{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:11:25Z","timestamp":1776107485154,"version":"3.50.1"},"reference-count":116,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T00:00:00Z","timestamp":1357084800000},"content-version":"vor","delay-in-days":732,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Annual Review Info Sci &amp;amp; Tec"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1002\/aris.2011.1440450108","type":"journal-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T02:07:44Z","timestamp":1357178864000},"page":"1-62","source":"Crossref","is-referenced-by-count":107,"title":["Personal information management: From information consumption to curation"],"prefix":"10.1002","volume":"45","author":[{"given":"Steve","family":"Whittaker","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,2]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"crossref","unstructured":"Abrams D. Baecker R. &Chignell M.(1998).Information archiving with bookmarks: Personal web space construction and organization.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 41\u201348.","DOI":"10.1145\/274644.274651"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/290159.290160"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:COSU.0000045805.77534.2a"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"Aula A. Jhaveri N. &K\u00e4ki M.(2005).Information search and re\u2010access strategies of experienced web users.Proceedings of the International World Wide Web Conference 583\u2013592.","DOI":"10.1145\/1060745.1060831"},{"key":"e_1_2_10_6_1","volume-title":"Human memory: Theory and practice","author":"Baddeley A. D.","year":"1997"},{"key":"e_1_2_10_7_1","doi-asserted-by":"crossref","unstructured":"B\u00e4lter O.(2000).Keystroke level analysis of email message organization. InProceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 105\u2013112.","DOI":"10.1145\/332040.332413"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/221296.221307"},{"key":"e_1_2_10_9_1","first-page":"133","article-title":"Anomalous states of knowledge as a basis for information retrieval","volume":"5","author":"Belkin N. J.","year":"1980","journal-title":"Canadian Journal of Information Science"},{"key":"e_1_2_10_10_1","volume-title":"Total recall: How the e\u2010memory revolution will change everything","author":"Bell G.","year":"2009"},{"key":"e_1_2_10_11_1","doi-asserted-by":"crossref","unstructured":"Bellotti V. Ducheneaut N. Howard M. &Smith I.(2003).Taking email to task: The design and evaluation of a task management centered email tool.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 345\u2013352.","DOI":"10.1145\/642611.642672"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001&2_4"},{"key":"e_1_2_10_13_1","doi-asserted-by":"crossref","unstructured":"Bentley F. Metcalf C. &Harboe G.(2006).Personal vs. commercial content: The similarities between consumer use of photos and music.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 667\u2013676.","DOI":"10.1145\/1124772.1124871"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10283"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402256.1402259"},{"key":"e_1_2_10_16_1","doi-asserted-by":"crossref","unstructured":"Bergman O. Tucker S. Beyth\u2010Marom R. Cutrell E. &Whittaker S.(2009).It's not that important: Demoting personal information of low subjective importance using GrayArea.Proceedings of the ACM International Conference on Human Factors in Computing Systems 269\u2013278.","DOI":"10.1145\/1518701.1518745"},{"key":"e_1_2_10_17_1","doi-asserted-by":"crossref","unstructured":"Berlin L. M. Jeffries R. O'Day V. L. Paepcke A. &Wharton C.(1993).Where did you put it? Issues in the design and use of a group memory.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 23\u201330.","DOI":"10.1145\/169059.169063"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"Blanc\u2010Brude T. &Scapin D. L.(2007).What do people recall about their documents? Implications for desktop search tools.Proceedings of the International Conference on Intelligent User Interfaces 102\u2013111.","DOI":"10.1145\/1216295.1216319"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"Boardman R. &Sasse M. A.(2004).\u201cStuff Goes into the Computer and Doesn't Come Out\u201d: A cross\u2010tool study of personal information management.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 583\u2013590.","DOI":"10.1145\/985692.985766"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511664014.004"},{"issue":"1","key":"e_1_2_10_21_1","article-title":"Information behavior that keeps found things found","volume":"10","author":"Bruce H.","year":"2004","journal-title":"Information Research"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.355"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(95)00043-7"},{"key":"e_1_2_10_24_1","doi-asserted-by":"crossref","unstructured":"Civan A. Jones W. Klasnja P. &Bruce H.(2008).Better to organize personal information by folders or by tags? The devil is in the details.Proceedings of the Annual Meeting of the American Society for Information Science and Technology(CD\u2010ROM).","DOI":"10.1002\/meet.2008.1450450214"},{"issue":"2","key":"e_1_2_10_25_1","first-page":"120","article-title":"Issues of page representation and organisation in web browser\u2010revisitation tools","volume":"7","author":"Cockburn A.","year":"2000","journal-title":"Australian Journal of Information Systems"},{"key":"e_1_2_10_26_1","unstructured":"Cohen W.(1996).Learning rules that classify email.AAAI Symposium on Machine Learning in Information Access 18\u201325."},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(72)80001-X"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107492"},{"key":"e_1_2_10_29_1","doi-asserted-by":"crossref","unstructured":"Cutrell E. Robbins D. Dumais S. &Sarin R.(2006).Fast flexible filtering with Phlat.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 261\u2013270.","DOI":"10.1145\/1124772.1124812"},{"key":"e_1_2_10_30_1","doi-asserted-by":"crossref","unstructured":"Dabbish L. A. Kraut R. E. Fussell S. &Kiesler S.(2005).Understanding email use: Predicting action on a message.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 691\u2013700.","DOI":"10.1145\/1054972.1055068"},{"key":"e_1_2_10_31_1","doi-asserted-by":"crossref","unstructured":"Dragunov A. N. Dietterich T. G. Johnsrude K. McLaughlin M. Li L. &Herlocker J. L.(2005).TaskTracer: A desktop environment to support multi\u2010tasking knowledge workers.International Conference on Intelligent User Interfaces 75\u201382.","DOI":"10.1145\/1040830.1040855"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/01435129210021801"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/382899.383305"},{"key":"e_1_2_10_34_1","doi-asserted-by":"crossref","unstructured":"Dumais S. Cutrell E. Cadiz J. Jancke G. Sarin R. &Robbins D.(2003).Stuff I've Seen: A system for personal information retrieval and re\u2010use.Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval 72\u201379.","DOI":"10.1145\/860435.860451"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000007204"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402256.1402260"},{"key":"e_1_2_10_37_1","unstructured":"Farina P. A.(2005).A comparison of two desktop search engines: Google Desktop Search (beta) vs. Windows XP Search Companion. Proceedings of the 21st Computer Science Seminar. Hartford CT."},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/249170.249187"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/257089.257404"},{"key":"e_1_2_10_40_1","doi-asserted-by":"crossref","unstructured":"Fisher D. Brush A. J. GleaveE. &Smith M.(2006).Revisiting Whittaker & Sidner's \u201cEmail Overload\u201d: Ten years later.Proceedings of the 20th Anniversary ACM Conference on Computer Supported Cooperative Work 309\u2013312.","DOI":"10.1145\/1180875.1180922"},{"key":"e_1_2_10_41_1","doi-asserted-by":"crossref","unstructured":"Frohlich D. KuchinskyA. PeringC. Don A. &Ariss S.(2002).Requirements for photoware.Proceedings of the ACM Conference on Computer Supported Cooperative Work 166\u2013175.","DOI":"10.1145\/587078.587102"},{"key":"e_1_2_10_42_1","volume-title":"Stumbling on happiness","author":"Gilbert D.","year":"2006"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506062337"},{"key":"e_1_2_10_44_1","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves D. &Jorge J. A.(2003).An empirical study of personal document spaces.Proceedings of the International Workshop on Design Specification and Verification of Interactive Systems 46\u201360.","DOI":"10.1007\/978-3-540-39929-2_4"},{"key":"e_1_2_10_45_1","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves D. &Jorge J. A.(2004).Describing documents: What can users tell us?Proceedings of the International Conference on Intelligent User Interfaces 247\u2013249.","DOI":"10.1145\/964442.964494"},{"key":"e_1_2_10_46_1","unstructured":"Gwizdka J.(2004a).Cognitive abilities and email interaction: Impacts of interface and task. Unpublished doctoral dissertation University of Toronto Canada."},{"key":"e_1_2_10_47_1","doi-asserted-by":"crossref","unstructured":"Gwizdka J.(2004b).Email task management styles: The cleaners and the keepers.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 1235\u20131238.","DOI":"10.1145\/985921.986032"},{"key":"e_1_2_10_48_1","doi-asserted-by":"crossref","unstructured":"Henderson S. &Srinivasan A.(2009).An empirical analysis of personal digital document structures.HCI International 394\u2013403.","DOI":"10.1007\/978-3-642-02556-3_45"},{"key":"e_1_2_10_49_1","first-page":"257","volume-title":"Modern information retrieval","author":"Hearst M. A.","year":"1999"},{"key":"e_1_2_10_50_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v9i3.1123"},{"key":"e_1_2_10_51_1","volume-title":"Keeping found things found: The study and practice of personal information management","author":"Jones W.","year":"2007"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.2007.1440410117"},{"key":"e_1_2_10_53_1","unstructured":"Jones W. Bruce H. &Dumais S.(2003).How do people get back to information on the web? How can they do it better?Proceedings of the International Conference on Human\u2010Computer Interaction 793\u2013796."},{"key":"e_1_2_10_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/5401.5405"},{"key":"e_1_2_10_55_1","doi-asserted-by":"crossref","unstructured":"Jones W. Phuwanartnurak A. J. Gill R. &Bruce H.(2005).Don't take my folders away! Organizing personal information to get things done.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 1505\u20131508.","DOI":"10.1145\/1056808.1056952"},{"key":"e_1_2_10_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470713181.ch18"},{"key":"e_1_2_10_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_2_10_58_1","doi-asserted-by":"crossref","unstructured":"Kalnikaite V. Sellen A. Whittaker S. &Kirk D.(2010).Now let me see where I was: Understanding how lifelogs mediate memory.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 2045\u20132054.","DOI":"10.1145\/1753326.1753638"},{"key":"e_1_2_10_59_1","doi-asserted-by":"crossref","unstructured":"Kalnikaite V. &Whittaker S.(2007).Software or wetware? Discovering when and why people use digital prosthetic memory.Proceedings of ACM SIGCHI Conference on Human Factors in Computing Systems 71\u201380.","DOI":"10.1145\/1240624.1240635"},{"key":"e_1_2_10_60_1","doi-asserted-by":"crossref","unstructured":"Kalnikaite V. &Whittaker S.(2008a).Cueing digital memory: How and why do digital notes help us remember?Proceedings of the British Computer Society Conference on Human Computer Interaction 153\u2013161.","DOI":"10.14236\/ewic\/HCI2008.15"},{"key":"e_1_2_10_61_1","doi-asserted-by":"crossref","unstructured":"Kalnikaite V. &Whittaker S.(2008b).Social summarization: Does social feedback improve access to speech data?Proceedings of ACM Conference on Computer Supported Co\u2010operative Work 9\u201312.","DOI":"10.1145\/1460563.1460567"},{"key":"e_1_2_10_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107497"},{"key":"e_1_2_10_63_1","first-page":"190","volume-title":"Personal information management","author":"Kelly D.","year":"2007"},{"key":"e_1_2_10_64_1","doi-asserted-by":"crossref","unstructured":"Kidd A.(1994).The marks are on the knowledge worker.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 186\u2013191.","DOI":"10.1145\/191666.191740"},{"key":"e_1_2_10_65_1","doi-asserted-by":"crossref","unstructured":"Kirk D. Sellen A. Rother C. &Wood K.(2006).Understanding \u201cphotowork.\u201d Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 761\u2013770.","DOI":"10.1145\/1124772.1124885"},{"key":"e_1_2_10_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/358923.358934"},{"key":"e_1_2_10_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#"},{"key":"e_1_2_10_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/0003-6870(88)90199-8"},{"key":"e_1_2_10_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-7373(92)90054-O"},{"key":"e_1_2_10_70_1","volume-title":"Evaluation of desktop search applications (Technical report)","author":"Lowe M.","year":"2006"},{"key":"e_1_2_10_71_1","doi-asserted-by":"crossref","unstructured":"Mackay W. E.(1988).More than just a communication system: Diversity in the use of electronic mail.Proceedings of the ACM Conference on Computer\u2010Supported Cooperative Work 344\u2013353.","DOI":"10.1145\/62266.62293"},{"key":"e_1_2_10_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/357423.357430"},{"key":"e_1_2_10_73_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626388"},{"issue":"3","key":"e_1_2_10_74_1","article-title":"Rethinking personal digital archiving, Part 1: Four challenges from the field","volume":"14","author":"Marshall C.","year":"2008","journal-title":"DLib Magazine"},{"issue":"3","key":"e_1_2_10_75_1","article-title":"Rethinking personal digital archiving, Part 2: Implications for services, applications, and institutions","volume":"14","author":"Marshall C.","year":"2008","journal-title":"D\u2010Lib Magazine"},{"key":"e_1_2_10_76_1","unstructured":"Millen D. Yeng M. Whittaker S. &Feinberg J.(2007).Social bookmarking and exploratory search.Proceedings of the European Conference on Computer Supported Co\u2010operative Work 179\u2013198."},{"key":"e_1_2_10_77_1","doi-asserted-by":"crossref","unstructured":"Morris D. Ringel Morris M. &Venolia G.(2008).SearchBar: A search\u2010centric web history for task resumption and information re\u2010finding.Proceeding of the ACM SIGCHI Conference on Human Factors in Computing Systems 1207\u20131216.","DOI":"10.1145\/1357054.1357242"},{"key":"e_1_2_10_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505251"},{"key":"e_1_2_10_79_1","doi-asserted-by":"crossref","unstructured":"Obendorf H. Weinreich H. Herder E. &Mayer M.(2007).Webpage revisitation revisited: Implications of a long\u2010term click\u2010stream study of browser usage.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 597\u2013606.","DOI":"10.1145\/1240624.1240719"},{"key":"e_1_2_10_80_1","volume-title":"Collection management: A new treatise","author":"Osburn C. B.","year":"1991"},{"key":"e_1_2_10_81_1","doi-asserted-by":"crossref","unstructured":"Pazzani M. J.(2000).Representation of electronic mail filtering profiles: A user study.Proceedings of the International Conference on Intelligent Use Interfaces 202\u2013206.","DOI":"10.1145\/325737.325843"},{"key":"e_1_2_10_82_1","doi-asserted-by":"crossref","unstructured":"Petrelli D. Whittaker S. &Brockmeier J.(2008).Autotopography: What can physical mementos tell us about digital memories?Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 53\u201362.","DOI":"10.1145\/1357054.1357065"},{"key":"e_1_2_10_83_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195173321.001.0001"},{"key":"e_1_2_10_84_1","doi-asserted-by":"crossref","unstructured":"Pirolli P. &Card S. K.(1995).Information foraging in information access environments.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 51\u201358.","DOI":"10.1145\/223904.223911"},{"key":"e_1_2_10_85_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.106.4.643"},{"key":"e_1_2_10_86_1","unstructured":"Ringel M. Cutrell E. Dumais S. &Horvitz E.(2003).Milestones in time: The value of landmarks in retrieving information from personal stores.Proceedings of Human\u2010Computer Interaction (INTERACT '03) 184\u2013191."},{"key":"e_1_2_10_87_1","doi-asserted-by":"crossref","unstructured":"Robertson G. Czerwinski M. Larson K. Robbins D. C. Thiel D. &van Dantzich M.(1998).Data mountain: Using spatial memory for document management.Proceedings of the ACM Symposium on User Interface Software and Technology 153\u2013162.","DOI":"10.1145\/288392.288596"},{"key":"e_1_2_10_88_1","doi-asserted-by":"crossref","unstructured":"Rodden K. &Wood K.(2003).How do people manage their digital photographs?Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 409\u2013416.","DOI":"10.1145\/642611.642682"},{"key":"e_1_2_10_89_1","first-page":"27","volume-title":"Cognition and categorization","author":"Rosch E.","year":"1978"},{"key":"e_1_2_10_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(76)90013-X"},{"key":"e_1_2_10_91_1","first-page":"153","volume-title":"Personal information management","author":"Russell D.","year":"2007"},{"key":"e_1_2_10_92_1","volume-title":"The myth of the paperless office","author":"Sellen A.","year":"2002"},{"key":"e_1_2_10_93_1","volume-title":"A mathematical theory of communication","author":"Shannon C.","year":"1949"},{"key":"e_1_2_10_94_1","doi-asserted-by":"crossref","unstructured":"Tang J. C. Lin J. Pierce J. Whittaker S. &Drews C.(2007).Recent shortcuts: Using recent interactions to support shared activities.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 1263\u20131272.","DOI":"10.1145\/1240624.1240816"},{"key":"e_1_2_10_95_1","doi-asserted-by":"crossref","unstructured":"Tang J. C. Wilcox E. Cerruti J. A. Badenes H. Nusser S. &Schoudt J.(2008).Tag\u2010it snag\u2010it or bag\u2010it: Combining tags threads and folders in email.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 2179\u20132194.","DOI":"10.1145\/1358628.1358651"},{"key":"e_1_2_10_96_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1997.0125"},{"key":"e_1_2_10_97_1","doi-asserted-by":"crossref","unstructured":"Teevan J. Alvarado C. Ackerman M. S. &Karger D. R.(2004).The perfect search engine is not enough: A study of orienteering behavior in directed search.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 415\u2013422.","DOI":"10.1145\/985692.985745"},{"key":"e_1_2_10_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(80)90005-5"},{"key":"e_1_2_10_99_1","volume-title":"Supporting email workflow (MSR\u2010TR\u20102001\u201088)","author":"Venolia G.","year":"2001"},{"key":"e_1_2_10_100_1","doi-asserted-by":"crossref","unstructured":"Venolia G. &Neustaedter C.(2003).Understanding sequence and reply relationships within email conversations: A mixed\u2010model visualization.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 361\u2013368.","DOI":"10.1145\/642611.642674"},{"key":"e_1_2_10_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(86)90013-7"},{"key":"e_1_2_10_102_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001&2_5"},{"issue":"3","key":"e_1_2_10_103_1","first-page":"184","article-title":"Post\u2010valued recall webpages: User disorientation hits the big time","volume":"1","author":"Wen J.","year":"2003","journal-title":"IT & Society"},{"key":"e_1_2_10_104_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001&2_3"},{"key":"e_1_2_10_105_1","first-page":"167","volume-title":"Personal information management","author":"Whittaker S.","year":"2007"},{"key":"e_1_2_10_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-009-0218-7"},{"key":"e_1_2_10_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/376929.376932"},{"key":"e_1_2_10_108_1","doi-asserted-by":"crossref","unstructured":"Whittaker S. Hirschberg J. Amento B. Stark L. Bacchiani M. Isenhour P. et al. (2002).SCANMail: A voicemail interface that makes speech browsable readable and searchable.Proceedings of the ACM Conference on Human Computer Interaction 275\u2013282.","DOI":"10.1145\/503376.503426"},{"key":"e_1_2_10_109_1","doi-asserted-by":"crossref","unstructured":"Whittaker S. Jones Q. &Terveen L.(2002a).Contact management: Identifying contacts to support long term communication.Proceedings of the ACM Conference on Computer Supported Cooperative Work 216\u2013225.","DOI":"10.1145\/587078.587109"},{"key":"e_1_2_10_110_1","unstructured":"Whittaker S. Jones Q. &Terveen L.(2002b).Managing long term conversations: Communication and contact management.Proceedings of the 35th Annual Hawaii International Conference on System Sciences. Retrieved May 7 2010 fromwww.computer.org\/portal\/web\/csdl\/proceedings\/h#4"},{"key":"e_1_2_10_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035575.1035580"},{"key":"e_1_2_10_112_1","doi-asserted-by":"crossref","unstructured":"Whittaker S. &Sidner C.(1996).Email overload: Exploring personal information management of email.Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems 276\u2013283.","DOI":"10.1145\/238386.238530"},{"key":"e_1_2_10_113_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_2"},{"key":"e_1_2_10_114_1","doi-asserted-by":"crossref","unstructured":"Wilhelm A. Takhteyev Y. Sarvas R. Van House N. &Davis M.(2004).Photo annotation on a camera phone.Extended Abstracts on Human Factors in Computing Systems CHI '04 1403\u20131406.","DOI":"10.1145\/985921.986075"},{"key":"e_1_2_10_115_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026702"},{"key":"e_1_2_10_116_1","first-page":"15","volume-title":"Fifty years of information progress: A Journal of Documentation review","author":"Wilson T. D.","year":"1994"},{"key":"e_1_2_10_117_1","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000007145"}],"container-title":["Annual Review of Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Faris.2011.1440450108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/aris.2011.1440450108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T20:24:28Z","timestamp":1759955068000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/aris.2011.1440450108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":116,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1002\/aris.2011.1440450108"],"URL":"https:\/\/doi.org\/10.1002\/aris.2011.1440450108","archive":["Portico"],"relation":{},"ISSN":["0066-4200","1550-8382"],"issn-type":[{"value":"0066-4200","type":"print"},{"value":"1550-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}