Using Card Sorts to Understand how Users Think of Personal Information
نویسندگان
چکیده
Understanding how users think of personal information, and how they mentally categorise or classify the objects they work with, should inform the design of personal information management (PIM) or personal retrieval systems. However, most investigations of this topic predate widespread multimedia, websites, and social media—objects that a contemporary PIM or retrieval system should work with. We describe a pilot study that has used a variant of card sorts to elicit categories for personal information such as files, email, tweets, and websites. Our early results suggest that there are common categorisations which are not yet supported by PIM software, but which might reward further work. Our results also suggest that—with some caveats— card sorts are useful for understanding users’ categories.
منابع مشابه
Organised!by! Birger"Larsen"
Understanding how users think of personal information, and how they mentally categorise or classify the objects they work with, should inform the design of personal information management (PIM) or personal retrieval systems. However, most investigations of this topic predate widespread multimedia, websites, and social media—objects that a contemporary PIM or retrieval system should work with. W...
متن کاملThe Egyptians have a word for it: measuring cross-cultural differences in perceptions of Web pages via card sorts
The Egyptians have a word for it: measuring cross-cultural differences in perceptions of Web pages via card sorts ABSTRACT Cross-cultural issues in interface design are of growing importance, both in increasing attractiveness of Web pages to users from a variety of cultures, and in avoiding giving unintended offense to users from other cultures. Satisfying the needs of such users places special...
متن کاملPlace of Internet in Health information seeking behavior: Case of young Internet users in Shiraz
Background and Aim: Nowadays, Internet is known as an attractive source of health information to manage individual's health. Given the importance of it, this study examined the role of Internet in health information seeking behavior among young people in Shiraz. Method: This research was a survey which target population were youth Internet users in the city of Shiraz. A sample of 400 we...
متن کاملDetecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes
With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...
متن کاملMobile Devices to the Identity Rescue
Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity management that supply reliable authentication and sufficient user control. Currently applied methods often lack a proper level of security (e.g., passwords) and privacy (e.g., diverse processing...
متن کامل