{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:15:00Z","timestamp":1760984100898},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T00:00:00Z","timestamp":1308009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s00779-011-0411-3","type":"journal-article","created":{"date-parts":[[2011,6,13]],"date-time":"2011-06-13T09:32:03Z","timestamp":1307957523000},"page":"757-766","source":"Crossref","is-referenced-by-count":30,"title":["You never call: Demoting unused contacts on mobile phones using DMTR"],"prefix":"10.1007","volume":"16","author":[{"given":"Ofer","family":"Bergman","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Komninos","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Liarokapis","sequence":"additional","affiliation":[]},{"given":"James","family":"Clarke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,14]]},"reference":[{"key":"411_CR1","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1108\/eb026886","volume":"47","author":"BH Kwasnik","year":"1991","unstructured":"Kwasnik BH (1991) The importance of factors that are not document attributes in the organization of personal documents. J Document 47:389\u2013398","journal-title":"J Document"},{"key":"411_CR2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/357423.357430","volume":"1","author":"TW Malone","year":"1983","unstructured":"Malone TW (1983) How do people organize their desks? Implications for the design of office information systems. ACM Trans Office Inf Syst 1:99\u2013112","journal-title":"ACM Trans Office Inf Syst"},{"issue":"2","key":"411_CR3","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1145\/376929.376932","volume":"8","author":"S Whittaker","year":"2001","unstructured":"Whittaker S, Hirschberg J (2001) The character, value, and management of personal paper archives. ACM Trans Comput Hum Interact 8(2):150\u2013170. doi: 10.1145\/376929.376932","journal-title":"ACM Trans Comput Hum Interact"},{"issue":"3","key":"411_CR4","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/221296.221307","volume":"27","author":"DK Barreau","year":"1995","unstructured":"Barreau DK, Nardi BA (1995) Finding and reminding: file organization from the desktop. SIGCHI Bull 27(3):39\u201343","journal-title":"SIGCHI Bull"},{"key":"411_CR5","doi-asserted-by":"crossref","unstructured":"Bergman O, Whittaker S, Sanderson M, Nachmias R, Ramamoorthy A (2010) The effect of folder structure on personal file navigation. J Am Soc Inf Sci Technol 61(12):2426\u20132441","DOI":"10.1002\/asi.21415"},{"key":"411_CR6","doi-asserted-by":"crossref","unstructured":"Henderson S, Srinivasan A (2009) An empirical analysis of personal digital document structures. Paper presented at the HCI international, San Diego, CA, USA","DOI":"10.1007\/978-3-642-02556-3_45"},{"key":"411_CR7","doi-asserted-by":"crossref","unstructured":"Fisher D, Brush AJ, Gleave E, Smith MA (2006) Revisiting Whittaker and Sidner\u2019s \u201cemail overload\u201d ten years later. In: Paper presented at the proceedings of the 2006 20th anniversary conference on computer supported cooperative work, Banff, Alberta, Canada","DOI":"10.1145\/1180875.1180922"},{"key":"411_CR8","doi-asserted-by":"crossref","unstructured":"Whittaker S, Sidner C (1996) Email overload: exploring personal information management of email. In: Proceedings of the SIGCHI conference on human factors in computing systems: common ground. ACM Press, Vancouver, British Columbia, Canada, pp 276\u2013283","DOI":"10.1145\/238386.238530"},{"key":"411_CR9","doi-asserted-by":"crossref","unstructured":"Whittaker S, Jones Q, Terveen L (2002) Contact management: identifying contacts to support long term communication. In: Conference on computer supported cooperative work, pp 216\u2013225","DOI":"10.1145\/587078.587109"},{"key":"411_CR10","doi-asserted-by":"crossref","unstructured":"Bellotti V, Dalal B, Good N, Flynn P, Bobrow DG, Ducheneaut N (2004) What a to-do: studies of task management towards the design of a personal task list manager. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Vienna, Austria","DOI":"10.1145\/985692.985785"},{"key":"411_CR11","doi-asserted-by":"crossref","unstructured":"Czerwinski M, Horvitz E, Wilhite S (2004) A diary study of task switching and interruptions. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Vienna, Austria","DOI":"10.1145\/985692.985715"},{"key":"411_CR12","doi-asserted-by":"crossref","unstructured":"Kalnikait V, Whittaker S (2008) Cueing digital memory: how and why do digital notes help us remember? In: Paper presented at the proceedings of the 22nd British HCI group annual conference on HCI 2008: people and computers XXII: culture, creativity, interaction\u2014vol 1, Liverpool, United Kingdom","DOI":"10.14236\/ewic\/HCI2008.15"},{"issue":"2","key":"411_CR13","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1002\/asi.20738","volume":"59","author":"O Bergman","year":"2008","unstructured":"Bergman O, Beyth-Marom R, Nachmias R (2008) The user-subjective approach to personal information management systems design\u2014evidence and implementations. J Am Soc Inf Sci Technol 59(2):235\u2013246","journal-title":"J Am Soc Inf Sci Technol"},{"key":"411_CR14","doi-asserted-by":"crossref","unstructured":"Boardman R, Sasse MA (2004) \u201cStuff goes into the computer and doesn\u2019t come out\u201d: a cross-tool study of personal information management. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, Vienna, Austria, pp 583\u2013590","DOI":"10.1145\/985692.985766"},{"key":"411_CR15","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-3-540-74796-3_36","volume":"4662","author":"A Bhamidipaty","year":"2007","unstructured":"Bhamidipaty A, Deepak P (2007) SymAB: symbol-based address book for the semi-literate mobile user. Lect Notes Comput Sci 4662:389\u2013392","journal-title":"Lect Notes Comput Sci"},{"key":"411_CR16","doi-asserted-by":"crossref","unstructured":"B\u00f6cker M, Suwita A (1999) Evaluating the Siemens C10 mobile phone\u2014beyond \u201cquick and dirty\u201d usability testing. In: HFT\u201999, Copenhagen, Denmark","DOI":"10.1177\/154193129904300402"},{"key":"411_CR17","unstructured":"Klockar T, Carr D, Hedman A, Johansson T, Bengtsson F (2003) Usability of mobile phones. In: The 19th international symposium on human factors in telecommunications, Berlin, Germany, pp 197\u2013204"},{"key":"411_CR18","unstructured":"Gaur S (2008) Mobile phone contact. In: Yl\u00e4-J\u00e4\u00e4ski A, Takkinen L (eds) Technical reports in computer science and engineering. TKK"},{"issue":"4","key":"411_CR19","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1142169.1142196","volume":"13","author":"Y Rhee","year":"2006","unstructured":"Rhee Y, Kim J, Chung A (2006) Your phone automatically caches your life. Interactions 13(4):42\u201344. doi: 10.1145\/1142169.1142196","journal-title":"Interactions"},{"key":"411_CR20","doi-asserted-by":"crossref","unstructured":"Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone\u2019s contact book to support mobile awareness and collaboration. In: Paper presented at the proceedings of the 7th international conference on human computer interaction with mobile devices and services, Salzburg, Austria","DOI":"10.1145\/1085777.1085805"},{"issue":"3\u20134","key":"411_CR21","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10606-004-2806-4","volume":"13","author":"B Brown","year":"2004","unstructured":"Brown B, Randell R (2004) Building a context sensitive telephone: some hopes and pitfalls for context sensitive computing. Comput Sup Coop Work 13(3\u20134):329\u2013345. doi: 10.1007\/s10606-004-2806-4","journal-title":"Comput Sup Coop Work"},{"key":"411_CR22","doi-asserted-by":"crossref","unstructured":"Tolmie P, Pycock J, Diggins T, MacLean A, Karsenty A (2002) Unremarkable computing. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems: changing our world, changing ourselves, Minneapolis, Minnesota, USA","DOI":"10.1145\/503376.503448"},{"key":"411_CR23","doi-asserted-by":"crossref","unstructured":"Jung Y, Anttila A, Blom J (2008) Designing for the evolution of mobile contacts application. In: Paper presented at the proceedings of the 10th international conference on human computer interaction with mobile devices and services, Amsterdam, The Netherlands","DOI":"10.1145\/1409240.1409311"},{"key":"411_CR24","doi-asserted-by":"crossref","unstructured":"Jones W (2004) Finders, keepers? The present and future perfect in support of personal information management. First Monday 9(3)","DOI":"10.5210\/fm.v9i3.1123"},{"key":"411_CR25","volume-title":"Designing the user interface: strategies for effective human-computer interaction","author":"B Shneiderman","year":"2010","unstructured":"Shneiderman B, Plaisant C (2010) Designing the user interface: strategies for effective human-computer interaction, 5th edn. Addison-Wesley Publ. Co., Reading","edition":"5"},{"issue":"9","key":"411_CR26","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1002\/asi.10283","volume":"54","author":"O Bergman","year":"2003","unstructured":"Bergman O, Beyth-Marom R, Nachmias R (2003) The user-subjective approach to personal information management systems. J Am Soc Inf Sci Technol 54(9):872\u2013878","journal-title":"J Am Soc Inf Sci Technol"},{"key":"411_CR27","volume-title":"Prospect theory: an analysis of decision making under risk","author":"D Kahneman","year":"1979","unstructured":"Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision making under risk. Eugene, Ore"},{"key":"411_CR28","doi-asserted-by":"crossref","unstructured":"Bergman O, Tucker S, Beyth-Marom R, Cutrell E, Whittaker S (2009) It\u2019s not that important: demoting personal information of low subjective importance using GrayArea. In: CHI 2009 conference on human factors and computing systems, Boston, USA","DOI":"10.1145\/1518701.1518745"},{"key":"411_CR29","doi-asserted-by":"crossref","unstructured":"Abrams D, Baecker R, Chignell M (1998) Information archiving with bookmarks: personal Web space construction and organization. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press\/Addison-Wesley Publishing Co., Los Angeles, CA, pp 41\u201348","DOI":"10.1145\/274644.274651"},{"key":"411_CR30","doi-asserted-by":"crossref","unstructured":"Kirk D, Sellen A, Rother C, Wood K (2006) Understanding photowork. Paper presented at the SIGCHI conference on human factors in computing systems, Montreal","DOI":"10.1145\/1124772.1124885"},{"issue":"6","key":"411_CR31","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0664-94","volume":"210","author":"U Neisser","year":"1964","unstructured":"Neisser U (1964) Visual search. Sci Am 210(6):94\u2013102","journal-title":"Sci Am"},{"key":"411_CR32","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/0010-0285(80)90005-5","volume":"12","author":"A Treisman","year":"1980","unstructured":"Treisman A, Gelade G (1980) A feature-integration theory of attention. Cogn Psychol 12:97\u2013136","journal-title":"Cogn Psychol"},{"key":"411_CR33","doi-asserted-by":"crossref","unstructured":"Tungare M, P\u2032erez-Qui\u02dcnones M (2008) Thinking outside the (beige) box: Personal information management beyond the desktop. Paper presented at the PIM workshop at CHI 2008, Florence, Italy","DOI":"10.12968\/sece.2008.9.1293"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0411-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0411-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0411-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T03:01:30Z","timestamp":1592622090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0411-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,14]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["411"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0411-3","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,14]]}}}