Results 1 - 10
of
198
Tasktracer: a desktop environment to support multi-tasking knowledge workers
- In IUI ’05: Proceedings of the 10th international conference on Intelligent user interfaces
, 2005
"... This paper reports on TaskTracer — a software system being designed to help highly multitasking knowledge workers rapidly locate, discover, and reuse past processes they used to successfully complete tasks. The system monitors users ’ interaction with a computer, collects detailed records of users ’ ..."
Abstract
-
Cited by 144 (23 self)
- Add to MetaCart
(Show Context)
This paper reports on TaskTracer — a software system being designed to help highly multitasking knowledge workers rapidly locate, discover, and reuse past processes they used to successfully complete tasks. The system monitors users ’ interaction with a computer, collects detailed records of users ’ activities and resources accessed, associates (automatically or with users ’ assistance) each interaction event with a particular task, enables users to access records of past activities and quickly restore task contexts. We present a novel Publisher-Subscriber architecture for collecting and processing users ’ activity data, describe several different user interfaces tried with TaskTracer, and discuss the possibility of applying machine learning techniques to recognize/predict users ’ tasks.
Stuff goes into the computer and doesn't come out”: A cross-tool study of personal information management
- Study of Personal Information Management. Proc. CHI, ACM
, 2004
"... This paper reports a study of Personal Information Management (PIM), which advances research in two ways: (1) rather than focusing on one tool, we collected cross-tool data relating to file, email and web bookmark usage for each participant, and (2) we collected longitudinal data for a subset of the ..."
Abstract
-
Cited by 117 (1 self)
- Add to MetaCart
This paper reports a study of Personal Information Management (PIM), which advances research in two ways: (1) rather than focusing on one tool, we collected cross-tool data relating to file, email and web bookmark usage for each participant, and (2) we collected longitudinal data for a subset of the participants. We found that individuals employ a rich variety of strategies both within and across PIM tools, and we present new strategy classifications that reflect this behaviour. We discuss synergies and differences between tools that may be useful in guiding the design of tool integration. Our longitudinal data provides insight into how PIM behaviour evolves over time, and suggests that the supporting nature of PIM discourages reflection by users on their strategies. We discuss how users may benefit if tools and organizations promote increased reflection on PIM.
No task left behind? Examining the nature of fragmented work
- in: Proceedings of ACM CHI 2005, ACM
, 2005
"... We present data from detailed observation of 24 information workers that shows that they experience work fragmentation as common practice. We consider that work fragmentation has two components: length of time spent in an activity, and frequency of interruptions. We examined work fragmentation along ..."
Abstract
-
Cited by 113 (10 self)
- Add to MetaCart
(Show Context)
We present data from detailed observation of 24 information workers that shows that they experience work fragmentation as common practice. We consider that work fragmentation has two components: length of time spent in an activity, and frequency of interruptions. We examined work fragmentation along three dimensions: effect of collocation, type of interruption, and resumption of work. We found work to be highly fragmented: people average little time in working spheres before switching and 57 % of their working spheres are interrupted. Collocated people work longer before switching but have more interruptions. Most internal interruptions are due to personal work whereas most external interruptions are due to central work. Though most interrupted work is resumed on the same day, more than two intervening activities occur before it is. We discuss implications for technology design: how our results can be used to support people to maintain continuity within a larger framework of their working spheres. Author Keywords Multi-tasking, attention management, information overload,
Visualizing Email Content: Portraying Relationships from Conversational Histories
- In CHI ’06: Proceedings of the SIGCHI conference on Human Factors in computing systems
, 2006
"... Figure 1: Screen shot of Themail showing a user’s email exchange with a friend during 18 months. We present Themail, a visualization that portrays relationships using the interaction histories preserved in email archives. Using the content of exchanged messages, it shows the words that characterize ..."
Abstract
-
Cited by 96 (3 self)
- Add to MetaCart
(Show Context)
Figure 1: Screen shot of Themail showing a user’s email exchange with a friend during 18 months. We present Themail, a visualization that portrays relationships using the interaction histories preserved in email archives. Using the content of exchanged messages, it shows the words that characterize one’s correspondence with an individual and how they change over the period of the relationship. This paper describes the interface and content-parsing algorithms in Themail. It also presents the results from a user study where two main interaction modes with the visualization emerged: exploration of “big picture ” trends and themes in email (haystack mode) and more detail-oriented exploration Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
What a To-Do: studies of task management towards the design of a personal task list manager
- In Proc. of CHI’04
, 2004
"... This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked how tasks are completed over time. Our work shows that, contrary to popular wisdom, people are not poor at prioritizing. ..."
Abstract
-
Cited by 83 (2 self)
- Add to MetaCart
(Show Context)
This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked how tasks are completed over time. Our work shows that, contrary to popular wisdom, people are not poor at prioritizing. Rather, they have well-honed strategies for tackling particular task management challenges. By illustrating what factors influence task completion and how representations function to support task management, we hope to provide a strong foundation for the design of a personal to-do list manager. We also present some preliminary efforts in this direction.
Quality versus quantity: E-mail-centric task management and its relation with overload
, 2005
"... It is widely acknowledged that many professionals suffer from “e-mail overload.” This articlepresents findings fromin-depth fieldwork that examined thisphenome-non, uncovering six key challenges of task management in e-mail. Analysis of quali-tativeandquantitativedata suggests that it is not simply ..."
Abstract
-
Cited by 69 (5 self)
- Add to MetaCart
(Show Context)
It is widely acknowledged that many professionals suffer from “e-mail overload.” This articlepresents findings fromin-depth fieldwork that examined thisphenome-non, uncovering six key challenges of task management in e-mail. Analysis of quali-tativeandquantitativedata suggests that it is not simply thequantitybut also thecol-
Socio-Technical Congruence: A Framework for Assessing the Impact of Technical and Work . . .
- WORK DEPENDENCIES ON SOFTWARE DEVELOPMENT PRODUCTIVITY. IN PROCEEDINGS OF THE 2ND SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM’08
, 2008
"... The identification and management of work dependencies is a fundamental challenge in software development organizations. This paper argues that modularization, the traditional technique intended to reduce interdependencies among components of a system, has serious limitations in the context of softw ..."
Abstract
-
Cited by 63 (7 self)
- Add to MetaCart
(Show Context)
The identification and management of work dependencies is a fundamental challenge in software development organizations. This paper argues that modularization, the traditional technique intended to reduce interdependencies among components of a system, has serious limitations in the context of software development. We build on the idea of congruence, proposed in our prior work, to examine the relationship between the structure of technical and work dependencies and the impact of dependencies on software development productivity. Our empirical evaluation of the congruence framework showed that when developers’ coordination patterns are congruent with their coordination needs, the resolution time of modification requests was significantly reduced. Furthermore, our analysis highlights the importance of identifying the “right” set of technical dependencies that drive the coordination requirements among software developers. Call and data dependencies appear to have far less impact than logical dependencies. Categories and Subject Descriptors
Learning to classify email into speech acts
- In Proceedings of Empirical Methods in Natural Language Processing
, 2004
"... It is often useful to classify email according to the intent of the sender (e.g., "propose a meeting", "deliver information"). We present experimental results in learning to classify email in this fashion, where each class corresponds to a verb-noun pair taken from a predefined o ..."
Abstract
-
Cited by 62 (8 self)
- Add to MetaCart
It is often useful to classify email according to the intent of the sender (e.g., "propose a meeting", "deliver information"). We present experimental results in learning to classify email in this fashion, where each class corresponds to a verb-noun pair taken from a predefined ontology describing typical “email speech acts”. We demonstrate that, although this categorization problem is quite different from “topical ” text classification, certain categories of messages can nonetheless be detected with high precision (above 80%) and reasonable recall (above 50%) using existing text-classification learning methods. This result suggests that useful tasktracking tools could be constructed based on automatic classification into this taxonomy. 1
Learning to Extract Signature and Reply Lines from Email
- IN PROCEEDINGS OF THE CONFERENCE ON EMAIL AND ANTI-SPAM
, 2004
"... We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessing email for text-to-speech systems ..."
Abstract
-
Cited by 57 (4 self)
- Add to MetaCart
We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessing email for text-to-speech systems
Understanding email use: predicting action on a message
- In SIGCHI, ACM
, 2005
"... Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examined people's ratings of message importance and the actions they took on specific email messages, based on message cha ..."
Abstract
-
Cited by 52 (4 self)
- Add to MetaCart
(Show Context)
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examined people's ratings of message importance and the actions they took on specific email messages, based on message characteristics and characteristics of receivers and senders. Respondents kept half of their new messages in the inbox and replied to about a third of them. They rated messages as important if they were about work and required action. Importance, in turn, had a modest impact on whether people replied to their incoming messages and whether they saved them. The results indicate that factors other than message importance (e.g., their social nature) also determine how people handle email. Overall, email usage reflects attentional differences due both to personal propensities and to work demands and relationships.