User-subjective approach

Last updated

The user-subjective approach is the first interaction design approach dedicated specifically to personal information management (PIM). The approach offers design principles with which PIM systems (e.g. operating systems, email applications and web browsers) can make systematic use of subjective (i.e. user-dependent) attributes. The approach evolved in three stages: (a) theoretical foundations first published in a Journal of the American Society for Information Science and Technology during 2003. [1] The paper introduces the approach and its design principles (b) evidence and implementation was published in another JASIST paper in 2008. [2] The paper gives empirical evidence in support of the approach as well as seven novel design schemes that derives from it (see also the user-subjective website). It has won the Best JASIST paper award in 2009. [3] (c) specific design evaluation this stage has already begun with evaluation of the first user-subjective design prototype called GrayArea in a Conference on Human Factors in Computing Systems paper published in 2009. [4]

Contents

Theoretical foundations

The user-subjective approach takes advantage of the fact that in PIM the person who retrieves the information is the same person who had previously stored it. PIM can be seen as a communication between the person and him\her self at two different times: the time of storage and the time of retrieval. The PIM system design should help facilitate that unique communication by allowing the user use subjective (user-dependent) attributes in addition to the standard objective ones. PIM systems should capture these subjective attributes when the user interacts with the information item (either automatically or by using direct manipulation interface) in order to help the user retrieve the item later on.

The user-subjective approach identifies three subjective attributes – the project which the item was classified to, its degree of importance to the user, and the context in which the item was used during the interaction with it. The approach also assigns a design principle for each. The principles (discussed below) are deliberately abstract to allow for a variety of different implementations.

The subjective project classification principle

The subjective project classification principle suggests that PIM systems design should allow all information items related to a project be classified under the same category regardless of whether they are files, emails, Web Favorites or of any other format. This stands in sharp contrast with the present PIM system design where there are distinct folder hierarchies for each of these formats. The current design forces the user to store information related to a single project in separate locations depending on their format causing the project fragmentation problem.

The subjective importance principle

The subjective importance principle suggests that the subjective importance of information should affect its degree of visual salience and accessibility: important information items should be highly visible and accessible as they are more likely to be retrieved (the promotion principle) and those of lower importance should be demoted (i.e. making them less visible) so as not to distract the user (the demotion principle). While the promotion principle is not new and has been widely applied in PIM system design, the demotion principle is novel and has been applied only sporadically in these systems. Currently these systems allow only two options: keeping information (where unneeded information items could clutter folders and obscure the target item) and deleting it (where there is a risk that the item will not be there when needed). Demotion suggests a third option where the item is less visible so it doesn’t distract the user but is kept within its original context in case the user would need it after all.

The subjective context principle

The subjective context principle suggests that PIM systems should allow users retrieve their information items in the same context that they had previously used in order to bridge the time gap between these two events. By "context" the approach refers to other information items that were used at the time of interaction with the item, thoughts that the users may have regarding the item, the phase the user got to in the interaction with the item and other people the user collaborates with regarding the information item.

Evidence and implementations

Evidence

The user-subjective approach was evaluated in a multioperational designed study which used questionnaires, screen shots and in-depth interviews (N = 84). The research tested the use of subjective attributes in current PIM systems and its dependency on design. Results show that participants used subjective attributes whenever design allowed them to. When it didn't, they either used their own alternative ways to use these attributes or avoided using subjective attributes at all.

Regarding the subjective project classification principle – many of the participants' recent files, emails and web pages related to the same projects (indicating that they were working on the same project using different formats), and they had saved files of different format in the same project folders. However, as design does not suggest storing emails and web favorites with files, users avoid doing so.

Regarding the subjective importance principle – users tended to retrieve their important information from highly visible and accessible locations offered by current design (e.g. by using the desktop), however since current systems offers no way to demote files of low subjective importance participants tended to use their own walk around ways for doing so (e.g. by moving them to a folder called "old" inside their original folder).

Regarding the subjective context principle – participants tended to talk spontaneously about the context of their information items during the interview.

These evidence imply that current PIM systems could possibly be improved if it would allow users to make more use of subjective attributes of their personal information.

Implementations

Each of the user-subjective design principles can be implemented in various ways. Moreover, as the approach is generative it offers PIM designers to use these principles in order to create their own user subjective designs. Below are design schemes that demonstrate an implementation of each of the principles. A more complete set of implementation examples can be found in the user-subjective website.

The single hierarchy solution – addresses the project fragmentation problem (the current situation where the users stores and retrieve their project-related files, emails and web favorites at different hierarchies) and implements the subjective classification principle by offering the user a single folder hierarchy for all information items. At the operation system level the users would navigate to a folder and find there all project related files, emails, web favorites, tasks, contacts and notes. This would allow them to retrieve all their project-related information items from a single location regardless of their formats. When looking at these folders at their mail box the users would see only their emails and only web favorites through their browser. The single hierarchy design scheme has not been evaluated yet.

Single Hierarchy folder Single Hierarchy folder.jpg
Single Hierarchy folder

GrayArea – implements the demotion principle by allowing users to move subjectively unimportant files to a gray area at the bottom end of their folders. This clears the upper part of the folder from file that are unlikely to be retrieved while allowing the users to retrieve these unimportant file in their original context in case they are needed after all. GrayArea design scheme was positively evaluated (see next section).

GrayArea design scheme GrayArea design scheme.JPG
GrayArea design scheme

ItemHistory – is an implementation of the subjective context principle. It allows users to reach all information items that were previously retrieved while that information item was open. This design scheme has not been evaluated to date.

Specific design evaluation

The evaluation of specific designs is the third and final step of the approach development. It had begun with the assessment of GrayArea.

GrayArea evaluation

GrayArea was evaluated by using a prototype that simulated the participants' folders but included a gray area where they could drag & drop their subjectively unimportant files. In the study 96 participants were asked to clean up their folders from unimportant files once with GrayArea and once without it. Results show that the use of GrayArea reduced the clutter in folders, that it was easier for participants to demote files than to delete them and that they would use it if provided in their next operating system.

These results encourage commercial implementation of GrayArea and the development and testing of other user-subjective designs.

Chronological development

The user-subjective approach was developed by Ofer Bergman during his Ph.D. at Tel Aviv University supervised by Prof. Rafi Nachmias and guided by Prof. Ruth Beyth-Marom. The research was partially funded by the Sacta Rashi foundation. In 2003 they had published a paper titled "The user-subjective approach to personal information management" at the Journal of the American Society for Information Science and Technology. In 2004 the paper was recognized by The American Library Association as field representative when choosing personal information management as one of the “ten top technology issues and trends in today's libraries”. [5] Later it was presented in scientific conferences including CHI, [6] and ASIST [7] and invited talks including at the MIT Media Lab, the HCI Lab, University of Maryland Human – Computer Interaction Lab and Microsoft Research at Cambridge.

In 2008 they had published another JASIST paper called " The user-subjective approach to personal information management systems design: Evidence and implementations". The paper has won the best JASIST paper award for 2009. According to the jury, “The paper was considered to be well-argued and documented, effective, intelligible, and potentially useful and applicable.”

In 2007 Dr. Bergman had finished his Ph.D. and continued working on the approach with Prof. Steve Whittaker under an EU Mary Curie grant at Sheffield University. They produced a PIM workshop paper about the approach at CHI 2008 conference, and a together with Ed Cutrell of Microsoft Research a full CHI paper titled "It's not that important: Demoting personal information of low subjective importance using GrayArea" in 2009.

In 2010 Dr. Bergman received a Marie Curie reintegration grant with Prof. Judit Bar-Ilan, Head of Information Science Department at Bar Ilan University, and became a faculty member at the department. The grant research plan called PIM includes further studies of the user-subjective approach.

Related Research Articles

In computing, the Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP is defined by RFC 9051.

New Technology File System (NTFS) is a proprietary journaling file system developed by Microsoft. Starting with Windows NT 3.1, it is the default file system of the Windows NT family. It superseded File Allocation Table (FAT) as the preferred filesystem on Windows and is supported in Linux and BSD as well. NTFS reading and writing support is provided using a free and open-source kernel implementation known as NTFS3 in Linux and the NTFS-3G driver in BSD. By using the convert command, Windows can convert FAT32/16/12 into NTFS without the need to rewrite all files. NTFS uses several files typically hidden from the user to store metadata about other files stored on the drive which can help improve speed and performance when reading data. Unlike FAT and High Performance File System (HPFS), NTFS supports access control lists (ACLs), filesystem encryption, transparent compression, sparse files and file system journaling. NTFS also supports shadow copy to allow backups of a system while it is running, but the functionality of the shadow copies varies between different versions of Windows.

HCL Notes and HCL Domino are the client and server, respectively, of a collaborative client-server software platform formerly sold by IBM, now by HCL Technologies.

<span class="mw-page-title-main">Microsoft Outlook</span> Email, notes, task, calendar software and contact management

Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging and web browsing, and has also become a popular email client for many businesses.

Personal information management (PIM) is the study and implementation of the activities that people perform in order to acquire or create, store, organize, maintain, retrieve, and use informational items such as documents, web pages, and email messages for everyday use to complete tasks and fulfill a person's various roles ; it is information management with intrapersonal scope.

<span class="mw-page-title-main">Usability</span> Capacity of a system for its users to perform tasks

Usability can be described as the capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience. In software engineering, usability is the degree to which a software can be used by specified consumers to achieve quantified objectives with effectiveness, efficiency, and satisfaction in a quantified context of use.

WinFS was the code name for a canceled data storage and management system project based on relational databases, developed by Microsoft and first demonstrated in 2003 as an advanced storage subsystem for the Microsoft Windows operating system, designed for persistence and management of structured, semi-structured and unstructured data.

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices, etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object is tested against the set of authorization rules to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.

Desktop organizer software applications are applications that automatically create useful organizational structures from desktop content from heterogeneous types of content including email, files, contacts, companies, RSS news feeds, photos, music and chat sessions. The organization is based on a combination of automated scanning of metadata similar to data mining and manual tagging of content. The metadata stored in applications is correlated based on a structure for the data type handled by the organizer tool. For example, the email address of a sender of an email allows the email to be filed in a virtual folder for the author and company the author works for or a music file is filed by the musician and album label. The resulting visualization simplifies use of desktop content to navigate, search, and use related information stored on the desktop computer. The data in desktop organizer tools is normally stored in a database rather than the computer's file system in order to produce virtual folders where the same item can appear in multiple folders to the user based on its relationship to the folder.

In computing, a virtual folder generally denotes an organizing principle for files that is not dependent on location in a hierarchical directory tree. Instead, it consists of software that coalesces results from a data store, which may be a database or a custom index, and presents them visually in the format in which folder views are presented. A virtual folder can be thought of as a view that lists all files tagged with a certain tag, and thus a simulation of a folder whose dynamic contents can be assembled on the fly, when requested. It is related in concept to several other topics in computer science, with names including saved search, saved query, and filtering.

Agenda is a DOS-based personal information manager, designed by Mitch Kapor, Ed Belove and Jerry Kaplan, and marketed by Lotus Software.

<span class="mw-page-title-main">Time Machine (macOS)</span> Backup software application developed by Apple and distributed as part of macOS

Time Machine is the backup mechanism of macOS, the desktop operating system developed by Apple. The software is designed to work with both local storage devices and network-attached disks, and is most commonly used with external disk drives connected using either USB or Thunderbolt. It was first introduced in Mac OS X 10.5 Leopard, which appeared in October 2007 and incrementally refined in subsequent releases of macOS. Time Machine was revamped in macOS 11 Big Sur to support APFS, thereby enabling "faster, more compact, and more reliable backups" than were possible previously.

Sentiment analysis is the use of natural language processing, text analysis, computational linguistics, and biometrics to systematically identify, extract, quantify, and study affective states and subjective information. Sentiment analysis is widely applied to voice of the customer materials such as reviews and survey responses, online and social media, and healthcare materials for applications that range from marketing to customer service to clinical medicine. With the rise of deep language models, such as RoBERTa, also more difficult data domains can be analyzed, e.g., news texts where authors typically express their opinion/sentiment less explicitly.

Knowledge organization (KO), organization of knowledge, organization of information, or information organization is an intellectual discipline concerned with activities such as document description, indexing, and classification that serve to provide systems of representation and order for knowledge and information objects. According to The Organization of Information by Joudrey and Taylor, information organization:

examines the activities carried out and tools used by people who work in places that accumulate information resources for the use of humankind, both immediately and for posterity. It discusses the processes that are in place to make resources findable, whether someone is searching for a single known item or is browsing through hundreds of resources just hoping to discover something useful. Information organization supports a myriad of information-seeking scenarios.

<span class="mw-page-title-main">Trash (computing)</span> Temporary storage for deleted files

In computing, the trash is a graphical user interface desktop metaphor for temporary storage for files set aside by the user for deletion, but not yet permanently erased. The concept and name is part of Mac operating systems, a similar implementation is called the Recycle Bin in Microsoft Windows, and other operating systems use other names.

Attribute-based access control (ABAC), also known as policy-based access control for IAM, defines an access control paradigm whereby a subject's authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment attributes.

<span class="mw-page-title-main">Windows Search</span> Desktop search platform by Microsoft

Windows Search is a content index desktop search platform by Microsoft introduced in Windows Vista as a replacement for both the previous Indexing Service of Windows 2000 and the optional MSN Desktop Search for Windows XP and Windows Server 2003, designed to facilitate local and remote queries for files and non-file items in compatible applications including Windows Explorer. It was developed after the postponement of WinFS and introduced to Windows constituents originally touted as benefits of that platform.

Group information management (GIM) is an extension of personal information management (PIM) "as it functions in more public spheres" as a result of peoples' efforts to share and co-manage information, and has been a topic of study for researchers in PIM, human–computer interaction (HCI), and computer supported cooperative work (CSCW). People acquire, organize, maintain, retrieve and use information items to support individual needs, but these PIM activities are often embedded in group or organizational contexts and performed with sharing in mind. The act of sharing moves personal information into spheres of group activity and also creates tensions that shape what and how the information is shared. The practice and the study of GIM focuses on this interaction between personal information and group contexts.

Planz is an open source personal information manager developed by the Keeping Found Things Found group at the University of Washington Information School. It integrates e-mail, website links and content, computer files and folders, and informal notes into a simplified, document-like interface. Its purpose is to make the user's personal information easily accessible for use in planning everyday activities as well as larger projects. Planz is a research prototype rather than a commercial product.

<i>The Science of Managing Our Digital Stuff</i>

The Science of Managing Our Digital Stuff is a book about personal information management (PIM) written by Ofer Bergman and Steve Whittaker. It was published in 2016 by MIT Press. The book examines why and how individuals organize their personal digital information, as well as how new PIM systems can make this process more efficient. It has three parts: Personal Information Management: The Curation Perspective, Hierarchical Folders and Their Alternatives, and The User-Subjective Approach to PIM Systems Design.

References

  1. Bergman, Ofer (2003). "The user-subjective approach to personal information management systems". Journal of the American Society for Information Science and Technology. 54 (9): 872–878. CiteSeerX   10.1.1.490.2515 . doi:10.1002/asi.10283.
  2. Bergman, Ofer (2008). "The user-subjective approach to personal information management systems design: Evidence and implementations". Journal of the American Society for Information Science and Technology. 59 (2): 235–246. doi: 10.1002/asi.20738 .
  3. "ASIS Best JASIS Paper Award Winners". www.asis.org. Archived from the original on 2000-04-22.
  4. Bergman, Ofer; Tucker, Simon; Beyth-Marom, Ruth; Cutrell, Edward; Whittaker, Steve (2009). "It's not that important". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 269–278. doi:10.1145/1518701.1518745. ISBN   9781605582467. S2CID   10439702.
  5. "ALA | Midwinter 2004". www.ala.org. Archived from the original on 2008-11-30.
  6. Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi (2006). "The project fragmentation problem in personal information management". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 271–274. doi:10.1145/1124772.1124813. ISBN   1595933727. S2CID   15957066.
  7. Wiley Interscience [ dead link ]