Personal Information Mangement, Personal Information Retrieval?

Personal Information Mangement, Personal Information Retrieval?

Personal Information Management, Personal Information Retrieval? Michael Bernstein, Max Van Kleek, David R. Karger, mc schraefel {msbernst, emax}@csail.mit.edu What is PIM?

Personal information management or PIM is both the practice and the study of the activities people perform to acquire, organize, maintain, retrieve, use, and control the distribution of information items such as documents (paperbased and digital), Web pages, and email messages for everyday use to complete tasks (work-related and not) and to fulfill a persons various roles (as parent, employee, friend,

member of community, etc.). [Jones and Teevan 2007] Personal information management is both the practice and the study of the activities people perform to acquire, organize, maintain, retrieve, use, and control the distribution of information items such as documents [], Web pages, and

email messages [] [Jones and Teevan 2007] Personal information management means getting control over your life. [Michael Bernstein, personal communication, 10/23/2007] Contact

Notebooks Informatio n Recipes E-mail Paper

Brainstor Scraps ms Wikis How-tos and Blogs

Whiteboards Sketches n submission to ACM TOIS] Cell Appointme Phones

nts How-tos todo.txt Information What should

the IR system index? How will the user search for it again? HCIR in PIM We are not retrieving documents

from a corpus! Retrieval, Reorganization, Reminding Very short, incomplete text in unusual language Importance of lightweight interaction User has intimate knowledge of the corpus

Outline Motivation

Ethnographic Investigation System design Reflection Ethnographic Study 27 participants, mainly knowledge workers Method: semi-structured interviews

and artifact examinations Goal: learn more about existing information scrap practice n submission to ACM TOIS] Roles that Information Scraps Play

What can we do about this? Jourknow Jourknow Quick Entry

Context Structure Capture Structure Exploitation meeting with Kwasi at

5pm about camping Type: Meeting Attendees: Time: 5pmKwasi Topic: Camping Type:

Meeting Attendees: Time: 5pmKwasi Topic: Camping Quick Entry Enter New Note:

reginas phone (617) 555-1234 Ctrl Alt Spacebar

Context We often remember aspects of our data extrinsic to the bits themselves People [Cutrell] Time [Ringel] Pictures [Sellen] Location [Rhodes]

Context Automatic context capture and association with note contents Useful for recontextualizing the note to divine its contents, or in refinding the note

dmarks: Ringel], [SenseCam: Gemmell], [Chitty Chatty: Kalnikaite], [Remembrance Agent: R Structure Capture Pidgin Structure Exploitation: Application Push

meeting w/ karger at 5 about my thesis Structure Exploitation: Faceted Browsing Structure Exploitation: Faceted Browsing

Structure Exploitation: Faceted Browsing Structure Exploitation: Pidgin Inspection Reflections and Open Questions

Faceted browsing scaling to large numbers of contextual facets Additional tools and techniques Bringing together HCI and IR in a difficult domain to see where innovation might lie Thank you!

jourknow.csail.mit.edu [email protected]

Recently Viewed Presentations

  • What is a Computer? - Colorado Mesa University

    What is a Computer? - Colorado Mesa University

    Hard disk - magnetic or solid state non-volatile storage. CPU (8008) Die. This is what a physical computer chip looks like (when magnified many times). This consists of many thousands of transistors etched (printed) on to a wafer of silicon...
  • Symbols and Motifs - Montgomery Township School District

    Symbols and Motifs - Montgomery Township School District

    Symbols and Symbolism. A . symbol. is anything that hints at something else, usually something abstract, such as and idea or belief. A . literary symbol. is an object, a person, a situation, or an action that has a literal...
  • Which river is the border between South Carolina and Georgia ...

    Which river is the border between South Carolina and Georgia ...

    Jean Ribault c. Henry Woodward d. Juan Pardo C. Henry Woodward Which explorer discovered Hilton Head Island? ... Atlantic b. Beaufort, Santee, Pee Dee, Edisto c. Santee, Savannah, Pee Dee, Edisto d. Catawba, Pee Dee, Charleston, Blue Ridge c. Santee,...
  • CS310 The Linux Command Line in a Nutshell

    CS310 The Linux Command Line in a Nutshell

    Times New Roman Arial Courier New Default Design CS310 Connect to zeus.cs.pacificu.edu Connected to zeus Creating a file To create or open a file using emacs Build the executable Build a tar.gz file Makefiles Alternate Plan Write a lex and...
  • Locati EH et al, JACC 1992  QT  QTU

    Locati EH et al, JACC 1992 QT QTU

    心搏暂停和心动过速依赖性尖端扭转性室速 Locati EH et al, JACC 1992
  • Cryptozoology is the field of study given to

    Cryptozoology is the field of study given to

    Bigfoot is commonly reported to have a disgusting smell by those who claim to have encountered it. The enormous footprints for which it is named have been as large as 60 cm long and 20 cm wide.While most casts have...
  • w w w. p d st . i

    w w w. p d st . i

    Shirley Clarke, Dylan Wiliam, and David Spendlove also advocate using learning outcomes and success criteria as an initial pathway into assessment for learning as action research in classrooms indicated that this was a key starting point. 2. Effective feedback
  • Value Chain and Vertical Integration

    Value Chain and Vertical Integration

    Value Chain and Vertical Integration. Edward S. Pearsall, discussant. I am an economist and independent consultant. The views expressed here are my own and do not necessarily represent the opinions of the U.S. Postal Regulatory Commission (PRC).