Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1240624.1240769acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Exploring patterns of social commonality among file directories at work

Published: 29 April 2007 Publication History

Abstract

We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or other files may suggest shared interests or experience among users. Examining actual file data revealed a number of individual and aggregate practices around file storage. For example, pairs of users typically have many (over 13,000) files in common. A prototype called LiveWire exploits this commonality to make file backup and restore more efficient for a work organization. We removed commonly shared files and focused on specific filetypes that represent user activity to find more meaningful files in common. The Consolidarity project explores how patterns of file commonality could encourage social networking in an organizational context. Mechanisms for addressing the privacy concerns raised by this approach are discussed.

References

[1]
Amazon, "Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more", http://amazon.com/ (verified January 17, 2007).
[2]
Bonkenburg, Ted Dejan Diklic, Benjamin Reed, Mark Smith, Michael Vanover, Steve Welch, and Roger Williams, "LifeBoat: An Autonomic Backup and Restore Solution", LISA 2004, Atlanta, November 2004, pp.159--170.
[3]
Carter, Scott, Jen Mankoff, and P. Goddi, "Building Connections among Loosely Coupled Groups: Hebb's Rule at Work", Computer Supported Cooperative Work, Vol. 13, Issue 3-4, 2004, pp. 305--327.
[4]
del.icio.us, "del.icio.us/about", http://del.icio.us/about/, (verified January 17, 2007).
[5]
Dumais, Susan T., E. Cutrell, E., J. J. Cadiz, G. Jancke, R. Sarin and D. C. Robbins, "Stuff I've Seen: A system for personal information retrieval and re-use", SIGIR 2003, Toronto, July 2003, pp. 72--79.
[6]
Fagin, Ronald, Ravi Kumar, Kevin McCurley, Jasmine Novak, D. Sivakumar, John A. Tomlin, David Williamson, "Searching the workplace web", WWW 2003, pp. 366--375.
[7]
Farrell, Stephen, Christopher Campbell, and Suvda Myagmar, "Relescope: an experiment in accelerating relationships", Extended Abstracts: CHI 2005, Portland, April 2005.
[8]
Forman, George, Kave Eshghi, and Stephane Chiochetti, "Finding Similar Files in Large Document Repositories", KDD 2005, Chicago, August 2005, pp.
[9]
Good, Nathaniel, Aaron Krekelberg, "Usability and privacy: a study of Kazaa P2P file-sharing", CHI 2003, pp. 137--144.
[10]
Google Desktop, "Google Desktop ---- Features", http://desktop.google.com/about.html (verified January 17, 2007).
[11]
Gmail, "About Gmail", http://mail.google.com/mail/help/about.html (verified, January 17, 2007).
[12]
Haythornthwaite, Caroline, "Social network analysis: an approach and technique for studying information exchange", Library & Information Science Research, Vol. 18, No. 4, 1996, pp. 323--342.
[13]
Lau, Tessa, Oren Etzioni, Daniel S. Weld, "Privacy Interfaces for Information Management", Communications of the ACM, Vol. 42, No. 10, October 1999, pp. 88--94.
[14]
Millen, David R., Jonathan Feinberg, Bernard Kerr, "Dogear: Social bookmarking in the enterprise", CHI 2006, Montreal, April 2006, pp. 111--120.
[15]
Olson, Judith S., Jonathan Grudin, and Eric Horvitz, "A Study of Preferences for Sharing and Privacy", Extended Abstracts: CHI 2005, Portland, April 2005, pp. 1985--1988.
[16]
Pohs, W., G. Pinder, C. Dougherty, and M. White, "The Lotus Knowledge Discovery System: Tools and Experiences", IBM Systems Journal, Vol. 40, N0. 4, 2001, pp. 956--966.
[17]
Policroniades, Calicrates & Ian Pratt, "Alternatives for Detecting Redundancy in Storage Systems Data", USENIX 2004 Annual Technical Conference, Boston, June 2004, pp. 73--86.
[18]
"RFC 1321", http://rfc.net/rfc1321.html, (verified January 17, 2007).
[19]
Rabin, M. O., "Fingerprinting by Random Polynomicals", Report TR-15-81, Center for Research in Computing Technology, Harvard University, 1981.
[20]
Rockley, Ann with Pamela Kostur and Steve Manning, Managing Enterprise Content: A Unified Content Strategy, New Riders Publishing, 2002.
[21]
Salton, Gerard & Christopher Buckley, "Term-weighting approaches in automatic text retrieval, Information", Processing and Management: An International Journal, Vol. 24, No. 5, 1988, pp. 513--523.
[22]
Schirmer, Andy, "Privacy and knowledge management: Challenges in the design of the Lotus Discovery Server", IBM Systems Journal, Vol. 43, No. 3, 2003, pp. 519--531.
[23]
Voida, Stephen, W. Keith Edwards, Mark W. Newman, Rebecca E. Grinter, and Nicolas Ducheneaut, "Share and Share Alike: Exploring the User Interface Affordances of File Sharing", CHI 2006, Montreal, April 2006, pp. 221--230.

Cited By

View all
  • (2022)A "Distance Matters" Paradox: Facilitating Intra-Team Collaboration Can Harm Inter-Team CollaborationProceedings of the ACM on Human-Computer Interaction10.1145/35128956:CSCW1(1-36)Online publication date: 7-Apr-2022
  • (2015)File sharing in cloud computing using win stay lose shift strategyInternational Journal of High Performance Computing and Networking10.1504/IJHPCN.2015.0700168:2(154-166)Online publication date: 1-Jun-2015
  • (2015)Design Process of a Social Network System for Storage and Share Files in the WorkplaceDesign, User Experience, and Usability: Interactive Experience Design10.1007/978-3-319-20889-3_2(13-24)Online publication date: 21-Jul-2015
  • Show More Cited By

Index Terms

  1. Exploring patterns of social commonality among file directories at work

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2007
    1654 pages
    ISBN:9781595935939
    DOI:10.1145/1240624
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 April 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CSCW
    2. enterprise work setting
    3. file management
    4. social networking
    5. social recommendation
    6. usage logs

    Qualifiers

    • Article

    Conference

    CHI07
    Sponsor:
    CHI07: CHI Conference on Human Factors in Computing Systems
    April 28 - May 3, 2007
    California, San Jose, USA

    Acceptance Rates

    CHI '07 Paper Acceptance Rate 182 of 840 submissions, 22%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A "Distance Matters" Paradox: Facilitating Intra-Team Collaboration Can Harm Inter-Team CollaborationProceedings of the ACM on Human-Computer Interaction10.1145/35128956:CSCW1(1-36)Online publication date: 7-Apr-2022
    • (2015)File sharing in cloud computing using win stay lose shift strategyInternational Journal of High Performance Computing and Networking10.1504/IJHPCN.2015.0700168:2(154-166)Online publication date: 1-Jun-2015
    • (2015)Design Process of a Social Network System for Storage and Share Files in the WorkplaceDesign, User Experience, and Usability: Interactive Experience Design10.1007/978-3-319-20889-3_2(13-24)Online publication date: 21-Jul-2015
    • (2014)PIM and personalityProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2556288.2557023(3695-3704)Online publication date: 26-Apr-2014
    • (2013)SAFEJournal of Signal Processing Systems10.1007/s11265-013-0775-x72:3(209-228)Online publication date: 1-Sep-2013
    • (2011)Which version is this?Proceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1978942.1979334(2669-2678)Online publication date: 7-May-2011
    • (2011)Browse and discoverProceedings of the ACM 2011 conference on Computer supported cooperative work10.1145/1958824.1958868(295-304)Online publication date: 19-Mar-2011
    • (2010)The effect of audience design on labeling, organizing, and finding shared filesProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1753326.1753440(777-786)Online publication date: 10-Apr-2010
    • (2010)SAMProceedings of the 2010 39th International Conference on Parallel Processing10.1109/ICPP.2010.69(614-623)Online publication date: 13-Sep-2010
    • (2010)A proposal to enhance cross-marketing via social networks by modelling and analyzing market basket like patterns across social network groups2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA)10.1109/BASNA.2010.5730301(1-4)Online publication date: Dec-2010
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media