{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:11:01Z","timestamp":1725469861715},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540446361"},{"type":"electronic","value":"9783540446385"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11863878_26","type":"book-chapter","created":{"date-parts":[[2006,9,3]],"date-time":"2006-09-03T13:35:01Z","timestamp":1157290501000},"page":"303-314","source":"Crossref","is-referenced-by-count":3,"title":["\u201cI Keep Collecting\u201d: College Students Build and Utilize Collections in Spite of Breakdowns"],"prefix":"10.1007","author":[{"given":"Eunyee","family":"Koh","sequence":"first","affiliation":[]},{"given":"Andruid","family":"Kerne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Abrams, D., Baecker, R., Chignell, M.: Information archiving with bookmarks: personal Web space construction and organization. In: Proc. SIGCHI, April 18-23, pp. 41\u201348 (1998)","DOI":"10.1145\/274644.274651"},{"key":"26_CR2","first-page":"1","volume":"44A","author":"A.D. Baddeley","year":"1992","unstructured":"Baddeley, A.D.: Is working memory working? Quarterly Journal of Exp Psych\u00a044A, 1\u201331 (1992)","journal-title":"Quarterly Journal of Exp Psych"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"B\u00e4lter, O.: Strategies for Organizing Email. In: Proc. of HCI on People and Computers, vol.\u00a0XII, pp. 21\u201338 (January 1997)","DOI":"10.1007\/978-1-4471-3601-9_2"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1002\/(SICI)1097-4571(199506)46:5<327::AID-ASI4>3.0.CO;2-C","volume":"46","author":"D. Barreau","year":"1995","unstructured":"Barreau, D.: Context as a factor in personal information management systems. JASIS\u00a046(5), 327\u2013339 (1995)","journal-title":"JASIS"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/221296.221307","volume":"27","author":"D. Barreau","year":"1995","unstructured":"Barreau, D., Nardi, B.: Finding and reminding: file organization from the desktop. ACM SIGCHI Bulletin\u00a027(3), 39\u201343 (1995)","journal-title":"ACM SIGCHI Bulletin"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Billsus, D., Hilbert, D., Maynes-Aminzade, D.: Improving Proactive Information Systems. In: Proc. IUI 2005, January 9, pp. 159\u2013166 (2005)","DOI":"10.1145\/1040830.1040869"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Boardman, R., Sasse, M.A.: Stuff goes into the computer and doesn\u2019t come out: a crosstool study of personal information management. In: Proc. SIGCHI 2004, pp. 583\u2013590 (2004)","DOI":"10.1145\/985692.985766"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Carney, R.M., Levin, J.R.: Pictorial Illustrations Still Improve Students\u2019 Learning From Text. Educational Psychology Review\u00a014(1) (March 2002)","DOI":"10.1023\/A:1013176309260"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Davis, M., King, S., Good, N., Sarvas, R.: From context to content: leveraging context to infer media metadata. ACM Multimedia, 188\u2013195 (2004)","DOI":"10.1145\/1027527.1027572"},{"issue":"2","key":"26_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/0749-596X(92)90008-L","volume":"31","author":"A.M. Glenberg","year":"1992","unstructured":"Glenberg, A.M., Langston, W.E.: Comprehension of illustrated text: Pictures help to build mental models. Journal of Memory & Language\u00a031(2), 129\u2013151 (1992)","journal-title":"Journal of Memory & Language"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Hawkey, K., Inkpen, K.M.: Privacy gradients: exploring ways to manage incidental information during co-located collaboration. In: Proc. CHI 2005, pp. 1431\u20131434 (April 2005)","DOI":"10.1145\/1056808.1056934"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Jones, W., Dumais, S., Bruce, H.: Once found, what then?: a study of \u201dkeeping\u201d behaviors in personal use of Web information. In: Proc. ASIST 2002, November 18-21, pp. 391\u2013402 (2002)","DOI":"10.1002\/meet.1450390143"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/357423.357430","volume":"1","author":"T. Malone","year":"1983","unstructured":"Malone, T.: How do people organize their desks?: Implications for the design of office information systems. TOIS\u00a01(1), 99\u2013112 (1983)","journal-title":"TOIS"},{"key":"26_CR14","unstructured":"Pew Internet & American Life Project, Internet: The Mainstreaming of Online Life (2005), http:\/\/www.pewinternet.org\/pdfs\/Internet_Status_2005.pdf"},{"key":"26_CR15","unstructured":"Pew Internet & American Life Project, The Internet Goes to College (2002), http:\/\/www.pewinternet.org\/pdfs\/PIP_College_Report.pdf"},{"key":"26_CR16","unstructured":"Pew Internet & American Life Project, Content Creation Online, http:\/\/www.pewinternet.org\/pdfs\/PIP_Content_Creation_Report.pdf"},{"key":"26_CR17","unstructured":"Schachter, J.: http:\/\/del.icio.us"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Shipman, F., Marshall, C.: Formality Considered Harmful: Experiences, Emerging Themes, and Directions on the Use of Formal Representations in Interactive Systems. In: Proc. CSCW 1999, pp. 333\u2013352 (1999)","DOI":"10.1023\/A:1008716330212"},{"key":"26_CR19","unstructured":"Simon, H.: Computers, Communications and the Public Interest. In: Greenberger, M. (ed.), pp. 40\u201341. The Johns Hopkins Press, Boltimore (1971)"},{"key":"26_CR20","volume-title":"Plans and Situated Actions","author":"L. Suchman","year":"1987","unstructured":"Suchman, L.: Plans and Situated Actions. Cambridge University Press, New York (1987)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Whittaker, S., Sidner, C.: Email overload: exploring personal information management of email. In: Proc. SIGCHI, April 13-18, pp. 276\u2013283 (1996)","DOI":"10.1145\/238386.238530"},{"key":"26_CR22","volume-title":"Understanding Computers and Cognition","author":"T. Winograd","year":"1986","unstructured":"Winograd, T., Flores, F.: Understanding Computers and Cognition. Addison-Wesley, Reading (1986)"}],"container-title":["Lecture Notes in Computer Science","Research and Advanced Technology for Digital Libraries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11863878_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:44:29Z","timestamp":1605642269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11863878_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540446361","9783540446385"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11863878_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}