Mac Users Do It Differently: the Role of Operating System and Individual Differences in File Management

09/30/2021
by   Jesse David Dinneen, et al.
0

Despite much discussion in HCI research about how individual differences likely determine computer users' personal information management (PIM) practices, the extent of the influence of several important factors remains unclear, including users' personalities, spatial abilities, and the different software used to manage their collections. We therefore analyse data from prior CHI work to explore (1) associations of people's file collections with personality and spatial ability, and (2) differences between collections managed with different operating systems and file managers. We find no notable associations between users' attributes and their collections, and minimal predictive power, but do find considerable and surprising differences across operating systems. We discuss these findings and how they can inform future research.

READ FULL TEXT
research
07/07/2021

How Big Are Peoples' Computer Files? File Size Distributions Among User-managed Collections

Improving file management interfaces and optimising system performance r...
research
09/20/2021

The ubiquitous digital file: A review of file management research

Computer users spend time every day interacting with digital files and f...
research
08/01/2016

Example Data Sets and Collections for BeSpaceD Explained

In this report, we present example data sets and collections for the BeS...
research
07/07/2020

On the Efficiency of Decentralized File Storage for Personal Information Management Systems

This paper presents an architecture, based on Distributed Ledger Technol...
research
08/31/2012

Performance Evaluation of Flash File Systems

Today, flash memory are strongly used in the embedded system domain. NAN...
research
06/10/2019

Analysis of parallel I/O use on the UK national supercomputing service, ARCHER using Cray LASSi and EPCC SAFE

In this paper, we describe how we have used a combination of the LASSi t...
research
03/25/2020

Norms and Sanctions as a Basis for Promoting Cybersecurity Practices

Many cybersecurity breaches occur due to users not following good cybers...

Please sign up or login with your details

Forgot password? Click here to reset