SlideShare a Scribd company logo
Understanding the Evolution
of Usersā€™ Personal Information
    Management Practices

             Manas Tungare
       Advisor: Manuel PƩrez QuiƱones




Watch on your laptop: manas.tungare.name/now
Research Area Overview

Human Computer Interaction




        Personal
                              Multi-Platform
        Information
                             User Interfaces
        Management
Personal
Information
Management
Information In Many Forms




                            Jones 2002
Mind-boggling Amounts


   126     Email messages per day



 53364     Messages in personal archive



123997     Files in home directory

                      Anecdotal numbers; not real data.
Personal Information

                                   Information about a person
      Information kept for
                                kept by and under the control
         personal use.
                                           of others.
    E.g. ļ¬les, documents.
                                    E.g. health information.




   Information experienced by
                                   Information directed to a
  a person but outside her
                                           person.
            control.
                                        E.g. email, IM.
E.g. books, websites browsed.

                                                        Jones 2006
Information is Fragmented
     Across Collections




                          Boardman 2004
Current Research
        Kelly 2006
      Boardman 2004                                Whittaker 1996
                                                   Gwizdka 2002
                   All Collections
                                         Email

   Jones 2005
                 Folders



                 Documents
Boardman 2004                              Paper
  Bruce 2004
                                                    Malone 1983
                             Bookmarks


                           Abrams 1998
                                                                    Jones 2006
Information is Fragmented
       Across Devices




                            Tungare 2006
Research Questions
1. Using Multiple Devices for PIM

 ā€¢ How do devices affect information ļ¬‚ows?
 ā€¢ Inter-relationships between devices
  ā€¢ Formation of groups of devices
 ā€¢ Attaining equilibrium in the information
   ecosystem
 ā€¢ Custom strategies inļ¬‚uenced by devices
 ā€¢ Device failures
Expected ļ¬ndings

ā€¢ Hypothesis: The device is an important
  consideration, which, in addition to the
  speciļ¬c collection, affects PIM practices.
ā€¢ Finding(s): Exactly how a device (or group)
  affects PIM
ā€¢ E.g. why do people use their address book
  on their phone, but not on their computer?
2. Evolution of PIM Practices

ā€¢ Natural transitions in life
 ā€¢ High school to college
 ā€¢ Grad school to industry
ā€¢ Is there a pattern of stages in which
  information management practices change
  in response to these transitions?
ā€¢ How is equilibrium achieved?
Expected ļ¬ndings

ā€¢ Hypothesis: There is a pattern in which
  users develop strategies for PIM.
ā€¢ This pattern can be reiļ¬ed and made
  known to the next set of users who are
  going to make similar transitions.
ā€¢ Tool designers can take these patterns into
  account.
Methodology
Studying PIM

ā€¢ PIM is highly individualized & contextual
ā€¢ Tools are just the surface
 ā€¢ Deeper understanding needed
ā€¢ Approaches: browsing versus searchingTeevan 2004

ā€¢ Personalities: ļ¬lers versus pilers   Malone 1983
Study 1: PIM & Multiple Devices

 ā€¢ Survey + Interviews
 ā€¢ What activities do you perform on each
   device?
 ā€¢ What data do you keep on each device?
 ā€¢ What pairs of devices do you keep
   synchronized?
 ā€¢ What failures have you encountered?
Study 2: PIM over time

ā€¢ Longitudinal study of users across natural
  transitions in life
ā€¢ Recruited while still in ā€œpre-ā€ phase
 ā€¢ Graduating students moving to industry
 ā€¢ Undergrads continuing to grad school
ā€¢ Spot interviews, longer stories,
  observation, diary studies
  [Details are still being worked out.]
Expected Contributions
An understanding of ...


ā€¢ how PIM practices are inļ¬‚uenced by devices.
ā€¢ how PIM practices change over time.
ā€¢ how custom strategies develop.
ā€¢ what parameters affect the evolution of
  these practices, and in what way.
Signiļ¬cance

ā€¢ Implications from ļ¬ndings will inform the
  design of new tools & applications
ā€¢ New devices designed to integrate better
  into a userā€™s existing information
  environment
ā€¢ A clearer understanding of usersā€™
  frustration at the current state-of-the-art in
  multi-device PIM.
Summary
ā€¢ PIM is an interesting area in HCI where a
  deeper understanding of usersā€™ practices
  would beneļ¬t lots of users.
ā€¢ Open questions in PIM research include
  understanding how people use multiple
  devices for information management & how
  their strategies evolve over time.
ā€¢ (Hopefully,) my work will help answer these
  and design future devices and apps better.
Your feedback is appreciated!


                         ?
    ?
   manas.tungare.name/publications
        manas@tungare.name

More Related Content

Similar to Understanding the Evolution of Users' Personal Information Practices

Designing Reminders that Work
Designing Reminders that WorkDesigning Reminders that Work
Designing Reminders that Work
Maria Wolters
Ā 
Managing Confidential Information ā€“ Trends and Approaches
Managing Confidential Information ā€“ Trends and ApproachesManaging Confidential Information ā€“ Trends and Approaches
Managing Confidential Information ā€“ Trends and Approaches
Micah Altman
Ā 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
u3037519
Ā 
Research Methods for Mobile Messaging
Research Methods for Mobile MessagingResearch Methods for Mobile Messaging
Research Methods for Mobile Messaging
deaneckles
Ā 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Jason Hong
Ā 
Personal Information Management Systems - EDBT/ICDT'15 Tutorial
Personal Information Management Systems - EDBT/ICDT'15 TutorialPersonal Information Management Systems - EDBT/ICDT'15 Tutorial
Personal Information Management Systems - EDBT/ICDT'15 Tutorial
AmƩlie Marian
Ā 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
Pew Research Center's Internet & American Life Project
Ā 
ASTER results at 2009 DIA
ASTER results at 2009 DIAASTER results at 2009 DIA
ASTER results at 2009 DIA
Michael Ibara
Ā 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
Micah Altman
Ā 
Best Practices for Managing Your Data
Best Practices for Managing Your DataBest Practices for Managing Your Data
Best Practices for Managing Your Data
Elaine Martin
Ā 
Social Media, Medicine and Health Literacy: Chronic Disease Prevention
Social Media, Medicine and Health Literacy: Chronic Disease PreventionSocial Media, Medicine and Health Literacy: Chronic Disease Prevention
Social Media, Medicine and Health Literacy: Chronic Disease Prevention
Cameron Norman
Ā 
New Media Consumption: What You Need To Know
New Media Consumption: What You Need To KnowNew Media Consumption: What You Need To Know
New Media Consumption: What You Need To Knowjdavis76
Ā 
Advanced Essay Writing In English - IELTS Writing - H
Advanced Essay Writing In English - IELTS Writing - HAdvanced Essay Writing In English - IELTS Writing - H
Advanced Essay Writing In English - IELTS Writing - H
Regina Louisianaspc
Ā 
Personal Information Ecosystems: Design Concerns for Net-Enabled Devices
Personal Information Ecosystems: Design Concerns for Net-Enabled DevicesPersonal Information Ecosystems: Design Concerns for Net-Enabled Devices
Personal Information Ecosystems: Design Concerns for Net-Enabled Devices
Manuel A. Perez-Quinones
Ā 
Hci encyclopedia irshortefords
Hci encyclopedia irshortefordsHci encyclopedia irshortefords
Hci encyclopedia irshortefordsapollobgslibrary
Ā 
Hci encyclopedia irshortefords
Hci encyclopedia irshortefordsHci encyclopedia irshortefords
Hci encyclopedia irshortefordsapollobgslibrary
Ā 
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataThe Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
MarkLogic Corporation
Ā 
Information Literacy
Information LiteracyInformation Literacy
Information Literacy
johannabishop
Ā 
The impact of information in society
The impact of information in society The impact of information in society
The impact of information in society
Abrar Almjaly
Ā 
Dean R Berry Decision Making: Information Overload
Dean R Berry Decision Making: Information OverloadDean R Berry Decision Making: Information Overload
Dean R Berry Decision Making: Information Overload
Riverside County Office of Education
Ā 

Similar to Understanding the Evolution of Users' Personal Information Practices (20)

Designing Reminders that Work
Designing Reminders that WorkDesigning Reminders that Work
Designing Reminders that Work
Ā 
Managing Confidential Information ā€“ Trends and Approaches
Managing Confidential Information ā€“ Trends and ApproachesManaging Confidential Information ā€“ Trends and Approaches
Managing Confidential Information ā€“ Trends and Approaches
Ā 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
Ā 
Research Methods for Mobile Messaging
Research Methods for Mobile MessagingResearch Methods for Mobile Messaging
Research Methods for Mobile Messaging
Ā 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Ā 
Personal Information Management Systems - EDBT/ICDT'15 Tutorial
Personal Information Management Systems - EDBT/ICDT'15 TutorialPersonal Information Management Systems - EDBT/ICDT'15 Tutorial
Personal Information Management Systems - EDBT/ICDT'15 Tutorial
Ā 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
Ā 
ASTER results at 2009 DIA
ASTER results at 2009 DIAASTER results at 2009 DIA
ASTER results at 2009 DIA
Ā 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
Ā 
Best Practices for Managing Your Data
Best Practices for Managing Your DataBest Practices for Managing Your Data
Best Practices for Managing Your Data
Ā 
Social Media, Medicine and Health Literacy: Chronic Disease Prevention
Social Media, Medicine and Health Literacy: Chronic Disease PreventionSocial Media, Medicine and Health Literacy: Chronic Disease Prevention
Social Media, Medicine and Health Literacy: Chronic Disease Prevention
Ā 
New Media Consumption: What You Need To Know
New Media Consumption: What You Need To KnowNew Media Consumption: What You Need To Know
New Media Consumption: What You Need To Know
Ā 
Advanced Essay Writing In English - IELTS Writing - H
Advanced Essay Writing In English - IELTS Writing - HAdvanced Essay Writing In English - IELTS Writing - H
Advanced Essay Writing In English - IELTS Writing - H
Ā 
Personal Information Ecosystems: Design Concerns for Net-Enabled Devices
Personal Information Ecosystems: Design Concerns for Net-Enabled DevicesPersonal Information Ecosystems: Design Concerns for Net-Enabled Devices
Personal Information Ecosystems: Design Concerns for Net-Enabled Devices
Ā 
Hci encyclopedia irshortefords
Hci encyclopedia irshortefordsHci encyclopedia irshortefords
Hci encyclopedia irshortefords
Ā 
Hci encyclopedia irshortefords
Hci encyclopedia irshortefordsHci encyclopedia irshortefords
Hci encyclopedia irshortefords
Ā 
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataThe Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
Ā 
Information Literacy
Information LiteracyInformation Literacy
Information Literacy
Ā 
The impact of information in society
The impact of information in society The impact of information in society
The impact of information in society
Ā 
Dean R Berry Decision Making: Information Overload
Dean R Berry Decision Making: Information OverloadDean R Berry Decision Making: Information Overload
Dean R Berry Decision Making: Information Overload
Ā 

More from Manas Tungare

Mental Workload at Transitions between Multiple Devices in Personal Informati...
Mental Workload at Transitions between Multiple Devices in Personal Informati...Mental Workload at Transitions between Multiple Devices in Personal Informati...
Mental Workload at Transitions between Multiple Devices in Personal Informati...
Manas Tungare
Ā 
My Research Defense
My Research DefenseMy Research Defense
My Research DefenseManas Tungare
Ā 
Research Internships Panel at Virginia Tech 2008
Research Internships Panel at Virginia Tech 2008Research Internships Panel at Virginia Tech 2008
Research Internships Panel at Virginia Tech 2008Manas Tungare
Ā 
Grad School 101
Grad School 101Grad School 101
Grad School 101
Manas Tungare
Ā 
Preliminary Examination Proposal Slides
Preliminary Examination Proposal SlidesPreliminary Examination Proposal Slides
Preliminary Examination Proposal Slides
Manas Tungare
Ā 
Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...
Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...
Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...
Manas Tungare
Ā 
DejaVOO: A Regression Testing Tool for Java Software
DejaVOO: A Regression Testing Tool for Java SoftwareDejaVOO: A Regression Testing Tool for Java Software
DejaVOO: A Regression Testing Tool for Java SoftwareManas Tungare
Ā 
Genetic Algorithms and their use in the Design of Evolvable Hardware
Genetic Algorithms and their use in the Design of Evolvable HardwareGenetic Algorithms and their use in the Design of Evolvable Hardware
Genetic Algorithms and their use in the Design of Evolvable HardwareManas Tungare
Ā 
SIGIR PIM Workshop 2006
SIGIR PIM Workshop 2006SIGIR PIM Workshop 2006
SIGIR PIM Workshop 2006Manas Tungare
Ā 
Increasing the Adoption of Public Transport Through Multi-Platform Social Net...
Increasing the Adoption of Public Transport Through Multi-Platform Social Net...Increasing the Adoption of Public Transport Through Multi-Platform Social Net...
Increasing the Adoption of Public Transport Through Multi-Platform Social Net...Manas Tungare
Ā 
Towards a Syllabus Repository for Computer Science Courses
Towards a Syllabus Repository for Computer Science CoursesTowards a Syllabus Repository for Computer Science Courses
Towards a Syllabus Repository for Computer Science Courses
Manas Tungare
Ā 
Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...
Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...
Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...
Manas Tungare
Ā 
Evaluation of a Location-Linked Notes System
Evaluation of a Location-Linked Notes SystemEvaluation of a Location-Linked Notes System
Evaluation of a Location-Linked Notes System
Manas Tungare
Ā 
Embodied Data Objects
Embodied Data ObjectsEmbodied Data Objects
Embodied Data Objects
Manas Tungare
Ā 
Why Consistency is Not Everything, and Seamless Task Migration is Key
Why Consistency is Not Everything, and Seamless Task Migration is KeyWhy Consistency is Not Everything, and Seamless Task Migration is Key
Why Consistency is Not Everything, and Seamless Task Migration is Key
Manas Tungare
Ā 
The Syncables Framework
The Syncables FrameworkThe Syncables Framework
The Syncables Framework
Manas Tungare
Ā 

More from Manas Tungare (16)

Mental Workload at Transitions between Multiple Devices in Personal Informati...
Mental Workload at Transitions between Multiple Devices in Personal Informati...Mental Workload at Transitions between Multiple Devices in Personal Informati...
Mental Workload at Transitions between Multiple Devices in Personal Informati...
Ā 
My Research Defense
My Research DefenseMy Research Defense
My Research Defense
Ā 
Research Internships Panel at Virginia Tech 2008
Research Internships Panel at Virginia Tech 2008Research Internships Panel at Virginia Tech 2008
Research Internships Panel at Virginia Tech 2008
Ā 
Grad School 101
Grad School 101Grad School 101
Grad School 101
Ā 
Preliminary Examination Proposal Slides
Preliminary Examination Proposal SlidesPreliminary Examination Proposal Slides
Preliminary Examination Proposal Slides
Ā 
Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...
Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...
Thinking Outside the (Beige) Box: Personal Information Management Beyond the ...
Ā 
DejaVOO: A Regression Testing Tool for Java Software
DejaVOO: A Regression Testing Tool for Java SoftwareDejaVOO: A Regression Testing Tool for Java Software
DejaVOO: A Regression Testing Tool for Java Software
Ā 
Genetic Algorithms and their use in the Design of Evolvable Hardware
Genetic Algorithms and their use in the Design of Evolvable HardwareGenetic Algorithms and their use in the Design of Evolvable Hardware
Genetic Algorithms and their use in the Design of Evolvable Hardware
Ā 
SIGIR PIM Workshop 2006
SIGIR PIM Workshop 2006SIGIR PIM Workshop 2006
SIGIR PIM Workshop 2006
Ā 
Increasing the Adoption of Public Transport Through Multi-Platform Social Net...
Increasing the Adoption of Public Transport Through Multi-Platform Social Net...Increasing the Adoption of Public Transport Through Multi-Platform Social Net...
Increasing the Adoption of Public Transport Through Multi-Platform Social Net...
Ā 
Towards a Syllabus Repository for Computer Science Courses
Towards a Syllabus Repository for Computer Science CoursesTowards a Syllabus Repository for Computer Science Courses
Towards a Syllabus Repository for Computer Science Courses
Ā 
Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...
Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...
Towards a Standardized Representation of Syllabi to Facilitation Sharing and ...
Ā 
Evaluation of a Location-Linked Notes System
Evaluation of a Location-Linked Notes SystemEvaluation of a Location-Linked Notes System
Evaluation of a Location-Linked Notes System
Ā 
Embodied Data Objects
Embodied Data ObjectsEmbodied Data Objects
Embodied Data Objects
Ā 
Why Consistency is Not Everything, and Seamless Task Migration is Key
Why Consistency is Not Everything, and Seamless Task Migration is KeyWhy Consistency is Not Everything, and Seamless Task Migration is Key
Why Consistency is Not Everything, and Seamless Task Migration is Key
Ā 
The Syncables Framework
The Syncables FrameworkThe Syncables Framework
The Syncables Framework
Ā 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
Ā 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
Ā 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Ā 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 

Understanding the Evolution of Users' Personal Information Practices

  • 1. Understanding the Evolution of Usersā€™ Personal Information Management Practices Manas Tungare Advisor: Manuel PĆ©rez QuiƱones Watch on your laptop: manas.tungare.name/now
  • 2. Research Area Overview Human Computer Interaction Personal Multi-Platform Information User Interfaces Management
  • 4. Information In Many Forms Jones 2002
  • 5. Mind-boggling Amounts 126 Email messages per day 53364 Messages in personal archive 123997 Files in home directory Anecdotal numbers; not real data.
  • 6. Personal Information Information about a person Information kept for kept by and under the control personal use. of others. E.g. ļ¬les, documents. E.g. health information. Information experienced by Information directed to a a person but outside her person. control. E.g. email, IM. E.g. books, websites browsed. Jones 2006
  • 7. Information is Fragmented Across Collections Boardman 2004
  • 8. Current Research Kelly 2006 Boardman 2004 Whittaker 1996 Gwizdka 2002 All Collections Email Jones 2005 Folders Documents Boardman 2004 Paper Bruce 2004 Malone 1983 Bookmarks Abrams 1998 Jones 2006
  • 9. Information is Fragmented Across Devices Tungare 2006
  • 11. 1. Using Multiple Devices for PIM ā€¢ How do devices affect information ļ¬‚ows? ā€¢ Inter-relationships between devices ā€¢ Formation of groups of devices ā€¢ Attaining equilibrium in the information ecosystem ā€¢ Custom strategies inļ¬‚uenced by devices ā€¢ Device failures
  • 12. Expected ļ¬ndings ā€¢ Hypothesis: The device is an important consideration, which, in addition to the speciļ¬c collection, affects PIM practices. ā€¢ Finding(s): Exactly how a device (or group) affects PIM ā€¢ E.g. why do people use their address book on their phone, but not on their computer?
  • 13. 2. Evolution of PIM Practices ā€¢ Natural transitions in life ā€¢ High school to college ā€¢ Grad school to industry ā€¢ Is there a pattern of stages in which information management practices change in response to these transitions? ā€¢ How is equilibrium achieved?
  • 14. Expected ļ¬ndings ā€¢ Hypothesis: There is a pattern in which users develop strategies for PIM. ā€¢ This pattern can be reiļ¬ed and made known to the next set of users who are going to make similar transitions. ā€¢ Tool designers can take these patterns into account.
  • 16. Studying PIM ā€¢ PIM is highly individualized & contextual ā€¢ Tools are just the surface ā€¢ Deeper understanding needed ā€¢ Approaches: browsing versus searchingTeevan 2004 ā€¢ Personalities: ļ¬lers versus pilers Malone 1983
  • 17. Study 1: PIM & Multiple Devices ā€¢ Survey + Interviews ā€¢ What activities do you perform on each device? ā€¢ What data do you keep on each device? ā€¢ What pairs of devices do you keep synchronized? ā€¢ What failures have you encountered?
  • 18. Study 2: PIM over time ā€¢ Longitudinal study of users across natural transitions in life ā€¢ Recruited while still in ā€œpre-ā€ phase ā€¢ Graduating students moving to industry ā€¢ Undergrads continuing to grad school ā€¢ Spot interviews, longer stories, observation, diary studies [Details are still being worked out.]
  • 20. An understanding of ... ā€¢ how PIM practices are inļ¬‚uenced by devices. ā€¢ how PIM practices change over time. ā€¢ how custom strategies develop. ā€¢ what parameters affect the evolution of these practices, and in what way.
  • 21. Signiļ¬cance ā€¢ Implications from ļ¬ndings will inform the design of new tools & applications ā€¢ New devices designed to integrate better into a userā€™s existing information environment ā€¢ A clearer understanding of usersā€™ frustration at the current state-of-the-art in multi-device PIM.
  • 22. Summary ā€¢ PIM is an interesting area in HCI where a deeper understanding of usersā€™ practices would beneļ¬t lots of users. ā€¢ Open questions in PIM research include understanding how people use multiple devices for information management & how their strategies evolve over time. ā€¢ (Hopefully,) my work will help answer these and design future devices and apps better.
  • 23. Your feedback is appreciated! ? ? manas.tungare.name/publications manas@tungare.name