In this Book

  • The Science of Managing Our Digital Stuff
  • Book
  • Ofer Bergman and Steve Whittaker
  • 2016
  • Published by: The MIT Press
summary
Each of us has an ever-growing collection of personal digital data: documents, photographs, PowerPoint presentations, videos, music, emails and texts sent and received. To access any of this, we have to find it. The ease (or difficulty) of finding something depends on how we organize our digital stuff. In this book, personal information management (PIM) experts Ofer Bergman and Steve Whittaker explain why we organize our personal digital data the way we do and how the design of new PIM systems can help us manage our collections more efficiently. Bergman and Whittaker report that many of us use hierarchical folders for our personal digital organizing. Critics of this method point out that information is hidden from sight in folders that are often within other folders so that we have to remember the exact location of information to access it. Because of this, information scientists suggest other methods: search, more flexible than navigating folders; tags, which allow multiple categorizations; and group information management. Yet Bergman and Whittaker have found in their pioneering PIM research that these other methods that work best for public information management don’t work as well for personal information management. Bergman and Whittaker describe personal information collection as curation: we preserve and organize this data to ensure our future access to it. Unlike other information management fields, in PIM the same user organizes and retrieves the information. After explaining the cognitive and psychological reasons that so many prefer folders, Bergman and Whittaker propose the user-subjective approach to PIM, which does not replace folder hierarchies but exploits these unique characteristics of PIM.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright Page
  2. pp. i-vi
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. vii-viii
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. ix-x
  3. restricted access
    • Download PDF Download
  1. Introduction
  2. pp. xi-xiv
  3. restricted access
    • Download PDF Download
  1. I Personal Information Management: The Curation Perspective
  2. pp. 1-4
  3. restricted access
    • Download PDF Download
  1. 1 Personal Archives and Curation Processes
  2. pp. 5-32
  3. restricted access
    • Download PDF Download
  1. 2 Keeping
  2. pp. 33-50
  3. restricted access
    • Download PDF Download
  1. 3 Management
  2. pp. 51-78
  3. restricted access
    • Download PDF Download
  1. 4 Exploitation
  2. pp. 79-100
  3. restricted access
    • Download PDF Download
  1. Part I: Summary
  2. pp. 101-102
  3. restricted access
    • Download PDF Download
  1. II Hierarchical Folders and Their Alternatives
  2. pp. 103-106
  3. restricted access
    • Download PDF Download
  1. 5 The Search Alternative
  2. pp. 107-120
  3. restricted access
    • Download PDF Download
  1. 6 The Tagging Alternative
  2. pp. 121-140
  3. restricted access
    • Download PDF Download
  1. 7 The Group Management Alternative
  2. pp. 141-160
  3. restricted access
    • Download PDF Download
  1. 8 Why Is Navigation the Preferred PIM Retrieval Method?
  2. pp. 161-174
  3. restricted access
    • Download PDF Download
  1. Part II: Summary
  2. pp. 175-178
  3. restricted access
    • Download PDF Download
  1. III The User-Subjective Approach to PIM Systems Design
  2. pp. 179-180
  3. restricted access
    • Download PDF Download
  1. 9 The User-Subjective Approach
  2. pp. 181-184
  3. restricted access
    • Download PDF Download
  1. 10 The Subjective Importance Principle
  2. pp. 185-202
  3. restricted access
    • Download PDF Download
  1. 11 The Subjective Project Classification Principle
  2. pp. 203-210
  3. restricted access
    • Download PDF Download
  1. 12 The Subjective Context Principle
  2. pp. 211-222
  3. restricted access
    • Download PDF Download
  1. Part III: Summary
  2. pp. 223-224
  3. restricted access
    • Download PDF Download
  1. Conclusions and Future Directions
  2. pp. 225-240
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 241-242
  3. restricted access
    • Download PDF Download
  1. References
  2. pp. 243-270
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 271-275
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.