The more our personal information is stored in digital form, the easier it is to share. Personal information may be shared intentionally to facilitate an individual end. It may emerge as input to a routine organizational process. It may leak out accidentally due to inattention or ignorance. However it comes to light, when personal information becomes the province of a groupwhether a coterie of intimates, a series of bureaucrats, or a vast, curious publicthe ways it is used and managed change. As our transition to a digital society continues and personal information becomes increasingly available, researchers and developers must pay close attention to the interaction between personal information and group contexts.
Personal information management (PIM) plays both instrumental and symbolic roles in our lives. Artifacts, such as to-do lists, calendars, and rolodexes, aid users in conducting their daily lives. PIM artifacts also play a symbolic role by shaping the impressions that others form of their users. Thus, a Day-Timeravailable in an array of materials ("an expression of your unique style," says the Day-Timer Web site)can help its user appear to be a productive, well-organized professional. And if PIM artifacts are adroitly deployed and achieve their ends, the user's performance enhances that impression.
Although PIM is usually a private activity, we often create personal information with sharing in mind. A student may take notes to share with an absent friend. A co-worker may share his calendar to more easily schedule meetings. But sharing may lead to problems; for example, the student's notes may be messy and poorly organized, and the worker's calendar may reveal consistently long lunch dates with a fellow employee. When personal information is shared, it produces tensions between the ends for which it is shared and the not-necessarily desirable symbolic inferences it may support.
The tensions that naturally occur as personal information is shared are complex and intertwined. They may feed back and affect norms having to do with the structure and content of what is shared; for example, the student may be motivated to take better notes, and the co-worker may create counterfeit calendar entries to obscure his activities. More positively, a group may structure information in a shared repository, making it useful to all. It is this feedback cyclewhereby sharing information creates tensions that shape what and how the information is sharedthat makes this area an important focus for research attention.
I use the phrase group information management (GIM) to refer to PIM as it functions in more public spheres. More specifically, GIM has to do with how personal information is shared with a group, emphasizing the norms that underlie that sharing, as well as the ways participants negotiate these norms in response to the tensions that sharing inevitably produces.
Applications used for GIM include email, Web pages, and wikis, though some fall more squarely into the GIM arena than others. A longstanding example of GIM is online calendaring; when first introduced in the mid-1980s, it encountered some resistance from users, who realized that formerly private calendar entries could be used for ends other than to schedule meetings. A relatively new GIM genre is social networking services (such as Orkut, LinkedIn, and Friendster) that allow users to post personal profiles and create links to other people to signify professional or social ties; they are in turn used for purposes ranging from professional networking to dating. They also raise questions about what users choose to reveal or conceal, how their disclosure of personal information is related to the ends they hope to achieve, and the ethics of "counterfeiting" links or conspiring to garner "inauthentic" recommendations to increase their stature in the system.
Another example of GIM is patient medical records consisting of information generated by multiple people (and devices) and accessed by people from different institutions for purposes ranging from care coordination to insurance billing. This application raises complex ethical, legal, and practical questions concerning privacy, access, and ownership.
To gain a broader understanding of these issues, consider a simplified model of GIM involving a person who generates information that is to be shared with a group in support of a task:
These issues arise from a model of information sharing that is far too simple. Contrary to its implications, personal information is not always produced voluntarily (credit records) or by a single person (medical records). The groups with which information is shared are rarely static; new people join, even as established members drop out. Information isn't necessarily shared with identifiable, accountable individuals; it may instead be shared with an organization in which different people fill the same roles (such as as a claims processor). Nor is personal information necessarily used for a single task. And the differing nature of tasks (such as using the same medical records to coordinate care and for insurance billing) can introduce tensions that shape the information's content and structure, as well as how it is categorized, accessed, controlled, and used.
As various forms of personal information circulate through the world's increasingly networked groups and institutions, researchers and developers alike must understand GIM's implications for the design of information systems. Although GIM today is not a distinct field, it could soon provide a forum for consolidating social, legal, and business issues emerging in a number of domains.
©2006 ACM 0001-0782/06/0100 $5.00
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2006 ACM, Inc.
No entries found