Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleDecember 2015
Smartphone-based public health information systems: Anonymity, privacy and intervention
Journal of the Association for Information Science and Technology (JAIST), Volume 66, Issue 12Pages 2596–2608https://doi.org/10.1002/asi.23356The pervasive availability of smartphones and their connected external sensors or wearable devices can provide a new public health data collection capability. Current research and commercial efforts have concentrated on sensor-based collection of health ...
- articleNovember 2014
Teacher Personal information management PIM practices: Finding, keeping, and Re-Finding information
Journal of the Association for Information Science and Technology (JAIST), Volume 65, Issue 11Pages 2261–2277https://doi.org/10.1002/asi.23117Primary and secondary K-12 teachers form the essential core of children's formal learning before adulthood. Even though teaching is a mainstream, information-rich profession, teachers are understudied as information users. More specifically, not much is ...
- research-articleMarch 2013
Human interactive secure key and identity exchange protocols in body sensor networks
IET Information Security (ISE2), Volume 7, Issue 1Pages 30–38https://doi.org/10.1049/iet-ifs.2012.0080A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key ...
- articleDecember 2011
Turning the desktop inside-out: Evaluating information access and management through a single interface
Journal of the American Society for Information Science and Technology (JASIST), Volume 62, Issue 12Pages 2327–2346https://doi.org/10.1002/asi.21627Computer users today rely on a wide variety of software tools to manage an ever-increasing amount of information and resources. We developed the Global Information Gatherer (GIG) system to help students in higher education manage, understand, and keep ...
- research-articleOctober 2011
An approach and tool support for assisting users to fill-in web forms with personal information
SIGDOC '11: Proceedings of the 29th ACM international conference on Design of communicationPages 195–202https://doi.org/10.1145/2038476.2038515Web forms are massively used as a very effective way for user interaction with information systems. Notwithstanding, filling in forms with personal data can be tedious and repetitive. Due to legal and technical constraints, full interoperability of ...
- articleDecember 2010
The effect of folder structure on personal file navigation
Journal of the American Society for Information Science and Technology (JASIST), Volume 61, Issue 12Pages 2426–2441Folder navigation is the main way that personal computer users retrieve their own files. People dedicate considerable time to creating systematic structures to facilitate such retrieval. Despite the prevalence of both manual organization and navigation, ...
- articleMarch 2010
Requirements for the design of a personal document-management system
Journal of the American Society for Information Science and Technology (JASIST), Volume 61, Issue 3Pages 468–482In this article a set of requirements for the design of a personal document management system is presented, based on the results of three research studies (Bondarenko, [2006]; Bondarenko & Janssen, [2005]; Bondarenko & Janssen, [2009]). We propose a ...
- articleMay 2009
Connecting visual cues to semantic judgments in the context of the office environment
Journal of the American Society for Information Science and Technology (JASIST), Volume 60, Issue 5Pages 933–952In this article, we present the results of a study that systematically explored “externalized knowledge” in the context of office work. The aim of the study was to investigate what knowledge information workers externalize into their physical ...
- articleJanuary 2008
The persistence of behavior and form in the organization of personal information
Journal of the American Society for Information Science and Technology (JASIST), Volume 59, Issue 2Pages 307–317This study revisits managers who were first interviewed more than 10 years ago to identify their personal information management (PIM) behaviors. The purpose of this study was to see how advances in technology and access to the Web may have affected ...
- articleJanuary 2008
The user-subjective approach to personal information management systems design: Evidence and implementations
Journal of the American Society for Information Science and Technology (JASIST), Volume 59, Issue 2Pages 235–246Personal Information Management (PIM) is an activity in which an individual stores personal information items to retrieve them later. In a former article, we suggested the user-subjective approach, a theoretical approach proposing design principles with ...
- articleDecember 2007
- articleJuly 2003
Logical and physical design issues for smart card databases
ACM Transactions on Information Systems (TOIS), Volume 21, Issue 3Pages 254–285https://doi.org/10.1145/858476.858478The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. We propose a joint approach to the logical and physical database design phases and evaluate ...
- ArticleDecember 2000
The Roma personal metadata service
People now have available to them a diversity of digital storage devices, including palmtops, cell phone address books, laptops, desktop computers and Web-based services. Unfortunately, as the number of personal data repositories increases, so does the ...
- articleMarch 1985
Personal information systems for strategic scanning in turbulent environments: can the CEO go on-line?
As the business environment becomes more complex and dynamic, it becomes increasingly vital for top executives to scan the information environment to identify strategic threats and opportunities. This article seeks to understand the strategic scanning ...