S2CID 3578:arXiv 3538:S2CID 3520:arXiv 3495:S2CID 3435:S2CID 3400:S2CID 3364:S2CID 3314:S2CID 3264:S2CID 3181:S2CID 3146:S2CID 3105:S2CID 3014:S2CID 2975:(3). 2943:S2CID 2836:S2CID 2791:S2CID 2638:S2CID 2592:S2CID 2523:S2CID 2492:S2CID 2461:S2CID 2327:arXiv 2266:S2CID 2184:(PDF) 2173:S2CID 2153:(PDF) 2128:S2CID 2057:S2CID 1926:(PDF) 1887:S2CID 1841:S2CID 1664:(PDF) 1627:(PDF) 1508:S2CID 1456:(PDF) 1285:Both 848:Planz 568:Simon 216:email 5310:SOGo 5226:SOGo 5146:2020 5122:2020 5031:OCLC 5023:ISBN 4934:(1). 4779:ISBN 4734:ISBN 4627:ISBN 4551:ISBN 4516:ISBN 4429:ISBN 4217:ISBN 4157:ISBN 4055:ISBN 4004:ISBN 3485:ISBN 3049:PMID 2826:ISBN 2781:ISBN 2743:PMID 2684:ISBN 2548:(1). 2411:ISSN 2370:ISBN 2256:ISBN 1761:PMID 1498:ISBN 1467:2021 1412:ISBN 1378:ISBN 1289:and 1203:and 1186:and 1064:and 903:mood 901:and 846:The 682:and 566:and 544:oral 494:and 378:and 5006:doi 4989:doi 4972:doi 4848:doi 4823:doi 4771:doi 4726:doi 4691:doi 4656:doi 4619:doi 4588:doi 4543:doi 4470:doi 4421:doi 4394:doi 4344:doi 4305:doi 4254:doi 4209:doi 4149:doi 4096:doi 4092:144 4047:doi 3996:doi 3960:doi 3925:doi 3886:doi 3832:doi 3828:144 3782:doi 3704:doi 3645:doi 3530:doi 3477:doi 3427:doi 3392:doi 3356:doi 3306:doi 3254:doi 3223:doi 3173:doi 3136:doi 3095:doi 3041:doi 3006:doi 2977:doi 2933:doi 2897:doi 2818:doi 2773:doi 2733:PMC 2725:doi 2676:hdl 2666:doi 2630:doi 2584:doi 2515:doi 2484:doi 2453:doi 2403:doi 2345:hdl 2337:doi 2248:doi 2165:doi 2120:doi 2088:doi 2049:doi 2015:doi 1988:doi 1957:doi 1877:doi 1833:doi 1753:doi 1708:doi 1590:doi 1490:doi 1179:). 1068:to 502:), 490:), 200:PIM 141:or 5372:: 5353:/ 5137:. 5112:. 5029:. 4941:. 4854:. 4819:15 4817:. 4813:. 4801:^ 4787:. 4777:. 4765:. 4742:. 4732:. 4720:. 4697:. 4687:65 4685:. 4662:. 4652:26 4650:. 4625:. 4617:. 4594:. 4584:30 4582:. 4559:. 4549:. 4476:. 4466:49 4464:. 4460:. 4437:. 4427:. 4415:. 4388:. 4384:. 4340:59 4338:. 4334:. 4311:. 4299:. 4260:. 4250:70 4248:. 4225:. 4215:. 4203:. 4165:. 4155:. 4143:. 4102:. 4090:. 4086:. 4063:. 4053:. 4045:. 4012:. 4002:. 3966:. 3954:. 3931:. 3921:70 3919:. 3915:. 3892:. 3882:49 3880:. 3876:. 3838:. 3826:. 3788:. 3778:24 3776:. 3727:. 3657:^ 3641:45 3639:. 3622:14 3620:. 3603:14 3601:. 3536:. 3528:. 3493:. 3483:. 3471:. 3433:. 3423:65 3421:. 3398:. 3376:^ 3362:. 3352:53 3350:. 3312:. 3302:70 3300:. 3262:. 3250:50 3248:. 3244:. 3219:64 3217:. 3179:. 3167:. 3144:. 3132:18 3130:. 3126:. 3103:. 3089:. 3085:. 3047:. 3037:19 3035:. 3012:. 3000:. 2971:. 2967:. 2955:^ 2941:. 2929:39 2927:. 2923:. 2909:^ 2893:14 2891:. 2857:. 2834:. 2824:. 2812:. 2789:. 2779:. 2767:. 2755:^ 2741:. 2731:. 2723:. 2711:. 2707:. 2682:. 2674:. 2664:. 2650:^ 2636:. 2590:. 2578:. 2546:10 2544:. 2521:. 2490:. 2459:. 2449:13 2447:. 2409:. 2399:45 2397:. 2393:. 2343:. 2335:. 2323:41 2321:. 2264:. 2254:. 2242:. 2208:. 2192:^ 2171:. 2161:61 2159:. 2155:. 2140:^ 2126:. 2116:26 2114:. 2100:^ 2084:59 2082:. 2078:. 2055:. 2045:27 2043:. 2039:. 2027:^ 2011:42 2009:. 1984:36 1982:. 1978:. 1953:25 1951:. 1947:. 1928:. 1885:. 1871:. 1867:. 1853:^ 1839:. 1829:12 1827:. 1759:. 1749:19 1747:. 1735:^ 1704:12 1702:. 1666:. 1629:. 1584:. 1580:. 1506:. 1496:. 1484:. 1458:. 1426:^ 1392:^ 1221:, 1160:. 1148:, 1128:, 1124:, 1072:. 1060:, 658:, 562:. 522:. 514:, 510:, 331:, 254:, 250:, 234:. 48:. 5176:e 5169:t 5162:v 5148:. 5124:. 5092:. 5066:. 5037:. 5012:. 5008:: 4995:. 4991:: 4978:. 4974:: 4862:. 4850:: 4831:. 4825:: 4795:. 4773:: 4750:. 4728:: 4705:. 4693:: 4670:. 4658:: 4635:. 4621:: 4602:. 4590:: 4567:. 4545:: 4524:. 4499:. 4484:. 4472:: 4445:. 4423:: 4400:. 4396:: 4390:4 4352:. 4346:: 4319:. 4307:: 4268:. 4256:: 4233:. 4211:: 4188:. 4173:. 4151:: 4110:. 4098:: 4071:. 4049:: 4039:: 4020:. 3998:: 3974:. 3962:: 3956:7 3939:. 3927:: 3900:. 3888:: 3846:. 3834:: 3796:. 3784:: 3712:. 3706:: 3687:. 3651:. 3647:: 3586:. 3580:: 3544:. 3532:: 3522:: 3501:. 3479:: 3441:. 3429:: 3406:. 3394:: 3370:. 3358:: 3320:. 3308:: 3270:. 3256:: 3229:. 3225:: 3187:. 3175:: 3169:6 3152:. 3138:: 3111:. 3097:: 3091:4 3055:. 3043:: 3020:. 3008:: 3002:8 2985:. 2979:: 2973:9 2949:. 2935:: 2903:. 2899:: 2859:1 2842:. 2820:: 2797:. 2775:: 2749:. 2727:: 2719:: 2713:5 2692:. 2678:: 2668:: 2644:. 2632:: 2598:. 2586:: 2580:8 2563:. 2529:. 2517:: 2498:. 2486:: 2467:. 2455:: 2417:. 2405:: 2378:. 2353:. 2347:: 2339:: 2329:: 2272:. 2250:: 2227:. 2167:: 2134:. 2122:: 2094:. 2090:: 2063:. 2051:: 2021:. 2017:: 1994:. 1990:: 1963:. 1959:: 1893:. 1879:: 1873:1 1847:. 1835:: 1767:. 1755:: 1714:. 1710:: 1596:. 1592:: 1586:6 1520:. 1492:: 1469:. 1420:. 1386:. 980:" 354:. 311:. 300:. 198:( 186:) 180:( 168:) 162:( 157:) 153:( 149:. 135:. 109:) 103:( 98:) 94:( 90:. 55:) 51:(

Index

improve it
talk page
Learn how and when to remove these messages
personal reflection, personal essay, or argumentative essay
help improve it
encyclopedic style
Learn how and when to remove this message
spinning off
relocating
Knowledge (XXG)'s inclusion policy
Learn how and when to remove this message
Learn how and when to remove this message
informational
documents
web pages
email
information management
Personal knowledge management
information overload
file system
file hosting service
Dropbox
Microsoft OneDrive
Google Drive
retrieve information
hierarchical file system
personal archiving
digital preservation
personal data
privacy

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑