Search (3 results, page 1 of 1)

  • × author_ss:"Beyth-Marom, R."
  1. Bergman, O.; Beyth-Marom, R.; Nachmias, R.: ¬The user-subjective approach to personal information management systems design : evidence and implementations (2008) 0.00
    0.0010886504 = product of:
      0.0065319026 = sum of:
        0.0065319026 = weight(_text_:a in 1354) [ClassicSimilarity], result of:
          0.0065319026 = score(doc=1354,freq=12.0), product of:
            0.041864127 = queryWeight, product of:
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.03630739 = queryNorm
            0.15602624 = fieldWeight in 1354, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1354)
      0.16666667 = coord(1/6)
    
    Abstract
    Personal Information Management (PIM) is an activity in which an individual stores personal information items to retrieve them later. In a former article, we suggested the user-subjective approach, a theoretical approach proposing design principles with which PIM systems can systematically use subjective attributes of information items. In this consecutive article, we report on a study that tested the approach by exploring the use of subjective attributes (i.e., project, importance, and context) in current PIM systems, and its dependence on design characteristics. Participants were 84 personal computer users. Tools included a questionnaire (N = 84), a semistructured interview that was transcribed and analyzed (n = 20), and screen captures taken from this subsample. Results indicate that participants tended to use subjective attributes when the design encouraged them to; however, when the design discouraged such use, they either found their own alternative ways to use them or refrained from using them altogether. This constitutes evidence in support of the user-subjective approach as it implies that current PIM systems do not allow for sufficient use of subjective attributes. The article also introduces seven novel system design schemes, suggested by the authors, which demonstrate how the user-subjective principles can be implemented.
    Type
    a
  2. Bergman, O.; Gradovitch, N.; Bar-Ilan, J.; Beyth-Marom, R.: Folder versus tag preference in personal information management (2013) 0.00
    0.0010886504 = product of:
      0.0065319026 = sum of:
        0.0065319026 = weight(_text_:a in 1103) [ClassicSimilarity], result of:
          0.0065319026 = score(doc=1103,freq=12.0), product of:
            0.041864127 = queryWeight, product of:
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.03630739 = queryNorm
            0.15602624 = fieldWeight in 1103, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1103)
      0.16666667 = coord(1/6)
    
    Abstract
    Users' preferences for folders versus tags was studied in 2 working environments where both options were available to them. In the Gmail study, we informed 75 participants about both folder-labeling and tag-labeling, observed their storage behavior after 1 month, and asked them to estimate the proportions of different retrieval options in their behavior. In the Windows 7 study, we informed 23 participants about tags and asked them to tag all their files for 2 weeks, followed by a period of 5 weeks of free choice between the 2 methods. Their storage and retrieval habits were tested prior to the learning session and, after 7 weeks, using special classification recording software and a retrieval-habits questionnaire. A controlled retrieval task and an in-depth interview were conducted. Results of both studies show a strong preference for folders over tags for both storage and retrieval. In the minority of cases where tags were used for storage, participants typically used a single tag per information item. Moreover, when multiple classification was used for storage, it was only marginally used for retrieval. The controlled retrieval task showed lower success rates and slower retrieval speeds for tag use. Possible reasons for participants' preferences are discussed.
    Type
    a
  3. Bergman, O.; Beyth-Marom, R.; Nachmias, R.: ¬The user-subjective approach to personal information management systems (2003) 0.00
    7.697921E-4 = product of:
      0.0046187527 = sum of:
        0.0046187527 = weight(_text_:a in 1714) [ClassicSimilarity], result of:
          0.0046187527 = score(doc=1714,freq=6.0), product of:
            0.041864127 = queryWeight, product of:
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.03630739 = queryNorm
            0.11032722 = fieldWeight in 1714, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1714)
      0.16666667 = coord(1/6)
    
    Abstract
    In this article we suggest a user-subjective approach to Personal Information Management (PIM) system design. This approach advocates that PIM systems relate to the subjective value-added attributes that the user gives to the data stored in the PIM system. These attributes should facilitate system use: help the user find the information item again, recall it when needed, and use it effectively in the next interaction with the item. Driven from the user-subjective approach are theee generic principles which are described and discussed: (a) The subjective classification principle, stating that all information items related to the same subjective topic should be classified together regardless of their technological format; (b) The subjective importance principle, proposing that the subjective importance of information should determine its degree of visual salience and accessibility; and (c) The subjective context principle, suggesting that information should be retrieved and viewed by the user in the same context in which it was previously used. We claim that these principles are only sporadically implemented in operating systems currently available an personal computers, and demonstrate alternatives for interface design.
    Type
    a