{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:17:46Z","timestamp":1776115066435,"version":"3.50.1"},"reference-count":76,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2020,10,14]]},"abstract":"<jats:p>Running a household requires a large amount of labor, from ensuring multiple bills are paid to organizing important documents. Failure to manage such information can have critical consequences for the financial and psychological well-being of the family; however, little is known about how families manage the full scale of information encountered in the home. In this paper, we introduce family information management (FIM) as a set of overarching practices involved in managing and coordinating household-related information. To understand how families engage in FIM, we conducted in-depth interviews with members of ten families, which included guided tours of their information archives. We found that families struggle to organize, store, retrieve, and share information, and that there are significant socioemotional costs to this work. We propose opportunities for designing technologies to support FIM and argue that, given the numerous challenges and unmet needs, the understudied area of FIM deserves further investment of research and design efforts.<\/jats:p>","DOI":"10.1145\/3415209","type":"journal-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T22:28:12Z","timestamp":1602800892000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["\"Am I doing this all wrong?\""],"prefix":"10.1145","volume":"4","author":[{"given":"Shruti","family":"Sannon","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Mihaela","family":"Vorvoreanu","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Kathleen","family":"Walker","sequence":"additional","affiliation":[{"name":"Allovus Design, Seattle, WA, USA"}]},{"given":"Adam","family":"Fourney","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:COSU.0000045805.77534.2a"},{"key":"e_1_2_1_2_1","volume-title":"Human-computer interaction: The agency perspective","author":"Bergman Ofer"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124813"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14505001029"},{"key":"e_1_2_1_5_1","first-page":"130","article-title":"Factors hindering shared files retrieval","volume":"72","author":"Bergman Ofer","year":"2019","journal-title":"Journal of Information Management"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","volume-title":"The Science of Managing Our Digital Stuff","author":"Bergman Ofer","DOI":"10.7551\/mitpress\/9780262035170.001.0001"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23147"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1890706.1890712"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169063"},{"key":"e_1_2_1_10_1","first-page":"46","volume-title":"Max Van Kleek","author":"Bernstein Michael","year":"2008"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985766"},{"key":"e_1_2_1_12_1","first-page":"616","article-title":"Too many hierarchies? The daily struggle for control of the workspace","volume":"1","author":"Boardman Richard","year":"2003","journal-title":"Proceedings of HCI International"},{"key":"e_1_2_1_13_1","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis Richard E"},{"key":"e_1_2_1_14_1","volume-title":"The Ultimate Guide to User Research Incentives. https:\/\/www.userinterviews.com\/blog\/the-ultimate-guide-to-user-research-incentives Retrieved","author":"Boyd Carrie","year":"2020"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_21"},{"key":"e_1_2_1_17_1","first-page":"n1","article-title":"Information behaviour that keeps found things found","volume":"10","author":"Bruce Harry","year":"2004","journal-title":"Information Research: An International Electronic Journal"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2008.1450450214"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:COSU.0000045712.26840.a4"},{"key":"e_1_2_1_20_1","volume-title":"Personal Information Management","author":"Cwizdka Jacek","year":"2007"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0003122419859007"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10)","author":"Davidoff Scott"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702540"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/168555.168560"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Association for Computing Machinery","author":"Dumais Susan"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755205"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/291224.291235"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(96)00021-0"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817700154"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.383749"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078845"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650206289149"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v9i3.1123"},{"key":"e_1_2_1_35_1","unstructured":"William Jones. 2010. Keeping found things found: The study and practice of personal information management .Morgan Kaufmann.  William Jones. 2010. Keeping found things found: The study and practice of personal information management .Morgan Kaufmann."},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02278-4","volume-title":"The future of personal information management, part I: our information, always and forever. Synthesis lectures on information concepts, retrieval, and services","author":"Jones William","year":"2012"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Jones William"},{"key":"e_1_2_1_38_1","volume-title":"Personal Information Management Group Report. In The National Science Foundation Workshop of the Information and Data Management Program.","author":"Jones William","year":"2003"},{"key":"e_1_2_1_39_1","volume-title":"Personal information management","author":"Jones William"},{"key":"e_1_2_1_41_1","volume-title":"Unify everything: It's all the same to me. Personal Information Management","author":"Karger David R","year":"2007"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979324"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14)","author":"Kaye Joseph Jofish"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174117"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518963"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531708"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753409"},{"key":"e_1_2_1_48_1","first-page":"331","article-title":"Establishing trustworthiness","volume":"289","author":"Lincoln Yvonna S","year":"1985","journal-title":"Naturalistic Inquiry"},{"key":"e_1_2_1_49_1","volume-title":"Personal Information Management: Challenges and Opportunities","author":"Lutters Wayne G."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/357423.357430"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1289679.1289683"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1758"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502800.1502806"},{"key":"e_1_2_1_55_1","first-page":"165","article-title":"Identifying health and wellbeing related information management activities and needs in families with young children","volume":"4","author":"Palm\u00e9n Marilla","year":"2012","journal-title":"Finnish Journal of eHealth and eWelfare"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291228.3291236"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998262"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17)","author":"Pina Laura R."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107490"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519019"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838746"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145315"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1207745"},{"key":"e_1_2_1_64_1","volume-title":"Notes on Fridge Surfaces. In CHI '05 Extended Abstracts on Human Factors in Computing Systems (CHI EA '05). Association for Computing Machinery","author":"Swan Laurel","year":"1813"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12)","author":"Thayer Alexander"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.1450520100135"},{"key":"e_1_2_1_67_1","volume-title":"AMIA Annual Symposium Proceedings","volume":"2008","author":"Kenton"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145229"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556961"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174161"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322300"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819937"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107494"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-009-0218-7"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979457"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415209","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3415209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:11Z","timestamp":1750197791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415209"}},"subtitle":["Challenges and Opportunities in Family Information Management"],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":76,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2020,10,14]]}},"alternative-id":["10.1145\/3415209"],"URL":"https:\/\/doi.org\/10.1145\/3415209","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,14]]},"assertion":[{"value":"2020-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}