Using Card Sorts to Understand how Users Think of Personal Information

نویسندگان

  • Paul Thomas
  • David Elsweiler
چکیده

Understanding how users think of personal information, and how they mentally categorise or classify the objects they work with, should inform the design of personal information management (PIM) or personal retrieval systems. However, most investigations of this topic predate widespread multimedia, websites, and social media—objects that a contemporary PIM or retrieval system should work with. We describe a pilot study that has used a variant of card sorts to elicit categories for personal information such as files, email, tweets, and websites. Our early results suggest that there are common categorisations which are not yet supported by PIM software, but which might reward further work. Our results also suggest that—with some caveats— card sorts are useful for understanding users’ categories.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Organised!by! Birger"Larsen"

Understanding how users think of personal information, and how they mentally categorise or classify the objects they work with, should inform the design of personal information management (PIM) or personal retrieval systems. However, most investigations of this topic predate widespread multimedia, websites, and social media—objects that a contemporary PIM or retrieval system should work with. W...

متن کامل

The Egyptians have a word for it: measuring cross-cultural differences in perceptions of Web pages via card sorts

The Egyptians have a word for it: measuring cross-cultural differences in perceptions of Web pages via card sorts ABSTRACT Cross-cultural issues in interface design are of growing importance, both in increasing attractiveness of Web pages to users from a variety of cultures, and in avoiding giving unintended offense to users from other cultures. Satisfying the needs of such users places special...

متن کامل

Place of Internet in Health information seeking behavior: Case of young Internet users in Shiraz

Background and Aim: Nowadays, Internet is known as an attractive source of health information to manage individual's health.  Given the importance of it, this study examined the role of Internet in health information seeking behavior among young people in Shiraz.      Method: This research was a survey which target population were youth Internet users in the city of Shiraz.  A sample of 400 we...

متن کامل

Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes

With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...

متن کامل

Mobile Devices to the Identity Rescue

Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity management that supply reliable authentication and sufficient user control. Currently applied methods often lack a proper level of security (e.g., passwords) and privacy (e.g., diverse processing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012