Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/778712.778740acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
Article

Innovation in extremis: evolving an application for the critical work of email and information management

Published: 25 June 2002 Publication History

Abstract

We describe our experience of trying to develop a novel application that transforms information management (both coordination-based and personal) from stand-alone resources into resources deeply embedded in email. We explored two models for accomplishing this goal; these were to embed these resources in the email channel and to embed them in the client. Our exploration of the first model was intensive, in-depth and ultimately unsuccessful in large part due to our design process. We adopted Extreme Programming (XP) as a means to explore our second model more efficiently. This paper describes our motivations and experiences while exploring our first model before XP and then the advantages and disadvantages of turning to XP in the exploration of our second model.

References

[1]
Barreau, D.K. and Nardi, B. (1995). Finding and reminding: File organization from the desktop. ACM SIGCHI Bulletin, 27(3), 39--43.
[2]
Beck, K. (2000) Extreme Programming Explained. Reading, MA: Addison Wesley.
[3]
Bellotti, V., & Smith, I. (2000). Informing the design of an information management system with iterative fieldwork In Conference proceedings on designing interactive systems: processes, practices, methods, and techniques (pp. 227--237). August 17--19, 2000, Brooklyn, NY.
[4]
Beyer, H. & Holtzblatt K. (1997) Contextual Design. San Francisco: Morgan Kaufmann.
[5]
Brooks, Fred (1975). The Mythical Man-Month. Reading, MA: Addison-Wesley.
[6]
DeSanctis, G., & Peele, M. S. (1994). Capturing the complexity in advanced technology use: adaptive structuration theory. Organization science, 5(2), 121--147.
[7]
Ducheneaut, N., & Bellotti, V. (2001). Email as habitat: an exploration of embedded personal information management. Interactions, 8(5), 30--38.
[8]
Ducheneaut, N., & Bellotti, V. Ceci n'est pas un objet? Talking about objects in email. Journal of Human-Computer Interactio., Forthcoming.
[9]
Ducheneaut, N., & Bellotti, V. A study of email work activities in three organizations (Working paper): Xerox PARC. Forthcoming.
[10]
Extreme Programming. http://www.extremeprogramming.org
[11]
Jeffries, R., Anderson, A. & Hendrickson, C. (2001). Extreme Programming Installed. Reading, MA: Addison Wesley.
[12]
Lansdale, M. (1983). The psychology of personal information management. Applied Ergonomics 19, 55--66.
[13]
Mackay, W. E. (1988). More than just a communication system: diversity in the use of electronic mail. In Proceedings of the conference on computer-supported cooperative work. September 26--28, 1988, Portland, OR.
[14]
Malone, T. W. (1983). How do people organize their desks? Implications for the design of office information systems. ACM Transactions on Office Information Systems, 1, 99--112.
[15]
Venolia, G. Dabbish, L., Cadiz, J., & Gupta, A. (2001) Supporting Email Workflow, MSR-TR-2001-88.
[16]
Whittaker, S., & Sidner, C. (1996). Email overload: exploring personal information management of email. In Conference proceedings on Human factors in computing systems (pp. 276--283). April 13--18, 1996, Vancouver.

Cited By

View all
  • (2023) Conversations on the Invisibility of PIM , Approaching Themes, and New Avenues of Research Proceedings of the Association for Information Science and Technology10.1002/pra2.81460:1(553-559)Online publication date: 22-Oct-2023
  • (2021)Personal information management through ubiquitous devices: Students’ mobile self-efficacy and PIM practicesJournal of Librarianship and Information Science10.1177/096100062199282154:2(174-187)Online publication date: 16-Feb-2021
  • (2020)What May Library and Information Science Offer to Personal Information Management?Zagadnienia Informacji Naukowej - Studia Informacyjne10.36702/zin.64658:1(115)(40-55)Online publication date: 24-Jun-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DIS '02: Proceedings of the 4th conference on Designing interactive systems: processes, practices, methods, and techniques
June 2002
413 pages
ISBN:1581135157
DOI:10.1145/778712
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Extreme Programming
  2. Personal Information Management
  3. TaskMaster
  4. ThinkDoc
  5. XP
  6. email
  7. workflow

Qualifiers

  • Article

Conference

DIS02
Sponsor:
DIS02: Designing Interactive Systems 2002
June 25 - 28, 2002
London, England

Acceptance Rates

DIS '02 Paper Acceptance Rate 44 of 139 submissions, 32%;
Overall Acceptance Rate 1,158 of 4,684 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023) Conversations on the Invisibility of PIM , Approaching Themes, and New Avenues of Research Proceedings of the Association for Information Science and Technology10.1002/pra2.81460:1(553-559)Online publication date: 22-Oct-2023
  • (2021)Personal information management through ubiquitous devices: Students’ mobile self-efficacy and PIM practicesJournal of Librarianship and Information Science10.1177/096100062199282154:2(174-187)Online publication date: 16-Feb-2021
  • (2020)What May Library and Information Science Offer to Personal Information Management?Zagadnienia Informacji Naukowej - Studia Informacyjne10.36702/zin.64658:1(115)(40-55)Online publication date: 24-Jun-2020
  • (2018)Forgotten But Not GoneProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3174117(1-12)Online publication date: 21-Apr-2018
  • (2014)Fundamental personal information management activities – Organisation, finding and keeping: a literature reviewThe Australian Library Journal10.1080/00049670.2013.87545263:1(45-51)Online publication date: 13-Mar-2014
  • (2013)Research on Personal Information ManagementProceedings of the 2013 International Conference on Computational and Information Sciences10.1109/ICCIS.2013.105(371-374)Online publication date: 21-Jun-2013
  • (2011)Information at your fingertipsProceedings of the 16th international conference on Intelligent user interfaces10.1145/1943403.1943434(205-214)Online publication date: 13-Feb-2011
  • (2010)Design from the everydayProceedings of the 8th ACM Conference on Designing Interactive Systems10.1145/1858171.1858222(282-291)Online publication date: 16-Aug-2010
  • (2009)Detecting the MinimalMinimalism10.1007/978-1-84882-371-6_6(125-237)Online publication date: 10-Mar-2009
  • (2008)Personal Information ManagementAnnual Review of Information Science and Technology10.1002/aris.2007.144041011741:1(453-504)Online publication date: 24-Oct-2008
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media