The persistence of behavior and form in the organization of personal information
نویسنده
چکیده
study revisits managers who were first interviewed more than 10 years ago to identify their personal information management (PIM) behaviors. The purpose of this study was to see how advances in technology and access to the Web may have affected their PIM behaviors. PIM behaviors seem to have changed little over time, suggesting that technological advances are less important in determining how individuals organize and use information than are the tasks that they perform. Managers identified increased volume of e-mail and the frustration with having to access multiple systems with different, unsynchronized passwords as their greatest PIM challenges. Organizational implications are discussed. Introduction The information needs and uses of individuals in the organizations where they work can both reflect and inform organizational behavior. Seven managers in three organizations were interviewed in 1993 to investigate how they organized , retrieved, and used electronic documents (Barreau, 1995). The guided interviews were derived from Kwasnik's (1989) study of rules that individuals applied toward sorting their physical mail and organizing their offices. Users relied upon topic, document format, and situational factors such as the timeliness of documents, their relative importance, provenance, and intended use to organize and store electronic files, but they applied somewhat different rules to retrieval. For retrieval, they browsed lists within the software used to create the documents, sorting by file name, file extension, or date. Nardi, Anderson, and Erickson (1995) studied filing and finding behaviors of Macintosh users at the Apple Computer Company and found similar behaviors, although the Macintosh users created more folders and went directly to those folders for browsing. Barreau and Nardi (1995) noted that people use three kinds of information in the workplace: ephemeral, working, and archived. People manage large volumes of working information effectively and use archived information rarely, but the management of ephemeral information may be most challenging since it is abundant, varied, and often unrelated to the task at hand. Others have studied personal information management (PIM) behaviors in the workplace and have offered solutions to and some have suggested that the problems observed merely reflect the limitations of the desktop environment (Fertig, Freeman, & Gelernter, 1996). Yet, PIM issues persist and pose challenges for organizations that strive for efficient and effective knowledge creation and use (for a thorough review of PIM research, see Jones, 2007). In testimony before the U.S. House of Representatives Subcommittee on Technology , Information Policy, Intergovernmental Relations, and …
منابع مشابه
Personal Information Management Behavior among Postgraduate Students of University of Birjand in Digital Environment
Background and Aim: Personal Information Management (PIM) process consists of four activities; acquisition, organization, maintenance and retrieval. Obviously this process is due to human limitations and expanding scope of personal space of information which has become an exhausting and difficult process. Use of technology and tools related to PIM could facilitate this procedure. This survey st...
متن کاملAnalyzing the Relationship Between Ethic-based Culture with the Desire for Ethical Behavior and Organizational Citizenship Behavior and Personal-organizational Fit
Background and Objectives: The ethic-based culture is the predictor of ethical behavior and organizational citizenship behavior. Ethical culture enhances our awareness of our activities and can also increase our awareness of our bilateral commitments to the organization and therefore focus on what is important in an organizational setting. The present research aimed at investigating the relatio...
متن کاملExplain the Role of Customer Knowledge Interaction in Consumers' Pur-chase Intention with Information Behavior Approach
Objective: Purpose is to study the role of customer knowledge interaction and intention to buy consumers in the electrical industry with an information behavior approach. Method: Develomental qualitative method was used. Population included experts in marketing and consumer behavior, especially in the electrical industry. Via targeted snowball method sample of 14 experts were selected for a s...
متن کاملAsymptotic behavior of a system of two difference equations of exponential form
In this paper, we study the boundedness and persistence of the solutions, the global stability of the unique positive equilibrium point and the rate of convergence of a solution that converges to the equilibrium $E=(bar{x}, bar{y})$ of the system of two difference equations of exponential form: begin{equation*} x_{n+1}=dfrac{a+e^{-(bx_n+cy_n)}}{d+bx_n+cy_n}, y_{n+1}=dfrac{a+e^{-(by_n+cx_n)}}{d+...
متن کاملA Meta-analysis of the factors affecting information seeking behavior in Iran and the world
Purpose: The aim of this study is to identify the components affecting information seeking behavior and to measure their impact from Persian and English articles in this field. In addition, the moderating variables affecting information seeking behavior were identified and their effect size was calculated. Method: The method of this study is meta-analysis. The research population included all ...
متن کاملPredicting the Use of Masks in the COVID-19 Based on the Systems Thinking, Personal - Social Responsibility, Moral Obligations and Individualism: An Approach of Consumer Behavior Theory
Since the release of COVID-19 epidemic in late December 2020, recommendations issued for personal protection by the World Health Organization and National Health Organizations around the world. The most prominent of which has the use of masks to prevent the spread of the virus. Despite the importance of this solution, many people still resist using the mask. Therefore, this study, by emphasizin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JASIST
دوره 59 شماره
صفحات -
تاریخ انتشار 2008