This document discusses proposed research into understanding how users' personal information management practices evolve over time and are influenced by their use of multiple devices. The research aims to study how PIM strategies change as users go through life transitions and how equilibrium is achieved. Two studies are proposed - one examining how activities, data, and synchronization differ across devices, and failures encountered, and a longitudinal study following users through transitions. The findings could inform design of new tools and applications to better integrate with users' information environments and address frustrations with multi-device PIM.
This whitepaper teaches you how to successfully use bug reports, surveys, feature requests, and other feedback types to collect and manage high-quality feedback during a beta test.
10 Golden Rules to Give Feedback to Your EmployeesAli Asadi
Ā
1. Department of Labor has stated that the number 1 reason for employees leaving a company is poor communication and a feeling that their efforts are not appreciated.
2. As soon as practical, you must give feedback to your employees about their standards of performance, which includes both good and bad news.
3. Giving feedback is an art you must develop. Your interest is only in the development of employees and improvement in their standards of work.
4. By giving your employees positive feedback (when deserved), you show them that :
ā¢ You are attentive to what they do and how they do it.
ā¢ Their efforts are appreciated.
ā¢ They are further encouraged to perform better.
ā¢ Their actions are reinforced.
5. Do not, however, go to the other extreme and give lavish, false praise.
6. Give positive feedback in public, negative feedback in private.
7. Be timely. Try to give positive feedback immediately after noticing a certain activity; give negative feedback within 24 hours. The difference is because you are giving positive strokes publicly, and you do not need to wait for a specific time.
8. Focus on behavior, not the person. Instead of saying āyou are habitually careless,ā say, āyou have damaged the equipment.ā
9. Be sure of your facts. Take some time to check in case you have any doubt.
10. Encourage your customers to give good feedback to your employees as well.
"I just scroll through my stuff until I find it or give up": A Contextual Inq...Toine Bogers
Ā
While ownership and usage of handheld devices such as smartphones and tablets continues to grow at a rapid pace, we do not have complete picture of how people manage personal information on these devices. The few existing studies have typically used interview or survey methods to focus on personal information management (PIM) practices on smartphones. We present the results of an exploratory contextual inquiry study of PIM practices aimed at providing a structured, naturalistic overview of PIM on both smartphones and tablets. We find that people use multiple complementary strategies to acquire different types of information on their devices, and that people rely strongly on automatic chronological ordering instead of organization by subject, although this pays off most for smaller information collections. Deletion of information is strongly influenced by usefulness and personal attachment. Finally, we find that people strongly prefer browsing over search when retrieving information from their devices.
(Paper presentation @ CHIIR 2018, New Brunswick, NJ)
Personal online reputations: Managing what you canāt controlFrances Ryan
Ā
This talk for the 5th annual Discover Academic Research, Training, and Support (DARTS) conference discusses the role of online information in the building, management, and evaluation of personal reputation. It considers the existing literature surrounding reputation and social media use, as well as some early findings from Francesā information science doctoral investigation on the same topics. A short interactive element encourages participants to think about their own social media use, online information behaviours, and digital footprintsāas well as some practical advice on managing a reputation that you canāt fully control.
This whitepaper teaches you how to successfully use bug reports, surveys, feature requests, and other feedback types to collect and manage high-quality feedback during a beta test.
10 Golden Rules to Give Feedback to Your EmployeesAli Asadi
Ā
1. Department of Labor has stated that the number 1 reason for employees leaving a company is poor communication and a feeling that their efforts are not appreciated.
2. As soon as practical, you must give feedback to your employees about their standards of performance, which includes both good and bad news.
3. Giving feedback is an art you must develop. Your interest is only in the development of employees and improvement in their standards of work.
4. By giving your employees positive feedback (when deserved), you show them that :
ā¢ You are attentive to what they do and how they do it.
ā¢ Their efforts are appreciated.
ā¢ They are further encouraged to perform better.
ā¢ Their actions are reinforced.
5. Do not, however, go to the other extreme and give lavish, false praise.
6. Give positive feedback in public, negative feedback in private.
7. Be timely. Try to give positive feedback immediately after noticing a certain activity; give negative feedback within 24 hours. The difference is because you are giving positive strokes publicly, and you do not need to wait for a specific time.
8. Focus on behavior, not the person. Instead of saying āyou are habitually careless,ā say, āyou have damaged the equipment.ā
9. Be sure of your facts. Take some time to check in case you have any doubt.
10. Encourage your customers to give good feedback to your employees as well.
"I just scroll through my stuff until I find it or give up": A Contextual Inq...Toine Bogers
Ā
While ownership and usage of handheld devices such as smartphones and tablets continues to grow at a rapid pace, we do not have complete picture of how people manage personal information on these devices. The few existing studies have typically used interview or survey methods to focus on personal information management (PIM) practices on smartphones. We present the results of an exploratory contextual inquiry study of PIM practices aimed at providing a structured, naturalistic overview of PIM on both smartphones and tablets. We find that people use multiple complementary strategies to acquire different types of information on their devices, and that people rely strongly on automatic chronological ordering instead of organization by subject, although this pays off most for smaller information collections. Deletion of information is strongly influenced by usefulness and personal attachment. Finally, we find that people strongly prefer browsing over search when retrieving information from their devices.
(Paper presentation @ CHIIR 2018, New Brunswick, NJ)
Personal online reputations: Managing what you canāt controlFrances Ryan
Ā
This talk for the 5th annual Discover Academic Research, Training, and Support (DARTS) conference discusses the role of online information in the building, management, and evaluation of personal reputation. It considers the existing literature surrounding reputation and social media use, as well as some early findings from Francesā information science doctoral investigation on the same topics. A short interactive element encourages participants to think about their own social media use, online information behaviours, and digital footprintsāas well as some practical advice on managing a reputation that you canāt fully control.
Reminders are an important part of the functionality of many systems. In this talk, I discuss what affects the user experience, from personal preferences to perception, with a focus on auditory reminders, hearing, and synthetic speech.
Managing Confidential Information ā Trends and ApproachesMicah Altman
Ā
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
Slides for a presentation I gave at Texting 4 Health (Stanford University, 2007). Provides a survey of three related research methods for mobile messaging: diary methods, Wizard of Oz techniques, and field experiments. Relevant both for design-oriented research and scientific research.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding InterĀnet of Things.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management ā cloud storage, ābigā data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Elaine Martin, MSLS, DA, Donna Kafel, RN, MSLS, and Andrew Creamer, MaEd, MSLS of UMass Medical School''s Lamar Soutter Library present Best Practices for Managing Data. The presentation features the importance of managing data for research projects, and tactical best practice initiatives to create a data management and sharing plan, including how to preserve label, secure, store, and preserve data. Issues, such as licensing, data dictionaries, regulations, and metadata are addressed in the presentation.
Social Media, Medicine and Health Literacy: Chronic Disease PreventionCameron Norman
Ā
A presentation made to the International Roundtable on Health Literacy and Chronic Disease Management held in Vancouver, BC from May 1-4th and sponsored by the Peter Wall Centre for Advanced Studies.
Personal Information Ecosystems: Design Concerns for Net-Enabled DevicesManuel A. Perez-Quinones
Ā
Today, with the proliferation of aļ¬ordable computing, people use multiple devices to fulļ¬ll their information needs. Designers approach each device platform individ- ually, without accounting for the other devices that users may also use. In many cases, the software applications on all the userās devices are designed to be functional repli- cates of each other, often with an emphasis on keeping their form and function consistent with the same application on other device platforms. In this paper, we present the idea of a personal information ecosystem, an analogy to bio- logical ecosystems, which allows us to discuss the inter- relationships among usersā devices. Using the examples of now-ubiquitous web-enabled devices, we discuss how con- sidering the userās ecosystem of devices as a holistic de- sign target gives designers and researchers a language to describe and discuss the design of applications that span multiple devices.
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataMarkLogic Corporation
Ā
The "Big Data" influx is upon usāterabytes and gigabytes of bits and bytes that are overwhelming IT infrastructures. This growth is unprecedented and much of it consists of unstructured information, which is creating new types of challenges in terms of governance, management and security practices. A new survey finds that companies are only beginning to grasp the complexities created by all this new unstructured data. Even the most mature organizations that acknowledge they depend on unstructured data still do not have effective governance or best practices in place. The survey results imply that companies are missing the opportunity to leverage the full value of this unstructured data. Download the complete survey report.
Mental Workload at Transitions between Multiple Devices in Personal Informati...Manas Tungare
Ā
Knowledge workers increasingly use multiple devices such as desktop computers, laptops, cell phones, and PDAs for personal information management (PIM) tasks. This paper presents the results of a study that examined users' mental workload in this context, especially when transitioning tasks from one device to another. In a preliminary survey of 220 knowledge workers, users reported high frustration with current devices' support for task migration, e.g. accessing files from multiple machines. To investigate further, we conducted a controlled experiment with 18 participants. While they performed PIM tasks, we measured their mental workload using subjective measures and physiological measures. Some systems provide support for transitioning users' work between devices, or for using multiple devices together; we explored the impact of such support on mental workload and task performance. Participants performed three tasks (Files, Calendar, Contacts) with two treatment conditions each (lower and higher support for migrating tasks between devices.)
Workload measures obtained using the subjective NASA TLX scale were able to discriminate between tasks, but not between the two conditions in each task. Task-Evoked Pupillary Response, a continuous measure, was sensitive to changes within each task. For the Files task, a significant increase in workload was noted in the steps before and after task migration. Participants entered events faster into paper calendars than into an electronic calendar, though there was no observable difference in workload. For the Contacts task, time-on-task was equal, but mental workload was higher when no synchronization support was available between their cell phone and their laptop. Little to no correlation was observed between task performance and both workload measures, except in isolated instances. This suggests that neither task performance metrics nor workload assessments alone offer a complete picture of device usability in multi-device personal information ecosystems. Traditional usability metrics that focus on efficiency and effectiveness are necessary, but not sufficient, to evaluate such designs. Given participants' varying subjective perceptions of these systems and differences in task-evoked pupillary response, aspects of hot cognition such as emotion, pleasure, and likability show promise as important parameters in the evaluation of PIM systems.
Reminders are an important part of the functionality of many systems. In this talk, I discuss what affects the user experience, from personal preferences to perception, with a focus on auditory reminders, hearing, and synthetic speech.
Managing Confidential Information ā Trends and ApproachesMicah Altman
Ā
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
Slides for a presentation I gave at Texting 4 Health (Stanford University, 2007). Provides a survey of three related research methods for mobile messaging: diary methods, Wizard of Oz techniques, and field experiments. Relevant both for design-oriented research and scientific research.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding InterĀnet of Things.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management ā cloud storage, ābigā data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Elaine Martin, MSLS, DA, Donna Kafel, RN, MSLS, and Andrew Creamer, MaEd, MSLS of UMass Medical School''s Lamar Soutter Library present Best Practices for Managing Data. The presentation features the importance of managing data for research projects, and tactical best practice initiatives to create a data management and sharing plan, including how to preserve label, secure, store, and preserve data. Issues, such as licensing, data dictionaries, regulations, and metadata are addressed in the presentation.
Social Media, Medicine and Health Literacy: Chronic Disease PreventionCameron Norman
Ā
A presentation made to the International Roundtable on Health Literacy and Chronic Disease Management held in Vancouver, BC from May 1-4th and sponsored by the Peter Wall Centre for Advanced Studies.
Personal Information Ecosystems: Design Concerns for Net-Enabled DevicesManuel A. Perez-Quinones
Ā
Today, with the proliferation of aļ¬ordable computing, people use multiple devices to fulļ¬ll their information needs. Designers approach each device platform individ- ually, without accounting for the other devices that users may also use. In many cases, the software applications on all the userās devices are designed to be functional repli- cates of each other, often with an emphasis on keeping their form and function consistent with the same application on other device platforms. In this paper, we present the idea of a personal information ecosystem, an analogy to bio- logical ecosystems, which allows us to discuss the inter- relationships among usersā devices. Using the examples of now-ubiquitous web-enabled devices, we discuss how con- sidering the userās ecosystem of devices as a holistic de- sign target gives designers and researchers a language to describe and discuss the design of applications that span multiple devices.
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataMarkLogic Corporation
Ā
The "Big Data" influx is upon usāterabytes and gigabytes of bits and bytes that are overwhelming IT infrastructures. This growth is unprecedented and much of it consists of unstructured information, which is creating new types of challenges in terms of governance, management and security practices. A new survey finds that companies are only beginning to grasp the complexities created by all this new unstructured data. Even the most mature organizations that acknowledge they depend on unstructured data still do not have effective governance or best practices in place. The survey results imply that companies are missing the opportunity to leverage the full value of this unstructured data. Download the complete survey report.
Mental Workload at Transitions between Multiple Devices in Personal Informati...Manas Tungare
Ā
Knowledge workers increasingly use multiple devices such as desktop computers, laptops, cell phones, and PDAs for personal information management (PIM) tasks. This paper presents the results of a study that examined users' mental workload in this context, especially when transitioning tasks from one device to another. In a preliminary survey of 220 knowledge workers, users reported high frustration with current devices' support for task migration, e.g. accessing files from multiple machines. To investigate further, we conducted a controlled experiment with 18 participants. While they performed PIM tasks, we measured their mental workload using subjective measures and physiological measures. Some systems provide support for transitioning users' work between devices, or for using multiple devices together; we explored the impact of such support on mental workload and task performance. Participants performed three tasks (Files, Calendar, Contacts) with two treatment conditions each (lower and higher support for migrating tasks between devices.)
Workload measures obtained using the subjective NASA TLX scale were able to discriminate between tasks, but not between the two conditions in each task. Task-Evoked Pupillary Response, a continuous measure, was sensitive to changes within each task. For the Files task, a significant increase in workload was noted in the steps before and after task migration. Participants entered events faster into paper calendars than into an electronic calendar, though there was no observable difference in workload. For the Contacts task, time-on-task was equal, but mental workload was higher when no synchronization support was available between their cell phone and their laptop. Little to no correlation was observed between task performance and both workload measures, except in isolated instances. This suggests that neither task performance metrics nor workload assessments alone offer a complete picture of device usability in multi-device personal information ecosystems. Traditional usability metrics that focus on efficiency and effectiveness are necessary, but not sufficient, to evaluate such designs. Given participants' varying subjective perceptions of these systems and differences in task-evoked pupillary response, aspects of hot cognition such as emotion, pleasure, and likability show promise as important parameters in the evaluation of PIM systems.
http://manas.tungare.name/blog/grad-school-101/ has the accompanying document.
A presentation given at Virginia Tech by members of the Grad Council to 1st and 2nd year grad students about life in grad school.
Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zhang, Xiaoyan Yu, Umut Balli, Steve Harrison; Embodied Data Objects: Tangible Interfaces to Information Appliances.; Proceedings of the 44th ACM SouthEast Conference (ACM SE 2006).
DevOps and Testing slides at DASA ConnectKari Kakkonen
Ā
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Ā
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Ā
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Ā
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
Ā
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
ā¢ The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
ā¢ Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
ā¢ Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
ā¢ Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Ā
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Ā
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more āmechanicalā approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Ā
Clients donāt know what they donāt know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsā needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
5. Mind-boggling Amounts
126 Email messages per day
53364 Messages in personal archive
123997 Files in home directory
Anecdotal numbers; not real data.
6. Personal Information
Information about a person
Information kept for
kept by and under the control
personal use.
of others.
E.g. ļ¬les, documents.
E.g. health information.
Information experienced by
Information directed to a
a person but outside her
person.
control.
E.g. email, IM.
E.g. books, websites browsed.
Jones 2006
8. Current Research
Kelly 2006
Boardman 2004 Whittaker 1996
Gwizdka 2002
All Collections
Email
Jones 2005
Folders
Documents
Boardman 2004 Paper
Bruce 2004
Malone 1983
Bookmarks
Abrams 1998
Jones 2006
11. 1. Using Multiple Devices for PIM
ā¢ How do devices affect information ļ¬ows?
ā¢ Inter-relationships between devices
ā¢ Formation of groups of devices
ā¢ Attaining equilibrium in the information
ecosystem
ā¢ Custom strategies inļ¬uenced by devices
ā¢ Device failures
12. Expected ļ¬ndings
ā¢ Hypothesis: The device is an important
consideration, which, in addition to the
speciļ¬c collection, affects PIM practices.
ā¢ Finding(s): Exactly how a device (or group)
affects PIM
ā¢ E.g. why do people use their address book
on their phone, but not on their computer?
13. 2. Evolution of PIM Practices
ā¢ Natural transitions in life
ā¢ High school to college
ā¢ Grad school to industry
ā¢ Is there a pattern of stages in which
information management practices change
in response to these transitions?
ā¢ How is equilibrium achieved?
14. Expected ļ¬ndings
ā¢ Hypothesis: There is a pattern in which
users develop strategies for PIM.
ā¢ This pattern can be reiļ¬ed and made
known to the next set of users who are
going to make similar transitions.
ā¢ Tool designers can take these patterns into
account.
16. Studying PIM
ā¢ PIM is highly individualized & contextual
ā¢ Tools are just the surface
ā¢ Deeper understanding needed
ā¢ Approaches: browsing versus searchingTeevan 2004
ā¢ Personalities: ļ¬lers versus pilers Malone 1983
17. Study 1: PIM & Multiple Devices
ā¢ Survey + Interviews
ā¢ What activities do you perform on each
device?
ā¢ What data do you keep on each device?
ā¢ What pairs of devices do you keep
synchronized?
ā¢ What failures have you encountered?
18. Study 2: PIM over time
ā¢ Longitudinal study of users across natural
transitions in life
ā¢ Recruited while still in āpre-ā phase
ā¢ Graduating students moving to industry
ā¢ Undergrads continuing to grad school
ā¢ Spot interviews, longer stories,
observation, diary studies
[Details are still being worked out.]
20. An understanding of ...
ā¢ how PIM practices are inļ¬uenced by devices.
ā¢ how PIM practices change over time.
ā¢ how custom strategies develop.
ā¢ what parameters affect the evolution of
these practices, and in what way.
21. Signiļ¬cance
ā¢ Implications from ļ¬ndings will inform the
design of new tools & applications
ā¢ New devices designed to integrate better
into a userās existing information
environment
ā¢ A clearer understanding of usersā
frustration at the current state-of-the-art in
multi-device PIM.
22. Summary
ā¢ PIM is an interesting area in HCI where a
deeper understanding of usersā practices
would beneļ¬t lots of users.
ā¢ Open questions in PIM research include
understanding how people use multiple
devices for information management & how
their strategies evolve over time.
ā¢ (Hopefully,) my work will help answer these
and design future devices and apps better.
23. Your feedback is appreciated!
?
?
manas.tungare.name/publications
manas@tungare.name