{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:08:51Z","timestamp":1759961331857,"version":"3.41.2"},"reference-count":46,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AJIM"],"published-print":{"date-parts":[[2020,11,20]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Differences in personal information management (PIM) behavior are well established in the literature, but are defined from the narrow perspective of practical use (e.g. filing\/piling, emailing). This paper aims to identify the types of PIM behavior that would help us understand how people manage personal information in the digital era.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors relied on the theoretical framework, published in a recent article (Alon and Nachmias, 2020a), examining actual PIM behavior (e.g. actual practice), ideal behavior (e.g. perceptions of best practice) and the gaps between them. Our framework drew on data collected via a questionnaire on the use of 25 PIM practices (<jats:italic>N<\/jats:italic>\u00a0=\u00a0465).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The findings indicated four types of PIM behavior that differed by activity level (actual PIM) and satisfaction level (ideal PIM and gaps): passive and satisfied, active and satisfied, fairly active and unsatisfied and active and fairly satisfied. This allows the classification of users according to their dominant tendency to use specific practices.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Previous studies focused mainly on specific PIM practices or contexts. Our research creates a classification of types, based on ideal as well as actual PIM behavior, and also examines a broader perspective.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ajim-07-2020-0208","type":"journal-article","created":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T12:58:54Z","timestamp":1601989134000},"page":"929-943","source":"Crossref","is-referenced-by-count":4,"title":["Towards a typology of personal information management behavior: exploring and defining people's interactions with personal information"],"prefix":"10.1108","volume":"72","author":[{"given":"Lilach","family":"Alon","sequence":"first","affiliation":[]},{"given":"Alona","family":"Forkosh Baruch","sequence":"additional","affiliation":[]},{"given":"Rafi","family":"Nachmias","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"key2022092114502751500_ref001","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106292","article-title":"Gaps between actual and ideal personal information management behavior","volume":"107","year":"2020","journal-title":"Computers in Human Behavior"},{"key":"key2022092114502751500_ref002","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102503","article-title":"Anxious and frustrated but still competent: affective aspects of interactions with personal information management","volume":"144","year":"2020","journal-title":"International Journal of Human-Computer Studies"},{"year":"2018","first-page":"537","article-title":"\u2018\u2026otherwise I will get lost\u2019: affective aspects of personal information management among preservice teachers","key":"key2022092114502751500_ref003"},{"issue":"3","key":"key2022092114502751500_ref004","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1093\/iwc\/iwz021","article-title":"How knowledge workers manage their personal information spaces: perceptions, challenges, and high-level strategies","volume":"31","year":"2019","journal-title":"Interacting with Computers"},{"issue":"2","key":"key2022092114502751500_ref005","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1002\/asi.20752","article-title":"The persistence of behavior and form in the organization of personal information","volume":"59","year":"2008","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2022092114502751500_ref006","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep14719","article-title":"Navigating through digital folders uses the same brain structures as real world navigation","volume":"5","year":"2015","journal-title":"Scientific Reports"},{"volume-title":"The Science of Managing Our Digital Stuff","year":"2016","doi-asserted-by":"publisher","key":"key2022092114502751500_ref007","DOI":"10.17723\/0360-9081-81.1.233"},{"issue":"1","key":"key2022092114502751500_ref008","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1093\/iwc\/iwx017","article-title":"The cognitive costs of upgrades","volume":"30","year":"2018","journal-title":"Interacting with Computers"},{"issue":"9","key":"key2022092114502751500_ref009","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1002\/asi.10283","article-title":"The user-subjective approach to personal information management systems","volume":"54","year":"2003","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"2","key":"key2022092114502751500_ref010","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1002\/asi.20738","article-title":"The user-subjective approach to personal information management systems design: evidence and implementations","volume":"59","year":"2008","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"5","key":"key2022092114502751500_ref011","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1108\/AP-04-2013-0032","article-title":"Variables for personal information management research","volume":"65","year":"2013","journal-title":"ASLIB Proceedings"},{"key":"key2022092114502751500_ref012","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/985692.985766","article-title":"Stuff goes into the computer and doesn't come out: a cross-tool study of personal information management","year":"2004"},{"issue":"8","key":"key2022092114502751500_ref013","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1002\/asi.22864","article-title":"\u2018It's stuff that speaks to me\u2019: exploring the characteristics of digital possessions","volume":"64","year":"2013","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"key2022092114502751500_ref014","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/asi.24222","article-title":"The ubiquitous digital file: a review of file management research","volume":"71","year":"2019","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"key2022092114502751500_ref015","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1080\/1359432X.2014.1000873","article-title":"Managing information overload in virtual teams: effects of a structured online team adaptation on cognition and performance","volume":"24","year":"2015","journal-title":"European Journal of Work and Organizational Psychology"},{"issue":"5","key":"key2022092114502751500_ref016","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1080\/01972240490507974","article-title":"The concept of information overload: a review of literature from organization science, accounting, marketing, MIS, and related disciplines","volume":"20","year":"2004","journal-title":"The Information Society"},{"key":"key2022092114502751500_ref017","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0126090","article-title":"Competing for attention in social media under information overload conditions","volume":"10","year":"2015","journal-title":"PloS One"},{"key":"key2022092114502751500_ref018","first-page":"206","article-title":"Individual differences","volume-title":"Personal Information Management","year":"2007"},{"volume-title":"Personal Information Management and Learning","year":"2013","key":"key2022092114502751500_ref019"},{"issue":"3","key":"key2022092114502751500_ref020","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1037\/0022-3514.72.3.515","article-title":"Emotional responses to goal attainment: strength of regulatory focus as moderator","volume":"72","year":"1997","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2022092114502751500_ref021","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1037\/0033-295X.94.3.319","article-title":"Self-discrepancy: a theory relating self and affect","volume":"94","year":"1987","journal-title":"Psychological Review"},{"key":"key2022092114502751500_ref022","doi-asserted-by":"publisher","first-page":"3513","DOI":"10.1145\/2702123.2702523","article-title":"\u2018For telling\u2019 the present: using the delphi method to understand personal information management practices","year":"2015"},{"issue":"1","key":"key2022092114502751500_ref023","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1002\/aris.2007.1440410117","article-title":"Personal information management","volume":"41","year":"2007","journal-title":"Annual Review of Information Science and Technology"},{"volume-title":"Keeping Found Things Found","year":"2008","key":"key2022092114502751500_ref024"},{"issue":"1","key":"key2022092114502751500_ref025","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00411ED1V01Y201203ICR021","article-title":"The future of personal information management, part I: our information, always and forever","volume":"4","year":"2012","journal-title":"Synthesis Lectures on Information Concepts, Retrieval, and Services"},{"key":"key2022092114502751500_ref075","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/1124772.1124814","article-title":"To have and to hold: exploring the personal archive","year":"2006","journal-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"},{"key":"key2022092114502751500_ref026","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/0003-6870(88)90199-8","article-title":"The psychology of personal information management","volume":"19","year":"1988","journal-title":"Applied Ergonomics"},{"key":"key2022092114502751500_ref027","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/357423.357430","article-title":"How do people organize their desks?: implications for the design of office information systems","volume":"1","year":"1983","journal-title":"ACM Transactions on Information Systems"},{"issue":"3","key":"key2022092114502751500_ref028","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/asi.23699","article-title":"Going beyond intention: integrating behavioral expectation into the unified theory of acceptance and use of technology","volume":"68","year":"2017","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"key2022092114502751500_ref029","doi-asserted-by":"publisher","first-page":"3695","DOI":"10.1145\/2556288.2557023","article-title":"PIM and personality: what do our personal file systems say about us?","year":"2014"},{"key":"key2022092114502751500_ref030","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1145\/2207676.2207789","article-title":"Lost in translation: understanding the possession of digital things in the cloud","year":"2012"},{"issue":"2","key":"key2022092114502751500_ref031","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11120\/elss.2012.04020005","article-title":"The process and affective environment of students' personal information management","volume":"4","year":"2012","journal-title":"Enhancing Learning in the Social Sciences"},{"issue":"5","key":"key2022092114502751500_ref032","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1002\/mar.21003","article-title":"The best I can be: how self\u2010accountability impacts product choice in technology\u2010mediated environments","volume":"34","year":"2017","journal-title":"Psychology and Marketing"},{"key":"key2022092114502751500_ref033","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1080\/02757206.2017.1397654","article-title":"Digital containment and its discontents","volume":"29","year":"2018","journal-title":"History and Anthropology"},{"issue":"2","key":"key2022092114502751500_ref034","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1480506.1480524","article-title":"Personal information management (PIM) 2008","volume":"42","year":"2008","journal-title":"ACM SIGIR Forum"},{"issue":"2","key":"key2022092114502751500_ref035","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1002\/asi.23678","article-title":"Information management in the humanities: scholarly processes, tools, and the construction of personal collections","volume":"68","year":"2017","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"3","key":"key2022092114502751500_ref036","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"key":"key2022092114502751500_ref037","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1145\/3322276.3322300","article-title":"Keeping and discarding personal data: exploring a design space","year":"2019"},{"key":"key2022092114502751500_ref038","doi-asserted-by":"publisher","first-page":"3423","DOI":"10.1145\/2702123.2702380","article-title":"Digital collections and digital collecting practices","year":"2015"},{"issue":"5","key":"key2022092114502751500_ref039","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1093\/iwc\/iww042","article-title":"The function and future of the folder","volume":"29","year":"2017","journal-title":"Interacting with Computers"},{"key":"key2022092114502751500_ref040","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s00779-020-01412-4","article-title":"Mood and personal information management: how we feel influences how we organize our information","volume":"24","year":"2020","journal-title":"Personal and Ubiquitous Computing"},{"year":"1996","first-page":"276","article-title":"Email overload: exploring personal information management of email","key":"key2022092114502751500_ref041"},{"issue":"1","key":"key2022092114502751500_ref042","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s00779-009-0218-7","article-title":"Easy on that trigger dad: a study of long term family photo retrieval","volume":"14","year":"2010","journal-title":"Personal and Ubiquitous Computing"},{"key":"key2022092114502751500_ref043","doi-asserted-by":"publisher","first-page":"3449","DOI":"10.1145\/1978942.1979457","article-title":"Am I wasting my time organizing email?: a study of email refinding","year":"2011"},{"issue":"1","key":"key2022092114502751500_ref044","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/aris.2011.1440450108","article-title":"Personal information management: from information consumption to curation","volume":"45","year":"2011","journal-title":"Annual Review of Information Science and Technology"},{"issue":"5","key":"key2022092114502751500_ref045","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.acalib.2019.06.002","article-title":"Postgraduates' personal digital archiving practices in China: problems and strategies","volume":"45","year":"2019","journal-title":"The Journal of Academic Librarianship"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-07-2020-0208\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-07-2020-0208\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:00:58Z","timestamp":1753398058000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/72\/6\/929-943\/43818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":46,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,10,7]]},"published-print":{"date-parts":[[2020,11,20]]}},"alternative-id":["10.1108\/AJIM-07-2020-0208"],"URL":"https:\/\/doi.org\/10.1108\/ajim-07-2020-0208","relation":{},"ISSN":["2050-3806"],"issn-type":[{"type":"print","value":"2050-3806"}],"subject":[],"published":{"date-parts":[[2020,10,7]]}}}