Open Access
Subscription Access
Open Access
Subscription Access
A Study on the Personal Information Management Practices among the Research Scholars of University of Kerala
Subscribe/Renew Journal
This paper aims to understand how the research scholars of faculty of applied sciences in the University of Kerala manage personal information through internet services. Personal Information Management(PIM) refers to a set of activities a person perform in order to acquire or create, store, organize, maintain, retrieve, use and distribute personal information for different purposes. Questionnaire method was employed for data collection and out of the 59 respondents, 69.6% females and 30.4% male scholars are using their lap tops for managing personal information. Majority of the respondents prefer e-mail as the most used internet service for personal information management with a mean value 2.41. Majority of the respondents agree that they know more about managing their personal information and apply it on research work. The study also revealed that major difficulties faced by research scholars are inadequate awareness of managing information via Internet. Most of the time research scholars store only that personal information that they want to share with others. Majority always afraid of putting their sensitive personal information at internet services because of privacy concern.
Keywords
Personal Information Management (PIM), Retrieval, University of Kerala, Research Scholars
User
Subscription
Login to verify subscription
Font Size
Information
- University of Kerala, Available from: http://www.keralauniversity.ac.in
- Boardman, Richard. (2004). Improving Tool Support for Personal Information Management, London, University of London.
- Jones, W. and Teevan, J. (2007). Personal Information Management. Washington: University of Washington Press.
- Jones, William. (2005). Personal Information Management. Available from: https://digital.lib.washington.edu/researchworks/bitstream/handle/1773/2155/arist%20chaptercurrent.pdf ?sequence= 1
- Divya, L.R. and Sudhier, K.G. Pillai, (2014). Exploring the role of E- mail inPersonal Information Management (PIM) Journal of Advancements in Library Sciences (JoALS).l (3);p.l8-27. Available from: http://stmjoumals.coni/sci/index.php?joumal=JoALS&page=article&op=view&path%5B%5D=692&path%5B%5D=470
- Vianna, D.; Yong, A.M.; Xia, C; Marian, A. and Nguyen, T. (2014). A tool for personal data extraction. In Data Engineering Workshops (ICDEW), 2014 IEEE 30th International Conference on IEEE, p. 80-83.
- Amouzande, M.; Tajdaran, M. and Ghaebi, A.(2013). An Investigation of Effective Factors on Personal Information Management of Postgraduate Student at Alzahra University..International Journal of Scientific Management and Development, 3(1): 38-47.
- Abdolahi, L.;Tahamtan, I.; Abdollahi, B. and Abdollah, N.(2012). Comparison of Knowledge and Performance between Faculty Members and PhD Students in Personal Information Management: Presenting an Instructional Model based on Lifelong Learning./?esDev., 1(2): 71-75.
- Majid, S.; San, M. M.; Tun, S. T. N. and Zar, T. (2010). Using Intemet Services for Personal Information Management. In Proceedings of 2"^ International Symposium on Information Management in a Challenging World, IMCW2010, Ankar.p.l 10-119.
- Henderson, S. and Srinivasan, A. (2009). An empirical analysis of personal digital document structures. In Human Interface and the Management of Information. Designing Information Environments, Springer Berlin Heidelberg.p. 394-403
- Henderson, S. (2009). How do people manage their documents?: an empirical investigation into personal document management practices among knowledge workers, PhD thesis. Research Space Auckland, 2009.
- Marshall, C.C; McCown, F. and Nelson, M.L. (2007). Evaluating personal archiving strategies for Internet-based information. In Archiving Conference, Society for Imaging Science and Technology, p. 151-156.
- Jones, S.R. and Thomas, P.J. (1997). Empirical assessment of individuals"personal information management systems'. Behaviour & Information Technology, 16(3): 158-160. Available from: DOI: 10.1080/01449299711988
Abstract Views: 335
PDF Views: 0