{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:43:40Z","timestamp":1771235020094,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,18]],"date-time":"2015-04-18T00:00:00Z","timestamp":1429315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,18]]},"DOI":"10.1145\/2702123.2702523","type":"proceedings-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T22:11:35Z","timestamp":1429308695000},"page":"3513-3522","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["\"For Telling\" the Present"],"prefix":"10.1145","author":[{"given":"William","family":"Jones","sequence":"first","affiliation":[{"name":"The Information School, University of Washington, Seattle, WA, USA"}]},{"given":"Robert","family":"Capra","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Anne","family":"Diekema","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, USA"}]},{"given":"Jaime","family":"Teevan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Manuel","family":"P\u00e9rez-Qui\u00f1ones","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Jesse David","family":"Dinneen","sequence":"additional","affiliation":[{"name":"McGill University, Montreal, Canada"}]},{"given":"Bradley","family":"Hemminger","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/221296.221307"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985785"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642672"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124813"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402256.1402259"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22906"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518745"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v61:12"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208707"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985766"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Information behavior that keeps found things found","volume":"10","author":"Bruce H.","year":"2004","unstructured":"Bruce , H. , Jones , W. , and Dumais , S . Information behavior that keeps found things found . Information Research 10 , 1 ( 2004 ). Bruce, H., Jones, W., and Dumais, S. Information behavior that keeps found things found. Information Research 10, 1 (2004).","journal-title":"Information Research"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2008.1450450214"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.9.3.458"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v9i3.1123"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753866"},{"key":"e_1_3_2_1_16_1","volume-title":"Personal Information Management","author":"Jones W.","year":"2007","unstructured":"Jones , W. and Teevan , J . Personal Information Management . Univ.Washington Press , Seattle, WA , 2007 . Jones, W. and Teevan, J. Personal Information Management. Univ.Washington Press, Seattle, WA, 2007."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. iConference","author":"Jones W.","year":"2014","unstructured":"Jones , W. , Wenning , A. , and Bruce , H . How do people re-find files, emails and web pages? Proc. iConference 2014 . Jones, W., Wenning, A., and Bruce, H. How do people re-find files, emails and web pages? Proc. iConference 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/75334.75356"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0003-6870(88)90199-8"},{"key":"e_1_3_2_1_20_1","volume-title":"The Delphi method: Techniques and applications","author":"Linstone H.A.","year":"1975","unstructured":"Linstone , H.A. and Turoff , M . The Delphi method: Techniques and applications . Addison-Wesley Reading , MA , 1975 . Linstone, H.A. and Turoff, M. The Delphi method: Techniques and applications. Addison-Wesley Reading, MA, 1975."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2010.09.011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466216"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(99)00018-7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985745"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581181"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1479064.1479122"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979457"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0040-1625(91)90002-W"}],"event":{"name":"CHI '15: CHI Conference on Human Factors in Computing Systems","location":"Seoul Republic of Korea","acronym":"CHI '15","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2702123.2702523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2702123.2702523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:41Z","timestamp":1750227401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2702123.2702523"}},"subtitle":["Using the Delphi Method to Understand Personal Information Management Practices"],"short-title":[],"issued":{"date-parts":[[2015,4,18]]},"references-count":29,"alternative-id":["10.1145\/2702123.2702523","10.1145\/2702123"],"URL":"https:\/\/doi.org\/10.1145\/2702123.2702523","relation":{},"subject":[],"published":{"date-parts":[[2015,4,18]]},"assertion":[{"value":"2015-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}