379 results on '"Personal information management"'
Search Results
2. Power in the Home: Digital Housekeeping and Its Relevance to Information Behaviour, PIM, and Information Ethics.
- Author
-
Ochsner, Catharina and Dinneen, Jesse David
- Subjects
- *
INFORMATION-seeking behavior , *INFORMATION ethics , *INFORMATION science , *LIBRARY science , *PERSONAL information management - Abstract
Digital housekeeping (DH) is an emerging research topic focused on the labour and social implications of setting up and maintaining technology in the home. Although examined by multiple fields, the literature on DH has yet to be reviewed and its potential overlap and synergy with library and information science (LIS) have yet to be explored. We therefore conducted a tool‐supported review of 26 scholarly publications on DH. Below we summarise the people‐ and relationship‐focused sub‐topics and findings of DH literature and explore promising directions for future research in LIS, particularly in information behaviour and personal information management. The poster visually maps the sub‐topics and disciplinary connections. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Data sharing agreements: Contracting personal information in the digital age
- Author
-
Krebs, Shiri and Bennett Moses, Lyria
- Published
- 2024
4. Athlete activism: Advancing socio-political causes at mega sporting events
- Author
-
McDonald, Sharyn and Marshall, P David
- Published
- 2023
5. ESPRESSO: A Framework to Empower Search on the Decentralized Web: ESPRESSO: A Framework to Empower...: M. Ragab et al.
- Author
-
Ragab, Mohamed, Savateev, Yury, Oliver, Helen, Tiropanis, Thanassis, Poulovassilis, Alexandra, Chapman, Adriane, and Roussos, George
- Subjects
PERSONAL information management ,PERSONALLY identifiable information ,ACCESS control ,DATA science ,INTERNET searching - Abstract
The increasing centralization of the Web raises serious concerns regarding privacy, security, and user autonomy. In response, there has been a renewed interest in the development of secure personal information management systems and a movement towards decentralization. Decentralized personal online data stores (pods) represent a revolutionary example within this movement, built on the W3C's existing guidelines – an approach exemplified by initiatives such as Solid (https://solidproject.org). In the Solid paradigm, individuals store their personal data in pods and have absolute discretion when choosing to grant access to different users and applications. A barrier to the adoption of the pod approach is the predominant reliance on centralized indexes for search functionality in current Web and Web-based systems. This paper introduces the ESPRESSO framework, which is designed to facilitate this new paradigm of large-scale searches within personal data stores while respecting the individual pod owners' data access governance. The current ESPRESSO prototype integrates access control within pod indexes to enhance distributed keyword-based search. ESPRESSO's unique contribution not only enhances search capabilities on the decentralized Web but also paves the way for future explorations in decentralized search technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. “I wish I could use any language as it comes to mind”: User experience in digital platforms in the context of multilingual personal information management.
- Author
-
Alon, Lilach and Krtalić, Maja
- Subjects
- *
PERSONAL information management , *LINGUISTIC context , *USER experience , *DIGITAL technology , *INFORMATION retrieval - Abstract
In today's linguistically diverse world, managing personal information across multiple languages presents a challenge. This study engaged 16 multilingual participants to explore their user experience in the context of multilingual personal information management (MPIM), with a focus on inclusivity, universality, and equity. Addressing two main questions, the study explores the challenges users face on digital platforms in MPIM contexts and their ideal platform features. Findings highlight key issues in MPIM platform design, including unsupported languages and integration of visual aesthetics. We also identify user preferences for ideal platform features, such as language flexibility and efficient information retrieval. The study suggests the need for more inclusive, universal, and equitable platform designs that cater to the specific requirements of multilingual users. Ultimately, this study underscores the critical need for improved MPIM support and emphasizes the significance of continued exploration in this area, establishing it as a vital field of future research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Personal cultural heritage management: a conceptual framework for constructing and curating cultural identities through personal collections.
- Author
-
Krtalić, Maja and Alon, Lilach
- Subjects
- *
ACCULTURATION , *CULTURAL identity , *SELF , *CULTURAL property , *PERSONAL information management , *SELF-efficacy - Abstract
Purpose: This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It elaborates on the literature background and the development of the PCHM framework, highlighting the role of personal information management (PIM) and personal collections in the creation, access and utilization of cultural heritage information. Design/methodology/approach: The study describes and explains the construction of the PCHM framework as a structured and self-motivated approach to personal heritage and identity learning. Findings: Following the theoretical background and assumptions, along with the presentation of the key building blocks, the paper describes the key components of the framework, outlines their definitions and provides examples. Research limitations/implications: Theoretically, PCHM extends the current literature by encapsulating processes and actions employed by individuals to manage personal collections for cultural identity purposes, thereby underscoring the critical role personal collections play in both preserving and communicating cultural heritage. Practical implications: PCHM can guide the development of support systems and policies to enhance cultural continuity and integration, thus empowering individuals to navigate their cultural identities confidently. Originality/value: The PCHM framework creates a unique intersection between PIM and cultural heritage, providing a new perspective for understanding the dynamic evolution and formation of cultural identity among migrants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Personal Information Is Property.
- Author
-
Harper, Jim
- Subjects
- *
CIVIL law , *PERSONAL information management - Abstract
Over the recent half-decade of privacy concern, the dominant intellectual and scholarly approach to privacy in the United States has been in the civil law tradition, assuming that statute law and administrative regulation would provide the rules. When legal thinkers of an economic bent pondered "propertizing" information at the dawn of the Internet era, they remained in the civilian mold, as most envisioned designing a property regime for personal information, not inding one, as judges do in the common law tradition. Meanwhile, information has acquired the characteristics of property in the common law sense. Consumers and businesses each in their way and for their purposes withhold or hoard personal information, trade it, process it, profit from it, and enjoy other rights to personal information in the "bundle of sticks" that make up property rights. It is time to recognize that important development. After reviewing legal scholarship in this area, this article defines information and personal information for the purposes of legal administration. Then it shows how online service providers' contract terms divvy up property rights in the information shared and created in the course of their relationships with customers. These contracts generally give the right to possession and use of this information to the service provider while keeping the right to exclude others, on the whole, with the consumer. These contracts do not create mere rights between parties. They have as their subject matter an item of property in which people have a right against the world. U.S. Supreme Court cases validate this view, as do state supreme courts. America's highest Court has treated information as property in the common-law sense and contracts as allocations of property rights. Select state supreme courts have recognized information as property subject to conversion actions. It is a widely held premise in federal appeals court actions dealing with information that the thing at issue is property, even while the primacy of statute law has deflected courts from finding directly that information is property according to common law. In several respects, recognizing information as property protects consumers and enhances their rights vis a vis both service providers and third parties. Common treatment of personal information as property squares with a number of property theories. Parallels can be observed between the pre-historic development of property rights in land, property rights in movables historically, and property rights in information in the present day. A number of concerns and challenges stem from recognition of information as property. One springs from the pitfalls of designing a property rights regime, which common law recognition does not do. Recognizing property rights in information also does not imply that all property is owned; conventional property theory provides the dividing line between owned and unowned information. Diminution of speech could result from recognition of property rights in information, but the First Amendment does not create a right to take others' information. Courts can police the appropriate line between people's information and others' capacity to acquire and use it. [ABSTRACT FROM AUTHOR]
- Published
- 2024
9. How does organizational support for innovation influence job crafting and knowledge sharing behaviors? A comparison between teleworkers and office workers.
- Author
-
Mansour, Sari and Mohanna, Dima
- Subjects
- *
CAREER development , *PERSONAL information management , *PERSONNEL management , *EMPLOYEE attitudes , *ORGANIZATIONAL behavior , *MANAGERIAL accounting , *SCHOOL absenteeism , *ACCOUNTING students - Published
- 2024
- Full Text
- View/download PDF
10. 数字平台个人信息保护政策第三方评估的 规范路径.
- Author
-
杨永建 and 寿晓明
- Subjects
INFORMATION policy ,INFORMATION networks ,DELEGATED legislation ,REGULATORY compliance ,DIGITAL technology ,PERSONAL information management - Abstract
Copyright of Journal of Chengdu University (Social Science) is the property of Journal of Chengdu University (Social Science Edition) Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
11. Perspektif Hukum terhadap Privasi dan Perlindungan Data Pribadi di Era Digital.
- Author
-
Saputra, Clifford Deannova, Saputra, Gilang Septiawan, Aprilliani, Fitri, and Martinelli, Imelda
- Subjects
DATA protection ,DIGITAL technology ,DATA protection laws ,PERSONALLY identifiable information ,IDENTITY theft ,PERSONAL information management ,PASSPORTS - Abstract
Copyright of Jurnal Ilmu Hukum, Humaniora dan Politik (JIHHP) is the property of Dinasti Publisher and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
12. Blurring the moral limits of data markets: biometrics, emotion and data dividends.
- Author
-
Bakir, Vian, Laffer, Alexander, and McStay, Andrew
- Subjects
- *
PERSONAL information management , *INFORMATION resources management , *PERSONALLY identifiable information , *BIOMETRIC identification , *TECHNOLOGICAL innovations - Abstract
This paper considers what liberal philosopher Michael Sandel coins the 'moral limits of markets' in relation to the idea of paying people for data about their biometrics and emotions. With Sandel arguing that certain aspects of human life (such as our bodies and body parts) should be beyond monetisation and exchange, others argue that emerging technologies such as Personal Information Management Systems can enable a fairer, paid, data exchange between the individual and the organisation, even regarding highly personal data about our bodies and emotions. With the field of data ethics rarely addressing questions of payment, this paper explores normative questions about data dividends. It does so by conducting a UK-wide, demographically representative online survey to quantitatively assess adults' views on being paid for personal data about their biometrics and emotions via a Personal Information Management System, producing a data dividend, a premise which sees personal data through the prism of markets and property. The paper finds diverse attitudes based on socio-demographic characteristics, the type of personal data sold, and the type of organisation sold to. It argues that (a) Sandel's argument regarding the moral limits of markets has value in protecting fundamental freedoms of those in society who are arguably least able to (such as the poor); but (b) that contexts of use, in particular, blur moral limits regarding fundamental freedoms and markets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. A Sociosemiotic Exploration of Personal Information Legislation in the United States and China.
- Author
-
Cheng, Le and Hu, Xitao
- Subjects
- *
INFORMATION technology security , *DIGITAL technology , *LEGAL documents , *STANDARDS , *PERSONALLY identifiable information , *PERSONAL information management ,CHINA-United States relations - Abstract
Personal information security has become a critical concern in the digital era, so it is imperative to clearly delimit and define personal information. This study examines personal information legislation from a sociosemiotic perspective to identify the similarities and differences between legislation in the United States and China. It reviews the evolution of personal information in both countries, and explores their differences in the definition of privacy, the status quo of personal information legislation, the definition of personal information and cross-border personal information flow. The findings indicate that (1) personal information, noted as a social sign, has context-sensitive characteristics, i.e., spatiality and temporality; (2) the meaning-making process of personal information is a continuum; and (3) there exists an intersemiotic operation between language, law and society. Such a sociosemiotic exploration can shed light on relevant studies in the sociosemiotic analysis of legal discourse in particular as well as other context-sensitive discourses in general. Plain Language Summary: Purpose: This research explores personal information legislation in the United States and China, using a socio-semiotic lens to illuminate the symbolic meanings of personal information in today's digital world. Methods: Utilizing textual comparison and case analysis, the study systematically compares legal documents and precedents from both countries related to personal information, examining through the semiotic lenses of temporality and spatiality. Conclusions: The study finds that personal information, as a sign, has inherent spatial and temporal attributes. Its meaning, while continuously evolving with technology, is majorly focused on personally identifiable information in both U.S. and Chinese laws. A notable contrast is highlighted in the spatial aspect within the U.S. and China's legal frameworks, shaped by distinct legal traditions and societal values. Implications: The research highlights the crucial role of international collaboration, like the GDPR enforcement, in addressing legal differences and conflicts across countries. Developing international standards in personal information protection is vital for advancing relevant industries and ensuring global digital ecosystem stability. Limitations: While providing a detailed analysis, the study's focus on socio-semiotics and legal texts might overlook other essential aspects of personal information legislation and actual enforcement practices in real-world scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Training Tomorrow's Security Experts in AI and LLM Application Security.
- Author
-
Shah, Parth
- Subjects
LANGUAGE models ,GENERATIVE artificial intelligence ,GENERAL Data Protection Regulation, 2016 ,DATA privacy ,PERSONAL information management - Abstract
The article discusses the importance of training future security professionals in AI and LLM application security due to the rapid adoption of AI technology. It emphasizes the need for foundational AI knowledge, understanding risks specific to GenAI and LLM, and compliance with regulatory requirements like the EU AI Act. The text also highlights the OWASP Top 10 risks for LLMs and the significance of hands-on training, simulation-based learning, and industry certifications to prepare professionals for securing AI systems effectively. Overall, the focus is on building expertise in AI security to ensure safety, privacy, and ethical responsibility in the deployment of AI technologies. [Extracted from the article]
- Published
- 2025
15. Personal information management practices: how scientists find and organize information
- Author
-
Chaudhry, Abdus Sattar and Alajmi, Bibi M.
- Published
- 2024
- Full Text
- View/download PDF
16. What drives digital hoarding? Understanding the impact of perceived value and the mediating role of security on digital hoarding behavior
- Author
-
Zhang, Xiaoxue and Chen, Xuewei
- Published
- 2025
- Full Text
- View/download PDF
17. Employee Self-Service: A Cornerstone Of Modern HR Operations: Employee experience in a digitally transformed workplace.
- Author
-
Prakash, Ashish
- Subjects
HUMAN resources departments ,PERSONNEL management ,CAREER development ,TELECOMMUTING ,FLEXIBLE work arrangements ,ORGANIZATIONAL resilience ,DASHBOARDS (Management information systems) ,PERSONAL information management - Published
- 2024
18. TEXTPOCALYPSE NOW.
- Author
-
SCOLA, NANCY
- Subjects
DEMOCRATS (United States) ,POLITICAL communication ,GOVERNMENT policy ,SUPREME Court justices (U.S.) ,TELECOMMUNICATION ,COINCIDENCE ,VOTER turnout ,PERSONAL information management - Abstract
The article focuses on the rise and frustrations of political texting campaigns. Topics include the evolution of political communication from traditional methods to texting, the effectiveness and drawbacks of political texting, and the increasing annoyance for recipients as campaigns become more aggressive in their outreach.
- Published
- 2024
19. Exploring the Mental Model of Web Page Scrap: Design Suggestion of an AI-Powered In-Browser Scrap Tool and Its Usability Evaluation.
- Author
-
Jo, Jeongmin, Kim, Sangyeon, and Lee, Sangwon
- Subjects
- *
PERSONAL information management , *RECOMMENDER systems , *WEBSITES , *ARTIFICIAL intelligence , *USER interfaces - Abstract
AbstractPeople use diverse read-it-later tools to save webpages for future uses; however, difficulties in scrap retrieval remain. Our study aims to understand users’ mental models of read-it-later tools and suggests a new tool, Read-It-Now, for web scraping. We conducted interviews to identify web scraping habits and developed four main design recommendations for read-it-later tools: tool hierarchy, contextual aids, proactive triggers, and multiple navigation strategies. With a focus on the proactive trigger that facilitates scrap retrieval, Read-It-Now is designed to recommend relevant web scraps based on a comparison of the title of the current browser tab. We tested the design prototype against traditional bookmarks and found that users preferred Read-It-Now because of its simplicity and effectiveness; however, explanations for scrap recommendations could be improved. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. An opportunity to stay connected: documenting personal communication records of military personnel.
- Author
-
Martell, Allan A. and Benoit III, Edward
- Subjects
UNITED States armed forces ,PERSONAL communication service systems ,PERSONAL information management ,MILITARY dependents ,MILITARY personnel - Abstract
While service and operational records of the US armed forces have been previously investigated, personal communication records of military personnel have received less attention in archival scholarship. Specifically, we are concerned with the ways that changes in technology challenge the preservation of personal communications records. This issue is important because personal communication records of service members, both active and retired, can support military personnel and their families in managing the stress of deployment. Moreover, such records can help military families cope with grief when a service member dies. In this study, we address this gap by exploring the communication practices of US military personnel who served between 2005 and 2020. We focus on how military personnel communicated with their friends and family, the records that resulted from such communications, and the impacts of information technologies and institutional policies of the armed forces in said recordkeeping practices. We found that these practices evolved in tandem with the information and communication technologies available to them, that military personnel employed a relational approach to records and recordkeeping, and that recordkeeping practices of personal communications were directly connected to factors such as the information policies of the armed forces and the blurred lines between the on and off duty lives of active service members. Based on our findings, we suggest that future work should develop guidelines that help service members and their families prioritize which personal communications to record and keep. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. An Investigation of the Relationship Between Imagery and Sportive Confidence in Volleyball Athletes.
- Author
-
ÇAKICI, Yılmaz and ARSLANGÖRÜR, Aslıhan
- Subjects
VOLLEYBALL players ,SELF-confidence ,PERSONAL information management ,ONE-way analysis of variance ,T-test (Statistics) - Abstract
Copyright of Eurasian Journal of Sport Sciences & Education / Avrasya Spor Bilimleri ve Eğitim Dergisi is the property of Eurasian Journal of Sport Sciences & Education and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
22. The validity and reliability study of the theory of mind inventory-2 (TOMI-2) Turkish version.
- Author
-
Ertürk, Canan Keleş and Tepeli, Kezban
- Subjects
THEORY of mind ,CONFIRMATORY factor analysis ,PERSONAL information management ,EXPLORATORY factor analysis ,TRUTHFULNESS & falsehood - Abstract
This study aims to conduct the Turkish adaptation, validity, and reliability study of the Theory of Mind Inventory-2 (TOMI-2) developed by Hutchins and Prelock (2016) for 3-5-year-old children. The study group consists of 310 mothers with children in the 3-5 age group in Konya city center. Personal Information Form and Theory of Mind Inventory-2 (TOMI-2) were used as data collection tools in the study. After the TOMI-2 was translated into Turkish, the normality assumption was checked with the "Shapiro-Wilk" test. The relationship between two continuous variables was evaluated with the Pearson Correlation Coefficient. Exploratory Factor Analysis, Confirmatory Factor Analysis, Content Validity, Criterion Validity, and Reliability analyses were also used in the study. The findings of the analyses show that the Turkish version of the TOMI-2 is a valid and reliable measurement tool for children aged 3-5, with 60 items in the original form. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. "I Really Need Your Help with This Work...": A System for Navigating the Tricky Terrain of Managing Up by Leveraging One's Motivation to Get Things Done.
- Author
-
Park, Soya, Vishwabhan, Stuti, Muller, Michael, and Karger, David R.
- Subjects
PERSONAL information management ,HUMAN-computer interaction ,AGILE software development ,GROUP decision making ,COVID-19 pandemic ,SHARED workspaces ,ONLINE chat ,VIRTUAL communities - Published
- 2024
- Full Text
- View/download PDF
24. Design and Implementation of a Personalized News System Based on SSM Architecture.
- Author
-
Mingye Liu
- Subjects
- *
PERSONAL information management , *DATABASES , *RECOMMENDER systems , *INFORMATION overload , *INFORMATION storage & retrieval systems - Abstract
In today's information age, personalized recommendations have permeated every aspect of people's lives, becoming an indispensable service on major mainstream websites. By considering users' past interaction habits and preferences, personalized recommendation systems cater to the unique needs of individuals, presenting content that aligns with their interests. However, research on news recommendations, compared to fields such as ecommerce and music, remains relatively scarce and faces significant challenges, particularly in identifying news choices that may engage readers amidst information overload. This study designed and implemented a personalized hot news recommendation mechanism based on collaborative filtering technology. The system was developed using the SSM framework, incorporating software engineering principles with UML modeling. The front-end interface was built and deployed using the Bootstrap framework, while the back-end interface construction was supported by the Layui front-end framework. MySQL served as the storage system for news information. The core services of the personalized news push system include user account creation and login, personal information management, information search, news content evaluation, customized content push, and administrator-end information supervision. The customized push service, in particular, relies on collaborative filtering technology, tag-based recommendation strategies, and mechanisms for tracking current hot topics to achieve its goals. [ABSTRACT FROM AUTHOR]
- Published
- 2024
25. Gaining or Losing Control? An Empirical Study on the Real Use of Data Control Rights and Policy Implications.
- Author
-
Corren, Ella
- Subjects
- *
DATA protection , *DATA privacy , *CAPITALISM , *STATE laws , *PERSONAL information management - Abstract
Privacy concerns are on the rise, and lawmakers and regulators around the world are responding with widespread legislative action led by the United States and the European Union. The California Consumer Privacy Act ("CCPA") and many other state laws across the United States, together with congressional proposals, the European Union's General Data Protection Regulation, and similar laws in the rest of the world, all provide people with new data control rights. The formal objective of these rights is to provide control over people's personal information, and they include the right to access one's personal information, the right to delete it, and the right to opt-out of its sale to third parties. Data control rights are the centerpiece of all these new laws and the ultimate response we are seeing to concerns about surveillance capitalism. But do data control rights work in practice? This Article empirically investigates whether consumers use their data control rights. It leverages a unique opportunity to answer this crucial and thus far open question, presented by the CCPA. This Article is based on an original dataset: It collects and analyzes, for the first time, usage metrics reported by firms under a CCPA Regulations requirement. This Article adds a novel contribution to the discussion about data control rights and the regulation of the information economy more broadly--part theoretical, part empirical, and part normative. First, this Article explores the origins of data control rights and the goals that have shaped them. To study the effectiveness of a law, it is necessary to compare its intended goals and idealized theoretical outcomes with a measurement of the real-world outcomes that the law has generated. [ABSTRACT FROM AUTHOR]
- Published
- 2024
26. The relationship between social media addiction and emotion regulation skills and sleep quality of university students.
- Author
-
Ozer, Nesrin, Tanriverdi, Derya, and Ozguc, Safiye
- Subjects
- *
SOCIAL media , *COLLEGE students , *EMOTION regulation , *SLEEP quality , *PERSONAL information management - Abstract
Aim: In current study, we aimed to determine relationship between social media addictions, emotion regulation skills and sleep quality of university students. Materials and Methods: Research was conducted in descriptive design. The sample of study consisted of 450 university students. Personal information form, Social Media Addiction Scale (SMAS), Cognitive Emotion Regulation Questionnaire (CERQ) and Pittsburgh Sleep Quality Index (PSQI) were used to obtain the data. Results: The mean total score of the SMAS of the students is 97.33±26.78. Mean scores of sub-dimensions of CERQ "Self-Blame", "Acceptance", " Rumination", "Positive Refocusing", "Refocusing on Plan", "Positive Reappraisal ", " Putting into Perspective", " Catastrophising " and "Blaming Others" are respectively; 11.23±2.78, 11.85±2.80, 13, .32±3.17, 12.19±2.81, 13.78±3.24, 13.44±3.32, 12.36±2.90, 10.40±2.95, 10.61±2.97. The mean total score of was PSQI 7.91±3.01. Conclusion: It was found that 31.5% of university students are moderately addicted to social media and their sleep quality is poor. As social media addiction increases, sleep quality worsens. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. 迈向 “风险” 范式的侵犯公民个人信息罪 之教义学重构.
- Author
-
李昱
- Subjects
CRIME ,COPYRIGHT infringement ,PERSONAL information management ,CONSENT (Law) ,ILLEGALITY - Abstract
Copyright of Journal of Soochow University Law Edition is the property of Soochow University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
28. Data Collection of Real-Life Knowledge Work in Context: The RLKWiC Dataset
- Author
-
Bakhshizadeh, Mahta, Jilek, Christian, Schröder, Markus, Maus, Heiko, Dengel, Andreas, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, and Li, Shuliang, editor
- Published
- 2024
- Full Text
- View/download PDF
29. 'Words Are not just Words; They Carry Experiences Within Them': Navigating Personal Information Management in Multilingual Contexts
- Author
-
Alon, Lilach, Krtalić, Maja, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Sserwanga, Isaac, editor, Joho, Hideo, editor, Ma, Jie, editor, Hansen, Preben, editor, Wu, Dan, editor, Koizumi, Masanori, editor, and Gilliland, Anne J., editor
- Published
- 2024
- Full Text
- View/download PDF
30. 'My Personal Doctor Will not Be Replaced with Any Robot Service!': Older Adults’ Experiences with Personal Health Information and eHealth Services
- Author
-
Enwald, Heidi, Eriksson-Backa, Kristina, Hirvonen, Noora, Huvila, Isto, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Kurbanoğlu, Serap, editor, Špiranec, Sonja, editor, Boustany, Joumana, editor, Ünal, Yurdagül, editor, Şencan, İpek, editor, Kos, Denis, editor, Grassian, Esther, editor, Mizrachi, Diane, editor, and Roy, Loriene, editor
- Published
- 2024
- Full Text
- View/download PDF
31. Personal factors and the role of memory in faculty refinding of stored information
- Author
-
Nwagwu, Williams Ezinwa and Donkor, Antonia Bernadette
- Published
- 2024
- Full Text
- View/download PDF
32. A case study: Applying information security classification
- Author
-
Fox, Uta
- Published
- 2024
33. ‘Alexa, play metal’: exploring music selection and personal information management via voice assistants
- Author
-
Jochen Steffens, Jesse David Dinneen, Sascha Donner, and Tom Potthoff
- Subjects
virtual voice assistants ,music listening ,personal information management ,voice user interfaces ,Bibliography. Library science. Information resources - Abstract
Introduction. Music streaming services have changed how music is played and perceived, but also how it is managed by individuals. Voice interfaces to such services are becoming increasingly com-mon, for example through voice assistants on mobile and smart devices, and have the poten-tial to further change personal music management by introducing new beneficial features and new challenges. Method. To explore the implications of voice assistants for personal music listening and management we surveyed 248 participants online and in a lab setting to investigate (a) in which situa-tions people use voice assistants to play music, (b) how the situations compare to established activities common during non-voice assistant music listening, and (c) what kinds of com-mands they use. Analysis. We categorised 653 situations of voice assistant use, which reflect differences to non-voice assistant music listening, and established 11 command types, which mostly reflect finding or refinding activities but also indicate keeping and organisation activities. Results. Voice assistants have some benefits for music listening and personal music management, but also a notable lack of support for traditional personal information management activities, like browsing, that are common when managing music. Conclusion. Having characterised the use of voice assistants to play music, we consider their role in per-sonal music management and make suggestions for improved design and future research.
- Published
- 2024
- Full Text
- View/download PDF
34. The future of PIM: pragmatics and potential.
- Author
-
Dix, Alan
- Subjects
- *
PRAGMATICS , *PERSONAL information management - Abstract
While there are challenges in transferring personal information management (PIM) research into products, PIM research does, over time, filter through into commercial systems, and practical systems often exhibit innovation that can guide future PIM research. This paper uses two approaches to understand some potential future directions for PIM research and practice. First, it deconstructs the term “personal information management” to understand how PIM techniques and tools intersect with other academic areas. Second, it examines a small selection of popular PIM tools to see how they shed light on actual adoption of PIM systems. It uses lessons from these in a more open discussion of potential future developments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Applying Object Detection and Large Language Model to Establish a Smart Telemedicine Diagnosis System with Chatbot: A Case Study of Pressure Injuries Diagnosis System.
- Author
-
Chen, Chun-Chia, Wei, Chia-Jung, Tseng, Tsung-Yu, Chiu, Ming-Chuan, and Chang, Chi-Chang
- Subjects
- *
LANGUAGE models , *OBJECT recognition (Computer vision) , *CHATBOTS , *RESPONSIVE web design , *PERSONAL information management , *PRESCRIPTION writing , *HELPLINES , *PRESSURE ulcers - Abstract
Background: The scarcity of medical resources and personnel has worsened due to COVID-19. Telemedicine faces challenges in assessing wounds without physical examination. Evaluating pressure injuries is time consuming, energy intensive, and inconsistent. Most of today's telemedicine platforms utilize graphical user interfaces with complex operational procedures and limited channels for information dissemination. The study aims to establish a smart telemedicine diagnosis system based on YOLOv7 and large language model. Methods: The YOLOv7 model is trained using a clinical data set, with data augmentation techniques employed to enhance the data set to identify six types of pressure injury images. The established system features a front-end interface that includes responsive web design and a chatbot with ChatGPT, and it is integrated with a database for personal information management. Results: This research provides a practical pressure injury staging classification model with an average F1 score of 0.9238. The system remotely provides real-time accurate diagnoses and prescriptions, guiding patients to seek various medical help levels based on symptom severity. Conclusions: This study establishes a smart telemedicine auxiliary diagnosis system based on the YOLOv7 model, which possesses capabilities for classification and real-time detection. During teleconsultations, it provides immediate and accurate diagnostic information and prescription recommendations and seeks various medical assistance based on the severity of symptoms. Through the setup of a chatbot with ChatGPT, different users can quickly achieve their respective objectives. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Complementary and Alternative Treatment Methods Used by Infertile Women in Turkiye: A Cross-Sectional Study.
- Author
-
BULUT, Aleyna, AYDIN KARTAL, Yasemin, KAYA, Leyla, YILMAZ, Sibel, and YILMAZ, Müşerref Banu
- Subjects
INFERTILITY ,MEDICAL personnel ,PERSONAL information management ,PUBLIC hospitals ,SPIRITUALITY - Abstract
Copyright of Advances in Women's Studies is the property of Ataturk University Coordinatorship of Scientific Journals and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
37. Investigation of Parents' Level of Sociotelism with Their Views on Phubbing (Sociotelism) Behaviours of Their Children.
- Author
-
Temel, Merve, Er, Hasan, and Kandır, Adalet
- Subjects
PARENT attitudes ,PERSONAL information management ,CELL phones ,DATA analysis ,QUESTIONNAIRES - Abstract
The aim of this study is to examine the level of phubbing of parents with children in early childhood and their perspectives on their children's phubbing behaviours. The research was designed using a simultaneous nested model of mixed design, incorporating both quantitative and qualitative research methods. The study group for the research consisted of 183 parents with children in early childhood. The Personal Information Form, the Generic Scale of Phubbing adapted into Turkish by Orhan Göksün (2019), and the Phubbing (Sociotelism) in Early Childhood Questionnaire prepared by the researchers to explore parents' views on the phubbing behaviours of children in early childhood were used as data collection tools in the study. In the analysis of the data obtained from the Phubbing (Sociotelism) in Early Childhood Questionnaire, a weighted mean was calculated for the Likert-type questions, and content analysis was used for the open-ended questions in the questionnaire. When the mean scores obtained from the Generic Scale of Phubbing were examined, it was found that the mean from the nomophobia sub-dimension was relatively higher than the other sub-dimensions. In line with the qualitative findings obtained from the study, it was observed that parents' children mostly used mobile phones in a controlled or regulated manner. Parents stated that the reasons for their children's phone use were primarily loneliness or boredom, and they expressed dissatisfaction with their children's phone use. It was determined that parents mostly had difficulties due to their children's problem behaviours in using phones, had insufficient knowledge about the applications on the phones, had difficulty controlling the content, and felt inadequate in providing alternative activities instead of using phones. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. TOWARDS PRECISE DETECTION OF PERSONAL INFORMATION LEAKS IN MOBILE HEALTH APPS.
- Author
-
Ardalani, Alireza, Antonucci, Joseph, and Neamtiu, Iulian
- Subjects
- *
PERSONAL information management , *MOBILE health , *MOBILE apps , *PHYSICAL fitness , *INFORMATION retrieval - Abstract
Mobile apps are used in a variety of health settings, from apps that help providers, to apps designed for patients, to health and fitness apps designed for the general public. These apps ask the user for, and then collect and "leak" a wealth of Personal Information (PI). We analyze the PI that apps collect via their user interface, whether the app or third-party code is processing this information, and finally where the data is sent or stored. Prior work on leak detection in Android has focused on detecting leaks of (hardware) device-identifying information, or policy violations; however, no work has looked at processing and leaking of PI in the context of health apps. The first challenge we tackle is extracting the semantic information contained in app UIs to discern the extent, and nature, of personal information. The second challenge we tackle is disambiguating between first-party, legitimate leaks (e.g., the app storing data in its database) and third-party, problematic leaks, e.g., processing this information by, or sending it to, advertisers and analytics. We conducted a study on 1,243 Android apps: 623 medical apps and 621 Health&Fitness apps. We categorize PI into 16 types, grouped in 3 main categories: identity, medical, anthropometric. We found that the typical app has one first-party leak and five third-party leaks, though 221 apps had 20 or more leaks. Next, we show that third-party leaks (e.g., advertisers, analytics) are 5x more frequent than first-party leaks. Then, we show that 71% of leaks are to local storage (i.e., the phone, where data could be accessed by unauthorized apps) whereas 29% of leaks are to the network (e.g., Cloud). Finally, medical apps have 20% more PI leaks than Health&Fitness apps, due to collecting additional medical PI. [ABSTRACT FROM AUTHOR]
- Published
- 2024
39. Practices and pain points in personal records
- Author
-
Matt Balogh, William Billingsley, David Paul, Mary Anne Kennan, and Melanie Robertson-Dean
- Subjects
personal electronic records management ,personal information management ,Bibliography. Library science. Information resources - Abstract
Introduction. This paper reports the findings of a survey on personal electronic records management practices focussing on records that people deal with in their everyday lives at home. The aim of this research was to determine which personal electronic records practices were most effective in averting oversights and generating satisfaction in participant’s records management practices. This paper presents one stage of a broader design science research program. Method. The research for this paper was conducted by means of an online questionnaire using Qualtrics software and participants were recruited through social media. Analysis. Analysis was conducted using tabular analysis in SPSS, and Principal Component Analysis in R. Results. The research found that there is a statistical relationship between the practices that respondents adopted with their personal electronic records management and their level of satisfaction with that process. For example, respondents who saved records on a computer or in the cloud reported higher levels of satisfaction with how they managed their personal records and experienced fewer adverse incidents such as losing documents or failing to pay bills on time. Conclusion. The paper concludes by identifying some specific personal records management practices that are likely to improve satisfaction with that task, such as saving and sorting records that need to be retained outside of email in a structured filing system.
- Published
- 2024
- Full Text
- View/download PDF
40. ESS: To a Future Where HR Isn't only Streamlined but also Deeply Connected to the People it Serves!
- Author
-
Damodaran, Deepa
- Subjects
CAREER development ,HUMAN resources departments ,COMPENSATION management ,TEAMS in the workplace ,EMPLOYEE benefits ,PERSONAL information management - Published
- 2024
41. Transparency and proportionality: A two-step approach to assessing fairness in the 'Privacy Act'
- Author
-
Gregorczuk, Helen
- Published
- 2023
42. The right to be forgotten
- Author
-
Silva, Francisco
- Published
- 2023
43. The right to be forgotten
- Published
- 2023
44. THE FEI MET ON OCTOBER 1, 2024, TO DECIDE ADDRESS LONG-TERM STRATEGY DEVELOPMENT FOR DRESSAGE.
- Author
-
Ropa, Anastasija and Brownrigg, Gail
- Subjects
HORSE sports ,EQUESTRIANISM ,HORSE training ,COMPETITION horses ,PROFESSIONAL ethics ,PROMISES ,PERSONAL information management - Abstract
The FEI convened on October 1, 2024, to address concerns about unethical methods in horse training, particularly in dressage. Stakeholders discussed developing a long-term strategy for dressage to ensure sustainability and growth in the discipline. Key proposals included mandatory trainer registration, defining ethical training methods, and enhancing transparency to engage with the broader public and stakeholders. The focus was on improving equine welfare, revising rules thoughtfully, and fostering collaboration within the dressage community. [Extracted from the article]
- Published
- 2024
45. Acting for you, March 2024
- Author
-
Maxwell, Catherine
- Published
- 2024
46. Life and Times of Personal Information Management: Memento, Memory, or Memento Mori?
- Author
-
Narayan, Bhuva, Zijlema, Annemarie, and Reyes, Vanessa
- Subjects
- *
INFORMATION science , *INFORMATION policy , *INFORMATION technology , *TECHNOLOGICAL innovations , *DIGITAL technology , *ARTIFICIAL intelligence - Abstract
This panel/round‐table discussion will explore contemporary challenges within our everyday personal information management practices when it comes to how we select, store, and prepare our life histories for ourselves and others. With all the affordances and access provided by digital technologies, we collect information across a variety of platforms, modes, and mediums, be they documents, text files, images, or audio. Not all of this information is meaningful to us in the long‐term, but nevertheless, some of our most valuable information does get entangled in this chaos. Issues discussed include maintaining, organizing, and accessing our information, not to mention how others access what we want to pass on to them. Challenges include technological obsolescence, privacy concerns, cultural and generational changes, family dynamics, and even memory loss as we age. We will also explore solutions and propose an 'idea box' for how we can prepare for the future of our personal information, such as creating and implementing information legacy plans, digitization, storage, and access permissions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Conversations on the Invisibility of PIM, Approaching Themes, and New Avenues of Research.
- Author
-
Cushing, Amber L., Reyes, Vanessa, and Ferguson, Robert D.
- Subjects
- *
INFORMATION policy , *ARTIFICIAL intelligence , *INFORMATION sharing , *DIGITAL technology , *INFORMATION technology - Abstract
This short paper reflects on previous personal information management (PIM) research using the theme of "invisible PIM." Three scholars gathered to reflect on how this theme is relevant to their research. After comparing reflections, the following threads of invisibility are highlighted as holding potential for future exploration: the role that PIM can play in reinforcing invisibility, the concept of maintaining information over time as being more likely to be labeled as invisible labor, and a focus on non‐work experiences of sample populations. This work in progress concludes with suggestions of how reflecting on themes versus following PIM activities (a departure from previous practices for these researchers) was a useful activity to think about a future PIM research agenda. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. A Guided Tour Study of the Untidy but Inspirational PIM of Visual Artists.
- Author
-
Hellmich, Helene and Dinneen, Jesse David
- Subjects
- *
INFORMATION technology , *ARTIFICIAL intelligence , *INFORMATION policy , *DIGITAL technology , *ELECTRONIC information resources - Abstract
While all individuals deal with increasingly large amounts of digital information in their everyday lives and professionally, prior works suggest visual artists have unique information management practices and challenges. This study therefore examined the personal information management (PIM) practices and challenges of six practising visual artists using guided tours and short interviews. It was found that the visual artists had some unique practices connected to their strong emphasis on serendipity, inspiration, and visual dimensions of information. Like non‐artists, the participants faced challenges across all phases of PIM, chiefly an excess of information and fragmented organisation, and they found it especially hard to assess how personal and valuable their information could be. After characterising this rarely discussed PIM demographic, we draw on the findings to provide concrete recommendations for artists doing PIM, for information and cultural heritage institutions, and for designers of PIM software. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. “Those blimmin Ts and Cs”: a mixed methods analysis of how people manage personal information, privacy, and impressions.
- Author
-
Mols, Anouk, Pereira Campos, Jorge, and Ferreira Gonçalves, João Fernando
- Abstract
Interconnected and smart technologies complicate personal information management (PIM) because users delegate the storing, organizing, and retrieving of personal information to smart and mobile service providers. Meta-level PIM activities are required to maintain the privacy and security of personal information. This study provides insights into how users of location tracking, mobile apps, and smart home technologies perceive PIM and privacy. We turn to the privacy as contextual integrity (CI) and impression management (IM) literatures to explore informational norms and interpersonal dynamics in PIM. This study is based on a mixed methods design to analyze focus groups and interviews with 106 British and Dutch respondents. Combining unsupervised Latent Dirichlet allocation (LDA) topic modeling and thematic analysis, we reveal discursive patterns in respondent accounts of technology use and provide an in-depth interpretation of these patterns. Our findings indicate that PIM practices are associated with the perceived appropriateness of information flows, anthropomorphic interpretations of technologies, and interpersonal surveillance. Thus, impressions are managed toward social actors as well as technology providers. We contribute to PIM research with a demonstration of how PIM in mobile, smart, and location-based technology use cannot be separated from contextual factors and strategies to manage impressions of habits and behaviors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Making Gender and Sexuality Studies Illegal: Heteronationalism, Anti-gender Mobilization, and the Neoliberal "Utopian" Gaze in Bulgaria, 2018-2023.
- Author
-
Darakchi, Shaban
- Subjects
- *
GAZE , *PSYCHOLOGICAL essentialism , *NEOLIBERALISM , *THREATS of violence , *RELIGIOUS movements , *NONGOVERNMENTAL organizations , *PERSONAL information management , *INSTITUTIONAL environment - Abstract
The past decade has witnessed an escalating, well-financed, and well-organized international mobilization against any study, policy, or discussion related to gender or LGBTQI+ issues in many parts of the world. The countries of Central and Eastern Europe have been disproportionately affected by this backlash, resulting in public threats and violence against scholars and representatives of the nongovernmental sector who work on gender and LGBTQI+ issues. The anti-gender mobilization has been extremely successful in Bulgaria, where there have been numerous threats against scholars, nongovernmental organizations, and public figures dealing with gender and sexuality issues. The Bulgarian Constitutional Court was the first court on a global level to pronounce the term "gender" anti-constitutional in response to a request submitted by the government regarding ratification of the so-called Istanbul Convention. Dealing with gender and LGBTQI+ studies in Bulgaria is believed to be "illegal" by many, based on the court's decision. As a result, any approaches to gender and sexuality that do not fit essentialist and religious beliefs have become dangerous and have endangered knowledge in many contexts. In this paper, I discuss the rapid development of the anti-gender mobilization within certain neoliberal discourses and values, and using the concept of a "neoliberal utopian gaze," I outline the challenges gender and sexuality studies have faced. Based on case studies, personal experiences, and public discourses, the paper explores how gender and sexuality studies have been affected by (1) institutional decisions, (2) manipulation of scientific information, (3) radical political populism, (4) transnational religious movements, and (5) the advancement of social media. Finally, the paper discusses possible solutions to this alarming trend, paying particular attention to academic solidarity, knowledge production, and institutionally coordinated policies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.