منابع مشابه
Personal Information Management, Personal Information Retrieval?
Traditional information retrieval has focused on the task of finding information or documents in a largely unknown space such as the Web or a library collection. In this paper we propose that the space of Personal Information Management (PIM) holds a great number of problems and untapped potential for research at the intersection of HCI and IR. In this position paper we focus on the problem of ...
متن کاملA Personal Information Management Scheme
There have been many studies on the management of personal information such as PIN code, password, etc. Most schemes include a server containing explicit personal information, and if one can attack this server successfully, then he/she can reach whole personal information on the server. Since information is centralised, the responsibility for services and information is also centralised. There ...
متن کاملPrivacy-preserving Personal Information Management
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations. In this thesi...
متن کاملA Personal Information Management Assistant
This is a response to Regina Barzilay's talk. Although it is hard for computer to do what human do in the physical world (e.g. play soccer, or cook dinners) because of the problem of perception and control, it is much easier for them to accomplish tasks in the cyber space. Here we will propose a personal assistant that helps users accomplish tasks they can do with a computer. Specifically, we w...
متن کاملPersonal Information Management and Distribution
With the increasing importance of the Internet as a channel for conducting business, protecting consumer privacy has become a critical challenge. Privacy protection deals with methods giving the data owner control of his data so that he can decide when and to what extend he wants to disclose his information, and then enforcing the user’s privacy preferences, either through technology, business ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annual Review of Information Science and Technology
سال: 2007
ISSN: 0066-4200
DOI: 10.1002/aris.2007.1440410117