Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Organizing and managing personal electronic files: A mechanical engineer's perspective

Published: 07 October 2008 Publication History

Abstract

This article deals with the organization and management of the computer files handled by mechanical engineers on their personal computers. In engineering organizations, a wide variety of electronic files (documents) are necessary to support both business processes and the activities of design and manufacture. Whilst a large number of files and hence information is formally archived, a significant amount of additional information and knowledge resides in electronic files on personal computers. The widespread use of these personal information stores means that all information is retained. However, its reuse is problematic for all but the individual as a result of the naming and organization of the files. To begin to address this issue, a study of the use and current practices for managing personal electronic files is described. The study considers the fundamental classes of files handled by engineers and analyses the organization of these files across the personal computers of 40 participants. The study involves a questionnaire and an electronic audit. The results of these qualitative and quantitative elements are used to elicit an understanding of the practices and requirements of engineers for managing personal electronic files. A potential scheme for naming and organizing personal electronic files is discussed as one possible way to satisfy these requirements. The aim of the scheme is to balance the personal nature of data storage with the need for personal records to be shared with others to support knowledge reuse in engineering organizations. Although this article is concerned with mechanical engineers, the issues dealt with are relevant to knowledge-based industries and, in particular, teams of knowledge workers.

References

[1]
Adar, E., Karger, D., and Stein, L. A. 1999. Haystack: Per-user information environments. In Proceedings of the 8th International Conference on Information and Knowledge Management (CIKM'99). ACM Press, New York, NY, 413--422.
[2]
Agrawal, N., Bolosky, W. J., Douceur, J. R., and Lorch, J. R. 2007. A five-year study of file-system metadata. ACM Trans. Stor. 3, 3, 32.
[3]
Anderson, C. J., Glassman, M., Mcafee, R. B., and Pinelli, T. 2001. An investigation of factors affecting how engineers and scientists seek information. J. Engin. Techn. Manag. 18, 2, 131--155.
[4]
Anthony, L., Regli, W. C., and John, J. E. 2001. An approach to capturing structure, behavior, and function of artifacts in computer-aided design. J. Comput. Inf. Sci. Engin. 1, 2, 186--192.
[5]
Barreau, D. and Nardi, B. A. 1997. “Finding and reminding” revisited: appropriate metaphors for file organization at the desktop. ACM SIGCHI Bull. 29, 1, 76--78.
[6]
Barreau, D. and Nardi, B. A. 1995. Finding and reminding: File organization from the desktop. ACM SIGCHI Bull. 27, 3, 39--43.
[7]
Bergman, O., Beyth-Marom, R., and Nachmias, R. 2006. The project fragmentation problem in personal information management. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'06), R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. ACM, New York, NY, 271--274.
[8]
Boardman, R. and Sasse, M. A. 2004. Stuff goes into the computer and doesn't come out: A cross-tool study of personal information management. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'04). ACM Press, New York, NY, 583--590.
[9]
Boardman, R., Spence, R., and Sasse, M. A. 2003. Too many hierarchies? The daily struggle for control of the workspace. In Proceedings of the 10th International Conference on Human-Computer Interaction. Lawrence Erlbaum Publishers, New York, NY, 616--620.
[10]
Chaffey, D. and Wood, S. 2004. Business Information Management, Improving Performance Using Information Systems. Addison-Wesley.
[11]
Clarkson, J. and Eckert, C. 2005. Design Process Improvement: A Review of Current Practice. Springer-Verlag.
[12]
Compulink Management Center Inc. 2008. Laserfiche document management. http://www. laserfiche.com/resources/basics/index.html.
[13]
Coughlan, T. and Johnson, P. 2008. Personal information management for creative practitioners. In Proceedings of the Workshop: Personal Information Management. ACM Press, New York, NY.
[14]
Crabtree, R. A., Fox, M. S., and Baid, N. K. 1997. Case studies of coordination activities and problems in collaborative design. Resear. Engin. Des. 9, 2, 70--84.
[15]
Culley, S. J., Court, A. W., and McMahon, C. A. 1992. The information requirements of engineering designers. Engin. Des. 18, 3, 21--23.
[16]
Culley, S. J. and McMahon, C. A. 2005. Perspectives on knowledge management in design, engineering design. Theory and practice: A symposium in honour of Ken Wallace. Cambridge, Engineering Design Centre, University of Cambridge, UK.
[17]
Curtis, G. and Cobham, D. 2005. Business Information Systems: Analysis, Design and Practice. Harlow, Financial Times Prentice Hall.
[18]
Cutrell, E., Dumais, S. T., and Teevan, J. 2006. Searching to eliminate personal information management. Comm. ACM 49, 1, 58--64.
[19]
Demian, P. and Fruchter, R. 2006. An ethnographic study of design knowledge reuse in the architecture, engineering, and construction industry. Res. Engin. Des. 16, 4, 184--195.
[20]
Dietel, J. E. 2000. Improving corporate performance through records audit. Inf. Manag. J. 34, 2, 18--24.
[21]
Dong, A. and Agogino, A. M. 1998. Managing design information in enterprise-wide CAD using ‘smart drawings’. Comput. Aid. Des. 30, 6, 425--435.
[22]
Dumais, S., Cutrell, E., Sarin, R., and Horvitz, E. 2004. Implicit queries for contextualized search. In Proceedings of the International Conference on Research and Development in Information Retrieval. ACM Press, New York, 594.
[23]
Dumais, S., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R., and Robbins, D. 2003. Stuff I've Seen: A system for personal information retrieval and reuse. In Proceedings of the International Conference on Research and Development in Information Retrieval. ACM Press, New York, 72--79.
[24]
Edmunds, A. and Morris, A. 2000. The problem of information overload in business organizations: A review of literature. Int. J. Inf. Manag. 20, 17--28.
[25]
Elsweiler, D. and Ruthven, I. 2007. Towards task-based personal information management evaluations. In Proceedings of the 30th Annual international ACM SIGIR Conference on Research and Development in information Retrieval (SIGIR'07). ACM, New York, NY, 23--30.
[26]
Erickson, T. 2006. From PIM to GIM: Personal information management in group contexts. Comm. ACM 49, 1, 74--75.
[27]
Far, B. H. and Elamy, A. H. 2005. Functional reasoning theories: Problems and perspectives. AI Engin. Des. Manu. 19, 75--88.
[28]
Gero, J. S. 1990. Design prototypes: a knowledge representation schema for design. AI Mag. 11, 4, 26--36.
[29]
Groth, K. and Eklundh, K. S. 2006. Combining personal and organizational information. In Proceedings of the SIGIR Workshop: Personal Information Management. ACM Press, New York, NY, 2006.
[30]
Grudin, J. 2001. Desituating action: Digital representations of context. Hum.-Comput. Interac. 16, 269--286.
[31]
Hicks, B. J., Culley, S. J., Allen, R. D., and Mullineux, G. 2002. A framework for the requirements of capturing, storing and reusing information and knowledge in engineering design. Int. J. Inf. Manag. 22, 4, 263--280.
[32]
ISO 9660. 1988. International Organization for Standardization Information processing -- Volume and file structure of CD-ROM for information interchange.
[33]
Jessup, L. M. and Valacich, J. S. 2008. Information Systems Today: Managing in the Digital World. Pearson Prentice Hall, Upper Saddle River, NJ.
[34]
Jones, W. 2007. Personal information management. In B. Cronin, Annual Review of Information Science and Technology, 41.
[35]
Jones, W., Phuwanartnurak, A. J., Gill, R., and Bruce, H. 2005. Don't take my folders away!: Organizing personal information to get things done. In Proceedings of the Extended Abstracts on Human Factors in Computing Systems (CHI'05). ACM Press, New York, NY, 1505--1508.
[36]
Karger, D. R. and Jones, W. 2006. Data unification in personal information management. Comm. ACM 49, 1, 77--82.
[37]
Karger, D. R. and Quan, D. 2004. Haystack: a user interface for creating, browsing, and organizing arbitrary semistructured information. In Proceedings of the Extended Abstracts on Human Factors in Computing Systems (CHI'04). ACM, New York, NY, 777--778.
[38]
Kwasnik, B. H. 1989. How a personal document's intended use or purpose affects its classification in an office. In Proceedings 12th Annual ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'89). ACM.
[39]
Lansdale, M. W. 1988. The psychology of personal information management. Appl. Ergonomics 19, 1, 55--66.
[40]
Lyman, P. and Varian, H. L. 2003. How much information. http://www.sims.berkeley.edu/how-much-info-2003.
[41]
Maher, M. L. and Gómez De Silva Garza, A. 1997. Case-based reasoning in design. IEEE Expert 12, 2, 34--41.
[42]
McAlpine, H., Hicks, B. J., Huet, G. and Culley, S. J. 2006, An investigation into the use and content of the engineer's logbook. Design Studies 27, 4, 481--504.
[43]
McMahon, C. A., Pitt, D. J., Yang, Y., and Sims Williams, J. H. 1993. Review: An information management system for informal design data. In Proceedings of the 1993 ASME Computer in Engineering Conference and Exposition, K. H. Law, Ed. San Diego, CA, 215--226.
[44]
McMahon, C. A., Lowe, A., Culley, S. J., Corderoy, M., Crossland, R., Shah, T., and Stewart, D. 2004. Waypoint: An Integrated Search and Retrieval System for Engineering Documents. J. Comput. Inf. Sci. Engin. 4, 329--338.
[45]
Oviatt, S. 2006. Human-centered design meets cognitive load theory: designing interfaces that help people think. In Proceedings of the 14th Annual ACM international Conference on Multimedia (MULTIMEDIA'06). ACM, New York, NY, 871--880.
[46]
Pahl, G. and Beitz, W. 1999. Engineering Design: A Systematic Approach. Springer, Berlin, Germany.
[47]
Rachuri, S., Subrahmanian, E., Bouras, A., Fenves, S. J., and Sebti Foufou, R. D. S. 2007. Information sharing and exchange in the context of product lifecycle management: Role of standards. Comput.-Aid. Des.
[48]
Ravasio, P. R., Schär, S. G., and Krueger, H. 2004. In pursuit of desktop evolution: User Problems and Practices with modern desktop systems. In ACM Trans. Comput.-Hum. Interac. (TOCHI) 11, 2, 156--180.
[49]
Regli, W. C., Hu, X., Atwood, M., and Sun, W. 2000. A survey of design rationale systems: approaches, representation, capture and retrieval. Engin. Comput., 16, 3-4, 209--235.
[50]
Schmidt, K. and Wagner, I. 2004. Ordering systems: Coordinative practices and artifacts in architectural design and planning. Computer Supported Cooperative Work (CSCW), Vol. 13, Springer, 349--408.
[51]
Siemens Inc. 2008. Teamcenter Classification -- Facilitating product and process reuse using Teamcentre's classification and reuse capabilities. http://www.siemens.com/plm/.
[52]
Sonnenwald, D. H. 1996. Communication roles that support collaboration during the design process. Des. Studies 17, 3, 277--301.
[53]
Stewart, T. A. 1994. Surviving information overload. Information Technology/Special Report, Fortune (July).
[54]
Stewart, T. A. 1997. Intellectual capital: The new wealth of organizations. Knowl. Manag. 67.
[55]
Suchman, L. 2000. Embodied practices of engineering work. mind. Culture Activity 7, 1/2, 4--18.
[56]
Sutton, M. J. D. 1996. Document Management for the Enterprise: Principles, Techniques, and Applications. John Wiley & Sons, New York, NY.
[57]
Szykman, S., Sriram, R. D., Bochenek, C., Racz, J. W., and Senfaute, J. 2000. Design repositories: Engineering design's new knowledge base. IEEE Intell. Syst. Appl. 15, 3, 48--55.
[58]
Teevan, J., Alvarado, C., Ackerman, M. S., and Karger, D. R. 2006. The perfect search engine is not enough: A study of orienteering behavior in directed search. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Press, New York, NY, 415--422.
[59]
Tsoukas, H. 1996. The firm as a distributed knowledge system: A constructionist approach. Strategic Manag. J. 17, 11--26.
[60]
Truearth. 2008. TruEarth® 1km satellite imagery filename convention. http://www.truearth.com/prod_1km/filenames_content.htm.
[61]
Ward, M. 2001. A survey of engineers in their information world. J. Librarianship Inf. Sci. 33, 4, 168--176.
[62]
Whittaker, S. and Hirschberg, J. 2001. The character, value, and management of personal paper archives. In ACM Trans. Comput.-Hum. Interac. 8, 2, 150--170.
[63]
Yang, M. C., Wood III, W. H., and Cutkosky, M. R. 2005. Design information retrieval: a thesauri-based approach for reuse of informal design information. Engin. Comput. 21, 2, 177--192.

Cited By

View all
  • (2024)Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-RansomwareFoundations and Practice of Security10.1007/978-3-031-57537-2_17(269-284)Online publication date: 25-Apr-2024
  • (2023)Automated File Labeling for Heterogeneous Files Organization Using Machine LearningComputers, Materials & Continua10.32604/cmc.2023.03286474:2(3263-3278)Online publication date: 2023
  • (2022)CamoDroidJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2022.102452125:COnline publication date: 1-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Information Systems
ACM Transactions on Information Systems  Volume 26, Issue 4
September 2008
219 pages
ISSN:1046-8188
EISSN:1558-2868
DOI:10.1145/1402256
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 October 2008
Accepted: 01 July 2008
Revised: 01 February 2008
Received: 01 March 2007
Published in TOIS Volume 26, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Engineers
  2. directory and file naming conventions
  3. file sharing and file recognition and recall
  4. information management

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)2
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-RansomwareFoundations and Practice of Security10.1007/978-3-031-57537-2_17(269-284)Online publication date: 25-Apr-2024
  • (2023)Automated File Labeling for Heterogeneous Files Organization Using Machine LearningComputers, Materials & Continua10.32604/cmc.2023.03286474:2(3263-3278)Online publication date: 2023
  • (2022)CamoDroidJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2022.102452125:COnline publication date: 1-Apr-2022
  • (2022)Building a Better World with Our InformationundefinedOnline publication date: 10-Mar-2022
  • (2021)Modeling the process of personal digital archiving through ubiquitous and desktop devices: A systematic reviewJournal of Librarianship and Information Science10.1177/096100062199641054:1(132-143)Online publication date: 4-Mar-2021
  • (2021)RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomwareComputer Networks10.1016/j.comnet.2021.108011191(108011)Online publication date: May-2021
  • (2021)How Big Are Peoples' Computer Files? File Size Distributions Among User‐managed CollectionsProceedings of the Association for Information Science and Technology10.1002/pra2.47258:1(425-429)Online publication date: 13-Oct-2021
  • (2020)Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoringJournal of Computer Security10.3233/JCS-19134628:3(337-373)Online publication date: 1-Jan-2020
  • (2020)Managing complex engineering projectsInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2019.10.00151:COnline publication date: 1-Apr-2020
  • (2019)The Scale and Structure of Personal File CollectionsProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300557(1-12)Online publication date: 2-May-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media