Multiple Temporalities in Personal Information Management
نویسندگان
چکیده
منابع مشابه
Personal Information Management, Personal Information Retrieval?
Traditional information retrieval has focused on the task of finding information or documents in a largely unknown space such as the Web or a library collection. In this paper we propose that the space of Personal Information Management (PIM) holds a great number of problems and untapped potential for research at the intersection of HCI and IR. In this position paper we focus on the problem of ...
متن کاملTemporalities for Workflow Management Systems
Time is a very important dimension of any aspect in human life, affecting also information and information management. As such, time must be dealt with in a suitable way, considering all its facets. The related literature already considered temporal information management from a pure database point of view: temporal aspects (also known as temporalities) of stored information cannot be neglected...
متن کاملPersonal Information Management Behavior among Postgraduate Students of University of Birjand in Digital Environment
Background and Aim: Personal Information Management (PIM) process consists of four activities; acquisition, organization, maintenance and retrieval. Obviously this process is due to human limitations and expanding scope of personal space of information which has become an exhausting and difficult process. Use of technology and tools related to PIM could facilitate this procedure. This survey st...
متن کاملA Personal Information Management Scheme
There have been many studies on the management of personal information such as PIN code, password, etc. Most schemes include a server containing explicit personal information, and if one can attack this server successfully, then he/she can reach whole personal information on the server. Since information is centralised, the responsibility for services and information is also centralised. There ...
متن کاملPrivacy-preserving Personal Information Management
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations. In this thesi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI
سال: 2016
ISSN: 2562-7589
DOI: 10.29173/cais908