Personal Information Management Research Papers (original) (raw)
Users tend to store huge amounts of files, of various formats, on their personal computers. As a result, finding a specific, desired file within the file system is a challenging task. This article addresses the desktop search problem by... more
Users tend to store huge amounts of files, of various formats, on their personal computers. As a result, finding a specific, desired file within the file system is a challenging task. This article addresses the desktop search problem by considering various techniques for ranking results of a search query over the file system. First, basic ranking techniques, which are based on various file features (e.g., file name, access date, file size, etc.), are considered and their effectiveness is empirically analyzed. Next, two learning-based ranking schemes are presented, and are shown to be significantly more effective than the basic ranking methods. Finally, a novel ranking technique, based on query selectiveness, is considered for use during the cold-start period of the system. This method is also shown to be empirically effective, even though it does not involve any learning.
As mobile devices grow in popularity and presents in everyday life, it’s often involved in digital crimes and investigation as well. But rapid evolution of new form of online communication known as social networking has become a medium... more
As mobile devices grow in popularity and presents in everyday life, it’s often involved in digital crimes and investigation as well. But rapid evolution of new form of online communication known as social networking has become a medium for real time activities which involve instant messaging and conversation or chatting, status, comment and share of information and ideals. A brief forensics analysis was done on some of the popular social media platform like Hi5 and Tagged. Activities on this platform were examined and how it’s potential for forensics investigation. This paper briefly discussed how relevant data would be gathering from the various activities/features used by the platform for crime investigation of suspects.
In the context of knowledge-driven economy and knowledge-intensive organizations one of most important information user communities appears to be “knowledge workers”. What is the information landscape in which knowledge workers operate... more
In the context of knowledge-driven economy and knowledge-intensive organizations one of most important information user communities appears to be “knowledge workers”. What is the information landscape in which knowledge workers operate and what is their personal and organizational information literacy (IL) landscape? What differentiates knowledge workers from other information users? Is IL enough for a knowledge worker or is the term “information fluency” or “knowledge literacy” more relevant in this case? This paper attempts to clarify relations between information literacy and knowledge literacy and answer the title question. Analyzed studies of workplace IL imply the need to broaden the basic definition of IL
This paper reconsiders the term Personal Information Management System PIMS and compares and contrasts it with the similar terms Individual Information System IIS as discussed by Richard Baskerville and User Generated Information System... more
This paper reconsiders the term Personal Information Management System PIMS and compares and contrasts it with the similar terms Individual Information System IIS as discussed by Richard Baskerville and User Generated Information System UGIS as introduced by Philip DesAutels. However, this paper contends (with Baskerville) that it is the personal work system constituted when a human user makes use of a PIMS which exhibits a systemic nature. The paper introduces specific research questions which relate to PIMS and demonstrates their emergence on the basis of reflection or reflexivity. It suggests as a potential contribution the theoretical and practical necessity for modelling a PIMS in order that the PIMS constructed using that model be maximally effective for the individual who uses it. That contention is the subject of ongoing research.
İnsan Kaynakları Yönetiminde icra edilen süreçlerden biri olan "Mülakat" sürecini işlediğim bu araştırmada bazı mülakat teknikleri hakkında bilgilere yer verdim. Araştırmada faydalanılan kaynaklar bu süreçlerde bizzat bulunmuş kişilerce... more
İnsan Kaynakları Yönetiminde icra edilen süreçlerden biri olan "Mülakat" sürecini işlediğim bu araştırmada bazı mülakat teknikleri hakkında bilgilere yer verdim. Araştırmada faydalanılan kaynaklar bu süreçlerde bizzat bulunmuş kişilerce katkı sağlanmış kaynaklardır.
The document and records management is one of the expanding disciplines and organisational functions in the area of information management. Since we live in digital era, where information is more and more available in electronic form, it... more
The document and records management is one of the expanding disciplines and organisational functions in the area of information management. Since we live in digital era, where information is more and more available in electronic form, it is a natural sequence of events that this expertise follows contemporary trends in information world, changing accordingly. It was a long journey from clay tablets to managing electronic records, but what is common in genesis of this profession is one essential requirement for good records management and that is not technology but skilled people...
ABSTRACT This present study aims to discover how “better” to manage personal information–both in what William Jones calls KFTF, keeping found things found (Jones 2007); and how “better” to get things done GTD (Allen 2003). Based on... more
ABSTRACT This present study aims to discover how “better” to manage personal information–both in what William Jones calls KFTF, keeping found things found (Jones 2007); and how “better” to get things done GTD (Allen 2003). Based on observation of various mechanisms used to support the personal knowledge management of knowledge workers, it identifies PIMS with the Individual Information Systems IIS of (Baskerville 2011) and the User Generated Information Systems UGIS of (DesAutels 2011).
The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the... more
The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the technological risks associated with them. We then explore strategies that can be adopted to address these risks, and explore emerging responses by governments for addressing AV risks. Our analyses reveal that, thus far, governments have in most instances avoided stringent measures in order to promote AV developments and the majority of responses are non-binding and focus on creating councils or working groups to better explore AV implications. The US has been active in introducing legislations to address issues related to privacy and cybersecurity. The UK and Germany, in particular, have enacted laws to address liability issues; other countries mostly acknowledge these issues, but have yet to implement specific strategies. To address privacy and cybersecurity risks strategies ranging from introduction or amendment of non-AV specific legislation to creating working groups have been adopted. Much less attention has been paid to issues such as environmental and employment risks, although a few governments have begun programmes to retrain workers who might be negatively affected.
Many of today's digital document formats are strongly based on a digital emulation of printed media. While such a paper simulation might be appropriate for the visualisation of certain digital content, it is generally not the most... more
Many of today's digital document formats are strongly based on a digital emulation of printed media. While such a paper simulation might be appropriate for the visualisation of certain digital content, it is generally not the most effective solution for digitally managing and storing information. The oversimplistic modelling of digital documents as monolithic blocks of linear content, with a lack of structural semantics, does not pay attention to some of the superior features that digital media offers in comparison to traditional paper documents. For example, existing digital document formats adopt the limitations of paper documents by unnecessarily replicating content via copy and paste operations, instead of digitally embedding and reusing parts of digital documents via structural references. We introduce a conceptual model for structural cross-media content composition and highlight how the proposed solution not only enables the reuse of content via structural relationships, but also supports dynamic and context-dependent document adaptation, structural content annotations as well as the integration of arbitrary non-textual media types. We further discuss solutions for the fluid navigation and cross-media content publishing based on the proposed structural cross-media content model.
Amidst rapid urban development, sustainable transportation solutions are required to meet the increasing demands for mobility whilst mitigating the potentially negative social, economic, and environmental impacts. This study analyses... more
Amidst rapid urban development, sustainable transportation solutions are required to meet the increasing demands for mobility whilst mitigating the potentially negative social, economic, and environmental impacts. This study analyses autonomous vehicles (AVs) as a potential transportation solution for smart and sustainable development. We identified privacy and cybersecurity risks of AVs as crucial to the development of smart and sustainable cities and examined the steps taken by governments around the world to address these risks. We highlight the literature that supports why AVs are essential for smart and sustainable development. We then identify the aspects of privacy and cybersecurity in AVs that are important for smart and sustainable development. Lastly, we review the efforts taken by the federal government in the US, the UK, China, Australia, Japan, Singapore, South Korea, Germany, France, and the EU, and by US state governments to address AV-related privacy and cybersecurity risks in-depth. Overall, the actions taken by governments to address privacy risks are mainly in the form of regulations or voluntary guidelines. To address cybersecurity risks, governments have mostly resorted to regulations that are not specific to AVs and are conducting research and fostering research collaborations with the private sector.
This lecture forms part of the 'Next Generation User Interfaces' course given at the Vrije Universiteit Brussel.
Seminar talk delivered at a seminar organised by infogroep.
Personal Information Management (PIM) refers to the practice and the study of how people acquire, organize, maintain, retrieve, archive and discard information for various reasons in physical and digital worlds. Many PIM tools are... more
Personal Information Management (PIM) refers to the practice and the study of how people acquire, organize, maintain, retrieve, archive and discard information for various reasons in physical and digital worlds. Many PIM tools are available for managing information on our desktop computers while many research prototypes have tried to augment or replace them. The development of these tools was based on knowledge drawn from the fields of psychology, human–computer interaction, information retrieval, knowledge management and research in the PIM field. Different metaphors and ways of organizing were introduced. However, the prevailing beliefs are that most of these prototypes were not extensively tested and that the radical design (not addressing real-world issues) and quick abandonment of prototypes prevented transfer to mainstream products. This paper looks at what has been developed and learnt, what has been transferred to mainstream applications, discusses the possible reasons behind these trends and challenges some parts of the above-mentioned beliefs.
Efficient personal information management (PIM) is a growing need for students who manage personal information on multiple digital devices and platforms. Low PIM skills result in stress and low PIM ability. Implementing programs for... more
Efficient personal information management (PIM) is a growing need for students who manage personal information on multiple digital devices and platforms. Low PIM skills result in stress and low PIM ability. Implementing programs for enhancing PIM literacy improve students' PIM practices. This study suggests defining students' PIM needs by examining their actual and ideal PIM behavior, and defining characteristics of gaps between actual and ideal behavior. Participants included 287 higher education Israeli students, responding to a PIM practices questionnaire. Findings indicated that students utilized a variety of PIM practices, while ideally desired to utilize even more practices. Gaps between actual and ideal usage of practices were significant for 90% of the practices. Findings suggest that students are unsatisfied with their PIM behavior. We offer a 3-principle PIM literacy program for higher education students to narrow the gaps and enhancing PIM skills.
ABSTRACT This paper reconsiders the term Personal Information Management System PIMS and compares and contrasts it with the similar terms Individual Information System IIS as discussed by Richard Baskerville and User Generated Information... more
ABSTRACT This paper reconsiders the term Personal Information Management System PIMS and compares and contrasts it with the similar terms Individual Information System IIS as discussed by Richard Baskerville and User Generated Information System UGIS as introduced by Philip DesAutels. However, this paper contends (with Baskerville) that it is the personal work system constituted when a human user makes use of a PIMS which exhibits a systemic nature.
Over the last decade, we have witnessed an emergence of Personal Information Management (PIM) solutions. Despite the fact that paper documents still form a significant part of our daily working activities, existing PIM systems usually... more
Over the last decade, we have witnessed an emergence of Personal Information Management (PIM) solutions. Despite the fact that paper documents still form a significant part of our daily working activities, existing PIM systems usually support the organisation and re-finding of digital documents only. While physical document tracking solutions such as RFID- or computer vision-based systems are recently gaining some attention, they usually focus on the paper document tracking and offer limited support for re-finding activities. We present PimVis, a solution for exploring and re-finding digital and paper documents in so-called cross-media information spaces. The PimVis user interface enables a unified organisation of digital and paper documents through the creation of bidirectional links between the digital and physical information space. The presented personal cross-media information management solution further supports the extension with alternative document tracking techniques as well as augmented reality solutions. A formative PimVis evaluation revealed the high potential of fully integrated cross-media PIM solutions.
- by Sandra Trullemans and +2
- •
- Information Systems, Engineering, Computer Science, Algorithms
Big data analytics is being used by many market participants to utilize personal data in their business applications. Personally Identifiable Information (PII) (e.g. age, race, social security number, address, etc.) plays a very important... more
Big data analytics is being used by many market participants to utilize personal data in their business applications. Personally Identifiable Information (PII) (e.g. age, race, social security number, address, etc.) plays a very important role in providing user-centric services. Many information technology companies collect, store and process PII of their customers by means of various mobile applications. This study explains how collective permission gathering through multiple Android applications by same publishers can disclose user's PII by using new PII risk factors. To evaluate the usefulness of the proposed risk factors, our study conducted experiments with 625 dangerous permissions listed by Android such as 'read location', 'read and write contacts', 'use camera', 'use microphone' etc. from 118 applications of top 2 Korean mobile application publishing companies, Kakao and Naver, with 7 subsidiary organizations. The data flow is graphically outlined and the critical statistical evidence is identified. Through experimental data analysis, it is evident that the proposed PII risk factors hold definite advantages over other risk factors which only consider single way of data leaking. The experimental results suggest that PII like Google ID, location, phone number and social graph are at pale if collective permission gathering through multiple Android application is not properly controlled.
Personal Knowledge and Information Management (PKIM) as an integrated approach of three concepts: Personal Knowledge Management (PKM), Personal Information Management (PIM) and Information Literacy (IL) is more appropriate and... more
Personal Knowledge and Information Management (PKIM) as an integrated approach of three concepts: Personal Knowledge Management (PKM), Personal Information Management (PIM) and Information Literacy (IL) is more appropriate and comprehensive approach to these issues with overlapping and supplementary areas of interests. The theoretical basis and results of the pioneering empirical studies in the PKIM field, carried out in an academic environment, are presented in this exploratory study. The development and validation of the PKIM scale, is characterised. An analysis of subject literature, discussions with experts, students and statistical methods were used in creation of the PKIM scale, which is an original instrument for measuring a self-assessment of knowledge and information skills of students. The PKIM self-assessment of Polish students of Information Science majors and related specializations was high, but not as high as was expected. Master's students reported higher level of PKIM self-assessment than Bachelor's students.
The segment of companies providing storage services and hardware for end users and small businesses has been growing in the past few years. Cloud storage, personal network-attached storage (NAS) and external hard drives are more... more
The segment of companies providing storage services and hardware for end users and small businesses has been growing in the past few years. Cloud storage, personal network-attached storage (NAS) and external hard drives are more affordable as ever before and one would think that backing up personal digital information is a straight forward process nowadays. Despite this, small group studies and corporate surveys show the opposite. In this paper we present the results from a quantitative and qualitative survey of 319 participants about how they backup their personal computers and restore personal information in case of computer failures. The results show that the majority of users do manual, selective and non-continuous backups, rely on a set of planned and unplanned backups (as a consequence of other activities), have inadequate knowledge about possible solutions and implications of using known solutions, etc. The study also revealed that around a fifth of all computers are not backed up, and a quarter of most important files and a third of most important folders at the time of the survey could not be (fully) restored in the event of computer failure. Based on results several implications for practice and research are presented.
The study explored how students manage personal information, in order to suggest principles for a training program that aims to enhance personal information management (PIM) literacy. We examined the digital platforms that students use to... more
The study explored how students manage personal information, in order to suggest principles for a training program that aims to enhance personal information management (PIM) literacy. We examined the digital platforms that students use to manage personal information, their practices for saving, managing and retrieving information items, and how these are related to gender and age. We found that the students' personal information space consists of three major platforms: laptop, mobile phone, and email account. We learned that students use various practices for managing their personal information spaces, the main ones related to useful retrieving of personal information items. We observed differences in the extent to which various students use each practice, and identified significant differences in the use of digital platforms and PIM practices between male and female students of different ages. Based on our findings, we offer principles for the implementation of a PIM literacy program that includes a reflective process on students' PIM practices, group discourse on PIM behavior, and exposure to varied information technologies that could improve students' ability to cope with PIM in learning tasks.
Personal Information Management (PIM) is a study on how people acquire, organize, maintain, retrieve, archive and discard information for various reasons and needs in physical and digital worlds. Many PIM tools are available for... more
Audio recordings and the corresponding transcripts are often used as prosthetic memory (PM) after meetings and lectures. While current research is mainly developing novel features for prosthetic memory, less is known on how and why audio... more
Audio recordings and the corresponding transcripts are often used as prosthetic memory (PM) after meetings and lectures. While current research is mainly developing novel features for prosthetic memory, less is known on how and why audio recordings and transcripts are used. We investigate how users interact with audio and transcripts as prosthetic memory, whether interaction strategies change over time, and analyse potential differences in accuracy and efficiency. In contrast to the subjective user perception, our results show that audio recordings and transcripts are equally efficient, but that transcripts are generally preferred due to their easily accessible contextual information. We further identified that prosthetic memory is not only used as a recall aid but frequently also consulted for verifying information that has been recalled from organic memory (OM). Our findings are summarised in a number of design implications for prosthetic memory solutions.
- by Payam Ebrahimi and +1
- •
- Information Systems, Engineering, Computer Science, Algorithms